Overview
overview
10Static
static
31b7cbee30e...8d.exe
windows10-2004-x64
101cb2277eea...2a.exe
windows10-2004-x64
1026dae86d00...a2.exe
windows10-2004-x64
1035cd974b16...ec.exe
windows10-2004-x64
1045e7028a78...91.exe
windows10-2004-x64
104cd2f124df...48.exe
windows10-2004-x64
105fdef2b38d...0a.exe
windows10-2004-x64
107284e9e031...c7.exe
windows10-2004-x64
10781c022afd...54.exe
windows10-2004-x64
1084163f9b0d...a5.exe
windows10-2004-x64
1090251e43cd...e4.exe
windows10-2004-x64
109a3023ff33...37.exe
windows10-2004-x64
10b4b999d8f3...50.exe
windows7-x64
10b4b999d8f3...50.exe
windows10-2004-x64
10bdd93956fe...8b.exe
windows10-2004-x64
10cf840721c0...70.exe
windows10-2004-x64
10e52fb58b8a...f1.exe
windows10-2004-x64
10ecfbac56ff...9e.exe
windows10-2004-x64
10f0f492b9b0...9a.exe
windows10-2004-x64
10f921df4c23...0d.exe
windows10-2004-x64
10Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 18:55
Static task
static1
Behavioral task
behavioral1
Sample
1b7cbee30e4459916b5b164befe5e20b7a876df411fdb5d2d2cd7c073a28b18d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
1cb2277eead0aab1238acbbff542f7d6307542e95025dda95856efeb7bc12a2a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
26dae86d0011ac84e93abfd2169b28a6dee3498b8be9c3b84f657506d4e2a9a2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral4
Sample
35cd974b16f79c47cbb0de20c8a1ff5494093da28e9909d73df1cc40bc1e6dec.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
45e7028a78d903a8ece02b9d51f82b76972b2b5e64db0bc12aa6cb69f53a2291.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
4cd2f124dfaf247a46d235c0823069c1056a2efb67c0f74547fb75dcfb603748.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
5fdef2b38d6a927d590cbceb6a8c3f4e278c41ce01d872925603603cd7d0bc0a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
7284e9e031d95f98bb1c673f3691adb26e5acc31e6d2c745b85bc97fc82edec7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
781c022afdd03ecc97a7195986c14b7a81fc5a02d1b0e8c7561a1a1ff3406754.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
84163f9b0d959067de44eac4cb117f34b55119476a35c8291d0be25585618ea5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
90251e43cdd68d8c070a8180eb78fdfc113d4e2ff40733af3a3332c51744eae4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
9a3023ff334b34f4bea043eedeced95c41485b4799d3c2d56c0cb04b60143937.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
b4b999d8f3fb923a4d4cd17b173ba8474c698443430fdc63b8da6ad6eae57d50.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
b4b999d8f3fb923a4d4cd17b173ba8474c698443430fdc63b8da6ad6eae57d50.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
bdd93956feba699c1eac73030a5ce8e55ae51fab4852062d8e46e8ed460a2b8b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
cf840721c08fa286313bd7ac68fc5bac88559652036dfbdcc7b3c6f0cfa13d70.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
e52fb58b8a7d4f8b7eea558e3f50385d34e76f92baeede9698343046ba3273f1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
ecfbac56ff2c59238da4332d5cd1561d05a08ac0d65b57b9caf329f063fc939e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
f0f492b9b0439f9df9e575d91555b387484582434a05ee11e543b6cd24ed979a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f921df4c23777a797ffd956196cd2ea4805eaf3eefcc839de781c7e6af836f0d.exe
Resource
win10v2004-20240508-en
General
-
Target
1b7cbee30e4459916b5b164befe5e20b7a876df411fdb5d2d2cd7c073a28b18d.exe
-
Size
812KB
-
MD5
732e8b08f55b84327bc9756784510ce7
-
SHA1
3f8319e7098f2d99025c21c4cf7faa3e67b31957
-
SHA256
1b7cbee30e4459916b5b164befe5e20b7a876df411fdb5d2d2cd7c073a28b18d
-
SHA512
afe862b4f008d5b18d0aeca1a3e6ecac28c8724f301df381e591cc170dcc39dfc0bb6aa96814c668c5f424e03736f9b448acc8c104e6107d3d66afe28da11ab5
-
SSDEEP
24576:1y07ft7pdSgS37uybqnoffSrKMf48ABP:QAfTdS8ybqIEAB
Malware Config
Extracted
amadey
3.87
59b440
http://77.91.68.18
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
-
url_paths
/nice/index.php
Extracted
redline
mrak
77.91.124.82:19071
-
auth_value
7d9a335ab5dfd42d374867c96fe25302
Signatures
-
Processes:
