Analysis
-
max time kernel
142s -
max time network
99s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14-04-2023 03:58
Static task
static1
General
-
Target
2b1422f9326c64146f80c214a67c6f3d2f05c8b3dbfa1336f54ae190239e99bb.exe
-
Size
1.0MB
-
MD5
eeac8d746a4fb066769acade12a1bd8d
-
SHA1
4d3652fc01b386a5c9df541bf7986f0ef3a22e41
-
SHA256
2b1422f9326c64146f80c214a67c6f3d2f05c8b3dbfa1336f54ae190239e99bb
-
SHA512
209262dfbbae3224d992553da2b9ce8cf75fc871ea8b4787884758dfbf34f195a39cfc75df36cb33edb42837408077335c1b34e79653c29af18fb18a5651a555
-
SSDEEP
24576:ryX8cjaEut21gZDm0ZfhHVBJJcGOsPOAWOOgFgXKR:eXPesgZDb1BJJcSGAWOhFga
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it998318.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it998318.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it998318.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it998318.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it998318.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it998318.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
Processes:
ziBr1346.exeziNO6378.exeit998318.exejr586965.exe1.exekp198785.exelr410713.exepid process 3980 ziBr1346.exe 4724 ziNO6378.exe 3092 it998318.exe 4896 jr586965.exe 3328 1.exe 3448 kp198785.exe 4252 lr410713.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it998318.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it998318.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
ziNO6378.exe2b1422f9326c64146f80c214a67c6f3d2f05c8b3dbfa1336f54ae190239e99bb.exeziBr1346.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziNO6378.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2b1422f9326c64146f80c214a67c6f3d2f05c8b3dbfa1336f54ae190239e99bb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2b1422f9326c64146f80c214a67c6f3d2f05c8b3dbfa1336f54ae190239e99bb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziBr1346.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziBr1346.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziNO6378.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4388 4252 WerFault.exe lr410713.exe 5112 4252 WerFault.exe lr410713.exe 4012 4252 WerFault.exe lr410713.exe 4820 4252 WerFault.exe lr410713.exe 3092 4252 WerFault.exe lr410713.exe 4948 4252 WerFault.exe lr410713.exe 5020 4252 WerFault.exe lr410713.exe 3912 4252 WerFault.exe lr410713.exe 3464 4252 WerFault.exe lr410713.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it998318.exe1.exekp198785.exepid process 3092 it998318.exe 3092 it998318.exe 3328 1.exe 3448 kp198785.exe 3328 1.exe 3448 kp198785.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it998318.exejr586965.exe1.exekp198785.exedescription pid process Token: SeDebugPrivilege 3092 it998318.exe Token: SeDebugPrivilege 4896 jr586965.exe Token: SeDebugPrivilege 3328 1.exe Token: SeDebugPrivilege 3448 kp198785.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
2b1422f9326c64146f80c214a67c6f3d2f05c8b3dbfa1336f54ae190239e99bb.exeziBr1346.exeziNO6378.exejr586965.exedescription pid process target process PID 4192 wrote to memory of 3980 4192 2b1422f9326c64146f80c214a67c6f3d2f05c8b3dbfa1336f54ae190239e99bb.exe ziBr1346.exe PID 4192 wrote to memory of 3980 4192 2b1422f9326c64146f80c214a67c6f3d2f05c8b3dbfa1336f54ae190239e99bb.exe ziBr1346.exe PID 4192 wrote to memory of 3980 4192 2b1422f9326c64146f80c214a67c6f3d2f05c8b3dbfa1336f54ae190239e99bb.exe ziBr1346.exe PID 3980 wrote to memory of 4724 3980 ziBr1346.exe ziNO6378.exe PID 3980 wrote to memory of 4724 3980 ziBr1346.exe ziNO6378.exe PID 3980 wrote to memory of 4724 3980 ziBr1346.exe ziNO6378.exe PID 4724 wrote to memory of 3092 4724 ziNO6378.exe it998318.exe PID 4724 wrote to memory of 3092 4724 ziNO6378.exe it998318.exe PID 4724 wrote to memory of 4896 4724 ziNO6378.exe jr586965.exe PID 4724 wrote to memory of 4896 4724 ziNO6378.exe jr586965.exe PID 4724 wrote to memory of 4896 4724 ziNO6378.exe jr586965.exe PID 4896 wrote to memory of 3328 4896 jr586965.exe 1.exe PID 4896 wrote to memory of 3328 4896 jr586965.exe 1.exe PID 4896 wrote to memory of 3328 4896 jr586965.exe 1.exe PID 3980 wrote to memory of 3448 3980 ziBr1346.exe kp198785.exe PID 3980 wrote to memory of 3448 3980 ziBr1346.exe kp198785.exe PID 3980 wrote to memory of 3448 3980 ziBr1346.exe kp198785.exe PID 4192 wrote to memory of 4252 4192 2b1422f9326c64146f80c214a67c6f3d2f05c8b3dbfa1336f54ae190239e99bb.exe lr410713.exe PID 4192 wrote to memory of 4252 4192 2b1422f9326c64146f80c214a67c6f3d2f05c8b3dbfa1336f54ae190239e99bb.exe lr410713.exe PID 4192 wrote to memory of 4252 4192 2b1422f9326c64146f80c214a67c6f3d2f05c8b3dbfa1336f54ae190239e99bb.exe lr410713.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b1422f9326c64146f80c214a67c6f3d2f05c8b3dbfa1336f54ae190239e99bb.exe"C:\Users\Admin\AppData\Local\Temp\2b1422f9326c64146f80c214a67c6f3d2f05c8b3dbfa1336f54ae190239e99bb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziBr1346.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziBr1346.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziNO6378.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziNO6378.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it998318.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it998318.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3092
