Analysis
-
max time kernel
143s -
max time network
139s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14-04-2023 05:50
Static task
static1
General
-
Target
d977913aa79c1adfd51b757199140eadc8f053f53fe5220a4410c1b00d3c35a6.exe
-
Size
1.0MB
-
MD5
6337986c1cf50ac1dc0ef72e98af3a09
-
SHA1
bc55e6911d2c57349eb36915557bc182b33b3431
-
SHA256
d977913aa79c1adfd51b757199140eadc8f053f53fe5220a4410c1b00d3c35a6
-
SHA512
1b2e8674a69d924db3e4a633905ac6160719550a8b1f81e5012128b7c12d7be1a4dc7820b1c3c04f8c83c95c5e135105fc67452d671935e2f9c514514766760c
-
SSDEEP
24576:tyWX2pX94gVBDUF3pVWftLxlOHfSSm2o0owhqwkxwG0:Io2pX99/DiIxwHxo0xg
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it925918.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it925918.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it925918.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it925918.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it925918.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it925918.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
Processes:
zixH0509.exeziix1065.exeit925918.exejr764586.exe1.exekp485265.exelr974258.exepid process 3548 zixH0509.exe 2348 ziix1065.exe 4500 it925918.exe 4916 jr764586.exe 2308 1.exe 2560 kp485265.exe 2144 lr974258.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it925918.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it925918.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
ziix1065.exed977913aa79c1adfd51b757199140eadc8f053f53fe5220a4410c1b00d3c35a6.exezixH0509.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziix1065.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d977913aa79c1adfd51b757199140eadc8f053f53fe5220a4410c1b00d3c35a6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d977913aa79c1adfd51b757199140eadc8f053f53fe5220a4410c1b00d3c35a6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zixH0509.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zixH0509.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziix1065.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3736 2144 WerFault.exe lr974258.exe 3952 2144 WerFault.exe lr974258.exe 3644 2144 WerFault.exe lr974258.exe 992 2144 WerFault.exe lr974258.exe 5112 2144 WerFault.exe lr974258.exe 4920 2144 WerFault.exe lr974258.exe 4260 2144 WerFault.exe lr974258.exe 4272 2144 WerFault.exe lr974258.exe 4296 2144 WerFault.exe lr974258.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it925918.exe1.exekp485265.exepid process 4500 it925918.exe 4500 it925918.exe 2308 1.exe 2560 kp485265.exe 2308 1.exe 2560 kp485265.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it925918.exejr764586.exe1.exekp485265.exedescription pid process Token: SeDebugPrivilege 4500 it925918.exe Token: SeDebugPrivilege 4916 jr764586.exe Token: SeDebugPrivilege 2308 1.exe Token: SeDebugPrivilege 2560 kp485265.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr974258.exepid process 2144 lr974258.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
d977913aa79c1adfd51b757199140eadc8f053f53fe5220a4410c1b00d3c35a6.exezixH0509.exeziix1065.exejr764586.exedescription pid process target process PID 4124 wrote to memory of 3548 4124 d977913aa79c1adfd51b757199140eadc8f053f53fe5220a4410c1b00d3c35a6.exe zixH0509.exe PID 4124 wrote to memory of 3548 4124 d977913aa79c1adfd51b757199140eadc8f053f53fe5220a4410c1b00d3c35a6.exe zixH0509.exe PID 4124 wrote to memory of 3548 4124 d977913aa79c1adfd51b757199140eadc8f053f53fe5220a4410c1b00d3c35a6.exe zixH0509.exe PID 3548 wrote to memory of 2348 3548 zixH0509.exe ziix1065.exe PID 3548 wrote to memory of 2348 3548 zixH0509.exe ziix1065.exe PID 3548 wrote to memory of 2348 3548 zixH0509.exe ziix1065.exe PID 2348 wrote to memory of 4500 2348 ziix1065.exe it925918.exe PID 2348 wrote to memory of 4500 2348 ziix1065.exe it925918.exe PID 2348 wrote to memory of 4916 2348 ziix1065.exe jr764586.exe PID 2348 wrote to memory of 4916 2348 ziix1065.exe jr764586.exe PID 2348 wrote to memory of 4916 2348 ziix1065.exe jr764586.exe PID 4916 wrote to memory of 2308 4916 jr764586.exe 1.exe PID 4916 wrote to memory of 2308 4916 jr764586.exe 1.exe PID 4916 wrote to memory of 2308 4916 jr764586.exe 1.exe PID 3548 wrote to memory of 2560 3548 zixH0509.exe kp485265.exe PID 3548 wrote to memory of 2560 3548 zixH0509.exe kp485265.exe PID 3548 wrote to memory of 2560 3548 zixH0509.exe kp485265.exe PID 4124 wrote to memory of 2144 4124 d977913aa79c1adfd51b757199140eadc8f053f53fe5220a4410c1b00d3c35a6.exe lr974258.exe PID 4124 wrote to memory of 2144 4124 d977913aa79c1adfd51b757199140eadc8f053f53fe5220a4410c1b00d3c35a6.exe lr974258.exe PID 4124 wrote to memory of 2144 4124 d977913aa79c1adfd51b757199140eadc8f053f53fe5220a4410c1b00d3c35a6.exe lr974258.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d977913aa79c1adfd51b757199140eadc8f053f53fe5220a4410c1b00d3c35a6.exe"C:\Users\Admin\AppData\Local\Temp\d977913aa79c1adfd51b757199140eadc8f053f53fe5220a4410c1b00d3c35a6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixH0509.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixH0509.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziix1065.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziix1065.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it925918.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it925918.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4500
