Analysis
-
max time kernel
145s -
max time network
103s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14-04-2023 04:13
Static task
static1
General
-
Target
9cdbd3232461b9d7bee4aede10b6482e2cd1bb655c25323671b3c3d2d1124e08.exe
-
Size
1.0MB
-
MD5
9569cd44dca7997fb5d8b825ffd6a15e
-
SHA1
f342331d878a2d59dda31fdbe0ed91558941d482
-
SHA256
9cdbd3232461b9d7bee4aede10b6482e2cd1bb655c25323671b3c3d2d1124e08
-
SHA512
80d0b74ce9cbbd1dae6417d10c52b12794bfed02e0b2c43eabd9eb164df4e0744d743a39d5d1a27df5d35aaf275859a44b5e9076fafb883a60bf1f73f9348d97
-
SSDEEP
24576:TyH2iAmO5pOFcVDIl2Sou1PHVjmZmNTfJhw+QyQ3TL:mu37phAP1jum1Jhe
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it437365.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it437365.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it437365.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it437365.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it437365.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it437365.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
Processes:
ziGF0839.exeziRM3157.exeit437365.exejr211250.exe1.exekp019944.exelr290298.exepid process 3512 ziGF0839.exe 1728 ziRM3157.exe 3972 it437365.exe 1660 jr211250.exe 1648 1.exe 304 kp019944.exe 4132 lr290298.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it437365.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it437365.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
ziRM3157.exe9cdbd3232461b9d7bee4aede10b6482e2cd1bb655c25323671b3c3d2d1124e08.exeziGF0839.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziRM3157.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9cdbd3232461b9d7bee4aede10b6482e2cd1bb655c25323671b3c3d2d1124e08.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9cdbd3232461b9d7bee4aede10b6482e2cd1bb655c25323671b3c3d2d1124e08.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziGF0839.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziGF0839.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziRM3157.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4956 4132 WerFault.exe lr290298.exe 3428 4132 WerFault.exe lr290298.exe 4484 4132 WerFault.exe lr290298.exe 4412 4132 WerFault.exe lr290298.exe 3916 4132 WerFault.exe lr290298.exe 2580 4132 WerFault.exe lr290298.exe 4636 4132 WerFault.exe lr290298.exe 4656 4132 WerFault.exe lr290298.exe 2056 4132 WerFault.exe lr290298.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it437365.exekp019944.exe1.exepid process 3972 it437365.exe 3972 it437365.exe 304 kp019944.exe 304 kp019944.exe 1648 1.exe 1648 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it437365.exejr211250.exekp019944.exe1.exedescription pid process Token: SeDebugPrivilege 3972 it437365.exe Token: SeDebugPrivilege 1660 jr211250.exe Token: SeDebugPrivilege 304 kp019944.exe Token: SeDebugPrivilege 1648 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr290298.exepid process 4132 lr290298.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
9cdbd3232461b9d7bee4aede10b6482e2cd1bb655c25323671b3c3d2d1124e08.exeziGF0839.exeziRM3157.exejr211250.exedescription pid process target process PID 4024 wrote to memory of 3512 4024 9cdbd3232461b9d7bee4aede10b6482e2cd1bb655c25323671b3c3d2d1124e08.exe ziGF0839.exe PID 4024 wrote to memory of 3512 4024 9cdbd3232461b9d7bee4aede10b6482e2cd1bb655c25323671b3c3d2d1124e08.exe ziGF0839.exe PID 4024 wrote to memory of 3512 4024 9cdbd3232461b9d7bee4aede10b6482e2cd1bb655c25323671b3c3d2d1124e08.exe ziGF0839.exe PID 3512 wrote to memory of 1728 3512 ziGF0839.exe ziRM3157.exe PID 3512 wrote to memory of 1728 3512 ziGF0839.exe ziRM3157.exe PID 3512 wrote to memory of 1728 3512 ziGF0839.exe ziRM3157.exe PID 1728 wrote to memory of 3972 1728 ziRM3157.exe it437365.exe PID 1728 wrote to memory of 3972 1728 ziRM3157.exe it437365.exe PID 1728 wrote to memory of 1660 1728 ziRM3157.exe jr211250.exe PID 1728 wrote to memory of 1660 1728 ziRM3157.exe jr211250.exe PID 1728 wrote to memory of 1660 1728 ziRM3157.exe jr211250.exe PID 1660 wrote to memory of 1648 1660 jr211250.exe 1.exe PID 1660 wrote to memory of 1648 1660 jr211250.exe 1.exe PID 1660 wrote to memory of 1648 1660 jr211250.exe 1.exe PID 3512 wrote to memory of 304 3512 ziGF0839.exe kp019944.exe PID 3512 wrote to memory of 304 3512 ziGF0839.exe kp019944.exe PID 3512 wrote to memory of 304 3512 ziGF0839.exe kp019944.exe PID 4024 wrote to memory of 4132 4024 9cdbd3232461b9d7bee4aede10b6482e2cd1bb655c25323671b3c3d2d1124e08.exe lr290298.exe PID 4024 wrote to memory of 4132 4024 9cdbd3232461b9d7bee4aede10b6482e2cd1bb655c25323671b3c3d2d1124e08.exe lr290298.exe PID 4024 wrote to memory of 4132 4024 9cdbd3232461b9d7bee4aede10b6482e2cd1bb655c25323671b3c3d2d1124e08.exe lr290298.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9cdbd3232461b9d7bee4aede10b6482e2cd1bb655c25323671b3c3d2d1124e08.exe"C:\Users\Admin\AppData\Local\Temp\9cdbd3232461b9d7bee4aede10b6482e2cd1bb655c25323671b3c3d2d1124e08.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGF0839.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGF0839.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziRM3157.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziRM3157.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it437365.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it437365.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3972