g4522034.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g4522034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g4522034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g4522034.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection g4522034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g4522034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g4522034.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i4218739.exe family_redline behavioral1/memory/3736-75-0x00000000001D0000-0x0000000000200000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
h4431890.exesaves.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation h4431890.exe Key value queried \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\Control Panel\International\Geo\Nation saves.exe -
Executes dropped EXE 10 IoCs
Processes:
x7902882.exex7653899.exex9569919.exeg4522034.exeh4431890.exesaves.exei4218739.exesaves.exesaves.exesaves.exepid process 2604 x7902882.exe 2972 x7653899.exe 1148 x9569919.exe 1292 g4522034.exe 5752 h4431890.exe 3540 saves.exe 3736 i4218739.exe 3340 saves.exe 2908 saves.exe 1444 saves.exe -
Processes:
g4522034.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features g4522034.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" g4522034.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
1b7cbee30e4459916b5b164befe5e20b7a876df411fdb5d2d2cd7c073a28b18d.exex7902882.exex7653899.exex9569919.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1b7cbee30e4459916b5b164befe5e20b7a876df411fdb5d2d2cd7c073a28b18d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7902882.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x7653899.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x9569919.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
g4522034.exepid process 1292 g4522034.exe 1292 g4522034.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
g4522034.exedescription pid process Token: SeDebugPrivilege 1292 g4522034.exe -
Suspicious use of WriteProcessMemory 45 IoCs
Processes:
1b7cbee30e4459916b5b164befe5e20b7a876df411fdb5d2d2cd7c073a28b18d.exex7902882.exex7653899.exex9569919.exeh4431890.exesaves.execmd.exedescription pid process target process PID 3496 wrote to memory of 2604 3496 1b7cbee30e4459916b5b164befe5e20b7a876df411fdb5d2d2cd7c073a28b18d.exe x7902882.exe PID 3496 wrote to memory of 2604 3496 1b7cbee30e4459916b5b164befe5e20b7a876df411fdb5d2d2cd7c073a28b18d.exe x7902882.exe PID 3496 wrote to memory of 2604 3496 1b7cbee30e4459916b5b164befe5e20b7a876df411fdb5d2d2cd7c073a28b18d.exe x7902882.exe PID 2604 wrote to memory of 2972 2604 x7902882.exe x7653899.exe PID 2604 wrote to memory of 2972 2604 x7902882.exe x7653899.exe PID 2604 wrote to memory of 2972 2604 x7902882.exe x7653899.exe PID 2972 wrote to memory of 1148 2972 x7653899.exe x9569919.exe PID 2972 wrote to memory of 1148 2972 x7653899.exe x9569919.exe PID 2972 wrote to memory of 1148 2972 x7653899.exe x9569919.exe PID 1148 wrote to memory of 1292 1148 x9569919.exe g4522034.exe PID 1148 wrote to memory of 1292 1148 x9569919.exe g4522034.exe PID 1148 wrote to memory of 1292 1148 x9569919.exe g4522034.exe PID 1148 wrote to memory of 5752 1148 x9569919.exe h4431890.exe PID 1148 wrote to memory of 5752 1148 x9569919.exe h4431890.exe PID 1148 wrote to memory of 5752 1148 x9569919.exe h4431890.exe PID 5752 wrote to memory of 3540 5752 h4431890.exe saves.exe PID 5752 wrote to memory of 3540 5752 h4431890.exe saves.exe PID 5752 wrote to memory of 3540 5752 h4431890.exe saves.exe PID 2972 wrote to memory of 3736 2972 x7653899.exe i4218739.exe PID 2972 wrote to memory of 3736 2972 x7653899.exe i4218739.exe PID 2972 wrote to memory of 3736 2972 x7653899.exe i4218739.exe PID 3540 wrote to memory of 4216 3540 saves.exe schtasks.exe PID 3540 wrote to memory of 4216 3540 saves.exe schtasks.exe PID 3540 wrote to memory of 4216 3540 saves.exe schtasks.exe PID 3540 wrote to memory of 4032 3540 saves.exe cmd.exe PID 3540 wrote to memory of 4032 3540 saves.exe cmd.exe PID 3540 wrote to memory of 4032 3540 saves.exe cmd.exe PID 4032 wrote to memory of 2444 4032 cmd.exe cmd.exe PID 4032 wrote to memory of 2444 4032 cmd.exe cmd.exe PID 4032 wrote to memory of 2444 4032 cmd.exe cmd.exe PID 4032 wrote to memory of 644 4032 cmd.exe cacls.exe PID 4032 wrote to memory of 644 4032 cmd.exe cacls.exe PID 4032 wrote to memory of 644 4032 cmd.exe cacls.exe