Analysis
-
max time kernel
142s -
max time network
98s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14-04-2023 06:20
Static task
static1
General
-
Target
077f7f803e53687e8271b24f8e4569fbfe3194c8c8e883c9327cf8ea04e79b39.exe
-
Size
1.0MB
-
MD5
b9693e42f0198200df0087c194b200cc
-
SHA1
366ef95d109c73c903f719dd3b9030c7f65804bd
-
SHA256
077f7f803e53687e8271b24f8e4569fbfe3194c8c8e883c9327cf8ea04e79b39
-
SHA512
15b747da3a43fcbdfd239ffde7ea3c163a96cc50a0011c357a0b7659fa55f338887a2b7520469869fa2fc7eb0b56080261f8b1515342ac262af2843dc21cf759
-
SSDEEP
24576:tyb9GtxKNK4kVZMHLrocPRWgchfXOYEgVGa2ls:IEtgwqrDPRWgQPOYf
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it785292.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it785292.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it785292.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it785292.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it785292.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it785292.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
Processes:
zimQ4736.exezihg9678.exeit785292.exejr223864.exe1.exekp297102.exelr195774.exepid process 3192 zimQ4736.exe 4100 zihg9678.exe 4320 it785292.exe 1692 jr223864.exe 5024 1.exe 5088 kp297102.exe 2876 lr195774.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it785292.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it785292.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
077f7f803e53687e8271b24f8e4569fbfe3194c8c8e883c9327cf8ea04e79b39.exezimQ4736.exezihg9678.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 077f7f803e53687e8271b24f8e4569fbfe3194c8c8e883c9327cf8ea04e79b39.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 077f7f803e53687e8271b24f8e4569fbfe3194c8c8e883c9327cf8ea04e79b39.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zimQ4736.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zimQ4736.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zihg9678.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zihg9678.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1756 2876 WerFault.exe lr195774.exe 2060 2876 WerFault.exe lr195774.exe 4548 2876 WerFault.exe lr195774.exe 4916 2876 WerFault.exe lr195774.exe 1632 2876 WerFault.exe lr195774.exe 352 2876 WerFault.exe lr195774.exe 332 2876 WerFault.exe lr195774.exe 3828 2876 WerFault.exe lr195774.exe 4600 2876 WerFault.exe lr195774.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it785292.exekp297102.exe1.exepid process 4320 it785292.exe 4320 it785292.exe 5088 kp297102.exe 5024 1.exe 5088 kp297102.exe 5024 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it785292.exejr223864.exekp297102.exe1.exedescription pid process Token: SeDebugPrivilege 4320 it785292.exe Token: SeDebugPrivilege 1692 jr223864.exe Token: SeDebugPrivilege 5088 kp297102.exe Token: SeDebugPrivilege 5024 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr195774.exepid process 2876 lr195774.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
077f7f803e53687e8271b24f8e4569fbfe3194c8c8e883c9327cf8ea04e79b39.exezimQ4736.exezihg9678.exejr223864.exedescription pid process target process PID 4300 wrote to memory of 3192 4300 077f7f803e53687e8271b24f8e4569fbfe3194c8c8e883c9327cf8ea04e79b39.exe zimQ4736.exe PID 4300 wrote to memory of 3192 4300 077f7f803e53687e8271b24f8e4569fbfe3194c8c8e883c9327cf8ea04e79b39.exe zimQ4736.exe PID 4300 wrote to memory of 3192 4300 077f7f803e53687e8271b24f8e4569fbfe3194c8c8e883c9327cf8ea04e79b39.exe zimQ4736.exe PID 3192 wrote to memory of 4100 3192 zimQ4736.exe zihg9678.exe PID 3192 wrote to memory of 4100 3192 zimQ4736.exe zihg9678.exe PID 3192 wrote to memory of 4100 3192 zimQ4736.exe zihg9678.exe PID 4100 wrote to memory of 4320 4100 zihg9678.exe it785292.exe PID 4100 wrote to memory of 4320 4100 zihg9678.exe it785292.exe PID 4100 wrote to memory of 1692 4100 zihg9678.exe jr223864.exe PID 4100 wrote to memory of 1692 4100 zihg9678.exe jr223864.exe PID 4100 wrote to memory of 1692 4100 zihg9678.exe jr223864.exe PID 1692 wrote to memory of 5024 1692 jr223864.exe 1.exe PID 1692 wrote to memory of 5024 1692 jr223864.exe 1.exe PID 1692 wrote to memory of 5024 1692 jr223864.exe 1.exe PID 3192 wrote to memory of 5088 3192 zimQ4736.exe kp297102.exe PID 3192 wrote to memory of 5088 3192 zimQ4736.exe kp297102.exe PID 3192 wrote to memory of 5088 3192 zimQ4736.exe kp297102.exe PID 4300 wrote to memory of 2876 4300 077f7f803e53687e8271b24f8e4569fbfe3194c8c8e883c9327cf8ea04e79b39.exe lr195774.exe PID 4300 wrote to memory of 2876 4300 077f7f803e53687e8271b24f8e4569fbfe3194c8c8e883c9327cf8ea04e79b39.exe lr195774.exe PID 4300 wrote to memory of 2876 4300 077f7f803e53687e8271b24f8e4569fbfe3194c8c8e883c9327cf8ea04e79b39.exe lr195774.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\077f7f803e53687e8271b24f8e4569fbfe3194c8c8e883c9327cf8ea04e79b39.exe"C:\Users\Admin\AppData\Local\Temp\077f7f803e53687e8271b24f8e4569fbfe3194c8c8e883c9327cf8ea04e79b39.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimQ4736.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimQ4736.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zihg9678.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zihg9678.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it785292.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it785292.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4320
