Analysis
-
max time kernel
149s -
max time network
106s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14/04/2023, 00:30
Static task
static1
General
-
Target
2a05cef1a7c0820a5e00ac96cec7991692a68328590e234e0fe44b0078c84072.exe
-
Size
1.1MB
-
MD5
52610e542122921d6f279d7a19eeebc9
-
SHA1
3db477264ffc5c10e3589c8d0ea3c4cf63a0d7fa
-
SHA256
2a05cef1a7c0820a5e00ac96cec7991692a68328590e234e0fe44b0078c84072
-
SHA512
46f6c2f98a9a6554842641dd0a6cea3420676eaff4e9f140d9f12f3ae8eb5864b2719b0500f25906f691ac823e6238d9ef74dbf00362f795e42317e4a8f0dfac
-
SSDEEP
24576:DyYY2wRVPngbV47eZRNDd2WUVfg1BVZC8GkeaLbH3BkVIvONviT:WYUVPgeKZV9UFg1/oEHDvi
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr083510.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr083510.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr083510.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr083510.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr083510.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2676 un975422.exe 3252 un112544.exe 4960 pr083510.exe 3604 qu316379.exe 4216 1.exe 1780 rk701489.exe 3104 si991086.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr083510.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr083510.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un112544.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2a05cef1a7c0820a5e00ac96cec7991692a68328590e234e0fe44b0078c84072.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2a05cef1a7c0820a5e00ac96cec7991692a68328590e234e0fe44b0078c84072.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un975422.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un975422.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un112544.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 7 IoCs
pid pid_target Process procid_target 4960 3104 WerFault.exe 73 2916 3104 WerFault.exe 73 4720 3104 WerFault.exe 73 3804 3104 WerFault.exe 73 1392 3104 WerFault.exe 73 3840 3104 WerFault.exe 73 2080 3104 WerFault.exe 73 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4960 pr083510.exe 4960 pr083510.exe 1780 rk701489.exe 1780 rk701489.exe 4216 1.exe 4216 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4960 pr083510.exe Token: SeDebugPrivilege 3604 qu316379.exe Token: SeDebugPrivilege 1780 rk701489.exe Token: SeDebugPrivilege 4216 1.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2676 2420 2a05cef1a7c0820a5e00ac96cec7991692a68328590e234e0fe44b0078c84072.exe 66 PID 2420 wrote to memory of 2676 2420 2a05cef1a7c0820a5e00ac96cec7991692a68328590e234e0fe44b0078c84072.exe 66 PID 2420 wrote to memory of 2676 2420 2a05cef1a7c0820a5e00ac96cec7991692a68328590e234e0fe44b0078c84072.exe 66 PID 2676 wrote to memory of 3252 2676 un975422.exe 67 PID 2676 wrote to memory of 3252 2676 un975422.exe 67 PID 2676 wrote to memory of 3252 2676 un975422.exe 67 PID 3252 wrote to memory of 4960 3252 un112544.exe 68 PID 3252 wrote to memory of 4960 3252 un112544.exe 68 PID 3252 wrote to memory of 4960 3252 un112544.exe 68 PID 3252 wrote to memory of 3604 3252 un112544.exe 69 PID 3252 wrote to memory of 3604 3252 un112544.exe 69 PID 3252 wrote to memory of 3604 3252 un112544.exe 69 PID 3604 wrote to memory of 4216 3604 qu316379.exe 70 PID 3604 wrote to memory of 4216 3604 qu316379.exe 70 PID 3604 wrote to memory of 4216 3604 qu316379.exe 70 PID 2676 wrote to memory of 1780 2676 un975422.exe 71 PID 2676 wrote to memory of 1780 2676 un975422.exe 71 PID 2676 wrote to memory of 1780 2676 un975422.exe 71 PID 2420 wrote to memory of 3104 2420 2a05cef1a7c0820a5e00ac96cec7991692a68328590e234e0fe44b0078c84072.exe 73 PID 2420 wrote to memory of 3104 2420 2a05cef1a7c0820a5e00ac96cec7991692a68328590e234e0fe44b0078c84072.exe 73 PID 2420 wrote to memory of 3104 2420 2a05cef1a7c0820a5e00ac96cec7991692a68328590e234e0fe44b0078c84072.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a05cef1a7c0820a5e00ac96cec7991692a68328590e234e0fe44b0078c84072.exe"C:\Users\Admin\AppData\Local\Temp\2a05cef1a7c0820a5e00ac96cec7991692a68328590e234e0fe44b0078c84072.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un975422.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un975422.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un112544.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un112544.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr083510.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr083510.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu316379.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu316379.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4216
