Overview
overview
10Static
static
306f1b755da...d3.exe
windows10-2004-x64
1014b33a31c1...19.exe
windows10-2004-x64
1016f3c19a7f...1a.exe
windows10-2004-x64
10192ce44be6...d3.exe
windows10-2004-x64
10208bd49be4...cf.exe
windows10-2004-x64
102ae8e0e720...19.exe
windows10-2004-x64
102b74e820a6...32.exe
windows10-2004-x64
10396631ba37...a0.exe
windows10-2004-x64
10777259b2de...25.exe
windows10-2004-x64
107f06170b1d...e6.exe
windows10-2004-x64
1080f9db3963...66.exe
windows10-2004-x64
108d2837f05f...42.exe
windows10-2004-x64
109a7ee6b801...e4.exe
windows10-2004-x64
109c8e4ed081...a3.exe
windows10-2004-x64
10a68c5e94f5...52.exe
windows10-2004-x64
10aaed2c62a2...28.exe
windows10-2004-x64
10e097574588...fe.exe
windows10-2004-x64
10e256d9f4b9...eb.exe
windows10-2004-x64
10f02caa1867...71.exe
windows10-2004-x64
10f7447a8c0b...af.exe
windows10-2004-x64
10Analysis
-
max time kernel
134s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 10:02
Static task
static1
Behavioral task
behavioral1
Sample
06f1b755da951fcf461e1c619e531208a68c60a692e3a2869f7207254aaea1d3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
14b33a31c14eae72ffc4a46234312cb8185f3b8d087a90be3174c01ccc3efe19.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
16f3c19a7f77c85baa3e8093067307517cb39818cb998de30b713a8353835c1a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
192ce44be6557d6d98a2de008c00df07b0f5063ea96bbd2751389b1f82c5f6d3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
208bd49be44846fa019a8a4b21da09b934676de6c05e6688624fa6608f3917cf.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
2ae8e0e7200682b017c2fa4be81c84b2547e0238ade702b5112641b6b336bc19.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
2b74e820a68dd1debb652cc1750992f001f4f19c4e98e9c2bbce0139f6c42f32.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
396631ba370acc38e6f62756cecd042fc99d8150beb80483127f81430d279ca0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
777259b2de1e73f2f79c2edbd0a7a6b94de34bca7c3376f8e9aae8a4e44be025.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral10
Sample
7f06170b1d7c15c8654c820aed9d163b0f686b8b747df4651e3c2d91e1e1bee6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
80f9db396349ffd316d40f58b12121eb8671e0af591fa231cd1037ed80d55c66.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
8d2837f05ff43bc5c5c3734eb685c39e3ff19b27d50659b45d8404272838cc42.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
9a7ee6b801d877ebe30af54c64afce444a041f28ac9cb08964f0d97a0fa17fe4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
9c8e4ed08188524a9beb39dfd35cc3c50ed0a6344464afcdff53746ddccee6a3.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
a68c5e94f561ee7f4e5edc6e64db2ccc6083a9a34acd478da0b5a3003a233e52.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
aaed2c62a2146133d41a2c878d138f90f6fd57a1173b0784f6516128378b0e28.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
e0975745886991171c59c0c9a7b781238f54c7dbc7be68e29315487b94f3cafe.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
e256d9f4b9031db67a2e5cd1574fceafc35d62734d1079c433dd19867ee9c3eb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
f02caa18679b8af0e356c5ecf5b840b3c4f001b4c623c0cf33686d9cf4111871.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
f7447a8c0bbf4733ba4bef9129e0bcb98bcfe4fd1b57d2ec4e9349b333329aaf.exe
Resource
win10v2004-20240426-en
General
-
Target
396631ba370acc38e6f62756cecd042fc99d8150beb80483127f81430d279ca0.exe
-
Size
1.1MB
-
MD5
491a1a616709c3545421cfe7e9a0a5fe
-
SHA1
6209307eb09238a51579b3edc7bfbde97c768f0d
