Analysis
-
max time kernel
137s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
28/08/2023, 15:02
Static task
static1
Behavioral task
behavioral1
Sample
a859ef10ec102d28cf402e34adaeb51ac595c0f9c4249e2f5e98e6a3d575f000.exe
Resource
win10-20230703-en
General
-
Target
a859ef10ec102d28cf402e34adaeb51ac595c0f9c4249e2f5e98e6a3d575f000.exe
-
Size
1.3MB
-
MD5
33eebb18da46f1f44a3ed85d7d03686e
-
SHA1
afc4a6615e7e4b95204e3f6718eebab315c510de
-
SHA256
a859ef10ec102d28cf402e34adaeb51ac595c0f9c4249e2f5e98e6a3d575f000
-
SHA512
d1ba404a44de8b1060cf0c46de55405d43b94a87c0788a32da99944f8332d374cd4ed00421c6793175957c16f843996c1c712b07fabc80a5238765f344915307
-
SSDEEP
24576:tySlxk/8eX4prSb1VKhBgylWwQWSTPLjoT38FJPZKVIFf7gClu:ISzWX40nKhBgyl/QWS/8iPZzDgCl
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
stas
77.91.124.82:19071
-
auth_value
db6d96c4eade05afc28c31d9ad73a73c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 2964 y5805028.exe 3964 y5641956.exe 956 y3309989.exe 4148 l9597299.exe 2560 saves.exe 2532 m4361758.exe 3716 n9012177.exe 204 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 2168 rundll32.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a859ef10ec102d28cf402e34adaeb51ac595c0f9c4249e2f5e98e6a3d575f000.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y5805028.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y5641956.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y3309989.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1248 schtasks.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 4456 wrote to memory of 2964 4456 a859ef10ec102d28cf402e34adaeb51ac595c0f9c4249e2f5e98e6a3d575f000.exe 69 PID 4456 wrote to memory of 2964 4456 a859ef10ec102d28cf402e34adaeb51ac595c0f9c4249e2f5e98e6a3d575f000.exe 69 PID 4456 wrote to memory of 2964 4456 a859ef10ec102d28cf402e34adaeb51ac595c0f9c4249e2f5e98e6a3d575f000.exe 69 PID 2964 wrote to memory of 3964 2964 y5805028.exe 70 PID 2964 wrote to memory of 3964 2964 y5805028.exe 70 PID 2964 wrote to memory of 3964 2964 y5805028.exe 70 PID 3964 wrote to memory of 956 3964 y5641956.exe 71 PID 3964 wrote to memory of 956 3964 y5641956.exe 71 PID 3964 wrote to memory of 956 3964 y5641956.exe 71 PID 956 wrote to memory of 4148 956 y3309989.exe 72 PID 956 wrote to memory of 4148 956 y3309989.exe 72 PID 956 wrote to memory of 4148 956 y3309989.exe 72 PID 4148 wrote to memory of 2560 4148 l9597299.exe 73 PID 4148 wrote to memory of 2560 4148 l9597299.exe 73 PID 4148 wrote to memory of 2560 4148 l9597299.exe 73 PID 956 wrote to memory of 2532 956 y3309989.exe 74 PID 956 wrote to memory of 2532 956 y3309989.exe 74 PID 956 wrote to memory of 2532 956 y3309989.exe 74 PID 2560 wrote to memory of 1248 2560 saves.exe 75 PID 2560 wrote to memory of 1248 2560 saves.exe 75 PID 2560 wrote to memory of 1248 2560 saves.exe 75 PID 2560 wrote to memory of 1592 2560 saves.exe 77 PID 2560 wrote to memory of 1592 2560 saves.exe 77 PID 2560 wrote to memory of 1592 2560 saves.exe 77 PID 1592 wrote to memory of 3828 1592 cmd.exe 79 PID 1592 wrote to memory of 3828 1592 cmd.exe 79 PID 1592 wrote to memory of 3828 1592 cmd.exe 79 PID 1592 wrote to memory of 1860 1592 cmd.exe 80 PID 1592 wrote to memory of 1860 1592 cmd.exe 80 PID 1592 wrote to memory of 1860 1592 cmd.exe 80 PID 1592 wrote to memory of 2196 1592 cmd.exe 81 PID 1592 wrote to memory of 2196 1592 cmd.exe 81 PID 1592 wrote to memory of 2196 1592 cmd.exe 81 PID 1592 wrote to memory of 1544 1592 cmd.exe 82 PID 1592 wrote to memory of 1544 1592 cmd.exe 82 PID 1592 wrote to memory of 1544 