Analysis
-
max time kernel
13s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
14/11/2023, 07:42
Static task
static1
Behavioral task
behavioral1
Sample
14036ad3ff4a39661fe959372026978a0f8a187e1c60d5894b204ea5a71b3af7.exe
Resource
win10v2004-20231020-en
General
-
Target
14036ad3ff4a39661fe959372026978a0f8a187e1c60d5894b204ea5a71b3af7.exe
-
Size
706KB
-
MD5
2cdd911dbcaf5da3660dc87782356340
-
SHA1
ae6e61a78334287d7b28b585776702f789c4052e
-
SHA256
14036ad3ff4a39661fe959372026978a0f8a187e1c60d5894b204ea5a71b3af7
-
SHA512
5e7bda3a6246e0267a43bbdc36f597b95d79d23f8273811d00a07c2ddb373d6631bfa25a96ef796fb32c7eed55a79cff1a4522c69107b02e04233b2b6973fd2a
-
SSDEEP
12288:TMr5y90xy53WsfYUIKkOtMqnou0RrmMu8RELL0XVr3AbWstxlC3VVyIkd5E4:yyX5msdI4WqnozrmMucy0lrAb3lC3VVi
Malware Config
Extracted
amadey
3.87
http://77.91.68.18/nice/index.php
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
Extracted
redline
gena
77.91.124.82:19071
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Signatures
-
Detect Mystic stealer payload 2 IoCs
resource yara_rule behavioral1/files/0x0006000000022e03-72.dat mystic_family behavioral1/files/0x0006000000022e03-71.dat mystic_family -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection q3496115.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" q3496115.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" q3496115.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" q3496115.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" q3496115.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" q3496115.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1120 z6879622.exe 4176 z1005189.exe 1740 q3496115.exe 4364 r1332548.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features q3496115.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" q3496115.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z1005189.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 14036ad3ff4a39661fe959372026978a0f8a187e1c60d5894b204ea5a71b3af7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z6879622.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 532 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1740 q3496115.exe 1740 q3496115.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1740 q3496115.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5004 wrote to memory of 1120 5004 14036ad3ff4a39661fe959372026978a0f8a187e1c60d5894b204ea5a71b3af7.exe 33 PID 5004 wrote to memory of 1120 5004 14036ad3ff4a39661fe959372026978a0f8a187e1c60d5894b204ea5a71b3af7.exe 33 PID 5004 wrote to memory of 1120 5004 14036ad3ff4a39661fe959372026978a0f8a187e1c60d5894b204ea5a71b3af7.exe 33 PID 1120 wrote to memory of 4176 1120 z6879622.exe 36 PID 1120 wrote to memory of 4176 1120 z6879622.exe 36 PID 1120 wrote to memory of 4176 1120 z6879622.exe 36 PID 4176 wrote to memory of 1740 4176 z1005189.exe 37 PID 4176 wrote to memory of 1740 4176 z1005189.exe 37 PID 4176 wrote to memory of 1740 4176 z1005189.exe 37 PID 4176 wrote to memory of 4364 4176 z1005189.exe 100 PID 4176 wrote to memory of 4364 4176 z1005189.exe 100 PID 4176 wrote to memory of 4364 4176 z1005189.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\14036ad3ff4a39661fe959372026978a0f8a187e1c60d5894b204ea5a71b3af7.exe"C:\Users\Admin\AppData\Local\Temp\14036ad3ff4a39661fe959372026978a0f8a187e1c60d5894b204ea5a71b3af7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6879622.