Overview
overview
10Static
static
306f1b755da...d3.exe
windows10-2004-x64
1014b33a31c1...19.exe
windows10-2004-x64
1016f3c19a7f...1a.exe
windows10-2004-x64
10192ce44be6...d3.exe
windows10-2004-x64
10208bd49be4...cf.exe
windows10-2004-x64
102ae8e0e720...19.exe
windows10-2004-x64
102b74e820a6...32.exe
windows10-2004-x64
10396631ba37...a0.exe
windows10-2004-x64
10777259b2de...25.exe
windows10-2004-x64
107f06170b1d...e6.exe
windows10-2004-x64
1080f9db3963...66.exe
windows10-2004-x64
108d2837f05f...42.exe
windows10-2004-x64
109a7ee6b801...e4.exe
windows10-2004-x64
109c8e4ed081...a3.exe
windows10-2004-x64
10a68c5e94f5...52.exe
windows10-2004-x64
10aaed2c62a2...28.exe
windows10-2004-x64
10e097574588...fe.exe
windows10-2004-x64
10e256d9f4b9...eb.exe
windows10-2004-x64
10f02caa1867...71.exe
windows10-2004-x64
10f7447a8c0b...af.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 10:02
Static task
static1
Behavioral task
behavioral1
Sample
06f1b755da951fcf461e1c619e531208a68c60a692e3a2869f7207254aaea1d3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
14b33a31c14eae72ffc4a46234312cb8185f3b8d087a90be3174c01ccc3efe19.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
16f3c19a7f77c85baa3e8093067307517cb39818cb998de30b713a8353835c1a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
192ce44be6557d6d98a2de008c00df07b0f5063ea96bbd2751389b1f82c5f6d3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
208bd49be44846fa019a8a4b21da09b934676de6c05e6688624fa6608f3917cf.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
2ae8e0e7200682b017c2fa4be81c84b2547e0238ade702b5112641b6b336bc19.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
2b74e820a68dd1debb652cc1750992f001f4f19c4e98e9c2bbce0139f6c42f32.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
396631ba370acc38e6f62756cecd042fc99d8150beb80483127f81430d279ca0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
777259b2de1e73f2f79c2edbd0a7a6b94de34bca7c3376f8e9aae8a4e44be025.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral10
Sample
7f06170b1d7c15c8654c820aed9d163b0f686b8b747df4651e3c2d91e1e1bee6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
80f9db396349ffd316d40f58b12121eb8671e0af591fa231cd1037ed80d55c66.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
8d2837f05ff43bc5c5c3734eb685c39e3ff19b27d50659b45d8404272838cc42.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
9a7ee6b801d877ebe30af54c64afce444a041f28ac9cb08964f0d97a0fa17fe4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
9c8e4ed08188524a9beb39dfd35cc3c50ed0a6344464afcdff53746ddccee6a3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
a68c5e94f561ee7f4e5edc6e64db2ccc6083a9a34acd478da0b5a3003a233e52.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
aaed2c62a2146133d41a2c878d138f90f6fd57a1173b0784f6516128378b0e28.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
e0975745886991171c59c0c9a7b781238f54c7dbc7be68e29315487b94f3cafe.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
e256d9f4b9031db67a2e5cd1574fceafc35d62734d1079c433dd19867ee9c3eb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
f02caa18679b8af0e356c5ecf5b840b3c4f001b4c623c0cf33686d9cf4111871.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f7447a8c0bbf4733ba4bef9129e0bcb98bcfe4fd1b57d2ec4e9349b333329aaf.exe
Resource
win10v2004-20240426-en
General
-
Target
8d2837f05ff43bc5c5c3734eb685c39e3ff19b27d50659b45d8404272838cc42.exe
-
Size
1.2MB
-
MD5
8c1c0914a0def51e04e998dd838101cd
-
SHA1
b87baade2891a73a85efed31f915502e52ac9c8a
-
SHA256
8d2837f05ff43bc5c5c3734eb685c39e3ff19b27d50659b45d8404272838cc42
-
SHA512
2a5cbd449be690d512471ca0a3d1c3a8e1e6f88e31cb92cc01c007c418f90f4194f5b4d25c1d8781957be8a050617e21ca7eec9212bc5bac2db0c35db1160b55
