Analysis
-
max time kernel
146s -
max time network
103s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14-04-2023 04:45
Static task
static1
General
-
Target
5bb9f97c6296ff0a05eb6a08179b38cf2026263eb8aaeb46e38c30d7dfe65156.exe
-
Size
1.2MB
-
MD5
1a064d872e44db0a3e602f64c2c3b14b
-
SHA1
262a64c487ff48a77c2e31370af4dd21e769ab5a
-
SHA256
5bb9f97c6296ff0a05eb6a08179b38cf2026263eb8aaeb46e38c30d7dfe65156
-
SHA512
3cf7bf2b3f963ef333907f750a671d5edcbe57308d6de291f3755deedcb9f75334db3527ae26f079adaabd689fdb84db0d55b01b454c1ba50ba687ccec4d3926
-
SSDEEP
24576:xy8U7xZZzx3bImK3O9Q4398nrYAmRbjSZJYRveTwZobHjpo8gOwqFp:kTx0mn9QW9W0bjSfoveKozjpo8hw
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
pr280846.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr280846.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr280846.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr280846.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr280846.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr280846.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
Processes:
un712266.exeun905090.exepr280846.exequ082711.exe1.exerk417639.exesi298930.exepid process 1592 un712266.exe 1968 un905090.exe 964 pr280846.exe 4712 qu082711.exe 2296 1.exe 3940 rk417639.exe 1608 si298930.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr280846.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr280846.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr280846.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
5bb9f97c6296ff0a05eb6a08179b38cf2026263eb8aaeb46e38c30d7dfe65156.exeun712266.exeun905090.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5bb9f97c6296ff0a05eb6a08179b38cf2026263eb8aaeb46e38c30d7dfe65156.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un712266.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un712266.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un905090.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un905090.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5bb9f97c6296ff0a05eb6a08179b38cf2026263eb8aaeb46e38c30d7dfe65156.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2156 1608 WerFault.exe si298930.exe 2356 1608 WerFault.exe si298930.exe 4256 1608 WerFault.exe si298930.exe 2064 1608 WerFault.exe si298930.exe 4392 1608 WerFault.exe si298930.exe 4376 1608 WerFault.exe si298930.exe 4640 1608 WerFault.exe si298930.exe 1236 1608 WerFault.exe si298930.exe 1936 1608 WerFault.exe si298930.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr280846.exerk417639.exe1.exepid process 964 pr280846.exe 964 pr280846.exe 3940 rk417639.exe 2296 1.exe 3940 rk417639.exe 2296 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pr280846.exequ082711.exerk417639.exe1.exedescription pid process Token: SeDebugPrivilege 964 pr280846.exe Token: SeDebugPrivilege 4712 qu082711.exe Token: SeDebugPrivilege 3940 rk417639.exe Token: SeDebugPrivilege 2296 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si298930.exepid process 1608 si298930.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
5bb9f97c6296ff0a05eb6a08179b38cf2026263eb8aaeb46e38c30d7dfe65156.exeun712266.exeun905090.exequ082711.exedescription pid process target process PID 1444 wrote to memory of 1592 1444 5bb9f97c6296ff0a05eb6a08179b38cf2026263eb8aaeb46e38c30d7dfe65156.exe un712266.exe PID 1444 wrote to memory of 1592 1444 5bb9f97c6296ff0a05eb6a08179b38cf2026263eb8aaeb46e38c30d7dfe65156.exe un712266.exe PID 1444 wrote to memory of 1592 1444 5bb9f97c6296ff0a05eb6a08179b38cf2026263eb8aaeb46e38c30d7dfe65156.exe un712266.exe PID 1592 wrote to memory of 1968 1592 un712266.exe un905090.exe PID 1592 wrote to memory of 1968 1592 un712266.exe un905090.exe PID 1592 wrote to memory of 1968 1592 un712266.exe un905090.exe PID 1968 wrote to memory of 964 1968 un905090.exe pr280846.exe PID 1968 wrote to memory of 964 1968 un905090.exe pr280846.exe PID 1968 wrote to memory of 964 1968 un905090.exe pr280846.exe PID 1968 wrote to memory of 4712 1968 un905090.exe qu082711.exe PID 1968 wrote to memory of 4712 1968 un905090.exe qu082711.exe PID 1968 wrote to memory of 4712 1968 un905090.exe qu082711.exe PID 4712 wrote to memory of 2296 4712 qu082711.exe 1.exe PID 4712 wrote to memory of 2296 4712 qu082711.exe 1.exe PID 4712 wrote to memory of 2296 4712 qu082711.exe 1.exe PID 1592 wrote to memory of 3940 1592 un712266.exe rk417639.exe PID 1592 wrote to memory of 3940 1592 un712266.exe rk417639.exe PID 1592 wrote to memory of 3940 1592 un712266.exe rk417639.exe PID 1444 wrote to memory of 1608 1444 5bb9f97c6296ff0a05eb6a08179b38cf2026263eb8aaeb46e38c30d7dfe65156.exe si298930.exe PID 1444 wrote to memory of 1608 1444 5bb9f97c6296ff0a05eb6a08179b38cf2026263eb8aaeb46e38c30d7dfe65156.exe si298930.exe PID 1444 wrote to memory of 1608 1444 5bb9f97c6296ff0a05eb6a08179b38cf2026263eb8aaeb46e38c30d7dfe65156.exe si298930.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bb9f97c6296ff0a05eb6a08179b38cf2026263eb8aaeb46e38c30d7dfe65156.exe"C:\Users\Admin\AppData\Local\Temp\5bb9f97c6296ff0a05eb6a08179b38cf2026263eb8aaeb46e38c30d7dfe65156.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un712266.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un712266.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un905090.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un905090.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr280846.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr280846.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:964
