Analysis
-
max time kernel
146s -
max time network
104s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14/04/2023, 04:42
Static task
static1
General
-
Target
14d7cb8e6f00bf9274e6c9e5876dd0776c38aa57159204b02410d9d7014d543e.exe
-
Size
1.2MB
-
MD5
33b429ab987b94bedaadbee3ace605ad
-
SHA1
415bcaff11d286db457be789afc0e1bda55dd79b
-
SHA256
14d7cb8e6f00bf9274e6c9e5876dd0776c38aa57159204b02410d9d7014d543e
-
SHA512
e4fc5e31c3c6141353cb4b08ddfec4a1c319c94884552cfbc39a491bf1870b3316e39bc1750a043a0ef80a981705917e9054b2c8afd6b0c766c8167d02cb6544
-
SSDEEP
24576:6yRirsymh6DcdRtkUVzn5Eq7Ymra/mSZJgRc9we8yO5b5AnkKU:BWCzdRtkUrrG/mSfQryOs
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr010396.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr010396.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr010396.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr010396.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr010396.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2572 un024945.exe 3196 un101667.exe 4872 pr010396.exe 2784 qu208739.exe 4164 1.exe 1972 rk708001.exe 4876 si661681.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr010396.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr010396.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un101667.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un101667.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 14d7cb8e6f00bf9274e6c9e5876dd0776c38aa57159204b02410d9d7014d543e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 14d7cb8e6f00bf9274e6c9e5876dd0776c38aa57159204b02410d9d7014d543e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un024945.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un024945.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
pid pid_target Process procid_target 1648 4876 WerFault.exe 73 4676 4876 WerFault.exe 73 1348 4876 WerFault.exe 73 4288 4876 WerFault.exe 73 3084 4876 WerFault.exe 73 3924 4876 WerFault.exe 73 1536 4876 WerFault.exe 73 1404 4876 WerFault.exe 73 4600 4876 WerFault.exe 73 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4872 pr010396.exe 4872 pr010396.exe 1972 rk708001.exe 4164 1.exe 1972 rk708001.exe 4164 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4872 pr010396.exe Token: SeDebugPrivilege 2784 qu208739.exe Token: SeDebugPrivilege 1972 rk708001.exe Token: SeDebugPrivilege 4164 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4876 si661681.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2572 2496 14d7cb8e6f00bf9274e6c9e5876dd0776c38aa57159204b02410d9d7014d543e.exe 66 PID 2496 wrote to memory of 2572 2496 14d7cb8e6f00bf9274e6c9e5876dd0776c38aa57159204b02410d9d7014d543e.exe 66 PID 2496 wrote to memory of 2572 2496 14d7cb8e6f00bf9274e6c9e5876dd0776c38aa57159204b02410d9d7014d543e.exe 66 PID 2572 wrote to memory of 3196 2572 un024945.exe 67 PID 2572 wrote to memory of 3196 2572 un024945.exe 67 PID 2572 wrote to memory of 3196 2572 un024945.exe 67 PID 3196 wrote to memory of 4872 3196 un101667.exe 68 PID 3196 wrote to memory of 4872 3196 un101667.exe 68 PID 3196 wrote to memory of 4872 3196 un101667.exe 68 PID 3196 wrote to memory of 2784 3196 un101667.exe 69 PID 3196 wrote to memory of 2784 3196 un101667.exe 69 PID 3196 wrote to memory of 2784 3196 un101667.exe 69 PID 2784 wrote to memory of 4164 2784 qu208739.exe 70 PID 2784 wrote to memory of 4164 2784 qu208739.exe 70 PID 2784 wrote to memory of 4164 2784 qu208739.exe 70 PID 2572 wrote to memory of 1972 2572 un024945.exe 71 PID 2572 wrote to memory of 1972 2572 un024945.exe 71 PID 2572 wrote to memory of 1972 2572 un024945.exe 71 PID 2496 wrote to memory of 4876 2496 14d7cb8e6f00bf9274e6c9e5876dd0776c38aa57159204b02410d9d7014d543e.exe 73 PID 2496 wrote to memory of 4876 2496 14d7cb8e6f00bf9274e6c9e5876dd0776c38aa57159204b02410d9d7014d543e.exe 73 PID 2496 wrote to memory of 4876 2496 14d7cb8e6f00bf9274e6c9e5876dd0776c38aa57159204b02410d9d7014d543e.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\14d7cb8e6f00bf9274e6c9e5876dd0776c38aa57159204b02410d9d7014d543e.exe"C:\Users\Admin\AppData\Local\Temp\14d7cb8e6f00bf9274e6c9e5876dd0776c38aa57159204b02410d9d7014d543e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un024945.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un024945.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un101667.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un101667.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr010396.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr010396.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4872
