Overview
overview
10Static
static
31bd70f5afc...20.exe
windows10-2004-x64
1020d5ad811e...b7.exe
windows10-2004-x64
102ca6e4b470...97.exe
windows10-2004-x64
1030323f682e...18.exe
windows10-2004-x64
10426e1b8066...18.exe
windows10-2004-x64
1043ea4b5927...9e.exe
windows10-2004-x64
1044ba27c950...f2.exe
windows10-2004-x64
106e35231281...45.exe
windows10-2004-x64
107cac44d1ec...c4.exe
windows10-2004-x64
10823db2b88d...40.exe
windows10-2004-x64
10a884418225...db.exe
windows10-2004-x64
10c68d91a00f...d2.exe
windows10-2004-x64
10cabcad649e...d3.exe
windows7-x64
10cabcad649e...d3.exe
windows10-2004-x64
10cb4c64011d...ef.exe
windows10-2004-x64
10d55f431b8e...57.exe
windows10-2004-x64
10dea00ebf60...e0.exe
windows10-2004-x64
10e017c199a6...9b.exe
windows10-2004-x64
10e01acda385...7b.exe
windows10-2004-x64
10e46b62442d...14.exe
windows10-2004-x64
10ef7029b98b...78.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 09:42
Static task
static1
Behavioral task
behavioral1
Sample
1bd70f5afcc29724401d52710f012058d999560c75bde3fd609f66ffc0bd9720.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
20d5ad811e156e522c088718e9fad42c9719bbca8aa4b3f144c468550177d6b7.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
2ca6e4b470413b98976384ac3e479028c30b8486b2ebb4a4dd8e4e2142faac97.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
30323f682e6a32aa6d849428448a5ebd9b9590ee3a331da4fd2f5934b4c13818.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
426e1b8066ed7b417a0887d9af5ab1436b8302f01a33910c8c64da68d5b06c18.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral6
Sample
43ea4b5927abdf60c2312374034e3b21c33a1082d31190027a6b747b84aef49e.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
44ba27c950b0c14f429cb6252215fa6bdf9cb6c714a1890cbaae75274f91f4f2.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
6e352312813a28290ff0ff1a92702c185aae40663ba027e0a0c2d464d283d345.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
7cac44d1ecd3f5639f33ee135e671d1baab428e0ead20f5eae7b4d2be71debc4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
823db2b88de38daac96f8e746abe924341117f170be5cd8a57a2db86d001bc40.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
a8844182255c5383be20ec415b7286551bb27f4713458001503fbb103d2c31db.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral12
Sample
c68d91a00fd95a921391069a12b7eba5c82ab3db1e6c4d5868561527424cf5d2.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
cabcad649e33f7f4e2ee71f0de68902c08004e3587dd364c97b12d067acbd6d3.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
cabcad649e33f7f4e2ee71f0de68902c08004e3587dd364c97b12d067acbd6d3.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
cb4c64011df6d9448d6e9f657a89d6cc8dfd2b81fc8262bccfab2f05465c39ef.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral16
Sample
d55f431b8ea5ad86d41def5d797c360d619becd2b366e7210433952a81c4ac57.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
dea00ebf6034d535aea8f56cd6017972814dfb3374887346a9c9c8182c1110e0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
e017c199a693aee53fef17402d6258dee359f1092c5845f73d404e2646590b9b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
e01acda3856cc169ddd84def2f4c60a6487d82da3d3c35333bff09986229bd7b.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral20
Sample
e46b62442d214e617c5a6224fef70a4e5ed02b730b85396408e198e85f21eb14.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
ef7029b98b2432c74d1512668109e659b6f7e89d2d4469a291c54309ecec0878.exe
Resource
win10v2004-20240508-en
General
-
Target
a8844182255c5383be20ec415b7286551bb27f4713458001503fbb103d2c31db.exe
-
Size
540KB
-
MD5
e608e4390308014ed2506afc51f37aff
-
SHA1
76512e644442202163b9f2263e27f47419cf23a9
-
SHA256
a8844182255c5383be20ec415b7286551bb27f4713458001503fbb103d2c31db
-
SHA512
3207e41e9cd605f656c2ab67e3a1ecd6683a122997c1e2ce0c6d1d81cc386c0b35f63ccca8544666edefe5d0f62ed13f15e6e40f174f5c8165fc02ea7c258676
-
SSDEEP
12288:bMrWy908tzVcJEW7nALhp1z/px4WrIeZux1M0B:9yltezAtnRu3B
Malware Config
Extracted
amadey
3.87
59b440
http://77.91.68.18
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
-
url_paths
/nice/index.php
Extracted
redline
mrak
77.91.124.82:19071
-
auth_value
7d9a335ab5dfd42d374867c96fe25302
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g7009689.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g7009689.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g7009689.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g7009689.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection g7009689.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g7009689.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
resource yara_rule behavioral11/files/0x000700000002342f-64.dat family_redline behavioral11/memory/4356-66-0x0000000000460000-0x0000000000490000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation h4950174.exe Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation saves.exe -
Executes dropped EXE 8 IoCs
