Analysis
-
max time kernel
142s -
max time network
98s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14-04-2023 03:52
Static task
static1
General
-
Target
ac7f262ea9ce42e4f840af2fbfa922c859a92ff76af62da15f6c27a9c1d9707d.exe
-
Size
1.0MB
-
MD5
1cfde04db19cba9f32cbc98833891c8d
-
SHA1
b5ca066fe9df0efcebd860aee4cbaa27f21da051
-
SHA256
ac7f262ea9ce42e4f840af2fbfa922c859a92ff76af62da15f6c27a9c1d9707d
-
SHA512
20ce11b506bef2cedf5a972fd6be4fb8f2e69c19553500b2630176fef19fc03a61cc96747c2da80a09a9330d42ef13b924ac9ae818db1411d35d51470059ab3c
-
SSDEEP
24576:7yXI4bbg9MWNH7Si+u1dD3MYkKXIjgWhdqJG9k6F:uXtbg9MY2iPcYk62dC
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it132609.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it132609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it132609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it132609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it132609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it132609.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
Processes:
ziWk3658.exeziWb8828.exeit132609.exejr121041.exe1.exekp115960.exelr041304.exepid process 4600 ziWk3658.exe 4960 ziWb8828.exe 1492 it132609.exe 4020 jr121041.exe 1480 1.exe 2696 kp115960.exe 2780 lr041304.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it132609.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it132609.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
ac7f262ea9ce42e4f840af2fbfa922c859a92ff76af62da15f6c27a9c1d9707d.exeziWk3658.exeziWb8828.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ac7f262ea9ce42e4f840af2fbfa922c859a92ff76af62da15f6c27a9c1d9707d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ac7f262ea9ce42e4f840af2fbfa922c859a92ff76af62da15f6c27a9c1d9707d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziWk3658.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziWk3658.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziWb8828.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziWb8828.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2688 2780 WerFault.exe lr041304.exe 3928 2780 WerFault.exe lr041304.exe 4056 2780 WerFault.exe lr041304.exe 4260 2780 WerFault.exe lr041304.exe 4860 2780 WerFault.exe lr041304.exe 2084 2780 WerFault.exe lr041304.exe 3732 2780 WerFault.exe lr041304.exe 1008 2780 WerFault.exe lr041304.exe 4460 2780 WerFault.exe lr041304.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it132609.exe1.exekp115960.exepid process 1492 it132609.exe 1492 it132609.exe 1480 1.exe 2696 kp115960.exe 1480 1.exe 2696 kp115960.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it132609.exejr121041.exe1.exekp115960.exedescription pid process Token: SeDebugPrivilege 1492 it132609.exe Token: SeDebugPrivilege 4020 jr121041.exe Token: SeDebugPrivilege 1480 1.exe Token: SeDebugPrivilege 2696 kp115960.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr041304.exepid process 2780 lr041304.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
