Analysis
-
max time kernel
150s -
max time network
107s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14/04/2023, 01:20
Static task
static1
General
-
Target
1a6310f724d06f9f383bc59a861684f21a55f0077842f2a6ebd92e5876a109fd.exe
-
Size
1.1MB
-
MD5
601b5c1404dedf8b9599e5a82035f9a2
-
SHA1
9f2ab42a7aa0666e0a6814fea40eb07e2ba4e457
-
SHA256
1a6310f724d06f9f383bc59a861684f21a55f0077842f2a6ebd92e5876a109fd
-
SHA512
479fe40b7d7f2936bfcefe48d6fd05464081ce68c32333879c4f46c3121fe992d5d5af001a9b5dc351fa386b666aab64ecb70ec368b179e439d238393d5ff824
-
SSDEEP
24576:nyUzQwg1xy9XmvTVLJy5+tnE4OE6/cWWWs6:yUzexy92vpLJSqqEW
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr044483.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr044483.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr044483.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr044483.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr044483.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2876 un181064.exe 3776 un847742.exe 5036 pr044483.exe 1264 qu457822.exe 2112 1.exe 3680 rk871934.exe 4732 si705081.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr044483.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr044483.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1a6310f724d06f9f383bc59a861684f21a55f0077842f2a6ebd92e5876a109fd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1a6310f724d06f9f383bc59a861684f21a55f0077842f2a6ebd92e5876a109fd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un181064.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un181064.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un847742.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un847742.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
pid pid_target Process procid_target 2176 4732 WerFault.exe 73 4708 4732 WerFault.exe 73 4720 4732 WerFault.exe 73 4080 4732 WerFault.exe 73 1392 4732 WerFault.exe 73 3844 4732 WerFault.exe 73 3852 4732 WerFault.exe 73 2088 4732 WerFault.exe 73 4824 4732 WerFault.exe 73 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5036 pr044483.exe 5036 pr044483.exe 2112 1.exe 2112 1.exe 3680 rk871934.exe 3680 rk871934.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 5036 pr044483.exe Token: SeDebugPrivilege 1264 qu457822.exe Token: SeDebugPrivilege 2112 1.exe Token: SeDebugPrivilege 3680 rk871934.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2876 2440 1a6310f724d06f9f383bc59a861684f21a55f0077842f2a6ebd92e5876a109fd.exe 66 PID 2440 wrote to memory of 2876 2440 1a6310f724d06f9f383bc59a861684f21a55f0077842f2a6ebd92e5876a109fd.exe 66 PID 2440 wrote to memory of 2876 2440 1a6310f724d06f9f383bc59a861684f21a55f0077842f2a6ebd92e5876a109fd.exe 66 PID 2876 wrote to memory of 3776 2876 un181064.exe 67 PID 2876 wrote to memory of 3776 2876 un181064.exe 67 PID 2876 wrote to memory of 3776 2876 un181064.exe 67 PID 3776 wrote to memory of 5036 3776 un847742.exe 68 PID 3776 wrote to memory of 5036 3776 un847742.exe 68 PID 3776 wrote to memory of 5036 3776 un847742.exe 68 PID 3776 wrote to memory of 1264 3776 un847742.exe 69 PID 3776 wrote to memory of 1264 3776 un847742.exe 69 PID 3776 wrote to memory of 1264 3776 un847742.exe 69 PID 1264 wrote to memory of 2112 1264 qu457822.exe 70 PID 1264 wrote to memory of 2112 1264 qu457822.exe 70 PID 1264 wrote to memory of 2112 1264 qu457822.exe 70 PID 2876 wrote to memory of 3680 2876 un181064.exe 71 PID 2876 wrote to memory of 3680 2876 un181064.exe 71 PID 2876 wrote to memory of 3680 2876 un181064.exe 71 PID 2440 wrote to memory of 4732 2440 1a6310f724d06f9f383bc59a861684f21a55f0077842f2a6ebd92e5876a109fd.exe 73 PID 2440 wrote to memory of 4732 2440 1a6310f724d06f9f383bc59a861684f21a55f0077842f2a6ebd92e5876a109fd.exe 73 PID 2440 wrote to memory of 4732 2440 1a6310f724d06f9f383bc59a861684f21a55f0077842f2a6ebd92e5876a109fd.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a6310f724d06f9f383bc59a861684f21a55f0077842f2a6ebd92e5876a109fd.exe"C:\Users\Admin\AppData\Local\Temp\1a6310f724d06f9f383bc59a861684f21a55f0077842f2a6ebd92e5876a109fd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un181064.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un181064.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un847742.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un847742.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr044483.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr044483.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5036
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu457822.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu457822.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk871934.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk871934.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si705081.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si705081.exe2⤵
