Analysis
-
max time kernel
142s -
max time network
97s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
13/04/2023, 11:13
Static task
static1
General
-
Target
af173bfbee7e8fd11059b9cddd07b9ee0278996747af6cb68cef6597ea80d312.exe
-
Size
940KB
-
MD5
8ae214632b99409d6204368bf4b70178
-
SHA1
29952f2cc3b21c49b05df04638e625f605299d5d
-
SHA256
af173bfbee7e8fd11059b9cddd07b9ee0278996747af6cb68cef6597ea80d312
-
SHA512
d8f2c12786cf9585a849da5c5e5840e8c87fa0e609711d26eb93d715cec091a86ffac758b6001d524bc3c1db6ccbae35e48d8ee28ded2bbf16662ec247e04690
-
SSDEEP
24576:+yKdcYG1dG1sEGHLHeSr242Fvlkzcfhnso4kWvP0Y2O:NKaeQHbsnvaz2hnn4bU
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it910841.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it910841.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it910841.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it910841.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it910841.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 988 zius6791.exe 4496 zigr2739.exe 4992 it910841.exe 2060 jr267079.exe 1608 1.exe 1800 kp398346.exe 2576 lr329948.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it910841.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce af173bfbee7e8fd11059b9cddd07b9ee0278996747af6cb68cef6597ea80d312.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" af173bfbee7e8fd11059b9cddd07b9ee0278996747af6cb68cef6597ea80d312.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zius6791.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zius6791.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zigr2739.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zigr2739.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
pid pid_target Process procid_target 1048 2576 WerFault.exe 73 1852 2576 WerFault.exe 73 3200 2576 WerFault.exe 73 4120 2576 WerFault.exe 73 2532 2576 WerFault.exe 73 3984 2576 WerFault.exe 73 4092 2576 WerFault.exe 73 4460 2576 WerFault.exe 73 4888 2576 WerFault.exe 73 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4992 it910841.exe 4992 it910841.exe 1608 1.exe 1800 kp398346.exe 1800 kp398346.exe 1608 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4992 it910841.exe Token: SeDebugPrivilege 2060 jr267079.exe Token: SeDebugPrivilege 1608 1.exe Token: SeDebugPrivilege 1800 kp398346.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3668 wrote to memory of 988 3668 af173bfbee7e8fd11059b9cddd07b9ee0278996747af6cb68cef6597ea80d312.exe 66 PID 3668 wrote to memory of 988 3668 af173bfbee7e8fd11059b9cddd07b9ee0278996747af6cb68cef6597ea80d312.exe 66 PID 3668 wrote to memory of 988 3668 af173bfbee7e8fd11059b9cddd07b9ee0278996747af6cb68cef6597ea80d312.exe 66 PID 988 wrote to memory of 4496 988 zius6791.exe 67 PID 988 wrote to memory of 4496 988 zius6791.exe 67 PID 988 wrote to memory of 4496 988 zius6791.exe 67 PID 4496 wrote to memory of 4992 4496 zigr2739.exe 68 PID 4496 wrote to memory of 4992 4496 zigr2739.exe 68 PID 4496 wrote to memory of 2060 4496 zigr2739.exe 69 PID 4496 wrote to memory of 2060 4496 zigr2739.exe 69 PID 4496 wrote to memory of 2060 4496 zigr2739.exe 69 PID 2060 wrote to memory of 1608 2060 jr267079.exe 70 PID 2060 wrote to memory of 1608 2060 jr267079.exe 70 PID 2060 wrote to memory of 1608 2060 jr267079.exe 70 PID 988 wrote to memory of 1800 988 zius6791.exe 71 PID 988 wrote to memory of 1800 988 zius6791.exe 71 PID 988 wrote to memory of 1800 988 zius6791.exe 71 PID 3668 wrote to memory of 2576 3668 af173bfbee7e8fd11059b9cddd07b9ee0278996747af6cb68cef6597ea80d312.exe 73 PID 3668 wrote to memory of 2576 3668 af173bfbee7e8fd11059b9cddd07b9ee0278996747af6cb68cef6597ea80d312.exe 73 PID 3668 wrote to memory of 2576 3668 af173bfbee7e8fd11059b9cddd07b9ee0278996747af6cb68cef6597ea80d312.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\af173bfbee7e8fd11059b9cddd07b9ee0278996747af6cb68cef6597ea80d312.exe"C:\Users\Admin\AppData\Local\Temp\af173bfbee7e8fd11059b9cddd07b9ee0278996747af6cb68cef6597ea80d312.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zius6791.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zius6791.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zigr2739.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zigr2739.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it910841.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it910841.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr267079.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr267079.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1608
