Overview
overview
10Static
static
3006388190d...bb.exe
windows10-2004-x64
100254882920...b5.exe
windows10-2004-x64
10059acceaf9...4e.exe
windows10-2004-x64
1023e52eabfc...16.exe
windows10-2004-x64
10346c48a087...17.exe
windows10-2004-x64
103a559db9fb...76.exe
windows10-2004-x64
103bd30de35b...fb.exe
windows10-2004-x64
104563b46d64...3c.exe
windows10-2004-x64
1045ab0e1069...0f.exe
windows10-2004-x64
10545f251975...f8.exe
windows10-2004-x64
105bd9b291d7...ab.exe
windows10-2004-x64
105e70f35516...00.exe
windows10-2004-x64
107348ee4e4e...6d.exe
windows10-2004-x64
108b460dc8cc...29.exe
windows10-2004-x64
10928c96df1b...ca.exe
windows10-2004-x64
10972fcfe587...1d.exe
windows10-2004-x64
10a025c0e619...2e.exe
windows10-2004-x64
10bc0667bb8d...75.exe
windows10-2004-x64
10cf82c35e0a...89.exe
windows10-2004-x64
10fbe2b19c30...62.exe
windows10-2004-x64
10Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 18:20
Static task
static1
Behavioral task
behavioral1
Sample
006388190d560f779193db075f918251d361e2b4d3964e52b02340d13f027cbb.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
0254882920b8d79aa87aa48e3861241d6f50bc1856fc52906e5a574397e08db5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
059acceaf93bade47e21b541d454c4c6306be3c538a4c3830fc06ede130ec54e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
23e52eabfc961f3968a8c831c24d36e0e9f098916b0ddf025ed159d3fc688616.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
346c48a0871c59620708e024ec279730125927376e659248d8497b58ee492d17.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
3a559db9fbdf13125c1dec222cde0f982fe63820a3dda722db7b0f646fe80e76.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
3bd30de35b2caa677c1a1d8eeb9a0878d3c396425a4501d3fc280590146a7efb.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
4563b46d64120bf9833b2c3a8c333cb31977f9c75d32f836c04620dc0ce6623c.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
45ab0e1069984eb278e72231ed9a1e178170792eecd79ef0661dac877d441d0f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
545f251975e0336438e45247d53ca978f9025138b2622d8fe2787d5dba9f28f8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
5bd9b291d75af7da767ccfd9442e39fc2a36f83c84ba9416a78c62a54164b4ab.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
5e70f35516878f784c795b9bc0d243a75bde82267717162cdb1838a7e102b600.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
7348ee4e4ed1a5e949c6ba0b2c8eaee7bf5d5f120e8c79c61accf44a24e12c6d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
8b460dc8cc01a4935d8fd4d2c0274d449f186cacf64dabc12c6b9b32c1b3de29.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
928c96df1b710039ea2c9bfaae5a44e11457f6c8dc17854eced714c1eb97c2ca.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
972fcfe5872ab4a6b837384811a9bbe0624c3035a9a24dcd95984caca2e3b81d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
a025c0e61987ac5dff969885b12ced5a1064ab0b0ae71e3751eb0331b3e6332e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
bc0667bb8d76b0eceab17620f9c43835fd5dbd1eebbf9f51744ad7e0c3852c75.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
cf82c35e0a5a0683a1f51d3806ea0eb39a59d81fd4fc110c9762ff99d4e3f389.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
fbe2b19c3005d09f35a016c06bae0f79aabf8a1d61a477834dca18d82cb3aa62.exe
Resource
win10v2004-20240508-en
General
-
Target
928c96df1b710039ea2c9bfaae5a44e11457f6c8dc17854eced714c1eb97c2ca.exe
-
Size
812KB
-
MD5
d7e04401772d93d83c33c32c5f33a602
-
SHA1
3c91a840591313764010ec32ee6a0dc5b5b40447
-
SHA256
928c96df1b710039ea2c9bfaae5a44e11457f6c8dc17854eced714c1eb97c2ca
-
SHA512
e5f33a36ed748c53165024bec39585b8b8312a6f68a54953f9d854265e009fcb2d34aec610ff98ce150a3e2aefca3e594ddbbb683e95f9edb962f06f39d575bb
-
SSDEEP
12288:dMr8y9062uW/X3IShA4Q7D2oRWidu+4lJGQmMLRrPv2ReCZdxnQ65gbpmwKK:pyqp3K4+D2rnbXGSiMCDylcK
Malware Config
Extracted
amadey
3.87
59b440
http://77.91.68.18
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
-
url_paths
/nice/index.php
Extracted
redline
mrak
77.91.124.82:19071
-
auth_value
7d9a335ab5dfd42d374867c96fe25302
Signatures
-
Processes:
g8205825.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection g8205825.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g8205825.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g8205825.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g8205825.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g8205825.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g8205825.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i6364755.exe family_redline behavioral15/memory/3664-75-0x0000000000090000-0x00000000000C0000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
h3541577.exesaves.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation h3541577.exe Key value queried \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Control Panel\International\Geo\Nation saves.exe -
Executes dropped EXE 9 IoCs
Processes:
x3897948.exex1990902.exex8551980.exeg8205825.exeh3541577.exesaves.exei6364755.exesaves.exesaves.exepid process 224 x3897948.exe 2112 x1990902.exe 4252 x8551980.exe 2644 g8205825.exe 772 h3541577.exe 872 saves.exe 3664 i6364755.exe 4948 saves.exe 4044 saves.exe -
Processes:
g8205825.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features g8205825.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" g8205825.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
928c96df1b710039ea2c9bfaae5a44e11457f6c8dc17854eced714c1eb97c2ca.exex3897948.exex1990902.exex8551980.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 928c96df1b710039ea2c9bfaae5a44e11457f6c8dc17854eced714c1eb97c2ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3897948.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x1990902.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x8551980.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
g8205825.exepid process 2644 g8205825.exe 2644 g8205825.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
g8205825.exedescription pid process Token: SeDebugPrivilege 2644 g8205825.exe -
Suspicious use of WriteProcessMemory 45 IoCs
Processes:
928c96df1b710039ea2c9bfaae5a44e11457f6c8dc17854eced714c1eb97c2ca.exex3897948.exex1990902.exex8551980.exeh3541577.exesaves.execmd.exedescription pid process target process PID 5104 wrote to memory of 224 5104 928c96df1b710039ea2c9bfaae5a44e11457f6c8dc17854eced714c1eb97c2ca.exe x3897948.exe PID 5104 wrote to memory of 224 5104 928c96df1b710039ea2c9bfaae5a44e11457f6c8dc17854eced714c1eb97c2ca.exe x3897948.exe PID 5104 wrote to memory of 224 5104 928c96df1b710039ea2c9bfaae5a44e11457f6c8dc17854eced714c1eb97c2ca.exe x3897948.exe PID 224 wrote to memory of 2112 224 x3897948.exe x1990902.exe PID 224 wrote to memory of 2112 224 x3897948.exe x1990902.exe PID 224 wrote to memory of 2112 224 x3897948.exe x1990902.exe PID 2112 wrote to memory of 4252 2112 x1990902.exe x8551980.exe PID 2112 wrote to memory of 4252 2112 x1990902.exe x8551980.exe PID 2112 wrote to memory of 4252 2112 x1990902.exe x8551980.exe PID 4252 wrote to memory of 2644 4252 x8551980.exe g8205825.exe PID 4252 wrote to memory of 2644 4252 x8551980.exe g8205825.exe PID 4252 wrote to memory of 2644 4252 x8551980.exe g8205825.exe PID 4252 wrote to memory of 772 4252 x8551980.exe h3541577.exe PID 4252 wrote to memory of 772 4252 x8551980.exe h3541577.exe PID 4252 wrote to memory of 772 4252 x8551980.exe h3541577.exe PID 772 wrote to memory of 872 772 h3541577.exe saves.exe PID 772 wrote to memory of 872 772 h3541577.exe saves.exe PID 772 wrote to memory of 872 772 h3541577.exe saves.exe PID 2112 wrote to memory of 3664 2112 x1990902.exe i6364755.exe PID 2112 wrote to memory of 3664 2112 x1990902.exe i6364755.exe PID 2112 wrote to memory of 3664 2112 x1990902.exe i6364755.exe PID 872 wrote to memory of 1780 872 saves.exe schtasks.exe PID 872 wrote to memory of 1780 872 saves.exe schtasks.exe PID 872 wrote to memory of 1780 872 saves.exe schtasks.exe PID 872 wrote to memory of 2260 872 saves.exe cmd.exe PID 872 wrote to memory of 2260 872 saves.exe cmd.exe PID 872 wrote to memory of 2260 872 saves.exe cmd.exe PID 2260 wrote to memory of 2620 2260 cmd.exe cmd.exe PID 2260 wrote to memory of 2620 2260 cmd.exe cmd.exe PID 2260 wrote to memory of 2620 2260 cmd.exe cmd.exe PID 2260 wrote to memory of 2916 2260 cmd.exe cacls.exe PID 