Analysis
-
max time kernel
145s -
max time network
102s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14-04-2023 04:05
Static task
static1
General
-
Target
bd28199ea4825945634f93fcd39aedb3041d4c7f10f9d1dce1d30f0d566f8853.exe
-
Size
1.0MB
-
MD5
12da1cb7a1fd4089e20de1b2ad5f985c
-
SHA1
de41a44dd354cee8579658f8aba60993894f8df2
-
SHA256
bd28199ea4825945634f93fcd39aedb3041d4c7f10f9d1dce1d30f0d566f8853
-
SHA512
dec328056b4cc3fa70d0175510ad5e9fc51801ec84bd12ebef01de3ac4cf642930c31c23012618636b576629d909d827eefd86f80be5f011b4061e4872644e5e
-
SSDEEP
24576:rykC4rb2ZU8CDhZ6WUk6ykgEVv049+1xZ8aN:ekC4/8Cvv6ykgEVv0ZV8
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it901687.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it901687.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it901687.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it901687.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it901687.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it901687.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
Processes:
ziVU8586.exeziVS1940.exeit901687.exejr945726.exe1.exekp627831.exelr031250.exepid process 3488 ziVU8586.exe 2692 ziVS1940.exe 3976 it901687.exe 3948 jr945726.exe 2312 1.exe 1504 kp627831.exe 2816 lr031250.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it901687.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it901687.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
ziVS1940.exebd28199ea4825945634f93fcd39aedb3041d4c7f10f9d1dce1d30f0d566f8853.exeziVU8586.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziVS1940.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziVS1940.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bd28199ea4825945634f93fcd39aedb3041d4c7f10f9d1dce1d30f0d566f8853.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bd28199ea4825945634f93fcd39aedb3041d4c7f10f9d1dce1d30f0d566f8853.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziVU8586.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziVU8586.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3752 2816 WerFault.exe lr031250.exe 3448 2816 WerFault.exe lr031250.exe 2680 2816 WerFault.exe lr031250.exe 2600 2816 WerFault.exe lr031250.exe 5108 2816 WerFault.exe lr031250.exe 5028 2816 WerFault.exe lr031250.exe 1524 2816 WerFault.exe lr031250.exe 4536 2816 WerFault.exe lr031250.exe 4736 2816 WerFault.exe lr031250.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it901687.exe1.exekp627831.exepid process 3976 it901687.exe 3976 it901687.exe 2312 1.exe 1504 kp627831.exe 1504 kp627831.exe 2312 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it901687.exejr945726.exe1.exekp627831.exedescription pid process Token: SeDebugPrivilege 3976 it901687.exe Token: SeDebugPrivilege 3948 jr945726.exe Token: SeDebugPrivilege 2312 1.exe Token: SeDebugPrivilege 1504 kp627831.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr031250.exepid process 2816 lr031250.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
bd28199ea4825945634f93fcd39aedb3041d4c7f10f9d1dce1d30f0d566f8853.exeziVU8586.exeziVS1940.exejr945726.exedescription pid process target process PID 4024 wrote to memory of 3488 4024 bd28199ea4825945634f93fcd39aedb3041d4c7f10f9d1dce1d30f0d566f8853.exe ziVU8586.exe PID 4024 wrote to memory of 3488 4024 bd28199ea4825945634f93fcd39aedb3041d4c7f10f9d1dce1d30f0d566f8853.exe ziVU8586.exe PID 4024 wrote to memory of 3488 4024 bd28199ea4825945634f93fcd39aedb3041d4c7f10f9d1dce1d30f0d566f8853.exe ziVU8586.exe PID 3488 wrote to memory of 2692 3488 ziVU8586.exe ziVS1940.exe PID 3488 wrote to memory of 2692 3488 ziVU8586.exe ziVS1940.exe PID 3488 wrote to memory of 2692 3488 ziVU8586.exe ziVS1940.exe PID 2692 wrote to memory of 3976 2692 ziVS1940.exe it901687.exe PID 2692 wrote to memory of 3976 2692 ziVS1940.exe it901687.exe PID 2692 wrote to memory of 3948 2692 ziVS1940.exe jr945726.exe PID 2692 wrote to memory of 3948 2692 ziVS1940.exe jr945726.exe PID 2692 wrote to memory of 3948 2692 ziVS1940.exe jr945726.exe PID 3948 wrote to memory of 2312 3948 jr945726.exe 1.exe PID 3948 wrote to memory of 2312 3948 jr945726.exe 1.exe PID 3948 wrote to memory of 2312 3948 jr945726.exe 1.exe PID 3488 wrote to memory of 1504 3488 ziVU8586.exe kp627831.exe PID 3488 wrote to memory of 1504 3488 ziVU8586.exe kp627831.exe PID 3488 wrote to memory of 1504 3488 ziVU8586.exe kp627831.exe PID 4024 wrote to memory of 2816 4024 bd28199ea4825945634f93fcd39aedb3041d4c7f10f9d1dce1d30f0d566f8853.exe lr031250.exe PID 4024 wrote to memory of 2816 4024 bd28199ea4825945634f93fcd39aedb3041d4c7f10f9d1dce1d30f0d566f8853.exe lr031250.exe PID 4024 wrote to memory of 2816 4024 bd28199ea4825945634f93fcd39aedb3041d4c7f10f9d1dce1d30f0d566f8853.exe lr031250.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd28199ea4825945634f93fcd39aedb3041d4c7f10f9d1dce1d30f0d566f8853.exe"C:\Users\Admin\AppData\Local\Temp\bd28199ea4825945634f93fcd39aedb3041d4c7f10f9d1dce1d30f0d566f8853.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVU8586.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVU8586.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziVS1940.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziVS1940.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it901687.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it901687.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3976
