Analysis
-
max time kernel
146s -
max time network
103s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
13-04-2023 02:32
Static task
static1
General
-
Target
85ebf911d03983e6e8b7fadfff4a91722ee9d2ec30203cd8389379ba7070993c.exe
-
Size
1.2MB
-
MD5
e67a3f1742c895c9bd37e3db844c68a2
-
SHA1
b8420be8cfaee673ba95009e3d60fcacad161266
-
SHA256
85ebf911d03983e6e8b7fadfff4a91722ee9d2ec30203cd8389379ba7070993c
-
SHA512
381e782c3c44151b545385e83f0aba9337c8b899dd729ff7d9d63d1be2df245d6101f5aac9789d58b0b0663bc368563dd5b4b12f3c4e62d61d66c7239cb5d8db
-
SSDEEP
24576:Py25ysqrrT1eUHbO/KuW30qVhIuvzZNm8k5QSND9+jpZr:awi1zHy3kb7y89qYjj
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr776495.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr776495.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr776495.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr776495.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr776495.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2484 un208591.exe 2592 un026843.exe 3084 pr776495.exe 1356 qu099326.exe 3428 1.exe 1632 rk746418.exe 4088 si153582.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr776495.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr776495.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un208591.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un026843.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un026843.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 85ebf911d03983e6e8b7fadfff4a91722ee9d2ec30203cd8389379ba7070993c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 85ebf911d03983e6e8b7fadfff4a91722ee9d2ec30203cd8389379ba7070993c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un208591.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
pid pid_target Process procid_target 4696 4088 WerFault.exe 73 2808 4088 WerFault.exe 73 5012 4088 WerFault.exe 73 3084 4088 WerFault.exe 73 2732 4088 WerFault.exe 73 3052 4088 WerFault.exe 73 2240 4088 WerFault.exe 73 1344 4088 WerFault.exe 73 4592 4088 WerFault.exe 73 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3084 pr776495.exe 3084 pr776495.exe 1632 rk746418.exe 1632 rk746418.exe 3428 1.exe 3428 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3084 pr776495.exe Token: SeDebugPrivilege 1356 qu099326.exe Token: SeDebugPrivilege 1632 rk746418.exe Token: SeDebugPrivilege 3428 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4088 si153582.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2484 2236 85ebf911d03983e6e8b7fadfff4a91722ee9d2ec30203cd8389379ba7070993c.exe 66 PID 2236 wrote to memory of 2484 2236 85ebf911d03983e6e8b7fadfff4a91722ee9d2ec30203cd8389379ba7070993c.exe 66 PID 2236 wrote to memory of 2484 2236 85ebf911d03983e6e8b7fadfff4a91722ee9d2ec30203cd8389379ba7070993c.exe 66 PID 2484 wrote to memory of 2592 2484 un208591.exe 67 PID 2484 wrote to memory of 2592 2484 un208591.exe 67 PID 2484 wrote to memory of 2592 2484 un208591.exe 67 PID 2592 wrote to memory of 3084 2592 un026843.exe 68 PID 2592 wrote to memory of 3084 2592 un026843.exe 68 PID 2592 wrote to memory of 3084 2592 un026843.exe 68 PID 2592 wrote to memory of 1356 2592 un026843.exe 69 PID 2592 wrote to memory of 1356 2592 un026843.exe 69 PID 2592 wrote to memory of 1356 2592 un026843.exe 69 PID 1356 wrote to memory of 3428 1356 qu099326.exe 70 PID 1356 wrote to memory of 3428 1356 qu099326.exe 70 PID 1356 wrote to memory of 3428 1356 qu099326.exe 70 PID 2484 wrote to memory of 1632 2484 un208591.exe 71 PID 2484 wrote to memory of 1632 2484 un208591.exe 71 PID 2484 wrote to memory of 1632 2484 un208591.exe 71 PID 2236 wrote to memory of 4088 2236 85ebf911d03983e6e8b7fadfff4a91722ee9d2ec30203cd8389379ba7070993c.exe 73 PID 2236 wrote to memory of 4088 2236 85ebf911d03983e6e8b7fadfff4a91722ee9d2ec30203cd8389379ba7070993c.exe 73 PID 2236 wrote to memory of 4088 2236 85ebf911d03983e6e8b7fadfff4a91722ee9d2ec30203cd8389379ba7070993c.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\85ebf911d03983e6e8b7fadfff4a91722ee9d2ec30203cd8389379ba7070993c.exe"C:\Users\Admin\AppData\Local\Temp\85ebf911d03983e6e8b7fadfff4a91722ee9d2ec30203cd8389379ba7070993c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un208591.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un208591.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un026843.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un026843.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr776495.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr776495.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3084
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu099326.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu099326.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3428