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6879622.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1005189.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1005189.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\q3496115.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\q3496115.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r1332548.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\r1332548.exe4⤵
- Executes dropped EXE
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"5⤵PID:1656
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s3751359.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s3751359.exe3⤵PID:2252
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t1406730.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t1406730.exe2⤵PID:1612
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit1⤵PID:1700
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2688
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"2⤵PID:4504
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"2⤵PID:4260
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E2⤵PID:4300
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:2536
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E2⤵PID:1516
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F1⤵
- Creates scheduled task(s)
PID:532
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵PID:4696
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
174KB
MD55e1bd94281ec6ee28e7ae55f08edb8fa
SHA160f6b7804df8ef9474c72cb64f937ecc708fc2d8
SHA2567ec7ab3ea18594dbe37f844021e2534352a827728528a810f805c929fce28965
SHA5129db3f4c96efdd40aeb9f753b0b672768d50ee2dd29da70f7add44b1aef4f1ecfd0eaccb815eec8b38d2d53e588b4361a9ee83baffc3c47f3524ca2d6881e40f5
-
Filesize
174KB
MD55e1bd94281ec6ee28e7ae55f08edb8fa
SHA160f6b7804df8ef9474c72cb64f937ecc708fc2d8
SHA2567ec7ab3ea18594dbe37f844021e2534352a827728528a810f805c929fce28965
SHA5129db3f4c96efdd40aeb9f753b0b672768d50ee2dd29da70f7add44b1aef4f1ecfd0eaccb815eec8b38d2d53e588b4361a9ee83baffc3c47f3524ca2d6881e40f5
-
Filesize
550KB
MD57ea441a830054683f511e820e7c565b8
SHA1b8b570a4c9c7966fb7f9bac284511d71e2f66b58
SHA2568061dcf2211a05ccc9f46629df5b9824bfe7454d2051b3a833c3103c9288f0ff
SHA51238d33c603a05dde35ab32858ec6ed56b416698c889d91da65c547e5bf8f60a021a069ceba4677354436c2485f66bd475e8f65c28e94277cf07e2b91c2d513f89
-
Filesize
550KB
MD57ea441a830054683f511e820e7c565b8
SHA1b8b570a4c9c7966fb7f9bac284511d71e2f66b58
SHA2568061dcf2211a05ccc9f46629df5b9824bfe7454d2051b3a833c3103c9288f0ff
SHA51238d33c603a05dde35ab32858ec6ed56b416698c889d91da65c547e5bf8f60a021a069ceba4677354436c2485f66bd475e8f65c28e94277cf07e2b91c2d513f89
-
Filesize
141KB
MD5d992c7858ab71d88a84f38c0b696f5ac
SHA1739c1b028f123dfd318666c193e5d7c7f6089474
SHA256cea420d575cb741812097cef74644505d558704fe2f8f9f97cb22362c8c8deb6
SHA512ed32bdb91699ab5336ffca4b30373984522c395ab852ee2dff2259dc9e9820f1182b9ab93c590e84e9d4749b599a43477bcc545ad57f194bbf99344949aa78bd
-
Filesize
141KB
MD5d992c7858ab71d88a84f38c0b696f5ac
SHA1739c1b028f123dfd318666c193e5d7c7f6089474
SHA256cea420d575cb741812097cef74644505d558704fe2f8f9f97cb22362c8c8deb6
SHA512ed32bdb91699ab5336ffca4b30373984522c395ab852ee2dff2259dc9e9820f1182b9ab93c590e84e9d4749b599a43477bcc545ad57f194bbf99344949aa78bd
-
