Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2023, 19:55
Static task
static1
Behavioral task
behavioral1
Sample
80d3f21e74b0140db0d04babfce0b2b352fd27ba9028bb28bcae7532c891c400.exe
Resource
win10v2004-20230703-en
General
-
Target
80d3f21e74b0140db0d04babfce0b2b352fd27ba9028bb28bcae7532c891c400.exe
-
Size
1.4MB
-
MD5
066e578a9a9a2c63197ad8157a1d5411
-
SHA1
11d7fce7884db6dfd8a84ea2ce9da867372a2807
-
SHA256
80d3f21e74b0140db0d04babfce0b2b352fd27ba9028bb28bcae7532c891c400
-
SHA512
e81eeb69f095f5e96bee256bf85254aadc647cf29746bb320e356a3976be582a01ea123bdd39bca5f377b25dc6990f4ce0f0a200ea1fd03ecdcb27c2b544000b
-
SSDEEP
24576:9yLFjl/wzxhNl20yA96S7tdK0PhAaBW+rfinKqrdwToDIXjDIq24mZT5n85uApnk:Yhh/wFnl2y6ShdK0PhAh+rSFdFIzkqDR
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
Extracted
redline
stas
77.91.124.82:19071
-
auth_value
db6d96c4eade05afc28c31d9ad73a73c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 10 IoCs
pid Process 4764 y4664171.exe 4288 y8992540.exe 1292 y2209421.exe 4424 l0550526.exe 4128 saves.exe 4072 m3003015.exe 3360 n5090127.exe 3476 saves.exe 3116 saves.exe 5008 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 2368 rundll32.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y8992540.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y2209421.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 80d3f21e74b0140db0d04babfce0b2b352fd27ba9028bb28bcae7532c891c400.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y4664171.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4636 schtasks.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1160 wrote to memory of 4764 1160 80d3f21e74b0140db0d04babfce0b2b352fd27ba9028bb28bcae7532c891c400.exe 82 PID 1160 wrote to memory of 4764 1160 80d3f21e74b0140db0d04babfce0b2b352fd27ba9028bb28bcae7532c891c400.exe 82 PID 1160 wrote to memory of 4764 1160 80d3f21e74b0140db0d04babfce0b2b352fd27ba9028bb28bcae7532c891c400.exe 82 PID 4764 wrote to memory of 4288 4764 y4664171.exe 83 PID 4764 wrote to memory of 4288 4764 y4664171.exe 83 PID 4764 wrote to memory of 4288 4764 y4664171.exe 83 PID 4288 wrote to memory of 1292 4288 y8992540.exe 84 PID 4288 wrote to memory of 1292 4288 y8992540.exe 84 PID 4288 wrote to memory of 1292 4288 y8992540.exe 84 PID 1292 wrote to memory of 4424 1292 y2209421.exe 85 PID 1292 wrote to memory of 4424 1292 y2209421.exe 85 PID 1292 wrote to memory of 4424 1292 y2209421.exe 85 PID 4424 wrote to memory of 4128 4424 l0550526.exe 87 PID 4424 wrote to memory of 4128 4424 l0550526.exe 87 PID 4424 wrote to memory of 4128 4424 l0550526.exe 87 PID 1292 wrote to memory of 4072 1292 y2209421.exe 88 PID 1292 wrote to memory of 4072 1292 y2209421.exe 88 PID 1292 wrote to memory of 4072 1292 y2209421.exe 88 PID 4128 wrote to memory of 4636 4128 saves.exe 89 PID 4128 wrote to memory of 4636 4128 saves.exe 89 PID 4128 wrote to memory of 4636 4128 saves.exe 89 PID 4128 wrote to memory of 1480 4128 saves.exe 91 PID 4128 wrote to memory of 1480 4128 saves.exe 91 PID 4128 wrote to memory of 1480 4128 saves.exe 91 PID 4288 wrote to memory of 3360 4288 y8992540.exe 93 PID 4288 wrote to memory of 3360 4288 y8992540.exe 93 PID 4288 wrote to memory of 3360 4288 y8992540.exe 93 PID 1480 wrote to memory of 3584 1480 cmd.exe 95 PID 1480 wrote to memory of 3584 1480 cmd.exe 95 PID 1480 wrote to memory of 3584 1480 cmd.exe 95 PID 1480 wrote to memory of 4972 1480 cmd.exe 94 PID 1480 wrote to memory of 4972 1480 cmd.exe 94 PID 1480 wrote to memory of 4972 1480 cmd.exe 94 PID 1480 wrote to memory of 2692 1480 cmd.exe 96 PID 1480 wrote to memory of 2692 1480 cmd.exe 96 PID 1480 wrote to memory of 2692 1480 cmd.exe 96 PID 1480 wrote to memory of 2940 1480 cmd.exe 97 PID 1480 wrote to memory of 2940 1480 cmd.exe 97 PID 1480 wrote to memory of 2940 1480 cmd.exe 97 PID 1480 wrote to memory of 3264 1480 cmd.exe 98 PID 1480 wrote to memory of 3264 1480 cmd.exe 98 PID 1480 wrote to memory of 3264 1480 cmd.exe 98 PID 1480 wrote to memory of 844 1480 cmd.exe 99 PID 1480 wrote to memory of 844 1480 cmd.exe 99 PID 1480 wrote to memory of 844 1480 cmd.exe 99 PID 4128 wrote to memory of 2368 4128 saves.exe 109 PID 4128 wrote to memory of 2368 4128 saves.exe 109 PID 4128 wrote to memory of 2368 4128 saves.