Overview
overview
10Static
static
3169827445a...fd.exe
windows10-2004-x64
102c5911fd0a...9f.exe
windows10-2004-x64
103d26ff1c7f...6f.exe
windows10-2004-x64
104316c9cb7f...d5.exe
windows10-2004-x64
10453554affb...f6.exe
windows10-2004-x64
104be48036db...87.exe
windows10-2004-x64
106843058b07...7b.exe
windows10-2004-x64
106ab7739b7f...d6.exe
windows10-2004-x64
10741b5d1728...11.exe
windows10-2004-x64
107dbaeca4ac...3f.exe
windows7-x64
107dbaeca4ac...3f.exe
windows10-2004-x64
10889f2baa64...76.exe
windows10-2004-x64
1092288ddafe...85.exe
windows10-2004-x64
109697ffb24d...50.exe
windows10-2004-x64
10abd0fa453e...b8.exe
windows10-2004-x64
10b28f0b1322...38.exe
windows10-2004-x64
10d89a055085...df.exe
windows10-2004-x64
10db77a8c068...dc.exe
windows7-x64
10db77a8c068...dc.exe
windows10-2004-x64
10e00e311d45...53.exe
windows10-2004-x64
10e0990290e3...28.exe
windows10-2004-x64
10fedbb32d49...4c.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 09:56
Static task
static1
Behavioral task
behavioral1
Sample
169827445a78f6e1cde6f851fe18dbe8b5850a2768cb303f453ceaacfe59d6fd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
2c5911fd0a616aa00118b87a5216b4c3312dd590b4988b62bf0651b91fc5b29f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
3d26ff1c7f2a98b2c2c03ddc43bd17ad629931d425986a46cb7ba3ef54b1ba6f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
4316c9cb7f9e1a073313300df45a90e9457dec01ec27e4f7c9725091247276d5.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
453554affb4477ef1397310265a6a90ae0953e5bca58d9b7b98e7323e7cccdf6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
4be48036db804507d4009d7d5ef56ad2feeb011ce624c73eef68521a4acf1687.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
6843058b079dbc0a22ff6542bd36408373534e51519828b2e5059a1c3a0a837b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
6ab7739b7f0b5cc84bf55cd6f09beb3d4860ec6428202c54e8e023161020c8d6.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
741b5d17281b7e19ee8dd529a91b547c0bdf8938c84539f745ec882d49373311.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral10
Sample
7dbaeca4ac219449e315df2bb20e786dfc5c304cb5d522d6e15619a91276ba3f.exe
Resource
win7-20240221-en
Behavioral task
behavioral11
Sample
7dbaeca4ac219449e315df2bb20e786dfc5c304cb5d522d6e15619a91276ba3f.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
889f2baa640211bf12947cfab6157ff93a774d0b4ed9568df0eb65952cedf576.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
92288ddafeaa0f77357b90005f63961458788f6cd7af44be378bd1de6a725c85.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
9697ffb24dfe38f4a40e3cf91464543c6f5a47170c56b58a949e1a93ab9df050.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
abd0fa453ed59d06e5c3d6cbafe873f404a47cab8f3c4bcd545fdfa7491ff4b8.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
b28f0b13221fc5aaa297029cc7c28a22c5b5dfe8aa6626036342ae0b862d8838.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
d89a0550853b7067190a4816c540a6838fc7703bf9df0665fc491c92feb72adf.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
db77a8c0688fc65498578d6fb53ea4154ece1d8d958e3b911f81835c8aa908dc.exe
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
db77a8c0688fc65498578d6fb53ea4154ece1d8d958e3b911f81835c8aa908dc.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral20
Sample
e00e311d4566f8b67392f945545d0e1ea579af2fa76c416042196eea3ca75753.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
e0990290e38dc94b3c6a8bd8d028c230706f11717bdc17beb40d9a73dcfb2628.exe
Resource
win10v2004-20240426-en
General
-
Target
4be48036db804507d4009d7d5ef56ad2feeb011ce624c73eef68521a4acf1687.exe
