Overview
overview
10Static
static
30805913f50...13.exe
windows10-2004-x64
1011eba51293...3a.exe
windows10-2004-x64
1017a0568b20...3a.exe
windows10-2004-x64
10346c46bc82...26.exe
windows10-2004-x64
104867af9d5d...1f.exe
windows10-2004-x64
105f2f269e1f...9a.exe
windows10-2004-x64
1064e73ef21d...a1.exe
windows10-2004-x64
107c556f6f80...61.exe
windows10-2004-x64
108c970cc94c...d3.exe
windows10-2004-x64
109296923f57...24.exe
windows10-2004-x64
10ae96a881fd...69.exe
windows10-2004-x64
10b150b2b6ed...d5.exe
windows10-2004-x64
10c1b0ce286b...51.exe
windows10-2004-x64
10c1d1b117a2...35.exe
windows10-2004-x64
10d876400b35...04.exe
windows10-2004-x64
10eb3bd6af82...52.exe
windows10-2004-x64
10eb7c2e9dc2...28.exe
windows10-2004-x64
10ed2eb0d5dc...bf.exe
windows10-2004-x64
10fc2a396813...13.exe
windows10-2004-x64
10fd4ce916b7...90.exe
windows10-2004-x64
10Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 19:04
Static task
static1
Behavioral task
behavioral1
Sample
0805913f5039b1097cf6d0b178560036e0b99e52f86b3990bf7bd4b663d15513.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
11eba512939d3d17bcd0d5543f3a05dac69c96858fbb7120b8802814391c413a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
17a0568b2023370d14f35371e9d7c372589b91d4098eecace76d78c9a7587d3a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
346c46bc8283ae44fe76d91bebdf5c933515cb6b55b0e4f1dd25ca7a64a0a726.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
4867af9d5dda04a5ea012b876f663ee94f708e52fd230c829517d4b2b83e9d1f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
5f2f269e1f9905fb92ad987badd2a5b73d7a44e072d374b4e040c95e30b5c69a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
64e73ef21d2b9d5819334be729f07ac670e6fa83111bc1b666abffc261bc2da1.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
7c556f6f80bf250c2ce70d007250b6906c79d457969a75a3f17dc9885daf8761.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
8c970cc94c6aab0b503af6d60e60f5c6c870576c82be9233ab884894899a97d3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
9296923f571779b37e571b296a597c9c5eb71a0a616bfd3ddab9f7d20c509c24.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
ae96a881fddd0471c5a462a0b27848d72c34ba866c6061e0f84ab3a1097a7a69.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
b150b2b6edd507299c5ac9c6a165df425596a5b2a6f78c7ee7594e3f19a28fd5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
c1b0ce286b7a31d1ab1a8fca661afccb95aaaf56a8fa6b4a311da0a284b09351.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
c1d1b117a294542d27caa4ebc382b5fc76b02e11a9e65fa6db0a33433cb6e435.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
d876400b35d912e211572e1acd02738c757f24f8adf82ea7ac3ce91f74c8e404.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
eb3bd6af828d49516b571018684b6f164a7f79bb71c38674e37a085ab5813352.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
eb7c2e9dc2416d5168ea11cdee85ea662e4aa32921edbe521787e1a7dcc79228.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
ed2eb0d5dcf8c04d4b8381812154164abb842db1d4f3059e6d7d12293004ffbf.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
fc2a3968133c3c96ae55dfdd56ca5b4dd51ed30658a98d55193b96e1533f4013.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
fd4ce916b77ccd6023667af48e2052df3bebb66cde59b34f1002b2799e6a4890.exe
Resource
win10v2004-20240226-en
General
-
Target
346c46bc8283ae44fe76d91bebdf5c933515cb6b55b0e4f1dd25ca7a64a0a726.exe
-
Size
812KB
-
MD5
79983cb4cd4ed44124acf90324aab153
-
SHA1
95cbc2ecd9756f962ec62f265dd70b37efc50fe0
-
SHA256
346c46bc8283ae44fe76d91bebdf5c933515cb6b55b0e4f1dd25ca7a64a0a726
-
SHA512
a2d737b6436c7550ed5d3f2c8d3cd06f21b019613ea71791f9b9f519eeb54e9c2ac0a0290577c86f2afe56f81161dfb981dc00a8e2483ad152b4e3784fc9ba63
-
SSDEEP
12288:0MrEy90SXhiDq45nmnagUKW2WjcYOTDXKznBc6RZkReqPNgUnnTwR:QyNq3ma+sLAuBc6RkeqPNgJR
Malware Config
Extracted
amadey
3.87
