Analysis
-
max time kernel
146s -
max time network
158s -
platform
windows10-1703_x64 -
resource
win10-20230831-en -
resource tags
arch:x64arch:x86image:win10-20230831-enlocale:en-usos:windows10-1703-x64system -
submitted
04/09/2023, 15:53
Static task
static1
Behavioral task
behavioral1
Sample
083505c844dd1b826625159a79229a0c68f6697c5d9a23ab0f9b1f1dd9730926.exe
Resource
win10-20230831-en
General
-
Target
083505c844dd1b826625159a79229a0c68f6697c5d9a23ab0f9b1f1dd9730926.exe
-
Size
812KB
-
MD5
e70c4e62524a22ab7375db26c59b0698
-
SHA1
e0b6c2bd020176d0b7ab7443891ebbd652156f42
-
SHA256
083505c844dd1b826625159a79229a0c68f6697c5d9a23ab0f9b1f1dd9730926
-
SHA512
ac2e0ad1c5872d15db606fced68ac50bab3cdcaec9cab37d7d47511fe9e808e48fe1ea468c7cd9047cc5e02e0145c938c99f2c1fa649ef2bd2daa181336eada4
-
SSDEEP
24576:byBJbvKvPy8T65Ki1rWMuk5l7hvS1rLpiwBzWz:OHvcPyqdYfbhvS15ZB
Malware Config
Extracted
amadey
3.87
77.91.68.18/nice/index.php
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
Extracted
redline
gena
77.91.124.82:19071
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g0855706.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g0855706.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g0855706.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g0855706.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g0855706.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 4436 x0065387.exe 2468 x3425174.exe 2840 x2078855.exe 3572 g0855706.exe 1796 h1245944.exe 1932 saves.exe 4284 i8034254.exe 3996 saves.exe -
Loads dropped DLL 1 IoCs
pid Process 800 rundll32.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features g0855706.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" g0855706.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 083505c844dd1b826625159a79229a0c68f6697c5d9a23ab0f9b1f1dd9730926.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x0065387.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x3425174.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x2078855.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3596 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3572 g0855706.exe 3572 g0855706.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3572 g0855706.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2056 wrote to memory of 4436 2056 083505c844dd1b826625159a79229a0c68f6697c5d9a23ab0f9b1f1dd9730926.exe 70 PID 2056 wrote to memory of 4436 2056 083505c844dd1b826625159a79229a0c68f6697c5d9a23ab0f9b1f1dd9730926.exe 70 PID 2056 wrote to memory of 4436 2056 083505c844dd1b826625159a79229a0c68f6697c5d9a23ab0f9b1f1dd9730926.exe 70 PID 4436 wrote to memory of 2468 4436 x0065387.exe 71 PID 4436 wrote to memory of 2468 4436 x0065387.exe 71 PID 4436 wrote to memory of 2468 4436 x0065387.exe 71 PID 2468 wrote to memory of 2840 2468 x3425174.exe 72 PID 2468 wrote to memory of 2840 2468 x3425174.exe 72 PID 2468 wrote to memory of 2840 2468 x3425174.exe 72 PID 2840 wrote to memory of 3572 2840 x2078855.exe 73 PID 2840 wrote to