Analysis
-
max time kernel
143s -
max time network
139s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
12-04-2023 10:15
Static task
static1
General
-
Target
93e426be6860e604db1bfcd0286ae33b19891ad9c07b523a011a193b7d3cc756.exe
-
Size
1.1MB
-
MD5
70d6b9b91b73df97c884f309f94d00d3
-
SHA1
fd789b6542c693b34b14e9aa32d8ce39a138b243
-
SHA256
93e426be6860e604db1bfcd0286ae33b19891ad9c07b523a011a193b7d3cc756
-
SHA512
59864476d00801ac8a5f88f464010b51c3f11119aa9d1c36713368bbdfa6bb548b99d801839e884ba6981d6f6c415fd2173c0ec0c9561afb6977fbfcef209c86
-
SSDEEP
24576:Ky7SVLopFYQwjZR6aterpqKxNUuLzDORAayHIiJJKo14lDpFiI:RgSYT2TrpHLLMAaTiJr4NpQ
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr979534.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr979534.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr979534.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr979534.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr979534.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 3596 un494989.exe 2344 un910681.exe 5112 pr979534.exe 4596 qu806693.exe 2112 1.exe 1836 rk255609.exe 2348 si327731.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr979534.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr979534.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un494989.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un910681.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un910681.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 93e426be6860e604db1bfcd0286ae33b19891ad9c07b523a011a193b7d3cc756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 93e426be6860e604db1bfcd0286ae33b19891ad9c07b523a011a193b7d3cc756.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un494989.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 7 IoCs
pid pid_target Process procid_target 4260 2348 WerFault.exe 73 2080 2348 WerFault.exe 73 4292 2348 WerFault.exe 73 1716 2348 WerFault.exe 73 1800 2348 WerFault.exe 73 4392 2348 WerFault.exe 73 4920 2348 WerFault.exe 73 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5112 pr979534.exe 5112 pr979534.exe 1836 rk255609.exe 2112 1.exe 1836 rk255609.exe 2112 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 5112 pr979534.exe Token: SeDebugPrivilege 4596 qu806693.exe Token: SeDebugPrivilege 1836 rk255609.exe Token: SeDebugPrivilege 2112 1.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4148 wrote to memory of 3596 4148 93e426be6860e604db1bfcd0286ae33b19891ad9c07b523a011a193b7d3cc756.exe 66 PID 4148 wrote to memory of 3596 4148 93e426be6860e604db1bfcd0286ae33b19891ad9c07b523a011a193b7d3cc756.exe 66 PID 4148 wrote to memory of 3596 4148 93e426be6860e604db1bfcd0286ae33b19891ad9c07b523a011a193b7d3cc756.exe 66 PID 3596 wrote to memory of 2344 3596 un494989.exe 67 PID 3596 wrote to memory of 2344 3596 un494989.exe 67 PID 3596 wrote to memory of 2344 3596 un494989.exe 67 PID 2344 wrote to memory of 5112 2344 un910681.exe 68 PID 2344 wrote to memory of 5112 2344 un910681.exe 68 PID 2344 wrote to memory of 5112 2344 un910681.exe 68 PID 2344 wrote to memory of 4596 2344 un910681.exe 69 PID 2344 wrote to memory of 4596 2344 un910681.exe 69 PID 2344 wrote to memory of 4596 2344 un910681.exe 69 PID 4596 wrote to memory of 2112 4596 qu806693.exe 70 PID 4596 wrote to memory of 2112 4596 qu806693.exe 70 PID 4596 wrote to memory of 2112 4596 qu806693.exe 70 PID 3596 wrote to memory of 1836 3596 un494989.exe 71 PID 3596 wrote to memory of 1836 3596 un494989.exe 71 PID 3596 wrote to memory of 1836 3596 un494989.exe 71 PID 4148 wrote to memory of 2348 4148 93e426be6860e604db1bfcd0286ae33b19891ad9c07b523a011a193b7d3cc756.exe 73 PID 4148 wrote to memory of 2348 4148 93e426be6860e604db1bfcd0286ae33b19891ad9c07b523a011a193b7d3cc756.exe 73 PID 4148 wrote to memory of 2348 4148 93e426be6860e604db1bfcd0286ae33b19891ad9c07b523a011a193b7d3cc756.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\93e426be6860e604db1bfcd0286ae33b19891ad9c07b523a011a193b7d3cc756.exe"C:\Users\Admin\AppData\Local\Temp\93e426be6860e604db1bfcd0286ae33b19891ad9c07b523a011a193b7d3cc756.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un494989.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un494989.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un910681.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un910681.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr979534.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr979534.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5112
