Analysis
-
max time kernel
143s -
max time network
100s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
13/04/2023, 14:59
Static task
static1
General
-
Target
4167d9c866d32884f813c285e2fb93c177bfc488ffd52a584d2d2c4942ae35a1.exe
-
Size
952KB
-
MD5
02c62234165310c994892f569a7d2135
-
SHA1
4b28f627dfe4f935f48e8ffee5e75b11d2010c9b
-
SHA256
4167d9c866d32884f813c285e2fb93c177bfc488ffd52a584d2d2c4942ae35a1
-
SHA512
f6c9c6189debc680f75b1f7d5fbfffe066a11776700bb31f6acf0c3fedfba5221ea4145b95d70344bc56668ff688a9f2524dfd1e321ba2c02a723401267aa09c
-
SSDEEP
24576:wy2zxwj7XhVHv/36B4w5JAE/v4YjE6ENV6ZdmqLxhfQqpZyJg:3zjzhVWQENo6ED6nLLxKX
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it574601.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it574601.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it574601.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it574601.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it574601.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 1492 ziia5826.exe 1780 ziwM9234.exe 632 it574601.exe 2108 jr877860.exe 3588 1.exe 4116 kp069321.exe 656 lr293817.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it574601.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziia5826.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziia5826.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziwM9234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziwM9234.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4167d9c866d32884f813c285e2fb93c177bfc488ffd52a584d2d2c4942ae35a1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4167d9c866d32884f813c285e2fb93c177bfc488ffd52a584d2d2c4942ae35a1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
pid pid_target Process procid_target 2420 656 WerFault.exe 73 4024 656 WerFault.exe 73 3192 656 WerFault.exe 73 1444 656 WerFault.exe 73 1992 656 WerFault.exe 73 2100 656 WerFault.exe 73 2056 656 WerFault.exe 73 4072 656 WerFault.exe 73 3572 656 WerFault.exe 73 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 632 it574601.exe 632 it574601.exe 4116 kp069321.exe 3588 1.exe 4116 kp069321.exe 3588 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 632 it574601.exe Token: SeDebugPrivilege 2108 jr877860.exe Token: SeDebugPrivilege 4116 kp069321.exe Token: SeDebugPrivilege 3588 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 656 lr293817.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1224 wrote to memory of 1492 1224 4167d9c866d32884f813c285e2fb93c177bfc488ffd52a584d2d2c4942ae35a1.exe 66 PID 1224 wrote to memory of 1492 1224 4167d9c866d32884f813c285e2fb93c177bfc488ffd52a584d2d2c4942ae35a1.exe 66 PID 1224 wrote to memory of 1492 1224 4167d9c866d32884f813c285e2fb93c177bfc488ffd52a584d2d2c4942ae35a1.exe 66 PID 1492 wrote to memory of 1780 1492 ziia5826.exe 67 PID 1492 wrote to memory of 1780 1492 ziia5826.exe 67 PID 1492 wrote to memory of 1780 1492 ziia5826.exe 67 PID 1780 wrote to memory of 632 1780 ziwM9234.exe 68 PID 1780 wrote to memory of 632 1780 ziwM9234.exe 68 PID 1780 wrote to memory of 2108 1780 ziwM9234.exe 69 PID 1780 wrote to memory of 2108 1780 ziwM9234.exe 69 PID 1780 wrote to memory of 2108 1780 ziwM9234.exe 69 PID 2108 wrote to memory of 3588 2108 jr877860.exe 70 PID 2108 wrote to memory of 3588 2108 jr877860.exe 70 PID 2108 wrote to memory of 3588 2108 jr877860.exe 70 PID 1492 wrote to memory of 4116 1492 ziia5826.exe 71 PID 1492 wrote to memory of 4116 1492 ziia5826.exe 71 PID 1492 wrote to memory of 4116 1492 ziia5826.exe 71 PID 1224 wrote to memory of 656 1224 4167d9c866d32884f813c285e2fb93c177bfc488ffd52a584d2d2c4942ae35a1.exe 73 PID 1224 wrote to memory of 656 1224 4167d9c866d32884f813c285e2fb93c177bfc488ffd52a584d2d2c4942ae35a1.exe 73 PID 1224 wrote to memory of 656 1224 4167d9c866d32884f813c285e2fb93c177bfc488ffd52a584d2d2c4942ae35a1.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\4167d9c866d32884f813c285e2fb93c177bfc488ffd52a584d2d2c4942ae35a1.exe"C:\Users\Admin\AppData\Local\Temp\4167d9c866d32884f813c285e2fb93c177bfc488ffd52a584d2d2c4942ae35a1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziia5826.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziia5826.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziwM9234.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziwM9234.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it574601.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it574601.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:632
