Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14-04-2023 03:17
Static task
static1
General
-
Target
fb1d2f35f2c1914bf147bebf06b71161b28a71d928e80aab6dc11f5ba2813b3a.exe
-
Size
1.2MB
-
MD5
192b9b2d9c93005ad91c55cd6e201424
-
SHA1
bfb09bd9b9d6b4f847cbc7cb7e4842102113a076
-
SHA256
fb1d2f35f2c1914bf147bebf06b71161b28a71d928e80aab6dc11f5ba2813b3a
-
SHA512
e12fedc503815e787e4fb5ed175fd3010dd54afda4065f77d36485d521bdba1a41ca6cbb5ebe40a9b33681f8b5068177dd9cefbc3f9a31884f9d7b30f689d728
-
SSDEEP
24576:gyiG8TBpcbjKEVZcrPHSPsY8Fg6oSZJYR3cYf2w0nM/xn:nONpp7Hza6oSfo3l0nM/x
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
pr037002.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr037002.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr037002.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr037002.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr037002.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr037002.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
Processes:
un788747.exeun353320.exepr037002.exequ776085.exe1.exerk332086.exesi261725.exepid process 2144 un788747.exe 2512 un353320.exe 4780 pr037002.exe 3820 qu776085.exe 3640 1.exe 4620 rk332086.exe 3892 si261725.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr037002.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr037002.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr037002.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
un788747.exeun353320.exefb1d2f35f2c1914bf147bebf06b71161b28a71d928e80aab6dc11f5ba2813b3a.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un788747.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un788747.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un353320.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un353320.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fb1d2f35f2c1914bf147bebf06b71161b28a71d928e80aab6dc11f5ba2813b3a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fb1d2f35f2c1914bf147bebf06b71161b28a71d928e80aab6dc11f5ba2813b3a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3048 3892 WerFault.exe si261725.exe 4928 3892 WerFault.exe si261725.exe 4144 3892 WerFault.exe si261725.exe 4472 3892 WerFault.exe si261725.exe 4512 3892 WerFault.exe si261725.exe 4452 3892 WerFault.exe si261725.exe 4492 3892 WerFault.exe si261725.exe 4432 3892 WerFault.exe si261725.exe 3116 3892 WerFault.exe si261725.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr037002.exerk332086.exe1.exepid process 4780 pr037002.exe 4780 pr037002.exe 4620 rk332086.exe 3640 1.exe 3640 1.exe 4620 rk332086.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pr037002.exequ776085.exerk332086.exe1.exedescription pid process Token: SeDebugPrivilege 4780 pr037002.exe Token: SeDebugPrivilege 3820 qu776085.exe Token: SeDebugPrivilege 4620 rk332086.exe Token: SeDebugPrivilege 3640 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si261725.exepid process 3892 si261725.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
fb1d2f35f2c1914bf147bebf06b71161b28a71d928e80aab6dc11f5ba2813b3a.exeun788747.exeun353320.exequ776085.exedescription pid process target process PID 1804 wrote to memory of 2144 1804 fb1d2f35f2c1914bf147bebf06b71161b28a71d928e80aab6dc11f5ba2813b3a.exe un788747.exe PID 1804 wrote to memory of 2144 1804 fb1d2f35f2c1914bf147bebf06b71161b28a71d928e80aab6dc11f5ba2813b3a.exe un788747.exe PID 1804 wrote to memory of 2144 1804 fb1d2f35f2c1914bf147bebf06b71161b28a71d928e80aab6dc11f5ba2813b3a.exe un788747.exe PID 2144 wrote to memory of 2512 2144 un788747.exe un353320.exe PID 2144 wrote to memory of 2512 2144 un788747.exe un353320.exe PID 2144 wrote to memory of 2512 2144 un788747.exe un353320.exe PID 2512 wrote to memory of 4780 2512 un353320.exe pr037002.exe PID 2512 wrote to memory of 4780 2512 un353320.exe pr037002.exe PID 2512 wrote to memory of 4780 2512 un353320.exe pr037002.exe PID 2512 wrote to memory of 3820 2512 un353320.exe qu776085.exe PID 2512 wrote to memory of 3820 2512 un353320.exe qu776085.exe PID 2512 wrote to memory of 3820 2512 un353320.exe qu776085.exe PID 3820 wrote to memory of 3640 3820 qu776085.exe 1.exe PID 3820 wrote to memory of 3640 3820 qu776085.exe 1.exe PID 3820 wrote to memory of 3640 3820 qu776085.exe 1.exe PID 2144 wrote to memory of 4620 2144 un788747.exe rk332086.exe PID 2144 wrote to memory of 4620 2144 un788747.exe rk332086.exe PID 2144 wrote to memory of 4620 2144 un788747.exe rk332086.exe PID 1804 wrote to memory of 3892 1804 fb1d2f35f2c1914bf147bebf06b71161b28a71d928e80aab6dc11f5ba2813b3a.exe si261725.exe PID 1804 wrote to memory of 3892 1804 fb1d2f35f2c1914bf147bebf06b71161b28a71d928e80aab6dc11f5ba2813b3a.exe si261725.exe PID 1804 wrote to memory of 3892 1804 fb1d2f35f2c1914bf147bebf06b71161b28a71d928e80aab6dc11f5ba2813b3a.exe si261725.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb1d2f35f2c1914bf147bebf06b71161b28a71d928e80aab6dc11f5ba2813b3a.exe"C:\Users\Admin\AppData\Local\Temp\fb1d2f35f2c1914bf147bebf06b71161b28a71d928e80aab6dc11f5ba2813b3a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un788747.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un788747.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un353320.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un353320.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr037002.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr037002.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4780
