Analysis
-
max time kernel
140s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-01-2024 05:37
Static task
static1
Behavioral task
behavioral1
Sample
y5573007.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
y5573007.exe
Resource
win10v2004-20231215-en
General
-
Target
y5573007.exe
-
Size
1.3MB
-
MD5
1dab5b16c54630ab6301e4862f8df0e0
-
SHA1
56cbaa192dcdf768cf27651a6772f6aee68091e6
-
SHA256
1877311823db6ba59449f0d4198c863b355270a0b939c3e2e3187007cfd1a78d
-
SHA512
42f85dc712579577ff04c7bc54cf5c384058610e71bc89e6c282302c11be6d8ef8c004bf47c715f7e2999bd953e554f44abe74f2142fd97dccb9e4f2b458feea
-
SSDEEP
24576:hyrM8ZC5Uq8G7ZaKyEpCAnszT82vCYF2oG1y2xeEVeTsWfLwzCY:UeUq8GFaKyEpPszT842FRxeEo
Malware Config
Extracted
amadey
3.87
http://77.91.68.18
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
-
url_paths
/nice/index.php
Extracted
redline
jang
77.91.124.82:19071
-
auth_value
662102010afcbe9e22b13116b1c1a088
Signatures
-
Detect Mystic stealer payload 2 IoCs
resource yara_rule behavioral1/files/0x0007000000015655-39.dat mystic_family behavioral1/files/0x0007000000015655-42.dat mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral1/files/0x00070000000146a2-45.dat family_redline behavioral1/memory/2748-51-0x0000000000840000-0x0000000000870000-memory.dmp family_redline -
Executes dropped EXE 8 IoCs
pid Process 1504 y0320571.exe 2904 y3397747.exe 2696 l9706125.exe 2844 saves.exe 2820 m4012392.exe 2748 n0933183.exe 1684 saves.exe 2260 saves.exe -
Loads dropped DLL 12 IoCs
pid Process 2420 y5573007.exe 1504 y0320571.exe 1504 y0320571.exe 2904 y3397747.exe 2904 y3397747.exe 2696 l9706125.exe 2696 l9706125.exe 2844 saves.exe 2904 y3397747.exe 2820 m4012392.exe 1504 y0320571.exe 2748 n0933183.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y0320571.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y3397747.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" y5573007.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1792 schtasks.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2420 wrote to memory of 1504 2420 y5573007.exe 28 PID 2420 wrote to memory of 1504 2420 y5573007.exe 28 PID 2420 wrote to memory of 1504 2420 y5573007.exe 28 PID 2420 wrote to memory of 1504 2420 y5573007.exe 28 PID 2420 wrote to memory of 1504 2420 y5573007.exe 28 PID 2420 wrote to memory of 1504 2420 y5573007.exe 28 PID 2420 wrote to memory of 1504 2420 y5573007.exe 28 PID 1504 wrote to memory of 2904 1504 y0320571.exe 29 PID 1504 wrote to memory of 2904 1504 y0320571.exe 29 PID 1504 wrote to memory of 2904 1504 y0320571.exe 29 PID 1504 wrote to memory of 2904 1504 y0320571.exe 29 PID 1504 wrote to memory of 2904 1504 y0320571.exe 29 PID 1504 wrote to memory of 2904 1504 y0320571.exe 29 PID 1504 wrote to memory of 2904 1504 y0320571.exe 29 PID 2904 wrote to memory of 2696 2904 y3397747.exe 30 PID 2904 wrote to memory of 2696 2904 y3397747.exe 30 PID 2904 wrote to memory of 2696 2904 y3397747.exe 30 PID 2904 wrote to memory of 2696 2904 y3397747.exe 30 PID 2904 wrote to memory of 2696 2904 y3397747.exe 30 PID 2904 wrote to memory of 2696 2904 y3397747.exe 30 PID 2904 wrote to memory of 2696 2904 y3397747.exe 30 PID 2696 wrote to memory of 2844 2696 l9706125.exe 40 PID 2696 wrote to memory of 2844 2696 l9706125.exe 40 PID 2696 wrote to memory of 2844 2696 l9706125.exe 40 