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr764586.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr764586.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp485265.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp485265.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr974258.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr974258.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:2144 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2144 -s 6323⤵
- Program crash
PID:3736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2144 -s 7083⤵
- Program crash
PID:3952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2144 -s 8443⤵
- Program crash
PID:3644
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2144 -s 8563⤵
- Program crash
PID:992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2144 -s 8843⤵
- Program crash
PID:5112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2144 -s 8883⤵
- Program crash
PID:4920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2144 -s 11243⤵
- Program crash
PID:4260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2144 -s 12003⤵
- Program crash
PID:4272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2144 -s 10643⤵
- Program crash
PID:4296
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
723KB
MD5b08de7ebab9bde70ac8ce563b775ba08
SHA1c5aae68afcd0a45d7f790185b7aef5b84ac6a681
SHA2568db29c24cf722db3c2c72ae24724d084e2d5641df2d6c049686466c08a1c0512
SHA512726acfeb6b9e0015910807c2ce950b9edcce78b9cfc8afddeb904a4b8707acf04892363d0cab780137c1839f9f070644940e72569a8040aa50e37b8bef3ac741
-
Filesize
723KB
MD5b08de7ebab9bde70ac8ce563b775ba08
SHA1c5aae68afcd0a45d7f790185b7aef5b84ac6a681
SHA2568db29c24cf722db3c2c72ae24724d084e2d5641df2d6c049686466c08a1c0512
SHA512726acfeb6b9e0015910807c2ce950b9edcce78b9cfc8afddeb904a4b8707acf04892363d0cab780137c1839f9f070644940e72569a8040aa50e37b8bef3ac741
-
Filesize
169KB
MD5a6877ddec506dfb9b14df0565c695e05
SHA1320192c02e70e2c99ce1eae6eab50ebbd5b8b039
SHA2562328d717baa2dcbe55d3d3681f4a21386d05ce72ae0365eb18cd73a8e4549d86
SHA512d08e52fe729b37b29bee47971f9f03a51b55903dfaf3574ae9bbccc5d77d5044facc11ca0d26bb70d90d9de5dbd976c615e38714e0c51af1f8aaa7066cb27b29
-
Filesize
169KB
MD5a6877ddec506dfb9b14df0565c695e05
SHA1320192c02e70e2c99ce1eae6eab50ebbd5b8b039
SHA2562328d717baa2dcbe55d3d3681f4a21386d05ce72ae0365eb18cd73a8e4549d86
SHA512d08e52fe729b37b29bee47971f9f03a51b55903dfaf3574ae9bbccc5d77d5044facc11ca0d26bb70d90d9de5dbd976c615e38714e0c51af1f8aaa7066cb27b29
-
Filesize
570KB
MD52d7a4d9af0e4b4710122a4e852d6dd3d
SHA15ae1e096ddb3bb0ad8d490da829e87dccbccbff6
SHA256152fe64a2c0405d928676af4341f1fadd2dd0ae91475ca847ea135042c8ac73a
SHA51266f9be4b234e111094aeca31e26b684207b503317477b798fa96e9b5241a92fd74bf844fa0cf3d644ef1134ffeeac4d5462660b2ab6f9e8cdb4625d38735cc32
-
Filesize
570KB
MD52d7a4d9af0e4b4710122a4e852d6dd3d
SHA15ae1e096ddb3bb0ad8d490da829e87dccbccbff6
SHA256152fe64a2c0405d928676af4341f1fadd2dd0ae91475ca847ea135042c8ac73a
SHA51266f9be4b234e111094aeca31e26b684207b503317477b798fa96e9b5241a92fd74bf844fa0cf3d644ef1134ffeeac4d5462660b2ab6f9e8cdb4625d38735cc32
-
Filesize
11KB
MD5e8ce8f79cd6b77821269a3be231d2fc3
SHA193bd2f9caadf6032a08507cb762eacb1b2418a65
SHA256bea8405f25864b6365de517cf54f217179c9c4e385cc26432f536936f11d6639
SHA51258bddf4b04f9f40474c26f6b4796922296648103bb2245fa3357dc4e1284a1afa72480bd8863aaa6c0a5b9b4bca9094fcac7fd297a6007f72a449e8233c661ab
-
Filesize
11KB
MD5e8ce8f79cd6b77821269a3be231d2fc3
SHA193bd2f9caadf6032a08507cb762eacb1b2418a65
SHA256bea8405f25864b6365de517cf54f217179c9c4e385cc26432f536936f11d6639
SHA51258bddf4b04f9f40474c26f6b4796922296648103bb2245fa3357dc4e1284a1afa72480bd8863aaa6c0a5b9b4bca9094fcac7fd297a6007f72a449e8233c661ab
-
Filesize
587KB
MD5f0576313bad4540d216c17c7df667d0f
SHA18c15ccb9934cfbbd68e3f127daee39861b32e853
SHA2563264cca957258026f950844ba1f36ca7124c742536d52dd74e57fe5638cb1f3b
SHA512e9165e006e8dd374932cb75b026b8714ae006514d8991f0d814d7b94526e8a3f5b21e2220178e0a421fe8156d4370f7b06aeea8820e12d6d4fb83a4450b006ac
-
Filesize
587KB
MD5f0576313bad4540d216c17c7df667d0f
SHA18c15ccb9934cfbbd68e3f127daee39861b32e853
SHA2563264cca957258026f950844ba1f36ca7124c742536d52dd74e57fe5638cb1f3b
SHA512e9165e006e8dd374932cb75b026b8714ae006514d8991f0d814d7b94526e8a3f5b21e2220178e0a421fe8156d4370f7b06aeea8820e12d6d4fb83a4450b006ac
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1