Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
13/04/2023, 19:46
Static task
static1
General
-
Target
bb9a4c8beea02946aa473c22baaf23e860480b77c1a228e580215793dbc4285d.exe
-
Size
1.1MB
-
MD5
de89c0c03f45a3abcb9d3c7f3c4510e6
-
SHA1
f0dcdd5ad3562c5f32ba7391a5dab1713a8d1739
-
SHA256
bb9a4c8beea02946aa473c22baaf23e860480b77c1a228e580215793dbc4285d
-
SHA512
29e0c4539bce2e4870e97d3822ad3d9801eee32fdb9dae8246511d8f99b1e4fb8c44ecb854540e59f2a0b34150366787487d112aec5a024733e9c61f6e676083
-
SSDEEP
24576:Fy9OD9qt1rCgqAeP2FmkH79PlpYlpgiW/:g4IP+5AeJkH5ag
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diro
185.161.248.90:4125
-
auth_value
ae95bda0dd2e95169886a3a68138568b
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr191770.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr191770.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr191770.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr191770.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr191770.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2276 un025054.exe 2392 un154783.exe 2848 pr191770.exe 3888 qu183307.exe 516 1.exe 4500 rk488418.exe 1056 si429104.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr191770.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr191770.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bb9a4c8beea02946aa473c22baaf23e860480b77c1a228e580215793dbc4285d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un025054.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un025054.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un154783.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un154783.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bb9a4c8beea02946aa473c22baaf23e860480b77c1a228e580215793dbc4285d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 7 IoCs
pid pid_target Process procid_target 4276 1056 WerFault.exe 73 4028 1056 WerFault.exe 73 2148 1056 WerFault.exe 73 2384 1056 WerFault.exe 73 2432 1056 WerFault.exe 73 3012 1056 WerFault.exe 73 3288 1056 WerFault.exe 73 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2848 pr191770.exe 2848 pr191770.exe 516 1.exe 4500 rk488418.exe 4500 rk488418.exe 516 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2848 pr191770.exe Token: SeDebugPrivilege 3888 qu183307.exe Token: SeDebugPrivilege 516 1.exe Token: SeDebugPrivilege 4500 rk488418.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2036 wrote to memory of 2276 2036 bb9a4c8beea02946aa473c22baaf23e860480b77c1a228e580215793dbc4285d.exe 66 PID 2036 wrote to memory of 2276 2036 bb9a4c8beea02946aa473c22baaf23e860480b77c1a228e580215793dbc4285d.exe 66 PID 2036 wrote to memory of 2276 2036 bb9a4c8beea02946aa473c22baaf23e860480b77c1a228e580215793dbc4285d.exe 66 PID 2276 wrote to memory of 2392 2276 un025054.exe 67 PID 2276 wrote to memory of 2392 2276 un025054.exe 67 PID 2276 wrote to memory of 2392 2276 un025054.exe 67 PID 2392 wrote to memory of 2848 2392 un154783.exe 68 PID 2392 wrote to memory of 2848 2392 un154783.exe 68 PID 2392 wrote to memory of 2848 2392 un154783.exe 68 PID 2392 wrote to memory of 3888 2392 un154783.exe 69 PID 2392 wrote to memory of 3888 2392 un154783.exe 69 PID 2392 wrote to memory of 3888 2392 un154783.exe 69 PID 3888 wrote to memory of 516 3888 qu183307.exe 70 PID 3888 wrote to memory of 516 3888 qu183307.exe 70 PID 3888 wrote to memory of 516 3888 qu183307.exe 70 PID 2276 wrote to memory of 4500 2276 un025054.exe 71 PID 2276 wrote to memory of 4500 2276 un025054.exe 71 PID 2276 wrote to memory of 4500 2276 un025054.exe 71 PID 2036 wrote to memory of 1056 2036 bb9a4c8beea02946aa473c22baaf23e860480b77c1a228e580215793dbc4285d.exe 73 PID 2036 wrote to memory of 1056 2036 bb9a4c8beea02946aa473c22baaf23e860480b77c1a228e580215793dbc4285d.exe 73 PID 2036 wrote to memory of 1056 2036 bb9a4c8beea02946aa473c22baaf23e860480b77c1a228e580215793dbc4285d.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb9a4c8beea02946aa473c22baaf23e860480b77c1a228e580215793dbc4285d.exe"C:\Users\Admin\AppData\Local\Temp\bb9a4c8beea02946aa473c22baaf23e860480b77c1a228e580215793dbc4285d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un025054.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un025054.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un154783.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un154783.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr191770.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr191770.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu183307.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu183307.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:516