1592 cmd.exe 82 PID 1592 wrote to memory of 3000 1592 cmd.exe 83 PID 1592 wrote to memory of 3000 1592 cmd.exe 83 PID 1592 wrote to memory of 3000 1592 cmd.exe 83 PID 1592 wrote to memory of 2476 1592 cmd.exe 84 PID 1592 wrote to memory of 2476 1592 cmd.exe 84 PID 1592 wrote to memory of 2476 1592 cmd.exe 84 PID 3964 wrote to memory of 3716 3964 y5641956.exe 85 PID 3964 wrote to memory of 3716 3964 y5641956.exe 85 PID 3964 wrote to memory of 3716 3964 y5641956.exe 85 PID 2560 wrote to memory of 2168 2560 saves.exe 86 PID 2560 wrote to memory of 2168 2560 saves.exe 86 PID 2560 wrote to memory of 2168 2560 saves.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\a859ef10ec102d28cf402e34adaeb51ac595c0f9c4249e2f5e98e6a3d575f000.exe"C:\Users\Admin\AppData\Local\Temp\a859ef10ec102d28cf402e34adaeb51ac595c0f9c4249e2f5e98e6a3d575f000.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5805028.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5805028.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5641956.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5641956.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y3309989.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y3309989.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l9597299.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l9597299.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:1248
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3828
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:1860
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:2196
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1544
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:3000
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:2476
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:2168
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m4361758.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m4361758.exe5⤵
- Executes dropped EXE
PID:2532
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n9012177.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n9012177.exe4⤵
- Executes dropped EXE
PID:3716
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD55a3ea8ce65f98ed64160912b8f6e4fe4
SHA1134b0c0ddd26eb814d07a01145c5180511a48315
SHA2560a533b0a2223eeea33b014ce839a20be6c49fea13248fa4128dc35c1a44a28d8
SHA5125bd15417bfa6f8e3ab2483c0b8842d2252dcb50f224021ead395bef6bed7e3c2d30df68d58b4f47b8d878ddb08e41d1e83f310b6e8e44cf1c6492e6b33bfc01f
-
Filesize
1.2MB
MD55a3ea8ce65f98ed64160912b8f6e4fe4
SHA1134b0c0ddd26eb814d07a01145c5180511a48315
SHA2560a533b0a2223eeea33b014ce839a20be6c49fea13248fa4128dc35c1a44a28d8
SHA5125bd15417bfa6f8e3ab2483c0b8842d2252dcb50f224021ead395bef6bed7e3c2d30df68d58b4f47b8d878ddb08e41d1e83f310b6e8e44cf1c6492e6b33bfc01f
-
Filesize
475KB
MD5c572cf1120f23724929b755b47afd817
SHA1319a28cf8e0e8a18bbe678cb54d85193425617d5
SHA256498ce265cd1c237e8becc9c8e177fc5f52d84bb8235718a040c3ba0e22669333
SHA51299e763eacb92753e8d2b3f3e890fae7e5b911232a087526378a915fa1d65b33c942ff1c51d97377e12a8daa9b354d2aa88fbe50d24725019c2cca779feaef35d
-
Filesize
475KB
MD5c572cf1120f23724929b755b47afd817
SHA1319a28cf8e0e8a18bbe678cb54d85193425617d5
SHA256498ce265cd1c237e8becc9c8e177fc5f52d84bb8235718a040c3ba0e22669333
SHA51299e763eacb92753e8d2b3f3e890fae7e5b911232a087526378a915fa1d65b33c942ff1c51d97377e12a8daa9b354d2aa88fbe50d24725019c2cca779feaef35d
-
Filesize
174KB
MD5d7a37fc7a34b4b3a5db0b319542aa03d
SHA1cbd95eeeb9e196f34f71930b89d64863ce728553
SHA256b7473a266211ec6bfaf5203127a53120ad9e6e761a16ac7cc096e6e15e5d2560
