Overview
overview
10Static
static
30805913f50...13.exe
windows10-2004-x64
1011eba51293...3a.exe
windows10-2004-x64
1017a0568b20...3a.exe
windows10-2004-x64
10346c46bc82...26.exe
windows10-2004-x64
104867af9d5d...1f.exe
windows10-2004-x64
105f2f269e1f...9a.exe
windows10-2004-x64
1064e73ef21d...a1.exe
windows10-2004-x64
107c556f6f80...61.exe
windows10-2004-x64
108c970cc94c...d3.exe
windows10-2004-x64
109296923f57...24.exe
windows10-2004-x64
10ae96a881fd...69.exe
windows10-2004-x64
10b150b2b6ed...d5.exe
windows10-2004-x64
10c1b0ce286b...51.exe
windows10-2004-x64
10c1d1b117a2...35.exe
windows10-2004-x64
10d876400b35...04.exe
windows10-2004-x64
10eb3bd6af82...52.exe
windows10-2004-x64
10eb7c2e9dc2...28.exe
windows10-2004-x64
10ed2eb0d5dc...bf.exe
windows10-2004-x64
10fc2a396813...13.exe
windows10-2004-x64
10fd4ce916b7...90.exe
windows10-2004-x64
10Analysis
-
max time kernel
140s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 19:04
Static task
static1
Behavioral task
behavioral1
Sample
0805913f5039b1097cf6d0b178560036e0b99e52f86b3990bf7bd4b663d15513.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
11eba512939d3d17bcd0d5543f3a05dac69c96858fbb7120b8802814391c413a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
17a0568b2023370d14f35371e9d7c372589b91d4098eecace76d78c9a7587d3a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
346c46bc8283ae44fe76d91bebdf5c933515cb6b55b0e4f1dd25ca7a64a0a726.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
4867af9d5dda04a5ea012b876f663ee94f708e52fd230c829517d4b2b83e9d1f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
5f2f269e1f9905fb92ad987badd2a5b73d7a44e072d374b4e040c95e30b5c69a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
64e73ef21d2b9d5819334be729f07ac670e6fa83111bc1b666abffc261bc2da1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
7c556f6f80bf250c2ce70d007250b6906c79d457969a75a3f17dc9885daf8761.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
8c970cc94c6aab0b503af6d60e60f5c6c870576c82be9233ab884894899a97d3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
9296923f571779b37e571b296a597c9c5eb71a0a616bfd3ddab9f7d20c509c24.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
ae96a881fddd0471c5a462a0b27848d72c34ba866c6061e0f84ab3a1097a7a69.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
b150b2b6edd507299c5ac9c6a165df425596a5b2a6f78c7ee7594e3f19a28fd5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
c1b0ce286b7a31d1ab1a8fca661afccb95aaaf56a8fa6b4a311da0a284b09351.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
c1d1b117a294542d27caa4ebc382b5fc76b02e11a9e65fa6db0a33433cb6e435.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
d876400b35d912e211572e1acd02738c757f24f8adf82ea7ac3ce91f74c8e404.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
eb3bd6af828d49516b571018684b6f164a7f79bb71c38674e37a085ab5813352.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
eb7c2e9dc2416d5168ea11cdee85ea662e4aa32921edbe521787e1a7dcc79228.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
ed2eb0d5dcf8c04d4b8381812154164abb842db1d4f3059e6d7d12293004ffbf.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
fc2a3968133c3c96ae55dfdd56ca5b4dd51ed30658a98d55193b96e1533f4013.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
fd4ce916b77ccd6023667af48e2052df3bebb66cde59b34f1002b2799e6a4890.exe
Resource
win10v2004-20240226-en
General
-
Target
fd4ce916b77ccd6023667af48e2052df3bebb66cde59b34f1002b2799e6a4890.exe
-
Size
1.3MB
-
MD5
5bbe0d4d9a0315328670257d051d24ec
-
SHA1
703f9e52cfa0752b6fe32ce544542d41c26f3414
-
SHA256
fd4ce916b77ccd6023667af48e2052df3bebb66cde59b34f1002b2799e6a4890
-
SHA512
346a4a5629c810d01660ca7b5fe27ca96b89df01e8fe8966858538ed64e06b35fc3aa6d4f39b7f2edfcad380e33a0e634d48c7eba4da1e928f6d0fee0644c35c