memory of 3572 2840 x2078855.exe 73 PID 2840 wrote to memory of 3572 2840 x2078855.exe 73 PID 2840 wrote to memory of 1796 2840 x2078855.exe 74 PID 2840 wrote to memory of 1796 2840 x2078855.exe 74 PID 2840 wrote to memory of 1796 2840 x2078855.exe 74 PID 1796 wrote to memory of 1932 1796 h1245944.exe 75 PID 1796 wrote to memory of 1932 1796 h1245944.exe 75 PID 1796 wrote to memory of 1932 1796 h1245944.exe 75 PID 2468 wrote to memory of 4284 2468 x3425174.exe 76 PID 2468 wrote to memory of 4284 2468 x3425174.exe 76 PID 2468 wrote to memory of 4284 2468 x3425174.exe 76 PID 1932 wrote to memory of 3596 1932 saves.exe 77 PID 1932 wrote to memory of 3596 1932 saves.exe 77 PID 1932 wrote to memory of 3596 1932 saves.exe 77 PID 1932 wrote to memory of 64 1932 saves.exe 79 PID 1932 wrote to memory of 64 1932 saves.exe 79 PID 1932 wrote to memory of 64 1932 saves.exe 79 PID 64 wrote to memory of 3452 64 cmd.exe 81 PID 64 wrote to memory of 3452 64 cmd.exe 81 PID 64 wrote to memory of 3452 64 cmd.exe 81 PID 64 wrote to memory of 2796 64 cmd.exe 82 PID 64 wrote to memory of 2796 64 cmd.exe 82 PID 64 wrote to memory of 2796 64 cmd.exe 82 PID 64 wrote to memory of 4428 64 cmd.exe 83 PID 64 wrote to memory of 4428 64 cmd.exe 83 PID 64 wrote to memory of 4428 64 cmd.exe 83 PID 64 wrote to memory of 4468 64 cmd.exe 84 PID 64 wrote to memory of 4468 64 cmd.exe 84 PID 64 wrote to memory of 4468 64 cmd.exe 84 PID 64 wrote to memory of 5076 64 cmd.exe 85 PID 64 wrote to memory of 5076 64 cmd.exe 85 PID 64 wrote to memory of 5076 64 cmd.exe 85 PID 64 wrote to memory of 808 64 cmd.exe 86 PID 64 wrote to memory of 808 64 cmd.exe 86 PID 64 wrote to memory of 808 64 cmd.exe 86 PID 1932 wrote to memory of 800 1932 saves.exe 88 PID 1932 wrote to memory of 800 1932 saves.exe 88 PID 1932 wrote to memory of 800 1932 saves.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\083505c844dd1b826625159a79229a0c68f6697c5d9a23ab0f9b1f1dd9730926.exe"C:\Users\Admin\AppData\Local\Temp\083505c844dd1b826625159a79229a0c68f6697c5d9a23ab0f9b1f1dd9730926.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0065387.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0065387.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3425174.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3425174.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2078855.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x2078855.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0855706.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0855706.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3572
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1245944.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h1245944.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:3596
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3452
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:2796
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:4428
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4468
