Analysis
-
max time kernel
144s -
max time network
108s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14-04-2023 05:03
Static task
static1
General
-
Target
f7dc9c2c36acd408faac647b9b3e6efdf16638ec1bea0f4efde4dcf15bfddb60.exe
-
Size
1.2MB
-
MD5
faa2942f6fb4d7be1dc1cb2a826bf2cf
-
SHA1
550919f1c4edf7a40ac967ef0a33bbc65f36d2fd
-
SHA256
f7dc9c2c36acd408faac647b9b3e6efdf16638ec1bea0f4efde4dcf15bfddb60
-
SHA512
a2ded7d6051b4b0c6c1b69e45c7f19d922c44a85fd83344d9ece48e7d1be489ddd974c9ea8fd6d6c20d0e2248d01553255019a7fedca844cff6e213fc9c4c82f
-
SSDEEP
24576:vye/Qbri7eu8CFT59SVqx4Ym7R3LSZJgZFqTYiItWTD30B+z:6e/ariKuz19Ul3LSfUAMjtKDEY
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
pr352580.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr352580.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr352580.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr352580.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr352580.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr352580.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
Processes:
un998135.exeun490329.exepr352580.exequ956672.exe1.exerk098221.exesi504545.exepid process 3276 un998135.exe 3748 un490329.exe 4140 pr352580.exe 2468 qu956672.exe 2604 1.exe 2392 rk098221.exe 3980 si504545.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr352580.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr352580.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr352580.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
un490329.exef7dc9c2c36acd408faac647b9b3e6efdf16638ec1bea0f4efde4dcf15bfddb60.exeun998135.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un490329.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un490329.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f7dc9c2c36acd408faac647b9b3e6efdf16638ec1bea0f4efde4dcf15bfddb60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f7dc9c2c36acd408faac647b9b3e6efdf16638ec1bea0f4efde4dcf15bfddb60.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un998135.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un998135.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2104 3980 WerFault.exe si504545.exe 3908 3980 WerFault.exe si504545.exe 3824 3980 WerFault.exe si504545.exe 3136 3980 WerFault.exe si504545.exe 2904 3980 WerFault.exe si504545.exe 1248 3980 WerFault.exe si504545.exe 1140 3980 WerFault.exe si504545.exe 4612 3980 WerFault.exe si504545.exe 4704 3980 WerFault.exe si504545.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr352580.exe1.exerk098221.exepid process 4140 pr352580.exe 4140 pr352580.exe 2604 1.exe 2392 rk098221.exe 2392 rk098221.exe 2604 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pr352580.exequ956672.exe1.exerk098221.exedescription pid process Token: SeDebugPrivilege 4140 pr352580.exe Token: SeDebugPrivilege 2468 qu956672.exe Token: SeDebugPrivilege 2604 1.exe Token: SeDebugPrivilege 2392 rk098221.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si504545.exepid process 3980 si504545.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
f7dc9c2c36acd408faac647b9b3e6efdf16638ec1bea0f4efde4dcf15bfddb60.exeun998135.exeun490329.exequ956672.exedescription pid process target process PID 3076 wrote to memory of 3276 3076 f7dc9c2c36acd408faac647b9b3e6efdf16638ec1bea0f4efde4dcf15bfddb60.exe un998135.exe PID 3076 wrote to memory of 3276 3076 f7dc9c2c36acd408faac647b9b3e6efdf16638ec1bea0f4efde4dcf15bfddb60.exe un998135.exe PID 3076 wrote to memory of 3276 3076 f7dc9c2c36acd408faac647b9b3e6efdf16638ec1bea0f4efde4dcf15bfddb60.exe un998135.exe PID 3276 wrote to memory of 3748 3276 un998135.exe un490329.exe PID 3276 wrote to memory of 3748 3276 un998135.exe un490329.exe PID 3276 wrote to memory of 3748 3276 un998135.exe un490329.exe PID 3748 wrote to memory of 4140 3748 un490329.exe pr352580.exe PID 3748 wrote to memory of 4140 3748 un490329.exe pr352580.exe PID 3748 wrote to memory of 4140 3748 un490329.exe pr352580.exe PID 3748 wrote to memory of 2468 3748 un490329.exe qu956672.exe PID 3748 wrote to memory of 2468 3748 un490329.exe qu956672.exe PID 3748 wrote to memory of 2468 3748 un490329.exe qu956672.exe PID 2468 wrote to memory of 2604 2468 qu956672.exe 1.exe PID 2468 wrote to memory of 2604 2468 qu956672.exe 1.exe PID 2468 wrote to memory of 2604 2468 qu956672.exe 1.exe PID 3276 wrote to memory of 2392 3276 un998135.exe rk098221.exe PID 3276 wrote to memory of 2392 3276 un998135.exe rk098221.exe PID 3276 wrote to memory of 2392 3276 un998135.exe rk098221.exe PID 3076 wrote to memory of 3980 3076 f7dc9c2c36acd408faac647b9b3e6efdf16638ec1bea0f4efde4dcf15bfddb60.exe si504545.exe PID 3076 wrote to memory of 3980 3076 f7dc9c2c36acd408faac647b9b3e6efdf16638ec1bea0f4efde4dcf15bfddb60.exe si504545.exe PID 3076 wrote to memory of 3980 3076 f7dc9c2c36acd408faac647b9b3e6efdf16638ec1bea0f4efde4dcf15bfddb60.exe si504545.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7dc9c2c36acd408faac647b9b3e6efdf16638ec1bea0f4efde4dcf15bfddb60.exe"C:\Users\Admin\AppData\Local\Temp\f7dc9c2c36acd408faac647b9b3e6efdf16638ec1bea0f4efde4dcf15bfddb60.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un998135.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un998135.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un490329.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un490329.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr352580.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr352580.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4140