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr223864.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr223864.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5024
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp297102.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp297102.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5088
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr195774.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr195774.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:2876 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 6363⤵
- Program crash
PID:1756
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 7123⤵
- Program crash
PID:2060
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 8523⤵
- Program crash
PID:4548
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 8603⤵
- Program crash
PID:4916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 9203⤵
- Program crash
PID:1632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 8963⤵
- Program crash
PID:352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 11283⤵
- Program crash
PID:332
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 12043⤵
- Program crash
PID:3828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 12323⤵
- Program crash
PID:4600
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
723KB
MD558450ce4bdc365eab63dbf69aaea0d62
SHA1e6086b598ca2840bf0162bf6e42d1c6e3851b552
SHA256ba088a3123c1ec8af40d27e3612f6a36f90efe2bea13516653552057ebdf0a4b
SHA512e2290ce3565c1454d6d0a1974fd0ab4e2b51404a50d467d3d2024444abc72e6581c9e4e85f8c0597602ddff68ae4dbe8006af4d2f5eb50c9930170f9ed83cb87
-
Filesize
723KB
MD558450ce4bdc365eab63dbf69aaea0d62
SHA1e6086b598ca2840bf0162bf6e42d1c6e3851b552
SHA256ba088a3123c1ec8af40d27e3612f6a36f90efe2bea13516653552057ebdf0a4b
SHA512e2290ce3565c1454d6d0a1974fd0ab4e2b51404a50d467d3d2024444abc72e6581c9e4e85f8c0597602ddff68ae4dbe8006af4d2f5eb50c9930170f9ed83cb87
-
Filesize
169KB
MD59015c05d29369f62f4193fea875d6715
SHA1061af2ce548a815efa686e49062395524ae586af
SHA256834686d6e44171ad3b96dee07f25a2ca7867e261be9972bb387744644d7e54f2
SHA5124f484d064e428caa95cc9854009c5ff5a4838d240ca80e6906401896e41faccb2a710f380d964e622838b171727b3db857968565d599ca1f3ec9ad41cb85cad9
-
Filesize
169KB
MD59015c05d29369f62f4193fea875d6715
SHA1061af2ce548a815efa686e49062395524ae586af
SHA256834686d6e44171ad3b96dee07f25a2ca7867e261be9972bb387744644d7e54f2
SHA5124f484d064e428caa95cc9854009c5ff5a4838d240ca80e6906401896e41faccb2a710f380d964e622838b171727b3db857968565d599ca1f3ec9ad41cb85cad9
-
Filesize
569KB
MD57f0b7eb8a28c6808db93d1b485f6217d
SHA1f5fba2d7a3e5341d7b33e4a25477ecbb801aa099
SHA256dd5481a6f72a7792f42aaa830c2aed98336e10692402399ac7c2bd85bb6790cd
SHA512a24505c36904ceb97affc0a2c98ef7502d43532c4f31d7d0ea84c2801c3a9ab8f5f66026a04c77ce099c43774c3662b0573d83dabe9b4300048b52fd2a23e2e2
-
Filesize
569KB
MD57f0b7eb8a28c6808db93d1b485f6217d
SHA1f5fba2d7a3e5341d7b33e4a25477ecbb801aa099
SHA256dd5481a6f72a7792f42aaa830c2aed98336e10692402399ac7c2bd85bb6790cd
SHA512a24505c36904ceb97affc0a2c98ef7502d43532c4f31d7d0ea84c2801c3a9ab8f5f66026a04c77ce099c43774c3662b0573d83dabe9b4300048b52fd2a23e2e2
-
Filesize
11KB
MD56f3d82ba66b148340aaed46b2583e1d9
SHA1531bca927a9375e1a0addcdb2fde53b52de5c24d
SHA256816e9cec678fe3557dbb774e91184c35ba80eb5f7a9530350b5bd22013939b92
SHA512801b34bbba36019b8da07cd4136e1ea0a9b034b43cd2e3d6cf86d1a10c522b3fe84062883ec21bdbe56ffe4650b6f45f02ea7dadfdf6589d19031b315d14b93e
-
Filesize
11KB
MD56f3d82ba66b148340aaed46b2583e1d9
SHA1531bca927a9375e1a0addcdb2fde53b52de5c24d
SHA256816e9cec678fe3557dbb774e91184c35ba80eb5f7a9530350b5bd22013939b92
SHA512801b34bbba36019b8da07cd4136e1ea0a9b034b43cd2e3d6cf86d1a10c522b3fe84062883ec21bdbe56ffe4650b6f45f02ea7dadfdf6589d19031b315d14b93e
-
Filesize
587KB
MD512920f0f4d54b5e304b536d1f2993fb7
SHA1d243e91cf0de723ed426b76e47b67ba0aef671b0
SHA2568d65b76d5a3e6c9dfe88fc6c2f26d4f91af206f6236de23db5c80b96c54f8a9d
SHA5127c2f78a0c73e2157ea77077768d0e856bb375c2f2be32aa82ff2286bf09281650d6ee9c70d679671a5c0544dd556c361b525b707045ae043c358421af6172d8a
-
Filesize
587KB
MD512920f0f4d54b5e304b536d1f2993fb7
SHA1d243e91cf0de723ed426b76e47b67ba0aef671b0
SHA2568d65b76d5a3e6c9dfe88fc6c2f26d4f91af206f6236de23db5c80b96c54f8a9d
SHA5127c2f78a0c73e2157ea77077768d0e856bb375c2f2be32aa82ff2286bf09281650d6ee9c70d679671a5c0544dd556c361b525b707045ae043c358421af6172d8a
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1