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu082711.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu082711.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2296
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk417639.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk417639.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3940
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si298930.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si298930.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:1608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 6283⤵
- Program crash
PID:2156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 7043⤵
- Program crash
PID:2356
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 8443⤵
- Program crash
PID:4256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 8243⤵
- Program crash
PID:2064
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 8803⤵
- Program crash
PID:4392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 8523⤵
- Program crash
PID:4376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 11243⤵
- Program crash
PID:4640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 11563⤵
- Program crash
PID:1236
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 11243⤵
- Program crash
PID:1936
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
397KB
MD573322119dde2931ef4675da872b6e388
SHA1666909e836d4896520d7b01669820f0e8eb103a1
SHA256a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3
SHA512360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef
-
Filesize
862KB
MD5e6d81a507a6f5b99ae26209b66283219
SHA1e9013d24108339fed91840e07e0690b8a7e01ac3
SHA25672bec559113470044cee3b0f18a1ac7dec597e54a2c42be2f9d3fc1d5c7f2acc
SHA51247e91ccf71146e113ee1fc958b9489d24d3e707ef9a915bf9773d22a82aef02715972ad45e48361eea949aa8f4ddd8d2104f2587172ec47be017490fd2891ef7
-
Filesize
862KB
MD5e6d81a507a6f5b99ae26209b66283219
SHA1e9013d24108339fed91840e07e0690b8a7e01ac3
SHA25672bec559113470044cee3b0f18a1ac7dec597e54a2c42be2f9d3fc1d5c7f2acc
SHA51247e91ccf71146e113ee1fc958b9489d24d3e707ef9a915bf9773d22a82aef02715972ad45e48361eea949aa8f4ddd8d2104f2587172ec47be017490fd2891ef7
-
Filesize
169KB
MD5706af334e799ebf47df21ec79922b21b
SHA1cc4b11e5678e1078f898e2cf6cd09f30b0e00531
SHA2565d26349324bb29bb99a225e8a3f062334518adc027e2d15430e15352aebca61b
SHA51288a712d2a80e564bcd0802b6cf49ed3a1dfae9d0cc739c2a5bfff859a53db6780c363df2732da9e1db972450f7e49bda5c5dc420a708ecdcff6a8e3ad3f4c5ca
-
Filesize
169KB
MD5706af334e799ebf47df21ec79922b21b
SHA1cc4b11e5678e1078f898e2cf6cd09f30b0e00531
SHA2565d26349324bb29bb99a225e8a3f062334518adc027e2d15430e15352aebca61b
SHA51288a712d2a80e564bcd0802b6cf49ed3a1dfae9d0cc739c2a5bfff859a53db6780c363df2732da9e1db972450f7e49bda5c5dc420a708ecdcff6a8e3ad3f4c5ca
-
Filesize
708KB
MD52b2a712a2164d6d89e4b7414412b0bdf
SHA1dc0156dbc79aa4be3f319e234b3317d468b47acb
SHA2565b98e1558a856d1c757d07b7a5ef95a40e3f3627da987ada8c0d08b66593546f
SHA512a2a6d3da8d7712a86236625b36be3dc620d0f88bff8755ea785f16736858f35a77ce43cd3dda47c2168c1040debf8fc41f55de5e591f15bde431f752cd0a08b9
-
Filesize
708KB
MD52b2a712a2164d6d89e4b7414412b0bdf
SHA1dc0156dbc79aa4be3f319e234b3317d468b47acb
SHA2565b98e1558a856d1c757d07b7a5ef95a40e3f3627da987ada8c0d08b66593546f
SHA512a2a6d3da8d7712a86236625b36be3dc620d0f88bff8755ea785f16736858f35a77ce43cd3dda47c2168c1040debf8fc41f55de5e591f15bde431f752cd0a08b9
-
Filesize
405KB
MD52a0d70b8cb343e10b332de3987122b4b
SHA1521a6eae1bd07e5c1670bfd32f79c473666cb862
SHA2565760f9ef25f82bf5ffa468c58d9394a790a819d6a6801aca55c03bf5eeec2283
SHA5122412a83af12e31fef27cc0c0534a8678e1546d673dfd009768478926cf0891dbb531ea4dbdab8865c8848c54666f08feb00f4c7fcf3e12f1073d809bb84f6f79
-
Filesize
405KB
MD52a0d70b8cb343e10b332de3987122b4b
SHA1521a6eae1bd07e5c1670bfd32f79c473666cb862
SHA2565760f9ef25f82bf5ffa468c58d9394a790a819d6a6801aca55c03bf5eeec2283
SHA5122412a83af12e31fef27cc0c0534a8678e1546d673dfd009768478926cf0891dbb531ea4dbdab8865c8848c54666f08feb00f4c7fcf3e12f1073d809bb84f6f79
-
Filesize
588KB
MD506ba53511a75c9105fb0281706854ff1
SHA1735f56aef169d0769e742d35ec976b1320ef5bde
SHA256e43816816765d7c240006dda4967b93e149bf43b384c866a823aea29f6a16611
SHA51225d23d3a9dd3ecbe3c74a7fc8bb5d70dd9b3b3b40514a6d7e57dec84c7fbeb32c7a40c0e6285698d17be1085d36af92abea38cd5f87a57d7be25a760a9f8fa68
-
Filesize
588KB
MD506ba53511a75c9105fb0281706854ff1
SHA1735f56aef169d0769e742d35ec976b1320ef5bde
SHA256e43816816765d7c240006dda4967b93e149bf43b384c866a823aea29f6a16611
SHA51225d23d3a9dd3ecbe3c74a7fc8bb5d70dd9b3b3b40514a6d7e57dec84c7fbeb32c7a40c0e6285698d17be1085d36af92abea38cd5f87a57d7be25a760a9f8fa68
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1