Analysis
-
max time kernel
142s -
max time network
109s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
13/04/2023, 07:22
Static task
static1
General
-
Target
1e9a515fef1dd644f7ed8ac33346c502cd7b8c6dfc27377ea8dbea37ca791603.exe
-
Size
1.1MB
-
MD5
d61cc9e46758eb1d393c21e750824da4
-
SHA1
293a7007466e790aeb968f141d68833472e80d79
-
SHA256
1e9a515fef1dd644f7ed8ac33346c502cd7b8c6dfc27377ea8dbea37ca791603
-
SHA512
3c149e68b0237a46c013a7cb3ba8edee07cb75527b3344b22d553b195b8082c7309d647d29e2fbf588d6e7b47e8294dd797ae86fcfa7bbf8040335140d0febf0
-
SSDEEP
24576:uyzcfJ3P9cueWSsCtedM8OqbDjisyryvg5105:9qJVGWfCtD8HbDOT0
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr484820.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr484820.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr484820.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr484820.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr484820.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2016 un345220.exe 2440 un988089.exe 2524 pr484820.exe 3988 qu619189.exe 648 1.exe 3320 rk515770.exe 2936 si123270.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr484820.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr484820.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1e9a515fef1dd644f7ed8ac33346c502cd7b8c6dfc27377ea8dbea37ca791603.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1e9a515fef1dd644f7ed8ac33346c502cd7b8c6dfc27377ea8dbea37ca791603.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un345220.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un345220.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un988089.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un988089.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
pid pid_target Process procid_target 4036 2936 WerFault.exe 73 4308 2936 WerFault.exe 73 1452 2936 WerFault.exe 73 2900 2936 WerFault.exe 73 4660 2936 WerFault.exe 73 1284 2936 WerFault.exe 73 2712 2936 WerFault.exe 73 4708 2936 WerFault.exe 73 3960 2936 WerFault.exe 73 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2524 pr484820.exe 2524 pr484820.exe 3320 rk515770.exe 648 1.exe 648 1.exe 3320 rk515770.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2524 pr484820.exe Token: SeDebugPrivilege 3988 qu619189.exe Token: SeDebugPrivilege 3320 rk515770.exe Token: SeDebugPrivilege 648 1.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2008 wrote to memory of 2016 2008 1e9a515fef1dd644f7ed8ac33346c502cd7b8c6dfc27377ea8dbea37ca791603.exe 66 PID 2008 wrote to memory of 2016 2008 1e9a515fef1dd644f7ed8ac33346c502cd7b8c6dfc27377ea8dbea37ca791603.exe 66 PID 2008 wrote to memory of 2016 2008 1e9a515fef1dd644f7ed8ac33346c502cd7b8c6dfc27377ea8dbea37ca791603.exe 66 PID 2016 wrote to memory of 2440 2016 un345220.exe 67 PID 2016 wrote to memory of 2440 2016 un345220.exe 67 PID 2016 wrote to memory of 2440 2016 un345220.exe 67 PID 2440 wrote to memory of 2524 2440 un988089.exe 68 PID 2440 wrote to memory of 2524 2440 un988089.exe 68 PID 2440 wrote to memory of 2524 2440 un988089.exe 68 PID 2440 wrote to memory of 3988 2440 un988089.exe 69 PID 2440 wrote to memory of 3988 2440 un988089.exe 69 PID 2440 wrote to memory of 3988 2440 un988089.exe 69 PID 3988 wrote to memory of 648 3988 qu619189.exe 70 PID 3988 wrote to memory of 648 3988 qu619189.exe 70 PID 3988 wrote to memory of 648 3988 qu619189.exe 70 PID 2016 wrote to memory of 3320 2016 un345220.exe 71 PID 2016 wrote to memory of 3320 2016 un345220.exe 71 PID 2016 wrote to memory of 3320 2016 un345220.exe 71 PID 2008 wrote to memory of 2936 2008 1e9a515fef1dd644f7ed8ac33346c502cd7b8c6dfc27377ea8dbea37ca791603.exe 73 PID 2008 wrote to memory of 2936 2008 1e9a515fef1dd644f7ed8ac33346c502cd7b8c6dfc27377ea8dbea37ca791603.exe 73 PID 2008 wrote to memory of 2936 2008 1e9a515fef1dd644f7ed8ac33346c502cd7b8c6dfc27377ea8dbea37ca791603.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e9a515fef1dd644f7ed8ac33346c502cd7b8c6dfc27377ea8dbea37ca791603.exe"C:\Users\Admin\AppData\Local\Temp\1e9a515fef1dd644f7ed8ac33346c502cd7b8c6dfc27377ea8dbea37ca791603.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un345220.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un345220.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un988089.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un988089.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr484820.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr484820.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2524
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu619189.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu619189.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:648