-
SSDEEP
24576:nybWEzJzFzI7rAK+1QrZkCcedGcTkWKRLGFA34cMaxHzq96AuR6r6SR6T5Es:ybWEzNFzI/AK+1QaCcedGKkT3vxTqUyf
Malware Config
Extracted
amadey
3.87
59b440
http://77.91.68.18
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
-
url_paths
/nice/index.php
Extracted
redline
mrak
77.91.124.82:19071
-
auth_value
7d9a335ab5dfd42d374867c96fe25302
Signatures
-
Detect Mystic stealer payload 1 IoCs
resource yara_rule behavioral12/files/0x00070000000233d8-38.dat mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral12/files/0x00070000000233d5-41.dat family_redline behavioral12/memory/4732-43-0x0000000000C90000-0x0000000000CC0000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation l6060572.exe Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation saves.exe -
Executes dropped EXE 9 IoCs
pid Process 5052 y5814265.exe 4632 y0727749.exe 3424 y4415555.exe 3404 l6060572.exe 1496 saves.exe 5068 m1961210.exe 4732 n3786566.exe 4392 saves.exe 4516 saves.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8d2837f05ff43bc5c5c3734eb685c39e3ff19b27d50659b45d8404272838cc42.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y5814265.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y0727749.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y4415555.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4132 schtasks.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 4436 wrote to memory of 5052 4436 8d2837f05ff43bc5c5c3734eb685c39e3ff19b27d50659b45d8404272838cc42.exe 82 PID 4436 wrote to memory of 5052 4436 8d2837f05ff43bc5c5c3734eb685c39e3ff19b27d50659b45d8404272838cc42.exe 82 PID 4436 wrote to memory of 5052 4436 8d2837f05ff43bc5c5c3734eb685c39e3ff19b27d50659b45d8404272838cc42.exe 82 PID 5052 wrote to memory of 4632 5052 y5814265.exe 83 PID 5052 wrote to memory of 4632 5052 y5814265.exe 83 PID 5052 wrote to memory of 4632 5052 y5814265.exe 83 PID 4632 wrote to memory of 3424 4632 y0727749.exe 84 PID 4632 wrote to memory of 3424 4632 y0727749.exe 84 PID 4632 wrote to memory of 3424 4632 y0727749.exe 84 PID 3424 wrote to memory of 3404 3424 y4415555.exe 85 PID 3424 wrote to memory of 3404 3424 y4415555.exe 85 PID 3424 wrote to memory of 3404 3424 y4415555.exe 85 PID 3404 wrote to memory of 1496 3404 l6060572.exe 87 PID 3404 wrote to memory of 1496 3404 l6060572.exe 87 PID 3404 wrote to memory of 1496 3404 l6060572.exe 87 PID 3424 wrote to memory of 5068 3424 y4415555.exe 88 PID 3424 wrote to memory of 5068 3424 y4415555.exe 88 PID 3424 wrote to memory of 5068 3424 y4415555.exe 88 PID 4632 wrote to memory of 4732 4632 y0727749.exe 89 PID 4632 wrote to memory of 4732 4632 y0727749.exe 89 PID 4632 wrote to memory of 4732 4632 y0727749.exe 89 PID 1496 wrote to memory of 4132 1496 saves.exe 90 PID 1496 wrote to memory of 4132 1496 saves.exe 90 PID 1496 wrote to memory of 4132 1496 saves.exe 90 PID 1496 wrote to memory of 2412 1496 saves.exe 92 PID 1496 wrote to memory of 2412 1496 saves.exe 92 PID 1496 wrote to memory of 2412 1496 saves.exe 92 PID 2412 wrote to memory of 1768 2412 cmd.exe 94 PID 2412 wrote to memory of 1768 2412 cmd.exe 94 PID 2412 wrote to memory of 1768 2412 cmd.exe 94 PID 2412 wrote to memory of 3544 2412 cmd.exe 95 PID 2412 wrote to memory of 3544 2412 cmd.exe 95 PID 2412 wrote to memory of 3544 2412 cmd.exe 95 PID 2412 wrote to memory of 2796 2412 cmd.exe 96 PID 2412 wrote to memory of 2796 2412 cmd.exe 96 PID 2412 wrote to memory of 2796 2412 cmd.exe 96 PID 2412 wrote to memory of 4508 2412 cmd.exe 97 PID 2412 wrote to memory of 4508 2412 cmd.exe 97 PID 2412 wrote to memory of 4508 2412 cmd.exe 97 PID 2412 wrote to memory of 4712 2412 cmd.exe 98 PID 2412 wrote to memory of 4712 2412 cmd.exe 98 PID 2412 wrote to memory of 4712 2412 cmd.exe 98 PID 2412 wrote to memory of 4356 2412 cmd.exe 99 PID 2412 wrote to memory of 4356 2412 cmd.exe 99 PID 2412 wrote to memory of 4356 2412 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d2837f05ff43bc5c5c3734eb685c39e3ff19b27d50659b45d8404272838cc42.exe"C:\Users\Admin\AppData\Local\Temp\8d2837f05ff43bc5c5c3734eb685c39e3ff19b27d50659b45d8404272838cc42.