- Executes dropped EXE
PID:4732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4732 -s 6403⤵
- Program crash
PID:2176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4732 -s 7163⤵
- Program crash
PID:4708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4732 -s 8043⤵
- Program crash
PID:4720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4732 -s 8523⤵
- Program crash
PID:4080
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4732 -s 9083⤵
- Program crash
PID:1392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4732 -s 9483⤵
- Program crash
PID:3844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4732 -s 11243⤵
- Program crash
PID:3852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4732 -s 11723⤵
- Program crash
PID:2088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4732 -s 11563⤵
- Program crash
PID:4824
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
291KB
MD5a3a6eed64ad72169f3a9722a874301fc
SHA1865a984f1d316b4ba77dccd553aa3d7d1499185b
SHA256cfa3f02312b56075a1f629182e7df4b0938e9740b2484a2027976affa24b9794
SHA512501e448e772d092517320ebea444afb0764b93a62f370652678efa3e8884d568d65b9e9936ad9ab1a1cb1bce477d2d40f1ca68b6ef91a5c5914b85a2eecfa069
-
Filesize
291KB
MD5a3a6eed64ad72169f3a9722a874301fc
SHA1865a984f1d316b4ba77dccd553aa3d7d1499185b
SHA256cfa3f02312b56075a1f629182e7df4b0938e9740b2484a2027976affa24b9794
SHA512501e448e772d092517320ebea444afb0764b93a62f370652678efa3e8884d568d65b9e9936ad9ab1a1cb1bce477d2d40f1ca68b6ef91a5c5914b85a2eecfa069
-
Filesize
808KB
MD52e1d44012b0410843edbaff4bd5c9abb
SHA159959b967aecdde2b90629dda0d0eaca0a4707b2
SHA2567c667c8dfab14c447dac1d141ef5f06d4432f81ded0e3fbc996560cd24ee5652
SHA512f57f7b2c81e6bedfa0ffbfee3735060194f64148170c9e7fae68941583ac9ef1fe5dce33217ac4e118a794bce75ec194c237f9a9d824990dbe4d23c76b7b1414
-
Filesize
808KB
MD52e1d44012b0410843edbaff4bd5c9abb
SHA159959b967aecdde2b90629dda0d0eaca0a4707b2
SHA2567c667c8dfab14c447dac1d141ef5f06d4432f81ded0e3fbc996560cd24ee5652
SHA512f57f7b2c81e6bedfa0ffbfee3735060194f64148170c9e7fae68941583ac9ef1fe5dce33217ac4e118a794bce75ec194c237f9a9d824990dbe4d23c76b7b1414
-
Filesize
168KB
MD51ef90be51e293c5d97ca529916ec990d
SHA122d83228e1f34622e8565bf4c523a028bea3180d
SHA25695b8d19ba61fce05b66597a7feeaea7bdef9cc29c41f3b83872a4668e41f8837
SHA512c8e467bd238565486fd5da4a54b887e9f528a5405a7f50699e472a9519122701906af2415053d7d95bcbd468e5733f4acf45f353eda1af8a06d33c096488a0c0
-
Filesize
168KB
MD51ef90be51e293c5d97ca529916ec990d
SHA122d83228e1f34622e8565bf4c523a028bea3180d
SHA25695b8d19ba61fce05b66597a7feeaea7bdef9cc29c41f3b83872a4668e41f8837
SHA512c8e467bd238565486fd5da4a54b887e9f528a5405a7f50699e472a9519122701906af2415053d7d95bcbd468e5733f4acf45f353eda1af8a06d33c096488a0c0
-
Filesize
654KB
MD5b647ef980f4022ecb8a38d85ad38743e
SHA15605bb9af202062c6c0fb76715b93b9ab019c0d4
SHA256b345ef5589276c7f83ea6631e69732c129fadb0a46b83fe8af1e5fd892dda289
SHA512a94a599cec027e10f69f3e3529af31353aabe91cd3ef1f23bbdcd92a627abfceedee81d3ca905664a9758175719dc2b25a6bb8a96f9e85525f160e54c94bd83a
-
Filesize
654KB
MD5b647ef980f4022ecb8a38d85ad38743e
SHA15605bb9af202062c6c0fb76715b93b9ab019c0d4
SHA256b345ef5589276c7f83ea6631e69732c129fadb0a46b83fe8af1e5fd892dda289
SHA512a94a599cec027e10f69f3e3529af31353aabe91cd3ef1f23bbdcd92a627abfceedee81d3ca905664a9758175719dc2b25a6bb8a96f9e85525f160e54c94bd83a
-
Filesize
299KB
MD549ace2517c7ff40e9178056acc3968f7
SHA196bbefeadf40796fe4ba6883cad722fefa0181ec
SHA25670da8639848bd8a05c83ac230512235b6adf008fe7358b121256f8c35fb992d7
SHA512141fceb36b0e683bd573a281d02108ec031aa7692ace3b0e785563b7088553f3f65a3e196d7fecf6a425c7dc12c7e1d4b3d7863e08ab3d0adb8e71b38478a306
-
Filesize
299KB
MD549ace2517c7ff40e9178056acc3968f7
SHA196bbefeadf40796fe4ba6883cad722fefa0181ec
SHA25670da8639848bd8a05c83ac230512235b6adf008fe7358b121256f8c35fb992d7
SHA512141fceb36b0e683bd573a281d02108ec031aa7692ace3b0e785563b7088553f3f65a3e196d7fecf6a425c7dc12c7e1d4b3d7863e08ab3d0adb8e71b38478a306
-
Filesize
482KB
MD5b1111067adc33eb09e442c58fa6dcccf
SHA13a54bf1f041af3ac8ce5c9fe429e33660ba0d27b
SHA25678a04daa2cbce1b448f65920419d684b79eec1c223b236bea31816f4c6dcc76c
SHA51259c7287e92a3431e54fd2eee35cd093f8af2dfc62b4d0d66bdb184e5bb8532ac69a7e3980a265dd23fab6514af63543f5c29ce06ff426f0197e1f1b92c1fbd29
-
Filesize
482KB
MD5b1111067adc33eb09e442c58fa6dcccf
SHA13a54bf1f041af3ac8ce5c9fe429e33660ba0d27b
SHA25678a04daa2cbce1b448f65920419d684b79eec1c223b236bea31816f4c6dcc76c
SHA51259c7287e92a3431e54fd2eee35cd093f8af2dfc62b4d0d66bdb184e5bb8532ac69a7e3980a265dd23fab6514af63543f5c29ce06ff426f0197e1f1b92c1fbd29
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1