Analysis
-
max time kernel
144s -
max time network
139s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
13/04/2023, 16:31
Static task
static1
General
-
Target
eb7f7c68dde6060e1f820b11eceead4ffe76d2d351af52735512bee055409ff4.exe
-
Size
1.1MB
-
MD5
55d974d808acf7010dcc1cfecdc163e6
-
SHA1
74e1298ea9e15c8f7a6694d148fadd3d7116c31d
-
SHA256
eb7f7c68dde6060e1f820b11eceead4ffe76d2d351af52735512bee055409ff4
-
SHA512
bede351aee25681c3954c7db844bf996c8007f4f5d698f0e61f650cfe795f3542b7b404809502bb99ce7ddf2ab4f2ee147f491c252d570bc5cb162d5ce7df899
-
SSDEEP
24576:VyizX0xX2H8hL8MNmLn3Q7a18CIlHj8pWmvSuv+pVE0oKq3:wizX0xGoLW73Q7m8CMARvOroKq
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr093556.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr093556.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr093556.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr093556.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr093556.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 3596 un460887.exe 2344 un142153.exe 5112 pr093556.exe 4552 qu624158.exe 2120 1.exe 3232 rk174706.exe 2268 si084768.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr093556.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr093556.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un142153.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce eb7f7c68dde6060e1f820b11eceead4ffe76d2d351af52735512bee055409ff4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" eb7f7c68dde6060e1f820b11eceead4ffe76d2d351af52735512bee055409ff4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un460887.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un460887.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un142153.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 7 IoCs
pid pid_target Process procid_target 2080 2268 WerFault.exe 73 4296 2268 WerFault.exe 73 4248 2268 WerFault.exe 73 3928 2268 WerFault.exe 73 2616 2268 WerFault.exe 73 1776 2268 WerFault.exe 73 5092 2268 WerFault.exe 73 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5112 pr093556.exe 5112 pr093556.exe 3232 rk174706.exe 3232 rk174706.exe 2120 1.exe 2120 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 5112 pr093556.exe Token: SeDebugPrivilege 4552 qu624158.exe Token: SeDebugPrivilege 3232 rk174706.exe Token: SeDebugPrivilege 2120 1.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4148 wrote to memory of 3596 4148 eb7f7c68dde6060e1f820b11eceead4ffe76d2d351af52735512bee055409ff4.exe 66 PID 4148 wrote to memory of 3596 4148 eb7f7c68dde6060e1f820b11eceead4ffe76d2d351af52735512bee055409ff4.exe 66 PID 4148 wrote to memory of 3596 4148 eb7f7c68dde6060e1f820b11eceead4ffe76d2d351af52735512bee055409ff4.exe 66 PID 3596 wrote to memory of 2344 3596 un460887.exe 67 PID 3596 wrote to memory of 2344 3596 un460887.exe 67 PID 3596 wrote to memory of 2344 3596 un460887.exe 67 PID 2344 wrote to memory of 5112 2344 un142153.exe 68 PID 2344 wrote to memory of 5112 2344 un142153.exe 68 PID 2344 wrote to memory of 5112 2344 un142153.exe 68 PID 2344 wrote to memory of 4552 2344 un142153.exe 69 PID 2344 wrote to memory of 4552 2344 un142153.exe 69 PID 2344 wrote to memory of 4552 2344 un142153.exe 69 PID 4552 wrote to memory of 2120 4552 qu624158.exe 70 PID 4552 wrote to memory of 2120 4552 qu624158.exe 70 PID 4552 wrote to memory of 2120 4552 qu624158.exe 70 PID 3596 wrote to memory of 3232 3596 un460887.exe 71 PID 3596 wrote to memory of 3232 3596 un460887.exe 71 PID 3596 wrote to memory of 3232 3596 un460887.exe 71 PID 4148 wrote to memory of 2268 4148 eb7f7c68dde6060e1f820b11eceead4ffe76d2d351af52735512bee055409ff4.exe 73 PID 4148 wrote to memory of 2268 4148 eb7f7c68dde6060e1f820b11eceead4ffe76d2d351af52735512bee055409ff4.exe 73 PID 4148 wrote to memory of 2268 4148 eb7f7c68dde6060e1f820b11eceead4ffe76d2d351af52735512bee055409ff4.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb7f7c68dde6060e1f820b11eceead4ffe76d2d351af52735512bee055409ff4.exe"C:\Users\Admin\AppData\Local\Temp\eb7f7c68dde6060e1f820b11eceead4ffe76d2d351af52735512bee055409ff4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un460887.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un460887.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un142153.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un142153.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr093556.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr093556.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5112
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu624158.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu624158.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2120
