Analysis
-
max time kernel
149s -
max time network
108s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
12/04/2023, 13:02
Static task
static1
General
-
Target
a00bbfdfe373aa5de708712807b6b0298688b15cb97349b404d05fead74fbad7.exe
-
Size
1.1MB
-
MD5
a766759271b52deedf355a5a1029b2df
-
SHA1
40c28a85444da1bfe71739bad69c0a04053ac6ae
-
SHA256
a00bbfdfe373aa5de708712807b6b0298688b15cb97349b404d05fead74fbad7
-
SHA512
8104b9db4070e92b4538c3dc83c575a66e221032ca36cedf58bb24f1b3762d1a17bb0a383aadba8251fa8919e84e67a08d10411fa3c0abcd89f63a57dcf9d8c5
-
SSDEEP
24576:CyQF614AZvETA0Bga2g0jqSgOWs5UxsGPHLTDPPH:ph49TA827q5OWs5UmGv
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr989847.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr989847.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr989847.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr989847.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr989847.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2444 un945511.exe 2524 un531425.exe 3052 pr989847.exe 5012 qu279385.exe 32 1.exe 3164 rk711487.exe 2628 si897153.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr989847.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr989847.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un531425.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a00bbfdfe373aa5de708712807b6b0298688b15cb97349b404d05fead74fbad7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a00bbfdfe373aa5de708712807b6b0298688b15cb97349b404d05fead74fbad7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un945511.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un945511.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un531425.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 7 IoCs
pid pid_target Process procid_target 3796 2628 WerFault.exe 73 3744 2628 WerFault.exe 73 4852 2628 WerFault.exe 73 4908 2628 WerFault.exe 73 4256 2628 WerFault.exe 73 5008 2628 WerFault.exe 73 5064 2628 WerFault.exe 73 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3052 pr989847.exe 3052 pr989847.exe 3164 rk711487.exe 32 1.exe 3164 rk711487.exe 32 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3052 pr989847.exe Token: SeDebugPrivilege 5012 qu279385.exe Token: SeDebugPrivilege 32 1.exe Token: SeDebugPrivilege 3164 rk711487.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2444 2204 a00bbfdfe373aa5de708712807b6b0298688b15cb97349b404d05fead74fbad7.exe 66 PID 2204 wrote to memory of 2444 2204 a00bbfdfe373aa5de708712807b6b0298688b15cb97349b404d05fead74fbad7.exe 66 PID 2204 wrote to memory of 2444 2204 a00bbfdfe373aa5de708712807b6b0298688b15cb97349b404d05fead74fbad7.exe 66 PID 2444 wrote to memory of 2524 2444 un945511.exe 67 PID 2444 wrote to memory of 2524 2444 un945511.exe 67 PID 2444 wrote to memory of 2524 2444 un945511.exe 67 PID 2524 wrote to memory of 3052 2524 un531425.exe 68 PID 2524 wrote to memory of 3052 2524 un531425.exe 68 PID 2524 wrote to memory of 3052 2524 un531425.exe 68 PID 2524 wrote to memory of 5012 2524 un531425.exe 69 PID 2524 wrote to memory of 5012 2524 un531425.exe 69 PID 2524 wrote to memory of 5012 2524 un531425.exe 69 PID 5012 wrote to memory of 32 5012 qu279385.exe 70 PID 5012 wrote to memory of 32 5012 qu279385.exe 70 PID 5012 wrote to memory of 32 5012 qu279385.exe 70 PID 2444 wrote to memory of 3164 2444 un945511.exe 71 PID 2444 wrote to memory of 3164 2444 un945511.exe 71 PID 2444 wrote to memory of 3164 2444 un945511.exe 71 PID 2204 wrote to memory of 2628 2204 a00bbfdfe373aa5de708712807b6b0298688b15cb97349b404d05fead74fbad7.exe 73 PID 2204 wrote to memory of 2628 2204 a00bbfdfe373aa5de708712807b6b0298688b15cb97349b404d05fead74fbad7.exe 73 PID 2204 wrote to memory of 2628 2204 a00bbfdfe373aa5de708712807b6b0298688b15cb97349b404d05fead74fbad7.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\a00bbfdfe373aa5de708712807b6b0298688b15cb97349b404d05fead74fbad7.exe"C:\Users\Admin\AppData\Local\Temp\a00bbfdfe373aa5de708712807b6b0298688b15cb97349b404d05fead74fbad7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un945511.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un945511.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un531425.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un531425.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr989847.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr989847.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3052
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu279385.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu279385.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:32
