Analysis
-
max time kernel
145s -
max time network
102s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
12/04/2023, 02:41
Static task
static1
General
-
Target
be2405329b549991a2f44fac7c8b2e88221dfb68ba497757d6f036be0f454008.exe
-
Size
1.1MB
-
MD5
fbd6af2302e2d8e49835854f13b792e8
-
SHA1
c36356d10453f8d6d252416aba1561548051931a
-
SHA256
be2405329b549991a2f44fac7c8b2e88221dfb68ba497757d6f036be0f454008
-
SHA512
2ffa1e85b9f3a475af952624aadedda4f7edb7c34bade82966339559b4cd94c80ba3fa376a0051bba97d2465f5619a1b61a4a33295c235dd5088fda2f762055e
-
SSDEEP
24576:qyfliU+pp7CXmmve4BrNg4+bi7gpxsGbfwwLxNBE:xsU+/34pN+bQSAwLHB
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr444454.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr444454.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr444454.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr444454.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr444454.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2500 un121022.exe 2984 un476714.exe 3908 pr444454.exe 3624 qu313819.exe 3348 1.exe 208 rk713106.exe 2208 si490457.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr444454.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr444454.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce be2405329b549991a2f44fac7c8b2e88221dfb68ba497757d6f036be0f454008.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" be2405329b549991a2f44fac7c8b2e88221dfb68ba497757d6f036be0f454008.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un121022.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un121022.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un476714.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un476714.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
pid pid_target Process procid_target 2456 2208 WerFault.exe 73 2904 2208 WerFault.exe 73 5012 2208 WerFault.exe 73 5028 2208 WerFault.exe 73 3840 2208 WerFault.exe 73 4132 2208 WerFault.exe 73 4080 2208 WerFault.exe 73 2356 2208 WerFault.exe 73 3560 2208 WerFault.exe 73 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3908 pr444454.exe 3908 pr444454.exe 208 rk713106.exe 3348 1.exe 3348 1.exe 208 rk713106.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3908 pr444454.exe Token: SeDebugPrivilege 3624 qu313819.exe Token: SeDebugPrivilege 208 rk713106.exe Token: SeDebugPrivilege 3348 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2208 si490457.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2500 2468 be2405329b549991a2f44fac7c8b2e88221dfb68ba497757d6f036be0f454008.exe 66 PID 2468 wrote to memory of 2500 2468 be2405329b549991a2f44fac7c8b2e88221dfb68ba497757d6f036be0f454008.exe 66 PID 2468 wrote to memory of 2500 2468 be2405329b549991a2f44fac7c8b2e88221dfb68ba497757d6f036be0f454008.exe 66 PID 2500 wrote to memory of 2984 2500 un121022.exe 67 PID 2500 wrote to memory of 2984 2500 un121022.exe 67 PID 2500 wrote to memory of 2984 2500 un121022.exe 67 PID 2984 wrote to memory of 3908 2984 un476714.exe 68 PID 2984 wrote to memory of 3908 2984 un476714.exe 68 PID 2984 wrote to memory of 3908 2984 un476714.exe 68 PID 2984 wrote to memory of 3624 2984 un476714.exe 69 PID 2984 wrote to memory of 3624 2984 un476714.exe 69 PID 2984 wrote to memory of 3624 2984 un476714.exe 69 PID 3624 wrote to memory of 3348 3624 qu313819.exe 70 PID 3624 wrote to memory of 3348 3624 qu313819.exe 70 PID 3624 wrote to memory of 3348 3624 qu313819.exe 70 PID 2500 wrote to memory of 208 2500 un121022.exe 71 PID 2500 wrote to memory of 208 2500 un121022.exe 71 PID 2500 wrote to memory of 208 2500 un121022.exe 71 PID 2468 wrote to memory of 2208 2468 be2405329b549991a2f44fac7c8b2e88221dfb68ba497757d6f036be0f454008.exe 73 PID 2468 wrote to memory of 2208 2468 be2405329b549991a2f44fac7c8b2e88221dfb68ba497757d6f036be0f454008.exe 73 PID 2468 wrote to memory of 2208 2468 be2405329b549991a2f44fac7c8b2e88221dfb68ba497757d6f036be0f454008.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\be2405329b549991a2f44fac7c8b2e88221dfb68ba497757d6f036be0f454008.exe"C:\Users\Admin\AppData\Local\Temp\be2405329b549991a2f44fac7c8b2e88221dfb68ba497757d6f036be0f454008.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un121022.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un121022.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un476714.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un476714.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr444454.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr444454.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3908
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu313819.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu313819.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3348