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk488418.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk488418.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4500
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si429104.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si429104.exe2⤵
- Executes dropped EXE
PID:1056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 6163⤵
- Program crash
PID:4276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 6963⤵
- Program crash
PID:4028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 8163⤵
- Program crash
PID:2148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 8883⤵
- Program crash
PID:2384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 9083⤵
- Program crash
PID:2432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 8203⤵
- Program crash
PID:3012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 10803⤵
- Program crash
PID:3288
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
309KB
MD59242e8e8a5d6a083662e9a3114763779
SHA1c942ce1860dab1d359b38d74fd93f6a6b40cd12d
SHA2562fe02c613d0a5317c961aa489106fa0219bcb6426c30d6ed8aa85ff711d9fb7e
SHA51264d08407736c95373efb8a642e788947fb9af4483b2ffa8843291ff31f42fa60f44bf5927efdf95c953ec29c382b308944039143d2e73c919dcb6f666b589f3e
-
Filesize
309KB
MD59242e8e8a5d6a083662e9a3114763779
SHA1c942ce1860dab1d359b38d74fd93f6a6b40cd12d
SHA2562fe02c613d0a5317c961aa489106fa0219bcb6426c30d6ed8aa85ff711d9fb7e
SHA51264d08407736c95373efb8a642e788947fb9af4483b2ffa8843291ff31f42fa60f44bf5927efdf95c953ec29c382b308944039143d2e73c919dcb6f666b589f3e
-
Filesize
818KB
MD5457e1e26ed98a6ff7d546058fb02ebc6
SHA1186fe74c83a924af836323a363db1deb1cadc192
SHA256f99eed158e075b74e84172214f84b5a00ff8ed302f0b4aa4f3e6c8f323a51970
SHA512050718473e014fb389c50423ab7d0209f4ad5927a1e04b4bda6d82762ff9f773a534c955381f429b5f80c7f4a4696f8052ba5667d802b770b8dac55c295be4c1
-
Filesize
818KB
MD5457e1e26ed98a6ff7d546058fb02ebc6
SHA1186fe74c83a924af836323a363db1deb1cadc192
SHA256f99eed158e075b74e84172214f84b5a00ff8ed302f0b4aa4f3e6c8f323a51970
SHA512050718473e014fb389c50423ab7d0209f4ad5927a1e04b4bda6d82762ff9f773a534c955381f429b5f80c7f4a4696f8052ba5667d802b770b8dac55c295be4c1
-
Filesize
169KB
MD552122165089dee032d104b5d43e8d441
SHA1202778cb8060ae70f7d817c4558fac5304be5659
SHA256dc5374226f6456b1095384d85278af99d6fccb1f87caa44f3ee4dc5451b3b2ef
SHA512743a89256e7d2e5228786a158845757ab621be463f26981c328dde21f33dc13bc94cd8e9247d2e00452946f316a076cad2291d120fbf8f8c9b3d6ffe4289758e
-
Filesize
169KB
MD552122165089dee032d104b5d43e8d441
SHA1202778cb8060ae70f7d817c4558fac5304be5659
SHA256dc5374226f6456b1095384d85278af99d6fccb1f87caa44f3ee4dc5451b3b2ef
SHA512743a89256e7d2e5228786a158845757ab621be463f26981c328dde21f33dc13bc94cd8e9247d2e00452946f316a076cad2291d120fbf8f8c9b3d6ffe4289758e
-
Filesize
665KB
MD5d1c33acc55aeb1a7915877b8daeb8bcc
SHA145ded6bee39f8aac53337eb0c293c6d2b7cb4cac
SHA256e4d03f06aeb34a168aba8f428d738bec7101a41d76b95038f2898003e7a3abe6
SHA512c9eeb050330b06add19235dfabba3da5f6129c82d9bdfb81099b88c49aa3e5a70622dc34d2a3f0092d33c362c1185c2337b281c7e14e79a15ee57d0ba1679fff
-
Filesize
665KB
MD5d1c33acc55aeb1a7915877b8daeb8bcc
SHA145ded6bee39f8aac53337eb0c293c6d2b7cb4cac
SHA256e4d03f06aeb34a168aba8f428d738bec7101a41d76b95038f2898003e7a3abe6
SHA512c9eeb050330b06add19235dfabba3da5f6129c82d9bdfb81099b88c49aa3e5a70622dc34d2a3f0092d33c362c1185c2337b281c7e14e79a15ee57d0ba1679fff
-
Filesize
317KB
MD58d4f17399f1c80c7cd0527ce163616de
SHA131fc0a36c42d45a68a54a88af395d38e1e8ad247
SHA256a42af860a884ab216d394c5e71d5acadb938a3be87693fb66481f0326352ed29
SHA512c49740782f438f72908f92dd23373655762bee35b026c191ee2d96720ff1ce98b8d9cb0c31b6608e37952529f9cc506d26d58b3143414f85c14e69db33af86e7
-
Filesize
317KB
MD58d4f17399f1c80c7cd0527ce163616de
SHA131fc0a36c42d45a68a54a88af395d38e1e8ad247
SHA256a42af860a884ab216d394c5e71d5acadb938a3be87693fb66481f0326352ed29
SHA512c49740782f438f72908f92dd23373655762bee35b026c191ee2d96720ff1ce98b8d9cb0c31b6608e37952529f9cc506d26d58b3143414f85c14e69db33af86e7
-
Filesize
501KB
MD5cba777951f424aff6c6ee213c62ac55a
SHA130a3a96e8c8e5a6841529da511e03b480275c1c6
SHA256c83f9cc7563745f4ba34dde562508f0f9a71115b5806b9aa12c1ca455ea94553
SHA5124b936e32d7970c5e4f2e393731561622b589902afb5ce4a9c2453666ea77e3cfe69fa7f12b24b5d45f20844fb3e821a70c388ff650d71fb1935b193feb188379
-
Filesize
501KB
MD5cba777951f424aff6c6ee213c62ac55a
SHA130a3a96e8c8e5a6841529da511e03b480275c1c6
SHA256c83f9cc7563745f4ba34dde562508f0f9a71115b5806b9aa12c1ca455ea94553
SHA5124b936e32d7970c5e4f2e393731561622b589902afb5ce4a9c2453666ea77e3cfe69fa7f12b24b5d45f20844fb3e821a70c388ff650d71fb1935b193feb188379
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1