Analysis
-
max time kernel
144s -
max time network
101s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
13/04/2023, 09:41
Static task
static1
General
-
Target
d5f5fa9122645ddf0fbb51f76d7239968f05b7b79fdaea0215c2e6f584195317.exe
-
Size
941KB
-
MD5
b004cfc38218254f63966615e20a9681
-
SHA1
72f931afc0a634f515edd253c845b5ef8641f79c
-
SHA256
d5f5fa9122645ddf0fbb51f76d7239968f05b7b79fdaea0215c2e6f584195317
-
SHA512
26931a7fcbee9d889259678e4603ab836d9fa72a0f37aaab733b94d281d55809e8e29098df5c73d0ca5c6b7f9595f718dbbe00241d0ee092afded1c40502d65c
-
SSDEEP
24576:WyKXvjjVlM2UncR10VM9OTK4Y37M3u6WmJwXUvp:lKXvjjVe2UcR19n37x61
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it417823.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it417823.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it417823.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it417823.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it417823.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 4292 zimd0666.exe 4988 ziet8083.exe 2808 it417823.exe 4344 jr217114.exe 5016 1.exe 2088 kp294758.exe 4084 lr840330.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it417823.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziet8083.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziet8083.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d5f5fa9122645ddf0fbb51f76d7239968f05b7b79fdaea0215c2e6f584195317.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d5f5fa9122645ddf0fbb51f76d7239968f05b7b79fdaea0215c2e6f584195317.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zimd0666.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zimd0666.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
pid pid_target Process procid_target 4888 4084 WerFault.exe 73 68 4084 WerFault.exe 73 4032 4084 WerFault.exe 73 1476 4084 WerFault.exe 73 4644 4084 WerFault.exe 73 2424 4084 WerFault.exe 73 2768 4084 WerFault.exe 73 2900 4084 WerFault.exe 73 4440 4084 WerFault.exe 73 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2808 it417823.exe 2808 it417823.exe 5016 1.exe 2088 kp294758.exe 5016 1.exe 2088 kp294758.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2808 it417823.exe Token: SeDebugPrivilege 4344 jr217114.exe Token: SeDebugPrivilege 5016 1.exe Token: SeDebugPrivilege 2088 kp294758.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4084 lr840330.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1008 wrote to memory of 4292 1008 d5f5fa9122645ddf0fbb51f76d7239968f05b7b79fdaea0215c2e6f584195317.exe 66 PID 1008 wrote to memory of 4292 1008 d5f5fa9122645ddf0fbb51f76d7239968f05b7b79fdaea0215c2e6f584195317.exe 66 PID 1008 wrote to memory of 4292 1008 d5f5fa9122645ddf0fbb51f76d7239968f05b7b79fdaea0215c2e6f584195317.exe 66 PID 4292 wrote to memory of 4988 4292 zimd0666.exe 67 PID 4292 wrote to memory of 4988 4292 zimd0666.exe 67 PID 4292 wrote to memory of 4988 4292 zimd0666.exe 67 PID 4988 wrote to memory of 2808 4988 ziet8083.exe 68 PID 4988 wrote to memory of 2808 4988 ziet8083.exe 68 PID 4988 wrote to memory of 4344 4988 ziet8083.exe 69 PID 4988 wrote to memory of 4344 4988 ziet8083.exe 69 PID 4988 wrote to memory of 4344 4988 ziet8083.exe 69 PID 4344 wrote to memory of 5016 4344 jr217114.exe 70 PID 4344 wrote to memory of 5016 4344 jr217114.exe 70 PID 4344 wrote to memory of 5016 4344 jr217114.exe 70 PID 4292 wrote to memory of 2088 4292 zimd0666.exe 71 PID 4292 wrote to memory of 2088 4292 zimd0666.exe 71 PID 4292 wrote to memory of 2088 4292 zimd0666.exe 71 PID 1008 wrote to memory of 4084 1008 d5f5fa9122645ddf0fbb51f76d7239968f05b7b79fdaea0215c2e6f584195317.exe 73 PID 1008 wrote to memory of 4084 1008 d5f5fa9122645ddf0fbb51f76d7239968f05b7b79fdaea0215c2e6f584195317.exe 73 PID 1008 wrote to memory of 4084 1008 d5f5fa9122645ddf0fbb51f76d7239968f05b7b79fdaea0215c2e6f584195317.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5f5fa9122645ddf0fbb51f76d7239968f05b7b79fdaea0215c2e6f584195317.exe"C:\Users\Admin\AppData\Local\Temp\d5f5fa9122645ddf0fbb51f76d7239968f05b7b79fdaea0215c2e6f584195317.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimd0666.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimd0666.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziet8083.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziet8083.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it417823.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it417823.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr217114.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr217114.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5016
