Analysis
-
max time kernel
144s -
max time network
139s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
13/04/2023, 19:06
Static task
static1
General
-
Target
2320f65ef69d876a39dace7b491226079ff88b5fb0ed99c3097bb7a3aa2109f4.exe
-
Size
961KB
-
MD5
25d826bd9782ff2206d5aa1aa8c2ce62
-
SHA1
8e742060f3dfc1919963efff50ba5dbaf060a5ac
-
SHA256
2320f65ef69d876a39dace7b491226079ff88b5fb0ed99c3097bb7a3aa2109f4
-
SHA512
e4ba2dcdaa28594aaad5b675f94fce842e086f08920c0b40478e6bfba2bb885c1e3899ad9541fb28f59cb14b7020a57f0618f7bce49bb6e15c250c584ba73d1f
-
SSDEEP
24576:hyV94Lowe2DYLUMSSSsXB1z5CZjecNNqb0G3DcDzp:UVGDe2DCfSSSsx1zcZfNqgn
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it179010.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it179010.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it179010.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it179010.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it179010.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 3644 zipN3134.exe 2272 ziYX9230.exe 4496 it179010.exe 4920 jr807134.exe 1896 1.exe 2308 kp663528.exe 2680 lr310439.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it179010.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zipN3134.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zipN3134.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziYX9230.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziYX9230.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2320f65ef69d876a39dace7b491226079ff88b5fb0ed99c3097bb7a3aa2109f4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2320f65ef69d876a39dace7b491226079ff88b5fb0ed99c3097bb7a3aa2109f4.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 7 IoCs
pid pid_target Process procid_target 4000 2680 WerFault.exe 73 3140 2680 WerFault.exe 73 4944 2680 WerFault.exe 73 352 2680 WerFault.exe 73 2344 2680 WerFault.exe 73 4420 2680 WerFault.exe 73 4836 2680 WerFault.exe 73 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4496 it179010.exe 4496 it179010.exe 2308 kp663528.exe 1896 1.exe 1896 1.exe 2308 kp663528.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4496 it179010.exe Token: SeDebugPrivilege 4920 jr807134.exe Token: SeDebugPrivilege 2308 kp663528.exe Token: SeDebugPrivilege 1896 1.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4124 wrote to memory of 3644 4124 2320f65ef69d876a39dace7b491226079ff88b5fb0ed99c3097bb7a3aa2109f4.exe 66 PID 4124 wrote to memory of 3644 4124 2320f65ef69d876a39dace7b491226079ff88b5fb0ed99c3097bb7a3aa2109f4.exe 66 PID 4124 wrote to memory of 3644 4124 2320f65ef69d876a39dace7b491226079ff88b5fb0ed99c3097bb7a3aa2109f4.exe 66 PID 3644 wrote to memory of 2272 3644 zipN3134.exe 67 PID 3644 wrote to memory of 2272 3644 zipN3134.exe 67 PID 3644 wrote to memory of 2272 3644 zipN3134.exe 67 PID 2272 wrote to memory of 4496 2272 ziYX9230.exe 68 PID 2272 wrote to memory of 4496 2272 ziYX9230.exe 68 PID 2272 wrote to memory of 4920 2272 ziYX9230.exe 69 PID 2272 wrote to memory of 4920 2272 ziYX9230.exe 69 PID 2272 wrote to memory of 4920 2272 ziYX9230.exe 69 PID 4920 wrote to memory of 1896 4920 jr807134.exe 70 PID 4920 wrote to memory of 1896 4920 jr807134.exe 70 PID 4920 wrote to memory of 1896 4920 jr807134.exe 70 PID 3644 wrote to memory of 2308 3644 zipN3134.exe 71 PID 3644 wrote to memory of 2308 3644 zipN3134.exe 71 PID 3644 wrote to memory of 2308 3644 zipN3134.exe 71 PID 4124 wrote to memory of 2680 4124 2320f65ef69d876a39dace7b491226079ff88b5fb0ed99c3097bb7a3aa2109f4.exe 73 PID 4124 wrote to memory of 2680 4124 2320f65ef69d876a39dace7b491226079ff88b5fb0ed99c3097bb7a3aa2109f4.exe 73 PID 4124 wrote to memory of 2680 4124 2320f65ef69d876a39dace7b491226079ff88b5fb0ed99c3097bb7a3aa2109f4.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\2320f65ef69d876a39dace7b491226079ff88b5fb0ed99c3097bb7a3aa2109f4.exe"C:\Users\Admin\AppData\Local\Temp\2320f65ef69d876a39dace7b491226079ff88b5fb0ed99c3097bb7a3aa2109f4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipN3134.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipN3134.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziYX9230.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziYX9230.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it179010.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it179010.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4496
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr807134.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr807134.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1896
