Analysis
-
max time kernel
146s -
max time network
104s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14-04-2023 04:26
Static task
static1
General
-
Target
c064130aa8f1fac83e2eccec22f9d5b383a4ec0a7ca8464864dfbdf5ee34aa67.exe
-
Size
1.2MB
-
MD5
86644f8bd03e3c88a075555bd0a4f7e2
-
SHA1
e793ad38bb5aeaff867cc44fb7ecfd00b10d39b6
-
SHA256
c064130aa8f1fac83e2eccec22f9d5b383a4ec0a7ca8464864dfbdf5ee34aa67
-
SHA512
91a1df6af342996d48fe3937771634b42a50ffca02f72194969198f69b4adbd886cc2d750ee72a8134c7d92b25813c8324d7ebae2877ad117721e3b0f3332ec6
-
SSDEEP
24576:Oy1hRJytmWfT6yaifJflFW+VTgL6owY9YmFnSZJFZA8SVwPzBfvVE:d1hRJImYTUcRmqTg1dFnSfTtDfvV
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
pr224677.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr224677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr224677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr224677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr224677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr224677.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
Processes:
un268728.exeun285675.exepr224677.exequ070048.exe1.exerk694932.exesi577765.exepid process 2572 un268728.exe 3088 un285675.exe 4876 pr224677.exe 2116 qu070048.exe 4832 1.exe 3468 rk694932.exe 428 si577765.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr224677.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr224677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr224677.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
c064130aa8f1fac83e2eccec22f9d5b383a4ec0a7ca8464864dfbdf5ee34aa67.exeun268728.exeun285675.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c064130aa8f1fac83e2eccec22f9d5b383a4ec0a7ca8464864dfbdf5ee34aa67.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c064130aa8f1fac83e2eccec22f9d5b383a4ec0a7ca8464864dfbdf5ee34aa67.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un268728.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un268728.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un285675.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un285675.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4356 428 WerFault.exe si577765.exe 4452 428 WerFault.exe si577765.exe 4608 428 WerFault.exe si577765.exe 2936 428 WerFault.exe si577765.exe 4300 428 WerFault.exe si577765.exe 2800 428 WerFault.exe si577765.exe 3924 428 WerFault.exe si577765.exe 1536 428 WerFault.exe si577765.exe 1240 428 WerFault.exe si577765.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr224677.exe1.exerk694932.exepid process 4876 pr224677.exe 4876 pr224677.exe 4832 1.exe 3468 rk694932.exe 4832 1.exe 3468 rk694932.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pr224677.exequ070048.exe1.exerk694932.exedescription pid process Token: SeDebugPrivilege 4876 pr224677.exe Token: SeDebugPrivilege 2116 qu070048.exe Token: SeDebugPrivilege 4832 1.exe Token: SeDebugPrivilege 3468 rk694932.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si577765.exepid process 428 si577765.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
c064130aa8f1fac83e2eccec22f9d5b383a4ec0a7ca8464864dfbdf5ee34aa67.exeun268728.exeun285675.exequ070048.exedescription pid process target process PID 2496 wrote to memory of 2572 2496 c064130aa8f1fac83e2eccec22f9d5b383a4ec0a7ca8464864dfbdf5ee34aa67.exe un268728.exe PID 2496 wrote to memory of 2572 2496 c064130aa8f1fac83e2eccec22f9d5b383a4ec0a7ca8464864dfbdf5ee34aa67.exe un268728.exe PID 2496 wrote to memory of 2572 2496 c064130aa8f1fac83e2eccec22f9d5b383a4ec0a7ca8464864dfbdf5ee34aa67.exe un268728.exe PID 2572 wrote to memory of 3088 2572 un268728.exe un285675.exe PID 2572 wrote to memory of 3088 2572 un268728.exe un285675.exe PID 2572 wrote to memory of 3088 2572 un268728.exe un285675.exe PID 3088 wrote to memory of 4876 3088 un285675.exe pr224677.exe PID 3088 wrote to memory of 4876 3088 un285675.exe pr224677.exe PID 3088 wrote to memory of 4876 3088 un285675.exe pr224677.exe PID 3088 wrote to memory of 2116 3088 un285675.exe qu070048.exe PID 3088 wrote to memory of 2116 3088 un285675.exe qu070048.exe PID 3088 wrote to memory of 2116 3088 un285675.exe qu070048.exe PID 2116 wrote to memory of 4832 2116 qu070048.exe 1.exe PID 2116 wrote to memory of 4832 2116 qu070048.exe 1.exe PID 2116 wrote to memory of 4832 2116 qu070048.exe 1.exe PID 2572 wrote to memory of 3468 2572 un268728.exe rk694932.exe PID 2572 wrote to memory of 3468 2572 un268728.exe rk694932.exe PID 2572 wrote to memory of 3468 2572 un268728.exe rk694932.exe PID 2496 wrote to memory of 428 2496 c064130aa8f1fac83e2eccec22f9d5b383a4ec0a7ca8464864dfbdf5ee34aa67.exe si577765.exe PID 2496 wrote to memory of 428 2496 c064130aa8f1fac83e2eccec22f9d5b383a4ec0a7ca8464864dfbdf5ee34aa67.exe si577765.exe PID 2496 wrote to memory of 428 2496 c064130aa8f1fac83e2eccec22f9d5b383a4ec0a7ca8464864dfbdf5ee34aa67.exe si577765.