PID 2696 wrote to memory of 2844 2696 l9706125.exe 40 PID 2696 wrote to memory of 2844 2696 l9706125.exe 40 PID 2696 wrote to memory of 2844 2696 l9706125.exe 40 PID 2696 wrote to memory of 2844 2696 l9706125.exe 40 PID 2904 wrote to memory of 2820 2904 y3397747.exe 31 PID 2904 wrote to memory of 2820 2904 y3397747.exe 31 PID 2904 wrote to memory of 2820 2904 y3397747.exe 31 PID 2904 wrote to memory of 2820 2904 y3397747.exe 31 PID 2904 wrote to memory of 2820 2904 y3397747.exe 31 PID 2904 wrote to memory of 2820 2904 y3397747.exe 31 PID 2904 wrote to memory of 2820 2904 y3397747.exe 31 PID 1504 wrote to memory of 2748 1504 y0320571.exe 32 PID 1504 wrote to memory of 2748 1504 y0320571.exe 32 PID 1504 wrote to memory of 2748 1504 y0320571.exe 32 PID 1504 wrote to memory of 2748 1504 y0320571.exe 32 PID 1504 wrote to memory of 2748 1504 y0320571.exe 32 PID 1504 wrote to memory of 2748 1504 y0320571.exe 32 PID 1504 wrote to memory of 2748 1504 y0320571.exe 32 PID 2844 wrote to memory of 1792 2844 saves.exe 34 PID 2844 wrote to memory of 1792 2844 saves.exe 34 PID 2844 wrote to memory of 1792 2844 saves.exe 34 PID 2844 wrote to memory of 1792 2844 saves.exe 34 PID 2844 wrote to memory of 1792 2844 saves.exe 34 PID 2844 wrote to memory of 1792 2844 saves.exe 34 PID 2844 wrote to memory of 1792 2844 saves.exe 34 PID 2844 wrote to memory of 2872 2844 saves.exe 36 PID 2844 wrote to memory of 2872 2844 saves.exe 36 PID 2844 wrote to memory of 2872 2844 saves.exe 36 PID 2844 wrote to memory of 2872 2844 saves.exe 36 PID 2844 wrote to memory of 2872 2844 saves.exe 36 PID 2844 wrote to memory of 2872 2844 saves.exe 36 PID 2844 wrote to memory of 2872 2844 saves.exe 36 PID 2872 wrote to memory of 1812 2872 cmd.exe 39 PID 2872 wrote to memory of 1812 2872 cmd.exe 39 PID 2872 wrote to memory of 1812 2872 cmd.exe 39 PID 2872 wrote to memory of 1812 2872 cmd.exe 39 PID 2872 wrote to memory of 1812 2872 cmd.exe 39 PID 2872 wrote to memory of 1812 2872 cmd.exe 39 PID 2872 wrote to memory of 1812 2872 cmd.exe 39 PID 2872 wrote to memory of 2648 2872 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\y5573007.exe"C:\Users\Admin\AppData\Local\Temp\y5573007.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0320571.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0320571.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3397747.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3397747.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9706125.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9706125.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2844
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\m4012392.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\m4012392.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2820
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n0933183.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n0933183.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2748
-
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F1⤵
- Creates scheduled task(s)
PID:1792
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit1⤵
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E2⤵PID:2660
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"2⤵PID:2648
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1812