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk746418.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk746418.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si153582.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si153582.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:4088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 6323⤵
- Program crash
PID:4696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 7083⤵
- Program crash
PID:2808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 8123⤵
- Program crash
PID:5012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 8563⤵
- Program crash
PID:3084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 8923⤵
- Program crash
PID:2732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 9323⤵
- Program crash
PID:3052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 11243⤵
- Program crash
PID:2240
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 11563⤵
- Program crash
PID:1344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 12123⤵
- Program crash
PID:4592
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD54d611f4112ed8379871f8bcb211ca4a3
SHA15da68386eaf519b34f8de099d3443379ab027ef7
SHA256a76929112fba2a0c2a7eaf33e6fef368ba8f828ec791192b7a44b13fb86ed80e
SHA5124801282feec1c85982f1eceaba0293f99b64a001b7ff3c7e46e147d10f88ede3dd421c67117ccc19ac2b3e4245009bbecb5de497c5c0cd4c4ae120717ab310a7
-
Filesize
397KB
MD54d611f4112ed8379871f8bcb211ca4a3
SHA15da68386eaf519b34f8de099d3443379ab027ef7
SHA256a76929112fba2a0c2a7eaf33e6fef368ba8f828ec791192b7a44b13fb86ed80e
SHA5124801282feec1c85982f1eceaba0293f99b64a001b7ff3c7e46e147d10f88ede3dd421c67117ccc19ac2b3e4245009bbecb5de497c5c0cd4c4ae120717ab310a7
-
Filesize
862KB
MD5ac5ca689e6070201b5f0a9cf423d277b
SHA13c211418c686a3e2b4ecc027d88bf84dcccc988a
SHA25673fd85954398a6586b3ff629920ebd0fdc9d7f7ededfb438575bdc960dfd5590
SHA512130bddd3ee7d0138d95aa700b45b72cae8164ba39a5e2336f5424e7b19bef3a85dba4a3cc4a976be2141903f4745907b58e3b36a20008ea5d323968b23942e62
-
Filesize
862KB
MD5ac5ca689e6070201b5f0a9cf423d277b
SHA13c211418c686a3e2b4ecc027d88bf84dcccc988a
SHA25673fd85954398a6586b3ff629920ebd0fdc9d7f7ededfb438575bdc960dfd5590
SHA512130bddd3ee7d0138d95aa700b45b72cae8164ba39a5e2336f5424e7b19bef3a85dba4a3cc4a976be2141903f4745907b58e3b36a20008ea5d323968b23942e62
-
Filesize
168KB
MD5aa8bb998c46f60bacf91f98f8d4d7b5c
SHA161c7e314d916035128849f85a29b34ac1fb482e0
SHA2567e0252d52b7ff9e4466411941eb98cc220824be0f2eefdfe38e6b494f1176131
SHA5123e1e8400351fbeedbb0f07370260dea23782c24924482d33c54f9db9659c858c2ee89f69b9a8256b091efec0ea33b09e408e0d218769ca3e2cbd013dd935dde7
-
Filesize
168KB
MD5aa8bb998c46f60bacf91f98f8d4d7b5c
SHA161c7e314d916035128849f85a29b34ac1fb482e0
SHA2567e0252d52b7ff9e4466411941eb98cc220824be0f2eefdfe38e6b494f1176131
SHA5123e1e8400351fbeedbb0f07370260dea23782c24924482d33c54f9db9659c858c2ee89f69b9a8256b091efec0ea33b09e408e0d218769ca3e2cbd013dd935dde7
-
Filesize
708KB
MD54b825f6a084d5e3bd711f2f634813ba0
SHA1c67911903c7dd538319646f63f61cca94cd0d4c7
SHA2562762ac94d8b4d682f2668e9b7e9622f7780e6ffb71d1b892f9e30521cd043c64
SHA51214657dda014f7871fb1288ea78ff0026b589a6cdac3208bb7fad129db546b60461d4f7e1a0d29301baa3cc3bc5f0de0bcfaea2f36bd369307cf17b96bb9210bc
-
Filesize
708KB
MD54b825f6a084d5e3bd711f2f634813ba0
SHA1c67911903c7dd538319646f63f61cca94cd0d4c7
SHA2562762ac94d8b4d682f2668e9b7e9622f7780e6ffb71d1b892f9e30521cd043c64
SHA51214657dda014f7871fb1288ea78ff0026b589a6cdac3208bb7fad129db546b60461d4f7e1a0d29301baa3cc3bc5f0de0bcfaea2f36bd369307cf17b96bb9210bc
-
Filesize
404KB
MD52a0416295de9cc413f5ebb18fb4cb31c
SHA17d4db9d8c9a095adcfe6e04c1405ac7e3ac6576a
SHA25657232c2d0e46628b65d787836e304ed09822f033e73345794393740b0d59f100
SHA512359c1c07622aaf7c37a86b6216b1198a6ad9fe49f97981698d81c0a3283af816ed5e5c65e88307ac610dd4f80c8b3af5025451e847dcfb635edbda751d220c0a
-
Filesize
404KB
MD52a0416295de9cc413f5ebb18fb4cb31c
SHA17d4db9d8c9a095adcfe6e04c1405ac7e3ac6576a
SHA25657232c2d0e46628b65d787836e304ed09822f033e73345794393740b0d59f100
SHA512359c1c07622aaf7c37a86b6216b1198a6ad9fe49f97981698d81c0a3283af816ed5e5c65e88307ac610dd4f80c8b3af5025451e847dcfb635edbda751d220c0a
-
Filesize
588KB
MD50ed9ace25377cf95eca960af07c17bc0
SHA13659f09bc07edee2373226bbecbc2696510c69f6
SHA256e545e3700e26aae0861f17fe90d61267255853605a4aa9eee3596baedcd51f87
SHA512d968982c98db3a6639aa54f8b28c97d625bc2c9fa0d1f1c8148d8d0b9c5d0e5340069837128f34c6f629e123fcf12afeff99dbf4986d194e8b57aa775ad41c01
-
Filesize
588KB
MD50ed9ace25377cf95eca960af07c17bc0
SHA13659f09bc07edee2373226bbecbc2696510c69f6
SHA256e545e3700e26aae0861f17fe90d61267255853605a4aa9eee3596baedcd51f87
SHA512d968982c98db3a6639aa54f8b28c97d625bc2c9fa0d1f1c8148d8d0b9c5d0e5340069837128f34c6f629e123fcf12afeff99dbf4986d194e8b57aa775ad41c01
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1