Overview
overview
10Static
static
30805913f50...13.exe
windows10-2004-x64
1011eba51293...3a.exe
windows10-2004-x64
1017a0568b20...3a.exe
windows10-2004-x64
10346c46bc82...26.exe
windows10-2004-x64
104867af9d5d...1f.exe
windows10-2004-x64
105f2f269e1f...9a.exe
windows10-2004-x64
1064e73ef21d...a1.exe
windows10-2004-x64
107c556f6f80...61.exe
windows10-2004-x64
108c970cc94c...d3.exe
windows10-2004-x64
109296923f57...24.exe
windows10-2004-x64
10ae96a881fd...69.exe
windows10-2004-x64
10b150b2b6ed...d5.exe
windows10-2004-x64
10c1b0ce286b...51.exe
windows10-2004-x64
10c1d1b117a2...35.exe
windows10-2004-x64
10d876400b35...04.exe
windows10-2004-x64
10eb3bd6af82...52.exe
windows10-2004-x64
10eb7c2e9dc2...28.exe
windows10-2004-x64
10ed2eb0d5dc...bf.exe
windows10-2004-x64
10fc2a396813...13.exe
windows10-2004-x64
10fd4ce916b7...90.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 18:47
Static task
static1
Behavioral task
behavioral1
Sample
0805913f5039b1097cf6d0b178560036e0b99e52f86b3990bf7bd4b663d15513.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
11eba512939d3d17bcd0d5543f3a05dac69c96858fbb7120b8802814391c413a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
17a0568b2023370d14f35371e9d7c372589b91d4098eecace76d78c9a7587d3a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
346c46bc8283ae44fe76d91bebdf5c933515cb6b55b0e4f1dd25ca7a64a0a726.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
4867af9d5dda04a5ea012b876f663ee94f708e52fd230c829517d4b2b83e9d1f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
5f2f269e1f9905fb92ad987badd2a5b73d7a44e072d374b4e040c95e30b5c69a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
64e73ef21d2b9d5819334be729f07ac670e6fa83111bc1b666abffc261bc2da1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
7c556f6f80bf250c2ce70d007250b6906c79d457969a75a3f17dc9885daf8761.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
8c970cc94c6aab0b503af6d60e60f5c6c870576c82be9233ab884894899a97d3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
9296923f571779b37e571b296a597c9c5eb71a0a616bfd3ddab9f7d20c509c24.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
ae96a881fddd0471c5a462a0b27848d72c34ba866c6061e0f84ab3a1097a7a69.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
b150b2b6edd507299c5ac9c6a165df425596a5b2a6f78c7ee7594e3f19a28fd5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
c1b0ce286b7a31d1ab1a8fca661afccb95aaaf56a8fa6b4a311da0a284b09351.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
c1d1b117a294542d27caa4ebc382b5fc76b02e11a9e65fa6db0a33433cb6e435.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
d876400b35d912e211572e1acd02738c757f24f8adf82ea7ac3ce91f74c8e404.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
eb3bd6af828d49516b571018684b6f164a7f79bb71c38674e37a085ab5813352.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
eb7c2e9dc2416d5168ea11cdee85ea662e4aa32921edbe521787e1a7dcc79228.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
ed2eb0d5dcf8c04d4b8381812154164abb842db1d4f3059e6d7d12293004ffbf.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
fc2a3968133c3c96ae55dfdd56ca5b4dd51ed30658a98d55193b96e1533f4013.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
fd4ce916b77ccd6023667af48e2052df3bebb66cde59b34f1002b2799e6a4890.exe
Resource
win10v2004-20240508-en
General
-
Target
c1b0ce286b7a31d1ab1a8fca661afccb95aaaf56a8fa6b4a311da0a284b09351.exe
-
Size
600KB
-
MD5
520164b716b018381b9c742d869b32e4
