Analysis
-
max time kernel
137s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
28/08/2023, 13:37
Static task
static1
Behavioral task
behavioral1
Sample
d27b3b619332f27256eab358b46b4b74b7c1a7b46caea70967d9d22e10311af0.exe
Resource
win10-20230703-en
General
-
Target
d27b3b619332f27256eab358b46b4b74b7c1a7b46caea70967d9d22e10311af0.exe
-
Size
1.4MB
-
MD5
22030369e3671c2713852c0d6241e20d
-
SHA1
8c8133ed3f22ef033d7c8bb2a4d85cb9f2c032e7
-
SHA256
d27b3b619332f27256eab358b46b4b74b7c1a7b46caea70967d9d22e10311af0
-
SHA512
502438f706398ad0eadee08536cffccd5a8b6ec9603379fb0b07178809bf5ee49d6237f7242b1bfe1932accf654940e7e90d77ac1d965b19925a172ec8d6b84f
-
SSDEEP
24576:kyvfL0aha+GJvkuN2pRKWyooLiDFgt8+Q4eWQ4oGUWzY4ZD8YmjNFm14VS:zwaoJPNIRKWyoVncoGUWzfOdNFmG
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
stas
77.91.124.82:19071
-
auth_value
db6d96c4eade05afc28c31d9ad73a73c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 3576 y8768046.exe 1292 y6510020.exe 3268 y7785924.exe 1832 l2561726.exe 1388 saves.exe 4304 m0646887.exe 3636 n6049939.exe 4340 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 3988 rundll32.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y6510020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y7785924.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d27b3b619332f27256eab358b46b4b74b7c1a7b46caea70967d9d22e10311af0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y8768046.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4316 schtasks.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 5080 wrote to memory of 3576 5080 d27b3b619332f27256eab358b46b4b74b7c1a7b46caea70967d9d22e10311af0.exe 69 PID 5080 wrote to memory of 3576 5080 d27b3b619332f27256eab358b46b4b74b7c1a7b46caea70967d9d22e10311af0.exe 69 PID 5080 wrote to memory of 3576 5080 d27b3b619332f27256eab358b46b4b74b7c1a7b46caea70967d9d22e10311af0.exe 69 PID 3576 wrote to memory of 1292 3576 y8768046.exe 70 PID 3576 wrote to memory of 1292 3576 y8768046.exe 70 PID 3576 wrote to memory of 1292 3576 y8768046.exe 70 PID 1292 wrote to memory of 3268 1292 y6510020.exe 71 PID 1292 wrote to memory of 3268 1292 y6510020.exe 71 PID 1292 wrote to memory of 3268 1292 y6510020.exe 71 PID 3268 wrote to memory of 1832 3268 y7785924.exe 72 PID 3268 wrote to memory of 1832 3268 y7785924.exe 72 PID 3268 wrote to memory of 1832 3268 y7785924.exe 72 PID 1832 wrote to memory of 1388 1832 l2561726.exe 73 PID 1832 wrote to memory of 1388 1832 l2561726.exe 73 PID 1832 wrote to memory of 1388 1832 l2561726.exe 73 PID 3268 wrote to memory of 4304 3268 y7785924.exe 74 PID 3268 wrote to memory of 4304 3268 y7785924.exe 74 PID 3268 wrote to memory of 4304 3268 y7785924.exe 74 PID 1388 wrote to memory of 4316 1388 saves.exe 75 PID 1388 wrote to memory of 4316 1388 saves.exe 75 PID 1388 wrote to memory of 4316 1388 saves.exe 75 PID 1388 wrote to memory of 1316 1388 saves.exe 77 PID 1388 wrote to memory of 1316 1388 saves.exe 77 PID 1388 wrote to memory of 1316 1388 saves.exe 77 PID 1316 wrote to memory of 4284 1316 cmd.exe 79 PID 1316 wrote to memory of 4284 1316 cmd.exe 79 PID 1316 wrote to memory of 4284 1316 cmd.exe 79 PID 1316 wrote to memory of 3444 1316 cmd.exe 80 PID 1316 wrote to memory of 3444 1316 cmd.exe 80 PID 1316 wrote to memory of 3444 1316 cmd.exe 80 PID 1316 wrote to memory of 4368 1316 cmd.exe 81 PID 1316 wrote to memory of 4368 1316 cmd.exe 81 PID 1316 wrote to memory of 4368 1316 cmd.exe 81 PID 1316 wrote to memory of 2328 1316 cmd.exe 82 PID 1316 wrote to memory of 2328 1316 cmd.exe 82 PID 1316 wrote