Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14-04-2023 03:37
Static task
static1
General
-
Target
07eaf522ff0abcf8b16637c178ce6921e69dd9888cfc124fd497c30e9073fb56.exe
-
Size
1.2MB
-
MD5
7892522a6d15e4ae8c773c89b7859b8a
-
SHA1
ab6d4b9f466a0d420d037e35a9b5950b1a696ba7
-
SHA256
07eaf522ff0abcf8b16637c178ce6921e69dd9888cfc124fd497c30e9073fb56
-
SHA512
1ed5589a3d383e19aff9c7894e738722586826e77af2ebd9d1adce211cab04d121b3146c7911be97c047a494c47638ececa91efd939521ea0f233a5759de0a83
-
SSDEEP
24576:QyxDz4aI408LhrzF+qv/YCK8CCSZJfRVcvhTx60ctJ3pU:XxDkaI+JF+a9CCSfpVcvhTcntJ3
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
pr835339.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr835339.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr835339.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr835339.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr835339.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr835339.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
Processes:
un731360.exeun288308.exepr835339.exequ167594.exe1.exerk255222.exesi380156.exepid process 3708 un731360.exe 4128 un288308.exe 4508 pr835339.exe 4696 qu167594.exe 4016 1.exe 2812 rk255222.exe 2516 si380156.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr835339.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr835339.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr835339.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
un731360.exeun288308.exe07eaf522ff0abcf8b16637c178ce6921e69dd9888cfc124fd497c30e9073fb56.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un731360.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un288308.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un288308.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 07eaf522ff0abcf8b16637c178ce6921e69dd9888cfc124fd497c30e9073fb56.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 07eaf522ff0abcf8b16637c178ce6921e69dd9888cfc124fd497c30e9073fb56.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un731360.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4508 2516 WerFault.exe si380156.exe 1324 2516 WerFault.exe si380156.exe 1460 2516 WerFault.exe si380156.exe 1276 2516 WerFault.exe si380156.exe 2656 2516 WerFault.exe si380156.exe 4440 2516 WerFault.exe si380156.exe 3576 2516 WerFault.exe si380156.exe 3640 2516 WerFault.exe si380156.exe 3680 2516 WerFault.exe si380156.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr835339.exerk255222.exe1.exepid process 4508 pr835339.exe 4508 pr835339.exe 2812 rk255222.exe 4016 1.exe 2812 rk255222.exe 4016 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pr835339.exequ167594.exe1.exerk255222.exedescription pid process Token: SeDebugPrivilege 4508 pr835339.exe Token: SeDebugPrivilege 4696 qu167594.exe Token: SeDebugPrivilege 4016 1.exe Token: SeDebugPrivilege 2812 rk255222.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si380156.exepid process 2516 si380156.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
07eaf522ff0abcf8b16637c178ce6921e69dd9888cfc124fd497c30e9073fb56.exeun731360.exeun288308.exequ167594.exedescription pid process target process PID 3724 wrote to memory of 3708 3724 07eaf522ff0abcf8b16637c178ce6921e69dd9888cfc124fd497c30e9073fb56.exe un731360.exe PID 3724 wrote to memory of 3708 3724 07eaf522ff0abcf8b16637c178ce6921e69dd9888cfc124fd497c30e9073fb56.exe un731360.exe PID 3724 wrote to memory of 3708 3724 07eaf522ff0abcf8b16637c178ce6921e69dd9888cfc124fd497c30e9073fb56.exe un731360.exe PID 3708 wrote to memory of 4128 3708 un731360.exe un288308.exe PID 3708 wrote to memory of 4128 3708 un731360.exe un288308.exe PID 3708 wrote to memory of 4128 3708 un731360.exe un288308.exe PID 4128 wrote to memory of 4508 4128 un288308.exe pr835339.exe PID 4128 wrote to memory of 4508 4128 un288308.exe pr835339.exe PID 4128 wrote to memory of 4508 4128 un288308.exe pr835339.exe PID 4128 wrote to memory of 4696 4128 un288308.exe qu167594.exe PID 4128 wrote to memory of 4696 4128 un288308.exe qu167594.exe PID 4128 wrote to memory of 4696 4128 un288308.exe qu167594.exe PID 4696 wrote to memory of 4016 4696 qu167594.exe 1.exe PID 4696 wrote to memory of 4016 4696 qu167594.exe 1.exe PID 4696 wrote to memory of 4016 4696 qu167594.exe 1.exe PID 3708 wrote to memory of 2812 3708 un731360.exe rk255222.exe PID 3708 wrote to memory of 2812 3708 un731360.exe rk255222.exe PID 3708 wrote to memory of 2812 3708 un731360.exe rk255222.exe PID 3724 wrote to memory of 2516 3724 07eaf522ff0abcf8b16637c178ce6921e69dd9888cfc124fd497c30e9073fb56.exe si380156.exe PID 3724 wrote to memory of 2516 3724 07eaf522ff0abcf8b16637c178ce6921e69dd9888cfc124fd497c30e9073fb56.exe si380156.exe PID 3724 wrote to memory of 2516 3724 07eaf522ff0abcf8b16637c178ce6921e69dd9888cfc124fd497c30e9073fb56.exe si380156.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\07eaf522ff0abcf8b16637c178ce6921e69dd9888cfc124fd497c30e9073fb56.exe"C:\Users\Admin\AppData\Local\Temp\07eaf522ff0abcf8b16637c178ce6921e69dd9888cfc124fd497c30e9073fb56.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un731360.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un731360.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un288308.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un288308.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr835339.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr835339.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4508
