Overview
overview
10Static
static
30805913f50...13.exe
windows10-2004-x64
1011eba51293...3a.exe
windows10-2004-x64
1017a0568b20...3a.exe
windows10-2004-x64
10346c46bc82...26.exe
windows10-2004-x64
104867af9d5d...1f.exe
windows10-2004-x64
105f2f269e1f...9a.exe
windows10-2004-x64
1064e73ef21d...a1.exe
windows10-2004-x64
107c556f6f80...61.exe
windows10-2004-x64
108c970cc94c...d3.exe
windows10-2004-x64
109296923f57...24.exe
windows10-2004-x64
10ae96a881fd...69.exe
windows10-2004-x64
10b150b2b6ed...d5.exe
windows10-2004-x64
10c1b0ce286b...51.exe
windows10-2004-x64
10c1d1b117a2...35.exe
windows10-2004-x64
10d876400b35...04.exe
windows10-2004-x64
10eb3bd6af82...52.exe
windows10-2004-x64
10eb7c2e9dc2...28.exe
windows10-2004-x64
10ed2eb0d5dc...bf.exe
windows10-2004-x64
10fc2a396813...13.exe
windows10-2004-x64
10fd4ce916b7...90.exe
windows10-2004-x64
10Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 19:04
Static task
static1
Behavioral task
behavioral1
Sample
0805913f5039b1097cf6d0b178560036e0b99e52f86b3990bf7bd4b663d15513.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
11eba512939d3d17bcd0d5543f3a05dac69c96858fbb7120b8802814391c413a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
17a0568b2023370d14f35371e9d7c372589b91d4098eecace76d78c9a7587d3a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
346c46bc8283ae44fe76d91bebdf5c933515cb6b55b0e4f1dd25ca7a64a0a726.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
4867af9d5dda04a5ea012b876f663ee94f708e52fd230c829517d4b2b83e9d1f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
5f2f269e1f9905fb92ad987badd2a5b73d7a44e072d374b4e040c95e30b5c69a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
64e73ef21d2b9d5819334be729f07ac670e6fa83111bc1b666abffc261bc2da1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
7c556f6f80bf250c2ce70d007250b6906c79d457969a75a3f17dc9885daf8761.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
8c970cc94c6aab0b503af6d60e60f5c6c870576c82be9233ab884894899a97d3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
9296923f571779b37e571b296a597c9c5eb71a0a616bfd3ddab9f7d20c509c24.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
ae96a881fddd0471c5a462a0b27848d72c34ba866c6061e0f84ab3a1097a7a69.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
b150b2b6edd507299c5ac9c6a165df425596a5b2a6f78c7ee7594e3f19a28fd5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
c1b0ce286b7a31d1ab1a8fca661afccb95aaaf56a8fa6b4a311da0a284b09351.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
c1d1b117a294542d27caa4ebc382b5fc76b02e11a9e65fa6db0a33433cb6e435.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
d876400b35d912e211572e1acd02738c757f24f8adf82ea7ac3ce91f74c8e404.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
eb3bd6af828d49516b571018684b6f164a7f79bb71c38674e37a085ab5813352.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
eb7c2e9dc2416d5168ea11cdee85ea662e4aa32921edbe521787e1a7dcc79228.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
ed2eb0d5dcf8c04d4b8381812154164abb842db1d4f3059e6d7d12293004ffbf.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
fc2a3968133c3c96ae55dfdd56ca5b4dd51ed30658a98d55193b96e1533f4013.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
fd4ce916b77ccd6023667af48e2052df3bebb66cde59b34f1002b2799e6a4890.exe
Resource
win10v2004-20240226-en
General
-
Target
d876400b35d912e211572e1acd02738c757f24f8adf82ea7ac3ce91f74c8e404.exe
-
Size
812KB
-
MD5
c32af393533d7be2f96748156338d33c
-
SHA1
a58be11608b6f27970a62122c7bb6d4e8536a02a
-
SHA256
d876400b35d912e211572e1acd02738c757f24f8adf82ea7ac3ce91f74c8e404
-
SHA512
9e1f47b3c20f4fa0b0e97758ef702aad9781756266c7c6c8916e189ca00cc477e641524fb84a61b50604adc0e5f231d7a7ca069576dd27631ce1fd58ce2146d0
-
SSDEEP
24576:Uy72IKmbWYfa3qnoWU0+AhWPlWLZJoXi3Om:jyHmb5i3qAn/PcLZJoXG
Malware Config
Extracted
amadey