-
SHA1
c106a10d377bf9b4bb5a4fe99565e2a3805eca05
-
SHA256
c1b0ce286b7a31d1ab1a8fca661afccb95aaaf56a8fa6b4a311da0a284b09351
-
SHA512
fa004fa2f7170cd50a2ddca65dc26d9ab732ee6f1db843458215827f5ee26f102730e0bbf616276c42643224eef2205fc4d14238c9838d3cdd5a3c58e9316c9e
-
SSDEEP
12288:bMrRy90DursHSHejS8J0CUKR/e7tRJKRoEXMp71vTkMFnhCF2ZR:+yppH6J1UqG7tXKqE81IMFnhd/
Malware Config
Extracted
amadey
3.87
59b440
http://77.91.68.18
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
-
url_paths
/nice/index.php
Extracted
redline
mrak
77.91.124.82:19071
-
auth_value
7d9a335ab5dfd42d374867c96fe25302
Signatures
-
Detect Mystic stealer payload 1 IoCs
resource yara_rule behavioral13/files/0x000700000002341e-31.dat mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral13/files/0x000700000002341b-34.dat family_redline behavioral13/memory/3544-36-0x00000000009E0000-0x0000000000A10000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation b0591715.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation saves.exe -
Executes dropped EXE 8 IoCs
pid Process 4608 v9458983.exe 2972 v0295738.exe 2436 b0591715.exe 1760 saves.exe 3168 c2486638.exe 3544 d2507380.exe 2136 saves.exe 2964 saves.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c1b0ce286b7a31d1ab1a8fca661afccb95aaaf56a8fa6b4a311da0a284b09351.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v9458983.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v0295738.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3720 schtasks.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1060 wrote to memory of 4608 1060 c1b0ce286b7a31d1ab1a8fca661afccb95aaaf56a8fa6b4a311da0a284b09351.exe 83 PID 1060 wrote to memory of 4608 1060 c1b0ce286b7a31d1ab1a8fca661afccb95aaaf56a8fa6b4a311da0a284b09351.exe 83 PID 1060 wrote to memory of 4608 1060 c1b0ce286b7a31d1ab1a8fca661afccb95aaaf56a8fa6b4a311da0a284b09351.exe 83 PID 4608 wrote to memory of 2972 4608 v9458983.exe 84 PID 4608 wrote to memory of 2972 4608 v9458983.exe 84 PID 4608 wrote to memory of 2972 4608 v9458983.exe 84 PID 2972 wrote to memory of 2436 2972 v0295738.exe 85 PID 2972 wrote to memory of 2436 2972 v0295738.exe 85 PID 2972 wrote to memory of 2436 2972 v0295738.exe 85 PID 2436 wrote to memory of 1760 2436 b0591715.exe 86 PID 2436 wrote to memory of 1760 2436 b0591715.exe 86 PID 2436 wrote to memory of 1760 2436 b0591715.exe 86 PID 2972 wrote to memory of 3168 2972 v0295738.exe 87 PID 2972 wrote to memory of 3168 2972 v0295738.exe 87 PID 2972 wrote to memory of 3168 2972 v0295738.exe 87 PID 4608 wrote to memory of 3544 4608 v9458983.exe 88 PID 4608 wrote to memory of 3544 4608 v9458983.exe 88 PID 4608 wrote to memory of 3544 4608 v9458983.exe 88 PID 1760 wrote to memory of 3720 1760 saves.exe 89 PID 1760 wrote to memory of 3720 1760 saves.exe 89 PID 1760 wrote to memory of 3720 1760 saves.exe 89 PID 1760 wrote to memory of 2164 1760 saves.exe 91 PID 1760 wrote to memory of 2164 1760 saves.exe 91 PID 1760 wrote to memory of 2164 1760 saves.exe 91 PID 2164 wrote to memory of 3616 2164 cmd.exe 93 PID 2164 wrote to memory of 3616 2164 cmd.exe 93 PID 2164 wrote to memory of 3616 2164 cmd.exe 93 PID 2164 wrote to memory of 1656 2164 cmd.exe 94 PID 2164 wrote to memory of 1656 2164 cmd.exe 94 PID 2164 wrote to memory of 1656 2164 cmd.exe 94 PID 2164 wrote to memory of 1456 2164 cmd.exe 95 PID 2164 wrote to memory of 1456 2164 cmd.exe 95 PID 2164 wrote to memory of 1456 2164 cmd.exe 