Analysis
-
max time kernel
142s -
max time network
97s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14-04-2023 03:14
Static task
static1
General
-
Target
456452493c95e782fd38f8810f1642c9fec152bac23983a76bca3374d7092b2e.exe
-
Size
1.0MB
-
MD5
78da20c1cea5a67e30ba8a61a2c3da04
-
SHA1
b0de94d667d7de0c3760aa933bbea4cc32a268b2
-
SHA256
456452493c95e782fd38f8810f1642c9fec152bac23983a76bca3374d7092b2e
-
SHA512
ca82cbb627ecf135cff7d881dd19d0860afefefffdc42d109011f68041dc686935b2a3fc0defc36809b78ea71b0939a45497664ad4fbbc7fd375377a128598b0
-
SSDEEP
24576:lypJpa5wN8l3gaMSAej1WVNRh+fn+CTdACQF:ApTa68l3gaMvnjh3n
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it807766.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it807766.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it807766.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it807766.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it807766.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it807766.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
Processes:
ziOU0969.exeziCZ5194.exeit807766.exejr029478.exe1.exekp071077.exelr617446.exepid process 4268 ziOU0969.exe 4900 ziCZ5194.exe 3500 it807766.exe 4056 jr029478.exe 1656 1.exe 1872 kp071077.exe 2584 lr617446.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it807766.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it807766.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
456452493c95e782fd38f8810f1642c9fec152bac23983a76bca3374d7092b2e.exeziOU0969.exeziCZ5194.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 456452493c95e782fd38f8810f1642c9fec152bac23983a76bca3374d7092b2e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziOU0969.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziOU0969.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziCZ5194.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziCZ5194.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 456452493c95e782fd38f8810f1642c9fec152bac23983a76bca3374d7092b2e.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2876 2584 WerFault.exe lr617446.exe 1420 2584 WerFault.exe lr617446.exe 3880 2584 WerFault.exe lr617446.exe 4132 2584 WerFault.exe lr617446.exe 3692 2584 WerFault.exe lr617446.exe 4024 2584 WerFault.exe lr617446.exe 3488 2584 WerFault.exe lr617446.exe 376 2584 WerFault.exe lr617446.exe 2264 2584 WerFault.exe lr617446.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it807766.exekp071077.exe1.exepid process 3500 it807766.exe 3500 it807766.exe 1872 kp071077.exe 1656 1.exe 1656 1.exe 1872 kp071077.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it807766.exejr029478.exekp071077.exe1.exedescription pid process Token: SeDebugPrivilege 3500 it807766.exe Token: SeDebugPrivilege 4056 jr029478.exe Token: SeDebugPrivilege 1872 kp071077.exe Token: SeDebugPrivilege 1656 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr617446.exepid process 2584 lr617446.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
456452493c95e782fd38f8810f1642c9fec152bac23983a76bca3374d7092b2e.exeziOU0969.exeziCZ5194.exejr029478.exedescription pid process target process PID 4076 wrote to memory of 4268 4076 456452493c95e782fd38f8810f1642c9fec152bac23983a76bca3374d7092b2e.exe ziOU0969.exe PID 4076 wrote to memory of 4268 4076 456452493c95e782fd38f8810f1642c9fec152bac23983a76bca3374d7092b2e.exe ziOU0969.exe PID 4076 wrote to memory of 4268 4076 456452493c95e782fd38f8810f1642c9fec152bac23983a76bca3374d7092b2e.exe ziOU0969.exe PID 4268 wrote to memory of 4900 4268 ziOU0969.exe ziCZ5194.exe PID 4268 wrote to memory of 4900 4268 ziOU0969.exe ziCZ5194.exe PID 4268 wrote to memory of 4900 4268 ziOU0969.exe ziCZ5194.exe PID 4900 wrote to memory of 3500 4900 ziCZ5194.exe it807766.exe PID 4900 wrote to memory of 3500 4900 ziCZ5194.exe it807766.exe PID 4900 wrote to memory of 4056 4900 ziCZ5194.exe jr029478.exe PID 4900 wrote to memory of 4056 4900 ziCZ5194.exe jr029478.exe PID 4900 wrote to memory of 4056 4900 ziCZ5194.exe jr029478.exe PID 4056 wrote to memory of 1656 4056 jr029478.exe 1.exe PID 4056 wrote to memory of 1656 4056 jr029478.exe 1.exe PID 4056 wrote to memory of 1656 4056 jr029478.exe 1.exe PID 4268 wrote to memory of 1872 4268 ziOU0969.exe kp071077.exe PID 4268 wrote to memory of 1872 4268 ziOU0969.exe kp071077.exe PID 4268 wrote to memory of 1872 4268 ziOU0969.exe kp071077.exe PID 4076 wrote to memory of 2584 4076 456452493c95e782fd38f8810f1642c9fec152bac23983a76bca3374d7092b2e.exe lr617446.exe PID 4076 wrote to memory of 2584 4076 456452493c95e782fd38f8810f1642c9fec152bac23983a76bca3374d7092b2e.exe lr617446.exe PID 4076 wrote to memory of 2584 4076 456452493c95e782fd38f8810f1642c9fec152bac23983a76bca3374d7092b2e.exe lr617446.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\456452493c95e782fd38f8810f1642c9fec152bac23983a76bca3374d7092b2e.exe"C:\Users\Admin\AppData\Local\Temp\456452493c95e782fd38f8810f1642c9fec152bac23983a76bca3374d7092b2e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziOU0969.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziOU0969.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziCZ5194.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziCZ5194.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it807766.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it807766.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3500