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"2⤵PID:1944
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"2⤵PID:2156
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E2⤵PID:1640
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {D23720CE-2172-4823-9A5C-C0A30FAC29FA} S-1-5-21-3308111660-3636268597-2291490419-1000:JUBFGPHD\Admin:Interactive:[1]1⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe2⤵
- Executes dropped EXE
PID:1684
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe2⤵
- Executes dropped EXE
PID:2260
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
286KB
MD540ac0d8e4bc6fab48a6b27df0a589ba7
SHA17a4dcd716aae3b6971fbb27918d0e827e698e496
SHA2562c6dfa8c6fe66c41ccc25b9f89a1b70e5a888ba65d528e0635e8712a7bd9e6e8
SHA512f571bcfddebe28d2cde2ded230eee9c51fbfd6ebfc1f523af5bf97dd12682c2174846b4c2c1f7001bcacd6dc2bc33c5f453f871ae191cdbda7cc0946fa648a4a
-
Filesize
140KB
MD59ee79745f1bd3aec20c71e60cbe12907
SHA1798d7fdd9bf1c6f6dac8d03091a481251ba55561
SHA2569d02d0be0ac9910c9ff48448f92c0bbe88e3dd18f723d6f2af86195c6e7bd7fe
SHA512af7cb654ad18a76e038ac5cd2a4c3c30a1bee0bef7b32ff15162339fd3b042d40e0f5bcd3b689c1103c393158522b5e108c27b10c65739ae24b04dbf5ffc3a60
-
Filesize
267KB
MD510a2a944dd0a057269833c84a4fc0426
SHA117bdf20dd8dc6a130d09d6ed4cc62eaecf9a1c95
SHA2568571f839273c19c261831ca358f4867bcca1e78a423d5efe74668f70d965e135
SHA512d69ed232bbe711e7c11436a7cc306e8a8b55a35db8c01b20b45d14c1c88297c679f6317902332b6d86fef109336faa0a5ec7612e3785ae06023aad6de9b25243
-
Filesize
120KB
MD5d992f8750539cce742342d03eba6b211
SHA1474d290a41b4572213220287e46955ccb5b1fd98
SHA256736b6ed714478b2c8e1c97a9dd53a9dcc9c15d9b2b1260b15232118851a65a56
SHA51288c3b39ef0b22e4bbf611e7f894eabffaa8fbabb3de69146d07db58c45672d7b5bc6ee329ce891e6466db9087bfc5c959ee33fc7fb84fb26d8be36aff74fc378
-
Filesize
475KB
MD5ba1c85e520d415fddd1417ffcd74b0f6
SHA1a41da3bd4f2f742910ad2a728bc36f2947b0e82d
SHA2567d4931e51585d1e364bfb34f1afb1cd05f1502ea152b9340916576bf0f5d5dc6
SHA5125f00f855b08c85e7c82e7ae4b37a9e7f2692afb09080154a2b20a55d1422c44909084c0e539d854ac256aa7b97facce1df3892ba86c85b0775e990103d913151
-
Filesize
174KB
MD52e47ffa00d8f4df0f9c9486bc478fcba
SHA1ff133754d1851198ba550854fecc5a3463db0065
SHA256534653d922fc4d6f4967befbbf83af8ddfa3982e3bca29b9274f0370945f7fb7
SHA512da6115615b18432e373d09470769ea97bda084df573e751ff430dbada63736595aea8f943467e1bec91209bb37982bc296b7ff5c2dea9a2d207ea3242136eaab
-
Filesize
319KB
MD5adfb99d9e67648cedbf04b6f906bf667
SHA124c961b4c022701e1d426f9974255126b2ce1d09
SHA2566f83c9db7d351f52f43214ecc83c2b188052ab0677a9368c91265b95759f7c38
SHA51295010961110624767b2ff02914e02a433ae8ff5a2935d860caf2ee2f6c20982bb2fb5ec493bda608511504e89ed8e9ff39d2abff03ea83c50927bae4263107e1
-
Filesize
329KB
MD52d4e41efd3db85a992d313e56cb51345
SHA1db3dea73b3e08d98da7697473890c6b74725280e
SHA256b3996d6c396fde63249c938f4207f2172bd56c55eba8984f0ba589ec57924aa9
SHA512ed796e2285516e0955c83119e7490fd4d03fc490ffc5406e5c3c4d427d9a3d4d3dd1e3c523e5ef3851bc0aef79c1aa99b120d2ce21c2244ca33210b20885c7fa
-
Filesize
17KB
MD553c245fe4838e76cc95bb826355ed481
SHA1f97c5145a86f23d2fe8b94fca192bd0538c94522
SHA256ecf538c40ecb016cf544ab3b788e4ce991395ce399eb3d3fc361647a95bc1acb
SHA5123f7fc727bce624515017bca5de9aa4731d2cbd72b4bc8eeaca7a2cc2aeb89231fca9d6e987c4dd69846351a25d569bc9c44047910c2acf982fe68598d5829f2c