2260 wrote to memory of 2916 2260 cmd.exe cacls.exe PID 2260 wrote to memory of 2916 2260 cmd.exe cacls.exe PID 2260 wrote to memory of 1348 2260 cmd.exe cacls.exe PID 2260 wrote to memory of 1348 2260 cmd.exe cacls.exe PID 2260 wrote to memory of 1348 2260 cmd.exe cacls.exe PID 2260 wrote to memory of 3468 2260 cmd.exe cmd.exe PID 2260 wrote to memory of 3468 2260 cmd.exe cmd.exe PID 2260 wrote to memory of 3468 2260 cmd.exe cmd.exe PID 2260 wrote to memory of 1628 2260 cmd.exe cacls.exe PID 2260 wrote to memory of 1628 2260 cmd.exe cacls.exe PID 2260 wrote to memory of 1628 2260 cmd.exe cacls.exe PID 2260 wrote to memory of 4972 2260 cmd.exe cacls.exe PID 2260 wrote to memory of 4972 2260 cmd.exe cacls.exe PID 2260 wrote to memory of 4972 2260 cmd.exe cacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\928c96df1b710039ea2c9bfaae5a44e11457f6c8dc17854eced714c1eb97c2ca.exe"C:\Users\Admin\AppData\Local\Temp\928c96df1b710039ea2c9bfaae5a44e11457f6c8dc17854eced714c1eb97c2ca.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3897948.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3897948.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1990902.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1990902.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8551980.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8551980.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8205825.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8205825.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3541577.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h3541577.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:1780
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2620
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:2916
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:1348
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3468
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:1628
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:4972
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i6364755.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i6364755.exe4⤵
- Executes dropped EXE
PID:3664
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4948
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4044
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
706KB
MD527379e251d23abe284cf5f9a3cfe60b8
SHA116170c21d537776effc57c7eb1336b34efac1269
SHA256e7be2bc84a5eceb17fe5879d26729eb699f246a43cb5b4aee99efd2a656c4938
SHA512dba6bf581d0b43cb1558dbb65cb7616b6ded2b5320bf539b11ea77ab95a5d81f17e97e513d4d64b2c6de1627d13a3934ac6335ac2e0282834f3143b01dd9a0ff
-
Filesize
540KB
MD55e8f1b58f7aa360fa388ced6cda27e01
SHA11caffb04d42ce2c68d63ec9330e50c7e0e189353
SHA2568ee8ea17ee37d7a170f5f1d1df5f12320002fc9ed36a5f4cc99c04d159fdd2b1
SHA5129e6e10bc780b36ea41f69306d933b727ea86c28b54e61e4034b3429f7799c9f041565feebd3cf62ab2a680801f46192e84f1c933ed9ceb9b0d531f22774e0777
-
Filesize
173KB
MD521e3eb2d785954439c4ceaa6d381b649
SHA1d55ec6f8fd67b9489504d315ed6163cd11bb90dc
SHA256e4c46bc5cc25860e26c1b0b08cf7b0632288ddca61c9e24b9b1f2f0b6c8c05b8
SHA512491fa38e42c1a4b86f9cea55e619b20fe0b80c901d94f7e969e1ab4dc7df9dbb01777dd5f7f17c7312b7c51caf9b08f871b80d47eaa50cdc971c2f31986e721a
-
Filesize
384KB
MD53a38875dc0f87686110aae94957897ec
SHA12e48324d37d02d8292d8797675a10ef8e11f05d4
SHA2561574f9b89fa59c661ecfca17e6a3e59c6db359da6a1e5d608ea579e0d23b0768
SHA512cb12b60a00dcf5dffa4131c52aa0d8856f90f60d4e1c693e600bd66d9c2d3f6634bb1448ba9cce64a66865c1a7b5ec306510f0da499502798da3a443ffb8b363
-
Filesize
185KB
MD59b63752dc73360c32845ffd48e118e6a
SHA1ce862bc52b5b2917ceb3aab4bc4021327ca7629a
SHA256c430d48b58a26eb09cbbc2af3c2df6543da3e022ec94239e734730647cf06a31
SHA51262583ef56b18a2222b71620da3ccb1c7469911a5d26fef5585999092ba39d98c4ced2f318aa624a9e37ac6878ad6a88d38703fde2b80595a233aee629b63517c
-
Filesize
336KB
MD588e85a8065d082e2336d93142af8d402
SHA1e6711655405840b7ca4efc7172cbccdbeee220db
SHA256ef2a3f5c2b5036b64a6c1534635f41a01bca481722a3ceec98dae0c5ff6fa3b9
SHA5124624e06650bfdbe46c1e26aee31e50377c6c2e9b0cf132558f0d645ab7d9b302dc56a085e2f8beb72a8eb57f61ab005a2e545c0267f642939eb99792e4fb74f6