-
SSDEEP
24576:6ybUKxddkeq9KQxslEr58eZS7EWzWvm9bb+0je8be0QDeBc1:BbZniKQxslE98eZS7LT9b7bCeB
Malware Config
Extracted
amadey
3.87
59b440
http://77.91.68.18
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
-
url_paths
/nice/index.php
Extracted
redline
mrak
77.91.124.82:19071
-
auth_value
7d9a335ab5dfd42d374867c96fe25302
Signatures
-
Detect Mystic stealer payload 1 IoCs
resource yara_rule behavioral20/files/0x000700000002325a-38.dat mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral20/files/0x0007000000023257-41.dat family_redline behavioral20/memory/452-43-0x00000000006D0000-0x0000000000700000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation l2609937.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation saves.exe -
Executes dropped EXE 9 IoCs
pid Process 4848 y0492251.exe 3108 y6886798.exe 3272 y4786423.exe 4416 l2609937.exe 1676 saves.exe 3616 m3894073.exe 452 n5460327.exe 4300 saves.exe 4576 saves.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fd4ce916b77ccd6023667af48e2052df3bebb66cde59b34f1002b2799e6a4890.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y0492251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y6886798.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y4786423.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2952 schtasks.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 4948 wrote to memory of 4848 4948 fd4ce916b77ccd6023667af48e2052df3bebb66cde59b34f1002b2799e6a4890.exe 90 PID 4948 wrote to memory of 4848 4948 fd4ce916b77ccd6023667af48e2052df3bebb66cde59b34f1002b2799e6a4890.exe 90 PID 4948 wrote to memory of 4848 4948 fd4ce916b77ccd6023667af48e2052df3bebb66cde59b34f1002b2799e6a4890.exe 90 PID 4848 wrote to memory of 3108 4848 y0492251.exe 91 PID 4848 wrote to memory of 3108 4848 y0492251.exe 91 PID 4848 wrote to memory of 3108 4848 y0492251.exe 91 PID 3108 wrote to memory of 3272 3108 y6886798.exe 92 PID 3108 wrote to memory of 3272 3108 y6886798.exe 92 PID 3108 wrote to memory of 3272 3108 y6886798.exe 92 PID 3272 wrote to memory of 4416 3272 y4786423.exe 93 PID 3272 wrote to memory of 4416 3272 y4786423.exe 93 PID 3272 wrote to memory of 4416 3272 y4786423.exe 93 PID 4416 wrote to memory of 1676 4416 l2609937.exe 94 PID 4416 wrote to memory of 1676 4416 l2609937.exe 94 PID 4416 wrote to memory of 1676 4416 l2609937.exe 94 PID 3272 wrote to memory of 3616 3272 y4786423.exe 95 PID 3272 wrote to memory of 3616 3272 y4786423.exe 95 PID 3272 wrote to memory of 3616 3272 y4786423.exe 95 PID 3108 wrote to memory of 452 3108 y6886798.exe 96 PID 3108 wrote to memory of 452 3108 y6886798.exe 96 PID 3108 wrote to memory of 452 3108 y6886798.exe 96 PID 1676 wrote to memory of 2952 1676 saves.exe 97 PID 1676 wrote to memory of 2952 1676 saves.exe 97 PID 1676 wrote to memory of 2952 1676 saves.exe 97 PID 1676 wrote to memory of 3792 1676 saves.exe 99 PID 1676 wrote to memory of 3792 1676 saves.exe 99 PID 1676 wrote to memory of 3792 1676 saves.exe 99 PID 3792 wrote to memory of 3760 3792 cmd.exe 101 PID 3792 wrote to memory of 3760 3792 cmd.exe 101 PID 3792 wrote to memory of 3760 3792 cmd.exe 101 PID 3792 wrote to memory of 5024 3792 cmd.exe 102 PID 3792 wrote to memory of 5024 3792 cmd.exe 102 PID 3792 wrote to memory of 5024 3792 cmd.exe 102 PID 3792 wrote to memory of 2500 3792 cmd.exe 103 PID 3792 wrote to memory of 2500 3792 cmd.exe 103 PID 3792 wrote to memory of 2500 3792 cmd.exe 103 PID 3792 wrote to memory of 776 3792 cmd.exe 104 PID 3792 wrote to memory of 776 3792 cmd.exe 104 PID 3792 wrote to memory of 776 3792 cmd.exe 104 PID 3792 wrote to memory of 1648 3792 cmd.exe 105 PID 3792 wrote to memory of 1648 3792 cmd.exe 105 PID 3792 wrote to memory of 1648 3792 cmd.exe 105 PID 3792 wrote to memory of 2644 3792 cmd.exe 106 PID 3792 wrote to memory of 2644 3792 cmd.exe 106 PID 3792 wrote to memory of 2644 3792 cmd.