-
Size
476KB
-
MD5
1f97ceddfda581c9ec60046f75303998
-
SHA1
46877392054ca0be8a14c4e1d9b3d29e07207dab
-
SHA256
4be48036db804507d4009d7d5ef56ad2feeb011ce624c73eef68521a4acf1687
-
SHA512
fa8de06624492e47336c1df59269b2ce95aa73016f75f50514bc8e7d72d5fd3d453cb9af4b4a7673b91f3582b5ac639f264f674de11beb0cec2535f66a9ae076
-
SSDEEP
6144:Kzy+bnr+up0yN90QE8nNKUZvdbWjVJGZ0KbFOfs/jfh3Q+KRFgEXtaBv7+hKBfsR:FMr+y90WnrFz75g+KRuEXYp7nBfBp45
Malware Config
Extracted
amadey
3.87
59b440
http://77.91.68.18
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
-
url_paths
/nice/index.php
Extracted
redline
mrak
77.91.124.82:19071
-
auth_value
7d9a335ab5dfd42d374867c96fe25302
Signatures
-
Detect Mystic stealer payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s4839651.exe mystic_family -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule behavioral6/memory/2984-29-0x0000000000D00000-0x0000000000D30000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t2557588.exe family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
r6888122.exesaves.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation r6888122.exe Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation saves.exe -
Executes dropped EXE 7 IoCs
Processes:
z0625404.exer6888122.exesaves.exes4839651.exet2557588.exesaves.exesaves.exepid process 2948 z0625404.exe 4732 r6888122.exe 60 saves.exe 2212 s4839651.exe 2984 t2557588.exe 3896 saves.exe 1900 saves.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
4be48036db804507d4009d7d5ef56ad2feeb011ce624c73eef68521a4acf1687.exez0625404.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4be48036db804507d4009d7d5ef56ad2feeb011ce624c73eef68521a4acf1687.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z0625404.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of WriteProcessMemory 39 IoCs
Processes:
4be48036db804507d4009d7d5ef56ad2feeb011ce624c73eef68521a4acf1687.exez0625404.exer6888122.exesaves.execmd.exedescription pid process target process PID 4172 wrote to memory of 2948 4172 4be48036db804507d4009d7d5ef56ad2feeb011ce624c73eef68521a4acf1687.exe z0625404.exe PID 4172 wrote to memory of 2948 4172 4be48036db804507d4009d7d5ef56ad2feeb011ce624c73eef68521a4acf1687.exe z0625404.exe PID 4172 wrote to memory of 2948 4172 4be48036db804507d4009d7d5ef56ad2feeb011ce624c73eef68521a4acf1687.exe z0625404.exe PID 2948 wrote to memory of 4732 2948 z0625404.exe r6888122.exe PID 2948 wrote to memory of 4732 2948 z0625404.exe r6888122.exe PID 2948 wrote to memory of 4732 2948 z0625404.exe r6888122.exe PID 4732 wrote to memory of 60 4732 r6888122.exe saves.exe PID 4732 wrote to memory of 60 4732 r6888122.exe saves.exe PID 4732 wrote to memory of 60 4732 r6888122.exe saves.exe PID 2948 wrote to memory of 2212 2948 z0625404.exe s4839651.exe PID 2948 wrote to memory of 2212 2948 z0625404.exe s4839651.exe PID 2948 wrote to memory of 2212 2948 z0625404.exe s4839651.exe PID 4172 wrote to memory of 2984 4172 4be48036db804507d4009d7d5ef56ad2feeb011ce624c73eef68521a4acf1687.exe t2557588.exe PID 4172 wrote to memory of 2984 4172 4be48036db804507d4009d7d5ef56ad2feeb011ce624c73eef68521a4acf1687.exe t2557588.exe PID 4172 wrote to memory of 2984 4172 4be48036db804507d4009d7d5ef56ad2feeb011ce624c73eef68521a4acf1687.exe t2557588.exe PID 60 wrote to memory of 1964 60 saves.exe schtasks.exe PID 60 wrote to memory of 1964 60 saves.exe schtasks.exe PID 60 wrote to memory of 1964 60 saves.exe schtasks.exe PID 60 wrote to memory of 4796 60 saves.exe cmd.exe PID 60 wrote to memory of 4796 60 saves.exe cmd.exe PID 60 wrote to memory of 4796 60 saves.exe cmd.exe PID 4796 wrote to