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\80d3f21e74b0140db0d04babfce0b2b352fd27ba9028bb28bcae7532c891c400.exe"C:\Users\Admin\AppData\Local\Temp\80d3f21e74b0140db0d04babfce0b2b352fd27ba9028bb28bcae7532c891c400.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4664171.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4664171.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8992540.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8992540.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y2209421.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y2209421.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l0550526.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l0550526.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:4636
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:4972
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3584
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:2692
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2940
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:3264
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:844
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:2368
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m3003015.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m3003015.exe5⤵
- Executes dropped EXE
PID:4072
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n5090127.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n5090127.exe4⤵
- Executes dropped EXE
PID:3360
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:3476
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:3116
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:5008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD503dd402a48ad83832fa6b1c304d01cf5
SHA1a5875b44b34fcf35ac95a3ff4d3c6492f9f06430
SHA256dc0dba78a8a7777da1424f2adf8aa6b6e723f2c3014891495f504597dcb432e7
SHA512d6303dd998ce50c5b7bd8f4210b5e1c5b3bc6bbc9587b10806d61d952fbc00519fb048419f8471a0497f5cc3f3a6c840ea47b4ecfc5cddcbbea32485394eb9eb
-
Filesize
1.3MB
MD503dd402a48ad83832fa6b1c304d01cf5
SHA1a5875b44b34fcf35ac95a3ff4d3c6492f9f06430
SHA256dc0dba78a8a7777da1424f2adf8aa6b6e723f2c3014891495f504597dcb432e7
SHA512d6303dd998ce50c5b7bd8f4210b5e1c5b3bc6bbc9587b10806d61d952fbc00519fb048419f8471a0497f5cc3f3a6c840ea47b4ecfc5cddcbbea32485394eb9eb
-
Filesize
476KB
MD597a01cae9a731252aceb150da6bcb67f
SHA10514c1ef518f643364886c0b5e757f661ddceef5
SHA256221b3352db2834b901f6c9b7037e287e37cdec79536ca15b90db6b2b5ead42bf
SHA5125d101673d6275974cf8943ab5dba81eb9108a7342549592d09aa39648a83b50f8af291cdc8c6784cc4b4818088fedbe75d6da2dd73598da0a62c0d9800d9160d
-
Filesize
476KB
MD597a01cae9a731252aceb150da6bcb67f
SHA10514c1ef518f643364886c0b5e757f661ddceef5
SHA256221b3352db2834b901f6c9b7037e287e37cdec79536ca15b90db6b2b5ead42bf
SHA5125d101673d6275974cf8943ab5dba81eb9108a7342549592d09aa39648a83b50f8af291cdc8c6784cc4b4818088fedbe75d6da2dd73598da0a62c0d9800d9160d
-
Filesize
175KB
MD54e1dd1a8e263ecdb382c8316feb5cbed
SHA17122e0448995577ddacc007a7711a7356d2d9a36
SHA256b024a2772ae6a8beb033aa47e37f49ec91f7251ca170645fbbb663ef8993dfe1
SHA5129ebe8328446707a933d4215d3beea0e75fcc79467fe9739c3a01fb0d9f3a4a620890108d91cd5434901c64957309bb96f071bd8cd1d8eef856bf6be0b072daf6
-
Filesize
175KB
MD54e1dd1a8e263ecdb382c8316feb5cbed
SHA17122e0448995577ddacc007a7711a7356d2d9a36
SHA256b024a2772ae6a8beb033aa47e37f49ec91f7251ca170645fbbb663ef8993dfe1