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk701489.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk701489.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1780
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si991086.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si991086.exe2⤵
- Executes dropped EXE
PID:3104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 6403⤵
- Program crash
PID:4960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 7163⤵
- Program crash
PID:2916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 7763⤵
- Program crash
PID:4720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 8523⤵
- Program crash
PID:3804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 8843⤵
- Program crash
PID:1392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 8603⤵
- Program crash
PID:3840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 10803⤵
- Program crash
PID:2080
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
310KB
MD58c35c4b3cf812178c01e1d942c761d76
SHA11eda2cf7c899b2260685e209f98cf5fb9ce4f471
SHA256eb6ed8f5ff38c6fb92f4834093ddcaa29c2563faa3b88d2df6fc3e1957641ccf
SHA51230a967b2a51cd3107c25ef2675f556c193275cf39153df3c1864dd4eff354d37f1f74487af3956f7ae4226d91c0294878462049c9acf0114dab2cb664d3228d5
-
Filesize
310KB
MD58c35c4b3cf812178c01e1d942c761d76
SHA11eda2cf7c899b2260685e209f98cf5fb9ce4f471
SHA256eb6ed8f5ff38c6fb92f4834093ddcaa29c2563faa3b88d2df6fc3e1957641ccf
SHA51230a967b2a51cd3107c25ef2675f556c193275cf39153df3c1864dd4eff354d37f1f74487af3956f7ae4226d91c0294878462049c9acf0114dab2cb664d3228d5
-
Filesize
820KB
MD5377a219420c292d1eed2685914d648e4
SHA1d021583234b2774072325bed6cab83486db08664
SHA2565df6d9785604c6bd84f9de4151a3a5bf7ee9cbd299b14279b414280fbedb10c6
SHA512244ad0e92adbfcdb9958589e24b5f1016875edbba5585a4599dd20fc9b4dca4ea95c778f6b36376872e75970bf5f359cdc158328db554ac47818d528005c773b
-
Filesize
820KB
MD5377a219420c292d1eed2685914d648e4
SHA1d021583234b2774072325bed6cab83486db08664
SHA2565df6d9785604c6bd84f9de4151a3a5bf7ee9cbd299b14279b414280fbedb10c6
SHA512244ad0e92adbfcdb9958589e24b5f1016875edbba5585a4599dd20fc9b4dca4ea95c778f6b36376872e75970bf5f359cdc158328db554ac47818d528005c773b
-
Filesize
168KB
MD552b032b6d26390a05b326ea041aa0b56
SHA1ad9e3b649d027d07d7f0de1bb990ff18796599c8
SHA25688b3d1384d1e15a17f488b57158e808387901c7eefca6a68c2838c39e84c696d
SHA512394b9cad16b6acb87a27391704dceb2e4df1c6675a00f9f0bd0d6093486f28b4e9002effb92a78bfd9944cf9abaaf88e6255c3e203961f581cf5abee4cbda1ec
-
Filesize
168KB
MD552b032b6d26390a05b326ea041aa0b56
SHA1ad9e3b649d027d07d7f0de1bb990ff18796599c8
SHA25688b3d1384d1e15a17f488b57158e808387901c7eefca6a68c2838c39e84c696d
SHA512394b9cad16b6acb87a27391704dceb2e4df1c6675a00f9f0bd0d6093486f28b4e9002effb92a78bfd9944cf9abaaf88e6255c3e203961f581cf5abee4cbda1ec
-
Filesize
666KB
MD57a7d3daa29f3bdc2849484c094dcac9b
SHA1404547dd70a0cd9c6a91bae2b2c9c38fc2f094de
SHA2567482f98bb3e1a27f9c8a2e586cbb04e67898d4a187e86ee74325d15bc380167e
SHA5120fe4aca5716e3d8ea510b885587aefd2305df0ac095e8d5755b009df43490a20c6927765611eea3a64c7cdc761349ae7bc00b35dc5f18a2405d70ed2daae5b0c
-
Filesize
666KB
MD57a7d3daa29f3bdc2849484c094dcac9b
SHA1404547dd70a0cd9c6a91bae2b2c9c38fc2f094de
SHA2567482f98bb3e1a27f9c8a2e586cbb04e67898d4a187e86ee74325d15bc380167e
SHA5120fe4aca5716e3d8ea510b885587aefd2305df0ac095e8d5755b009df43490a20c6927765611eea3a64c7cdc761349ae7bc00b35dc5f18a2405d70ed2daae5b0c
-
Filesize
318KB
MD57237f1fa8ce155aebe22ba31deecdbd7
SHA1e48fd4954aba3155ba9adbec8bfc8c68a3469c6d
SHA256237d884d22064cba565447e417f841345c6d9b3e900fd6f5fea12817e35fc36d
SHA512cf5e86c91e82b6b1437b300784b79862b1a8969a0d122a68049665fedcd2e5f69ed56eb292710b2d05270d2705f8bff83e9b95d2b6ff2523bd125b8ed90bc3cf
-
Filesize
318KB
MD57237f1fa8ce155aebe22ba31deecdbd7
SHA1e48fd4954aba3155ba9adbec8bfc8c68a3469c6d
SHA256237d884d22064cba565447e417f841345c6d9b3e900fd6f5fea12817e35fc36d
SHA512cf5e86c91e82b6b1437b300784b79862b1a8969a0d122a68049665fedcd2e5f69ed56eb292710b2d05270d2705f8bff83e9b95d2b6ff2523bd125b8ed90bc3cf
-
Filesize
502KB
MD5563862471bc2a838ac3afa71e53a62af
SHA189b6d9f86ea91b4a243984dd00a8519b5a5ec9b3
SHA25632f1d74ada49a79fcaaa3e122c934457799e94a5ec82404dd06153e990a97dad
SHA512edc093c049b7072aef676681313808e3414aeeb127c4e1f6f86a60d2b63b4c62527ddfda73ae02c0a0108ed49b3fbeab4480e2fb86c0f88544c7ac25a96a2ee7
-
Filesize
502KB
MD5563862471bc2a838ac3afa71e53a62af
SHA189b6d9f86ea91b4a243984dd00a8519b5a5ec9b3
SHA25632f1d74ada49a79fcaaa3e122c934457799e94a5ec82404dd06153e990a97dad
SHA512edc093c049b7072aef676681313808e3414aeeb127c4e1f6f86a60d2b63b4c62527ddfda73ae02c0a0108ed49b3fbeab4480e2fb86c0f88544c7ac25a96a2ee7
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1