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp294758.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp294758.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr840330.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr840330.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:4084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 6243⤵
- Program crash
PID:4888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 7083⤵
- Program crash
PID:68
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 8523⤵
- Program crash
PID:4032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 8403⤵
- Program crash
PID:1476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 8923⤵
- Program crash
PID:4644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 9403⤵
- Program crash
PID:2424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 11243⤵
- Program crash
PID:2768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 11563⤵
- Program crash
PID:2900
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 12083⤵
- Program crash
PID:4440
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
253KB
MD58dddb77b930358bb9892abfde08bca5a
SHA1e8e0949b4ef9ea309d8cd306574b46875e8a60ce
SHA256f262befc57cc34c974337c6cb4788e18072ac26e5c08e21970bac4cab2aa5353
SHA512a9d0b48cf87a46b4093301cc1719029a0aa48fa4564d2e7f717981c41490d900993880fd51d8dd09e93bce1e5a8e03ff612531504cb4b9c8bd747b7cfeabf070
-
Filesize
253KB
MD58dddb77b930358bb9892abfde08bca5a
SHA1e8e0949b4ef9ea309d8cd306574b46875e8a60ce
SHA256f262befc57cc34c974337c6cb4788e18072ac26e5c08e21970bac4cab2aa5353
SHA512a9d0b48cf87a46b4093301cc1719029a0aa48fa4564d2e7f717981c41490d900993880fd51d8dd09e93bce1e5a8e03ff612531504cb4b9c8bd747b7cfeabf070
-
Filesize
668KB
MD544e8fff320990d2d5519d02c95662fea
SHA1ddbc7da4fe5b1a22cb2a5adeca6cd3a5b079e32c
SHA256a29bc146199ff08f929a9f36dd713e1d7c0272b2de6737ec049cf5c8fc807859
SHA512b28bb816bd18d4d3eaa227e433780de09c2c5fbe75a7cc75fba38f68442cb2144ef2f58af86c4343109ad020c2c21925e571633797cc87808f3801b5ab2fa8f6
-
Filesize
668KB
MD544e8fff320990d2d5519d02c95662fea
SHA1ddbc7da4fe5b1a22cb2a5adeca6cd3a5b079e32c
SHA256a29bc146199ff08f929a9f36dd713e1d7c0272b2de6737ec049cf5c8fc807859
SHA512b28bb816bd18d4d3eaa227e433780de09c2c5fbe75a7cc75fba38f68442cb2144ef2f58af86c4343109ad020c2c21925e571633797cc87808f3801b5ab2fa8f6
-
Filesize
168KB
MD5aa8bb998c46f60bacf91f98f8d4d7b5c
SHA161c7e314d916035128849f85a29b34ac1fb482e0
SHA2567e0252d52b7ff9e4466411941eb98cc220824be0f2eefdfe38e6b494f1176131
SHA5123e1e8400351fbeedbb0f07370260dea23782c24924482d33c54f9db9659c858c2ee89f69b9a8256b091efec0ea33b09e408e0d218769ca3e2cbd013dd935dde7
-
Filesize
168KB
MD5aa8bb998c46f60bacf91f98f8d4d7b5c
SHA161c7e314d916035128849f85a29b34ac1fb482e0
SHA2567e0252d52b7ff9e4466411941eb98cc220824be0f2eefdfe38e6b494f1176131
SHA5123e1e8400351fbeedbb0f07370260dea23782c24924482d33c54f9db9659c858c2ee89f69b9a8256b091efec0ea33b09e408e0d218769ca3e2cbd013dd935dde7
-
Filesize
514KB
MD55058793c56f1434a8c94f43fb5b898bc
SHA14676497384356da7de9bb1ac6e0c02ac3988401d
SHA2566af69be2221cf7f9c19beaccd90df4e81683e403e36a8874729b760eb7fde9dc
SHA512b940820193795fb268db6a0b0b87e8357700fe1ea1d18daa7914035cdfa50c2721076668b7ece3d826baa02909bb81c1327248a26d46b8e091c63c256f89293a
-
Filesize
514KB
MD55058793c56f1434a8c94f43fb5b898bc
SHA14676497384356da7de9bb1ac6e0c02ac3988401d
SHA2566af69be2221cf7f9c19beaccd90df4e81683e403e36a8874729b760eb7fde9dc
SHA512b940820193795fb268db6a0b0b87e8357700fe1ea1d18daa7914035cdfa50c2721076668b7ece3d826baa02909bb81c1327248a26d46b8e091c63c256f89293a
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
472KB
MD5364613635bd32884b87f180dd8a24a22
SHA153d7ea70dcc98843083486169340349e9c7e54e6
SHA25636d67dbe6494fc4ac8e13434c3ac1c17b6ac73d6681f88b0e676e0a74e55f428
SHA512d0baec9ed65151783c6fdf8e507ebd701b3b83e878f8dd1a65bd1f87ca97438cf82f1ca31b9cd619c331b0598ce6193eacfb77638b55de5e9522da7c925d29d3
-
Filesize
472KB
MD5364613635bd32884b87f180dd8a24a22
SHA153d7ea70dcc98843083486169340349e9c7e54e6
SHA25636d67dbe6494fc4ac8e13434c3ac1c17b6ac73d6681f88b0e676e0a74e55f428
SHA512d0baec9ed65151783c6fdf8e507ebd701b3b83e878f8dd1a65bd1f87ca97438cf82f1ca31b9cd619c331b0598ce6193eacfb77638b55de5e9522da7c925d29d3
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1