Analysis
-
max time kernel
137s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
30/08/2023, 18:22
Static task
static1
Behavioral task
behavioral1
Sample
9411987894dc69ab7bac6e037bfcb5c68eebbda32ca47e996e7211f587c97434.exe
Resource
win10v2004-20230703-en
General
-
Target
9411987894dc69ab7bac6e037bfcb5c68eebbda32ca47e996e7211f587c97434.exe
-
Size
1.4MB
-
MD5
243d96118a88566f98db45129c13eb39
-
SHA1
962f414a3c2282a4898d9457654fc830a35b74a0
-
SHA256
9411987894dc69ab7bac6e037bfcb5c68eebbda32ca47e996e7211f587c97434
-
SHA512
a4894f831cd460a487dc6e2616a5ef76f394b10df4da609ac5f07b294542719d161b5f99ed46a5e598d5823cc9ec8aac47b184b711b69e9d2587747ea1511234
-
SSDEEP
24576:7ya9HMpR/u1hD8yGCo7NfKMDGZLDBX58EaeV49fMi4uctf0J4mDk8C:uYsTu1VyCoBfKMDGxl5NaTpMiNI87k
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
Extracted
redline
sruta
77.91.124.82:19071
-
auth_value
c556edcd49703319eca74247de20c236
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Control Panel\International\Geo\Nation l4160747.exe Key value queried \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Control Panel\International\Geo\Nation saves.exe -
Executes dropped EXE 9 IoCs
pid Process 4932 y0217992.exe 2216 y9818924.exe 3752 y2417932.exe 2704 l4160747.exe 3280 saves.exe 4168 m7330995.exe 4772 n6909486.exe 2288 saves.exe 2260 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 1860 rundll32.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y0217992.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y9818924.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y2417932.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9411987894dc69ab7bac6e037bfcb5c68eebbda32ca47e996e7211f587c97434.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4588 schtasks.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1724 wrote to memory of 4932 1724 9411987894dc69ab7bac6e037bfcb5c68eebbda32ca47e996e7211f587c97434.exe 81 PID 1724 wrote to memory of 4932 1724 9411987894dc69ab7bac6e037bfcb5c68eebbda32ca47e996e7211f587c97434.exe 81 PID 1724 wrote to memory of 4932 1724 9411987894dc69ab7bac6e037bfcb5c68eebbda32ca47e996e7211f587c97434.exe 81 PID 4932 wrote to memory of 2216 4932 y0217992.exe 82 PID 4932 wrote to memory of 2216 4932 y0217992.exe 82 PID 4932 wrote to memory of 2216 4932 y0217992.exe 82 PID 2216 wrote to memory of 3752 2216 y9818924.exe 83 PID 2216 wrote to memory of 3752 2216 y9818924.exe 83 PID 2216 wrote to memory of 3752 2216 y9818924.exe 83 PID 3752 wrote to memory of 2704 3752 y2417932.exe 84 PID 3752 wrote to memory of 2704 3752 y2417932.exe 84 PID 3752 wrote to memory of 2704 3752 y2417932.exe 84 PID 2704 wrote to memory of 3280 2704 l4160747.exe 85 PID 2704 wrote to memory of 3280 2704 l4160747.exe 85 PID 2704 wrote to memory of 3280 2704 l4160747.exe 85 PID 3752 wrote to memory of 4168 3752 y2417932.exe 86 PID 3752 wrote to memory of 4168 3752 y2417932.exe 86 PID 3752 wrote to memory of 4168 3752 y2417932.exe 86 PID 3280 wrote to memory of 4588 3280 saves.exe 87 PID 3280 wrote to memory of 4588 3280 saves.exe 87 PID 3280 wrote to memory of 4588 3280 saves.exe 87 PID 3280 wrote to memory of 3364 3280 saves.exe 90 PID 3280 wrote to memory of 3364 3280 saves.exe 90 PID 3280 wrote to memory of 3364 3280 saves.exe 90 PID 3364 wrote to memory of 3528 3364 cmd.exe 92 PID 3364 wrote to memory of 3528 3364 cmd.exe 92 PID 3364 wrote to memory of 3528 3364 cmd.exe 92 PID 3364 wrote to memory of 1832 3364 cmd.exe 93 PID 3364 wrote to memory of 1832 3364 cmd.exe 93 PID 3364 wrote to memory of 1832 3364 cmd.exe 93 PID 3364 wrote to memory of 3092 3364 cmd.exe 94 PID 3364 wrote to memory of 3092 3364 cmd.exe 94 PID 3364 wrote to memory of 3092 3364 cmd.exe 94 PID 2216 wrote to memory of 4772 2216 y9818924.exe 95 PID 2216 