3.87
59b440
http://77.91.68.18
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
-
url_paths
/nice/index.php
Extracted
redline
mrak
77.91.124.82:19071
-
auth_value
7d9a335ab5dfd42d374867c96fe25302
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection g1682404.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g1682404.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g1682404.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g1682404.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g1682404.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g1682404.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral15/files/0x00070000000233fe-73.dat family_redline behavioral15/memory/220-75-0x0000000000EC0000-0x0000000000EF0000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation h9458880.exe Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation saves.exe -
Executes dropped EXE 9 IoCs
pid Process 3680 x7806108.exe 3452 x3476617.exe 4592 x1857428.exe 3564 g1682404.exe 792 h9458880.exe 3968 saves.exe 220 i8933028.exe 2260 saves.exe 4492 saves.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features g1682404.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" g1682404.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d876400b35d912e211572e1acd02738c757f24f8adf82ea7ac3ce91f74c8e404.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7806108.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x3476617.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x1857428.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4956 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3564 g1682404.exe 3564 g1682404.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3564 g1682404.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 2740 wrote to memory of 3680 2740 d876400b35d912e211572e1acd02738c757f24f8adf82ea7ac3ce91f74c8e404.exe 81 PID 2740 wrote to memory of 3680 2740 d876400b35d912e211572e1acd02738c757f24f8adf82ea7ac3ce91f74c8e404.exe 81 PID 2740 wrote to memory of 3680 2740 d876400b35d912e211572e1acd02738c757f24f8adf82ea7ac3ce91f74c8e404.exe 81 PID 3680 wrote to memory of 3452 3680 x7806108.exe 82 PID 3680 wrote to memory of 3452 3680 x7806108.exe 82 PID 3680 wrote to memory of 3452 3680 x7806108.exe 82 PID 3452 wrote to memory of 4592 3452 x3476617.exe 83 PID 3452 wrote to memory of 4592 3452 x3476617.exe 83 PID 3452 wrote to memory of 4592 3452 x3476617.exe 83 PID 4592 wrote to memory of 3564 4592 x1857428.exe 84 PID 4592 wrote to memory of 3564 4592 x1857428.exe 84 PID 4592 wrote to memory of 3564 4592 x1857428.exe 84 PID 4592 wrote to memory of 792 4592 x1857428.exe 89 PID 4592 wrote to memory of 792 4592 x1857428.exe 89 PID 4592 wrote to memory of 792 4592 x1857428.exe 89 PID 792 wrote to memory of 3968 792 h9458880.exe 90 PID 792 wrote to memory of 3968 792 h9458880.exe 90 PID 792 wrote to memory of 3968 792 h9458880.exe 90 PID 3452 wrote to memory of 220 3452 x3476617.exe 91 PID 3452 wrote to memory of 220 3452 x3476617.exe 91 PID 3452 wrote to memory of 220 3452 x3476617.exe 91 PID 3968 wrote to memory of 4956 3968 saves.exe 92 PID 3968 wrote to memory of 4956 3968 saves.exe 92 PID 3968 wrote to memory of 4956 3968 saves.exe 92 PID 3968 wrote to memory of 400 3968 saves.exe 94 PID 3968 wrote to memory of 400 3968 saves.exe 94 PID 3968 wrote to memory of 400 3968 saves.exe 94 PID 400 wrote to memory of 4564 400 cmd.exe 96 PID 400 wrote to memory of 4564 400 cmd.exe 96 PID 400 wrote to memory of 4564 400 cmd.exe 96 PID 400 wrote to memory of 3396 400 cmd.exe 97 PID 400 wrote to memory of 3396 400 cmd.exe 97 PID 400 wrote to memory of 3396 400 cmd.exe 97 PID 400 wrote to memory of 548 400 cmd.exe 98 PID 400 wrote to memory of 548 400 cmd.exe 98 PID 400 wrote to memory of 548 400 cmd.exe 98 PID 400 wrote to memory of 4188 400 