Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14-04-2023 05:17
Static task
static1
General
-
Target
b13927f51f79cb487ab642ff99deb78c7836f8f963c75c6eb109b4ad4da55ba8.exe
-
Size
1.2MB
-
MD5
a61f3e24a13c89e74c5eb674f50f60ad
-
SHA1
d822ef4064fc07d1207361938418f75509828c6b
-
SHA256
b13927f51f79cb487ab642ff99deb78c7836f8f963c75c6eb109b4ad4da55ba8
-
SHA512
59122304918bdbcbb0a073f032654c72b13494fa7199810ce2a3c129c3ff9c6c7880c4e8490d99fdac1263b8a3b9d8c59e9e8d51096e73746d79bc52514b060a
-
SSDEEP
24576:/yfgU42dVCB8jVbUvRt/FyijwIgYFaMNOYZJARTlcKoDWt5zfj7d9imE:KfgU42dUGjVbUvRt/FyiXVNOYfwTSKoT
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
pr762226.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr762226.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr762226.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr762226.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr762226.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr762226.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
Processes:
un681597.exeun855946.exepr762226.exequ135591.exe1.exerk258617.exesi857477.exepid process 2580 un681597.exe 2940 un855946.exe 3996 pr762226.exe 1884 qu135591.exe 1844 1.exe 2184 rk258617.exe 2476 si857477.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr762226.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr762226.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr762226.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
un681597.exeun855946.exeb13927f51f79cb487ab642ff99deb78c7836f8f963c75c6eb109b4ad4da55ba8.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un681597.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un855946.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un855946.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b13927f51f79cb487ab642ff99deb78c7836f8f963c75c6eb109b4ad4da55ba8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b13927f51f79cb487ab642ff99deb78c7836f8f963c75c6eb109b4ad4da55ba8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un681597.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4792 2476 WerFault.exe si857477.exe 1256 2476 WerFault.exe si857477.exe 4648 2476 WerFault.exe si857477.exe 3500 2476 WerFault.exe si857477.exe 3552 2476 WerFault.exe si857477.exe 4048 2476 WerFault.exe si857477.exe 4724 2476 WerFault.exe si857477.exe 4720 2476 WerFault.exe si857477.exe 780 2476 WerFault.exe si857477.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr762226.exerk258617.exe1.exepid process 3996 pr762226.exe 3996 pr762226.exe 2184 rk258617.exe 1844 1.exe 1844 1.exe 2184 rk258617.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pr762226.exequ135591.exerk258617.exe1.exedescription pid process Token: SeDebugPrivilege 3996 pr762226.exe Token: SeDebugPrivilege 1884 qu135591.exe Token: SeDebugPrivilege 2184 rk258617.exe Token: SeDebugPrivilege 1844 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si857477.exepid process 2476 si857477.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
b13927f51f79cb487ab642ff99deb78c7836f8f963c75c6eb109b4ad4da55ba8.exeun681597.exeun855946.exequ135591.exedescription pid process target process PID 2364 wrote to memory of 2580 2364 b13927f51f79cb487ab642ff99deb78c7836f8f963c75c6eb109b4ad4da55ba8.exe un681597.exe PID 2364 wrote to memory of 2580 2364 b13927f51f79cb487ab642ff99deb78c7836f8f963c75c6eb109b4ad4da55ba8.exe un681597.exe PID 2364 wrote to memory of 2580 2364 b13927f51f79cb487ab642ff99deb78c7836f8f963c75c6eb109b4ad4da55ba8.exe un681597.exe PID 2580 wrote to memory of 2940 2580 un681597.exe un855946.exe PID 2580 wrote to memory of 2940 2580 un681597.exe un855946.exe PID 2580 wrote to memory of 2940 2580 un681597.exe un855946.exe PID 2940 wrote to memory of 3996 2940 un855946.exe pr762226.exe PID 2940 wrote to memory of 3996 2940 un855946.exe pr762226.exe PID 2940 wrote to memory of 3996 2940 un855946.exe pr762226.exe PID 2940 wrote to memory of 1884 2940 un855946.exe qu135591.exe PID 2940 wrote to memory of 1884 2940 un855946.exe qu135591.exe PID 2940 wrote to memory of 1884 2940 un855946.exe qu135591.exe PID 1884 wrote to memory of 1844 1884 qu135591.exe 1.exe PID 1884 wrote to memory of 1844 1884 qu135591.exe 1.exe PID 1884 wrote to memory of 1844 1884 qu135591.exe 1.exe PID 2580 wrote to memory of 2184 2580 un681597.exe rk258617.exe PID 2580 wrote to memory of 2184 2580 un681597.exe rk258617.exe PID 2580 wrote to memory of 2184 2580 un681597.exe rk258617.exe PID 2364 wrote to memory of 2476 2364 b13927f51f79cb487ab642ff99deb78c7836f8f963c75c6eb109b4ad4da55ba8.exe si857477.exe PID 2364 wrote to memory of 2476 2364 b13927f51f79cb487ab642ff99deb78c7836f8f963c75c6eb109b4ad4da55ba8.exe si857477.exe PID 2364 wrote to memory of 2476 2364 b13927f51f79cb487ab642ff99deb78c7836f8f963c75c6eb109b4ad4da55ba8.exe si857477.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b13927f51f79cb487ab642ff99deb78c7836f8f963c75c6eb109b4ad4da55ba8.exe"C:\Users\Admin\AppData\Local\Temp\b13927f51f79cb487ab642ff99deb78c7836f8f963c75c6eb109b4ad4da55ba8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un681597.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un681597.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un855946.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un855946.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr762226.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr762226.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3996
