Analysis
-
max time kernel
134s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2024 05:37
Static task
static1
Behavioral task
behavioral1
Sample
y5573007.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
y5573007.exe
Resource
win10v2004-20231215-en
General
-
Target
y5573007.exe
-
Size
1.3MB
-
MD5
1dab5b16c54630ab6301e4862f8df0e0
-
SHA1
56cbaa192dcdf768cf27651a6772f6aee68091e6
-
SHA256
1877311823db6ba59449f0d4198c863b355270a0b939c3e2e3187007cfd1a78d
-
SHA512
42f85dc712579577ff04c7bc54cf5c384058610e71bc89e6c282302c11be6d8ef8c004bf47c715f7e2999bd953e554f44abe74f2142fd97dccb9e4f2b458feea
-
SSDEEP
24576:hyrM8ZC5Uq8G7ZaKyEpCAnszT82vCYF2oG1y2xeEVeTsWfLwzCY:UeUq8GFaKyEpPszT842FRxeEo
Malware Config
Extracted
amadey
3.87
http://77.91.68.18
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
-
url_paths
/nice/index.php
Extracted
redline
jang
77.91.124.82:19071
-
auth_value
662102010afcbe9e22b13116b1c1a088
Signatures
-
Detect Mystic stealer payload 1 IoCs
resource yara_rule behavioral2/files/0x000600000002321a-31.dat mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral2/files/0x0006000000023217-34.dat family_redline behavioral2/memory/3092-36-0x00000000003F0000-0x0000000000420000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation l9706125.exe Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation saves.exe -
Executes dropped EXE 8 IoCs
pid Process 1856 y0320571.exe 3644 y3397747.exe 1964 l9706125.exe 2072 saves.exe 3508 m4012392.exe 3092 n0933183.exe 4284 saves.exe 4580 saves.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y0320571.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y3397747.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" y5573007.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 8 schtasks.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4904 wrote to memory of 1856 4904 y5573007.exe 86 PID 4904 wrote to memory of 1856 4904 y5573007.exe 86 PID 4904 wrote to memory of 1856 4904 y5573007.exe 86 PID 1856 wrote to memory of 3644 1856 y0320571.exe 87 PID 1856 wrote to memory of 3644 1856 y0320571.exe 87 PID 1856 wrote to memory of 3644 1856 y0320571.exe 87 PID 3644 wrote to memory of 1964 3644 y3397747.exe 89 PID 3644 wrote to memory of 1964 3644 y3397747.exe 89 PID 3644 wrote to memory of 1964 3644 y3397747.exe 89 PID 1964 wrote to memory of 2072 1964 l9706125.exe 90 PID 1964 wrote to memory of 2072 1964 l9706125.exe 90 PID 1964 wrote to memory of 2072 1964 l9706125.exe 90 PID 3644 wrote to memory of 3508 3644 y3397747.exe 91 PID 3644 wrote to memory of 3508 3644 y3397747.exe 91 PID 3644 wrote to memory of 3508 3644 y3397747.exe 91 PID 1856 wrote to memory of 3092 1856 y0320571.exe 92 PID 1856 wrote to memory of 3092 1856 y0320571.exe 92 PID 1856 wrote to memory of 3092 1856 y0320571.exe 92 PID 2072 wrote to memory of 8 2072 saves.exe 93 PID 2072 wrote to memory of 8 2072 saves.exe 93 PID 2072 wrote to memory of 8 2072 saves.exe 93 PID 2072 wrote to memory of 2528 2072 saves.exe 95 PID 2072 wrote to memory of 2528 2072 saves.exe 95 PID 2072 wrote to memory of 2528 2072 saves.exe 95 PID 2528 wrote to memory of 3648 2528 cmd.exe 99 PID 2528 wrote to memory of 3648 2528 cmd.exe 99 PID 2528 wrote to memory of 3648 2528 cmd.exe 99 PID 2528 wrote to memory of 920 2528 cmd.exe 97 PID 2528 wrote to memory of 920 2528 cmd.exe 97 PID 2528 wrote to memory of 920 2528 cmd.exe 97 PID 2528 wrote to memory of 4888 2528 cmd.exe 100 