Analysis
-
max time kernel
148s -
max time network
105s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
12/04/2023, 13:59
Static task
static1
General
-
Target
e343e3f596264219be33ebf871643f8ad957c2f52b37d789da4e4b592e47e83c.exe
-
Size
1.1MB
-
MD5
340a747edf09fda6f21545c087251062
-
SHA1
49456c1944d9d7a944a51ef38cb42123bb87d810
-
SHA256
e343e3f596264219be33ebf871643f8ad957c2f52b37d789da4e4b592e47e83c
-
SHA512
6e6c414d9446fe88e2633d2dcf1fe2d69c9b2f22234fee3bc7c834b388d17101c737c88051c02acd5566c4acd8ca2443b1e798da3e9b8cbc0238a310385d13f0
-
SSDEEP
24576:1ypJKEUE7vHyVrEdhIdS1xNkNjx7L0gOWR7AyMnW+45c3S9syX:Qp8rgvHOrE/iSXCpdLpOWRNbYes
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr388963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr388963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr388963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr388963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr388963.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 3512 un895893.exe 1728 un333039.exe 3972 pr388963.exe 4876 qu848456.exe 2288 1.exe 1204 rk128637.exe 2688 si814487.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr388963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr388963.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un895893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un895893.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un333039.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un333039.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e343e3f596264219be33ebf871643f8ad957c2f52b37d789da4e4b592e47e83c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e343e3f596264219be33ebf871643f8ad957c2f52b37d789da4e4b592e47e83c.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 7 IoCs
pid pid_target Process procid_target 1576 2688 WerFault.exe 73 4636 2688 WerFault.exe 73 3020 2688 WerFault.exe 73 4712 2688 WerFault.exe 73 5108 2688 WerFault.exe 73 4756 2688 WerFault.exe 73 4836 2688 WerFault.exe 73 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3972 pr388963.exe 3972 pr388963.exe 1204 rk128637.exe 1204 rk128637.exe 2288 1.exe 2288 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3972 pr388963.exe Token: SeDebugPrivilege 4876 qu848456.exe Token: SeDebugPrivilege 1204 rk128637.exe Token: SeDebugPrivilege 2288 1.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1808 wrote to memory of 3512 1808 e343e3f596264219be33ebf871643f8ad957c2f52b37d789da4e4b592e47e83c.exe 66 PID 1808 wrote to memory of 3512 1808 e343e3f596264219be33ebf871643f8ad957c2f52b37d789da4e4b592e47e83c.exe 66 PID 1808 wrote to memory of 3512 1808 e343e3f596264219be33ebf871643f8ad957c2f52b37d789da4e4b592e47e83c.exe 66 PID 3512 wrote to memory of 1728 3512 un895893.exe 67 PID 3512 wrote to memory of 1728 3512 un895893.exe 67 PID 3512 wrote to memory of 1728 3512 un895893.exe 67 PID 1728 wrote to memory of 3972 1728 un333039.exe 68 PID 1728 wrote to memory of 3972 1728 un333039.exe 68 PID 1728 wrote to memory of 3972 1728 un333039.exe 68 PID 1728 wrote to memory of 4876 1728 un333039.exe 69 PID 1728 wrote to memory of 4876 1728 un333039.exe 69 PID 1728 wrote to memory of 4876 1728 un333039.exe 69 PID 4876 wrote to memory of 2288 4876 qu848456.exe 70 PID 4876 wrote to memory of 2288 4876 qu848456.exe 70 PID 4876 wrote to memory of 2288 4876 qu848456.exe 70 PID 3512 wrote to memory of 1204 3512 un895893.exe 71 PID 3512 wrote to memory of 1204 3512 un895893.exe 71 PID 3512 wrote to memory of 1204 3512 un895893.exe 71 PID 1808 wrote to memory of 2688 1808 e343e3f596264219be33ebf871643f8ad957c2f52b37d789da4e4b592e47e83c.exe 73 PID 1808 wrote to memory of 2688 1808 e343e3f596264219be33ebf871643f8ad957c2f52b37d789da4e4b592e47e83c.exe 73 PID 1808 wrote to memory of 2688 1808 e343e3f596264219be33ebf871643f8ad957c2f52b37d789da4e4b592e47e83c.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\e343e3f596264219be33ebf871643f8ad957c2f52b37d789da4e4b592e47e83c.exe"C:\Users\Admin\AppData\Local\Temp\e343e3f596264219be33ebf871643f8ad957c2f52b37d789da4e4b592e47e83c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un895893.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un895893.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un333039.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un333039.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr388963.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr388963.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3972
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu848456.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu848456.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2288