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu776085.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu776085.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3640
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk332086.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk332086.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si261725.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si261725.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:3892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3892 -s 6363⤵
- Program crash
PID:3048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3892 -s 7123⤵
- Program crash
PID:4928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3892 -s 8523⤵
- Program crash
PID:4144
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3892 -s 8563⤵
- Program crash
PID:4472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3892 -s 8883⤵
- Program crash
PID:4512
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3892 -s 8923⤵
- Program crash
PID:4452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3892 -s 11283⤵
- Program crash
PID:4492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3892 -s 11603⤵
- Program crash
PID:4432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3892 -s 10883⤵
- Program crash
PID:3116
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
862KB
MD5fa7db956c5e72138958619da6d782873
SHA15edfd8d7ed8cb01827dc8bfd72d64f732f432889
SHA256cb5e8f4c94572f582ea8f8d92d015fd941f3d38e3f367a8f4071bb656ee7575b
SHA51260f7b786fb1a537eea651b5da0d87c5ae3094068b2670275fc083fa75aae354813ebecc332d2f70d3f3bf68024d4208f890bc51a297aa9d150c2324a5965241d
-
Filesize
862KB
MD5fa7db956c5e72138958619da6d782873
SHA15edfd8d7ed8cb01827dc8bfd72d64f732f432889
SHA256cb5e8f4c94572f582ea8f8d92d015fd941f3d38e3f367a8f4071bb656ee7575b
SHA51260f7b786fb1a537eea651b5da0d87c5ae3094068b2670275fc083fa75aae354813ebecc332d2f70d3f3bf68024d4208f890bc51a297aa9d150c2324a5965241d
-
Filesize
169KB
MD57c169d786b3b2fee17ae7253d17e0d2d
SHA14e435e36a43af553eba36852deffe23a0c561f3f
SHA2564d87fb2c6f67ceb88e569d7e1f8de70ed4904f213bcb4fb4c4afba8158f21630
SHA51249a197a2c5fd464dce49a5e72ba868c8fea3dd2e2bd8b9f4b62f685dd879f3947c1d062bcb5916761bb9f5aab878ea1ec73b5291e291c93ba14408542f1e3516
-
Filesize
169KB
MD57c169d786b3b2fee17ae7253d17e0d2d
SHA14e435e36a43af553eba36852deffe23a0c561f3f
SHA2564d87fb2c6f67ceb88e569d7e1f8de70ed4904f213bcb4fb4c4afba8158f21630
SHA51249a197a2c5fd464dce49a5e72ba868c8fea3dd2e2bd8b9f4b62f685dd879f3947c1d062bcb5916761bb9f5aab878ea1ec73b5291e291c93ba14408542f1e3516
-
Filesize
708KB
MD5e465939aa9a0f8cdc947c1941270a8f4
SHA16c8cb621925fd524fafdd6b232f4326c52eb01f4
SHA256ad1821c99226fd6abb7412020c683b699f49599554ca12cb56e0e5624248ace8
SHA51264c9ec88b842137d0dd2d0e7ec476adaa46ba1ca42f5b73d27804fa2cd9430748e893f0d5d3e67d47c13fac557d29dee01a9079289fbbe5dc96f5fac5f0b3bef
-
Filesize
708KB
MD5e465939aa9a0f8cdc947c1941270a8f4
SHA16c8cb621925fd524fafdd6b232f4326c52eb01f4
SHA256ad1821c99226fd6abb7412020c683b699f49599554ca12cb56e0e5624248ace8
SHA51264c9ec88b842137d0dd2d0e7ec476adaa46ba1ca42f5b73d27804fa2cd9430748e893f0d5d3e67d47c13fac557d29dee01a9079289fbbe5dc96f5fac5f0b3bef
-
Filesize
405KB
MD5923715c404c43f2b8e0aa342a4472a17
SHA10bde0bcf6b5808b6a788674ad489d93374c84789
SHA256e7798d08fd3448f85b867b0d1f9e6756c394aba6b8a366cbdf49fcf354eadc8b
SHA51257094bd0fefbfd22a5b3c3a1978ed2ebaa20f7029a84af30d44d09492abe16ca3b878a125f8d05f12a45d9e2b9466206ff061aacf1c0ffd9467ea2c95cecf62d
-
Filesize
405KB
MD5923715c404c43f2b8e0aa342a4472a17
SHA10bde0bcf6b5808b6a788674ad489d93374c84789
SHA256e7798d08fd3448f85b867b0d1f9e6756c394aba6b8a366cbdf49fcf354eadc8b
SHA51257094bd0fefbfd22a5b3c3a1978ed2ebaa20f7029a84af30d44d09492abe16ca3b878a125f8d05f12a45d9e2b9466206ff061aacf1c0ffd9467ea2c95cecf62d
-
Filesize
588KB
MD5ea78c85ff964197a6acc5fbb19e06d8f
SHA14a10364181a8ba3341474c6648f62c98d8885962
SHA25634de080a9cd8b86d408bc26be8ba1fe3e5d030f804033670a4e5ed7ab8396b73
SHA512cc03c15faf96f46ad8c62e6180884a1e9311a8d8b93b664c43a75ecacdb581e0c7cb2e531cec44e5dae5332f203a4294e97987c85ee6ccded9836dad2ee0ac0b
-
Filesize
588KB
MD5ea78c85ff964197a6acc5fbb19e06d8f
SHA14a10364181a8ba3341474c6648f62c98d8885962
SHA25634de080a9cd8b86d408bc26be8ba1fe3e5d030f804033670a4e5ed7ab8396b73
SHA512cc03c15faf96f46ad8c62e6180884a1e9311a8d8b93b664c43a75ecacdb581e0c7cb2e531cec44e5dae5332f203a4294e97987c85ee6ccded9836dad2ee0ac0b
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1