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp398346.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp398346.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1800
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr329948.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr329948.exe2⤵
- Executes dropped EXE
PID:2576 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 6203⤵
- Program crash
PID:1048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 7003⤵
- Program crash
PID:1852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 8403⤵
- Program crash
PID:3200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 8803⤵
- Program crash
PID:4120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 8843⤵
- Program crash
PID:2532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 8603⤵
- Program crash
PID:3984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 11203⤵
- Program crash
PID:4092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 11523⤵
- Program crash
PID:4460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 11243⤵
- Program crash
PID:4888
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
253KB
MD51c4b687ff7f7f7b8b0d0a3b1bf2cd568
SHA1442fd0c94a574490bdec94a7a8c05e231205f530
SHA256255002c9fb43a706b143e5dfd912af265387f63ad21df64b837bb0366f713932
SHA5122e6079407ed488523c1ed71aeb1224a9a5da750e671dcb1c2410e4a0e3cb4e326d2ced4b9a0269fbf77120d51910d7a0de81d523db3878115e5bb91d97f8b550
-
Filesize
253KB
MD51c4b687ff7f7f7b8b0d0a3b1bf2cd568
SHA1442fd0c94a574490bdec94a7a8c05e231205f530
SHA256255002c9fb43a706b143e5dfd912af265387f63ad21df64b837bb0366f713932
SHA5122e6079407ed488523c1ed71aeb1224a9a5da750e671dcb1c2410e4a0e3cb4e326d2ced4b9a0269fbf77120d51910d7a0de81d523db3878115e5bb91d97f8b550
-
Filesize
668KB
MD5e495803427cc5cdb19379a78bb8f34f2
SHA18710266420d68ce365a3428236465f61bd7b3314
SHA2568d5f37bf856ba37dfc49f397925c96f6a4b4d023049faade21b15826291d7df3
SHA512e5d762b2e9bf75fb31fe4277754bff75308ece2b2b6ef546e1edbb32966f98639de15027898bb986ceb2254a631408618176172c47c464b2865417870d0b8545
-
Filesize
668KB
MD5e495803427cc5cdb19379a78bb8f34f2
SHA18710266420d68ce365a3428236465f61bd7b3314
SHA2568d5f37bf856ba37dfc49f397925c96f6a4b4d023049faade21b15826291d7df3
SHA512e5d762b2e9bf75fb31fe4277754bff75308ece2b2b6ef546e1edbb32966f98639de15027898bb986ceb2254a631408618176172c47c464b2865417870d0b8545
-
Filesize
168KB
MD53797d67259ab226926ab58d7979a7384
SHA1bab2fb961a09b07516d52b56c4318f193af9ee78
SHA2566e0b04157fb1d366eb12d322b14dec225223fe3cf9b9ef31e517bba796882700
SHA5122095654746967541ebc8d5c6cd038adc8a84be6fafce40a61a69c819312658eaa479bc0653272c76847165b827cce4fcf695c2b6477e56f85bb3ee748d6dbd11
-
Filesize
168KB
MD53797d67259ab226926ab58d7979a7384
SHA1bab2fb961a09b07516d52b56c4318f193af9ee78
SHA2566e0b04157fb1d366eb12d322b14dec225223fe3cf9b9ef31e517bba796882700
SHA5122095654746967541ebc8d5c6cd038adc8a84be6fafce40a61a69c819312658eaa479bc0653272c76847165b827cce4fcf695c2b6477e56f85bb3ee748d6dbd11
-
Filesize
515KB
MD5a6648fe4271785f79e6defb853e13968
SHA11a6714de957f94ae267dd208a64341bf4a391d77
SHA256f2917a076f2d659889242689f24a262525e8f67e63a1e26c073e15af6bf28b98
SHA512282b95d0eaa59c93629c243b604be3b7f62d59686b58f011a1374392b63d737a8abfa8f624dcd96550484cee63084db01c00d087a4e565facb37f2329dd3fc7c
-
Filesize
515KB
MD5a6648fe4271785f79e6defb853e13968
SHA11a6714de957f94ae267dd208a64341bf4a391d77
SHA256f2917a076f2d659889242689f24a262525e8f67e63a1e26c073e15af6bf28b98
SHA512282b95d0eaa59c93629c243b604be3b7f62d59686b58f011a1374392b63d737a8abfa8f624dcd96550484cee63084db01c00d087a4e565facb37f2329dd3fc7c
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
445KB
MD503d58ea19c630423fe098b4cfc6f27c7
SHA1f5f39ee449c63d5a5a0d7dc0e6d6f1ce366acde7
SHA256b9f71eb1bd47b4cca3f6492531006a056b05fbf6c048ab6189b09350afbaef33
SHA51283e412e1aa27aa351b86906ef56cba5e8be8bfc38b74d63198c1268cc68e85de587cc060e9e6028e68f707d7136d035feb035b57f3173ce2482c0b95a0e7b954
-
Filesize
445KB
MD503d58ea19c630423fe098b4cfc6f27c7
SHA1f5f39ee449c63d5a5a0d7dc0e6d6f1ce366acde7
SHA256b9f71eb1bd47b4cca3f6492531006a056b05fbf6c048ab6189b09350afbaef33
SHA51283e412e1aa27aa351b86906ef56cba5e8be8bfc38b74d63198c1268cc68e85de587cc060e9e6028e68f707d7136d035feb035b57f3173ce2482c0b95a0e7b954
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1