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu956672.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu956672.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk098221.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk098221.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2392
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si504545.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si504545.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:3980 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 6323⤵
- Program crash
PID:2104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 7083⤵
- Program crash
PID:3908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 8523⤵
- Program crash
PID:3824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 8283⤵
- Program crash
PID:3136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 8843⤵
- Program crash
PID:2904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 8603⤵
- Program crash
PID:1248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 11243⤵
- Program crash
PID:1140
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 11643⤵
- Program crash
PID:4612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 11563⤵
- Program crash
PID:4704
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
863KB
MD57163b5d8d4b620385499bd2100c333f1
SHA1962943006fe017fdee6cdd36577d15e58b2f3bec
SHA256ef0538594848f4446f179528c7582d7eb36f74f57d7b53021cbf6122394dbfb1
SHA512e380a470515955e4eec353bdc2ff3341533c037bbc855fba19d0b749e184548404a3a2b6f43ee987b25fb5be3d85fc825cd36d4dcf606c9dbedd75a9612da561
-
Filesize
863KB
MD57163b5d8d4b620385499bd2100c333f1
SHA1962943006fe017fdee6cdd36577d15e58b2f3bec
SHA256ef0538594848f4446f179528c7582d7eb36f74f57d7b53021cbf6122394dbfb1
SHA512e380a470515955e4eec353bdc2ff3341533c037bbc855fba19d0b749e184548404a3a2b6f43ee987b25fb5be3d85fc825cd36d4dcf606c9dbedd75a9612da561
-
Filesize
169KB
MD55c7a99b07773fc1bbc88d5fe063c47db
SHA1ebd609e5e2384ccc1d8c1473f2a2274adf257195
SHA2565a31d6f30a07c3840a0be570dfa37a53f80ea2fc3ded04f5c10398928421b360
SHA512d60d048b47bfc3dfcb3adc629043c2d85a2f33882b59c0f9388891981da74b74062a5077ccdbd343c83d41a2a809bc45e827a7f3da1f25a693d040a7986c5f9d
-
Filesize
169KB
MD55c7a99b07773fc1bbc88d5fe063c47db
SHA1ebd609e5e2384ccc1d8c1473f2a2274adf257195
SHA2565a31d6f30a07c3840a0be570dfa37a53f80ea2fc3ded04f5c10398928421b360
SHA512d60d048b47bfc3dfcb3adc629043c2d85a2f33882b59c0f9388891981da74b74062a5077ccdbd343c83d41a2a809bc45e827a7f3da1f25a693d040a7986c5f9d
-
Filesize
709KB
MD5092b71af5dfa2bcbe9a316f9de268b83
SHA13757a5bf46a5888c42a9b478cde0f11ee5f01ade
SHA2568d8a05964ed28d9e8753589c5d842df0b32dbbd15454c9ffc882892e59340da0
SHA512a4c988be9a4f66818334f180ec8517a613c27da59f81ae9a25883a8f8c6f65b94f3daba7d3cdc4a80fcc9de36487c93b39b60881ef02f5f0ad4941359c7405e5
-
Filesize
709KB
MD5092b71af5dfa2bcbe9a316f9de268b83
SHA13757a5bf46a5888c42a9b478cde0f11ee5f01ade
SHA2568d8a05964ed28d9e8753589c5d842df0b32dbbd15454c9ffc882892e59340da0
SHA512a4c988be9a4f66818334f180ec8517a613c27da59f81ae9a25883a8f8c6f65b94f3daba7d3cdc4a80fcc9de36487c93b39b60881ef02f5f0ad4941359c7405e5
-
Filesize
405KB
MD513dd9a3d3bfa94adf0f5e819e0b072e7
SHA141d3feaf96dccb4d7a0f71f043bfd79544d8702e
SHA256e026f1f5ba10c22058e268f1a5c6e36892cbb19a0b40b5007b8afdfa0dc77b3a
SHA512590465d2415baddee62db9c9a7236ad9ebf1bb7992495297a4de7870c30ee4cc91494cc61e610c46ccf20b349c79ff27959e38e9b85d6482aa67b5907fde9bd0
-
Filesize
405KB
MD513dd9a3d3bfa94adf0f5e819e0b072e7
SHA141d3feaf96dccb4d7a0f71f043bfd79544d8702e
SHA256e026f1f5ba10c22058e268f1a5c6e36892cbb19a0b40b5007b8afdfa0dc77b3a
SHA512590465d2415baddee62db9c9a7236ad9ebf1bb7992495297a4de7870c30ee4cc91494cc61e610c46ccf20b349c79ff27959e38e9b85d6482aa67b5907fde9bd0
-
Filesize
588KB
MD5e4b792d57d7651b33750ca09f62205ba
SHA13e2c23644f54991d204f6ef8e840eddf4b28a8a9
SHA256be8b2ad79ae2f5153b1a8297ccaa7faa520217cf227a9d7919e1edb70a4a24f9
SHA5124fb0dc353d0346ed2d267699acc452d9c3f95417342355d3d2f5b4b04d021483509d369269e5d91b1fc6834a301a983b817bf0ae5b5c70bf216e35288df44064
-
Filesize
588KB
MD5e4b792d57d7651b33750ca09f62205ba
SHA13e2c23644f54991d204f6ef8e840eddf4b28a8a9
SHA256be8b2ad79ae2f5153b1a8297ccaa7faa520217cf227a9d7919e1edb70a4a24f9
SHA5124fb0dc353d0346ed2d267699acc452d9c3f95417342355d3d2f5b4b04d021483509d369269e5d91b1fc6834a301a983b817bf0ae5b5c70bf216e35288df44064
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1