Analysis
-
max time kernel
50s -
max time network
69s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
13/04/2023, 20:03
Static task
static1
General
-
Target
f805781c705742777c783060df19e17cb426b9d19652d04f198de1b48da88ae5.exe
-
Size
962KB
-
MD5
54e5bbb2bf8ca10e2319f3205ef0422b
-
SHA1
2b45f0720dab978f996cce51911e1a7acc926b16
-
SHA256
f805781c705742777c783060df19e17cb426b9d19652d04f198de1b48da88ae5
-
SHA512
22b76dfe0a2002caa124630b18fbd77ad748c9dad4350ee95a3cbeca634ac7a7f547dae3f2ce85c844e1325ca703de8c6f35338def4e5b078114469547ace3d2
-
SSDEEP
24576:nyCeFdmVDWFhyq5txtke8CtWCXT7JUZyOlRlgmwL:yCe2I5tTkeKCXT6dl
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it239948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it239948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it239948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it239948.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it239948.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 1476 ziGS1523.exe 1740 ziDv3192.exe 2060 it239948.exe 4160 jr754893.exe 5088 1.exe 4364 kp432995.exe 1724 lr278901.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it239948.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f805781c705742777c783060df19e17cb426b9d19652d04f198de1b48da88ae5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f805781c705742777c783060df19e17cb426b9d19652d04f198de1b48da88ae5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziGS1523.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziGS1523.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziDv3192.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziDv3192.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 8 IoCs
pid pid_target Process procid_target 4424 1724 WerFault.exe 73 3928 1724 WerFault.exe 73 4776 1724 WerFault.exe 73 3932 1724 WerFault.exe 73 1496 1724 WerFault.exe 73 2984 1724 WerFault.exe 73 4780 1724 WerFault.exe 73 3772 1724 WerFault.exe 73 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2060 it239948.exe 2060 it239948.exe 5088 1.exe 4364 kp432995.exe 4364 kp432995.exe 5088 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2060 it239948.exe Token: SeDebugPrivilege 4160 jr754893.exe Token: SeDebugPrivilege 5088 1.exe Token: SeDebugPrivilege 4364 kp432995.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1308 wrote to memory of 1476 1308 f805781c705742777c783060df19e17cb426b9d19652d04f198de1b48da88ae5.exe 66 PID 1308 wrote to memory of 1476 1308 f805781c705742777c783060df19e17cb426b9d19652d04f198de1b48da88ae5.exe 66 PID 1308 wrote to memory of 1476 1308 f805781c705742777c783060df19e17cb426b9d19652d04f198de1b48da88ae5.exe 66 PID 1476 wrote to memory of 1740 1476 ziGS1523.exe 67 PID 1476 wrote to memory of 1740 1476 ziGS1523.exe 67 PID 1476 wrote to memory of 1740 1476 ziGS1523.exe 67 PID 1740 wrote to memory of 2060 1740 ziDv3192.exe 68 PID 1740 wrote to memory of 2060 1740 ziDv3192.exe 68 PID 1740 wrote to memory of 4160 1740 ziDv3192.exe 69 PID 1740 wrote to memory of 4160 1740 ziDv3192.exe 69 PID 1740 wrote to memory of 4160 1740 ziDv3192.exe 69 PID 4160 wrote to memory of 5088 4160 jr754893.exe 70 PID 4160 wrote to memory of 5088 4160 jr754893.exe 70 PID 4160 wrote to memory of 5088 4160 jr754893.exe 70 PID 1476 wrote to memory of 4364 1476 ziGS1523.exe 71 PID 1476 wrote to memory of 4364 1476 ziGS1523.exe 71 PID 1476 wrote to memory of 4364 1476 ziGS1523.exe 71 PID 1308 wrote to memory of 1724 1308 f805781c705742777c783060df19e17cb426b9d19652d04f198de1b48da88ae5.exe 73 PID 1308 wrote to memory of 1724 1308 f805781c705742777c783060df19e17cb426b9d19652d04f198de1b48da88ae5.exe 73 PID 1308 wrote to memory of 1724 1308 f805781c705742777c783060df19e17cb426b9d19652d04f198de1b48da88ae5.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\f805781c705742777c783060df19e17cb426b9d19652d04f198de1b48da88ae5.exe"C:\Users\Admin\AppData\Local\Temp\f805781c705742777c783060df19e17cb426b9d19652d04f198de1b48da88ae5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGS1523.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGS1523.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziDv3192.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziDv3192.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it239948.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it239948.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2060
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr754893.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr754893.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5088
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp432995.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp432995.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4364