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu208739.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu208739.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4164
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk708001.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk708001.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si661681.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si661681.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:4876 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 6363⤵
- Program crash
PID:1648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 7083⤵
- Program crash
PID:4676
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 8483⤵
- Program crash
PID:1348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 8563⤵
- Program crash
PID:4288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 8843⤵
- Program crash
PID:3084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 8603⤵
- Program crash
PID:3924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 11323⤵
- Program crash
PID:1536
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 11563⤵
- Program crash
PID:1404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 11643⤵
- Program crash
PID:4600
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
862KB
MD5d43d3827423d24f428f33f4a2fd2cd81
SHA1ca5be280414959ab36b6166c8e7a55eab29c2dd5
SHA25677ba2aef8448b88a881a04e17d3e6fe0ad292871838e23e90d7bd75f11c46709
SHA512bb17f431142705d1314f55d8acc9af67751b834e61cb867dfbdc88b07f95d5c8cfa67a932c77c62142c4869649448657c81abd3dcae771df3313f395a72ed9a0
-
Filesize
862KB
MD5d43d3827423d24f428f33f4a2fd2cd81
SHA1ca5be280414959ab36b6166c8e7a55eab29c2dd5
SHA25677ba2aef8448b88a881a04e17d3e6fe0ad292871838e23e90d7bd75f11c46709
SHA512bb17f431142705d1314f55d8acc9af67751b834e61cb867dfbdc88b07f95d5c8cfa67a932c77c62142c4869649448657c81abd3dcae771df3313f395a72ed9a0
-
Filesize
169KB
MD5aa025cfd7e4313347676a991a44bd427
SHA104187a94d216f9bc9c6f976d0aadf35f67a17b10
SHA25659606560ca7f7e4a410b982da983a59f9ad7f4ed24f61b2f0ff398fbb6169511
SHA5128ac54576a160db45193178e78aa4aa6af611b3e73d93c4cbaf6be71b61ab2e6de40acb40fe3b1f6a3e2c748926f9c675999519c15361e88d9766719400906cb3
-
Filesize
169KB
MD5aa025cfd7e4313347676a991a44bd427
SHA104187a94d216f9bc9c6f976d0aadf35f67a17b10
SHA25659606560ca7f7e4a410b982da983a59f9ad7f4ed24f61b2f0ff398fbb6169511
SHA5128ac54576a160db45193178e78aa4aa6af611b3e73d93c4cbaf6be71b61ab2e6de40acb40fe3b1f6a3e2c748926f9c675999519c15361e88d9766719400906cb3
-
Filesize
709KB
MD56c72b838d6c210da739c84b7475979b5
SHA11ef1150756bc95327bac7941510a1cc34d45655f
SHA25605241fa2d8ccd1fc044cb865afb49003c12b9fe684214d11495280a0d506ef23
SHA5126207e709d565f3070da94e0ecbf6d3d3495a9dda4be0e4f3e1c186170a4eed50d4898ecb53be1f6412ec0ff04c63c64f6943b54469af6c79fccfecac47667d76
-
Filesize
709KB
MD56c72b838d6c210da739c84b7475979b5
SHA11ef1150756bc95327bac7941510a1cc34d45655f
SHA25605241fa2d8ccd1fc044cb865afb49003c12b9fe684214d11495280a0d506ef23
SHA5126207e709d565f3070da94e0ecbf6d3d3495a9dda4be0e4f3e1c186170a4eed50d4898ecb53be1f6412ec0ff04c63c64f6943b54469af6c79fccfecac47667d76
-
Filesize
405KB
MD5b9e8f3750e3ed4ec9468758b4f583cb1
SHA1f98fbafc5c27a3fd85f006e579a2829f92c25d4e
SHA256f754f917a3fd2308f025ccb446b52645bfe7e809dbea703692654bb5edeee139
SHA5129a1a44b02dceaf5be72edcb4962a3b405d7311af9f640a7f1feca8aee1ad5b36832e26739fafe0f255b0c770a5527a56c1ae21c6a9a197baac79a68472e6c0fb
-
Filesize
405KB
MD5b9e8f3750e3ed4ec9468758b4f583cb1
SHA1f98fbafc5c27a3fd85f006e579a2829f92c25d4e
SHA256f754f917a3fd2308f025ccb446b52645bfe7e809dbea703692654bb5edeee139
SHA5129a1a44b02dceaf5be72edcb4962a3b405d7311af9f640a7f1feca8aee1ad5b36832e26739fafe0f255b0c770a5527a56c1ae21c6a9a197baac79a68472e6c0fb
-
Filesize
588KB
MD5e6d247eb88c46275b9eb447cd8c7978c
SHA12a49b0300316593d757baba714feff66de1489bf
SHA256e9230ba8bb3e967cc26af42e074c500eb6a6f082d8d46d37cc24a4437d0afc07
SHA512b592d338400fead8a0a98c3756ac6d81a1d68d58de680ae314fd8ec458c830486809c9048cd148c3ec0fd17563a4959d3e6a12c961430b535b7a6d092d092345
-
Filesize
588KB
MD5e6d247eb88c46275b9eb447cd8c7978c
SHA12a49b0300316593d757baba714feff66de1489bf
SHA256e9230ba8bb3e967cc26af42e074c500eb6a6f082d8d46d37cc24a4437d0afc07
SHA512b592d338400fead8a0a98c3756ac6d81a1d68d58de680ae314fd8ec458c830486809c9048cd148c3ec0fd17563a4959d3e6a12c961430b535b7a6d092d092345
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1