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr945726.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr945726.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2312
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp627831.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp627831.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr031250.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr031250.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:2816 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 6323⤵
- Program crash
PID:3752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 7083⤵
- Program crash
PID:3448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 8483⤵
- Program crash
PID:2680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 7123⤵
- Program crash
PID:2600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 8843⤵
- Program crash
PID:5108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 9363⤵
- Program crash
PID:5028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 11323⤵
- Program crash
PID:1524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 11683⤵
- Program crash
PID:4536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 11763⤵
- Program crash
PID:4736
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
724KB
MD5e52f6b10189f2dd9d77c545f917aa343
SHA166ac6ae30b9ee92da5fc07ce6c73d7916c52aff1
SHA256691e694c47151b0d8529cf288654979234bc4aa0d38a0a5b1c8b51002700528a
SHA512688e3167abadceb7b594a60356fb53e21318614b9b97c74cc435af680fdebc7aadb1721d1bfea59147f4e71df92deef5cce97af5d35a8fee274aaa3f080564b4
-
Filesize
724KB
MD5e52f6b10189f2dd9d77c545f917aa343
SHA166ac6ae30b9ee92da5fc07ce6c73d7916c52aff1
SHA256691e694c47151b0d8529cf288654979234bc4aa0d38a0a5b1c8b51002700528a
SHA512688e3167abadceb7b594a60356fb53e21318614b9b97c74cc435af680fdebc7aadb1721d1bfea59147f4e71df92deef5cce97af5d35a8fee274aaa3f080564b4
-
Filesize
169KB
MD5611a4d1e0d6e2a48bb7f8a50c3b62110
SHA19d4711b0d861cc0d723b9cabda31033b8a7d7b74
SHA256e6d6d6477be8f9b4085b35d4216ff09f023b6281256dcf0d9b11d02a86500130
SHA512408df6839d630a57198e4145e556e8a91f40b8b7b90d1a9963ec07967d686f7b9245f76347fa502a899e810d5cd810cc9daa1a37e6d6e2fc2e2f41d9ed23b09c
-
Filesize
169KB
MD5611a4d1e0d6e2a48bb7f8a50c3b62110
SHA19d4711b0d861cc0d723b9cabda31033b8a7d7b74
SHA256e6d6d6477be8f9b4085b35d4216ff09f023b6281256dcf0d9b11d02a86500130
SHA512408df6839d630a57198e4145e556e8a91f40b8b7b90d1a9963ec07967d686f7b9245f76347fa502a899e810d5cd810cc9daa1a37e6d6e2fc2e2f41d9ed23b09c
-
Filesize
570KB
MD548dfb5880c1ade79b599e3591545d62f
SHA10ced866332783bd1890054aed16963c8a4f121bf
SHA256d4e836726ed138f7afc35ceff14bdb8d4efb1c0eb79a4f7d1706d3d60778cd52
SHA5127912f154f7267f54450e8407eb1fe293ce6320a2268e59adbbf60dc74b7901ad1ceaf4591683b8c1dcc154b718b1f33f6ec4c78bdd33b532db98150188148d26
-
Filesize
570KB
MD548dfb5880c1ade79b599e3591545d62f
SHA10ced866332783bd1890054aed16963c8a4f121bf
SHA256d4e836726ed138f7afc35ceff14bdb8d4efb1c0eb79a4f7d1706d3d60778cd52
SHA5127912f154f7267f54450e8407eb1fe293ce6320a2268e59adbbf60dc74b7901ad1ceaf4591683b8c1dcc154b718b1f33f6ec4c78bdd33b532db98150188148d26
-
Filesize
11KB
MD55351d5b837b1c194f04c00cdd4af2e8d
SHA1d82acdc0184300435e358c1733b01701f72fd732
SHA2564de455193d3dbaf0b0262b2cd3d553da7cd1c314d27e8abb1619447d5cfd0301
SHA512859b193f058d77f4922fcd8a539fb72146e70e48e0582ce927b5cac95dfd190236ffa92ea35db23bd35a3a6100308fb1a86963a906b420a4c8a303017a5caa3a
-
Filesize
11KB
MD55351d5b837b1c194f04c00cdd4af2e8d
SHA1d82acdc0184300435e358c1733b01701f72fd732
SHA2564de455193d3dbaf0b0262b2cd3d553da7cd1c314d27e8abb1619447d5cfd0301
SHA512859b193f058d77f4922fcd8a539fb72146e70e48e0582ce927b5cac95dfd190236ffa92ea35db23bd35a3a6100308fb1a86963a906b420a4c8a303017a5caa3a
-
Filesize
588KB
MD5765f8b90744d5feeca73268929311626
SHA1a6b2ec27d5165d36d1456743e0a9e8603cc71783
SHA256b916a2923f0dc77d6594b31b07b8db00d92d1b8861322d0b7e54006c5dbf78a8
SHA5122095eea792ebe4c9527051f4b57d7a487b76570b03075f13ebed4105188adb6ec4a94322c80e10a6b687264875c0729b576cb03a82ea22e5854cfb494046c3f3
-
Filesize
588KB
MD5765f8b90744d5feeca73268929311626
SHA1a6b2ec27d5165d36d1456743e0a9e8603cc71783
SHA256b916a2923f0dc77d6594b31b07b8db00d92d1b8861322d0b7e54006c5dbf78a8
SHA5122095eea792ebe4c9527051f4b57d7a487b76570b03075f13ebed4105188adb6ec4a94322c80e10a6b687264875c0729b576cb03a82ea22e5854cfb494046c3f3
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1