Analysis
-
max time kernel
146s -
max time network
103s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14-04-2023 05:55
Static task
static1
General
-
Target
6d89ef1195911cb4d3f2b2b1af9661e001d535c6d38d27a02c83176da6439be1.exe
-
Size
1.2MB
-
MD5
f7dfff255daf871b4d08254f326b279c
-
SHA1
0ffd698c1ab580aa8ff33742b792e4449b76c8f8
-
SHA256
6d89ef1195911cb4d3f2b2b1af9661e001d535c6d38d27a02c83176da6439be1
-
SHA512
cad90d90626f2e94512fe7328a7ac0047e1b94764f647a8c98c3f47a6c577cf3c48a4acd4cdade72ec309d817fc7f80c8c4c2ab43d28599412d4135213419f26
-
SSDEEP
24576:Gyh/bmcd9di4QuKV2zMDRAEGBr5V8MjLaGldyVW+KWuoOrnbqno67i:Vh/bmcd9HQdV2IRAEq5xasg8rnb/s
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
pr094573.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr094573.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr094573.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr094573.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr094573.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr094573.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
Processes:
un365261.exeun824547.exepr094573.exequ885184.exe1.exerk522111.exesi945975.exepid process 2504 un365261.exe 2560 un824547.exe 3012 pr094573.exe 960 qu885184.exe 3400 1.exe 1772 rk522111.exe 5092 si945975.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr094573.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr094573.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr094573.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
6d89ef1195911cb4d3f2b2b1af9661e001d535c6d38d27a02c83176da6439be1.exeun365261.exeun824547.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6d89ef1195911cb4d3f2b2b1af9661e001d535c6d38d27a02c83176da6439be1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un365261.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un365261.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un824547.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un824547.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6d89ef1195911cb4d3f2b2b1af9661e001d535c6d38d27a02c83176da6439be1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 2200 5092 WerFault.exe si945975.exe 1596 5092 WerFault.exe si945975.exe 3648 5092 WerFault.exe si945975.exe 2800 5092 WerFault.exe si945975.exe 2732 5092 WerFault.exe si945975.exe 3848 5092 WerFault.exe si945975.exe 4712 5092 WerFault.exe si945975.exe 1320 5092 WerFault.exe si945975.exe 4592 5092 WerFault.exe si945975.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr094573.exe1.exerk522111.exepid process 3012 pr094573.exe 3012 pr094573.exe 3400 1.exe 1772 rk522111.exe 3400 1.exe 1772 rk522111.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pr094573.exequ885184.exe1.exerk522111.exedescription pid process Token: SeDebugPrivilege 3012 pr094573.exe Token: SeDebugPrivilege 960 qu885184.exe Token: SeDebugPrivilege 3400 1.exe Token: SeDebugPrivilege 1772 rk522111.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si945975.exepid process 5092 si945975.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
6d89ef1195911cb4d3f2b2b1af9661e001d535c6d38d27a02c83176da6439be1.exeun365261.exeun824547.exequ885184.exedescription pid process target process PID 1792 wrote to memory of 2504 1792 6d89ef1195911cb4d3f2b2b1af9661e001d535c6d38d27a02c83176da6439be1.exe un365261.exe PID 1792 wrote to memory of 2504 1792 6d89ef1195911cb4d3f2b2b1af9661e001d535c6d38d27a02c83176da6439be1.exe un365261.exe PID 1792 wrote to memory of 2504 1792 6d89ef1195911cb4d3f2b2b1af9661e001d535c6d38d27a02c83176da6439be1.exe un365261.exe PID 2504 wrote to memory of 2560 2504 un365261.exe un824547.exe PID 2504 wrote to memory of 2560 2504 un365261.exe un824547.exe PID 2504 wrote to memory of 2560 2504 un365261.exe un824547.exe PID 2560 wrote to memory of 3012 2560 un824547.exe pr094573.exe PID 2560 wrote to memory of 3012 2560 un824547.exe pr094573.exe PID 2560 wrote to memory of 3012 2560 un824547.exe pr094573.exe PID 2560 wrote to memory of 960 2560 un824547.exe qu885184.exe PID 2560 wrote to memory of 960 2560 un824547.exe qu885184.exe PID 2560 wrote to memory of 960 2560 un824547.exe qu885184.exe PID 960 wrote to memory of 3400 960 qu885184.exe 1.exe PID 960 wrote to memory of 3400 960 qu885184.exe 1.exe PID 960 wrote to memory of 3400 960 qu885184.exe 1.exe PID 2504 wrote to memory of 1772 2504 un365261.exe rk522111.exe PID 2504 wrote to memory of 1772 2504 un365261.exe rk522111.exe PID 2504 wrote to memory of 1772 2504 un365261.exe rk522111.exe PID 1792 wrote to memory of 5092 1792 6d89ef1195911cb4d3f2b2b1af9661e001d535c6d38d27a02c83176da6439be1.exe si945975.exe PID 1792 wrote to memory of 5092 1792 6d89ef1195911cb4d3f2b2b1af9661e001d535c6d38d27a02c83176da6439be1.exe si945975.exe PID 1792 wrote to memory of 5092 1792 6d89ef1195911cb4d3f2b2b1af9661e001d535c6d38d27a02c83176da6439be1.exe si945975.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d89ef1195911cb4d3f2b2b1af9661e001d535c6d38d27a02c83176da6439be1.exe"C:\Users\Admin\AppData\Local\Temp\6d89ef1195911cb4d3f2b2b1af9661e001d535c6d38d27a02c83176da6439be1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un365261.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un365261.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un824547.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un824547.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr094573.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr094573.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu885184.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu885184.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3400