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu806693.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu806693.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk255609.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk255609.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1836
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si327731.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si327731.exe2⤵
- Executes dropped EXE
PID:2348 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 6283⤵
- Program crash
PID:4260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 7043⤵
- Program crash
PID:2080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 8443⤵
- Program crash
PID:4292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 8603⤵
- Program crash
PID:1716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 8803⤵
- Program crash
PID:1800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 8403⤵
- Program crash
PID:4392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 10763⤵
- Program crash
PID:4920
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
394KB
MD50942cbd06e99a8d0d8137216511ce290
SHA1007b4a20787bf1d46e79c8f3ca87f4d2c9e3e8ef
SHA25610f1d2b8f5173ee48dca955e52e6e5d57e279a49173efb9f955e420c5cad3879
SHA51294120e3991e119874fb256ba833db0f52dda5b40d3d8f05b8f719a72f620370e0a1e69c277a81de7065229677bbc219fe9d1ddcf86b9aefc4b292f673a7d13d3
-
Filesize
394KB
MD50942cbd06e99a8d0d8137216511ce290
SHA1007b4a20787bf1d46e79c8f3ca87f4d2c9e3e8ef
SHA25610f1d2b8f5173ee48dca955e52e6e5d57e279a49173efb9f955e420c5cad3879
SHA51294120e3991e119874fb256ba833db0f52dda5b40d3d8f05b8f719a72f620370e0a1e69c277a81de7065229677bbc219fe9d1ddcf86b9aefc4b292f673a7d13d3
-
Filesize
852KB
MD5ef37ff25e5437942d830c3ec40838bd0
SHA1e902edc57dcd0085b5ad6feeff267ad28eccdc8b
SHA25644a983e4e959c283938ce2f8bde9be26af3e9e6f6b52cce8f1d29f0a0596ec79
SHA512cbe26c4267bba40aa439e8b217b0ed94058c9f3e0cf8f415a45fd09bbd09ab48a4f701d56e3c8ad2abd6454418b7df9eeb645e140de666dacc1c26c47df8d6d1
-
Filesize
852KB
MD5ef37ff25e5437942d830c3ec40838bd0
SHA1e902edc57dcd0085b5ad6feeff267ad28eccdc8b
SHA25644a983e4e959c283938ce2f8bde9be26af3e9e6f6b52cce8f1d29f0a0596ec79
SHA512cbe26c4267bba40aa439e8b217b0ed94058c9f3e0cf8f415a45fd09bbd09ab48a4f701d56e3c8ad2abd6454418b7df9eeb645e140de666dacc1c26c47df8d6d1
-
Filesize
168KB
MD5c52ebada00a59ec1f651a0e9fbcef2eb
SHA1e1941278df76616f1ca3202ef2a9f99d2592d52f
SHA25635d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e
SHA5126b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2
-
Filesize
168KB
MD5c52ebada00a59ec1f651a0e9fbcef2eb
SHA1e1941278df76616f1ca3202ef2a9f99d2592d52f
SHA25635d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e
SHA5126b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2
-
Filesize
698KB
MD584f9c34237f78040ab719557ade56966
SHA1f76341f18596643e68fcf3b7ef71a159136a6297
SHA2562231fb7ead67cfdad84ddf3e41a39d7eaef0083a67294c2d69c5a82283ddde7e
SHA51247ab64c83b2289b2817c19c58dccacfa508cb498d01a2a560eaaac3de8b8eb503795b2ebc35164fb1244125c5553449c48e8d6a7d617ca0d796d08e5462ba336
-
Filesize
698KB
MD584f9c34237f78040ab719557ade56966
SHA1f76341f18596643e68fcf3b7ef71a159136a6297
SHA2562231fb7ead67cfdad84ddf3e41a39d7eaef0083a67294c2d69c5a82283ddde7e
SHA51247ab64c83b2289b2817c19c58dccacfa508cb498d01a2a560eaaac3de8b8eb503795b2ebc35164fb1244125c5553449c48e8d6a7d617ca0d796d08e5462ba336
-
Filesize
402KB
MD5835980c639fa4bfb77d8269565c69e54
SHA184756b1643e862e63f57d56f734926072569ff2e
SHA2565d819025a009f8306723b5836a3ae6bd1c26bf2a3d4f7f571db9b27e4ddc4be3
SHA512ef6d4723f14e5eeed8f03c77c06816a9e50d6bbe54e53e6295f7c57ce73f403fa40b6daabd75169bcfcb095aae852d33ca4d5f276224bce6bfd28f93ca19fe65
-
Filesize
402KB
MD5835980c639fa4bfb77d8269565c69e54
SHA184756b1643e862e63f57d56f734926072569ff2e
SHA2565d819025a009f8306723b5836a3ae6bd1c26bf2a3d4f7f571db9b27e4ddc4be3
SHA512ef6d4723f14e5eeed8f03c77c06816a9e50d6bbe54e53e6295f7c57ce73f403fa40b6daabd75169bcfcb095aae852d33ca4d5f276224bce6bfd28f93ca19fe65
-
Filesize
586KB
MD57cc2e4a25faac130c11aba5201c41c14
SHA1ac03b1dc2b7bb2e3dccff49612ae98a21891d8b8
SHA25646a997a2ea791d69bb9c75efea0341539688b211c8b9209561739c447247e2ef
SHA51244bd1bc50fc93a44a82317de3ea0ab5bcd523ba47700c0e376be087a4854d1738f40bd7f65b06e41bc3fbfa2d0d66d7559a5d690d91831c1cfc35a6712829923
-
Filesize
586KB
MD57cc2e4a25faac130c11aba5201c41c14
SHA1ac03b1dc2b7bb2e3dccff49612ae98a21891d8b8
SHA25646a997a2ea791d69bb9c75efea0341539688b211c8b9209561739c447247e2ef
SHA51244bd1bc50fc93a44a82317de3ea0ab5bcd523ba47700c0e376be087a4854d1738f40bd7f65b06e41bc3fbfa2d0d66d7559a5d690d91831c1cfc35a6712829923
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1