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu135591.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu135591.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1844
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk258617.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk258617.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2184
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si857477.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si857477.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:2476 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 6283⤵
- Program crash
PID:4792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 7043⤵
- Program crash
PID:1256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 8443⤵
- Program crash
PID:4648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 6883⤵
- Program crash
PID:3500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 9083⤵
- Program crash
PID:3552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 9403⤵
- Program crash
PID:4048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 11243⤵
- Program crash
PID:4724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 12083⤵
- Program crash
PID:4720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 12123⤵
- Program crash
PID:780
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
396KB
MD53b4f2a4d8dca852944a267ed2830e399
SHA1fdb24f66cd6baf27e5f2631fd981afd71732a352
SHA256ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e
SHA51281fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7
-
Filesize
861KB
MD5cb310ce09bd5a51803883e254860e909
SHA1117edb139f2bd8806c7b855f0049d5a7afeaf0fc
SHA2568e7eee1cde413d8c3a2e9cc1fa8334d4a74bd686c273e93003c2b33c5b609753
SHA5129969e8eddca0499359f00683ca28811d22059cde2906f83b911524a1ddb89a60bb9a7cd4f66b8d113981b8e465a06e08e8d8324e8bf59a8c55cba0ecfd826214
-
Filesize
861KB
MD5cb310ce09bd5a51803883e254860e909
SHA1117edb139f2bd8806c7b855f0049d5a7afeaf0fc
SHA2568e7eee1cde413d8c3a2e9cc1fa8334d4a74bd686c273e93003c2b33c5b609753
SHA5129969e8eddca0499359f00683ca28811d22059cde2906f83b911524a1ddb89a60bb9a7cd4f66b8d113981b8e465a06e08e8d8324e8bf59a8c55cba0ecfd826214
-
Filesize
169KB
MD591fcfa050592c516d959cd64d65fad6f
SHA12b6441e323beaf53c72115a1b5a85a4acf270f4d
SHA256c5f187cd03826a8e8e1b21c62602a1d9eb727fe36acbd6bc837638305577d251
SHA5127b6fbb5e560b693032017f764a7cd933af35ca2df7e08973f9a01edb7da10b76014fb08430aae023a0aaefc519f89efd71f79d6079c3459972db1b9e370846f7
-
Filesize
169KB
MD591fcfa050592c516d959cd64d65fad6f
SHA12b6441e323beaf53c72115a1b5a85a4acf270f4d
SHA256c5f187cd03826a8e8e1b21c62602a1d9eb727fe36acbd6bc837638305577d251
SHA5127b6fbb5e560b693032017f764a7cd933af35ca2df7e08973f9a01edb7da10b76014fb08430aae023a0aaefc519f89efd71f79d6079c3459972db1b9e370846f7
-
Filesize
708KB
MD5ef5b992441e269a1f63f0dc40e4052ba
SHA151c4cd41b60b16530f77b53f9d53725e2e748329
SHA256bc203a8c0eae5099af8c5e98a286c3828ba74db8edd023a9c9754dc4723050e0
SHA5123e84c9a0207698b682dee35f168f980ff98e3cbecf54c1e43e7c592b2896a778da688c67c473c435051b0081be25330626abdd2c53fc8d88f802614dd05487bd
-
Filesize
708KB
MD5ef5b992441e269a1f63f0dc40e4052ba
SHA151c4cd41b60b16530f77b53f9d53725e2e748329
SHA256bc203a8c0eae5099af8c5e98a286c3828ba74db8edd023a9c9754dc4723050e0
SHA5123e84c9a0207698b682dee35f168f980ff98e3cbecf54c1e43e7c592b2896a778da688c67c473c435051b0081be25330626abdd2c53fc8d88f802614dd05487bd
-
Filesize
405KB
MD5f423ca0bfacadce67a9a2af32eee4c09
SHA1eb57a7622f1c57e0bb3479f37c07789425c00a42
SHA2565534be65183715411ade249709c6d10ffd0838ce462610f53038f5fed005849c
SHA51223466df1b8b1cdacf821ae10b964df75ca82afb2fc0a3dfebdb177162efc402a27cf523faf57c4197f3966e25c1b04be75352db0b3c9b401839478025ca20a47
-
Filesize
405KB
MD5f423ca0bfacadce67a9a2af32eee4c09
SHA1eb57a7622f1c57e0bb3479f37c07789425c00a42
SHA2565534be65183715411ade249709c6d10ffd0838ce462610f53038f5fed005849c
SHA51223466df1b8b1cdacf821ae10b964df75ca82afb2fc0a3dfebdb177162efc402a27cf523faf57c4197f3966e25c1b04be75352db0b3c9b401839478025ca20a47
-
Filesize
588KB
MD587c4b06c2977d3f3c6417d5a0628974b
SHA1e551adb4852e5fbfffe16c8c90ed7f0f761f7177
SHA2564c180ca3f3e00ef1b0d4a9099e30208ed1d675435bfce50ad152e755632fad82
SHA512c3a139d7e7d4eac4c21ea37f87479829de5177e1a0d6e8e5d4127bc65d3806e181c278439f236f17da11a67c2063509bdb518218e7ebe775460da0c601e4d4e6
-
Filesize
588KB
MD587c4b06c2977d3f3c6417d5a0628974b
SHA1e551adb4852e5fbfffe16c8c90ed7f0f761f7177
SHA2564c180ca3f3e00ef1b0d4a9099e30208ed1d675435bfce50ad152e755632fad82
SHA512c3a139d7e7d4eac4c21ea37f87479829de5177e1a0d6e8e5d4127bc65d3806e181c278439f236f17da11a67c2063509bdb518218e7ebe775460da0c601e4d4e6
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1