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk174706.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk174706.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3232
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si084768.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si084768.exe2⤵
- Executes dropped EXE
PID:2268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 6203⤵
- Program crash
PID:2080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 7003⤵
- Program crash
PID:4296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 8403⤵
- Program crash
PID:4248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 8483⤵
- Program crash
PID:3928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 8763⤵
- Program crash
PID:2616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 8883⤵
- Program crash
PID:1776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 10843⤵
- Program crash
PID:5092
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
309KB
MD536d2dec496e84a6fea85386654562c7f
SHA1f72ca2fe77224156465c65b91aba219992fd6b60
SHA256295cfdd068a249427bdbf1c1b30e7dc615371e9f82fd9d089e923ad5c9762f64
SHA51240f16d47e9c7ed384d4ef8ae39a6a29f6dff3b08b51860d3362ecedab905265ccc180ff1578c0861a772b16638ab7deaf3731703ea10624166890a7c3cd96592
-
Filesize
309KB
MD536d2dec496e84a6fea85386654562c7f
SHA1f72ca2fe77224156465c65b91aba219992fd6b60
SHA256295cfdd068a249427bdbf1c1b30e7dc615371e9f82fd9d089e923ad5c9762f64
SHA51240f16d47e9c7ed384d4ef8ae39a6a29f6dff3b08b51860d3362ecedab905265ccc180ff1578c0861a772b16638ab7deaf3731703ea10624166890a7c3cd96592
-
Filesize
818KB
MD570d2eacf857717dfdde97fab77168ebc
SHA13234e5b6e28902f41da23e34e76f742885f94146
SHA2569a39b4a4ba1578677a1cf74c7c8247469f2bf82fb2fb7c0e2f94b55b651e2834
SHA512aa253bea89415aef9c9d958fd34c497e9372554acda6ea21754b8825e46d65d0a022d9fefedea15fa805c04c0b5f3197152b4870f8dcf3790c0df0a73b8c7b65
-
Filesize
818KB
MD570d2eacf857717dfdde97fab77168ebc
SHA13234e5b6e28902f41da23e34e76f742885f94146
SHA2569a39b4a4ba1578677a1cf74c7c8247469f2bf82fb2fb7c0e2f94b55b651e2834
SHA512aa253bea89415aef9c9d958fd34c497e9372554acda6ea21754b8825e46d65d0a022d9fefedea15fa805c04c0b5f3197152b4870f8dcf3790c0df0a73b8c7b65
-
Filesize
169KB
MD5cfb3d13f43bfc042057d49c13e53a228
SHA13f77ab005f7897fc993b077df9fbfd029e4884ba
SHA2561eebfd7544ab87d04f2cec540a6397dd203f915a665db0df0bac8d12fad7f821
SHA512303dbff71aa2322567c81cb059722c373cfe2e9c456f8e61c24c2e72917835412f11a33535ed68d434cac2e13d543d8429b8b8bc28d3baf5c2b704709eb88a56
-
Filesize
169KB
MD5cfb3d13f43bfc042057d49c13e53a228
SHA13f77ab005f7897fc993b077df9fbfd029e4884ba
SHA2561eebfd7544ab87d04f2cec540a6397dd203f915a665db0df0bac8d12fad7f821
SHA512303dbff71aa2322567c81cb059722c373cfe2e9c456f8e61c24c2e72917835412f11a33535ed68d434cac2e13d543d8429b8b8bc28d3baf5c2b704709eb88a56
-
Filesize
664KB
MD53006157b98891c01b5df9deaf2d03187
SHA100f37d2d381a65e9eaa4f1a0792932c65417cba0
SHA2569fafd2250e4388b8e5598d4d33d337d3563115da75cf07e413c38c8c01fdf4d5
SHA51217b60daf87391af0fb4631bf3483a39382775a0058025658ea0cfc72cee1c4fd903e80543840a60082c3d77b1af0861e81ddba9a785a1e9dd50af4a40aca82f5
-
Filesize
664KB
MD53006157b98891c01b5df9deaf2d03187
SHA100f37d2d381a65e9eaa4f1a0792932c65417cba0
SHA2569fafd2250e4388b8e5598d4d33d337d3563115da75cf07e413c38c8c01fdf4d5
SHA51217b60daf87391af0fb4631bf3483a39382775a0058025658ea0cfc72cee1c4fd903e80543840a60082c3d77b1af0861e81ddba9a785a1e9dd50af4a40aca82f5
-
Filesize
317KB
MD5fb5e1f6bd09ee5055659c5603d8335fc
SHA115e26cf47adbfd5116c859383a7ec7266ba5ff95
SHA2569e4d704296a8179d01c7f6572626db31b5a24e91094dd8df2cf1753b75b519a4
SHA512d9c75c7862acf1f411cfc54e3b1ba1951976e4984fd46d4f4d6a5669460cd4a8587e02dbbe26b0f04b042949a2baefe9721adcdf6ca4d7dba8e4e5ee2df9d720
-
Filesize
317KB
MD5fb5e1f6bd09ee5055659c5603d8335fc
SHA115e26cf47adbfd5116c859383a7ec7266ba5ff95
SHA2569e4d704296a8179d01c7f6572626db31b5a24e91094dd8df2cf1753b75b519a4
SHA512d9c75c7862acf1f411cfc54e3b1ba1951976e4984fd46d4f4d6a5669460cd4a8587e02dbbe26b0f04b042949a2baefe9721adcdf6ca4d7dba8e4e5ee2df9d720
-
Filesize
501KB
MD5a72bd75e4dac8b439002301ffd6c70c7
SHA174dcf7d9b3b0dbff14d04365cba3712d1c5f7d54
SHA256ff7c4d21fe81aeffaf830e850d5528314fed42f3f37d06cd0d94dedc5eaec25a
SHA5123ce2177be80f8870411794a6edbad836e309f4172b5e615436ac1c30975c7d99432c8a2bc58337ad1d1df8c032d0a68efc5d9e81af70e37db9b90d15073c212d
-
Filesize
501KB
MD5a72bd75e4dac8b439002301ffd6c70c7
SHA174dcf7d9b3b0dbff14d04365cba3712d1c5f7d54
SHA256ff7c4d21fe81aeffaf830e850d5528314fed42f3f37d06cd0d94dedc5eaec25a
SHA5123ce2177be80f8870411794a6edbad836e309f4172b5e615436ac1c30975c7d99432c8a2bc58337ad1d1df8c032d0a68efc5d9e81af70e37db9b90d15073c212d
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1