59b440
http://77.91.68.18
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
-
url_paths
/nice/index.php
Extracted
redline
mrak
77.91.124.82:19071
-
auth_value
7d9a335ab5dfd42d374867c96fe25302
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g7530371.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g7530371.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g7530371.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection g7530371.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g7530371.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g7530371.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral4/files/0x000700000002341f-73.dat family_redline behavioral4/memory/2672-75-0x00000000002E0000-0x0000000000310000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation h7155042.exe Key value queried \REGISTRY\USER\S-1-5-21-711569230-3659488422-571408806-1000\Control Panel\International\Geo\Nation saves.exe -
Executes dropped EXE 9 IoCs
pid Process 2452 x8557537.exe 2544 x6246659.exe 2428 x6145980.exe 2728 g7530371.exe 4348 h7155042.exe 4192 saves.exe 2672 i7725090.exe 4392 saves.exe 2572 saves.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features g7530371.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" g7530371.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 346c46bc8283ae44fe76d91bebdf5c933515cb6b55b0e4f1dd25ca7a64a0a726.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x8557537.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6246659.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x6145980.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 452 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2728 g7530371.exe 2728 g7530371.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2728 g7530371.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 4412 wrote to memory of 2452 4412 346c46bc8283ae44fe76d91bebdf5c933515cb6b55b0e4f1dd25ca7a64a0a726.exe 83 PID 4412 wrote to memory of 2452 4412 346c46bc8283ae44fe76d91bebdf5c933515cb6b55b0e4f1dd25ca7a64a0a726.exe 83 PID 4412 wrote to memory of 2452 4412 346c46bc8283ae44fe76d91bebdf5c933515cb6b55b0e4f1dd25ca7a64a0a726.exe 83 PID 2452 wrote to memory of 2544 2452 x8557537.exe 84 PID 2452 wrote to memory of 2544 2452 x8557537.exe 84 PID 2452 wrote to memory of 2544 2452 x8557537.exe 84 PID 2544 wrote to memory of 2428 2544 x6246659.exe 85 PID 2544 wrote to memory of 2428 2544 x6246659.exe 85 PID 2544 wrote to memory of 2428 2544 x6246659.exe 85 PID 2428 wrote to memory of 2728 2428 x6145980.exe 86 PID 2428 wrote to memory of 2728 2428 x6145980.exe 86 PID 2428 wrote to memory of 2728 2428 x6145980.exe 86 PID 2428 wrote to memory of 4348 2428 x6145980.exe 93 PID 2428 wrote to memory of 4348 2428 x6145980.exe 93 PID 2428 wrote to memory of 4348 2428 x6145980.exe 93 PID 4348 wrote to memory of 4192 4348 h7155042.exe 94 PID 4348 wrote to memory of 4192 4348 h7155042.exe 94 PID 4348 wrote to memory of 4192 4348 h7155042.exe 94 PID 2544 wrote to memory of 2672 2544 x6246659.exe 95 PID 2544 wrote to memory of 2672 2544 x6246659.exe 95 PID 2544 wrote to memory of 2672 2544 x6246659.exe 95 PID 4192 wrote to memory of 452 4192 saves.exe 96 PID 4192 wrote to memory of 452 4192 saves.exe 96 PID 4192 wrote to memory of 452 4192 saves.exe 96 PID 4192 wrote to memory of 2540 4192 saves.exe 98 PID 4192 wrote to memory of 2540 4192 saves.exe 98 PID 4192 wrote to memory of 2540 4192 saves.exe 98 PID 2540 wrote to memory of 2476 2540 cmd.exe 100 PID 2540 wrote to memory of 2476 2540 cmd.exe 100 PID 2540 wrote to memory of 2476 2540 cmd.exe 100 PID 2540 wrote to memory of 2484 2540 cmd.exe 101 PID 2540 wrote to memory of 2484 2540 cmd.exe 101 PID 2540 wrote to memory of 2484 2540 cmd.exe 101 PID 2540 wrote to memory of 3256 2540 cmd.exe 102 PID 2540 wrote to memory of 3256 2540 cmd.exe 102 PID 2540 wrote to memory of 3256 2540 cmd.exe 102 PID 2540 wrote to memory of 1752 2540 cmd.exe 103 PID 2540 wrote to memory of 1752 2540 cmd.exe 103 PID 2540 wrote to memory of 1752 2540 cmd.exe 103 PID 2540 wrote to memory of 3272 2540 cmd.exe 104 PID 2540 wrote to memory of 3272 2540 cmd.exe 104 PID 2540 wrote to memory of 3272 2540 cmd.exe 104 PID 2540 wrote to memory of 2404 2540 cmd.exe 105 PID 2540 wrote to memory of 2404 2540 cmd.exe 105 PID 2540 wrote to memory of 2404 2540 cmd.