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr211250.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr211250.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp019944.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp019944.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:304
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr290298.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr290298.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:4132 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4132 -s 6323⤵
- Program crash
PID:4956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4132 -s 7083⤵
- Program crash
PID:3428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4132 -s 8483⤵
- Program crash
PID:4484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4132 -s 8963⤵
- Program crash
PID:4412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4132 -s 6523⤵
- Program crash
PID:3916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4132 -s 8963⤵
- Program crash
PID:2580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4132 -s 11283⤵
- Program crash
PID:4636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4132 -s 11603⤵
- Program crash
PID:4656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4132 -s 11163⤵
- Program crash
PID:2056
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
723KB
MD5c03ff6f2d3aba73a7783b1cc437fc279
SHA1df0a1ebb46a118a5e896bb95fd32e43a4a616a56
SHA2565a50664adef19dcfd50c14275507767338391c3d32198c558e49f10d18d54668
SHA5123a0685df4a68d1b015052f9b22ad34d4e62ec2d3baaf90fe2c81ce43c341f934b3f4727d24d223ccbd7f5f3d030271cdc7c1a019fe39704979c5e085985c2c63
-
Filesize
723KB
MD5c03ff6f2d3aba73a7783b1cc437fc279
SHA1df0a1ebb46a118a5e896bb95fd32e43a4a616a56
SHA2565a50664adef19dcfd50c14275507767338391c3d32198c558e49f10d18d54668
SHA5123a0685df4a68d1b015052f9b22ad34d4e62ec2d3baaf90fe2c81ce43c341f934b3f4727d24d223ccbd7f5f3d030271cdc7c1a019fe39704979c5e085985c2c63
-
Filesize
169KB
MD5b859a66069e69aa2cfec26a31735b248
SHA1ebff9c5dce7c90d97fe4d1b11175b83013396555
SHA2568e470de70290277688a9d47f49dc1d59f6eae0b6a4da7743f353cf64664b48b1
SHA512e9ce40a253d33c5b078b9f0f401ee47dcd4a1d534fd96be129d7bd6df88f82c30d8294e8ff2f99b440977f79800908baeb33fde66726280a7c7636ab3e72d6d7
-
Filesize
169KB
MD5b859a66069e69aa2cfec26a31735b248
SHA1ebff9c5dce7c90d97fe4d1b11175b83013396555
SHA2568e470de70290277688a9d47f49dc1d59f6eae0b6a4da7743f353cf64664b48b1
SHA512e9ce40a253d33c5b078b9f0f401ee47dcd4a1d534fd96be129d7bd6df88f82c30d8294e8ff2f99b440977f79800908baeb33fde66726280a7c7636ab3e72d6d7
-
Filesize
570KB
MD57dc1eaca3deec9003e8e71a909252cab
SHA14fa08c6e072a218241ed7d2282b57a5b0ca5dac3
SHA25623793353f1b7a93f18d165f32786421e020ceb6b4ccaa761c60cf5d888c9247e
SHA512f48e61db13646d852635ebb66c506382a8b70834a8fa993e48b94292ad0f1b6da99bf5ea26c3a59eda668ee713cd4808fc7a516a366359f1bee3ce55e0e58fe6
-
Filesize
570KB
MD57dc1eaca3deec9003e8e71a909252cab
SHA14fa08c6e072a218241ed7d2282b57a5b0ca5dac3
SHA25623793353f1b7a93f18d165f32786421e020ceb6b4ccaa761c60cf5d888c9247e
SHA512f48e61db13646d852635ebb66c506382a8b70834a8fa993e48b94292ad0f1b6da99bf5ea26c3a59eda668ee713cd4808fc7a516a366359f1bee3ce55e0e58fe6
-
Filesize
11KB
MD5828300f560feecb4cdbb1c53e220b99f
SHA170ceed854594307ab357352ee2ef6fbbd78203c7
SHA2567a323fd196a22a4dc019537701e2621889456e707ea805606449b285a6ccd993
SHA5121655f113637c0458af6984dbcba500e78890c4ab3ece61a7c2554498233b230ce312acb4d902bb6e68593c04c21ee6ac2b38950db572823cb42b9d363d2b4c49
-
Filesize
11KB
MD5828300f560feecb4cdbb1c53e220b99f
SHA170ceed854594307ab357352ee2ef6fbbd78203c7
SHA2567a323fd196a22a4dc019537701e2621889456e707ea805606449b285a6ccd993
SHA5121655f113637c0458af6984dbcba500e78890c4ab3ece61a7c2554498233b230ce312acb4d902bb6e68593c04c21ee6ac2b38950db572823cb42b9d363d2b4c49
-
Filesize
588KB
MD5a3960d9b157ed3999a2a9bcc0a347d63
SHA1d0c4dd383d266c8a91e5d888318f5120ca3c052e
SHA25621a84b8ebf10789bf1eb1c8c31b96057deba1b92e4b994e71580a938f1eb4851
SHA512f701e3dedf7d493a0ec064e3505acb4ed77f8c5a64700e924d77474e00bace8ccacd39ad7751635c710ae9909371ff3d80ddca004d178414570b45fd73abbd97
-
Filesize
588KB
MD5a3960d9b157ed3999a2a9bcc0a347d63
SHA1d0c4dd383d266c8a91e5d888318f5120ca3c052e
SHA25621a84b8ebf10789bf1eb1c8c31b96057deba1b92e4b994e71580a938f1eb4851
SHA512f701e3dedf7d493a0ec064e3505acb4ed77f8c5a64700e924d77474e00bace8ccacd39ad7751635c710ae9909371ff3d80ddca004d178414570b45fd73abbd97
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1