PID 4032 wrote to memory of 1480 4032 cmd.exe cacls.exe PID 4032 wrote to memory of 1480 4032 cmd.exe cacls.exe PID 4032 wrote to memory of 1480 4032 cmd.exe cacls.exe PID 4032 wrote to memory of 3316 4032 cmd.exe cmd.exe PID 4032 wrote to memory of 3316 4032 cmd.exe cmd.exe PID 4032 wrote to memory of 3316 4032 cmd.exe cmd.exe PID 4032 wrote to memory of 3064 4032 cmd.exe cacls.exe PID 4032 wrote to memory of 3064 4032 cmd.exe cacls.exe PID 4032 wrote to memory of 3064 4032 cmd.exe cacls.exe PID 4032 wrote to memory of 5628 4032 cmd.exe cacls.exe PID 4032 wrote to memory of 5628 4032 cmd.exe cacls.exe PID 4032 wrote to memory of 5628 4032 cmd.exe cacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b7cbee30e4459916b5b164befe5e20b7a876df411fdb5d2d2cd7c073a28b18d.exe"C:\Users\Admin\AppData\Local\Temp\1b7cbee30e4459916b5b164befe5e20b7a876df411fdb5d2d2cd7c073a28b18d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7902882.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7902882.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7653899.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7653899.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9569919.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9569919.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4522034.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4522034.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1292
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h4431890.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h4431890.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5752 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:4216
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2444
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:644
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:1480
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3316
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:3064
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:5628
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i4218739.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i4218739.exe4⤵
- Executes dropped EXE
PID:3736
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:3340
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2908
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:1444
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
706KB
MD52c65beaa0034e1c9faf92b7551d8b022
SHA1b824e888f2cdde0446053a471b8ad5a038c5d84d
SHA256c66fa1c34c80724cbb32dc5d57c0c64ffb037110fefe5daa8d6ac85eb4501066
SHA5121425ad56986c2a879731862f1f46b2e57fe01a5536ba7ca6f52d7c7e65b2f5b4a35889ae563faed7f0dd402237d8dd3ab8ccbc2006d63637be241ca47f176b1d
-
Filesize
540KB
MD51b99a47366f793314f8fbabc61f22c20
SHA1a902fe5e971f8cb37b83f8ead93e76c28376b99a
SHA2563ceceab1b967b8aa759dad3089cdb09aaeba2578e8bc70576c2680df19c892b7
SHA51279760a43ea3b28cea15f53f9d9b8be971f8fce59fabc5e2943ece7a34bd477241bd6d934f8436c373e00304fb11ad16a49870ecfcfc4eddd839e82ad4c94baab
-
Filesize
173KB
MD52790d4897a207f1f0c91996f5ea026cb
SHA1e65df1f385c36226405cfc74b51a858a642244fb
SHA256c7d9f00471b0b735502684437e1596d7177a026726bbace4f800c05db65b1e43
SHA512ee92e7a6981ee393343b29080b9258ce9b5199270043e111bfbbaee12d0ee0f4421def026849f08d6e87821e480d79bc53ac7ad51dfb444a6e37f892b2266a8b
-
Filesize
384KB
MD588fd436a63bb8b305a69ae43171d6cd0
SHA123fa361d0b196800ce188ef1e0a07cc5c42e7ba9
SHA2565be107116f8d98ca0470e6e7fa77323817137c0370cd0fc0a37120ff6c9acd02
SHA512fa26a6dcebfc0d96c8aa116992b1ad017f62045a052850edfff3c194e997f94884f95238d08cc7af2f7349f4c9de4202598ae10dd3bc6559b9ffc0a6bca8461d
-
Filesize
185KB
MD537ef078be2b7ad25c82c683344481421
SHA18e5646630f573185d019cf017d9204a5dbd57728
SHA2567bbfe441a3a34d88fb5f0dc4a6e9d27b300bf945b8e64f91d25704b5cb320fe7
SHA512456928068ebf2f9420fa33d69854a7a5117207e2fcda15b251725266581ec1d931ff989d68a2bb28f802f4b7808029a14effe8d0e68653634680dd66366ea5c7
-
Filesize
336KB
MD53fa5620646ab64a5b929893be1fc5215
SHA1ffc6db6d0096101c65e3d0f575d05daa4ae63cbf
SHA256a1e0512f57b2dc3c51e6b6d98549ef99ae5d6d9417487062e5a7672610d8ccff
SHA5127473e4635b2a2a823d6ef0ff1df2f3492b8755c5a7cc4025252d50faa36872b65f4a117221ec55c0228d96f01c5433ac10cd849ab92fc5ef7215f4fce3d23335