Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14-04-2023 05:32
Static task
static1
General
-
Target
b1600c947e9f6b98eda0e41c89bf807ad449a0176407dab8edc6e98b47d0fdd3.exe
-
Size
1.0MB
-
MD5
3951b6877c31c6de9d31da5aac42058e
-
SHA1
e41fa06c0aefb1bf4b629fcbf1eb517bb3a204b7
-
SHA256
b1600c947e9f6b98eda0e41c89bf807ad449a0176407dab8edc6e98b47d0fdd3
-
SHA512
8ce5e6ea372d376245d7ad9de53cbbd8a4f926173ecaf9d81ed45bf21c2c9f6d05cfdd2f1f27729d86d57d6db83dc9c29976fa5db0fb2869d3f39a11e09d510a
-
SSDEEP
24576:xyd6v2au+MGwons9M/EWola7ozKSvJjRE1PAGjTyRyign:k8O+Qo6MNMzKShdE1nIh
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it911365.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it911365.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it911365.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it911365.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it911365.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it911365.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
Processes:
zido4038.exezihx2108.exeit911365.exejr078113.exe1.exekp694763.exelr294971.exepid process 4280 zido4038.exe 4612 zihx2108.exe 4960 it911365.exe 1460 jr078113.exe 2528 1.exe 2284 kp694763.exe 2692 lr294971.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it911365.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it911365.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
b1600c947e9f6b98eda0e41c89bf807ad449a0176407dab8edc6e98b47d0fdd3.exezido4038.exezihx2108.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b1600c947e9f6b98eda0e41c89bf807ad449a0176407dab8edc6e98b47d0fdd3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b1600c947e9f6b98eda0e41c89bf807ad449a0176407dab8edc6e98b47d0fdd3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zido4038.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zido4038.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zihx2108.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zihx2108.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2680 2692 WerFault.exe lr294971.exe 4180 2692 WerFault.exe lr294971.exe 3620 2692 WerFault.exe lr294971.exe 4628 2692 WerFault.exe lr294971.exe 3636 2692 WerFault.exe lr294971.exe 1736 2692 WerFault.exe lr294971.exe 2172 2692 WerFault.exe lr294971.exe 3828 2692 WerFault.exe lr294971.exe 3804 2692 WerFault.exe lr294971.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it911365.exe1.exekp694763.exepid process 4960 it911365.exe 4960 it911365.exe 2528 1.exe 2284 kp694763.exe 2284 kp694763.exe 2528 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it911365.exejr078113.exe1.exekp694763.exedescription pid process Token: SeDebugPrivilege 4960 it911365.exe Token: SeDebugPrivilege 1460 jr078113.exe Token: SeDebugPrivilege 2528 1.exe Token: SeDebugPrivilege 2284 kp694763.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr294971.exepid process 2692 lr294971.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
b1600c947e9f6b98eda0e41c89bf807ad449a0176407dab8edc6e98b47d0fdd3.exezido4038.exezihx2108.exejr078113.exedescription pid process target process PID 4264 wrote to memory of 4280 4264 b1600c947e9f6b98eda0e41c89bf807ad449a0176407dab8edc6e98b47d0fdd3.exe zido4038.exe PID 4264 wrote to memory of 4280 4264 b1600c947e9f6b98eda0e41c89bf807ad449a0176407dab8edc6e98b47d0fdd3.exe zido4038.exe PID 4264 wrote to memory of 4280 4264 b1600c947e9f6b98eda0e41c89bf807ad449a0176407dab8edc6e98b47d0fdd3.exe zido4038.exe PID 4280 wrote to memory of 4612 4280 zido4038.exe zihx2108.exe PID 4280 wrote to memory of 4612 4280 zido4038.exe zihx2108.exe PID 4280 wrote to memory of 4612 4280 zido4038.exe zihx2108.exe PID 4612 wrote to memory of 4960 4612 zihx2108.exe it911365.exe PID 4612 wrote to memory of 4960 4612 zihx2108.exe it911365.exe PID 4612 wrote to memory of 1460 4612 zihx2108.exe jr078113.exe PID 4612 wrote to memory of 1460 4612 zihx2108.exe jr078113.exe PID 4612 wrote to memory of 1460 4612 zihx2108.exe jr078113.exe PID 1460 wrote to memory of 2528 1460 jr078113.exe 1.exe PID 1460 wrote to memory of 2528 1460 jr078113.exe 1.exe PID 1460 wrote to memory of 2528 1460 jr078113.exe 1.exe PID 4280 wrote to memory of 2284 4280 zido4038.exe kp694763.exe PID 4280 wrote to memory of 2284 4280 zido4038.exe kp694763.exe PID 4280 wrote to memory of 2284 4280 zido4038.exe kp694763.exe PID 4264 wrote to memory of 2692 4264 b1600c947e9f6b98eda0e41c89bf807ad449a0176407dab8edc6e98b47d0fdd3.exe lr294971.exe PID 4264 wrote to memory of 2692 4264 b1600c947e9f6b98eda0e41c89bf807ad449a0176407dab8edc6e98b47d0fdd3.exe lr294971.exe PID 4264 wrote to memory of 2692 4264 b1600c947e9f6b98eda0e41c89bf807ad449a0176407dab8edc6e98b47d0fdd3.exe lr294971.