Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
13-04-2023 04:18
Static task
static1
General
-
Target
f17ede0f57c607e5cce6bfa5a89b30ae547ff2dd9732b338e23f49c5935487a8.exe
-
Size
1.2MB
-
MD5
922b31538ca68987cf55a54d2d015333
-
SHA1
ab053cf478a6d7ad373814ec3bb43845942a6482
-
SHA256
f17ede0f57c607e5cce6bfa5a89b30ae547ff2dd9732b338e23f49c5935487a8
-
SHA512
ac25634d74ce2ee6bf7232bd14335ce0288c785f3981937755b69ccd81b2dd12cd89a303859b651a90a313ac61d1e589b1bc60e69d0a2302170b3859abbb2cc5
-
SSDEEP
24576:IyJ/Ncu6zxuC2sohcplXWPO8q1iIqgh7NvoGEm82h4BPyVV1BxTaR1d2:PZNW9qcrXWPnvWQS8JBcBxM
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr677675.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr677675.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr677675.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr677675.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr677675.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 3652 un826684.exe 4608 un111934.exe 5008 pr677675.exe 4268 qu540558.exe 168 1.exe 212 rk578097.exe 4040 si154179.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr677675.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr677675.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un826684.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un826684.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un111934.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un111934.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f17ede0f57c607e5cce6bfa5a89b30ae547ff2dd9732b338e23f49c5935487a8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f17ede0f57c607e5cce6bfa5a89b30ae547ff2dd9732b338e23f49c5935487a8.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
pid pid_target Process procid_target 4340 4040 WerFault.exe 73 1636 4040 WerFault.exe 73 4412 4040 WerFault.exe 73 1708 4040 WerFault.exe 73 2088 4040 WerFault.exe 73 4136 4040 WerFault.exe 73 3984 4040 WerFault.exe 73 4772 4040 WerFault.exe 73 2516 4040 WerFault.exe 73 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5008 pr677675.exe 5008 pr677675.exe 168 1.exe 168 1.exe 212 rk578097.exe 212 rk578097.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 5008 pr677675.exe Token: SeDebugPrivilege 4268 qu540558.exe Token: SeDebugPrivilege 168 1.exe Token: SeDebugPrivilege 212 rk578097.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4040 si154179.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 420 wrote to memory of 3652 420 f17ede0f57c607e5cce6bfa5a89b30ae547ff2dd9732b338e23f49c5935487a8.exe 66 PID 420 wrote to memory of 3652 420 f17ede0f57c607e5cce6bfa5a89b30ae547ff2dd9732b338e23f49c5935487a8.exe 66 PID 420 wrote to memory of 3652 420 f17ede0f57c607e5cce6bfa5a89b30ae547ff2dd9732b338e23f49c5935487a8.exe 66 PID 3652 wrote to memory of 4608 3652 un826684.exe 67 PID 3652 wrote to memory of 4608 3652 un826684.exe 67 PID 3652 wrote to memory of 4608 3652 un826684.exe 67 PID 4608 wrote to memory of 5008 4608 un111934.exe 68 PID 4608 wrote to memory of 5008 4608 un111934.exe 68 PID 4608 wrote to memory of 5008 4608 un111934.exe 68 PID 4608 wrote to memory of 4268 4608 un111934.exe 69 PID 4608 wrote to memory of 4268 4608 un111934.exe 69 PID 4608 wrote to memory of 4268 4608 un111934.exe 69 PID 4268 wrote to memory of 168 4268 qu540558.exe 70 PID 4268 wrote to memory of 168 4268 qu540558.exe 70 PID 4268 wrote to memory of 168 4268 qu540558.exe 70 PID 3652 wrote to memory of 212 3652 un826684.exe 71 PID 3652 wrote to memory of 212 3652 un826684.exe 71 PID 3652 wrote to memory of 212 3652 un826684.exe 71 PID 420 wrote to memory of 4040 420 f17ede0f57c607e5cce6bfa5a89b30ae547ff2dd9732b338e23f49c5935487a8.exe 73 PID 420 wrote to memory of 4040 420 f17ede0f57c607e5cce6bfa5a89b30ae547ff2dd9732b338e23f49c5935487a8.exe 73 PID 420 wrote to memory of 4040 420 f17ede0f57c607e5cce6bfa5a89b30ae547ff2dd9732b338e23f49c5935487a8.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\f17ede0f57c607e5cce6bfa5a89b30ae547ff2dd9732b338e23f49c5935487a8.exe"C:\Users\Admin\AppData\Local\Temp\f17ede0f57c607e5cce6bfa5a89b30ae547ff2dd9732b338e23f49c5935487a8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:420 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un826684.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un826684.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un111934.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un111934.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr677675.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr677675.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5008
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu540558.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu540558.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:168
