Analysis
-
max time kernel
144s -
max time network
103s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
13/04/2023, 07:24
Static task
static1
General
-
Target
b33934e54692350cdacb524540a9234c2149b5d8700e74f30bc2daf1c4a38495.exe
-
Size
940KB
-
MD5
eacae85f3f29380263b8c20c5c37d894
-
SHA1
68fcee1ed8f0c56616bbf45988459032c202996f
-
SHA256
b33934e54692350cdacb524540a9234c2149b5d8700e74f30bc2daf1c4a38495
-
SHA512
80fc4915f647ed5081efd59fb3331c6832eb7c0eb8eb120f7ef694d7ed2eb1d5eb6ddafa8a3ecc53c995ead5824dd70ad84c3c4df3e69a4a9460720e68c29409
-
SSDEEP
24576:SyEHxVyVel5qNhvgKGPwAkQF2XpmP1Qt8:52xVuel0NhyPpz4GQt
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it438696.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it438696.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it438696.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it438696.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it438696.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 1528 ziIQ3125.exe 3860 zimj0630.exe 3848 it438696.exe 4508 jr257428.exe 200 1.exe 3100 kp939650.exe 3740 lr018902.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it438696.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziIQ3125.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zimj0630.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zimj0630.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b33934e54692350cdacb524540a9234c2149b5d8700e74f30bc2daf1c4a38495.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b33934e54692350cdacb524540a9234c2149b5d8700e74f30bc2daf1c4a38495.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziIQ3125.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
pid pid_target Process procid_target 3828 3740 WerFault.exe 73 4524 3740 WerFault.exe 73 3892 3740 WerFault.exe 73 4736 3740 WerFault.exe 73 4816 3740 WerFault.exe 73 1408 3740 WerFault.exe 73 2932 3740 WerFault.exe 73 4796 3740 WerFault.exe 73 3220 3740 WerFault.exe 73 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3848 it438696.exe 3848 it438696.exe 3100 kp939650.exe 200 1.exe 3100 kp939650.exe 200 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3848 it438696.exe Token: SeDebugPrivilege 4508 jr257428.exe Token: SeDebugPrivilege 3100 kp939650.exe Token: SeDebugPrivilege 200 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3740 lr018902.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2208 wrote to memory of 1528 2208 b33934e54692350cdacb524540a9234c2149b5d8700e74f30bc2daf1c4a38495.exe 66 PID 2208 wrote to memory of 1528 2208 b33934e54692350cdacb524540a9234c2149b5d8700e74f30bc2daf1c4a38495.exe 66 PID 2208 wrote to memory of 1528 2208 b33934e54692350cdacb524540a9234c2149b5d8700e74f30bc2daf1c4a38495.exe 66 PID 1528 wrote to memory of 3860 1528 ziIQ3125.exe 67 PID 1528 wrote to memory of 3860 1528 ziIQ3125.exe 67 PID 1528 wrote to memory of 3860 1528 ziIQ3125.exe 67 PID 3860 wrote to memory of 3848 3860 zimj0630.exe 68 PID 3860 wrote to memory of 3848 3860 zimj0630.exe 68 PID 3860 wrote to memory of 4508 3860 zimj0630.exe 69 PID 3860 wrote to memory of 4508 3860 zimj0630.exe 69 PID 3860 wrote to memory of 4508 3860 zimj0630.exe 69 PID 4508 wrote to memory of 200 4508 jr257428.exe 70 PID 4508 wrote to memory of 200 4508 jr257428.exe 70 PID 4508 wrote to memory of 200 4508 jr257428.exe 70 PID 1528 wrote to memory of 3100 1528 ziIQ3125.exe 71 PID 1528 wrote to memory of 3100 1528 ziIQ3125.exe 71 PID 1528 wrote to memory of 3100 1528 ziIQ3125.exe 71 PID 2208 wrote to memory of 3740 2208 b33934e54692350cdacb524540a9234c2149b5d8700e74f30bc2daf1c4a38495.exe 73 PID 2208 wrote to memory of 3740 2208 b33934e54692350cdacb524540a9234c2149b5d8700e74f30bc2daf1c4a38495.exe 73 PID 2208 wrote to memory of 3740 2208 b33934e54692350cdacb524540a9234c2149b5d8700e74f30bc2daf1c4a38495.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\b33934e54692350cdacb524540a9234c2149b5d8700e74f30bc2daf1c4a38495.exe"C:\Users\Admin\AppData\Local\Temp\b33934e54692350cdacb524540a9234c2149b5d8700e74f30bc2daf1c4a38495.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziIQ3125.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziIQ3125.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zimj0630.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zimj0630.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it438696.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it438696.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3848
