Overview
overview
10Static
static
3072894a720...70.exe
windows10-2004-x64
10075e0048e6...e5.exe
windows10-2004-x64
10131b78a330...7b.exe
windows10-2004-x64
1056b0ed98e3...54.exe
windows10-2004-x64
10807255749f...62.exe
windows7-x64
10807255749f...62.exe
windows10-2004-x64
108a8433aeba...ed.exe
windows10-2004-x64
108cae2c42df...9a.exe
windows7-x64
108cae2c42df...9a.exe
windows10-2004-x64
10d730c48963...34.exe
windows10-2004-x64
10e98954290c...65.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 18:33
Static task
static1
Behavioral task
behavioral1
Sample
072894a7206e62128b078f8cf245defd279d28624f577f7859cb03be552fdb70.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
075e0048e616f67de702a289e630f2df2651249474b3366d424d5bfefc2071e5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
131b78a330f033599e72f43b4c44a4ce16181a4de774a7e0ebc96fe998dea67b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
56b0ed98e3472c3ed4c501f9630c8e00fd98a17a99687541889c257dffc5d254.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
807255749f8cbfc2228481c6cd8cbe37517093850c1a0f3d0ed61f607efcae62.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
807255749f8cbfc2228481c6cd8cbe37517093850c1a0f3d0ed61f607efcae62.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
8a8433aebabfcb2900d5e032245cc3101e94cfdca88d10eea3b26330a0a334ed.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
8cae2c42df2dcc0b08b46e91d7ffbdd38e6e53724f0873f0cc05747f396b759a.exe
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
8cae2c42df2dcc0b08b46e91d7ffbdd38e6e53724f0873f0cc05747f396b759a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
d730c48963f262ecbad13e78511797a739e647356a733f1239b17e16fc51cc34.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
e98954290c7c1115f81a9b91ee8f444cad7f016d85fb2d9b70793e27c9384365.exe
Resource
win10v2004-20240426-en
General
-
Target
d730c48963f262ecbad13e78511797a739e647356a733f1239b17e16fc51cc34.exe
-
Size
805KB
-
MD5
7aeb09bb57206fc4c34cdceccc7ab340
-
SHA1
270c694409562e116dcdd44c5ce63b2a4f8bdccb
-
SHA256
d730c48963f262ecbad13e78511797a739e647356a733f1239b17e16fc51cc34
-
SHA512
bd548655a57783f2c34ba4c11bc595112840266de1d68f939e888b399a3329cce74d604de6bc0f9efd47c292d5804d76307c520aede442378893c4828ee3d619
-
SSDEEP
12288:qMrsy903vnIAAzzFM8VzjAJNRK47lnoj8eI4BOx4aBFrx9OX2EkDWWSMEidlk:SyyPIdzzW8psxLxno49N9CGpitb
Malware Config
Extracted
amadey
3.87
59b440
http://77.91.68.18
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
-
url_paths
/nice/index.php
Extracted
redline
mrak
77.91.124.82:19071
-
auth_value
7d9a335ab5dfd42d374867c96fe25302
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection g3381214.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g3381214.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g3381214.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g3381214.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g3381214.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g3381214.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral10/files/0x0007000000023441-74.dat family_redline behavioral10/memory/3232-75-0x0000000000250000-0x0000000000280000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation h8357651.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation saves.exe -
Executes dropped EXE 9 IoCs
pid Process 3708 x3964572.exe 4452 x0454216.exe 1912 x8870532.exe 3340 g3381214.exe 4624 h8357651.exe 3200 saves.exe 3232 i4283919.exe 3808 saves.exe 1444 saves.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features g3381214.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" g3381214.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x8870532.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d730c48963f262ecbad13e78511797a739e647356a733f1239b17e16fc51cc34.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3964572.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x0454216.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1100 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3340 g3381214.exe 3340 g3381214.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3340 g3381214.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 1192 wrote to memory of 3708 1192 d730c48963f262ecbad13e78511797a739e647356a733f1239b17e16fc51cc34.exe 82 PID 1192 wrote to memory of 3708 1192 d730c48963f262ecbad13e78511797a739e647356a733f1239b17e16fc51cc34.exe 82 PID 1192 wrote to memory of 3708 1192 d730c48963f262ecbad13e78511797a739e647356a733f1239b17e16fc51cc34.exe 82 PID 3708 wrote to memory of 4452 3708 x3964572.exe 83 PID 3708 wrote to memory of 4452 3708 x3964572.exe 83 PID 3708 wrote to memory of 4452 3708 x3964572.exe 83 PID 4452 wrote to memory of 1912 4452 x0454216.exe 84 PID 4452 wrote to memory of 1912 4452 x0454216.exe 84 PID 4452 wrote to memory of 1912 4452 x0454216.exe 84 PID 1912 wrote to memory of 3340 1912 x8870532.exe 85 PID 1912 wrote to memory of 3340 1912 x8870532.exe 85 PID 1912 wrote to memory of 3340 1912 x8870532.exe 85 PID 1912 wrote to memory of 4624 1912 x8870532.exe 93 PID 1912 wrote to