ac7f262ea9ce42e4f840af2fbfa922c859a92ff76af62da15f6c27a9c1d9707d.exeziWk3658.exeziWb8828.exejr121041.exedescription pid process target process PID 2208 wrote to memory of 4600 2208 ac7f262ea9ce42e4f840af2fbfa922c859a92ff76af62da15f6c27a9c1d9707d.exe ziWk3658.exe PID 2208 wrote to memory of 4600 2208 ac7f262ea9ce42e4f840af2fbfa922c859a92ff76af62da15f6c27a9c1d9707d.exe ziWk3658.exe PID 2208 wrote to memory of 4600 2208 ac7f262ea9ce42e4f840af2fbfa922c859a92ff76af62da15f6c27a9c1d9707d.exe ziWk3658.exe PID 4600 wrote to memory of 4960 4600 ziWk3658.exe ziWb8828.exe PID 4600 wrote to memory of 4960 4600 ziWk3658.exe ziWb8828.exe PID 4600 wrote to memory of 4960 4600 ziWk3658.exe ziWb8828.exe PID 4960 wrote to memory of 1492 4960 ziWb8828.exe it132609.exe PID 4960 wrote to memory of 1492 4960 ziWb8828.exe it132609.exe PID 4960 wrote to memory of 4020 4960 ziWb8828.exe jr121041.exe PID 4960 wrote to memory of 4020 4960 ziWb8828.exe jr121041.exe PID 4960 wrote to memory of 4020 4960 ziWb8828.exe jr121041.exe PID 4020 wrote to memory of 1480 4020 jr121041.exe 1.exe PID 4020 wrote to memory of 1480 4020 jr121041.exe 1.exe PID 4020 wrote to memory of 1480 4020 jr121041.exe 1.exe PID 4600 wrote to memory of 2696 4600 ziWk3658.exe kp115960.exe PID 4600 wrote to memory of 2696 4600 ziWk3658.exe kp115960.exe PID 4600 wrote to memory of 2696 4600 ziWk3658.exe kp115960.exe PID 2208 wrote to memory of 2780 2208 ac7f262ea9ce42e4f840af2fbfa922c859a92ff76af62da15f6c27a9c1d9707d.exe lr041304.exe PID 2208 wrote to memory of 2780 2208 ac7f262ea9ce42e4f840af2fbfa922c859a92ff76af62da15f6c27a9c1d9707d.exe lr041304.exe PID 2208 wrote to memory of 2780 2208 ac7f262ea9ce42e4f840af2fbfa922c859a92ff76af62da15f6c27a9c1d9707d.exe lr041304.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac7f262ea9ce42e4f840af2fbfa922c859a92ff76af62da15f6c27a9c1d9707d.exe"C:\Users\Admin\AppData\Local\Temp\ac7f262ea9ce42e4f840af2fbfa922c859a92ff76af62da15f6c27a9c1d9707d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWk3658.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWk3658.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziWb8828.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziWb8828.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it132609.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it132609.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr121041.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr121041.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1480
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp115960.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp115960.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr041304.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr041304.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:2780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 6283⤵
- Program crash
PID:2688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 7043⤵
- Program crash
PID:3928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 8443⤵
- Program crash
PID:4056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 8523⤵
- Program crash
PID:4260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 8803⤵
- Program crash
PID:4860
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 8243⤵
- Program crash
PID:2084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 11243⤵
- Program crash
PID:3732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 11803⤵
- Program crash