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr257428.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr257428.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:200
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp939650.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp939650.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3100
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr018902.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr018902.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:3740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3740 -s 6203⤵
- Program crash
PID:3828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3740 -s 7043⤵
- Program crash
PID:4524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3740 -s 8363⤵
- Program crash
PID:3892
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3740 -s 8483⤵
- Program crash
PID:4736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3740 -s 8763⤵
- Program crash
PID:4816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3740 -s 8323⤵
- Program crash
PID:1408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3740 -s 11203⤵
- Program crash
PID:2932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3740 -s 11603⤵
- Program crash
PID:4796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3740 -s 10803⤵
- Program crash
PID:3220
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
253KB
MD5d7d27cec03a99717cceaa9a2303cf106
SHA11ef9e888e19bf0315036e31deb80e53e0dbaa54b
SHA256245f5a47c956e169777b0de250c214d650248d895d73637b94412c95825f2260
SHA512edf2dd3a89b9e4c476a021ec648ed3dc7d5b9b6ae24702b73cc2d1ac824332e8954c03257028bb2a4c41d40bf5b27115ec84d8084329356c38b38737b79b0932
-
Filesize
253KB
MD5d7d27cec03a99717cceaa9a2303cf106
SHA11ef9e888e19bf0315036e31deb80e53e0dbaa54b
SHA256245f5a47c956e169777b0de250c214d650248d895d73637b94412c95825f2260
SHA512edf2dd3a89b9e4c476a021ec648ed3dc7d5b9b6ae24702b73cc2d1ac824332e8954c03257028bb2a4c41d40bf5b27115ec84d8084329356c38b38737b79b0932
-
Filesize
668KB
MD564a0a681ec1d9dd81f524873c8a785d9
SHA1d30e4fed97b516ba6bdf7dac9775371bc9bd3e6b
SHA256f02a7d0e4ddf3885523e6e1c1c536060e2f4a5ffa0fb15f26ad60636cea2df78
SHA512930e4b30b3b65b3bd123c416ed906a84b4d81a3cf3d709f72dee4683cc29b5bc3a1ee06646836f553367f26d026f561a6cc4a20b1ca16d4e320f328aeb62b9f5
-
Filesize
668KB
MD564a0a681ec1d9dd81f524873c8a785d9
SHA1d30e4fed97b516ba6bdf7dac9775371bc9bd3e6b
SHA256f02a7d0e4ddf3885523e6e1c1c536060e2f4a5ffa0fb15f26ad60636cea2df78
SHA512930e4b30b3b65b3bd123c416ed906a84b4d81a3cf3d709f72dee4683cc29b5bc3a1ee06646836f553367f26d026f561a6cc4a20b1ca16d4e320f328aeb62b9f5
-
Filesize
168KB
MD5aa8bb998c46f60bacf91f98f8d4d7b5c
SHA161c7e314d916035128849f85a29b34ac1fb482e0
SHA2567e0252d52b7ff9e4466411941eb98cc220824be0f2eefdfe38e6b494f1176131
SHA5123e1e8400351fbeedbb0f07370260dea23782c24924482d33c54f9db9659c858c2ee89f69b9a8256b091efec0ea33b09e408e0d218769ca3e2cbd013dd935dde7
-
Filesize
168KB
MD5aa8bb998c46f60bacf91f98f8d4d7b5c
SHA161c7e314d916035128849f85a29b34ac1fb482e0
SHA2567e0252d52b7ff9e4466411941eb98cc220824be0f2eefdfe38e6b494f1176131
SHA5123e1e8400351fbeedbb0f07370260dea23782c24924482d33c54f9db9659c858c2ee89f69b9a8256b091efec0ea33b09e408e0d218769ca3e2cbd013dd935dde7
-
Filesize
514KB
MD5b3a8a7e370c72cfd6e1ad423ff33d45d
SHA1712c17615b65e25179c7ca5874491109e74b5131
SHA2562ad135e220a30fa306c71a180cf968f49293bc7c7e229c5fb6e56fce729a79fc
SHA512cd970ce9b8880bab365f36663ea4e28259eb815fd28628276fef17dde94135f7a9566f5844397a7bffcf23e523a09149e73e2c7e7bc6ef9812ec39eb5039081b
-
Filesize
514KB
MD5b3a8a7e370c72cfd6e1ad423ff33d45d
SHA1712c17615b65e25179c7ca5874491109e74b5131
SHA2562ad135e220a30fa306c71a180cf968f49293bc7c7e229c5fb6e56fce729a79fc
SHA512cd970ce9b8880bab365f36663ea4e28259eb815fd28628276fef17dde94135f7a9566f5844397a7bffcf23e523a09149e73e2c7e7bc6ef9812ec39eb5039081b
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
445KB
MD5fb632bf4f9d0d7c5b21b083082f2357d
SHA1dd70cfae188302f40354d1b4883f5f2ec04ca09b
SHA256e611e78e08d5a7b90b16e3a93d9807d0ce4a2aeedb88759532c68d51b2fe7e8d
SHA512ebafb220bbcc9ae37094b3d7e362db614e906b6e51dad53cafcec1185d5ba585e3113405268e2ade80745fa2fad13177a3d3827d872aaded27c07d4148100fb0
-
Filesize
445KB
MD5fb632bf4f9d0d7c5b21b083082f2357d
SHA1dd70cfae188302f40354d1b4883f5f2ec04ca09b
SHA256e611e78e08d5a7b90b16e3a93d9807d0ce4a2aeedb88759532c68d51b2fe7e8d
SHA512ebafb220bbcc9ae37094b3d7e362db614e906b6e51dad53cafcec1185d5ba585e3113405268e2ade80745fa2fad13177a3d3827d872aaded27c07d4148100fb0
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1