wrote to memory of 4772 2216 y9818924.exe 95 PID 2216 wrote to memory of 4772 2216 y9818924.exe 95 PID 3364 wrote to memory of 4228 3364 cmd.exe 96 PID 3364 wrote to memory of 4228 3364 cmd.exe 96 PID 3364 wrote to memory of 4228 3364 cmd.exe 96 PID 3364 wrote to memory of 100 3364 cmd.exe 97 PID 3364 wrote to memory of 100 3364 cmd.exe 97 PID 3364 wrote to memory of 100 3364 cmd.exe 97 PID 3364 wrote to memory of 3308 3364 cmd.exe 98 PID 3364 wrote to memory of 3308 3364 cmd.exe 98 PID 3364 wrote to memory of 3308 3364 cmd.exe 98 PID 3280 wrote to memory of 1860 3280 saves.exe 108 PID 3280 wrote to memory of 1860 3280 saves.exe 108 PID 3280 wrote to memory of 1860 3280 saves.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\9411987894dc69ab7bac6e037bfcb5c68eebbda32ca47e996e7211f587c97434.exe"C:\Users\Admin\AppData\Local\Temp\9411987894dc69ab7bac6e037bfcb5c68eebbda32ca47e996e7211f587c97434.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0217992.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0217992.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9818924.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y9818924.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y2417932.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y2417932.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l4160747.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l4160747.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:4588
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3528
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:1832
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:3092
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4228
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:100
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:3308
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:1860
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m7330995.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m7330995.exe5⤵
- Executes dropped EXE
PID:4168
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n6909486.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n6909486.exe4⤵
- Executes dropped EXE
PID:4772
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2288
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5e64557505ff790dd212fa5d2f81828b3
SHA14e79a0a460b8d6643557ef8b14131718f4faddf2
SHA2568d8c84d6b0f9b90e77bebad9cffc4877c3fb8578a6ff9312f63277f1616b56fc
SHA51243bb8c8369e31503bf2f7835da9469ec1dfcd2242f20a130dea9781141b05d693511a8fe8c5083b81588b215ccca37ce618f017c4c9cc7d527796a26b6814cde
-
Filesize
1.3MB
MD5e64557505ff790dd212fa5d2f81828b3
SHA14e79a0a460b8d6643557ef8b14131718f4faddf2
SHA2568d8c84d6b0f9b90e77bebad9cffc4877c3fb8578a6ff9312f63277f1616b56fc
SHA51243bb8c8369e31503bf2f7835da9469ec1dfcd2242f20a130dea9781141b05d693511a8fe8c5083b81588b215ccca37ce618f017c4c9cc7d527796a26b6814cde
-
Filesize
475KB
MD541be7598bf8484a2a7a1a535f461445c
SHA152032b566ebdd952cc7328a750fc700c4b0d35e4
SHA25619315e28e4ea45523f11588badc26be2874e09289e55936d363cd74138db1acb
SHA512956e67edeac84dc339edb32bfd23d5c403b8c52811c1d354ef93ddcc6c6dc5916e76e054b3669210b4f699ab81b7128b37c6b6004592e8dae8deeb1d87295e89
-
Filesize
475KB
MD541be7598bf8484a2a7a1a535f461445c
SHA152032b566ebdd952cc7328a750fc700c4b0d35e4
SHA25619315e28e4ea45523f11588badc26be2874e09289e55936d363cd74138db1acb
SHA512956e67edeac84dc339edb32bfd23d5c403b8c52811c1d354ef93ddcc6c6dc5916e76e054b3669210b4f699ab81b7128b37c6b6004592e8dae8deeb1d87295e89
-
Filesize
175KB
MD5c4ae408afbca8c684086026d4154f996
SHA1ef6444e694048f053ae9d40aa4bf349a97c1732a
SHA256bf871cf7d7f9073dd12c1e144004a3ebf2522f036f00d37b0ce92e3cee5fba3f
SHA5124284ba50b1e8f1015ddd768a9b50e9ff26d199b9282d70a8649ca08555a91166514c7c8119b8f707ef27d395d2cc8dbcf2910468728c61c8c47b3e1b2e3c848b
