Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14-04-2023 04:38
Static task
static1
General
-
Target
72b3b941bafc0a9314ad8cc52e59332efbf8d41a8600db5b0bf4035de5d821b1.exe
-
Size
1.0MB
-
MD5
d4ad0824b17bed0d742afb95b029fcb4
-
SHA1
4395c465df790daa97dfb5df3b1733196337aeec
-
SHA256
72b3b941bafc0a9314ad8cc52e59332efbf8d41a8600db5b0bf4035de5d821b1
-
SHA512
eaf3428bbb2d9ecdcd96bf47e591ef38e5e6b52a07ef335b18c76c844aab26678724293dd8fdf3f643dbafbf8ab45653ca59f394032276a4691f47cf95712c43
-
SSDEEP
24576:Qyis/wSjrgTmB3Ty2q0AUuJPOaGp0sKNcQyfiC9s9Cil07:XzofyB33UROL/KWdhbE
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it927596.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it927596.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it927596.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it927596.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it927596.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it927596.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
Processes:
ziqk2577.exezibh0343.exeit927596.exejr070105.exe1.exekp176185.exelr154063.exepid process 3384 ziqk2577.exe 4168 zibh0343.exe 4160 it927596.exe 2160 jr070105.exe 544 1.exe 1716 kp176185.exe 4152 lr154063.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it927596.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it927596.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
72b3b941bafc0a9314ad8cc52e59332efbf8d41a8600db5b0bf4035de5d821b1.exeziqk2577.exezibh0343.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 72b3b941bafc0a9314ad8cc52e59332efbf8d41a8600db5b0bf4035de5d821b1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 72b3b941bafc0a9314ad8cc52e59332efbf8d41a8600db5b0bf4035de5d821b1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziqk2577.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziqk2577.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zibh0343.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zibh0343.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4476 4152 WerFault.exe lr154063.exe 4732 4152 WerFault.exe lr154063.exe 3088 4152 WerFault.exe lr154063.exe 1956 4152 WerFault.exe lr154063.exe 2804 4152 WerFault.exe lr154063.exe 2988 4152 WerFault.exe lr154063.exe 1548 4152 WerFault.exe lr154063.exe 1400 4152 WerFault.exe lr154063.exe 4756 4152 WerFault.exe lr154063.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it927596.exe1.exekp176185.exepid process 4160 it927596.exe 4160 it927596.exe 544 1.exe 1716 kp176185.exe 544 1.exe 1716 kp176185.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it927596.exejr070105.exekp176185.exe1.exedescription pid process Token: SeDebugPrivilege 4160 it927596.exe Token: SeDebugPrivilege 2160 jr070105.exe Token: SeDebugPrivilege 1716 kp176185.exe Token: SeDebugPrivilege 544 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr154063.exepid process 4152 lr154063.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
72b3b941bafc0a9314ad8cc52e59332efbf8d41a8600db5b0bf4035de5d821b1.exeziqk2577.exezibh0343.exejr070105.exedescription pid process target process PID 2896 wrote to memory of 3384 2896 72b3b941bafc0a9314ad8cc52e59332efbf8d41a8600db5b0bf4035de5d821b1.exe ziqk2577.exe PID 2896 wrote to memory of 3384 2896 72b3b941bafc0a9314ad8cc52e59332efbf8d41a8600db5b0bf4035de5d821b1.exe ziqk2577.exe PID 2896 wrote to memory of 3384 2896 72b3b941bafc0a9314ad8cc52e59332efbf8d41a8600db5b0bf4035de5d821b1.exe ziqk2577.exe PID 3384 wrote to memory of 4168 3384 ziqk2577.exe zibh0343.exe PID 3384 wrote to memory of 4168 3384 ziqk2577.exe zibh0343.exe PID 3384 wrote to memory of 4168 3384 ziqk2577.exe zibh0343.exe PID 4168 wrote to memory of 4160 4168 zibh0343.exe it927596.exe PID 4168 wrote to memory of 4160 4168 zibh0343.exe it927596.exe PID 4168 wrote to memory of 2160 4168 zibh0343.exe jr070105.exe PID 4168 wrote to memory of 2160 4168 zibh0343.exe jr070105.exe PID 4168 wrote to memory of 2160 4168 zibh0343.exe jr070105.exe PID 2160 wrote to memory of 544 2160 jr070105.exe 1.exe PID 2160 wrote to memory of 544 2160 jr070105.exe 1.exe PID 2160 wrote to memory of 544 2160 jr070105.exe 1.exe PID 3384 wrote to memory of 1716 3384 ziqk2577.exe kp176185.exe PID 3384 wrote to memory of 1716 3384 ziqk2577.exe kp176185.exe PID 3384 wrote to memory of 1716 3384 ziqk2577.exe kp176185.exe PID 2896 wrote to memory of 4152 2896 72b3b941bafc0a9314ad8cc52e59332efbf8d41a8600db5b0bf4035de5d821b1.exe lr154063.exe PID 2896 wrote to memory of 4152 2896 72b3b941bafc0a9314ad8cc52e59332efbf8d41a8600db5b0bf4035de5d821b1.exe lr154063.exe PID 2896 wrote to memory of 4152 2896 72b3b941bafc0a9314ad8cc52e59332efbf8d41a8600db5b0bf4035de5d821b1.exe lr154063.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\72b3b941bafc0a9314ad8cc52e59332efbf8d41a8600db5b0bf4035de5d821b1.exe"C:\Users\Admin\AppData\Local\Temp\72b3b941bafc0a9314ad8cc52e59332efbf8d41a8600db5b0bf4035de5d821b1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziqk2577.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziqk2577.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zibh0343.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zibh0343.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it927596.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it927596.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4160