to memory of 2328 1316 cmd.exe 82 PID 1316 wrote to memory of 3640 1316 cmd.exe 83 PID 1316 wrote to memory of 3640 1316 cmd.exe 83 PID 1316 wrote to memory of 3640 1316 cmd.exe 83 PID 1316 wrote to memory of 4536 1316 cmd.exe 84 PID 1316 wrote to memory of 4536 1316 cmd.exe 84 PID 1316 wrote to memory of 4536 1316 cmd.exe 84 PID 1292 wrote to memory of 3636 1292 y6510020.exe 85 PID 1292 wrote to memory of 3636 1292 y6510020.exe 85 PID 1292 wrote to memory of 3636 1292 y6510020.exe 85 PID 1388 wrote to memory of 3988 1388 saves.exe 87 PID 1388 wrote to memory of 3988 1388 saves.exe 87 PID 1388 wrote to memory of 3988 1388 saves.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\d27b3b619332f27256eab358b46b4b74b7c1a7b46caea70967d9d22e10311af0.exe"C:\Users\Admin\AppData\Local\Temp\d27b3b619332f27256eab358b46b4b74b7c1a7b46caea70967d9d22e10311af0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8768046.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8768046.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6510020.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6510020.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y7785924.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y7785924.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l2561726.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l2561726.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:4316
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4284
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:3444
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:4368
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2328
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:3640
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:4536
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:3988
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m0646887.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m0646887.exe5⤵
- Executes dropped EXE
PID:4304
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n6049939.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n6049939.exe4⤵
- Executes dropped EXE
PID:3636
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5b47cd89469a28cc9b6f93f64e86359c6
SHA12f6526e41e6ddc714006620afdff80a062d421b7
SHA2562afa90cec4de22dbd380feda7bb1406439b116c5eb194370e39042863b626aad
SHA51242f6e4b912f52a9a4a96cb6007ab4cf790463c88b8a721ff533e138f9ab4481a4151ebf302b5e2a0f456be4c77fbbe2a9edc10fff4d450bbb6e78cbe22d56c8a
-
Filesize
1.3MB
MD5b47cd89469a28cc9b6f93f64e86359c6
SHA12f6526e41e6ddc714006620afdff80a062d421b7
SHA2562afa90cec4de22dbd380feda7bb1406439b116c5eb194370e39042863b626aad
SHA51242f6e4b912f52a9a4a96cb6007ab4cf790463c88b8a721ff533e138f9ab4481a4151ebf302b5e2a0f456be4c77fbbe2a9edc10fff4d450bbb6e78cbe22d56c8a
-
Filesize
475KB
MD5345d46e297964224861f2d865ed6e38d
SHA1b2bfabe1e3797b32c01f79805dc04017c4484f14
SHA25612c4a20886e71313055662251ab003d1daebb6683e26c0af06a0edb958811779
SHA512ff08a2837edeee3023da4a43c01c455519a98513f3b506e8f648041294dcaebdd6387efae9605bf66908335aa3801ff8996f45d756cd528f9f4951eecae194c7
-
Filesize
475KB
MD5345d46e297964224861f2d865ed6e38d
SHA1b2bfabe1e3797b32c01f79805dc04017c4484f14
SHA25612c4a20886e71313055662251ab003d1daebb6683e26c0af06a0edb958811779
SHA512ff08a2837edeee3023da4a43c01c455519a98513f3b506e8f648041294dcaebdd6387efae9605bf66908335aa3801ff8996f45d756cd528f9f4951eecae194c7
-
Filesize
174KB
MD506105c670ff6a5f10e614508af201148
SHA1e03487943dcf77686f9c7da0e4242b169a008449
SHA256f59b4986f7b557bf7439ab42009afcba6a1d1139cdce09c4f057fe93abe284af