cmd.exe 99 PID 400 wrote to memory of 4188 400 cmd.exe 99 PID 400 wrote to memory of 4188 400 cmd.exe 99 PID 400 wrote to memory of 3756 400 cmd.exe 100 PID 400 wrote to memory of 3756 400 cmd.exe 100 PID 400 wrote to memory of 3756 400 cmd.exe 100 PID 400 wrote to memory of 3340 400 cmd.exe 101 PID 400 wrote to memory of 3340 400 cmd.exe 101 PID 400 wrote to memory of 3340 400 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\d876400b35d912e211572e1acd02738c757f24f8adf82ea7ac3ce91f74c8e404.exe"C:\Users\Admin\AppData\Local\Temp\d876400b35d912e211572e1acd02738c757f24f8adf82ea7ac3ce91f74c8e404.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7806108.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7806108.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3476617.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3476617.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1857428.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1857428.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1682404.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1682404.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3564
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h9458880.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h9458880.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:4956
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4564
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:3396
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:548
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4188
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:3756
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:3340
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i8933028.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i8933028.exe4⤵
- Executes dropped EXE
PID:220
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2260
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4492
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
706KB
MD5ad99f9b3ff89072c3bd9c2074e6aebcb
SHA1d599efc4992731b1184683e3ee617f001d352cab
SHA256d0c127a4a6921e31b28fafc3da002df40552c15457a9caa206b5d4d7898918e7
SHA512402a321a421621ff8648b466456d6f96d1616c39edfdf076ccbdbb33715a42baeed2b024d30d64809432a8db738eb3531d7a78e0745f12311eb356ec737d84ab
-
Filesize
540KB
MD5435bfa29df1de1ef38ae405075b8828d
SHA12d2ab95899689881c9afb9d7d657071e90ed305a
SHA256faae692feeb7dff318d310cdc01ca11d025fa95a59f09d52e2a38b39f5ea400d
SHA5128a634d7f8f511cdd8186dcc2418b209ae6f26fcc219fb505873d5fd0542bca3367b507c515b80c5fc43fa9e07f99c5bdd972fa2ba5b1f4347d113206dbb4b1db
-
Filesize
174KB
MD548a600871b4d54a883e6e37fa0a5c49c
SHA1b2e2c68ec120720c25bc39af22a91b89ff11d550
SHA256c9f320e92715be9a1d8537fbaadcea66751a057096946d06a343bbb14af25fa6
SHA51284cbb6b46964051da270bc8d9384d3192c9b2b815159f743250bf3773cc85b4f50d15753ce80d4480f9b4665462450a8aa74e201a4e835514301d7f024395b0c
-
Filesize
384KB
MD5ff8cca1e0a46d6f3e46e7a23b4ae57bb
SHA1d7636dddee40f24dac5216c2955749f84e9eccc7
SHA25699b31f8abf6b544f5d75c7fb58180fa0659a4d5ae4f67fffcac9d865c8fed591
SHA512959dad88fe052e902888f2cdbf450a1c054855a5794ca469e9fbb1fc4bf60b1f50ba3c4e1b1e65a2182b029408443098dedebea72f3958a20392fb44feb552f6
-
Filesize
185KB
MD5115a128a75d59f5595098bd66707bc57
SHA17638157b9a7b3829bc7cfee9b0d3764d62c4ce69
SHA25660349accf94329c3cfc5286ca9de825fc1849e9e63eb12ca158cb7143802899d
SHA512bc75f8fb0cb584bd18f049437161329d336d72eecb607bbd7131e2a366090e8ff066c914e39ae2013fd941ddd70fa2455be24c6b49c0c8b6d4ce17b61e6fdd71
-
Filesize
337KB
MD52fecb5d3bc43008dabdeae42e61dd8da
SHA120fdd3273d238425e6a33680df6442ae5c8253dd
SHA256201bb8fad59eaf8a3623efb724e33dc9c15d6b4de5cff2b93e22cebe82501920
SHA512d0e949d319c33a799c6369fdef2c7eaddec57a60b275d1a17cc50f479f6ce3c180fc1969d6fbbce8387444bd290156d412038fd73d5aaa9b265afd7b06713f8e