PID:1008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 11083⤵
- Program crash
PID:4460
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
723KB
MD5b3d3694262bb21b1647a9bd493957880
SHA12e323f0d582224efd7f38b5eaf410d3173496d6b
SHA256c37f9dcb51c006a3e8b73fe4c136b2453195852e1436759d2b7fc7e67ae0fdd9
SHA512d0a67700001770409227391fd17a866c196c2c2d59c3832ebdea33e3a8bb2057510bb6630f15a94fe0d46e7a81e7e4fb9c52240ff79a64a5d214cc0afab4d05b
-
Filesize
723KB
MD5b3d3694262bb21b1647a9bd493957880
SHA12e323f0d582224efd7f38b5eaf410d3173496d6b
SHA256c37f9dcb51c006a3e8b73fe4c136b2453195852e1436759d2b7fc7e67ae0fdd9
SHA512d0a67700001770409227391fd17a866c196c2c2d59c3832ebdea33e3a8bb2057510bb6630f15a94fe0d46e7a81e7e4fb9c52240ff79a64a5d214cc0afab4d05b
-
Filesize
169KB
MD5d05975b72128d297d6dd8faabb35da42
SHA1ef1eec486c374abfac025aa0602335d4f6a16dbf
SHA256e759b441afec7e536169fd9db0c6f18bc00d09ac6a05d0093de24d5cbd4e28a8
SHA5128eff1e1aec612c3d5330656c2b1f0d039fa8dd33c26dd9c58b93d02b59a0b08c273b409875edd1ee0557e94a3ad27f78b8b1bdc59ffe9553b9a1e5652dbdefea
-
Filesize
169KB
MD5d05975b72128d297d6dd8faabb35da42
SHA1ef1eec486c374abfac025aa0602335d4f6a16dbf
SHA256e759b441afec7e536169fd9db0c6f18bc00d09ac6a05d0093de24d5cbd4e28a8
SHA5128eff1e1aec612c3d5330656c2b1f0d039fa8dd33c26dd9c58b93d02b59a0b08c273b409875edd1ee0557e94a3ad27f78b8b1bdc59ffe9553b9a1e5652dbdefea
-
Filesize
569KB
MD58c6f17e84326f0fe08d85805cbe46a58
SHA1accef17d5a7d2facac0a0a16e93cf7401dd0c47b
SHA256726a4228ab9e9ea58a7fbb47b031d5d5c0a0b91b828c5c28cb9d26e3eeff43cf
SHA5129880facca6297266ae6e5e56bfc3f3e6f82fe6b2ca544aeef4c000984b8e1d1cadaa83d66bde97cd8ed88e79fe16cc90bab071055e59cac3935cc1aacd3b0a90
-
Filesize
569KB
MD58c6f17e84326f0fe08d85805cbe46a58
SHA1accef17d5a7d2facac0a0a16e93cf7401dd0c47b
SHA256726a4228ab9e9ea58a7fbb47b031d5d5c0a0b91b828c5c28cb9d26e3eeff43cf
SHA5129880facca6297266ae6e5e56bfc3f3e6f82fe6b2ca544aeef4c000984b8e1d1cadaa83d66bde97cd8ed88e79fe16cc90bab071055e59cac3935cc1aacd3b0a90
-
Filesize
11KB
MD5514157dcf657924f029fe1d0e5231422
SHA158b4ff92394635a7111e1a523c77a00cc21545c2
SHA256fe4bdf94de62c23dfd895fdf9d63d61f8f38cc7726a47aff826ffc96cdc202a0
SHA5120c4cfd88c317884f6d9158732a5579ec4f08ab8f9ffa930ab4d815acba8c46a866f88b0d1bd8e727b1a6ff34efd1e23d1262aa6c126dbe98ba6da1d5f5be4cad
-
Filesize
11KB
MD5514157dcf657924f029fe1d0e5231422
SHA158b4ff92394635a7111e1a523c77a00cc21545c2
SHA256fe4bdf94de62c23dfd895fdf9d63d61f8f38cc7726a47aff826ffc96cdc202a0
SHA5120c4cfd88c317884f6d9158732a5579ec4f08ab8f9ffa930ab4d815acba8c46a866f88b0d1bd8e727b1a6ff34efd1e23d1262aa6c126dbe98ba6da1d5f5be4cad
-
Filesize
588KB
MD52b679e86dad45823f4a16ef4fda618b2
SHA1a0f8ff6da17f4141e7986502a57bbaaeff8a948e
SHA256268cfb7d2c222a33ebc9440682c5fd70b05ab708bdd04442225d40eed50ad8c0
SHA5122c30a53693987baad36702dfb62d6da5db4831eba7810fc6cdfbe988f07a5e469a8f0ab4efd7f691463cfdce3a385e8b95e780a1d797fda9ad47240cebd66d6d
-
Filesize
588KB
MD52b679e86dad45823f4a16ef4fda618b2
SHA1a0f8ff6da17f4141e7986502a57bbaaeff8a948e
SHA256268cfb7d2c222a33ebc9440682c5fd70b05ab708bdd04442225d40eed50ad8c0
SHA5122c30a53693987baad36702dfb62d6da5db4831eba7810fc6cdfbe988f07a5e469a8f0ab4efd7f691463cfdce3a385e8b95e780a1d797fda9ad47240cebd66d6d
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1