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr278901.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr278901.exe2⤵
- Executes dropped EXE
PID:1724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 6163⤵
- Program crash
PID:4424
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 6963⤵
- Program crash
PID:3928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 7683⤵
- Program crash
PID:4776
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 8443⤵
- Program crash
PID:3932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 8763⤵
- Program crash
PID:1496
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 8563⤵
- Program crash
PID:2984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 11283⤵
- Program crash
PID:4780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 10603⤵
- Program crash
PID:3772
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
309KB
MD59242e8e8a5d6a083662e9a3114763779
SHA1c942ce1860dab1d359b38d74fd93f6a6b40cd12d
SHA2562fe02c613d0a5317c961aa489106fa0219bcb6426c30d6ed8aa85ff711d9fb7e
SHA51264d08407736c95373efb8a642e788947fb9af4483b2ffa8843291ff31f42fa60f44bf5927efdf95c953ec29c382b308944039143d2e73c919dcb6f666b589f3e
-
Filesize
309KB
MD59242e8e8a5d6a083662e9a3114763779
SHA1c942ce1860dab1d359b38d74fd93f6a6b40cd12d
SHA2562fe02c613d0a5317c961aa489106fa0219bcb6426c30d6ed8aa85ff711d9fb7e
SHA51264d08407736c95373efb8a642e788947fb9af4483b2ffa8843291ff31f42fa60f44bf5927efdf95c953ec29c382b308944039143d2e73c919dcb6f666b589f3e
-
Filesize
679KB
MD5cb6cf9c78fd5ee9d923262cb217fae32
SHA111b3c50d8fae1ba40fd5585fcfd2d795ca6e3589
SHA25642fe52432f38eb7720082b5359315f6e720868297e365c8ac15240f60dd5bcc1
SHA5128e9be70100fbf0b9db399cc65426e4ee79769dcae4a1939fe39d1c9255dbe3abf4ede4c6fa9bba97d84f75eab08fcbb4a528a5e2fac7afcac594243192303b0e
-
Filesize
679KB
MD5cb6cf9c78fd5ee9d923262cb217fae32
SHA111b3c50d8fae1ba40fd5585fcfd2d795ca6e3589
SHA25642fe52432f38eb7720082b5359315f6e720868297e365c8ac15240f60dd5bcc1
SHA5128e9be70100fbf0b9db399cc65426e4ee79769dcae4a1939fe39d1c9255dbe3abf4ede4c6fa9bba97d84f75eab08fcbb4a528a5e2fac7afcac594243192303b0e
-
Filesize
168KB
MD547368dc18eb6e302875e996aebab2dab
SHA1e9cd449991494ae5621306180228fbbeef7cf79a
SHA25681d3319660c363f686e4ed187dce054b036d054bdaf3356d63dff714a3c22b5e
SHA5120806e1d66485f58a2e8ac4506c88d4ff40d859d8a7fa9f2c4af101cc450af17ccf491b16e30d144e6a5415f3b4520084f9dc528ec52dc8c77c23012698f5de83
-
Filesize
168KB
MD547368dc18eb6e302875e996aebab2dab
SHA1e9cd449991494ae5621306180228fbbeef7cf79a
SHA25681d3319660c363f686e4ed187dce054b036d054bdaf3356d63dff714a3c22b5e
SHA5120806e1d66485f58a2e8ac4506c88d4ff40d859d8a7fa9f2c4af101cc450af17ccf491b16e30d144e6a5415f3b4520084f9dc528ec52dc8c77c23012698f5de83
-
Filesize
525KB
MD507a744f758e392a397e107428f2e5bd6
SHA162a1327930e2de4fbf2e106d274bda0e798f8b83
SHA25678a9145a4235c8ddece1f7088577be50bac450ade565d8663391c0f7a7afeceb
SHA5120c7cc85bddc31c3f349fd29515160455490e5b1710405dd20fb2919fa0f4daa39a14bf8c4b0afd35a5bd291aad0ad8d415baae186be76b5b99bc5cdde88fe45a
-
Filesize
525KB
MD507a744f758e392a397e107428f2e5bd6
SHA162a1327930e2de4fbf2e106d274bda0e798f8b83
SHA25678a9145a4235c8ddece1f7088577be50bac450ade565d8663391c0f7a7afeceb
SHA5120c7cc85bddc31c3f349fd29515160455490e5b1710405dd20fb2919fa0f4daa39a14bf8c4b0afd35a5bd291aad0ad8d415baae186be76b5b99bc5cdde88fe45a
-
Filesize
11KB
MD5095b8cc26883cc1cb72e7b1c5838c181
SHA1764216622b952d86630d4f6cde45c0649c31246e
SHA256402d27f2f330d0fa4b75976501e16dfd153adece583d6e0c82300b78b79d15e8
SHA512768f8c59d46319d94303141aa5c5a7bd49309c67e859f3df44f9c563830a38d5222dd5ac8deca7427f98e77282ef78331fc8a8b618af3b7de6eb834cdc92cf08
-
Filesize
11KB
MD5095b8cc26883cc1cb72e7b1c5838c181
SHA1764216622b952d86630d4f6cde45c0649c31246e
SHA256402d27f2f330d0fa4b75976501e16dfd153adece583d6e0c82300b78b79d15e8
SHA512768f8c59d46319d94303141aa5c5a7bd49309c67e859f3df44f9c563830a38d5222dd5ac8deca7427f98e77282ef78331fc8a8b618af3b7de6eb834cdc92cf08
-
Filesize
501KB
MD5ead20a66b86600891d7b28c103f690a7
SHA1d941d1e1757f76ee87f6de746d773942bb36dc6e
SHA25637cae9d5d2746bc03473f59ca118efd464110829e2f728d9bbd8a2d519df57e4
SHA5127ee422077c959935fa95b78ba26c64976b2ea3d55da0827fa3bb985ceaa4b385b9d9b796b02e9d17d84cb7f893ff2b68f7f5ac8aaed1067b2fcea0326d054496
-
Filesize
501KB
MD5ead20a66b86600891d7b28c103f690a7
SHA1d941d1e1757f76ee87f6de746d773942bb36dc6e
SHA25637cae9d5d2746bc03473f59ca118efd464110829e2f728d9bbd8a2d519df57e4
SHA5127ee422077c959935fa95b78ba26c64976b2ea3d55da0827fa3bb985ceaa4b385b9d9b796b02e9d17d84cb7f893ff2b68f7f5ac8aaed1067b2fcea0326d054496
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1