Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14-04-2023 05:06
Static task
static1
General
-
Target
a87d7f5afe62c0ae71056cd8caf5e0d38a5bf807c9323300967a9e1ddd474d1d.exe
-
Size
1.2MB
-
MD5
3e815876c7e9bfebc740952464a8cba6
-
SHA1
f4ab05ef26ade76a76e4c901db35c581b45745ee
-
SHA256
a87d7f5afe62c0ae71056cd8caf5e0d38a5bf807c9323300967a9e1ddd474d1d
-
SHA512
beedf65392df7fd7ac1a25a9f365c50c784ba4f25bb9cd2454b8f9841aefacd03fe94030d9828a8219c843152a3423d7d321d9f76ec9bf8c865b08729a933c19
-
SSDEEP
24576:Ry5YZLZEAN3pyq/2voKb4x/pJnFFAWNwXYQC2HzSZJnYyKZWjzsFYMJhPDHS6:ESj//gqhRFHGNHzSfYyKZWHsHP7S
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
pr158448.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr158448.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr158448.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr158448.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr158448.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr158448.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
Processes:
un131410.exeun648604.exepr158448.exequ016387.exe1.exerk663515.exesi323206.exepid process 2056 un131410.exe 3956 un648604.exe 4776 pr158448.exe 3820 qu016387.exe 3640 1.exe 376 rk663515.exe 3768 si323206.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr158448.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr158448.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr158448.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
a87d7f5afe62c0ae71056cd8caf5e0d38a5bf807c9323300967a9e1ddd474d1d.exeun131410.exeun648604.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a87d7f5afe62c0ae71056cd8caf5e0d38a5bf807c9323300967a9e1ddd474d1d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a87d7f5afe62c0ae71056cd8caf5e0d38a5bf807c9323300967a9e1ddd474d1d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un131410.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un131410.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un648604.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un648604.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2856 3768 WerFault.exe si323206.exe 3316 3768 WerFault.exe si323206.exe 4924 3768 WerFault.exe si323206.exe 3584 3768 WerFault.exe si323206.exe 1596 3768 WerFault.exe si323206.exe 4524 3768 WerFault.exe si323206.exe 4464 3768 WerFault.exe si323206.exe 4436 3768 WerFault.exe si323206.exe 4432 3768 WerFault.exe si323206.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr158448.exe1.exerk663515.exepid process 4776 pr158448.exe 4776 pr158448.exe 3640 1.exe 3640 1.exe 376 rk663515.exe 376 rk663515.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pr158448.exequ016387.exe1.exerk663515.exedescription pid process Token: SeDebugPrivilege 4776 pr158448.exe Token: SeDebugPrivilege 3820 qu016387.exe Token: SeDebugPrivilege 3640 1.exe Token: SeDebugPrivilege 376 rk663515.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si323206.exepid process 3768 si323206.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
a87d7f5afe62c0ae71056cd8caf5e0d38a5bf807c9323300967a9e1ddd474d1d.exeun131410.exeun648604.exequ016387.exedescription pid process target process PID 1692 wrote to memory of 2056 1692 a87d7f5afe62c0ae71056cd8caf5e0d38a5bf807c9323300967a9e1ddd474d1d.exe un131410.exe PID 1692 wrote to memory of 2056 1692 a87d7f5afe62c0ae71056cd8caf5e0d38a5bf807c9323300967a9e1ddd474d1d.exe un131410.exe PID 1692 wrote to memory of 2056 1692 a87d7f5afe62c0ae71056cd8caf5e0d38a5bf807c9323300967a9e1ddd474d1d.exe un131410.exe PID 2056 wrote to memory of 3956 2056 un131410.exe un648604.exe PID 2056 wrote to memory of 3956 2056 un131410.exe un648604.exe PID 2056 wrote to memory of 3956 2056 un131410.exe un648604.exe PID 3956 wrote to memory of 4776 3956 un648604.exe pr158448.exe PID 3956 wrote to memory of 4776 3956 un648604.exe pr158448.exe PID 3956 wrote to memory of 4776 3956 un648604.exe pr158448.exe PID 3956 wrote to memory of 3820 3956 un648604.exe qu016387.exe PID 3956 wrote to memory of 3820 3956 un648604.exe qu016387.exe PID 3956 wrote to memory of 3820 3956 un648604.exe qu016387.exe PID 3820 wrote to memory of 3640 3820 qu016387.exe 1.exe PID 3820 wrote to memory of 3640 3820 qu016387.exe 1.exe PID 3820 wrote to memory of 3640 3820 qu016387.exe 1.exe PID 2056 wrote to memory of 376 2056 un131410.exe rk663515.exe PID 2056 wrote to memory of 376 2056 un131410.exe rk663515.exe PID 2056 wrote to memory of 376 2056 un131410.exe rk663515.exe PID 1692 wrote to memory of 3768 1692 a87d7f5afe62c0ae71056cd8caf5e0d38a5bf807c9323300967a9e1ddd474d1d.exe si323206.exe PID 1692 wrote to memory of 3768 1692 a87d7f5afe62c0ae71056cd8caf5e0d38a5bf807c9323300967a9e1ddd474d1d.exe si323206.exe PID 1692 wrote to memory of 3768 1692 a87d7f5afe62c0ae71056cd8caf5e0d38a5bf807c9323300967a9e1ddd474d1d.exe si323206.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a87d7f5afe62c0ae71056cd8caf5e0d38a5bf807c9323300967a9e1ddd474d1d.exe"C:\Users\Admin\AppData\Local\Temp\a87d7f5afe62c0ae71056cd8caf5e0d38a5bf807c9323300967a9e1ddd474d1d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un131410.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un131410.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un648604.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un648604.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr158448.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr158448.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4776
