Analysis
-
max time kernel
145s -
max time network
103s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14-04-2023 03:59
Static task
static1
General
-
Target
2b362b73687c029adce20f592320eaac7a9a1da91744a76b28508f4fdaa3a529.exe
-
Size
1.2MB
-
MD5
3ee245445f60af27ad771a79a76d4155
-
SHA1
d66e6192dde9606e81d318cede93843490023831
-
SHA256
2b362b73687c029adce20f592320eaac7a9a1da91744a76b28508f4fdaa3a529
-
SHA512
59cb4d4886bbccdb13c61f7549e3995dcf5f4407a09cb60e3deb845a00df5d82f61242f4ac100dd74d25050c644e1f2ab3ed93fb6b44231c02ef129007e15f63
-
SSDEEP
24576:+y/yvsFZdERmtFOs8rEPwkWFN67xPvSZJxReXhXYIra6tG9w:N/yvyfFD8r2wQtPvSfbeXNrPtW
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
pr517475.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr517475.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr517475.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr517475.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr517475.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr517475.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
Processes:
un357486.exeun603166.exepr517475.exequ148753.exe1.exerk910729.exesi088713.exepid process 3604 un357486.exe 4156 un603166.exe 4488 pr517475.exe 3876 qu148753.exe 208 1.exe 2168 rk910729.exe 8 si088713.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr517475.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr517475.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr517475.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
2b362b73687c029adce20f592320eaac7a9a1da91744a76b28508f4fdaa3a529.exeun357486.exeun603166.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2b362b73687c029adce20f592320eaac7a9a1da91744a76b28508f4fdaa3a529.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2b362b73687c029adce20f592320eaac7a9a1da91744a76b28508f4fdaa3a529.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un357486.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un357486.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un603166.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un603166.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3596 8 WerFault.exe si088713.exe 2556 8 WerFault.exe si088713.exe 1928 8 WerFault.exe si088713.exe 1016 8 WerFault.exe si088713.exe 4316 8 WerFault.exe si088713.exe 4536 8 WerFault.exe si088713.exe 4416 8 WerFault.exe si088713.exe 2152 8 WerFault.exe si088713.exe 960 8 WerFault.exe si088713.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr517475.exerk910729.exe1.exepid process 4488 pr517475.exe 4488 pr517475.exe 2168 rk910729.exe 208 1.exe 208 1.exe 2168 rk910729.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pr517475.exequ148753.exerk910729.exe1.exedescription pid process Token: SeDebugPrivilege 4488 pr517475.exe Token: SeDebugPrivilege 3876 qu148753.exe Token: SeDebugPrivilege 2168 rk910729.exe Token: SeDebugPrivilege 208 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si088713.exepid process 8 si088713.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
2b362b73687c029adce20f592320eaac7a9a1da91744a76b28508f4fdaa3a529.exeun357486.exeun603166.exequ148753.exedescription pid process target process PID 3640 wrote to memory of 3604 3640 2b362b73687c029adce20f592320eaac7a9a1da91744a76b28508f4fdaa3a529.exe un357486.exe PID 3640 wrote to memory of 3604 3640 2b362b73687c029adce20f592320eaac7a9a1da91744a76b28508f4fdaa3a529.exe un357486.exe PID 3640 wrote to memory of 3604 3640 2b362b73687c029adce20f592320eaac7a9a1da91744a76b28508f4fdaa3a529.exe un357486.exe PID 3604 wrote to memory of 4156 3604 un357486.exe un603166.exe PID 3604 wrote to memory of 4156 3604 un357486.exe un603166.exe PID 3604 wrote to memory of 4156 3604 un357486.exe un603166.exe PID 4156 wrote to memory of 4488 4156 un603166.exe pr517475.exe PID 4156 wrote to memory of 4488 4156 un603166.exe pr517475.exe PID 4156 wrote to memory of 4488 4156 un603166.exe pr517475.exe PID 4156 wrote to memory of 3876 4156 un603166.exe qu148753.exe PID 4156 wrote to memory of 3876 4156 un603166.exe qu148753.exe PID 4156 wrote to memory of 3876 4156 un603166.exe qu148753.exe PID 3876 wrote to memory of 208 3876 qu148753.exe 1.exe PID 3876 wrote to memory of 208 3876 qu148753.exe 1.exe PID 3876 wrote to memory of 208 3876 qu148753.exe 1.exe PID 3604 wrote to memory of 2168 3604 un357486.exe rk910729.exe PID 3604 wrote to memory of 2168 3604 un357486.exe rk910729.exe PID 3604 wrote to memory of 2168 3604 un357486.exe rk910729.exe PID 3640 wrote to memory of 8 3640 2b362b73687c029adce20f592320eaac7a9a1da91744a76b28508f4fdaa3a529.exe si088713.exe PID 3640 wrote to memory of 8 3640 2b362b73687c029adce20f592320eaac7a9a1da91744a76b28508f4fdaa3a529.exe si088713.exe PID 3640 wrote to memory of 8 3640 2b362b73687c029adce20f592320eaac7a9a1da91744a76b28508f4fdaa3a529.exe si088713.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b362b73687c029adce20f592320eaac7a9a1da91744a76b28508f4fdaa3a529.exe"C:\Users\Admin\AppData\Local\Temp\2b362b73687c029adce20f592320eaac7a9a1da91744a76b28508f4fdaa3a529.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un357486.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un357486.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un603166.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un603166.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr517475.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr517475.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4488