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5814265.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5814265.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0727749.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0727749.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y4415555.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y4415555.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l6060572.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\l6060572.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F7⤵
- Creates scheduled task(s)
PID:4132
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit7⤵
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:1768
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"8⤵PID:3544
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E8⤵PID:2796
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"8⤵PID:4508
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"8⤵PID:4712
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E8⤵PID:4356
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m1961210.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\m1961210.exe5⤵
- Executes dropped EXE
PID:5068
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n3786566.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\n3786566.exe4⤵
- Executes dropped EXE
PID:4732
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4392
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5aa4d4ad338e8e551114d9d85f2a031a4
SHA135f60dde4386e20b755ef41c437b2c1ce1716c1a
SHA2564d1b51d579d3fe54ae45157358809f193325e900b72ed6ebb0f2110d4e03acf3
SHA512ab40ad5ea4aef4be07d03240003baabddb37f4aa2104b92a239c5e65551cfa14d16b9a13e2172364bf13a7c659a6ad63f0df58fdae4385e8875d073f7f2f631e
-
Filesize
475KB
MD58ac394bb457b45f64caa8510e90284e9
SHA125a8038634e2d9bbe11bf62fbdf301c1792c94be
SHA256fc8d9d51877cae60f1229e0502e634edabb0c0047e5fa2123bdf3d806be86ff3
SHA512c5be52edf7e76a2436bc531a50f4502adfce3677b44c6f0d82e32891e947528defe289510e288ed1ca96d146cf6d12e94dd801b6505ed6bd7d0de2f0473c95ff
-
Filesize
174KB
MD58d32340fdf8442a241158774abb34e19
SHA19ebef518b75d702fbaa1e7e9b3633d5cca25ec14
SHA25626439ad1a73d2b60e18639cc5881edd14c95ccad667a48ddd2a62083cf80b4b4
SHA5127ff44388e36b102056df4f218fc642e90f87290f69b4de0adb86214cdf0c0dca1cf9cc9eaefc287f603f12a89fc7cff7e474b11e1af7c8d62d1727e312bdbca5
-
Filesize
319KB
MD5fcb1f8e59c9bfbd8327b0bd981d3a8a7
SHA129304a7017ba311eac729688ee076f165b9b34f4
SHA2568d06fe3e0d8770dc1535fc0bb0c6b23bb07b06d713bc9d61e3aae530ec85c1a9
SHA512f897a61270c73797b273936a9526782762d74669cb8de7c7dd59596b99e9c89a9a41e5c6774f3eaaf0e99c6c4e203910d89e7a5ba2e2f92077ccfc99ac801900
-
Filesize
337KB
MD5408d61c25ae8e8a4f0e393420d122653
SHA13f30e056d27cc60bac5897e0101ddf77eb6c3e75
SHA25662d857831a501237da194659ff2526d90eec828ea04ba4cc6486422d52aae26d
SHA512c8b1c1310e175cc382e58e41cae53cfeb72417e0a96addcb8c329e567a5bf25005aa6f953bef2a729f7586f4cb15ffb99a19512ce7e7828f225997caf160d72c
-
Filesize
142KB
MD5324905fc85eb390c1ef3e707a7a589ba
SHA16bce9aac9311620dc2a096dcb608e53f9d0a3263
SHA2569a111fa4a6fa5ccd2cb5cd55b0e8ee6423ea3bf62ee657527b0093d62b238a66
SHA5123db649b624fc684a2bb8ee228d0ef2eac8bdf352b31b7c2bfe4030a5e2aa561549e7712e03ea32a5b6017d11d9b15cce0093060a27df937894fb2791485f9f2b