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk578097.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk578097.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:212
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si154179.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si154179.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:4040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4040 -s 6363⤵
- Program crash
PID:4340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4040 -s 7123⤵
- Program crash
PID:1636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4040 -s 8523⤵
- Program crash
PID:4412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4040 -s 8603⤵
- Program crash
PID:1708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4040 -s 8883⤵
- Program crash
PID:2088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4040 -s 8963⤵
- Program crash
PID:4136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4040 -s 11363⤵
- Program crash
PID:3984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4040 -s 11923⤵
- Program crash
PID:4772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4040 -s 11723⤵
- Program crash
PID:2516
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD5bbbec5ce3b1279c6472793690cb1a268
SHA174ced06a77e3f7f0599292de1619afd378595a97
SHA2564e396c3bcad1b9a096007f3126dddd3865ff9ff9413a4ae3c3cacc41cd4e21af
SHA512f50d6644855b84ffee35a8470bc349bfffc8a6c6e9053cdec33d2374b00a473abda7fbb6d2dfe694d96b439d97832d65112c73d4e5c45077d86fe8e6b9053a35
-
Filesize
397KB
MD5bbbec5ce3b1279c6472793690cb1a268
SHA174ced06a77e3f7f0599292de1619afd378595a97
SHA2564e396c3bcad1b9a096007f3126dddd3865ff9ff9413a4ae3c3cacc41cd4e21af
SHA512f50d6644855b84ffee35a8470bc349bfffc8a6c6e9053cdec33d2374b00a473abda7fbb6d2dfe694d96b439d97832d65112c73d4e5c45077d86fe8e6b9053a35
-
Filesize
862KB
MD5a77b71ee61c8e3f99eed8b3991dcf197
SHA171e73efded1e152e5284595ddf83d088ffa7ae42
SHA256368fd347a6d7bfec6f0b9933f897d5d15f01599d3c4fcc163d79f8a8fe92654f
SHA5123950f3e020ad9f9056919f7281f814ce81bee68a8ae1acbb18934d4d545f2f06c8955fd821b8e61ca91944bd61467f5ee40053cacd72cea13918fcb70c0820e5
-
Filesize
862KB
MD5a77b71ee61c8e3f99eed8b3991dcf197
SHA171e73efded1e152e5284595ddf83d088ffa7ae42
SHA256368fd347a6d7bfec6f0b9933f897d5d15f01599d3c4fcc163d79f8a8fe92654f
SHA5123950f3e020ad9f9056919f7281f814ce81bee68a8ae1acbb18934d4d545f2f06c8955fd821b8e61ca91944bd61467f5ee40053cacd72cea13918fcb70c0820e5
-
Filesize
168KB
MD5aa8bb998c46f60bacf91f98f8d4d7b5c
SHA161c7e314d916035128849f85a29b34ac1fb482e0
SHA2567e0252d52b7ff9e4466411941eb98cc220824be0f2eefdfe38e6b494f1176131
SHA5123e1e8400351fbeedbb0f07370260dea23782c24924482d33c54f9db9659c858c2ee89f69b9a8256b091efec0ea33b09e408e0d218769ca3e2cbd013dd935dde7
-
Filesize
168KB
MD5aa8bb998c46f60bacf91f98f8d4d7b5c
SHA161c7e314d916035128849f85a29b34ac1fb482e0
SHA2567e0252d52b7ff9e4466411941eb98cc220824be0f2eefdfe38e6b494f1176131
SHA5123e1e8400351fbeedbb0f07370260dea23782c24924482d33c54f9db9659c858c2ee89f69b9a8256b091efec0ea33b09e408e0d218769ca3e2cbd013dd935dde7
-
Filesize
708KB
MD53fb0b0a93171d2b9337de0ace90a3099
SHA187233f2c761ae3d8dea72b0e6351dbab25fe956f
SHA256fc552488db20e2cfcf45e78f92e7fba3f8858d9ba8d329994044211965f25ec1
SHA51299a8e19651987a3b9162bdcd94d8139c10d7a8e6a53b3f982925594aeb12ed1f4a6d928f19ba44d971370951ac4d2928f35c9a5b262bb3823de81b14c091fe93
-
Filesize
708KB
MD53fb0b0a93171d2b9337de0ace90a3099
SHA187233f2c761ae3d8dea72b0e6351dbab25fe956f
SHA256fc552488db20e2cfcf45e78f92e7fba3f8858d9ba8d329994044211965f25ec1
SHA51299a8e19651987a3b9162bdcd94d8139c10d7a8e6a53b3f982925594aeb12ed1f4a6d928f19ba44d971370951ac4d2928f35c9a5b262bb3823de81b14c091fe93
-
Filesize
404KB
MD5305f64d696ae67a0e1d8a2bd49654db1
SHA1dcbf07ee45a8d0c2a21790bff1c00e5f755e5c67
SHA256d5ab572b2b721e0bacf685992db63394a858cee3e50c75d87062213d9b1dd4cb
SHA51289eaf9b53c6b9ea5dae827c59c91558fbb1963597c1caa95014d37fcf2c4e9fc24ece23a559f87ce90d69ae05fd4662a295abe4a51649b0ed169cf68f82d2999
-
Filesize
404KB
MD5305f64d696ae67a0e1d8a2bd49654db1
SHA1dcbf07ee45a8d0c2a21790bff1c00e5f755e5c67
SHA256d5ab572b2b721e0bacf685992db63394a858cee3e50c75d87062213d9b1dd4cb
SHA51289eaf9b53c6b9ea5dae827c59c91558fbb1963597c1caa95014d37fcf2c4e9fc24ece23a559f87ce90d69ae05fd4662a295abe4a51649b0ed169cf68f82d2999
-
Filesize
588KB
MD5bc1e71d7c41063b3db2530089966432d
SHA18a73131b9d878a462f11d613b3c601a6723687d2
SHA256263555c6c11f01e88e9e2c6fbc824b118db95b2c0b7704d89e24631d083aa522
SHA5129a6cf1d3142d5c61708d5a36cddc1f2c80d1e44c0bc40969d8352becf4fa23767fb49526448312b8ccebb0b82acd7457099f943c6b0396673a5120bbee181b99
-
Filesize
588KB
MD5bc1e71d7c41063b3db2530089966432d
SHA18a73131b9d878a462f11d613b3c601a6723687d2
SHA256263555c6c11f01e88e9e2c6fbc824b118db95b2c0b7704d89e24631d083aa522
SHA5129a6cf1d3142d5c61708d5a36cddc1f2c80d1e44c0bc40969d8352becf4fa23767fb49526448312b8ccebb0b82acd7457099f943c6b0396673a5120bbee181b99
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1