-
SHA256
396631ba370acc38e6f62756cecd042fc99d8150beb80483127f81430d279ca0
-
SHA512
87a8177818b18120384e0bc87a8c708064220015e222f15803065883749afce38e2a5c5e9af6ddcf5f3f15ff18818a10290f5cd42a19095dcf11af9d779c9491
-
SSDEEP
24576:sy0xoIFWVsveTG7W2KWEbrHG0+1TryyzBEPx7Ff5F4LTmmgcDAg+j:bPIFWVs2TGS2KWEbrm0QyIqPD4TQ
Malware Config
Extracted
amadey
3.87
59b440
http://77.91.68.18
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
-
url_paths
/nice/index.php
Extracted
redline
mrak
77.91.124.82:19071
-
auth_value
7d9a335ab5dfd42d374867c96fe25302
Signatures
-
Detect Mystic stealer payload 1 IoCs
resource yara_rule behavioral8/files/0x0007000000023571-32.dat mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral8/files/0x000700000002356e-34.dat family_redline behavioral8/memory/1204-36-0x0000000000EC0000-0x0000000000EF0000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation l3899700.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation saves.exe -
Executes dropped EXE 8 IoCs
pid Process 3348 y2074372.exe 4308 y8785424.exe 3968 l3899700.exe 3988 saves.exe 4384 m4533809.exe 1204 n8784361.exe 396 saves.exe 1948 saves.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 396631ba370acc38e6f62756cecd042fc99d8150beb80483127f81430d279ca0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y2074372.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y8785424.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3444 schtasks.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4712 wrote to memory of 3348 4712 396631ba370acc38e6f62756cecd042fc99d8150beb80483127f81430d279ca0.exe 90 PID 4712 wrote to memory of 3348 4712 396631ba370acc38e6f62756cecd042fc99d8150beb80483127f81430d279ca0.exe 90 PID 4712 wrote to memory of 3348 4712 396631ba370acc38e6f62756cecd042fc99d8150beb80483127f81430d279ca0.exe 90 PID 3348 wrote to memory of 4308 3348 y2074372.exe 91 PID 3348 wrote to memory of 4308 3348 y2074372.exe 91 PID 3348 wrote to memory of 4308 3348 y2074372.exe 91 PID 4308 wrote to memory of 3968 4308 y8785424.exe 92 PID 4308 wrote to memory of 3968 4308 y8785424.exe 92 PID 4308 wrote to memory of 3968 4308 y8785424.exe 92 PID 3968 wrote to memory of 3988 3968 l3899700.exe 93 PID 3968 wrote to memory of 3988 3968 l3899700.exe 93 PID 3968 wrote to memory of 3988 3968 l3899700.exe 93 PID 4308 wrote to memory of 4384 4308 y8785424.exe 94 PID 4308 wrote to memory of 4384 4308 y8785424.exe 94 PID 4308 wrote to memory of 4384 4308 y8785424.exe 94 PID 3348 wrote to memory of 1204 3348 y2074372.exe 95 PID 3348 wrote to memory of 1204 3348 y2074372.exe 95 PID 3348 wrote to memory of 1204 3348 y2074372.exe 95 PID 3988 wrote to memory of 3444 3988 saves.exe 96 PID 3988 wrote to memory of 3444 3988 saves.exe 96 PID 3988 wrote to memory of 3444 3988 saves.exe 96 PID 3988 wrote to memory of 2280 3988 saves.exe 98 PID 3988 wrote to memory of 2280 3988 saves.exe 98 PID 3988 wrote to memory of 2280 3988 saves.exe 98 PID 2280 wrote to memory of 3088 2280 cmd.exe 100 PID 2280 wrote to memory of 3088 2280 cmd.exe 100 PID 2280 wrote to memory of 3088 2280 cmd.exe 100 PID 2280 wrote to memory of 5060 2280 cmd.exe 101 PID 2280 wrote to memory of 5060 2280 cmd.exe 101 PID 2280 wrote to memory of 5060 2280 cmd.exe 101 PID 2280 wrote to memory of 1588 2280 cmd.exe 102 PID 2280 wrote to memory of 1588 2280 cmd.exe 102 PID 2280 wrote to memory of 1588 2280 cmd.exe 102 PID 2280 wrote to memory of 3940 2280 cmd.exe 103 PID 2280 wrote to memory of 3940 2280 cmd.exe 103 PID 2280 wrote to memory of 3940 2280 cmd.exe 103 PID 2280 wrote to memory of 4228 2280 cmd.exe 104 PID 2280 wrote to memory of 4228 2280 cmd.exe 104 PID 2280 wrote to memory of 4228 2280 cmd.exe 104 PID 2280 wrote to memory of 556 2280 cmd.exe 105 PID 2280 wrote to memory of 556 2280 cmd.exe 105 PID 2280 wrote to memory of 556 2280 cmd.