memory of 4624 1912 x8870532.exe 93 PID 1912 wrote to memory of 4624 1912 x8870532.exe 93 PID 4624 wrote to memory of 3200 4624 h8357651.exe 94 PID 4624 wrote to memory of 3200 4624 h8357651.exe 94 PID 4624 wrote to memory of 3200 4624 h8357651.exe 94 PID 4452 wrote to memory of 3232 4452 x0454216.exe 95 PID 4452 wrote to memory of 3232 4452 x0454216.exe 95 PID 4452 wrote to memory of 3232 4452 x0454216.exe 95 PID 3200 wrote to memory of 1100 3200 saves.exe 96 PID 3200 wrote to memory of 1100 3200 saves.exe 96 PID 3200 wrote to memory of 1100 3200 saves.exe 96 PID 3200 wrote to memory of 2128 3200 saves.exe 98 PID 3200 wrote to memory of 2128 3200 saves.exe 98 PID 3200 wrote to memory of 2128 3200 saves.exe 98 PID 2128 wrote to memory of 1016 2128 cmd.exe 100 PID 2128 wrote to memory of 1016 2128 cmd.exe 100 PID 2128 wrote to memory of 1016 2128 cmd.exe 100 PID 2128 wrote to memory of 2724 2128 cmd.exe 101 PID 2128 wrote to memory of 2724 2128 cmd.exe 101 PID 2128 wrote to memory of 2724 2128 cmd.exe 101 PID 2128 wrote to memory of 1068 2128 cmd.exe 102 PID 2128 wrote to memory of 1068 2128 cmd.exe 102 PID 2128 wrote to memory of 1068 2128 cmd.exe 102 PID 2128 wrote to memory of 4660 2128 cmd.exe 103 PID 2128 wrote to memory of 4660 2128 cmd.exe 103 PID 2128 wrote to memory of 4660 2128 cmd.exe 103 PID 2128 wrote to memory of 3896 2128 cmd.exe 104 PID 2128 wrote to memory of 3896 2128 cmd.exe 104 PID 2128 wrote to memory of 3896 2128 cmd.exe 104 PID 2128 wrote to memory of 5044 2128 cmd.exe 105 PID 2128 wrote to memory of 5044 2128 cmd.exe 105 PID 2128 wrote to memory of 5044 2128 cmd.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\d730c48963f262ecbad13e78511797a739e647356a733f1239b17e16fc51cc34.exe"C:\Users\Admin\AppData\Local\Temp\d730c48963f262ecbad13e78511797a739e647356a733f1239b17e16fc51cc34.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3964572.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3964572.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0454216.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0454216.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8870532.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8870532.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3381214.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3381214.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3340
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8357651.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8357651.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:1100
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1016
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:2724
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:1068
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4660
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:3896
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:5044
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i4283919.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i4283919.exe4⤵
- Executes dropped EXE
PID:3232
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:3808
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:1444
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
706KB
MD5e84a8b8203b117a8432f224a5a3d72a5
SHA1238ace86693f490ec454f7fea34e62802377a394
SHA256905c5c4baffd72ba0bdbcb769ef0b2368f1fe4cdf9022c4a35f6343689f5a40d
SHA5121029e882f018569f7ed42f00ec9cdb42e19accc8f851d4e2e86bdfec0467588aab9f561ed9dd6a421558cdd1d5276bcb4c93d4a12ea64d1f6e16a8ae097d73c0
-
Filesize
540KB
MD5f22e2da98a23848f53913aad7edf83cc
SHA10ead7e024e4ba1675c0edb00225befa41a8379bf
SHA256568665c32f7431a42377d0204b340a8d918a30c176fe6e3361177d98e81ddc0e
SHA5126071c09793994ea45abaf0634eaa8e3bc204a03659011df98a558c079c9e599f73853429ac5cd8111c3a1f51f52786046c078c3ea2cc0f678d8036c0fdf4f3cf
-
Filesize
173KB
MD5528e14b12a0a82da5cc81c967a1e58eb
SHA10c75e56af31b3c3cc367b4d5d13b2b7bf223757a
SHA2567721810e029c1096d6639c9eefae1a49b0ddd934a826fc381d974f8a11d0e8e5
SHA512a6eb7a3cc9944069fcdfd4cff2365ef1ab24368916324b9f27ab240ee1dfdf8fc0959a827065c2addef0d1e31284ccaf017e37d7cd3e45cb919719f71db794a8
-
Filesize
384KB
MD5a0a563ce32f17e7843afd3123e9e7424
SHA14043f1108704cc96b5cc911fca9d8276c2ccb5ac
SHA2560f0a4e57e235c02b3da8d2083410957e78e02b0ab59dbbc1f4798cd42a5dff78
SHA5121ffc62495b91250596e1c91ecddd896949180d992dcdf3b03150f018f6863d3675743a14abb31bcc0526c2f846c96e547caee2fc1d82ebabcfe83dee5ea8d10a
-
Filesize
185KB
MD50ce3bdb0c611d91ac39e10a7e3006519
SHA121ea6c019d9ce826130f4c30d7c5838f3ba3e1aa
SHA25621ab2770d45578ddf1718dbdb0e9a6f2e40f28f854139197d91214108bfc5b41
SHA51251589fbe1935f9f8a05dcfa80bcd163aaf42cc8a61aa5eab637ce554f90768b31c1df0c5eb7fadce86baf8f940f1c9a751f01960796c87076f0e21948b842a04
-
Filesize
336KB
MD51b82193c8c05ef6b71cd7c0b8d457216
SHA15aa2ccbae2615327243567761c749ee85bc42ee4
SHA256766db7db6f59976098abb88038212cc93e6a53ceac53c3cead753142388d1c40
SHA51208129bea69fb0744f0b161c2a70f621e9f4ad4a93f10f594c5640cb4d72f13e516041502d5f8490cce80fd62df826c650c22050d77677f379a06b8e1b8d06e2c