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:5076
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:808
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main7⤵
- Loads dropped DLL
PID:800
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i8034254.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i8034254.exe4⤵
- Executes dropped EXE
PID:4284
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:3996
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
706KB
MD51d1be561d71b0011f19ac785b7bf96ae
SHA19adc5a5b386e8fa5d0f00276de53ce3838935c45
SHA2565e649db8e1646d16172cf31e52c20d012c7978deca870ce22feb41a91d24b635
SHA512d3894b46832764d7baf5194a4194ffa43911055ef69a51575e53db15f500c83fa8adcd17e78f3a40bf9759a24aa4b9df69e554767d05938d543d9eb1d52826e9
-
Filesize
706KB
MD51d1be561d71b0011f19ac785b7bf96ae
SHA19adc5a5b386e8fa5d0f00276de53ce3838935c45
SHA2565e649db8e1646d16172cf31e52c20d012c7978deca870ce22feb41a91d24b635
SHA512d3894b46832764d7baf5194a4194ffa43911055ef69a51575e53db15f500c83fa8adcd17e78f3a40bf9759a24aa4b9df69e554767d05938d543d9eb1d52826e9
-
Filesize
540KB
MD5d51b87bfc57bc3272a29e1e0926e6a77
SHA1e7d6a1032d11b79a2d792e6cf77d6c63aaa1a913
SHA256b63f1dfc3805704d62813379cfe7f6baf376117a870bd4da7ff06d82016278b3
SHA512e8aa84703c799b737377e14e47c62d51e412ea8b0cc8245647cda60cd97daf788b3b257273a1cb521c700f47b1be99b1758f3c90213d22faacdb146e531e2ee6
-
Filesize
540KB
MD5d51b87bfc57bc3272a29e1e0926e6a77
SHA1e7d6a1032d11b79a2d792e6cf77d6c63aaa1a913
SHA256b63f1dfc3805704d62813379cfe7f6baf376117a870bd4da7ff06d82016278b3
SHA512e8aa84703c799b737377e14e47c62d51e412ea8b0cc8245647cda60cd97daf788b3b257273a1cb521c700f47b1be99b1758f3c90213d22faacdb146e531e2ee6
-
Filesize
174KB
MD5e5d1fc390a711cc8ff016a30f633f586
SHA1115dcaa11162bd632f924e4b1f8e8027585c669a
SHA2560c1cfa82b51f0789dfa884abd2525fff59e0cf9c3d3bed08db9b29574d0a9d81
SHA512de934cd117029cbe6e4386e3961cfcc3b4775945c6914c35ddba848bf67e7a28c090a98b77e0756a6c2ae0872b0f1d2d4b48a9955219e35ce47601bceee183ec
-
Filesize
174KB
MD5e5d1fc390a711cc8ff016a30f633f586
SHA1115dcaa11162bd632f924e4b1f8e8027585c669a
SHA2560c1cfa82b51f0789dfa884abd2525fff59e0cf9c3d3bed08db9b29574d0a9d81
SHA512de934cd117029cbe6e4386e3961cfcc3b4775945c6914c35ddba848bf67e7a28c090a98b77e0756a6c2ae0872b0f1d2d4b48a9955219e35ce47601bceee183ec
-
Filesize
384KB
MD539a7070e2b18e64c76d2d862882b60df
SHA1f33376b3e6a10f2328e506262e74e24cbb2b8ef9
SHA2561b64745b16350791cbe40f9cb9d53275d9a7c5dd5195bf5166b30df6985d376c
SHA51269ebc1293824ecdda7d9235abcaa0a981ae77da386a261d04d76699bfe725581cd6243e06b9cb8f27e1910b4af6fc65d1a926879f7c829cb88a54534a7796943
-
Filesize
384KB
MD539a7070e2b18e64c76d2d862882b60df
SHA1f33376b3e6a10f2328e506262e74e24cbb2b8ef9
SHA2561b64745b16350791cbe40f9cb9d53275d9a7c5dd5195bf5166b30df6985d376c
SHA51269ebc1293824ecdda7d9235abcaa0a981ae77da386a261d04d76699bfe725581cd6243e06b9cb8f27e1910b4af6fc65d1a926879f7c829cb88a54534a7796943
-
Filesize
185KB
MD50a21162b27c75b41dbd7c8296997caff
SHA122e564276b89490d9cfd888271e22f97d016b840