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk711487.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk711487.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3164
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si897153.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si897153.exe2⤵
- Executes dropped EXE
PID:2628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2628 -s 6283⤵
- Program crash
PID:3796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2628 -s 7043⤵
- Program crash
PID:3744
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2628 -s 8443⤵
- Program crash
PID:4852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2628 -s 8523⤵
- Program crash
PID:4908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2628 -s 8883⤵
- Program crash
PID:4256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2628 -s 9483⤵
- Program crash
PID:5008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2628 -s 10563⤵
- Program crash
PID:5064
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
394KB
MD55f588d7007696798734ae20d26791b96
SHA15d100cabf1d7c6765160beed081223fa0357186e
SHA256bcbbb2ac2eda6693c1d151495dff6e17094f7bf64e0af326d80ff020cfb6c32e
SHA512d10c0d728323f59349ff41f08825cd093b9d0ba5eb38134d04c9985859dc51d034e97ded99b03f82f2745b64bc6ea9039cbecaeae81b2a245cc3aa21ed21dfcb
-
Filesize
394KB
MD55f588d7007696798734ae20d26791b96
SHA15d100cabf1d7c6765160beed081223fa0357186e
SHA256bcbbb2ac2eda6693c1d151495dff6e17094f7bf64e0af326d80ff020cfb6c32e
SHA512d10c0d728323f59349ff41f08825cd093b9d0ba5eb38134d04c9985859dc51d034e97ded99b03f82f2745b64bc6ea9039cbecaeae81b2a245cc3aa21ed21dfcb
-
Filesize
853KB
MD566e2803b65c9b5e65aad97d15cd96c77
SHA1cfd1c1dcab706fc8a581d21894ce792907a39411
SHA256417db6cf7efedfd1b0e33fb042039c17a3080fde424777e17af4b10f7356916e
SHA5128c2d153022199bf9942b8650f46b0dfe51189b86626f541818d176ace6891a9f0ff596915b2869e761ab7b274398c39f3b16d4f19f4062cd0b5fa7a398c5eb90
-
Filesize
853KB
MD566e2803b65c9b5e65aad97d15cd96c77
SHA1cfd1c1dcab706fc8a581d21894ce792907a39411
SHA256417db6cf7efedfd1b0e33fb042039c17a3080fde424777e17af4b10f7356916e
SHA5128c2d153022199bf9942b8650f46b0dfe51189b86626f541818d176ace6891a9f0ff596915b2869e761ab7b274398c39f3b16d4f19f4062cd0b5fa7a398c5eb90
-
Filesize
168KB
MD5c52ebada00a59ec1f651a0e9fbcef2eb
SHA1e1941278df76616f1ca3202ef2a9f99d2592d52f
SHA25635d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e
SHA5126b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2
-
Filesize
168KB
MD5c52ebada00a59ec1f651a0e9fbcef2eb
SHA1e1941278df76616f1ca3202ef2a9f99d2592d52f
SHA25635d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e
SHA5126b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2
-
Filesize
699KB
MD5b6efdf64ee9931ac8d04d0bdffb8fff4
SHA166f6cb42981dbc48f45e25c708308233c76b705e
SHA256c4fc332a678f7965ca4b852fd72b754dcbcfc3f41eb096347ad5c78796dbbba2
SHA512009ce6ec5a3ff86c23ffb55b96e7fb3b5678253c2c545972e173449c78c5194b4e779dd4618bb5573bd76ca7e3b44f942ec977315d715e738b2299735a71aff5
-
Filesize
699KB
MD5b6efdf64ee9931ac8d04d0bdffb8fff4
SHA166f6cb42981dbc48f45e25c708308233c76b705e
SHA256c4fc332a678f7965ca4b852fd72b754dcbcfc3f41eb096347ad5c78796dbbba2
SHA512009ce6ec5a3ff86c23ffb55b96e7fb3b5678253c2c545972e173449c78c5194b4e779dd4618bb5573bd76ca7e3b44f942ec977315d715e738b2299735a71aff5
-
Filesize
402KB
MD56441d647e8b453c84c2bfe21e98657e5
SHA1a41b78438432526c0905a3fc1d2ad63d2f623795
SHA25640f87b8e0c5fa10a8242db725e2974e5704a958ded00ee73b6ebdbc40e0f4300
SHA512204cc85ede0e584bfaf5e36c13b4d182e6105970107fca564f220f7a5b2072715ab2c7ca5b1a74ca042df7addfd8ab9b231489488c62ba9edc6a3909856db18d
-
Filesize
402KB
MD56441d647e8b453c84c2bfe21e98657e5
SHA1a41b78438432526c0905a3fc1d2ad63d2f623795
SHA25640f87b8e0c5fa10a8242db725e2974e5704a958ded00ee73b6ebdbc40e0f4300
SHA512204cc85ede0e584bfaf5e36c13b4d182e6105970107fca564f220f7a5b2072715ab2c7ca5b1a74ca042df7addfd8ab9b231489488c62ba9edc6a3909856db18d
-
Filesize
586KB
MD511c34d8a6daedc0dee5564958fbf69e3
SHA108d9527958763a6dd71b8f7a72985fc878f173cf
SHA256372a6a94ab8503d4f67ae5e77dbd02711608979867863472bf5a0eb1a4b20698
SHA51294405072d0d3d72a1b1e22b9a76b82db76fb3faf465ee059fbba086b756d471be75c2ee723359309cbf911bff9abc59cd93f134b134a2497d47c77511b4ad878
-
Filesize
586KB
MD511c34d8a6daedc0dee5564958fbf69e3
SHA108d9527958763a6dd71b8f7a72985fc878f173cf
SHA256372a6a94ab8503d4f67ae5e77dbd02711608979867863472bf5a0eb1a4b20698
SHA51294405072d0d3d72a1b1e22b9a76b82db76fb3faf465ee059fbba086b756d471be75c2ee723359309cbf911bff9abc59cd93f134b134a2497d47c77511b4ad878
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1