Overview
overview
10Static
static
30bbde9df88...20.exe
windows10-2004-x64
1014381f89f8...62.exe
windows10-2004-x64
101c09c6faad...a0.exe
windows7-x64
31c09c6faad...a0.exe
windows10-2004-x64
101c8308039a...16.exe
windows7-x64
31c8308039a...16.exe
windows10-2004-x64
101fe4c883d2...6d.exe
windows10-2004-x64
10234b8aa959...d8.exe
windows10-2004-x64
10410e72302d...e8.exe
windows7-x64
3410e72302d...e8.exe
windows10-2004-x64
104431aa7413...8c.exe
windows7-x64
34431aa7413...8c.exe
windows10-2004-x64
1068f997d58c...e5.exe
windows10-2004-x64
10812ce70322...27.exe
windows10-2004-x64
1088a3f8285d...ab.exe
windows10-2004-x64
1090fdeaf3f0...a8.exe
windows7-x64
390fdeaf3f0...a8.exe
windows10-2004-x64
109d92aedf9d...9d.exe
windows7-x64
39d92aedf9d...9d.exe
windows10-2004-x64
109ff2fb6bb8...32.exe
windows10-2004-x64
10ac4e2e3d9d...dd.exe
windows7-x64
3ac4e2e3d9d...dd.exe
windows10-2004-x64
10b62483116d...b6.exe
windows10-2004-x64
10c901122f00...70.exe
windows10-2004-x64
10cfda8adb75...7f.exe
windows10-2004-x64
10dfe8591c80...49.exe
windows10-2004-x64
10f5659ff4e2...ff.exe
windows10-2004-x64
10Analysis
-
max time kernel
142s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 10:23
Static task
static1
Behavioral task
behavioral1
Sample
0bbde9df8818bd31a5563ee46a1512cc0d05c5d11e8469ef5c7ec394bb8ed020.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
14381f89f8b411cd75bc72635e73d8b296854b0c9775f80c2fec874a6761d562.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
1c09c6faad1ede18216df88b9d359543df5caacf810175b5e245e3e775b6b9a0.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
1c09c6faad1ede18216df88b9d359543df5caacf810175b5e245e3e775b6b9a0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
1c8308039aad5dc9c98b1f72592672a2e272eb9b9a30430eeacea161036df416.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
1c8308039aad5dc9c98b1f72592672a2e272eb9b9a30430eeacea161036df416.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
1fe4c883d2d7c8f09c5eab45d00c85339660191140f68cf11bd29f978582386d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
234b8aa95903dd65d6bf32c7efe25bae41ba8582db1a5693afbd14a22bc6d4d8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
410e72302dee0862e82d58671c8a130371c31bc22e8fb1bdd2afad927b1716e8.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
410e72302dee0862e82d58671c8a130371c31bc22e8fb1bdd2afad927b1716e8.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
4431aa7413f5833360f953b5d26f7cceefeb1dfd20705856a7c02d106943048c.exe
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
4431aa7413f5833360f953b5d26f7cceefeb1dfd20705856a7c02d106943048c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
68f997d58c29b69df287c5fd2f99eed5b4f71419dba25fbff2ad5132610109e5.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral14
Sample
812ce70322ec6814a763ebe1e04731ab416e10201580d509b133509ad1ebcb27.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
88a3f8285d7ffaf9af9229ede24a8f6e39be8a28dd9c981808b05c11aece8bab.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
90fdeaf3f05a7aeef335002874bfb485026c1a161854698d5277269287138ba8.exe
Resource
win7-20240221-en
Behavioral task
behavioral17
Sample
90fdeaf3f05a7aeef335002874bfb485026c1a161854698d5277269287138ba8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
9d92aedf9d3d83efd8e1d100f6dcbfc358fb8b26adeb6e51769c0e756d95b09d.exe
Resource
win7-20240419-en
Behavioral task
behavioral19
Sample
9d92aedf9d3d83efd8e1d100f6dcbfc358fb8b26adeb6e51769c0e756d95b09d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral20
Sample
9ff2fb6bb8d4c7395ec24382b3b06db1e89b1ac0e5ceaebaba03805cbaa21532.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
ac4e2e3d9de1b4a0639391f365147200e1175cbe0c399b62625a5fe2ff4acedd.exe
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
ac4e2e3d9de1b4a0639391f365147200e1175cbe0c399b62625a5fe2ff4acedd.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
b62483116d18fcce423634c2d593e9a4337f6e491ba99627ad7d7030d97546b6.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral24
Sample
c901122f0065d9da89857ec8341cf2ffba9fd5fd9ac4717e138a6b96c776b070.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
cfda8adb7597e205b205c916dd913856ad96e83acc3a76ec0ca6f85b8cb33c7f.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral26
Sample