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr029478.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr029478.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp071077.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp071077.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1872
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr617446.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr617446.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:2584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 6323⤵
- Program crash
PID:2876
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 7083⤵
- Program crash
PID:1420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 8443⤵
- Program crash
PID:3880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 8563⤵
- Program crash
PID:4132
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 8843⤵
- Program crash
PID:3692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 8603⤵
- Program crash
PID:4024
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 11243⤵
- Program crash
PID:3488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 11523⤵
- Program crash
PID:376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 11563⤵
- Program crash
PID:2264
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
724KB
MD5e9ee08cf34b1c2d251215ce7335363ca
SHA1c6d57a4198f5292e01c794be2db1043ccac0ee9f
SHA256586afcc6d6b6a0aa31fea86135c6a9a2e7b23113f123562bc0804d98ad0ac5ab
SHA5122f9ea5d5efb17c2fcba6392a5f5703aaf09f750cccedcb9ebbab2ac74521b229c59570af4b0d8487c4c7feb462fe3b2ba4cb4cb0852b7e710576c9cb734088eb
-
Filesize
724KB
MD5e9ee08cf34b1c2d251215ce7335363ca
SHA1c6d57a4198f5292e01c794be2db1043ccac0ee9f
SHA256586afcc6d6b6a0aa31fea86135c6a9a2e7b23113f123562bc0804d98ad0ac5ab
SHA5122f9ea5d5efb17c2fcba6392a5f5703aaf09f750cccedcb9ebbab2ac74521b229c59570af4b0d8487c4c7feb462fe3b2ba4cb4cb0852b7e710576c9cb734088eb
-
Filesize
169KB
MD55802a62f75a139f1fb1cde812d7c7880
SHA195d58b5a86b96ae5317d814057ec178733b6bd75
SHA2565efcad2550086898c44a91c6728baaef756b6934230d53f4c25f7a784c317f41
SHA512ff586e638176661ef6a327ebeb0220fdea3286bfa09ac81f9e361819c2b650749f226cd3ce55173a66d6486b9e34ff5901202f72b52842b38b695d1641d1fdb4
-
Filesize
169KB
MD55802a62f75a139f1fb1cde812d7c7880
SHA195d58b5a86b96ae5317d814057ec178733b6bd75
SHA2565efcad2550086898c44a91c6728baaef756b6934230d53f4c25f7a784c317f41
SHA512ff586e638176661ef6a327ebeb0220fdea3286bfa09ac81f9e361819c2b650749f226cd3ce55173a66d6486b9e34ff5901202f72b52842b38b695d1641d1fdb4
-
Filesize
569KB
MD53bacbedacf135a21d6f7f2d0166475da
SHA13c42c3d3b6831be6b8c259bfd98a27773aa1c0c7
SHA256756b7b10b57c1d7df650643387dfc1e4285d23b2b1ea92153f4259591bf744c3
SHA5125489456f95d4a66c8dab58067c2581e342c0ded2968d74113e83a72349598e1392a7c40359c188c9d1a3d45543969b39262e0aee29fa9f280cc6bed942193693
-
Filesize
569KB
MD53bacbedacf135a21d6f7f2d0166475da
SHA13c42c3d3b6831be6b8c259bfd98a27773aa1c0c7
SHA256756b7b10b57c1d7df650643387dfc1e4285d23b2b1ea92153f4259591bf744c3
SHA5125489456f95d4a66c8dab58067c2581e342c0ded2968d74113e83a72349598e1392a7c40359c188c9d1a3d45543969b39262e0aee29fa9f280cc6bed942193693
-
Filesize
11KB
MD5822a750f2d34ccbbba171da63d8ac279
SHA178e56aa6a2ccbdb85e64aafa903b3a8c89bb6db0
SHA256c44010aa0798d9becdd4aeb0228ddb7f3cc3f44ec5491ea3dcf0252d71bc008c
SHA51299e1484cdad40c628362db938f0c5c6e0e1b29f853a449f90c36e84d581875851b5ac9dc1466453f11fdbd30afa3accd38375ce61c11ea6d17939fd73b32249c
-
Filesize
11KB
MD5822a750f2d34ccbbba171da63d8ac279
SHA178e56aa6a2ccbdb85e64aafa903b3a8c89bb6db0
SHA256c44010aa0798d9becdd4aeb0228ddb7f3cc3f44ec5491ea3dcf0252d71bc008c
SHA51299e1484cdad40c628362db938f0c5c6e0e1b29f853a449f90c36e84d581875851b5ac9dc1466453f11fdbd30afa3accd38375ce61c11ea6d17939fd73b32249c
-
Filesize
588KB
MD5bf988b66e767872a5e2629333ee3a4da
SHA1d0ffa63b3838a806b7683b3bfb22d7a0a55b4efa
SHA2560f7f331546cf568d39b8198035f8563cd3b04e7101567d9a790af967eed6bf45
SHA51266e41b84137a2118f7800d413fdaa7224fec9ebcb6f2c80344f8a884c7bbb624331da8381edd0cda59bb4f14c9be109e4e2a1cbfdb9cd012f7730403194b693c
-
Filesize
588KB
MD5bf988b66e767872a5e2629333ee3a4da
SHA1d0ffa63b3838a806b7683b3bfb22d7a0a55b4efa
SHA2560f7f331546cf568d39b8198035f8563cd3b04e7101567d9a790af967eed6bf45
SHA51266e41b84137a2118f7800d413fdaa7224fec9ebcb6f2c80344f8a884c7bbb624331da8381edd0cda59bb4f14c9be109e4e2a1cbfdb9cd012f7730403194b693c
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1