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk713106.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk713106.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:208
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si490457.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si490457.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:2208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 6163⤵
- Program crash
PID:2456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 6963⤵
- Program crash
PID:2904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 8363⤵
- Program crash
PID:5012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 8443⤵
- Program crash
PID:5028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 8723⤵
- Program crash
PID:3840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 7363⤵
- Program crash
PID:4132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 11163⤵
- Program crash
PID:4080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 11483⤵
- Program crash
PID:2356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 11523⤵
- Program crash
PID:3560
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
246KB
MD5a3c633f7064f2169205d6966b1e7290a
SHA18fe0a4610d1e9a4e40a92cc1cbb82d48f770da86
SHA256ba9a7b1d6eed5989e2d3cd24f6d896e012c45ea52daae6e99a3c22b824c4148c
SHA5120e35ef7ef4423f9c14c0c92feecd951a27c2b0a41d8371adc5c1780a7ab8f4edd29f61285c4b45935ee0a4975effce03330ba5067ee50d06f263c804823aff7e
-
Filesize
246KB
MD5a3c633f7064f2169205d6966b1e7290a
SHA18fe0a4610d1e9a4e40a92cc1cbb82d48f770da86
SHA256ba9a7b1d6eed5989e2d3cd24f6d896e012c45ea52daae6e99a3c22b824c4148c
SHA5120e35ef7ef4423f9c14c0c92feecd951a27c2b0a41d8371adc5c1780a7ab8f4edd29f61285c4b45935ee0a4975effce03330ba5067ee50d06f263c804823aff7e
-
Filesize
810KB
MD58050d6650751a99b427a053fd9710f56
SHA1597fe0c2815aa17deb5d4fba63d2ea6ae669eae4
SHA256df87051fd6a1183da35977bb35453a55049b2738f677415d65d8ed7fb0c67b00
SHA51296a499e642ef3906502ddc50108c269297d45ad53e6d39084328280f506a95c080a533bb8c8845e39a2b0edbd214e2b7e22c187479c644bc4705df975f20fd37
-
Filesize
810KB
MD58050d6650751a99b427a053fd9710f56
SHA1597fe0c2815aa17deb5d4fba63d2ea6ae669eae4
SHA256df87051fd6a1183da35977bb35453a55049b2738f677415d65d8ed7fb0c67b00
SHA51296a499e642ef3906502ddc50108c269297d45ad53e6d39084328280f506a95c080a533bb8c8845e39a2b0edbd214e2b7e22c187479c644bc4705df975f20fd37
-
Filesize
168KB
MD5c52ebada00a59ec1f651a0e9fbcef2eb
SHA1e1941278df76616f1ca3202ef2a9f99d2592d52f
SHA25635d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e
SHA5126b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2
-
Filesize
168KB
MD5c52ebada00a59ec1f651a0e9fbcef2eb
SHA1e1941278df76616f1ca3202ef2a9f99d2592d52f
SHA25635d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e
SHA5126b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2
-
Filesize
656KB
MD56eacccba3bc905e5142d471650366733
SHA1cf3e44d46abfa5c6532ab84499b520e4c533c8cd
SHA256c38207f003b1e8f3422aa4dd7b155a7bbbf86070fc6f6a79dbf544f7136b4164
SHA512007bfc68ebce6b5d02be157f7c1760ded70557e28e0f498bbdbb72ac74cd8b0b0406791bb10b2f14f2f82c0e7017a9240eb36e0828662f18005c06b0fe91e3a1
-
Filesize
656KB
MD56eacccba3bc905e5142d471650366733
SHA1cf3e44d46abfa5c6532ab84499b520e4c533c8cd
SHA256c38207f003b1e8f3422aa4dd7b155a7bbbf86070fc6f6a79dbf544f7136b4164
SHA512007bfc68ebce6b5d02be157f7c1760ded70557e28e0f498bbdbb72ac74cd8b0b0406791bb10b2f14f2f82c0e7017a9240eb36e0828662f18005c06b0fe91e3a1
-
Filesize
254KB
MD5177276fc3a4e877d0002698daaba05d0
SHA1013401622ccf4b6b299426f09de27798bb199e19
SHA25609fef6731fa7df597df02deeddcd056a2864cf7fd6fefdc719a3443d56c3dc40
SHA51231f7ca0b779549ba494aae492cf17a2fefa82d5751f96540ad1ea8a78012ebb58ac7cd2821f57be5222d0509102d094b4c47998217c51f248278af8458ad3fbf
-
Filesize
254KB
MD5177276fc3a4e877d0002698daaba05d0
SHA1013401622ccf4b6b299426f09de27798bb199e19
SHA25609fef6731fa7df597df02deeddcd056a2864cf7fd6fefdc719a3443d56c3dc40
SHA51231f7ca0b779549ba494aae492cf17a2fefa82d5751f96540ad1ea8a78012ebb58ac7cd2821f57be5222d0509102d094b4c47998217c51f248278af8458ad3fbf
-
Filesize
438KB
MD53d47213f9d11d1e625fa298cb3ef87ed
SHA13201ecfdb38395ddbd264e9577dc933a97338014
SHA25641e5a51fcbc602bb5c4d5c892ee95a2d5a4ee9c52f70224ad65819f3078494b6
SHA51278618f588f7f31965101075b547a466e4c8f906404a1f7aac48003d33c1704bcd8504b338a71242ad991f102a4097a822509c43acdd19b1840d0f597485fb0cd
-
Filesize
438KB
MD53d47213f9d11d1e625fa298cb3ef87ed
SHA13201ecfdb38395ddbd264e9577dc933a97338014
SHA25641e5a51fcbc602bb5c4d5c892ee95a2d5a4ee9c52f70224ad65819f3078494b6
SHA51278618f588f7f31965101075b547a466e4c8f906404a1f7aac48003d33c1704bcd8504b338a71242ad991f102a4097a822509c43acdd19b1840d0f597485fb0cd
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1