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\396631ba370acc38e6f62756cecd042fc99d8150beb80483127f81430d279ca0.exe"C:\Users\Admin\AppData\Local\Temp\396631ba370acc38e6f62756cecd042fc99d8150beb80483127f81430d279ca0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2074372.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2074372.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8785424.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8785424.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l3899700.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l3899700.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F6⤵
- Creates scheduled task(s)
PID:3444
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3088
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"7⤵PID:5060
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E7⤵PID:1588
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3940
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"7⤵PID:4228
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E7⤵PID:556
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\m4533809.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\m4533809.exe4⤵
- Executes dropped EXE
PID:4384
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n8784361.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\n8784361.exe3⤵
- Executes dropped EXE
PID:1204
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=4356,i,5047420736443372512,9747851268033796534,262144 --variations-seed-version --mojo-platform-channel-handle=4404 /prefetch:81⤵PID:4020
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:396
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:1948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
475KB
MD5f86647f1907c42d569b9f0ffbed99161
SHA1251b7c5a5272d6b78b10da2851b47cf174dfc3a6
SHA256e1e7d7c1d59065d07e4fba642299af5fb55b58b3474006c6e7bc814e3fbec2d8
SHA51282a0d5365387cbb87059d1295c9235414dbeb9b9442c242595b073a4fae753a4f1d56059801029f6878338b1ab400ca66310ff0f5d03bfe6ef5eafa1a4e96879
-
Filesize
173KB
MD5071262ed56f897e2b659d87090755554
SHA1e9b977339b8fcfb7163cd09dfe0ca3225d81fcd5
SHA2569e1b48b291ec682abadcb2724de66c9ff9ba6275b33f1c390093145b76402a1b
SHA512b14c2ff9cad5dee07e6f8662c45742a9708c19811e5fd437bb9189dc6e0b5ccb44594e8f1a03c47eebf81dc9bfa1f898816cf54774a45fc7fe76a6b44bbda9e2
-
Filesize
320KB
MD57586ac961fc6fe8ea3fb77df78713e2b
SHA1caeb831cb4e16c719488a160ff25b0b7bce02489
SHA256884358d16ddaa1a81d30ee28f422753fdd28aca70c7258bd10bcf8074a2eb113
SHA512f1b1934493227b3d67daab4016f047712611483fa7016038ff362e3bb1ba05b7b76cf55d082384d90122740b70923a87fb06c98d42cad0914cc4cd27392787f5
-
Filesize
336KB
MD5c303d5cd4b1189cd2b31500998b22eb4
SHA1e1fa90ea9d75e87b2a828b50bb4e4d5cdfd6d8b7
SHA256da9da65281f19ab42e591901d772f89f3e66046152684d2fb033967d0d6cfca3
SHA512fb50f13bf81f843fe2c2941a3b4c80677d35ce117ce89a9cee490c538690394f9835e3c08ea45322b4ebf54f31cd4296a79fc12a6df89f4d15d5ec72c4019572
-
Filesize
141KB
MD563491b31eedba73a8f01f2a5205cc933
SHA1cbd8accb0bfe1fb9c68126f9e3de2613f89aa46b
SHA25686b6efaa8af43464a82c8dbcd6e57f1028c69bb3e1a24f32320a18d6d3140f54
SHA512855a44c735c32dc10db606e26d18dd2e4e2e2c42db63c1ef70a534abde85748b852accad7828ad12a8af8fc836f7d68492ecca7fb994160b3a804a6bab8841f3