SHA5129ebe8328446707a933d4215d3beea0e75fcc79467fe9739c3a01fb0d9f3a4a620890108d91cd5434901c64957309bb96f071bd8cd1d8eef856bf6be0b072daf6
-
Filesize
320KB
MD50d533da22ca5d3c278943cea7456e124
SHA12119c9e4f1f5c3a38ee107e2a35b4f34a36f2a0c
SHA2564b8f76669c69501ca4c6386c301e48b368f76d3c9de067eaf5b16aae3a084678
SHA512f0d5c06a29d6732693d9c5631160f10a4ec79f09fee7b95305b7945143b5f6cec377b3ca014d222a332ee10a16768a9f7f114e29e9c3d0578976ab0924848afb
-
Filesize
320KB
MD50d533da22ca5d3c278943cea7456e124
SHA12119c9e4f1f5c3a38ee107e2a35b4f34a36f2a0c
SHA2564b8f76669c69501ca4c6386c301e48b368f76d3c9de067eaf5b16aae3a084678
SHA512f0d5c06a29d6732693d9c5631160f10a4ec79f09fee7b95305b7945143b5f6cec377b3ca014d222a332ee10a16768a9f7f114e29e9c3d0578976ab0924848afb
-
Filesize
324KB
MD5c1bd2b29242b08c183a79a448e3dd623
SHA1daa361f4d9eb3beba3aed516821d04e30636271f
SHA25677b745807e5ef267d7e73029f18da08fe69e2e679a0aa1d74eb7d20e44f0c885
SHA51222fda95c83c452af28a740db9d2ab841f0697f70188a1940447b8f69c2d8c5218dd38d8f1444e96e33fbec52d491d8e4ba72d627029234e5d2f78fa0ba422ed1
-
Filesize
324KB
MD5c1bd2b29242b08c183a79a448e3dd623
SHA1daa361f4d9eb3beba3aed516821d04e30636271f
SHA25677b745807e5ef267d7e73029f18da08fe69e2e679a0aa1d74eb7d20e44f0c885
SHA51222fda95c83c452af28a740db9d2ab841f0697f70188a1940447b8f69c2d8c5218dd38d8f1444e96e33fbec52d491d8e4ba72d627029234e5d2f78fa0ba422ed1
-
Filesize
140KB
MD5ef370f5889cb520f8f3567f8719797e1
SHA172566ec538ff95ab5a9d95f1f8bd14395ebac2b7
SHA2569f8decacd169fd252bf0e47182801e782e56d2c154ff2a616c991bd60529f467
SHA512fa9eea5e8abafd076f361ef4add902939d915f71ec49ba813a01f2727ce831d7169e46a8a7bd588e273ea5128a2007f69496bcbf91eccf6ffa155531fd095129
-
Filesize
140KB
MD5ef370f5889cb520f8f3567f8719797e1
SHA172566ec538ff95ab5a9d95f1f8bd14395ebac2b7
SHA2569f8decacd169fd252bf0e47182801e782e56d2c154ff2a616c991bd60529f467
SHA512fa9eea5e8abafd076f361ef4add902939d915f71ec49ba813a01f2727ce831d7169e46a8a7bd588e273ea5128a2007f69496bcbf91eccf6ffa155531fd095129
-
Filesize
324KB
MD5c1bd2b29242b08c183a79a448e3dd623
SHA1daa361f4d9eb3beba3aed516821d04e30636271f
SHA25677b745807e5ef267d7e73029f18da08fe69e2e679a0aa1d74eb7d20e44f0c885
SHA51222fda95c83c452af28a740db9d2ab841f0697f70188a1940447b8f69c2d8c5218dd38d8f1444e96e33fbec52d491d8e4ba72d627029234e5d2f78fa0ba422ed1
-
Filesize
324KB
MD5c1bd2b29242b08c183a79a448e3dd623
SHA1daa361f4d9eb3beba3aed516821d04e30636271f
SHA25677b745807e5ef267d7e73029f18da08fe69e2e679a0aa1d74eb7d20e44f0c885
SHA51222fda95c83c452af28a740db9d2ab841f0697f70188a1940447b8f69c2d8c5218dd38d8f1444e96e33fbec52d491d8e4ba72d627029234e5d2f78fa0ba422ed1
-
Filesize
324KB
MD5c1bd2b29242b08c183a79a448e3dd623
SHA1daa361f4d9eb3beba3aed516821d04e30636271f
SHA25677b745807e5ef267d7e73029f18da08fe69e2e679a0aa1d74eb7d20e44f0c885
SHA51222fda95c83c452af28a740db9d2ab841f0697f70188a1940447b8f69c2d8c5218dd38d8f1444e96e33fbec52d491d8e4ba72d627029234e5d2f78fa0ba422ed1
-
Filesize
324KB
MD5c1bd2b29242b08c183a79a448e3dd623
SHA1daa361f4d9eb3beba3aed516821d04e30636271f
SHA25677b745807e5ef267d7e73029f18da08fe69e2e679a0aa1d74eb7d20e44f0c885
SHA51222fda95c83c452af28a740db9d2ab841f0697f70188a1940447b8f69c2d8c5218dd38d8f1444e96e33fbec52d491d8e4ba72d627029234e5d2f78fa0ba422ed1
-
Filesize
324KB
MD5c1bd2b29242b08c183a79a448e3dd623
SHA1daa361f4d9eb3beba3aed516821d04e30636271f
SHA25677b745807e5ef267d7e73029f18da08fe69e2e679a0aa1d74eb7d20e44f0c885
SHA51222fda95c83c452af28a740db9d2ab841f0697f70188a1940447b8f69c2d8c5218dd38d8f1444e96e33fbec52d491d8e4ba72d627029234e5d2f78fa0ba422ed1
-
Filesize
324KB
MD5c1bd2b29242b08c183a79a448e3dd623
SHA1daa361f4d9eb3beba3aed516821d04e30636271f
SHA25677b745807e5ef267d7e73029f18da08fe69e2e679a0aa1d74eb7d20e44f0c885
SHA51222fda95c83c452af28a740db9d2ab841f0697f70188a1940447b8f69c2d8c5218dd38d8f1444e96e33fbec52d491d8e4ba72d627029234e5d2f78fa0ba422ed1
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7