Filesize
384KB
MD5e5f62f5c02f8e9301d89f57b0db74f3a
SHA1ce7969ce04cafaba28d3f235f7cc777073666865
SHA25602106984a465ca9b56e6f0b131375279d67e8f6ac0fa5a197be9e68afadd9504
SHA512b8a8ea5b98591fcc50a3ce7e2991bb7d6ef8a75b933cec7cd2c09ff896db2eecae72eaaa319643437d955efb1ad7e3ae8b14eff3f9d9cfeb541d646257d4401d
-
Filesize
384KB
MD5e5f62f5c02f8e9301d89f57b0db74f3a
SHA1ce7969ce04cafaba28d3f235f7cc777073666865
SHA25602106984a465ca9b56e6f0b131375279d67e8f6ac0fa5a197be9e68afadd9504
SHA512b8a8ea5b98591fcc50a3ce7e2991bb7d6ef8a75b933cec7cd2c09ff896db2eecae72eaaa319643437d955efb1ad7e3ae8b14eff3f9d9cfeb541d646257d4401d
-
Filesize
185KB
MD5ab2e09a601f713d2fc428f0d8c816b92
SHA18fdeab1ead3ba16c265720a201324531665b56ed
SHA256676f1c4504bfc713e3caba5c58d7e7f2a20a8f0f24fd43f329f149bf9535fcc7
SHA512994249fd787d445b0886ec47030e8010c6f88a321d98dc76a209fe0d91c1befe1188b98216d68c6a469393fc45f67535308bc567831207ff25f799be63b5a5dc
-
Filesize
185KB
MD5ab2e09a601f713d2fc428f0d8c816b92
SHA18fdeab1ead3ba16c265720a201324531665b56ed
SHA256676f1c4504bfc713e3caba5c58d7e7f2a20a8f0f24fd43f329f149bf9535fcc7
SHA512994249fd787d445b0886ec47030e8010c6f88a321d98dc76a209fe0d91c1befe1188b98216d68c6a469393fc45f67535308bc567831207ff25f799be63b5a5dc
-
Filesize
335KB
MD54bb1289b914222fa55d34778731f3ae8
SHA127fcfedaedfa4a74213a47e7bd36690fb5b84bed
SHA2561e998aa7145a4b7dd3d1533a1fd6842181e3d98eb6aef5de0a5e060c7e72695d
SHA5129fd8ec72d3799445b66aec485e1e89276396954083bb98325550765d2b9a83b3e30e2406d0745163c68be3944104a590a16103ab727ee36ded58bac53c1e0e2e
-
Filesize
335KB
MD54bb1289b914222fa55d34778731f3ae8
SHA127fcfedaedfa4a74213a47e7bd36690fb5b84bed
SHA2561e998aa7145a4b7dd3d1533a1fd6842181e3d98eb6aef5de0a5e060c7e72695d
SHA5129fd8ec72d3799445b66aec485e1e89276396954083bb98325550765d2b9a83b3e30e2406d0745163c68be3944104a590a16103ab727ee36ded58bac53c1e0e2e
-
Filesize
335KB
MD54bb1289b914222fa55d34778731f3ae8
SHA127fcfedaedfa4a74213a47e7bd36690fb5b84bed
SHA2561e998aa7145a4b7dd3d1533a1fd6842181e3d98eb6aef5de0a5e060c7e72695d
SHA5129fd8ec72d3799445b66aec485e1e89276396954083bb98325550765d2b9a83b3e30e2406d0745163c68be3944104a590a16103ab727ee36ded58bac53c1e0e2e
-
Filesize
335KB
MD54bb1289b914222fa55d34778731f3ae8
SHA127fcfedaedfa4a74213a47e7bd36690fb5b84bed
SHA2561e998aa7145a4b7dd3d1533a1fd6842181e3d98eb6aef5de0a5e060c7e72695d
SHA5129fd8ec72d3799445b66aec485e1e89276396954083bb98325550765d2b9a83b3e30e2406d0745163c68be3944104a590a16103ab727ee36ded58bac53c1e0e2e
-
Filesize
335KB
MD54bb1289b914222fa55d34778731f3ae8
SHA127fcfedaedfa4a74213a47e7bd36690fb5b84bed
SHA2561e998aa7145a4b7dd3d1533a1fd6842181e3d98eb6aef5de0a5e060c7e72695d
SHA5129fd8ec72d3799445b66aec485e1e89276396954083bb98325550765d2b9a83b3e30e2406d0745163c68be3944104a590a16103ab727ee36ded58bac53c1e0e2e
-
Filesize
335KB
MD54bb1289b914222fa55d34778731f3ae8
SHA127fcfedaedfa4a74213a47e7bd36690fb5b84bed
SHA2561e998aa7145a4b7dd3d1533a1fd6842181e3d98eb6aef5de0a5e060c7e72695d
SHA5129fd8ec72d3799445b66aec485e1e89276396954083bb98325550765d2b9a83b3e30e2406d0745163c68be3944104a590a16103ab727ee36ded58bac53c1e0e2e
-
Filesize
335KB
MD54bb1289b914222fa55d34778731f3ae8
SHA127fcfedaedfa4a74213a47e7bd36690fb5b84bed
SHA2561e998aa7145a4b7dd3d1533a1fd6842181e3d98eb6aef5de0a5e060c7e72695d
SHA5129fd8ec72d3799445b66aec485e1e89276396954083bb98325550765d2b9a83b3e30e2406d0745163c68be3944104a590a16103ab727ee36ded58bac53c1e0e2e