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu016387.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu016387.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3640
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk663515.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk663515.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:376
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si323206.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si323206.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:3768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 6323⤵
- Program crash
PID:2856
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 7083⤵
- Program crash
PID:3316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 8483⤵
- Program crash
PID:4924
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 8363⤵
- Program crash
PID:3584
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 8883⤵
- Program crash
PID:1596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 8643⤵
- Program crash
PID:4524
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 11203⤵
- Program crash
PID:4464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 11763⤵
- Program crash
PID:4436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3768 -s 10763⤵
- Program crash
PID:4432
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
863KB
MD572e6daf8700b510edaf819b5409936bd
SHA163966c25d50dda4d932042572f93a690d3fa236b
SHA2568959479576eb7361cc3580a13ef09b3b3e80d2a48582d315062c2232079ed71c
SHA5127f20f34909f041d0636f01313202d52abbea22657e9458ded5ae3d161b7ca09fe5cde52da6a0ccf1f8c86de93e42bb11a750d6029a82e86b29f2ee2aae638b20
-
Filesize
863KB
MD572e6daf8700b510edaf819b5409936bd
SHA163966c25d50dda4d932042572f93a690d3fa236b
SHA2568959479576eb7361cc3580a13ef09b3b3e80d2a48582d315062c2232079ed71c
SHA5127f20f34909f041d0636f01313202d52abbea22657e9458ded5ae3d161b7ca09fe5cde52da6a0ccf1f8c86de93e42bb11a750d6029a82e86b29f2ee2aae638b20
-
Filesize
169KB
MD5367083fdc71bd220497ad37652c8522b
SHA110cfb30433d89775e100c14dcb2ee45172e7f9b9
SHA256c0fbeedd58c49ba7601c36d62b78ef0e947dfae50c57930309ecfc922bc0f91c
SHA51216691ad9d608183c7eab4c52dfeccc42dd027818ae9472dfbb8ee0d262a538d59e800d1f4cdf736a3a4bc92511825d2542fbc482463db617fc7021f9918fff02
-
Filesize
169KB
MD5367083fdc71bd220497ad37652c8522b
SHA110cfb30433d89775e100c14dcb2ee45172e7f9b9
SHA256c0fbeedd58c49ba7601c36d62b78ef0e947dfae50c57930309ecfc922bc0f91c
SHA51216691ad9d608183c7eab4c52dfeccc42dd027818ae9472dfbb8ee0d262a538d59e800d1f4cdf736a3a4bc92511825d2542fbc482463db617fc7021f9918fff02
-
Filesize
709KB
MD5b9e051b0a1e61328810c0de5f6be8df7
SHA10c81d5a600106e09aed9987f15229e02d634c1d5
SHA256f516efbcd58d23b64565deb4238ef884713c864fc009a755bffac770919ba320
SHA5125bb7e3ca84d41be56b22e66f24411127f466678db90c988191678d9031606c65d421dcf2282c2ce0415b1f3415f2ce414cb78891de423447191d0ea09c59c136
-
Filesize
709KB
MD5b9e051b0a1e61328810c0de5f6be8df7
SHA10c81d5a600106e09aed9987f15229e02d634c1d5
SHA256f516efbcd58d23b64565deb4238ef884713c864fc009a755bffac770919ba320
SHA5125bb7e3ca84d41be56b22e66f24411127f466678db90c988191678d9031606c65d421dcf2282c2ce0415b1f3415f2ce414cb78891de423447191d0ea09c59c136
-
Filesize
405KB
MD5a31e55597e50dd3a688be43a0aa174af
SHA12b5b9b977b77d46e8a6ed78b216f5038b916d50c
SHA2563c2b9fbe121de13d93522172c587218ed102d6533e6516fc933629490f46aae9
SHA512f66e3f31ab41ffb28d41cc6a860f1a0fc5770ff0b6c1f3bb4de80523182600bb2bf5323b2baef945396fdaf4db448d319c72259ea63d7dbed025336bc9ade1cc
-
Filesize
405KB
MD5a31e55597e50dd3a688be43a0aa174af
SHA12b5b9b977b77d46e8a6ed78b216f5038b916d50c
SHA2563c2b9fbe121de13d93522172c587218ed102d6533e6516fc933629490f46aae9
SHA512f66e3f31ab41ffb28d41cc6a860f1a0fc5770ff0b6c1f3bb4de80523182600bb2bf5323b2baef945396fdaf4db448d319c72259ea63d7dbed025336bc9ade1cc
-
Filesize
588KB
MD555406ce543f84eeaa0d54d2e3b4b4dd8
SHA1057fdc5af5dc45611edff3960c0d23549ea1c104
SHA256c53a7dacb2e255c67a30dc3e9f6b36281a6923aa9e787840e195e9bc1103d353
SHA5125261005eb8121bbf683d262d56a5995fffb2f045b61156835c53b4bb0c9b35b16c2b25f295f8847ff5d5f914bc99809c09ead781ddc9089f81a0b4f5a2c3a36f
-
Filesize
588KB
MD555406ce543f84eeaa0d54d2e3b4b4dd8
SHA1057fdc5af5dc45611edff3960c0d23549ea1c104
SHA256c53a7dacb2e255c67a30dc3e9f6b36281a6923aa9e787840e195e9bc1103d353
SHA5125261005eb8121bbf683d262d56a5995fffb2f045b61156835c53b4bb0c9b35b16c2b25f295f8847ff5d5f914bc99809c09ead781ddc9089f81a0b4f5a2c3a36f
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1