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1600c947e9f6b98eda0e41c89bf807ad449a0176407dab8edc6e98b47d0fdd3.exe"C:\Users\Admin\AppData\Local\Temp\b1600c947e9f6b98eda0e41c89bf807ad449a0176407dab8edc6e98b47d0fdd3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zido4038.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zido4038.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zihx2108.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zihx2108.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it911365.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it911365.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr078113.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr078113.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp694763.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp694763.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr294971.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr294971.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:2692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 6283⤵
- Program crash
PID:2680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 7043⤵
- Program crash
PID:4180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 8443⤵
- Program crash
PID:3620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 8523⤵
- Program crash
PID:4628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 8923⤵
- Program crash
PID:3636
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 9083⤵
- Program crash
PID:1736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 11203⤵
- Program crash
PID:2172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 11483⤵
- Program crash
PID:3828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 10963⤵
- Program crash
PID:3804
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
723KB
MD5d5d874512e2bc4bb277af698017ef706
SHA1b1a1240a31ae12f98918147f775700e6c10be510
SHA2564ac465140e5a42ffe7b53f7beabd8bdd75567ec3af8557650902f03297408bd3
SHA512e71feb7446819be63bfcc53e621971a9e0d2d5f88f133cbdc86acc4cbb2a29eeb2537bee47c9c4f04784bb2d6efb130042379393874b0eab1bad2daad97eb5c3
-
Filesize
723KB
MD5d5d874512e2bc4bb277af698017ef706
SHA1b1a1240a31ae12f98918147f775700e6c10be510
SHA2564ac465140e5a42ffe7b53f7beabd8bdd75567ec3af8557650902f03297408bd3
SHA512e71feb7446819be63bfcc53e621971a9e0d2d5f88f133cbdc86acc4cbb2a29eeb2537bee47c9c4f04784bb2d6efb130042379393874b0eab1bad2daad97eb5c3
-
Filesize
169KB
MD594dbc677f498c11c05f997d3525e8c02
SHA1de651918ef7923a425f1e493ce5bfd261a872884
SHA256793ed19f51ac59ff0092b145e4e9170e93199787a20686c55321d36c4fd188b7
SHA5122c797cd32bcae69e7a13515077389965ad2d230f12f03ec4a2bf5f21afa153481bd2d02c7ecb09c6ca618abb5f4f944abb58298eed72195caae110b4a982d43c
-
Filesize
169KB
MD594dbc677f498c11c05f997d3525e8c02
SHA1de651918ef7923a425f1e493ce5bfd261a872884
SHA256793ed19f51ac59ff0092b145e4e9170e93199787a20686c55321d36c4fd188b7
SHA5122c797cd32bcae69e7a13515077389965ad2d230f12f03ec4a2bf5f21afa153481bd2d02c7ecb09c6ca618abb5f4f944abb58298eed72195caae110b4a982d43c
-
Filesize
569KB
MD5898d6afd145cc94e29be0ff68288ade2
SHA139bce7811960d1077bd93d6d82b3bfbbda3f9d0d
SHA2566725b688371e5a114e61fb03c55f94a041d42ba49dfc5a813e8a744ad943666d
SHA51266cf6aa23486cd563327ac92bdc7baa9ed9bf20599c7fc6c89e53454ab4a2ef45f6d5b824703a57b96fecd84df10ff8bf7e3915e812ae1cdcae556df26c37c26
-
Filesize
569KB
MD5898d6afd145cc94e29be0ff68288ade2
SHA139bce7811960d1077bd93d6d82b3bfbbda3f9d0d
SHA2566725b688371e5a114e61fb03c55f94a041d42ba49dfc5a813e8a744ad943666d
SHA51266cf6aa23486cd563327ac92bdc7baa9ed9bf20599c7fc6c89e53454ab4a2ef45f6d5b824703a57b96fecd84df10ff8bf7e3915e812ae1cdcae556df26c37c26
-
Filesize
11KB
MD54759c87cb8aae3b368ce489ed3888406
SHA1428b9a715af61d129a9a86145884f344a557f1aa
SHA25648ebc806315e6f54059fd03b98c5c853e0e3a457b1f1d8dc6fa61f57470b7f62
SHA512e8b16bbc37b67efcbee78d2085487f57d909e4e84160e6fbef838a403f5642d86b330db35ea0887b89629176ed684a8d2c4ef76a32724dbb4b35aead6ef16d04
-
Filesize
11KB
MD54759c87cb8aae3b368ce489ed3888406
SHA1428b9a715af61d129a9a86145884f344a557f1aa
SHA25648ebc806315e6f54059fd03b98c5c853e0e3a457b1f1d8dc6fa61f57470b7f62
SHA512e8b16bbc37b67efcbee78d2085487f57d909e4e84160e6fbef838a403f5642d86b330db35ea0887b89629176ed684a8d2c4ef76a32724dbb4b35aead6ef16d04
-
Filesize
588KB
MD5a6f26848afe6de730a49442241bc4c85
SHA107ccf6545d17a3fc5c623a907d1ecf6926e9c44b
SHA256fabc427c85659e9de01ddd2357b34517fe43b6efc93c5cdeead1d8e7a83b09ed
SHA51222c0a25d867923c714a8a3d1241aa5d96a4fc879fdb1678d3deda0fa33566c3edecc8a7c8e414d5d030640487c01ac1b0457b44943d4ad97e3b5557c2eb7f31f
-
Filesize
588KB
MD5a6f26848afe6de730a49442241bc4c85
SHA107ccf6545d17a3fc5c623a907d1ecf6926e9c44b
SHA256fabc427c85659e9de01ddd2357b34517fe43b6efc93c5cdeead1d8e7a83b09ed
SHA51222c0a25d867923c714a8a3d1241aa5d96a4fc879fdb1678d3deda0fa33566c3edecc8a7c8e414d5d030640487c01ac1b0457b44943d4ad97e3b5557c2eb7f31f
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1