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk522111.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk522111.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si945975.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si945975.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:5092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 6323⤵
- Program crash
PID:2200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 7083⤵
- Program crash
PID:1596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 8483⤵
- Program crash
PID:3648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 8563⤵
- Program crash
PID:2800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 8843⤵
- Program crash
PID:2732
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 7123⤵
- Program crash
PID:3848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 11283⤵
- Program crash
PID:4712
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 11723⤵
- Program crash
PID:1320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 11443⤵
- Program crash
PID:4592
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
860KB
MD5cdeac49f6f3d7f22243af6b366aafb28
SHA11c32e017b01f012ce9189feb60867537082de548
SHA2564559249bbf44f4fc2a44f8d554d97beceffaf5f57b7f87eb5037503086c4656e
SHA51230c0e1e0384c983b1c9a09004baf4c70d6d6e0494721a5de784f35ac57d88e5895e9e76dc2dc4abaa8eb42ffbabd38445990b1d704d1641b15cbd2b300f66d59
-
Filesize
860KB
MD5cdeac49f6f3d7f22243af6b366aafb28
SHA11c32e017b01f012ce9189feb60867537082de548
SHA2564559249bbf44f4fc2a44f8d554d97beceffaf5f57b7f87eb5037503086c4656e
SHA51230c0e1e0384c983b1c9a09004baf4c70d6d6e0494721a5de784f35ac57d88e5895e9e76dc2dc4abaa8eb42ffbabd38445990b1d704d1641b15cbd2b300f66d59
-
Filesize
169KB
MD52bbb3a03392e47f38f8be227fd0414b3
SHA1241f3e398fbea848c2ce650b9788ee29c962dc84
SHA256cdd1cca38b8cfc92bcf5c95d76cb9213f62c19c4d0d535a721a8760d8ff9a924
SHA5127842a6685846a5b2b15b968f9057747801701c361c528939f4f40fe61757001c512a1489a2843de91a249c92dc7ae98454f742b5f2dce7cab9437abc5d704747
-
Filesize
169KB
MD52bbb3a03392e47f38f8be227fd0414b3
SHA1241f3e398fbea848c2ce650b9788ee29c962dc84
SHA256cdd1cca38b8cfc92bcf5c95d76cb9213f62c19c4d0d535a721a8760d8ff9a924
SHA5127842a6685846a5b2b15b968f9057747801701c361c528939f4f40fe61757001c512a1489a2843de91a249c92dc7ae98454f742b5f2dce7cab9437abc5d704747
-
Filesize
706KB
MD59aedd34fc65ad1f1df8fad49f8b892a1
SHA17d406f7cb4796d909850386998a3261847bff140
SHA2560030180d4dcb9b2878d5dd83930ff00ba4715b99b4c8775799d6970ada9ce303
SHA512afb32d8ee4f41c867293ec0e5c43cc545b9f6528814706a168c2c12a1631a544630cebb845af69247956484fac119415c458239b95fe0863045a9e162551aaf1
-
Filesize
706KB
MD59aedd34fc65ad1f1df8fad49f8b892a1
SHA17d406f7cb4796d909850386998a3261847bff140
SHA2560030180d4dcb9b2878d5dd83930ff00ba4715b99b4c8775799d6970ada9ce303
SHA512afb32d8ee4f41c867293ec0e5c43cc545b9f6528814706a168c2c12a1631a544630cebb845af69247956484fac119415c458239b95fe0863045a9e162551aaf1
-
Filesize
404KB
MD5a12331115e46fcbba7d5872d1405dcb8
SHA187d4399bd7febae8fb046265e8634feb63e4d679
SHA256caf5f99460a2c4e210e183b6e984beae7e0627f8e78252f7932d67d2f970ae74
SHA512a136004d7f52c78768921e9ab4f19cc7d1fac8f958952b79b3199b5dcd57d72e8c68fbfe87a46c7e9ca4d9f97b057bcd991078bc12349454ba9dad788318c461
-
Filesize
404KB
MD5a12331115e46fcbba7d5872d1405dcb8
SHA187d4399bd7febae8fb046265e8634feb63e4d679
SHA256caf5f99460a2c4e210e183b6e984beae7e0627f8e78252f7932d67d2f970ae74
SHA512a136004d7f52c78768921e9ab4f19cc7d1fac8f958952b79b3199b5dcd57d72e8c68fbfe87a46c7e9ca4d9f97b057bcd991078bc12349454ba9dad788318c461
-
Filesize
587KB
MD5533c242a3a69557dddfb8e371c6c9682
SHA1f5554ccd11d37e5c9b9f866466906598f0a2dfb6
SHA256aaf1fce9d05d326ea3865c255de4ccd935848b900df4e55656faa6e80d400b2c
SHA51261eb871be469473696593ab98b87344e8cf07d308f8e6b2932bba394349f61853f69b742d27a13d4ef8acbd24cb411f874c9f5a9d1664532037022649d21a6b0
-
Filesize
587KB
MD5533c242a3a69557dddfb8e371c6c9682
SHA1f5554ccd11d37e5c9b9f866466906598f0a2dfb6
SHA256aaf1fce9d05d326ea3865c255de4ccd935848b900df4e55656faa6e80d400b2c
SHA51261eb871be469473696593ab98b87344e8cf07d308f8e6b2932bba394349f61853f69b742d27a13d4ef8acbd24cb411f874c9f5a9d1664532037022649d21a6b0
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1