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu148753.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu148753.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:208
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk910729.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk910729.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si088713.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si088713.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:8 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8 -s 6363⤵
- Program crash
PID:3596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8 -s 7123⤵
- Program crash
PID:2556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8 -s 8483⤵
- Program crash
PID:1928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8 -s 8363⤵
- Program crash
PID:1016
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8 -s 9003⤵
- Program crash
PID:4316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8 -s 9403⤵
- Program crash
PID:4536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8 -s 11363⤵
- Program crash
PID:4416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8 -s 11603⤵
- Program crash
PID:2152
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 8 -s 10763⤵
- Program crash
PID:960
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
861KB
MD5ea0cd7db463c567b68670c7443ff3277
SHA1d957167f942837d7c2f172de942f8585b7cb260e
SHA25680346e6b5e87fc68bc1d815eb9dbbc7d1cd8913b6f1642d63b21b83b674c355a
SHA512678b62e3e8ffa5208f08296d4f51643af942ae2b70a226f7f052285c871bfbbe1adc55b40105d06f8e9e2d88a958aafdf15512597781dad842cb6407222f4312
-
Filesize
861KB
MD5ea0cd7db463c567b68670c7443ff3277
SHA1d957167f942837d7c2f172de942f8585b7cb260e
SHA25680346e6b5e87fc68bc1d815eb9dbbc7d1cd8913b6f1642d63b21b83b674c355a
SHA512678b62e3e8ffa5208f08296d4f51643af942ae2b70a226f7f052285c871bfbbe1adc55b40105d06f8e9e2d88a958aafdf15512597781dad842cb6407222f4312
-
Filesize
169KB
MD5e46cf6461f6ba1b9f70d0bea0611d566
SHA10705e475a9e012003530802b3f5fd985f9d3a3a2
SHA256816c3e5460cab08ef6434574ccacc692035c376aedf55ca676b16b1cafdb89bb
SHA5128d63b8414556805586bf59718569f7f36f3c4ff61439c1915dd9b6bf1b91d1a50c01e3fb78d1eb561b09c2675615bc04acc76099270613aac08cb0ec6c5b4e92
-
Filesize
169KB
MD5e46cf6461f6ba1b9f70d0bea0611d566
SHA10705e475a9e012003530802b3f5fd985f9d3a3a2
SHA256816c3e5460cab08ef6434574ccacc692035c376aedf55ca676b16b1cafdb89bb
SHA5128d63b8414556805586bf59718569f7f36f3c4ff61439c1915dd9b6bf1b91d1a50c01e3fb78d1eb561b09c2675615bc04acc76099270613aac08cb0ec6c5b4e92
-
Filesize
708KB
MD57d5cb3c9e28fe4361740d2c912023faa
SHA1e690c2d4c2d0fed44ff98a2ec91fbb8722f39c67
SHA2565d5c6f1439a657cb1f3295dd6e0eb9243465e18511ed058f981e759a3b8c62bc
SHA51219d79ce3ba3d51c7e1fcdc74f98bef75dfc9d42b76fc2777f97dd7a9e2f99901c9d51273414d39caecfbbc9a989d4c45b6d8d2b7f91e55299d203ca1fda139d5
-
Filesize
708KB
MD57d5cb3c9e28fe4361740d2c912023faa
SHA1e690c2d4c2d0fed44ff98a2ec91fbb8722f39c67
SHA2565d5c6f1439a657cb1f3295dd6e0eb9243465e18511ed058f981e759a3b8c62bc
SHA51219d79ce3ba3d51c7e1fcdc74f98bef75dfc9d42b76fc2777f97dd7a9e2f99901c9d51273414d39caecfbbc9a989d4c45b6d8d2b7f91e55299d203ca1fda139d5
-
Filesize
405KB
MD59e44610084132b9badb3c7796766e3ee
SHA12539551f695525f46ecd6cb75fb97882c68a7737
SHA256709a314949520a8df9d2af79591a3a41e6ec2dba1c6e8107024cadb64b3b7474
SHA512a140eb308b67df7d1fa6d249f90a0b1d5f7d4100810c69cc0e7fd3520e6c82c90b452c78e9a01692fab58a69e29682caae02e28f9f5df91d86eb365ccf6edffa
-
Filesize
405KB
MD59e44610084132b9badb3c7796766e3ee
SHA12539551f695525f46ecd6cb75fb97882c68a7737
SHA256709a314949520a8df9d2af79591a3a41e6ec2dba1c6e8107024cadb64b3b7474
SHA512a140eb308b67df7d1fa6d249f90a0b1d5f7d4100810c69cc0e7fd3520e6c82c90b452c78e9a01692fab58a69e29682caae02e28f9f5df91d86eb365ccf6edffa
-
Filesize
588KB
MD592712ca061d60ed1ad356adce0bc0e14
SHA1bdd330d4dd970e9b6f0e531b76f8ee420e6805ba
SHA2563c256454243741346e5c70fa08ebb2550d877d3857bb928b80530a107e2d3196
SHA5129c8103d0d8ef40a0f1fb065223b43e428efa44a5c0f5a8c16bac085c2f5005a5817b5bc5c51ced8be793d610c473cda23e00384fdb93a310b8b756d81a1b9a15
-
Filesize
588KB
MD592712ca061d60ed1ad356adce0bc0e14
SHA1bdd330d4dd970e9b6f0e531b76f8ee420e6805ba
SHA2563c256454243741346e5c70fa08ebb2550d877d3857bb928b80530a107e2d3196
SHA5129c8103d0d8ef40a0f1fb065223b43e428efa44a5c0f5a8c16bac085c2f5005a5817b5bc5c51ced8be793d610c473cda23e00384fdb93a310b8b756d81a1b9a15
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1