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd4ce916b77ccd6023667af48e2052df3bebb66cde59b34f1002b2799e6a4890.exe"C:\Users\Admin\AppData\Local\Temp\fd4ce916b77ccd6023667af48e2052df3bebb66cde59b34f1002b2799e6a4890.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0492251.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0492251.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6886798.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6886798.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y4786423.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y4786423.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l2609937.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l2609937.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:2952
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:3760
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:5024
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:2500
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:776
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:1648
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:2644
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m3894073.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m3894073.exe5⤵
- Executes dropped EXE
PID:3616
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n5460327.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n5460327.exe4⤵
- Executes dropped EXE
PID:452
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4300
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4072 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:81⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5d8df62ba006d203fcdae94a5bb22ec5f
SHA1ea41c348a03e065a0d1a9eed29a2c5243188e03c
SHA256ed2df8cd1b4b2c6dbe0e1fb3db1b73d1a39f6f571faa5b52fcf5f02825372b1d
SHA512cd409889eeee089a849de53a25e8de9a55458c075783a285a98b344a359cd67c13a21c1a2d0f878383ba39e45213ec7fc8c4261aa226e6ef2d9fe32c9b74bea6
-
Filesize
476KB
MD5c1c525f56170b66ce0b62e62deeaaf10
SHA1a7993c38e8fb39ed28180484c6d50f0a27428364
SHA256662ec7617cfc790b4eb1030be263c063494c500d699a9eace182a80efe854b60
SHA512140b189b935bddae084a8751699e4e5b91153939c7f4b9f420f6221c08e490d331d1dcad8f7dd561ecba7eeae258f806b56e0b45c333c721c4bf834b09de19a7
-
Filesize
174KB
MD57bf53d19d3bdb53fa71edc166020e189
SHA1d72d448ec107b3d785039d8163d3236123a1ae7e
SHA256558b08eb78f66183a4f6d17dfc194cd0e80d7c476c231618174386f069b7ff04
SHA51279b0f5206b5811a1d0776457cd1e3f11aed90ca2df68454c1e85a6db92ba0e77e863a5b069f910b098118f31b3a0406962aecbf29a420d93ede0165a992bc405
-
Filesize
320KB
MD5350b6d7235d51f9dcf65b6a23ea04fb2
SHA1396a6443cbfd1bf487c7a89b47409dab9ec82a32
SHA256bc991cb6f964c7631ec58666ac5ec1099ab051bdbbd40500445b3ae68db18f68
SHA51288e82d95fc6946a862bdf13cc41746239277bb516bd31ac3c20dbdf67ce8b4383480b3750fed5f5b792729aacf50c81ad82ba9b33e3756bddb7f773c7356d9e7
-
Filesize
337KB
MD5c5fc2e6a7975736ae74f24800f1605fd
SHA174396fade6cba489dec536512ef5ba8e42f1c5bc
SHA25617d891b62d77dca7cd4e0bc3b238b2ae45c83e6efe958e685a2a7c7808091919
SHA512bed008cce7239f279cba7818f985ebf036a43956f94b029c700cf0c70655da32f8bbf0be2cde604d4f6073f44d98a8f2ce8aa357413d792c92605186a1be3c41
-
Filesize
142KB
MD58487b191bffb0d48d273d6002572ce41
SHA1d47fcaef926601703727285a1ee8e74c2c736493
SHA2565de1317cac1d41a387b9f8014c5e5def4231ed2035c14387f685ebd8e62201df
SHA512d51c8f558215a05e3cd0809a86207303e4164d03feb0f91fa93032a5c2fe9af0ee9e2ce480f2a17e7b154c76f703c2cf300dfd073febc02619071f9ce7a6bd41