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp663528.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp663528.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr310439.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr310439.exe2⤵
- Executes dropped EXE
PID:2680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 6163⤵
- Program crash
PID:4000
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 6963⤵
- Program crash
PID:3140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 8363⤵
- Program crash
PID:4944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 8443⤵
- Program crash
PID:352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 8803⤵
- Program crash
PID:2344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 8683⤵
- Program crash
PID:4420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 10723⤵
- Program crash
PID:4836
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD5004cf832ce80f6b5097bd695e8aad05e
SHA1c02648897a01d9ee7e01032adedad070aaf45b7e
SHA256e980c96bc4094cb299be580ae171610df142b3bca8faa44b127b4014b838477b
SHA512a07906d017595df228b59d8ce7ac337e75ce94d570ced6b4c954438a3b75c65fe102f4d088106220a0b673f781022295a8229f7b578d81c5cea66b201d7487e3
-
Filesize
308KB
MD5004cf832ce80f6b5097bd695e8aad05e
SHA1c02648897a01d9ee7e01032adedad070aaf45b7e
SHA256e980c96bc4094cb299be580ae171610df142b3bca8faa44b127b4014b838477b
SHA512a07906d017595df228b59d8ce7ac337e75ce94d570ced6b4c954438a3b75c65fe102f4d088106220a0b673f781022295a8229f7b578d81c5cea66b201d7487e3
-
Filesize
678KB
MD5d8f731655408fa335c30356f58c95f1d
SHA1bb66d9c45e11318a601e99990e2d38ae56c4e531
SHA2568b819fac1afcd70037cfd515bbd84b7ddae9a85bcd511e1610b92a7437935cc7
SHA51286f9a2639519e264d28caedae0100843b9f64494efa8f877dbebf3ca5133e7dd1cbddcda53d10c1672a328a0d7f2cc9a6212d0cd70f36d60e7bb8ba699651504
-
Filesize
678KB
MD5d8f731655408fa335c30356f58c95f1d
SHA1bb66d9c45e11318a601e99990e2d38ae56c4e531
SHA2568b819fac1afcd70037cfd515bbd84b7ddae9a85bcd511e1610b92a7437935cc7
SHA51286f9a2639519e264d28caedae0100843b9f64494efa8f877dbebf3ca5133e7dd1cbddcda53d10c1672a328a0d7f2cc9a6212d0cd70f36d60e7bb8ba699651504
-
Filesize
169KB
MD52fa5ca96cae8ffaab0cb7c30be207f63
SHA1d156412d7f79771910d39a600c5e35504838ed8a
SHA25656755d9b85cee472494430f01174516776c372902e282b71a0d12173ef967cbc
SHA5128c768617c07dee50c9ad18d4499ceb2178bc9950647f90ff98101e844b428e03eea15c8b2a3f74d769c50b6d808809e3ce2bff6b5edec2b5925705c435e46cb5
-
Filesize
169KB
MD52fa5ca96cae8ffaab0cb7c30be207f63
SHA1d156412d7f79771910d39a600c5e35504838ed8a
SHA25656755d9b85cee472494430f01174516776c372902e282b71a0d12173ef967cbc
SHA5128c768617c07dee50c9ad18d4499ceb2178bc9950647f90ff98101e844b428e03eea15c8b2a3f74d769c50b6d808809e3ce2bff6b5edec2b5925705c435e46cb5
-
Filesize
525KB
MD594db2e6479c409462ffb0e11a6b8c460
SHA1a3086af6cf252e668558ade64bcc66f8a684044a
SHA2565d2847d62784f7ea36b686f7991794ac5b35b5223dedf16f6c1c5b4cc4484c1f
SHA5126971928dd2bcd0b08552420fa739dfe7ea6b574a0ed3a262c01861a97f84fb7b0118bc15fdfabe8aa57bcaee1efec4328a31edda63b115153f3cfd55ed87edcc
-
Filesize
525KB
MD594db2e6479c409462ffb0e11a6b8c460
SHA1a3086af6cf252e668558ade64bcc66f8a684044a
SHA2565d2847d62784f7ea36b686f7991794ac5b35b5223dedf16f6c1c5b4cc4484c1f
SHA5126971928dd2bcd0b08552420fa739dfe7ea6b574a0ed3a262c01861a97f84fb7b0118bc15fdfabe8aa57bcaee1efec4328a31edda63b115153f3cfd55ed87edcc
-
Filesize
11KB
MD5fba3c8f6e595fcdd66208bd618496964
SHA1f97b541f5736c63dd17e72f8a649d8021a4121ad
SHA256f9cd8ec4c2b01259943ca1e2f5829b771ecec4ed65324e1c5cd6c7d9c9733462
SHA512673fb0066a0274da88b95f61511ace27422db3dde90ae8218075991a16d8a7f072fd981bf58a6e09e2a1af70beb01d5830b6807752d60ea40c67531a5506783c
-
Filesize
11KB
MD5fba3c8f6e595fcdd66208bd618496964
SHA1f97b541f5736c63dd17e72f8a649d8021a4121ad
SHA256f9cd8ec4c2b01259943ca1e2f5829b771ecec4ed65324e1c5cd6c7d9c9733462
SHA512673fb0066a0274da88b95f61511ace27422db3dde90ae8218075991a16d8a7f072fd981bf58a6e09e2a1af70beb01d5830b6807752d60ea40c67531a5506783c
-
Filesize
501KB
MD59e672811f9963842209722cce180416c
SHA1ffca169b6fed27b07dbd589e63db3a5b5b178693
SHA2567ea03de10907175eb040981b3e9d97384e59e585ea8593baeedd10d5e419b3c0
SHA512ba06a6c384aa492f88d052196c147779570b6f8d74e55b6c7c67c97045470ef4129f54765c8dbb64cd86b5944c51cad274fbf008988d34ce512e3eb9c16a3283
-
Filesize
501KB
MD59e672811f9963842209722cce180416c
SHA1ffca169b6fed27b07dbd589e63db3a5b5b178693
SHA2567ea03de10907175eb040981b3e9d97384e59e585ea8593baeedd10d5e419b3c0
SHA512ba06a6c384aa492f88d052196c147779570b6f8d74e55b6c7c67c97045470ef4129f54765c8dbb64cd86b5944c51cad274fbf008988d34ce512e3eb9c16a3283
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1