95 PID 2164 wrote to memory of 1624 2164 cmd.exe 96 PID 2164 wrote to memory of 1624 2164 cmd.exe 96 PID 2164 wrote to memory of 1624 2164 cmd.exe 96 PID 2164 wrote to memory of 3240 2164 cmd.exe 97 PID 2164 wrote to memory of 3240 2164 cmd.exe 97 PID 2164 wrote to memory of 3240 2164 cmd.exe 97 PID 2164 wrote to memory of 904 2164 cmd.exe 98 PID 2164 wrote to memory of 904 2164 cmd.exe 98 PID 2164 wrote to memory of 904 2164 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1b0ce286b7a31d1ab1a8fca661afccb95aaaf56a8fa6b4a311da0a284b09351.exe"C:\Users\Admin\AppData\Local\Temp\c1b0ce286b7a31d1ab1a8fca661afccb95aaaf56a8fa6b4a311da0a284b09351.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9458983.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9458983.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0295738.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0295738.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0591715.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0591715.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F6⤵
- Creates scheduled task(s)
PID:3720
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3616
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"7⤵PID:1656
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E7⤵PID:1456
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1624
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"7⤵PID:3240
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E7⤵PID:904
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2486638.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2486638.exe4⤵
- Executes dropped EXE
PID:3168
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d2507380.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\d2507380.exe3⤵
- Executes dropped EXE
PID:3544
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2136
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
475KB
MD5152be6dc3e3ccd1bc9f0fdf2033e9a81
SHA1e7432f9eb98748a8a68ce93b7ca363168c4c8677
SHA256ca03e60732df4afd5969e84e6db30e11bab5c4fbcf618d0e915f837674239246
SHA512930c35ce01fcdbb27b4df2f03aa9e1d67b365e6dd68688b6931fc116a68c5280ad0a41d1eda55ba385e0cf62298debe2cc619d0eeb9cf520f66eae08adf47670
-
Filesize
173KB
MD5b062d96eb919297b78f016956855fde0
SHA11ae84c34ea5a75c07b89b7915109f3a2dbcf5a77
SHA25608dbb78c0f12265379a92a96f4b4c56525b38085980a01c9e0364b84ca0d9d0b
SHA5126e4ae0b21e8c7ac12d690312af08a7dc5a0701b9f33ee5618fca61b69aa7366a5d7e477357e8d0f33aac0d39c6ac23836247368f652dfcfd96149cac1cc4ad8c
-
Filesize
320KB
MD593b72c415cc08f25749411c68039a944
SHA1307e6bfd65f62bfe485975238b60e55ee5539873
SHA256cf88419bd50abc18e7b3c7a3288d1976053683d619e8973b36f50f949f5668ab
SHA512f84b302ac85c5aaf8109fb4de3211a2e9297fbead28480334583c5f9a8b6f3f06a04d4ceb54e480288191ebf96f0a6380802d229bc658f34385c1aa6caf682a6
-
Filesize
336KB
MD50dfca66dc01e0314eb1c24296b05c7f4
SHA1003e1a0aabbbfc82b46f08acdf3200aa38158fee
SHA25674ea8eade0a55034b274686145a79a4d0c5dcadb49d233232abc546a16a096bc
SHA5124822b911b57a95f3a280a89ecdb0ef5b93c068754183f42ed62517ba5e6a22f2fe96a67a7fc2aae0c0fd090dcfaf83d0461e015264ffbd0e46aeaa7dfef6ed4d
-
Filesize
141KB
MD514b0bdfb92cbae048a423d2481e2be43
SHA15848667a85645c2f1c25877d497fb035ea15a88d
SHA256c41923a6b64bd19873de5721ba0ed69a826a70c02f72bd0520ac06be6afc3ec9
SHA51250ff07350ae040c5c6c2df5c6dd4c8fc54ef0176519bcfd0307abb107743b7dc3ad6f490447a5d6cfe1b267a43e9c6de7a0d8430e06b71d8dbdae1ada243ea1b