dfe8591c80d0895e6a0ba6ab5324840b06b4acfdc0570bbc6eea97239314ef49.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
f5659ff4e2e2c4f553f6a9f59f406907a29545e4ca9d61810be718d9619a8dff.exe
Resource
win10v2004-20240226-en
General
-
Target
68f997d58c29b69df287c5fd2f99eed5b4f71419dba25fbff2ad5132610109e5.exe
-
Size
540KB
-
MD5
3a43d1c96176e1bcf74d3c2263044759
-
SHA1
9107fc9c7479bf1c4ddeffc52518583917603b95
-
SHA256
68f997d58c29b69df287c5fd2f99eed5b4f71419dba25fbff2ad5132610109e5
-
SHA512
74197247630636db39089573b49beb6daecef1834e9b4c69e7a7a560e3f7f0a8e3ab3fa591c6a4baaed4d397173c4b8e686daccd923482575ed90bdc582849f3
-
SSDEEP
12288:cMrsy90R6ibrrpOS4kHIMBz9NMdgCOKoRF2ePk5:wyZibxOS44IaTCYJ+
Malware Config
Extracted
amadey
3.87
59b440
http://77.91.68.18
-
install_dir
b40d11255d
-
install_file
saves.exe
-
strings_key
fa622dfc42544927a6471829ee1fa9fe
-
url_paths
/nice/index.php
Extracted
redline
mrak
77.91.124.82:19071
-
auth_value
7d9a335ab5dfd42d374867c96fe25302
Signatures
-
Processes:
g1935351.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection g1935351.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g1935351.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g1935351.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g1935351.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g1935351.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g1935351.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5208464.exe family_redline behavioral13/memory/4024-67-0x0000000000DD0000-0x0000000000E00000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
h5355103.exesaves.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation h5355103.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation saves.exe -
Executes dropped EXE 6 IoCs
Processes:
x8203061.exeg1935351.exeh5355103.exesaves.exei5208464.exesaves.exepid process 4620 x8203061.exe 2324 g1935351.exe 3164 h5355103.exe 3520 saves.exe 4024 i5208464.exe 2840 saves.exe -
Processes:
g1935351.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features g1935351.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" g1935351.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
68f997d58c29b69df287c5fd2f99eed5b4f71419dba25fbff2ad5132610109e5.exex8203061.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 68f997d58c29b69df287c5fd2f99eed5b4f71419dba25fbff2ad5132610109e5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x8203061.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
g1935351.exepid process 2324 g1935351.exe 2324 g1935351.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
g1935351.exedescription pid process Token: SeDebugPrivilege 2324 g1935351.exe -
Suspicious use of WriteProcessMemory 39 IoCs
Processes:
68f997d58c29b69df287c5fd2f99eed5b4f71419dba25fbff2ad5132610109e5.exex8203061.exeh5355103.exesaves.execmd.exedescription pid process target process PID 2184 wrote to memory of 4620 2184 68f997d58c29b69df287c5fd2f99eed5b4f71419dba25fbff2ad5132610109e5.exe x8203061.exe PID 2184 wrote to memory of 4620 2184 68f997d58c29b69df287c5fd2f99eed5b4f71419dba25fbff2ad5132610109e5.exe x8203061.exe PID 2184 wrote to memory of 4620 2184 68f997d58c29b69df287c5fd2f99eed5b4f71419dba25fbff2ad5132610109e5.exe x8203061.exe PID 4620 wrote to memory of 2324 4620 x8203061.exe g1935351.exe PID 4620 wrote to memory of 2324 4620 x8203061.exe g1935351.exe PID 4620 wrote to memory of 2324 4620 x8203061.exe g1935351.exe PID 4620 wrote to memory of 3164 4620 x8203061.exe h5355103.exe PID 4620 wrote to memory of 3164 4620 x8203061.exe h5355103.exe PID 4620 wrote to memory of 3164 4620 x8203061.exe h5355103.exe PID 3164 wrote to memory of 3520 3164 h5355103.exe saves.exe PID 3164 wrote to memory of 3520 3164 h5355103.exe saves.exe PID 3164 wrote to memory of 3520 3164 h5355103.exe saves.exe PID 2184 wrote to memory of 4024 2184 68f997d58c29b69df287c5fd2f99eed5b4f71419dba25fbff2ad5132610109e5.exe i5208464.exe PID 2184 wrote to memory of 4024 2184 68f997d58c29b69df287c5fd2f99eed5b4f71419dba25fbff2ad5132610109e5.exe i5208464.exe PID 2184 wrote to memory of 4024 2184 68f997d58c29b69df287c5fd2f99eed5b4f71419dba25fbff2ad5132610109e5.exe i5208464.exe PID 3520 wrote to memory of 1008 3520 saves.exe schtasks.exe PID 3520 wrote to memory of 1008 3520 saves.exe schtasks.exe PID 3520 wrote to memory of 1008 3520 saves.exe