PID 2528 wrote to memory of 4888 2528 cmd.exe 100 PID 2528 wrote to memory of 4888 2528 cmd.exe 100 PID 2528 wrote to memory of 3496 2528 cmd.exe 101 PID 2528 wrote to memory of 3496 2528 cmd.exe 101 PID 2528 wrote to memory of 3496 2528 cmd.exe 101 PID 2528 wrote to memory of 5080 2528 cmd.exe 102 PID 2528 wrote to memory of 5080 2528 cmd.exe 102 PID 2528 wrote to memory of 5080 2528 cmd.exe 102 PID 2528 wrote to memory of 1564 2528 cmd.exe 103 PID 2528 wrote to memory of 1564 2528 cmd.exe 103 PID 2528 wrote to memory of 1564 2528 cmd.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\y5573007.exe"C:\Users\Admin\AppData\Local\Temp\y5573007.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0320571.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0320571.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3397747.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y3397747.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9706125.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9706125.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F6⤵
- Creates scheduled task(s)
PID:8
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"7⤵PID:920
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3648
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E7⤵PID:4888
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3496
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"7⤵PID:5080
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E7⤵PID:1564
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\m4012392.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\m4012392.exe4⤵
- Executes dropped EXE
PID:3508
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n0933183.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n0933183.exe3⤵
- Executes dropped EXE
PID:3092
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4284
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
475KB
MD5ba1c85e520d415fddd1417ffcd74b0f6
SHA1a41da3bd4f2f742910ad2a728bc36f2947b0e82d
SHA2567d4931e51585d1e364bfb34f1afb1cd05f1502ea152b9340916576bf0f5d5dc6
SHA5125f00f855b08c85e7c82e7ae4b37a9e7f2692afb09080154a2b20a55d1422c44909084c0e539d854ac256aa7b97facce1df3892ba86c85b0775e990103d913151
-
Filesize
174KB
MD52e47ffa00d8f4df0f9c9486bc478fcba
SHA1ff133754d1851198ba550854fecc5a3463db0065
SHA256534653d922fc4d6f4967befbbf83af8ddfa3982e3bca29b9274f0370945f7fb7
SHA512da6115615b18432e373d09470769ea97bda084df573e751ff430dbada63736595aea8f943467e1bec91209bb37982bc296b7ff5c2dea9a2d207ea3242136eaab
-
Filesize
319KB
MD5adfb99d9e67648cedbf04b6f906bf667
SHA124c961b4c022701e1d426f9974255126b2ce1d09
SHA2566f83c9db7d351f52f43214ecc83c2b188052ab0677a9368c91265b95759f7c38
SHA51295010961110624767b2ff02914e02a433ae8ff5a2935d860caf2ee2f6c20982bb2fb5ec493bda608511504e89ed8e9ff39d2abff03ea83c50927bae4263107e1
-
Filesize
329KB
MD52d4e41efd3db85a992d313e56cb51345
SHA1db3dea73b3e08d98da7697473890c6b74725280e
SHA256b3996d6c396fde63249c938f4207f2172bd56c55eba8984f0ba589ec57924aa9
SHA512ed796e2285516e0955c83119e7490fd4d03fc490ffc5406e5c3c4d427d9a3d4d3dd1e3c523e5ef3851bc0aef79c1aa99b120d2ce21c2244ca33210b20885c7fa
-
Filesize
140KB
MD59ee79745f1bd3aec20c71e60cbe12907
SHA1798d7fdd9bf1c6f6dac8d03091a481251ba55561
SHA2569d02d0be0ac9910c9ff48448f92c0bbe88e3dd18f723d6f2af86195c6e7bd7fe
SHA512af7cb654ad18a76e038ac5cd2a4c3c30a1bee0bef7b32ff15162339fd3b042d40e0f5bcd3b689c1103c393158522b5e108c27b10c65739ae24b04dbf5ffc3a60