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr877860.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr877860.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3588
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp069321.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp069321.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4116
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr293817.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr293817.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 6203⤵
- Program crash
PID:2420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 7003⤵
- Program crash
PID:4024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 8363⤵
- Program crash
PID:3192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 8203⤵
- Program crash
PID:1444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 8843⤵
- Program crash
PID:1992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 8723⤵
- Program crash
PID:2100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 11203⤵
- Program crash
PID:2056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 11523⤵
- Program crash
PID:4072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 12043⤵
- Program crash
PID:3572
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
270KB
MD50f5e12a3ec9afedeeb828dd9f77fb54e
SHA1ec95fe1e937e91f82172402552abff0f13ebb38b
SHA256291e3f01cff765c4ed0006e0a16402180879ae6db613285b73a74dd7dec149d6
SHA5129869b49de53eb5b18554c2c5500973ecf59f40227ae2b7efa1bd06a6678c68c446814b79457025d5dac57f21a7886d2f7db7f4a840f0a7010be0372a01defad1
-
Filesize
270KB
MD50f5e12a3ec9afedeeb828dd9f77fb54e
SHA1ec95fe1e937e91f82172402552abff0f13ebb38b
SHA256291e3f01cff765c4ed0006e0a16402180879ae6db613285b73a74dd7dec149d6
SHA5129869b49de53eb5b18554c2c5500973ecf59f40227ae2b7efa1bd06a6678c68c446814b79457025d5dac57f21a7886d2f7db7f4a840f0a7010be0372a01defad1
-
Filesize
668KB
MD5c6c4511e69422cd254dbfbfb9c96076e
SHA1ad5eb11b9e7f1d610d0c6442af9345b14bc8e56f
SHA256e169323189e1b2ab26c712bfe27f56783a9586a2e833d4fb7fed1c3c0c65b9b6
SHA512ea4e27a8f81807e28682bd79d26e370cb93ffd0dc181bb61b6c02826289e181448eccbca19ac4148b92ab7a50fed3ed281afd7c0a950efe25987ba211cb6ff10
-
Filesize
668KB
MD5c6c4511e69422cd254dbfbfb9c96076e
SHA1ad5eb11b9e7f1d610d0c6442af9345b14bc8e56f
SHA256e169323189e1b2ab26c712bfe27f56783a9586a2e833d4fb7fed1c3c0c65b9b6
SHA512ea4e27a8f81807e28682bd79d26e370cb93ffd0dc181bb61b6c02826289e181448eccbca19ac4148b92ab7a50fed3ed281afd7c0a950efe25987ba211cb6ff10
-
Filesize
168KB
MD52c90c4c49415063fd2bf563d3092712d
SHA125435d061f0be4fcecb10e51d9c96fffaf5437e7
SHA2568809b93d5caaecbbc18ebbc128c94f43872649042a8062fb1596b7de7a557707
SHA5126f266d575cd7539ba8459af46c7978dadb08365efdbb48eb0566dc073f1af78e9e84ec1fce28bca40b03ec8e143ce67634dbe282d8c2b0811e92819129088f3a
-
Filesize
168KB
MD52c90c4c49415063fd2bf563d3092712d
SHA125435d061f0be4fcecb10e51d9c96fffaf5437e7
SHA2568809b93d5caaecbbc18ebbc128c94f43872649042a8062fb1596b7de7a557707
SHA5126f266d575cd7539ba8459af46c7978dadb08365efdbb48eb0566dc073f1af78e9e84ec1fce28bca40b03ec8e143ce67634dbe282d8c2b0811e92819129088f3a
-
Filesize
514KB
MD5f92ce1e8a982e1805fa70561d9e28db3
SHA1410a81529f5aa00c91f3f1d0a4d3ba63301e5ca4
SHA25683fbb5b032962426f8e334565717dfd185ca1651bc6e4b7a7976fa6c57dd5078
SHA512dbc813883ba08f771e25ddf48ae4e30fe57f2d82739632ec9393e31a629304df4b0079941730a9f4b9ea06df5477974fa6d18c489b1d60ab49289c65bf91b900
-
Filesize
514KB
MD5f92ce1e8a982e1805fa70561d9e28db3
SHA1410a81529f5aa00c91f3f1d0a4d3ba63301e5ca4
SHA25683fbb5b032962426f8e334565717dfd185ca1651bc6e4b7a7976fa6c57dd5078
SHA512dbc813883ba08f771e25ddf48ae4e30fe57f2d82739632ec9393e31a629304df4b0079941730a9f4b9ea06df5477974fa6d18c489b1d60ab49289c65bf91b900
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
445KB
MD51299afcb5bbbf66c98af64d10fae6582
SHA15b6a1547e465ff5ec1cae6256d1cc68811c3471c
SHA2567718ac03e1effe0a9888ad6d4a33463ece050ef7e62278bc609c90cd670e457b
SHA51290b33a6830b141b37efef64bbb8ca6ca262b91afdd89597387b9303616fc60074407abf9a8838d8cc1c453d5059d9863e584860a238f5633ecd7c562ad4a3daf
-
Filesize
445KB
MD51299afcb5bbbf66c98af64d10fae6582
SHA15b6a1547e465ff5ec1cae6256d1cc68811c3471c
SHA2567718ac03e1effe0a9888ad6d4a33463ece050ef7e62278bc609c90cd670e457b
SHA51290b33a6830b141b37efef64bbb8ca6ca262b91afdd89597387b9303616fc60074407abf9a8838d8cc1c453d5059d9863e584860a238f5633ecd7c562ad4a3daf
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1