SHA51210c7479e71f619db50f1db6421841f1f384d296c763de5b4850b2286da8c2acfb62a2d98b8ed6cb1946a227946eb88bd8c3cae3e6bfc4bb16ac572784da913bc
-
Filesize
174KB
MD506105c670ff6a5f10e614508af201148
SHA1e03487943dcf77686f9c7da0e4242b169a008449
SHA256f59b4986f7b557bf7439ab42009afcba6a1d1139cdce09c4f057fe93abe284af
SHA51210c7479e71f619db50f1db6421841f1f384d296c763de5b4850b2286da8c2acfb62a2d98b8ed6cb1946a227946eb88bd8c3cae3e6bfc4bb16ac572784da913bc
-
Filesize
319KB
MD538e026934e8300665b4a3f32252ac728
SHA1314390dc05ac667723604252c4670b5f69380838
SHA2564f4d8ecf2db15f7243c4cf554c6fe0b99dda299c2f1df9184f9fc73bc05207db
SHA5122fb022b3fbb2421facc1d9972bd8a8169e199609a4b1c97ec7b9b8136498c53fb518a3f79017119d36aadb4c0a12c3121a9fda69ef9fab3eebb8c2fe790676a5
-
Filesize
319KB
MD538e026934e8300665b4a3f32252ac728
SHA1314390dc05ac667723604252c4670b5f69380838
SHA2564f4d8ecf2db15f7243c4cf554c6fe0b99dda299c2f1df9184f9fc73bc05207db
SHA5122fb022b3fbb2421facc1d9972bd8a8169e199609a4b1c97ec7b9b8136498c53fb518a3f79017119d36aadb4c0a12c3121a9fda69ef9fab3eebb8c2fe790676a5
-
Filesize
323KB
MD561f8aedec35248fe5987d2e08966c74f
SHA118db700c2eb9fbed32473e8b1f2230e8256283b5
SHA256f448fcc99257db519dc28346b9f1083bc61455abbd6a4bf80a521d5b6d05a330
SHA51226ae0166c41599d0ab61fd985731a28fa94ff589bd0db9ad90d889d4cd0855f4adfc03b7f5e15a304e8c86563ebf303d4b392430deb3f018be9286332a63fc22
-
Filesize
323KB
MD561f8aedec35248fe5987d2e08966c74f
SHA118db700c2eb9fbed32473e8b1f2230e8256283b5
SHA256f448fcc99257db519dc28346b9f1083bc61455abbd6a4bf80a521d5b6d05a330
SHA51226ae0166c41599d0ab61fd985731a28fa94ff589bd0db9ad90d889d4cd0855f4adfc03b7f5e15a304e8c86563ebf303d4b392430deb3f018be9286332a63fc22
-
Filesize
140KB
MD564575ed82964d0d16d89e81c244fdf78
SHA11b91d9b4788a431841e660fc8a1a8b17a01f1b25
SHA25633d89af224562499d8f25e0faf491d07d2fe0aa8ce928e676b6b51c3aaef1ad5
SHA5123564b576cfca9eefd889940d61208234854ab4a28f4ba01625a513d376ec418ca8bf084cd5aed75b8ca724efc7e39c929bdce6c615c86c3f7e3da8d3ccb4b3ac
-
Filesize
140KB
MD564575ed82964d0d16d89e81c244fdf78
SHA11b91d9b4788a431841e660fc8a1a8b17a01f1b25
SHA25633d89af224562499d8f25e0faf491d07d2fe0aa8ce928e676b6b51c3aaef1ad5
SHA5123564b576cfca9eefd889940d61208234854ab4a28f4ba01625a513d376ec418ca8bf084cd5aed75b8ca724efc7e39c929bdce6c615c86c3f7e3da8d3ccb4b3ac
-
Filesize
323KB
MD561f8aedec35248fe5987d2e08966c74f
SHA118db700c2eb9fbed32473e8b1f2230e8256283b5
SHA256f448fcc99257db519dc28346b9f1083bc61455abbd6a4bf80a521d5b6d05a330
SHA51226ae0166c41599d0ab61fd985731a28fa94ff589bd0db9ad90d889d4cd0855f4adfc03b7f5e15a304e8c86563ebf303d4b392430deb3f018be9286332a63fc22
-
Filesize
323KB
MD561f8aedec35248fe5987d2e08966c74f
SHA118db700c2eb9fbed32473e8b1f2230e8256283b5
SHA256f448fcc99257db519dc28346b9f1083bc61455abbd6a4bf80a521d5b6d05a330
SHA51226ae0166c41599d0ab61fd985731a28fa94ff589bd0db9ad90d889d4cd0855f4adfc03b7f5e15a304e8c86563ebf303d4b392430deb3f018be9286332a63fc22
-
Filesize
323KB
MD561f8aedec35248fe5987d2e08966c74f
SHA118db700c2eb9fbed32473e8b1f2230e8256283b5
SHA256f448fcc99257db519dc28346b9f1083bc61455abbd6a4bf80a521d5b6d05a330
SHA51226ae0166c41599d0ab61fd985731a28fa94ff589bd0db9ad90d889d4cd0855f4adfc03b7f5e15a304e8c86563ebf303d4b392430deb3f018be9286332a63fc22
-
Filesize
323KB
MD561f8aedec35248fe5987d2e08966c74f
SHA118db700c2eb9fbed32473e8b1f2230e8256283b5
SHA256f448fcc99257db519dc28346b9f1083bc61455abbd6a4bf80a521d5b6d05a330
SHA51226ae0166c41599d0ab61fd985731a28fa94ff589bd0db9ad90d889d4cd0855f4adfc03b7f5e15a304e8c86563ebf303d4b392430deb3f018be9286332a63fc22
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b