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr070105.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr070105.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:544
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp176185.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp176185.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1716
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr154063.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr154063.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:4152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4152 -s 6323⤵
- Program crash
PID:4476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4152 -s 7083⤵
- Program crash
PID:4732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4152 -s 8083⤵
- Program crash
PID:3088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4152 -s 8563⤵
- Program crash
PID:1956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4152 -s 8843⤵
- Program crash
PID:2804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4152 -s 9443⤵
- Program crash
PID:2988
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4152 -s 11323⤵
- Program crash
PID:1548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4152 -s 11883⤵
- Program crash
PID:1400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4152 -s 12043⤵
- Program crash
PID:4756
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
724KB
MD52e6bd2ed7301f398fba476873b775696
SHA1936c663dfed8c7e490c52dd90158cb9e52d9378c
SHA25616b5a959fa13a62706739edcd209f840184a383685ba9bbccba5a59a8e71d6aa
SHA5123d963edcbacb155126a0ad8b55eee777cb39cb842e737307f6744d94c704c3cf9c1774eb8bf2526c99678aba5042c1458f90a02fc10e4f2101b167f14445aaf0
-
Filesize
724KB
MD52e6bd2ed7301f398fba476873b775696
SHA1936c663dfed8c7e490c52dd90158cb9e52d9378c
SHA25616b5a959fa13a62706739edcd209f840184a383685ba9bbccba5a59a8e71d6aa
SHA5123d963edcbacb155126a0ad8b55eee777cb39cb842e737307f6744d94c704c3cf9c1774eb8bf2526c99678aba5042c1458f90a02fc10e4f2101b167f14445aaf0
-
Filesize
169KB
MD57952869dca4b36d3dc5583aaa4f5cca7
SHA1a4427862639cadb95949891ec24ad7089cc9c8fa
SHA25662fdbb0edac3859d09501b208ab241aaf29c461b9b7c156cbf4486619857e276
SHA512cb94de8388f6c8b9246226239ae44d2d7f3afe279393d8ae20cf389c896c8ed4b666209312b91fc6410ba6469620c4f756f89fd2f284d9d2ec2d0c08ba2eeec3
-
Filesize
169KB
MD57952869dca4b36d3dc5583aaa4f5cca7
SHA1a4427862639cadb95949891ec24ad7089cc9c8fa
SHA25662fdbb0edac3859d09501b208ab241aaf29c461b9b7c156cbf4486619857e276
SHA512cb94de8388f6c8b9246226239ae44d2d7f3afe279393d8ae20cf389c896c8ed4b666209312b91fc6410ba6469620c4f756f89fd2f284d9d2ec2d0c08ba2eeec3
-
Filesize
570KB
MD557a12db9f4b562b8ec89ee31a3f8715b
SHA12f398c601f40f9e685af8125c7df975b5aab70fd
SHA25685fc5c39bfe65dca5cbea06fc1538426ad219c86106dcee53dc0df713aa78f6a
SHA5128570c706594bedb31d1cd325b92d03428dcd885bb7e05da1f66c731b137500bef86341b5b82b73cc6bafbc7b3a44fe9e7fca3d71b80b3848fa93818911de4dde
-
Filesize
570KB
MD557a12db9f4b562b8ec89ee31a3f8715b
SHA12f398c601f40f9e685af8125c7df975b5aab70fd
SHA25685fc5c39bfe65dca5cbea06fc1538426ad219c86106dcee53dc0df713aa78f6a
SHA5128570c706594bedb31d1cd325b92d03428dcd885bb7e05da1f66c731b137500bef86341b5b82b73cc6bafbc7b3a44fe9e7fca3d71b80b3848fa93818911de4dde
-
Filesize
11KB
MD506d9b8f9236b959006976da775fea5e7
SHA146d5c5e6a3e7de6138cd764509a6754ce24d9484
SHA25677353ead4144432dfd0e8fc833c458c8b88fb5d6bf7c9818ac430be40983b7f5
SHA512ec0c6135f2b39d70cb35bd713d5fd9a0876055b46584f3535067f0f162be149024770c990e61ee041eabe5d3daf53aac49e747bb96189c3fa17346774a5edc6d
-
Filesize
11KB
MD506d9b8f9236b959006976da775fea5e7
SHA146d5c5e6a3e7de6138cd764509a6754ce24d9484
SHA25677353ead4144432dfd0e8fc833c458c8b88fb5d6bf7c9818ac430be40983b7f5
SHA512ec0c6135f2b39d70cb35bd713d5fd9a0876055b46584f3535067f0f162be149024770c990e61ee041eabe5d3daf53aac49e747bb96189c3fa17346774a5edc6d
-
Filesize
588KB
MD562b728f88fe56f601efb0691ebf7f7c1
SHA16bbb4bc45688427e202067fcbbab9cec1d552c32
SHA25628a548c6c08076e93e5fa6d97e26f8292a7a1ddc897db8bc8b686db569b0cb3b
SHA51270b126aada2791a687c8000395be074d1e35e93d97bc4c5bc0a5f00f05d229afa9c36cc3dda69a300b324efdb66a1405fb21e05be8d000bca01c8f1145c077ef
-
Filesize
588KB
MD562b728f88fe56f601efb0691ebf7f7c1
SHA16bbb4bc45688427e202067fcbbab9cec1d552c32
SHA25628a548c6c08076e93e5fa6d97e26f8292a7a1ddc897db8bc8b686db569b0cb3b
SHA51270b126aada2791a687c8000395be074d1e35e93d97bc4c5bc0a5f00f05d229afa9c36cc3dda69a300b324efdb66a1405fb21e05be8d000bca01c8f1145c077ef
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1