memory of 1716 4796 cmd.exe cmd.exe PID 4796 wrote to memory of 1716 4796 cmd.exe cmd.exe PID 4796 wrote to memory of 1716 4796 cmd.exe cmd.exe PID 4796 wrote to memory of 2008 4796 cmd.exe cacls.exe PID 4796 wrote to memory of 2008 4796 cmd.exe cacls.exe PID 4796 wrote to memory of 2008 4796 cmd.exe cacls.exe PID 4796 wrote to memory of 3404 4796 cmd.exe cacls.exe PID 4796 wrote to memory of 3404 4796 cmd.exe cacls.exe PID 4796 wrote to memory of 3404 4796 cmd.exe cacls.exe PID 4796 wrote to memory of 1508 4796 cmd.exe cmd.exe PID 4796 wrote to memory of 1508 4796 cmd.exe cmd.exe PID 4796 wrote to memory of 1508 4796 cmd.exe cmd.exe PID 4796 wrote to memory of 4848 4796 cmd.exe cacls.exe PID 4796 wrote to memory of 4848 4796 cmd.exe cacls.exe PID 4796 wrote to memory of 4848 4796 cmd.exe cacls.exe PID 4796 wrote to memory of 3212 4796 cmd.exe cacls.exe PID 4796 wrote to memory of 3212 4796 cmd.exe cacls.exe PID 4796 wrote to memory of 3212 4796 cmd.exe cacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4be48036db804507d4009d7d5ef56ad2feeb011ce624c73eef68521a4acf1687.exe"C:\Users\Admin\AppData\Local\Temp\4be48036db804507d4009d7d5ef56ad2feeb011ce624c73eef68521a4acf1687.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0625404.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0625404.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6888122.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6888122.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F5⤵
- Creates scheduled task(s)
PID:1964
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1716
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"6⤵PID:2008
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E6⤵PID:3404
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1508
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"6⤵PID:4848
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E6⤵PID:3212
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s4839651.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s4839651.exe3⤵
- Executes dropped EXE
PID:2212
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t2557588.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\t2557588.exe2⤵
- Executes dropped EXE
PID:2984
-
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:3896
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:1900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
174KB
MD501ee06badc69d433b00e86d9470d913b
SHA12db998f2f388f3e9c2a4526fd2a03110e254a0b3
SHA256e31f4292ca9c86113f6c396cd537caab35451b0840a4d3a12ce40823f46fc31f
SHA51257680a2ab80f8020053d58b64caed2263b321b69bd7700f7986ade20fd9451341f9e868e0a2d3749f8bfe98e07ff4f20c3e454f24a5d6bc6fa175444a6bf2dbb
-
Filesize
320KB
MD5f88f7827d88253cf38cdb887fbb5c255
SHA183e5c7652ec7699f9f18c28c3fc1e846234a46ef
SHA25627a01654c39051987d670d7b762a6b543ff80af71d8c9b116c7f9794490355c0
SHA512f277f7ede2e3658c165e4674d4de3d199ea108c7d88b53f9373ea7ac0543014b876ffe57c8d53e2a52b4b5ceed1e7f15890f85d5eea7ef4c5c37b5015e910416
-
Filesize
337KB
MD5a42d6158cc5dbd66ba3e36efe268aa0b
SHA1526e8f3db8b47b9bbd640e902b25671abfe24016
SHA2563bd0dea6d199b48c8ea787136c7c973fa5ca50bdcc21391777a4cb5a486111bb
SHA51263ddef981bcc88b68798698eadf28541183feab585ed3322509df1dab219c21f8f75f85cbd334abaed753c3b6d73fbaf54665f44b6f95106a54b8a6612225da7
-
Filesize
142KB
MD596b43a16b427e278730ace6aa223376b
SHA12e135735479761b8223e6f206f1fb5cfb30ab93a
SHA256dda098266842d041ce3f9ec2c70d8bb2999a1135fe574307dac628e7692e3210
SHA5125648c52430fc119e03879779ccfa2632888db160eeb776322b0e927397b1c02b006886558f726e1be20cff7da430fb304ab6b61c04f12194d268c02df8797b36