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c064130aa8f1fac83e2eccec22f9d5b383a4ec0a7ca8464864dfbdf5ee34aa67.exe"C:\Users\Admin\AppData\Local\Temp\c064130aa8f1fac83e2eccec22f9d5b383a4ec0a7ca8464864dfbdf5ee34aa67.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un268728.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un268728.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un285675.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un285675.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr224677.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr224677.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu070048.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu070048.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk694932.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk694932.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3468
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si577765.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si577765.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:428 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 428 -s 6323⤵
- Program crash
PID:4356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 428 -s 7083⤵
- Program crash
PID:4452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 428 -s 8483⤵
- Program crash
PID:4608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 428 -s 8563⤵
- Program crash
PID:2936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 428 -s 8923⤵
- Program crash
PID:4300
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 428 -s 6843⤵
- Program crash
PID:2800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 428 -s 11243⤵
- Program crash
PID:3924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 428 -s 11563⤵
- Program crash
PID:1536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 428 -s 12283⤵
- Program crash
PID:1240
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
863KB
MD59cefdab66587bcd6c561182375c2c61a
SHA1e7c69327ae9f1dc9d8331a8c9b0ccb116b5c1f5d
SHA256f3cab2447940c1d47c81857f92c77be63c9ebd40df9972c88f657f4e267a54dc
SHA512aba42707b24a040522a2267902151809b1586e3bdd9b1336620924e82447d06db48eb6373e9b64c0cc7724c14638819d7073dc4025bd8ab48cf9f38c7ad8a8f4
-
Filesize
863KB
MD59cefdab66587bcd6c561182375c2c61a
SHA1e7c69327ae9f1dc9d8331a8c9b0ccb116b5c1f5d
SHA256f3cab2447940c1d47c81857f92c77be63c9ebd40df9972c88f657f4e267a54dc
SHA512aba42707b24a040522a2267902151809b1586e3bdd9b1336620924e82447d06db48eb6373e9b64c0cc7724c14638819d7073dc4025bd8ab48cf9f38c7ad8a8f4
-
Filesize
169KB
MD5ec81d266b1abb15b70b77004d78f7e1e
SHA1dfeaa6d9e34350a535cf09486d77c05309fd6036
SHA25618a6bd9177414481f6d8c1648a41e35bc8c8eea4e62bbd7abc463944b47d2d84
SHA5121d6054bcde5d5a7104ed493230d7b003e00d8352256cca77b1aed5d62ba4eddd9d6d56ecebf48c2c1d4db93d7e7e59473266163d312b31dd1bda54a0894903f7
-
Filesize
169KB
MD5ec81d266b1abb15b70b77004d78f7e1e
SHA1dfeaa6d9e34350a535cf09486d77c05309fd6036
SHA25618a6bd9177414481f6d8c1648a41e35bc8c8eea4e62bbd7abc463944b47d2d84
SHA5121d6054bcde5d5a7104ed493230d7b003e00d8352256cca77b1aed5d62ba4eddd9d6d56ecebf48c2c1d4db93d7e7e59473266163d312b31dd1bda54a0894903f7
-
Filesize
709KB
MD5fe6f210c22f94abbb2f46875daf6fb68
SHA1dbd6feeb22074a36b0ba0ac41eb5c6ff8ef9b02c
SHA25619f50eda9885ad9275a16aea9c3284f3d151305c356fd4c28fa579fa68145dc2
SHA512d5e6a581809143ddcb4bbee47558700c56e7275e7e1283caf4660d28c31125c62e75ba4e53c4db440a1fbf5c6a4c2c77b99ecd648aa5682d3db722b113627224
-
Filesize
709KB
MD5fe6f210c22f94abbb2f46875daf6fb68
SHA1dbd6feeb22074a36b0ba0ac41eb5c6ff8ef9b02c
SHA25619f50eda9885ad9275a16aea9c3284f3d151305c356fd4c28fa579fa68145dc2
SHA512d5e6a581809143ddcb4bbee47558700c56e7275e7e1283caf4660d28c31125c62e75ba4e53c4db440a1fbf5c6a4c2c77b99ecd648aa5682d3db722b113627224
-
Filesize
405KB
MD549866406f5ebefcb6158548734b153e2
SHA10fad2d0e5b3926a97a448b043c478f64be462909
SHA256046b8741dd8bf436b843264356a63b1a242ac215f670dd4ff421a1aa969ac3ec
SHA5125b1de917c8ca427409516d37d6d00526745fdce3cf4365cee0660e8f5542e55edf041247eea087cf3e369f6b5f713cacb6ebb95a5d379542a6a26cfba4cb6e86
-
Filesize
405KB
MD549866406f5ebefcb6158548734b153e2
SHA10fad2d0e5b3926a97a448b043c478f64be462909
SHA256046b8741dd8bf436b843264356a63b1a242ac215f670dd4ff421a1aa969ac3ec
SHA5125b1de917c8ca427409516d37d6d00526745fdce3cf4365cee0660e8f5542e55edf041247eea087cf3e369f6b5f713cacb6ebb95a5d379542a6a26cfba4cb6e86
-
Filesize
588KB
MD59ee41f97e84ec698aa6fd545e1e69d2c
SHA1bc5c2be2f143b0e0adc25153264855a3b2675704
SHA2569ac4f94e53b2af60f263257cfbb4a988685da2b588f0a2026473af371ffe8ad4
SHA512309bf33751eb9a95bbf8242034d8413397f645664ad6b5f40b69a827b73515955b9dffea68bb5b365992977e5e08cb870cd0a7500e79b77ccd6ba7f18353c9a4
-
Filesize
588KB
MD59ee41f97e84ec698aa6fd545e1e69d2c
SHA1bc5c2be2f143b0e0adc25153264855a3b2675704
SHA2569ac4f94e53b2af60f263257cfbb4a988685da2b588f0a2026473af371ffe8ad4
SHA512309bf33751eb9a95bbf8242034d8413397f645664ad6b5f40b69a827b73515955b9dffea68bb5b365992977e5e08cb870cd0a7500e79b77ccd6ba7f18353c9a4
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1