pid Process 3560 x9166939.exe 428 g7009689.exe 3988 h4950174.exe 856 saves.exe 4356 i4008213.exe 3200 saves.exe 4912 saves.exe 2744 saves.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features g7009689.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" g7009689.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a8844182255c5383be20ec415b7286551bb27f4713458001503fbb103d2c31db.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x9166939.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3896 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 428 g7009689.exe 428 g7009689.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 428 g7009689.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 732 wrote to memory of 3560 732 a8844182255c5383be20ec415b7286551bb27f4713458001503fbb103d2c31db.exe 82 PID 732 wrote to memory of 3560 732 a8844182255c5383be20ec415b7286551bb27f4713458001503fbb103d2c31db.exe 82 PID 732 wrote to memory of 3560 732 a8844182255c5383be20ec415b7286551bb27f4713458001503fbb103d2c31db.exe 82 PID 3560 wrote to memory of 428 3560 x9166939.exe 83 PID 3560 wrote to memory of 428 3560 x9166939.exe 83 PID 3560 wrote to memory of 428 3560 x9166939.exe 83 PID 3560 wrote to memory of 3988 3560 x9166939.exe 94 PID 3560 wrote to memory of 3988 3560 x9166939.exe 94 PID 3560 wrote to memory of 3988 3560 x9166939.exe 94 PID 3988 wrote to memory of 856 3988 h4950174.exe 95 PID 3988 wrote to memory of 856 3988 h4950174.exe 95 PID 3988 wrote to memory of 856 3988 h4950174.exe 95 PID 732 wrote to memory of 4356 732 a8844182255c5383be20ec415b7286551bb27f4713458001503fbb103d2c31db.exe 96 PID 732 wrote to memory of 4356 732 a8844182255c5383be20ec415b7286551bb27f4713458001503fbb103d2c31db.exe 96 PID 732 wrote to memory of 4356 732 a8844182255c5383be20ec415b7286551bb27f4713458001503fbb103d2c31db.exe 96 PID 856 wrote to memory of 3896 856 saves.exe 97 PID 856 wrote to memory of 3896 856 saves.exe 97 PID 856 wrote to memory of 3896 856 saves.exe 97 PID 856 wrote to memory of 4764 856 saves.exe 99 PID 856 wrote to memory of 4764 856 saves.exe 99 PID 856 wrote to memory of 4764 856 saves.exe 99 PID 4764 wrote to memory of 3508 4764 cmd.exe 101 PID 4764 wrote to memory of 3508 4764 cmd.exe 101 PID 4764 wrote to memory of 3508 4764 cmd.exe 101 PID 4764 wrote to memory of 3088 4764 cmd.exe 102 PID 4764 wrote to memory of 3088 4764 cmd.exe 102 PID 4764 wrote to memory of 3088 4764 cmd.exe 102 PID 4764 wrote to memory of 4544 4764 cmd.exe 103 PID 4764 wrote to memory of 4544 4764 cmd.exe 103 PID 4764 wrote to memory of 4544 4764 cmd.exe 103 PID 4764 wrote to memory of 2672 4764 cmd.exe 104 PID 4764 wrote to memory of 2672 4764 cmd.exe 104 PID 4764 wrote to memory of 2672 4764 cmd.exe 104 PID 4764 wrote to memory of 5096 4764 cmd.exe 105 PID 4764 wrote to memory of 5096 4764 cmd.exe 105 PID 4764 wrote to memory of 5096 4764 cmd.exe 105 PID 4764 wrote to memory of 2348 4764 cmd.exe 106 PID 4764 wrote to memory of 2348 4764 cmd.exe 106 PID 4764 wrote to memory of 2348 4764 cmd.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8844182255c5383be20ec415b7286551bb27f4713458001503fbb103d2c31db.exe"C:\Users\Admin\AppData\Local\Temp\a8844182255c5383be20ec415b7286551bb27f4713458001503fbb103d2c31db.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9166939.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9166939.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7009689.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7009689.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:428
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4950174.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4950174.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F5⤵
- Creates scheduled task(s)
PID:3896
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3508
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"6⤵PID:3088
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E6⤵PID:4544
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2672
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"6⤵PID:5096
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E6⤵PID:2348
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4008213.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4008213.exe2⤵
- Executes dropped EXE
PID:4356
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:3200
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:4912
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2744
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
174KB
MD56a20737a37ee24b3b28ed46548f871e1
SHA1615053da4812c8bf1814363bdeb7a09e6f62196c
SHA256e080d79e5cae4f7253db965101a7709fa1130356069e10ffea740150e2ecb482
SHA5120c9e04bec87bf7fe74306124c9ec63f56e9c0513f164653ae6725661f98586b64d73355c99c0c987b4beea0fdd7b4d48c9897a1b28045599c478cc43f251f472
-
Filesize
384KB
MD58dd96d3d419e69bb26fde5ca54470add
SHA13dda8297ae0462ac520bd7ad085bbecc21fe2229
SHA2565f4bf51f1afd24dc95fbe0df3839ada154901c53111431bb5ca5d769487c5e4a
SHA512199f63676c9c98692869574d0e73dd504f8fef30ce778443ffe3ddd5af7d41877c9b6a3e66fc9c2b915b300a4eba25129b24021a68c4903bfba35784ba1fc434
-
Filesize
202KB
MD5a797676be3b12d4ec8a29d6a30d63b94
SHA1a5d18568ca0c6ae8ab6d90f7a0241166625e4f63
SHA256520d4cbc21e534f0361fe9b7ace50f8b53e32b2eff4ebb43a256f774ddc959d7
SHA5122aef3216429bcbbfab677c69f185331a225f1e39579cd376e20fa1f892104bd19aa7146abf15f48190fdfc03606b02f1b77a0967a99b148e21b9373a01d9d6e8
-
Filesize
337KB
MD5bc140b49ea1c3ed0cf9ee0b650d6cc1f
SHA1b83c173a03dda654e1c9dd6f3025f88dd24e6c46
SHA2561ca720f59d0518d8c2fd5cbf6d42a1810e09e63119afe72305be29666a4b64ef
SHA5123044e9696780dfd3b6583c3c2b07c152970b70a161cb1714dcb65aef25741eac8d8fdf4bf6d85e6caf9189d832abd141160e954695ae6855d377b5ffc16023c3