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk128637.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk128637.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1204
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si814487.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si814487.exe2⤵
- Executes dropped EXE
PID:2688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 6283⤵
- Program crash
PID:1576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 7043⤵
- Program crash
PID:4636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 8443⤵
- Program crash
PID:3020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 8483⤵
- Program crash
PID:4712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 8803⤵
- Program crash
PID:5108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 8283⤵
- Program crash
PID:4756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 10563⤵
- Program crash
PID:4836
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
394KB
MD5430a80f73c8b5fe97d7599d09fe13970
SHA15eeab7a13bba2b953dd88b384b81b771a9e0db8f
SHA256b02397ff98e7829a668e6441fdc8eb6a407a8e9c650e6e09952a1fbf58fa6740
SHA512e75c7c248bf4a778f3694821cbaae358307082813279f2783e0f738380a94dff10fd72fb9b1fce0bd641cd2701193ba4f370e485c7963951ee690b60b0cc4220
-
Filesize
394KB
MD5430a80f73c8b5fe97d7599d09fe13970
SHA15eeab7a13bba2b953dd88b384b81b771a9e0db8f
SHA256b02397ff98e7829a668e6441fdc8eb6a407a8e9c650e6e09952a1fbf58fa6740
SHA512e75c7c248bf4a778f3694821cbaae358307082813279f2783e0f738380a94dff10fd72fb9b1fce0bd641cd2701193ba4f370e485c7963951ee690b60b0cc4220
-
Filesize
851KB
MD5eddcaf0078404e9980e2e3f4c268f5ba
SHA14e712c419f74e80f4e2e51942bc5077ea6ada5a6
SHA25668ca27f9c6c24b215cafe2c4acac101a03b570c2ab386fa55bf7fea50b13f5db
SHA5129f4bdba5efebeff401e45aa9afe1c74908f528a03ffe4c48baaabaa6267aacb5c38fafe0fad4986b20b32efafa5c6fa0b446b24b058ec9725899a86d0257f375
-
Filesize
851KB
MD5eddcaf0078404e9980e2e3f4c268f5ba
SHA14e712c419f74e80f4e2e51942bc5077ea6ada5a6
SHA25668ca27f9c6c24b215cafe2c4acac101a03b570c2ab386fa55bf7fea50b13f5db
SHA5129f4bdba5efebeff401e45aa9afe1c74908f528a03ffe4c48baaabaa6267aacb5c38fafe0fad4986b20b32efafa5c6fa0b446b24b058ec9725899a86d0257f375
-
Filesize
168KB
MD5c52ebada00a59ec1f651a0e9fbcef2eb
SHA1e1941278df76616f1ca3202ef2a9f99d2592d52f
SHA25635d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e
SHA5126b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2
-
Filesize
168KB
MD5c52ebada00a59ec1f651a0e9fbcef2eb
SHA1e1941278df76616f1ca3202ef2a9f99d2592d52f
SHA25635d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e
SHA5126b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2
-
Filesize
698KB
MD56c81144e98d0cd73a3a56404a35b5968
SHA1f7d24d649e8e92fccef95c8da353f3ef8fdee266
SHA256692115db5b728b1ab1eea2a48dd486a528dbcf35f3119ca093cceec16f0a92eb
SHA51293477efca5fab6378adc54d622c89655ccfea945445ae0cc49e56990fa2d67aac57a3d62987b1f638cfe1dcc8f49f8d080b66166ed70c0f58969dd9e7825ea7a
-
Filesize
698KB
MD56c81144e98d0cd73a3a56404a35b5968
SHA1f7d24d649e8e92fccef95c8da353f3ef8fdee266
SHA256692115db5b728b1ab1eea2a48dd486a528dbcf35f3119ca093cceec16f0a92eb
SHA51293477efca5fab6378adc54d622c89655ccfea945445ae0cc49e56990fa2d67aac57a3d62987b1f638cfe1dcc8f49f8d080b66166ed70c0f58969dd9e7825ea7a
-
Filesize
402KB
MD5b1ff185410ea6386fcf33c7143b12bbb
SHA18052cf2761f69105e00ae0773a9e9fa5b2a04141
SHA2565fbaa83e7685e9919b13a9027ee2bc93278cc99bba60ed79c51f2ffd6d085a1f
SHA5127feb766246b51c9ee87586d16c34b3e61a9233d0945b30d04a94429a70ce708cef8eb4cf261fd2ec04242816cd676ba02ab045f7a9f4df19e32553679b689fe6
-
Filesize
402KB
MD5b1ff185410ea6386fcf33c7143b12bbb
SHA18052cf2761f69105e00ae0773a9e9fa5b2a04141
SHA2565fbaa83e7685e9919b13a9027ee2bc93278cc99bba60ed79c51f2ffd6d085a1f
SHA5127feb766246b51c9ee87586d16c34b3e61a9233d0945b30d04a94429a70ce708cef8eb4cf261fd2ec04242816cd676ba02ab045f7a9f4df19e32553679b689fe6
-
Filesize
586KB
MD59987343b4a2b842f2a461ce5f131dc67
SHA11d6c68f05e74285c3f393d20b073c822e862d359
SHA25677510154fa59a9765ad0f7ed6ae2b495b97100c01049b3c0216efa2d390ba6fb
SHA51264a74e2d60443d875c3c8be7f961d000ab0ffb2eaa2b90437b9838f0decb6e1a09765ebcfbaf135bba5ce32f570f0aaa5e2c29731ea08cea3756982a7f40ef13
-
Filesize
586KB
MD59987343b4a2b842f2a461ce5f131dc67
SHA11d6c68f05e74285c3f393d20b073c822e862d359
SHA25677510154fa59a9765ad0f7ed6ae2b495b97100c01049b3c0216efa2d390ba6fb
SHA51264a74e2d60443d875c3c8be7f961d000ab0ffb2eaa2b90437b9838f0decb6e1a09765ebcfbaf135bba5ce32f570f0aaa5e2c29731ea08cea3756982a7f40ef13
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1