Overview
overview
10Static
static
3072894a720...70.exe
windows10-2004-x64
10075e0048e6...e5.exe
windows10-2004-x64
10131b78a330...7b.exe
windows10-2004-x64
1056b0ed98e3...54.exe
windows10-2004-x64
10807255749f...62.exe
windows7-x64
10807255749f...62.exe
windows10-2004-x64
108a8433aeba...ed.exe
windows10-2004-x64
108cae2c42df...9a.exe
windows7-x64
108cae2c42df...9a.exe
windows10-2004-x64
10d730c48963...34.exe
windows10-2004-x64
10e98954290c...65.exe
windows10-2004-x64
10Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 18:18
Static task
static1
Behavioral task
behavioral1
Sample
072894a7206e62128b078f8cf245defd279d28624f577f7859cb03be552fdb70.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
075e0048e616f67de702a289e630f2df2651249474b3366d424d5bfefc2071e5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
131b78a330f033599e72f43b4c44a4ce16181a4de774a7e0ebc96fe998dea67b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
56b0ed98e3472c3ed4c501f9630c8e00fd98a17a99687541889c257dffc5d254.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
807255749f8cbfc2228481c6cd8cbe37517093850c1a0f3d0ed61f607efcae62.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
807255749f8cbfc2228481c6cd8cbe37517093850c1a0f3d0ed61f607efcae62.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
8a8433aebabfcb2900d5e032245cc3101e94cfdca88d10eea3b26330a0a334ed.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
8cae2c42df2dcc0b08b46e91d7ffbdd38e6e53724f0873f0cc05747f396b759a.exe
Resource
win7-20240215-en
Behavioral task
behavioral9
Sample
8cae2c42df2dcc0b08b46e91d7ffbdd38e6e53724f0873f0cc05747f396b759a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
d730c48963f262ecbad13e78511797a739e647356a733f1239b17e16fc51cc34.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
e98954290c7c1115f81a9b91ee8f444cad7f016d85fb2d9b70793e27c9384365.exe
Resource
win10v2004-20240508-en
General
-
Target
d730c48963f262ecbad13e78511797a739e647356a733f1239b17e16fc51cc34.exe
-
Size
805KB
-
MD5
7aeb09bb57206fc4c34cdceccc7ab340
-
SHA1
270c694409562e116dcdd44c5ce63b2a4f8bdccb
-
SHA256
d730c48963f262ecbad13e78511797a739e647356a733f1239b17e16fc51cc34
-
SHA512
bd548655a57783f2c34ba4c11bc595112840266de1d68f939e888b399a3329cce74d604de6bc0f9efd47c292d5804d76307c520aede442378893c4828ee3d619
-
SSDEEP
12288:qMrsy903vnIAAzzFM8VzjAJNRK47lnoj8eI4BOx4aBFrx9OX2EkDWWSMEidlk:SyyPIdzzW8psxLxno49N9CGpitb
Malware Config
Extracted
amadey
3.87
59b440
http://77.91.68.18
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
-
url_paths
/nice/index.php
Extracted
redline
mrak
77.91.124.82:19071
-
auth_value
7d9a335ab5dfd42d374867c96fe25302
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection g3381214.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g3381214.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g3381214.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g3381214.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g3381214.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g3381214.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral10/files/0x000700000002342a-74.dat family_redline behavioral10/memory/2356-75-0x0000000000CC0000-0x0000000000CF0000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation h8357651.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation saves.exe -
Executes dropped EXE 9 IoCs
pid Process 964 x3964572.exe 212 x0454216.exe 224 x8870532.exe 1832 g3381214.exe 2472 h8357651.exe 2656 saves.exe 2356 i4283919.exe 4816 saves.exe 3392 saves.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features g3381214.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" g3381214.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d730c48963f262ecbad13e78511797a739e647356a733f1239b17e16fc51cc34.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3964572.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x0454216.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x8870532.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2088 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1832 g3381214.exe 1832 g3381214.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1832 g3381214.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 4232 wrote to memory of 964 4232 d730c48963f262ecbad13e78511797a739e647356a733f1239b17e16fc51cc34.exe 84 PID 4232 wrote to memory of 964 4232 d730c48963f262ecbad13e78511797a739e647356a733f1239b17e16fc51cc34.exe 84 PID 4232 wrote to memory of 964 4232 d730c48963f262ecbad13e78511797a739e647356a733f1239b17e16fc51cc34.exe 84 PID 964 wrote to memory of 212 964 x3964572.exe 85 PID 964 wrote to memory of 212 964 x3964572.exe 85 PID 964 wrote to memory of 212 964 x3964572.exe 85 PID 212 wrote to memory of 224 212 x0454216.exe 86 PID 212 wrote to memory of 224 212 x0454216.exe 86 PID 212 wrote to memory of 224 212 x0454216.exe 86 PID 224 wrote to memory of 1832 224 x8870532.exe 87 PID 224 wrote to memory of 1832 224 x8870532.exe 87 PID 224 wrote to memory of 1832 224 x8870532.exe 87 PID 224 wrote to memory of 2472 224 x8870532.exe 99 PID 224 wrote to