schtasks.exe PID 3520 wrote to memory of 908 3520 saves.exe cmd.exe PID 3520 wrote to memory of 908 3520 saves.exe cmd.exe PID 3520 wrote to memory of 908 3520 saves.exe cmd.exe PID 908 wrote to memory of 1000 908 cmd.exe cmd.exe PID 908 wrote to memory of 1000 908 cmd.exe cmd.exe PID 908 wrote to memory of 1000 908 cmd.exe cmd.exe PID 908 wrote to memory of 4412 908 cmd.exe cacls.exe PID 908 wrote to memory of 4412 908 cmd.exe cacls.exe PID 908 wrote to memory of 4412 908 cmd.exe cacls.exe PID 908 wrote to memory of 4508 908 cmd.exe cacls.exe PID 908 wrote to memory of 4508 908 cmd.exe cacls.exe PID 908 wrote to memory of 4508 908 cmd.exe cacls.exe PID 908 wrote to memory of 3748 908 cmd.exe cmd.exe PID 908 wrote to memory of 3748 908 cmd.exe cmd.exe PID 908 wrote to memory of 3748 908 cmd.exe cmd.exe PID 908 wrote to memory of 1960 908 cmd.exe cacls.exe PID 908 wrote to memory of 1960 908 cmd.exe cacls.exe PID 908 wrote to memory of 1960 908 cmd.exe cacls.exe PID 908 wrote to memory of 2552 908 cmd.exe cacls.exe PID 908 wrote to memory of 2552 908 cmd.exe cacls.exe PID 908 wrote to memory of 2552 908 cmd.exe cacls.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\68f997d58c29b69df287c5fd2f99eed5b4f71419dba25fbff2ad5132610109e5.exe"C:\Users\Admin\AppData\Local\Temp\68f997d58c29b69df287c5fd2f99eed5b4f71419dba25fbff2ad5132610109e5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8203061.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8203061.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g1935351.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g1935351.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2324
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5355103.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5355103.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN saves.exe /TR "C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe" /F5⤵
- Creates scheduled task(s)
PID:1008
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "saves.exe" /P "Admin:N"&&CACLS "saves.exe" /P "Admin:R" /E&&echo Y|CACLS "..\b40d11255d" /P "Admin:N"&&CACLS "..\b40d11255d" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:1000
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:N"6⤵PID:4412
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "saves.exe" /P "Admin:R" /E6⤵PID:4508
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:3748
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:N"6⤵PID:1960
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\b40d11255d" /P "Admin:R" /E6⤵PID:2552
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5208464.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5208464.exe2⤵
- Executes dropped EXE
PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1416 --field-trial-handle=3240,i,13319578961094268484,16557498665191861597,262144 --variations-seed-version /prefetch:81⤵PID:3912
-
C:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exeC:\Users\Admin\AppData\Local\Temp\b40d11255d\saves.exe1⤵
- Executes dropped EXE
PID:2840
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
174KB
MD583d201fab8d323c26aebf61f4edab894
SHA10951a1c6ef9d8ea2f2a38f0b1e5d51faa55432b8
SHA256549b21b8653360d2f6b749eb2358e58a996a35c8f85bde4d7740296bd0bc5e33
SHA512a4a7c3ece46c6d33214d56f08d8a9d214f312b6d3f6c6bb90012a917eca56387c0645fdda94778eed3049a0e3f6cf7c499de7f3d6218dffceee565ee4c38afca
-
Filesize
384KB
MD5c0f7a5d560b531fd3bab55cc63236a23
SHA19c5a14c3967d7ad535a733918c790906e210cc1c
SHA256858e0c098977fc7da667404bce45320ad01b73848fcb411a64bb482b15c28881
SHA512e7179ca343d9a56085b8eade536be7abfb7662436d13aaddcc21e020b5319a893b4c248092d5e07d91a2acec0ee7648f8615ea34179294603f00ff475321a2ab
-
Filesize
202KB
MD5ed3eafff4705be9e483b93379ff54f8f
SHA16b16c88ae0157be7649469ec2baa13193af8f2b7
SHA25691e35f49cdd48b97c1c6bacc5d2ee7a1c84e29facb1d9b5d3d2e84e3a8759626
SHA512f8e02531f40468ed632b562e439d150d7949d5fe0e6355414dd1701d491283daf6f38ad73782eee71d8db53975916f6e8d57edf0ce95e27a41f5869a65f5f7d0
-
Filesize
337KB
MD5251aa9e034465b49c7aeabaa9e675211
SHA1c415e234bf8ff36c6e24e9b4c84247399e49b674
SHA2563089ab919d4f5b5942e0beb13d3209fd34e783d0658b0170a14642078fb5775f
SHA512c04cff04f0b32e0013fe50ff88acbad93f75feeff8e14096b24ba4420604617d118deec656f4a899e7ef6bdbc9357d7cf8510fdfe0ea12f102adebc0a9398abe