SHA256860f5d9f51784b6bd17a098f372206ff2ccbdfb4df778b2a26c650572b6fc630
SHA512535fefa4e0183b9ede7ae129845cdeba2bece57e7f48e6bb655d2a9bbc85b76a378b3a4e7e28afe83e7132ad07dc52a116d1a367760d6061a01ae1ed8b7bba91
-
Filesize
185KB
MD50a21162b27c75b41dbd7c8296997caff
SHA122e564276b89490d9cfd888271e22f97d016b840
SHA256860f5d9f51784b6bd17a098f372206ff2ccbdfb4df778b2a26c650572b6fc630
SHA512535fefa4e0183b9ede7ae129845cdeba2bece57e7f48e6bb655d2a9bbc85b76a378b3a4e7e28afe83e7132ad07dc52a116d1a367760d6061a01ae1ed8b7bba91
-
Filesize
335KB
MD5afaec90dd13f77e1a090f0c3dc4fd2f4
SHA17be5a817f1bcc1b942c4ee466aa24014fc6a9e2a
SHA25601c142c528999424e8b90b29a8eebf5627c7ff608ad36fbc7bc6602636907db8
SHA512e5fd0c14acd2b3e2eafa9fb511e5a8b28508917e64f4e78b4a9f24858bd61cb535d0c669e8374211deb6160ee8d2d447cb3156d8f30bf3af1e87af1e2fe6e4bb
-
Filesize
335KB
MD5afaec90dd13f77e1a090f0c3dc4fd2f4
SHA17be5a817f1bcc1b942c4ee466aa24014fc6a9e2a
SHA25601c142c528999424e8b90b29a8eebf5627c7ff608ad36fbc7bc6602636907db8
SHA512e5fd0c14acd2b3e2eafa9fb511e5a8b28508917e64f4e78b4a9f24858bd61cb535d0c669e8374211deb6160ee8d2d447cb3156d8f30bf3af1e87af1e2fe6e4bb
-
Filesize
335KB
MD5afaec90dd13f77e1a090f0c3dc4fd2f4
SHA17be5a817f1bcc1b942c4ee466aa24014fc6a9e2a
SHA25601c142c528999424e8b90b29a8eebf5627c7ff608ad36fbc7bc6602636907db8
SHA512e5fd0c14acd2b3e2eafa9fb511e5a8b28508917e64f4e78b4a9f24858bd61cb535d0c669e8374211deb6160ee8d2d447cb3156d8f30bf3af1e87af1e2fe6e4bb
-
Filesize
335KB
MD5afaec90dd13f77e1a090f0c3dc4fd2f4
SHA17be5a817f1bcc1b942c4ee466aa24014fc6a9e2a
SHA25601c142c528999424e8b90b29a8eebf5627c7ff608ad36fbc7bc6602636907db8
SHA512e5fd0c14acd2b3e2eafa9fb511e5a8b28508917e64f4e78b4a9f24858bd61cb535d0c669e8374211deb6160ee8d2d447cb3156d8f30bf3af1e87af1e2fe6e4bb
-
Filesize
335KB
MD5afaec90dd13f77e1a090f0c3dc4fd2f4
SHA17be5a817f1bcc1b942c4ee466aa24014fc6a9e2a
SHA25601c142c528999424e8b90b29a8eebf5627c7ff608ad36fbc7bc6602636907db8
SHA512e5fd0c14acd2b3e2eafa9fb511e5a8b28508917e64f4e78b4a9f24858bd61cb535d0c669e8374211deb6160ee8d2d447cb3156d8f30bf3af1e87af1e2fe6e4bb
-
Filesize
335KB
MD5afaec90dd13f77e1a090f0c3dc4fd2f4
SHA17be5a817f1bcc1b942c4ee466aa24014fc6a9e2a
SHA25601c142c528999424e8b90b29a8eebf5627c7ff608ad36fbc7bc6602636907db8
SHA512e5fd0c14acd2b3e2eafa9fb511e5a8b28508917e64f4e78b4a9f24858bd61cb535d0c669e8374211deb6160ee8d2d447cb3156d8f30bf3af1e87af1e2fe6e4bb
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b
-
Filesize
273B
MD5374bfdcfcf19f4edfe949022092848d2
SHA1df5ee40497e98efcfba30012452d433373d287d4
SHA256224a123b69af5a3ab0553e334f6c70846c650597a63f6336c9420bbe8f00571f
SHA512bc66dd6e675942a8b8cd776b0813d4b182091e45bfa7734b3818f58c83d04f81f0599a27625ff345d393959b8dbe478d8f1ed33d49f9bcee052c986c8665b8d7
-
Filesize
89KB
MD55bc0153d2973241b72a38c51a2f72116
SHA1cd9c689663557452631d9f8ff609208b01884a32
SHA25668ec0ef5c26d0204c713ec50f6ad66f8029063c6a9dbd51836f4942bacace554
SHA5122eef4cc2568b18559f2a2a87d1fcde1f3b77f7aba23dc4483be409cb2c4722ebf89bd1316f785cbb9a21e8d017446e0d876442aec77bf8f28b198aead2b9a55b