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk515770.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk515770.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3320
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si123270.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si123270.exe2⤵
- Executes dropped EXE
PID:2936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 6163⤵
- Program crash
PID:4036
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 6963⤵
- Program crash
PID:4308
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 7683⤵
- Program crash
PID:1452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 8443⤵
- Program crash
PID:2900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 8723⤵
- Program crash
PID:4660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 8883⤵
- Program crash
PID:1284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 11203⤵
- Program crash
PID:2712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 11523⤵
- Program crash
PID:4708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 10323⤵
- Program crash
PID:3960
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
253KB
MD5d7d27cec03a99717cceaa9a2303cf106
SHA11ef9e888e19bf0315036e31deb80e53e0dbaa54b
SHA256245f5a47c956e169777b0de250c214d650248d895d73637b94412c95825f2260
SHA512edf2dd3a89b9e4c476a021ec648ed3dc7d5b9b6ae24702b73cc2d1ac824332e8954c03257028bb2a4c41d40bf5b27115ec84d8084329356c38b38737b79b0932
-
Filesize
253KB
MD5d7d27cec03a99717cceaa9a2303cf106
SHA11ef9e888e19bf0315036e31deb80e53e0dbaa54b
SHA256245f5a47c956e169777b0de250c214d650248d895d73637b94412c95825f2260
SHA512edf2dd3a89b9e4c476a021ec648ed3dc7d5b9b6ae24702b73cc2d1ac824332e8954c03257028bb2a4c41d40bf5b27115ec84d8084329356c38b38737b79b0932
-
Filesize
808KB
MD50b063530d752fb7b4b8ad6e92d71a5c2
SHA1a043dbaec138259ed79cad2bab3223c900b73ca5
SHA2564b46b7a394a6f8b201deb32c8574a66c7879fa811761a7939e106753ca611486
SHA51251e39b55e97ba149d15726383fe9d2fb9c393cfd35ac32b670e6eeba50cfc4f4b6bcc95f44fa90696ac11d80f60d0859560abb675d43ab3a85c2f470f565fec3
-
Filesize
808KB
MD50b063530d752fb7b4b8ad6e92d71a5c2
SHA1a043dbaec138259ed79cad2bab3223c900b73ca5
SHA2564b46b7a394a6f8b201deb32c8574a66c7879fa811761a7939e106753ca611486
SHA51251e39b55e97ba149d15726383fe9d2fb9c393cfd35ac32b670e6eeba50cfc4f4b6bcc95f44fa90696ac11d80f60d0859560abb675d43ab3a85c2f470f565fec3
-
Filesize
168KB
MD5aa8bb998c46f60bacf91f98f8d4d7b5c
SHA161c7e314d916035128849f85a29b34ac1fb482e0
SHA2567e0252d52b7ff9e4466411941eb98cc220824be0f2eefdfe38e6b494f1176131
SHA5123e1e8400351fbeedbb0f07370260dea23782c24924482d33c54f9db9659c858c2ee89f69b9a8256b091efec0ea33b09e408e0d218769ca3e2cbd013dd935dde7
-
Filesize
168KB
MD5aa8bb998c46f60bacf91f98f8d4d7b5c
SHA161c7e314d916035128849f85a29b34ac1fb482e0
SHA2567e0252d52b7ff9e4466411941eb98cc220824be0f2eefdfe38e6b494f1176131
SHA5123e1e8400351fbeedbb0f07370260dea23782c24924482d33c54f9db9659c858c2ee89f69b9a8256b091efec0ea33b09e408e0d218769ca3e2cbd013dd935dde7
-
Filesize
654KB
MD5536089b4d2c3ed6992e7f5ca40f08c19
SHA12dd0bed513e7128becc75a4d91217b2a472c5e2f
SHA2564bd8729433eecd78431b6b108685fba2fd366040ed91dd102473ffe0fecb2416
SHA5127c658c3d42164c83a3192209ed75ba1d7c48c26c815e56a84a126b07c67ede4003ea2f1b8329129c336ba27977e0bead84850deba1c3146dd3b8f66cab941b39
-
Filesize
654KB
MD5536089b4d2c3ed6992e7f5ca40f08c19
SHA12dd0bed513e7128becc75a4d91217b2a472c5e2f
SHA2564bd8729433eecd78431b6b108685fba2fd366040ed91dd102473ffe0fecb2416
SHA5127c658c3d42164c83a3192209ed75ba1d7c48c26c815e56a84a126b07c67ede4003ea2f1b8329129c336ba27977e0bead84850deba1c3146dd3b8f66cab941b39
-
Filesize
262KB
MD51ff366c17fe36ba57005653add861d00
SHA13d6424ab0625447b3b08ba0fe7075d635bcab94d
SHA256fbf02eb5807cd8d6bcfea389770a1354b36ba78d679cb56ba38681e2c0b13e9c
SHA512c165fac69d74c72ed7bd07fba0fbbd2990055e7ad868f987ffad5af11a594f326fd2e5fbc06f92cc33d18a52dadd5fe8547d8ebeb3ef70abab61382e152711d0
-
Filesize
262KB
MD51ff366c17fe36ba57005653add861d00
SHA13d6424ab0625447b3b08ba0fe7075d635bcab94d
SHA256fbf02eb5807cd8d6bcfea389770a1354b36ba78d679cb56ba38681e2c0b13e9c
SHA512c165fac69d74c72ed7bd07fba0fbbd2990055e7ad868f987ffad5af11a594f326fd2e5fbc06f92cc33d18a52dadd5fe8547d8ebeb3ef70abab61382e152711d0
-
Filesize
445KB
MD5761e7bb299d220fb2470aa9f70b6f81e
SHA1ec79f387da5f5866a8b421f30073c2c7cc6f1f4f
SHA2561f007730d7fc752c0982237c8065b2986cbc795bb7a3446d0017837875600d4c
SHA512d25174d4c15bf5eacaa39fa106f48cb53f77a0bb606eba5f6b616c639ac678cc5ca22f4203bce66c57ea24ac7db7a9760dfc3f11f0ecebbb1450073ca8895d69
-
Filesize
445KB
MD5761e7bb299d220fb2470aa9f70b6f81e
SHA1ec79f387da5f5866a8b421f30073c2c7cc6f1f4f
SHA2561f007730d7fc752c0982237c8065b2986cbc795bb7a3446d0017837875600d4c
SHA512d25174d4c15bf5eacaa39fa106f48cb53f77a0bb606eba5f6b616c639ac678cc5ca22f4203bce66c57ea24ac7db7a9760dfc3f11f0ecebbb1450073ca8895d69
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1