-
Filesize
175KB
MD5c4ae408afbca8c684086026d4154f996
SHA1ef6444e694048f053ae9d40aa4bf349a97c1732a
SHA256bf871cf7d7f9073dd12c1e144004a3ebf2522f036f00d37b0ce92e3cee5fba3f
SHA5124284ba50b1e8f1015ddd768a9b50e9ff26d199b9282d70a8649ca08555a91166514c7c8119b8f707ef27d395d2cc8dbcf2910468728c61c8c47b3e1b2e3c848b
-
Filesize
319KB
MD54ede70480ef67378318ed54f24f07d61
SHA1c9b0541dfda5a82c3e66a6298ee371cfc0fe5d08
SHA256ed2182cbf1ec9c69bb86977cc3bea7e15c460c1ccc781cd458a71fce436bbe46
SHA512d1e2f025645774435aa4001dad7c514b3ee16d0e8d882d9f12e4e2b35744351aa9edfc53c5ba0834dcee956440c992ef05e6eff380b5fff3eb6f4b992e68b79f
-
Filesize
319KB
MD54ede70480ef67378318ed54f24f07d61
SHA1c9b0541dfda5a82c3e66a6298ee371cfc0fe5d08
SHA256ed2182cbf1ec9c69bb86977cc3bea7e15c460c1ccc781cd458a71fce436bbe46
SHA512d1e2f025645774435aa4001dad7c514b3ee16d0e8d882d9f12e4e2b35744351aa9edfc53c5ba0834dcee956440c992ef05e6eff380b5fff3eb6f4b992e68b79f
-
Filesize
327KB
MD5b187412cf131e082f15368dc001dd725
SHA1d5ba5aa90a21d68ce27addcb6730052571ff631c
SHA256bb81651b61ec38cd52c4b4c76d30aea5e09a434689ec762e4d61ec37fab2bf4a
SHA5121c65b2337652eeb4aca0cbad65578bc76e374c1b7bb2d78153ab402fcd2bd3568dde15fd3f7b8710e25b4ebd8d60754805a19910acc30effb9faeb90488e129e
-
Filesize
327KB
MD5b187412cf131e082f15368dc001dd725
SHA1d5ba5aa90a21d68ce27addcb6730052571ff631c
SHA256bb81651b61ec38cd52c4b4c76d30aea5e09a434689ec762e4d61ec37fab2bf4a
SHA5121c65b2337652eeb4aca0cbad65578bc76e374c1b7bb2d78153ab402fcd2bd3568dde15fd3f7b8710e25b4ebd8d60754805a19910acc30effb9faeb90488e129e
-
Filesize
141KB
MD5569c8bf9ff0df946f15c3608dbed05ca
SHA1acdf7cab7e1b44a1980af3ef7f807acface26b33
SHA256a55747b2b56934ab0cf1085a6058bfac0f5cdf515f592ea32e6785145a674127
SHA512298fe0a49988154d9771959e7f2eeb1e79f63f5ec4211b45c90a4bad0ccdeedecc99148ec0a9a3c86de34860fa3702167ed205f6950df6ff197d128f9064304e
-
Filesize
141KB
MD5569c8bf9ff0df946f15c3608dbed05ca
SHA1acdf7cab7e1b44a1980af3ef7f807acface26b33
SHA256a55747b2b56934ab0cf1085a6058bfac0f5cdf515f592ea32e6785145a674127
SHA512298fe0a49988154d9771959e7f2eeb1e79f63f5ec4211b45c90a4bad0ccdeedecc99148ec0a9a3c86de34860fa3702167ed205f6950df6ff197d128f9064304e
-
Filesize
327KB
MD5b187412cf131e082f15368dc001dd725
SHA1d5ba5aa90a21d68ce27addcb6730052571ff631c
SHA256bb81651b61ec38cd52c4b4c76d30aea5e09a434689ec762e4d61ec37fab2bf4a
SHA5121c65b2337652eeb4aca0cbad65578bc76e374c1b7bb2d78153ab402fcd2bd3568dde15fd3f7b8710e25b4ebd8d60754805a19910acc30effb9faeb90488e129e
-
Filesize
327KB
MD5b187412cf131e082f15368dc001dd725
SHA1d5ba5aa90a21d68ce27addcb6730052571ff631c
SHA256bb81651b61ec38cd52c4b4c76d30aea5e09a434689ec762e4d61ec37fab2bf4a
SHA5121c65b2337652eeb4aca0cbad65578bc76e374c1b7bb2d78153ab402fcd2bd3568dde15fd3f7b8710e25b4ebd8d60754805a19910acc30effb9faeb90488e129e
-
Filesize
327KB
MD5b187412cf131e082f15368dc001dd725
SHA1d5ba5aa90a21d68ce27addcb6730052571ff631c
SHA256bb81651b61ec38cd52c4b4c76d30aea5e09a434689ec762e4d61ec37fab2bf4a
SHA5121c65b2337652eeb4aca0cbad65578bc76e374c1b7bb2d78153ab402fcd2bd3568dde15fd3f7b8710e25b4ebd8d60754805a19910acc30effb9faeb90488e129e
-
Filesize
327KB
MD5b187412cf131e082f15368dc001dd725
SHA1d5ba5aa90a21d68ce27addcb6730052571ff631c
SHA256bb81651b61ec38cd52c4b4c76d30aea5e09a434689ec762e4d61ec37fab2bf4a
SHA5121c65b2337652eeb4aca0cbad65578bc76e374c1b7bb2d78153ab402fcd2bd3568dde15fd3f7b8710e25b4ebd8d60754805a19910acc30effb9faeb90488e129e
-
Filesize
327KB
MD5b187412cf131e082f15368dc001dd725
SHA1d5ba5aa90a21d68ce27addcb6730052571ff631c
SHA256bb81651b61ec38cd52c4b4c76d30aea5e09a434689ec762e4d61ec37fab2bf4a
SHA5121c65b2337652eeb4aca0cbad65578bc76e374c1b7bb2d78153ab402fcd2bd3568dde15fd3f7b8710e25b4ebd8d60754805a19910acc30effb9faeb90488e129e
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7