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr586965.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr586965.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3328
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp198785.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp198785.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3448
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr410713.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr410713.exe2⤵
- Executes dropped EXE
PID:4252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 6363⤵
- Program crash
PID:4388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 7123⤵
- Program crash
PID:5112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 8483⤵
- Program crash
PID:4012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 8603⤵
- Program crash
PID:4820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 8883⤵
- Program crash
PID:3092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 9003⤵
- Program crash
PID:4948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 11283⤵
- Program crash
PID:5020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 12083⤵
- Program crash
PID:3912
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4252 -s 11883⤵
- Program crash
PID:3464
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
723KB
MD5b7ed505776d367322a7e406fceab571a
SHA1c792f963537d4fe099851b9497b606750145ad59
SHA2565004f15683825c6a45cc27e6793e349cdb13e8fb1ced0900dff45b41ad3455b8
SHA5124c3ebb01b16ec33cb4726b78d1851b9d78454999dc137e27d2898e86a673638aabd10a5c188755f14e5960c04ccb45e506e3751334639f85bd01c6c79b07b547
-
Filesize
723KB
MD5b7ed505776d367322a7e406fceab571a
SHA1c792f963537d4fe099851b9497b606750145ad59
SHA2565004f15683825c6a45cc27e6793e349cdb13e8fb1ced0900dff45b41ad3455b8
SHA5124c3ebb01b16ec33cb4726b78d1851b9d78454999dc137e27d2898e86a673638aabd10a5c188755f14e5960c04ccb45e506e3751334639f85bd01c6c79b07b547
-
Filesize
169KB
MD5a61f1cdf754b30e2a932e7f140d66eda
SHA184c33bf1908a9d5edd3c1c037546f167e84f1d00
SHA25602a2981b1fbb91726ae4caee0d02c295f955d54097a654665608e6b1d5e07249
SHA51282ee4e351563a2ec021827e5338dab40aca073f695d4ed2210f5ba6ca9bcf5c1cb7db98a8619c8caad408114f3afe0925dc20b67cd9d683e26debbd3126abf71
-
Filesize
169KB
MD5a61f1cdf754b30e2a932e7f140d66eda
SHA184c33bf1908a9d5edd3c1c037546f167e84f1d00
SHA25602a2981b1fbb91726ae4caee0d02c295f955d54097a654665608e6b1d5e07249
SHA51282ee4e351563a2ec021827e5338dab40aca073f695d4ed2210f5ba6ca9bcf5c1cb7db98a8619c8caad408114f3afe0925dc20b67cd9d683e26debbd3126abf71
-
Filesize
569KB
MD52a7ed85d70e352aaf70274fe1263b79a
SHA17f9e5109cd200a5651a8bc8f9579a38c2a274b67
SHA25612ef1cbc142c46b794d6ff8232d9efeddcc2c4b5c770b29c5c765a30bb3e003b
SHA512644ac4fc5da446372c3f53e1194e2ac1065473c15edbad32aef04332645d155a943be324176e2e3943a0fc41a657e630295477fbe9e6fe5bf6ae165de6178de8
-
Filesize
569KB
MD52a7ed85d70e352aaf70274fe1263b79a
SHA17f9e5109cd200a5651a8bc8f9579a38c2a274b67
SHA25612ef1cbc142c46b794d6ff8232d9efeddcc2c4b5c770b29c5c765a30bb3e003b
SHA512644ac4fc5da446372c3f53e1194e2ac1065473c15edbad32aef04332645d155a943be324176e2e3943a0fc41a657e630295477fbe9e6fe5bf6ae165de6178de8
-
Filesize
11KB
MD51cdbf941ccc9de4b1f14c24e1cfaff47
SHA1f63e35492fa97f4b9728546932366314e79b624f
SHA25628379a18f1fefd2841c051f8a3b6da73ef4d8bb2861d0f211ea83c21cad6a56e
SHA5125078a541e90e2addda10dace672170769caf0b25190b4c11d82ae8c0f858d6c0b98e0017087a0d9e206777805c499bb903d858594754952602b9e2fa14e494c5
-
Filesize
11KB
MD51cdbf941ccc9de4b1f14c24e1cfaff47
SHA1f63e35492fa97f4b9728546932366314e79b624f
SHA25628379a18f1fefd2841c051f8a3b6da73ef4d8bb2861d0f211ea83c21cad6a56e
SHA5125078a541e90e2addda10dace672170769caf0b25190b4c11d82ae8c0f858d6c0b98e0017087a0d9e206777805c499bb903d858594754952602b9e2fa14e494c5
-
Filesize
588KB
MD5beb288a3791e39ac762e996f0f5a919e
SHA1fb9b374d11209ee0a70f067fe2c8013531a0504f
SHA256455a9eb993eedee0ca0a5317cb00e1b46811466c3c050046607d84127470e99d
SHA51250952a4e59e15a9e9bdd53be4d8a4a28343abec25407e4e45548e8247abff0cc166b0df78fcd8d9228688edaa2a077b923096d59ed276d444dbc8e7314308874
-
Filesize
588KB
MD5beb288a3791e39ac762e996f0f5a919e
SHA1fb9b374d11209ee0a70f067fe2c8013531a0504f
SHA256455a9eb993eedee0ca0a5317cb00e1b46811466c3c050046607d84127470e99d
SHA51250952a4e59e15a9e9bdd53be4d8a4a28343abec25407e4e45548e8247abff0cc166b0df78fcd8d9228688edaa2a077b923096d59ed276d444dbc8e7314308874
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1