memory of 2472 224 x8870532.exe 99 PID 224 wrote to memory of 2472 224 x8870532.exe 99 PID 2472 wrote to memory of 2656 2472 h8357651.exe 100 PID 2472 wrote to memory of 2656 2472 h8357651.exe 100 PID 2472 wrote to memory of 2656 2472 h8357651.exe 100 PID 212 wrote to memory of 2356 212 x0454216.exe 101 PID 212 wrote to memory of 2356 212 x0454216.exe 101 PID 212 wrote to memory of 2356 212 x0454216.exe 101 PID 2656 wrote to memory of 2088 2656 saves.exe 102 PID 2656 wrote to memory of 2088 2656 saves.exe 102 PID 2656 wrote to memory of 2088 2656 saves.exe 102 PID 2656 wrote to memory of 2888 2656 saves.exe 104 PID 2656 wrote to memory of 2888 2656 saves.exe 104 PID 2656 wrote to memory of 2888 2656 saves.exe 104 PID 2888 wrote to memory of 3732 2888 cmd.exe 106 PID 2888 wrote to memory of 3732 2888 cmd.exe 106 PID 2888 wrote to memory of 3732 2888 cmd.exe 106 PID 2888 wrote to memory of 2604 2888 cmd.exe 107 PID 2888 wrote to memory of 2604 2888 cmd.exe 107 PID 2888 wrote to memory of 2604 2888 cmd.exe 107 PID 2888 wrote to memory of 2364 2888 cmd.exe 108 PID 2888 wrote to memory of 2364 2888 cmd.exe 108 PID 2888 wrote to memory of 2364 2888 cmd.exe 108 PID 2888 wrote to memory of 2336 2888 cmd.exe 109 PID 2888 wrote to memory of 2336 2888 cmd.exe 109 PID 2888 wrote to memory of 2336 2888 cmd.exe 109 PID 2888 wrote to memory of 1140 2888 cmd.exe 110 PID 2888 wrote to memory of 1140 2888 cmd.exe 110 PID 2888 wrote to memory of 1140 2888 cmd.exe 110 PID 2888 wrote to memory of 400 2888 cmd.exe 111 PID 2888 wrote to memory of 400 2888 cmd.exe 111 PID 2888 wrote to memory of 400 2888 cmd.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\d730c48963f262ecbad13e78511797a739e647356a733f1239b17e16fc51cc34.exe"C:\Users\Admin\AppData\Local\Temp\d730c48963f262ecbad13e78511797a739e647356a733f1239b17e16fc51cc34.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3964572.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3964572.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0454216.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0454216.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8870532.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8870532.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3381214.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3381214.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1832
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8357651.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h8357651.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:2088
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3732
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:2604
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:2364
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2336
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:1140
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:400
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i4283919.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i4283919.exe4⤵
- Executes dropped EXE
PID:2356
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4816
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:3392
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
706KB
MD5e84a8b8203b117a8432f224a5a3d72a5
SHA1238ace86693f490ec454f7fea34e62802377a394
SHA256905c5c4baffd72ba0bdbcb769ef0b2368f1fe4cdf9022c4a35f6343689f5a40d
SHA5121029e882f018569f7ed42f00ec9cdb42e19accc8f851d4e2e86bdfec0467588aab9f561ed9dd6a421558cdd1d5276bcb4c93d4a12ea64d1f6e16a8ae097d73c0
-
Filesize
540KB
MD5f22e2da98a23848f53913aad7edf83cc
SHA10ead7e024e4ba1675c0edb00225befa41a8379bf
SHA256568665c32f7431a42377d0204b340a8d918a30c176fe6e3361177d98e81ddc0e
SHA5126071c09793994ea45abaf0634eaa8e3bc204a03659011df98a558c079c9e599f73853429ac5cd8111c3a1f51f52786046c078c3ea2cc0f678d8036c0fdf4f3cf
-
Filesize
173KB
MD5528e14b12a0a82da5cc81c967a1e58eb
SHA10c75e56af31b3c3cc367b4d5d13b2b7bf223757a
SHA2567721810e029c1096d6639c9eefae1a49b0ddd934a826fc381d974f8a11d0e8e5
SHA512a6eb7a3cc9944069fcdfd4cff2365ef1ab24368916324b9f27ab240ee1dfdf8fc0959a827065c2addef0d1e31284ccaf017e37d7cd3e45cb919719f71db794a8
-
Filesize
384KB
MD5a0a563ce32f17e7843afd3123e9e7424
SHA14043f1108704cc96b5cc911fca9d8276c2ccb5ac
SHA2560f0a4e57e235c02b3da8d2083410957e78e02b0ab59dbbc1f4798cd42a5dff78
SHA5121ffc62495b91250596e1c91ecddd896949180d992dcdf3b03150f018f6863d3675743a14abb31bcc0526c2f846c96e547caee2fc1d82ebabcfe83dee5ea8d10a
-
Filesize
185KB
MD50ce3bdb0c611d91ac39e10a7e3006519
SHA121ea6c019d9ce826130f4c30d7c5838f3ba3e1aa
SHA25621ab2770d45578ddf1718dbdb0e9a6f2e40f28f854139197d91214108bfc5b41
SHA51251589fbe1935f9f8a05dcfa80bcd163aaf42cc8a61aa5eab637ce554f90768b31c1df0c5eb7fadce86baf8f940f1c9a751f01960796c87076f0e21948b842a04
-
Filesize
336KB
MD51b82193c8c05ef6b71cd7c0b8d457216
SHA15aa2ccbae2615327243567761c749ee85bc42ee4
SHA256766db7db6f59976098abb88038212cc93e6a53ceac53c3cead753142388d1c40
SHA51208129bea69fb0744f0b161c2a70f621e9f4ad4a93f10f594c5640cb4d72f13e516041502d5f8490cce80fd62df826c650c22050d77677f379a06b8e1b8d06e2c