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu167594.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu167594.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4016
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk255222.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk255222.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si380156.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si380156.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:2516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 6363⤵
- Program crash
PID:4508
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 7123⤵
- Program crash
PID:1324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 8523⤵
- Program crash
PID:1460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 8283⤵
- Program crash
PID:1276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 9123⤵
- Program crash
PID:2656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 8843⤵
- Program crash
PID:4440
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 11283⤵
- Program crash
PID:3576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 11683⤵
- Program crash
PID:3640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 12163⤵
- Program crash
PID:3680
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
862KB
MD5b8172d625750ac9e86fe82660cd7b98b
SHA1918971b25da1e7b702b82c6415cd145744790710
SHA25668f3beee8daa752dc3a659ebedb6e43f8e90627e3fd7c507b583e0b494d6999c
SHA51225ba0c6be60426017a42ef01f75a172d8188de67f90b7dd8c2c3bc5a150a34dee7de31abe67700cf1ceb2f74f419801931198b07d727ea478113ea6c514cbd45
-
Filesize
862KB
MD5b8172d625750ac9e86fe82660cd7b98b
SHA1918971b25da1e7b702b82c6415cd145744790710
SHA25668f3beee8daa752dc3a659ebedb6e43f8e90627e3fd7c507b583e0b494d6999c
SHA51225ba0c6be60426017a42ef01f75a172d8188de67f90b7dd8c2c3bc5a150a34dee7de31abe67700cf1ceb2f74f419801931198b07d727ea478113ea6c514cbd45
-
Filesize
169KB
MD50db7aa3c3e65a50a2270d37d0ea3efb2
SHA19bf5a890ada4ab13d3997284bd5e164cb5af7d64
SHA25670bdc2eb90848a14fa219a584ca8c55ffdec75b3b076704cca20a7b6272ed718
SHA512bd7758473d0aee650cd0f18ea9e49e536c2eef5bbc0cbc582521dc81feb669324462e39f1a2744cf2f90b7fe2c9441b2ec2ab9483a2c8ce85a6927e2fe3bcde1
-
Filesize
169KB
MD50db7aa3c3e65a50a2270d37d0ea3efb2
SHA19bf5a890ada4ab13d3997284bd5e164cb5af7d64
SHA25670bdc2eb90848a14fa219a584ca8c55ffdec75b3b076704cca20a7b6272ed718
SHA512bd7758473d0aee650cd0f18ea9e49e536c2eef5bbc0cbc582521dc81feb669324462e39f1a2744cf2f90b7fe2c9441b2ec2ab9483a2c8ce85a6927e2fe3bcde1
-
Filesize
708KB
MD54f68218b5334e6275e4afedfdee65c96
SHA1dc55ccf6077ce3e0825cd9fd50d0c2d05b6b30c8
SHA25695c6f29c2fb24a9e742152746af76fb822a02d7daedce351363d4d84f262f295
SHA512e666cc5885c948e03cd0ca0220425e6a3f5932f5a588d49b50575005bfd582ee471daa7b349fef5531ddb39ce0a0d3a6cf491e995770103827b59c25c5e1a497
-
Filesize
708KB
MD54f68218b5334e6275e4afedfdee65c96
SHA1dc55ccf6077ce3e0825cd9fd50d0c2d05b6b30c8
SHA25695c6f29c2fb24a9e742152746af76fb822a02d7daedce351363d4d84f262f295
SHA512e666cc5885c948e03cd0ca0220425e6a3f5932f5a588d49b50575005bfd582ee471daa7b349fef5531ddb39ce0a0d3a6cf491e995770103827b59c25c5e1a497
-
Filesize
405KB
MD53fb23c6e954f441280a664a588f9c803
SHA1e809ca627bfe774fdce1c4a30ebdf8a74dc29422
SHA256b2ca0cc2a7ac05ca67aad2b2ef171448683c0741c103912815da7ca5c5409db9
SHA51235d80ec4a40956184a5b64f09d371edbd42d63338b3555e21fcecce4e474650f7d3883a6cbb6a84b7a3e50e06baacd4c19561b8462bdf1a89d33e5aa527cbf58
-
Filesize
405KB
MD53fb23c6e954f441280a664a588f9c803
SHA1e809ca627bfe774fdce1c4a30ebdf8a74dc29422
SHA256b2ca0cc2a7ac05ca67aad2b2ef171448683c0741c103912815da7ca5c5409db9
SHA51235d80ec4a40956184a5b64f09d371edbd42d63338b3555e21fcecce4e474650f7d3883a6cbb6a84b7a3e50e06baacd4c19561b8462bdf1a89d33e5aa527cbf58
-
Filesize
588KB
MD5947aeeea1cf72401724a8de47ecd80ca
SHA179a17937c851cd45bbf8c1fc1b093f7f5ff3284d
SHA256e44cb4884d8af2ab13129c2d8ca71c3e862d2b9b9b751269da2d2257b931614b
SHA512f2b07c6c34bf81434fa9db6983d55af1a9ea030c3b4dea36938184eb729ccd92acff13238cd75a9becf64dfba20719a1e0ac9b467e3e5f28b3ede57747916291
-
Filesize
588KB
MD5947aeeea1cf72401724a8de47ecd80ca
SHA179a17937c851cd45bbf8c1fc1b093f7f5ff3284d
SHA256e44cb4884d8af2ab13129c2d8ca71c3e862d2b9b9b751269da2d2257b931614b
SHA512f2b07c6c34bf81434fa9db6983d55af1a9ea030c3b4dea36938184eb729ccd92acff13238cd75a9becf64dfba20719a1e0ac9b467e3e5f28b3ede57747916291
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1