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\346c46bc8283ae44fe76d91bebdf5c933515cb6b55b0e4f1dd25ca7a64a0a726.exe"C:\Users\Admin\AppData\Local\Temp\346c46bc8283ae44fe76d91bebdf5c933515cb6b55b0e4f1dd25ca7a64a0a726.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8557537.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8557537.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6246659.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6246659.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6145980.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6145980.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7530371.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7530371.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7155042.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\h7155042.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:452
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:2476
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:2484
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:3256
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1752
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:3272
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:2404
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i7725090.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i7725090.exe4⤵
- Executes dropped EXE
PID:2672
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4392
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2572
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
706KB
MD50549740dd9ed1b5169b354947a444ee1
SHA1f688a9cd705ee364fb99c1d72ff67b7810c3fa24
SHA256e417d86797b78db09243dedd0d51894bbfa916b94220c6b01b19eca7b4e51702
SHA512216d9be54aac7ef8d97a393e9f76556e03d14ea9896293b5991e518bdee73332fbe4a3a6c9bb7aa874a782382686592def26a816351da1b749999da9716884b5
-
Filesize
540KB
MD554d1b908865065910d815a37fe12f9d3
SHA1f6d9fedc238fb4a66eb4ceb33a265d4a5e18e46d
SHA2568132da80609e96c10b9620e3fabdb77f405e2b22157bdd7107fbdcc082d07f7a
SHA51237cc75321d556942ca19f5f4f2552286a3b3cbb7d0d3b5659a5f322f4b2e228fc5cebe5ca7ddd84b7d47f932cb910531a9e123fc40ea2f658cc2074d76536aad
-
Filesize
174KB
MD5bfea8f5e4c85a611bfb5cedba8bf941c
SHA1495d19da1a6615a5655c830d3d7806adf7c105e7
SHA256159d49f08bd4f7497c089318fe7794450a6c891b840fc517ada2a0e5df8b9270
SHA5120571557080360d47047a0f355ed4ba2a64b71221f73f3036b8ac9b06e6901dc6f8df34561c36d3b5e1fe7859a9dbcb3d5b6344dfab58170b5bc13a55a36b0bf5
-
Filesize
384KB
MD5c2a521cee3b4aac1f92a48fd3803c6a2
SHA1635a5fb377d1a16efbe93efae96fe10bdf1638d1
SHA2564f75dcc5952d4679c66124bbf9cf28759d6dd2714d395363a5ff1c3f0911c457
SHA512a799dbc6fd26cd45d6105de41730c8a1ba31490311123d4ed1061a70f5e46e44b859374e327bf885d5cd22389447fb2387143c661f520749c97414009ea2a980
-
Filesize
202KB
MD5695025a4ce6d5f8e7e80b12e273d0b47
SHA1df47785e8e9a26bb823b730c0a973eca04ca141f
SHA2562ef88475f02b5367cc950a1eecba258d38e4b13d92728b003a44b0a9da90ffdf
SHA5126deae214bc91fcb617be8d895a2db4a3fce6dcb3f420a5c2a5a527ebd8c3b6dbbec972ba63f77383e07834048be511fe269776c7324719c7418fcfe39d31cbbe
-
Filesize
337KB
MD5b48c7ccfd84728a8754ec473bdc21743
SHA13d9a5aa07379c7315a90f282e0c330cc2c152433
SHA2563e589f14ff50842ccc151e5ab6672b1fae03b80beb9e7ff59514269d98b40c40
SHA512d6984102701fd7be24f1ed47c21e4ccbfa1ff0f6c94ad0d7df746e3106d94033cbc41b62ed593bdf41b71bf20375a40916c6e6702657429c9c53344fa5602bec