SHA5127b46629971b22bff728d035c54670f1897f9f1037eab7168b2ec7d44aea033a34e703d560cb910e6370d66a0bef41be3a337e47d5a9fdc942bf2be6271b4ddbd
-
Filesize
174KB
MD5d7a37fc7a34b4b3a5db0b319542aa03d
SHA1cbd95eeeb9e196f34f71930b89d64863ce728553
SHA256b7473a266211ec6bfaf5203127a53120ad9e6e761a16ac7cc096e6e15e5d2560
SHA5127b46629971b22bff728d035c54670f1897f9f1037eab7168b2ec7d44aea033a34e703d560cb910e6370d66a0bef41be3a337e47d5a9fdc942bf2be6271b4ddbd
-
Filesize
319KB
MD57b71bddd90d23d33229a2bdabd2cf35e
SHA18fcc008c0d4dab9199d9ca577edbb0f9a12a32f2
SHA256036af366e721802e23ecf88cb168d8aed5933e4d1e61da66b28a7a25b181c077
SHA512da694bd4f652e133b481cabafdb1f7a417c1b08bedfaf83703ca719dd0249208fc68034868c289b4d2e544d7215152c505c3054a86c48cde832b2665c4b32030
-
Filesize
319KB
MD57b71bddd90d23d33229a2bdabd2cf35e
SHA18fcc008c0d4dab9199d9ca577edbb0f9a12a32f2
SHA256036af366e721802e23ecf88cb168d8aed5933e4d1e61da66b28a7a25b181c077
SHA512da694bd4f652e133b481cabafdb1f7a417c1b08bedfaf83703ca719dd0249208fc68034868c289b4d2e544d7215152c505c3054a86c48cde832b2665c4b32030
-
Filesize
324KB
MD555738231388977595bde4c40e7c47d7b
SHA1f72454ebc19f3d810513aee16cafa18acb1e5e78
SHA2560564cf6a439873ff486525d82a597ddc99f370fa129171cfa8258c8b2bf18b8c
SHA512e710e164ecbda00aac5b72fd4846f1a95a5345505ffdf430085bbc47b7b35c909542b160906c415041cd7f2500f61415a3bd9883bb3bbbb6bb0c811e9eca249c
-
Filesize
324KB
MD555738231388977595bde4c40e7c47d7b
SHA1f72454ebc19f3d810513aee16cafa18acb1e5e78
SHA2560564cf6a439873ff486525d82a597ddc99f370fa129171cfa8258c8b2bf18b8c
SHA512e710e164ecbda00aac5b72fd4846f1a95a5345505ffdf430085bbc47b7b35c909542b160906c415041cd7f2500f61415a3bd9883bb3bbbb6bb0c811e9eca249c
-
Filesize
140KB
MD58048a4c4048e7882e4ab52c67057052e
SHA1375f4a6b9d88bb8e755fd7a0ac0fc9a531fe1e7d
SHA25602db759bc52e0c827245aa5dcf48495c9799b969c4a23e7edc3cfcf18386a899
SHA512bf3be3cf109cd9a76ea447a16cc344e3941a48b8001eb8e8f7177db6056aa0cc4038fd371306eee57fc4082bc60030b2aeb59b39cdf3308cb6020f61d9e55a13
-
Filesize
140KB
MD58048a4c4048e7882e4ab52c67057052e
SHA1375f4a6b9d88bb8e755fd7a0ac0fc9a531fe1e7d
SHA25602db759bc52e0c827245aa5dcf48495c9799b969c4a23e7edc3cfcf18386a899
SHA512bf3be3cf109cd9a76ea447a16cc344e3941a48b8001eb8e8f7177db6056aa0cc4038fd371306eee57fc4082bc60030b2aeb59b39cdf3308cb6020f61d9e55a13
-
Filesize
324KB
MD555738231388977595bde4c40e7c47d7b
SHA1f72454ebc19f3d810513aee16cafa18acb1e5e78
SHA2560564cf6a439873ff486525d82a597ddc99f370fa129171cfa8258c8b2bf18b8c
SHA512e710e164ecbda00aac5b72fd4846f1a95a5345505ffdf430085bbc47b7b35c909542b160906c415041cd7f2500f61415a3bd9883bb3bbbb6bb0c811e9eca249c
-
Filesize
324KB
MD555738231388977595bde4c40e7c47d7b
SHA1f72454ebc19f3d810513aee16cafa18acb1e5e78
SHA2560564cf6a439873ff486525d82a597ddc99f370fa129171cfa8258c8b2bf18b8c
SHA512e710e164ecbda00aac5b72fd4846f1a95a5345505ffdf430085bbc47b7b35c909542b160906c415041cd7f2500f61415a3bd9883bb3bbbb6bb0c811e9eca249c
-
Filesize
324KB
MD555738231388977595bde4c40e7c47d7b
SHA1f72454ebc19f3d810513aee16cafa18acb1e5e78
SHA2560564cf6a439873ff486525d82a597ddc99f370fa129171cfa8258c8b2bf18b8c
SHA512e710e164ecbda00aac5b72fd4846f1a95a5345505ffdf430085bbc47b7b35c909542b160906c415041cd7f2500f61415a3bd9883bb3bbbb6bb0c811e9eca249c
-
Filesize
324KB
MD555738231388977595bde4c40e7c47d7b
SHA1f72454ebc19f3d810513aee16cafa18acb1e5e78
SHA2560564cf6a439873ff486525d82a597ddc99f370fa129171cfa8258c8b2bf18b8c
SHA512e710e164ecbda00aac5b72fd4846f1a95a5345505ffdf430085bbc47b7b35c909542b160906c415041cd7f2500f61415a3bd9883bb3bbbb6bb0c811e9eca249c
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b