Analysis
-
max time kernel
143s -
max time network
141s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14-04-2023 06:52
Static task
static1
General
-
Target
97c3e6b2010672525233469655de5712aca96f7deca0a0b4977e4284c16f9131.exe
-
Size
1.0MB
-
MD5
49a5742928cc7a9247779618cd571eaa
-
SHA1
9182a240b8ef36daf63efd0de01b8aaa11ee4789
-
SHA256
97c3e6b2010672525233469655de5712aca96f7deca0a0b4977e4284c16f9131
-
SHA512
71210abe5e0824495c4cf52777577fee15fe6f217504c4c776c711dceac31475761b72842ffc7f11d4c12db5b45288a17fe555903a49c9ad93377c0e6912fb82
-
SSDEEP
24576:KyiFarFmoSWdXVVrgLIn+SXXJhJ+x3EV:RXxSWpII+uX3cx3E
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it823999.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it823999.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it823999.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it823999.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it823999.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it823999.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
Processes:
ziOX7083.exeziab0568.exeit823999.exejr188916.exe1.exekp738872.exelr107213.exepid process 5112 ziOX7083.exe 2100 ziab0568.exe 4700 it823999.exe 2864 jr188916.exe 2160 1.exe 3228 kp738872.exe 5032 lr107213.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it823999.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it823999.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
ziab0568.exe97c3e6b2010672525233469655de5712aca96f7deca0a0b4977e4284c16f9131.exeziOX7083.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziab0568.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 97c3e6b2010672525233469655de5712aca96f7deca0a0b4977e4284c16f9131.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 97c3e6b2010672525233469655de5712aca96f7deca0a0b4977e4284c16f9131.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziOX7083.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziOX7083.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziab0568.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4808 5032 WerFault.exe lr107213.exe 4920 5032 WerFault.exe lr107213.exe 4444 5032 WerFault.exe lr107213.exe 4492 5032 WerFault.exe lr107213.exe 944 5032 WerFault.exe lr107213.exe 2660 5032 WerFault.exe lr107213.exe 1244 5032 WerFault.exe lr107213.exe 4972 5032 WerFault.exe lr107213.exe 4448 5032 WerFault.exe lr107213.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it823999.exekp738872.exe1.exepid process 4700 it823999.exe 4700 it823999.exe 3228 kp738872.exe 2160 1.exe 2160 1.exe 3228 kp738872.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it823999.exejr188916.exekp738872.exe1.exedescription pid process Token: SeDebugPrivilege 4700 it823999.exe Token: SeDebugPrivilege 2864 jr188916.exe Token: SeDebugPrivilege 3228 kp738872.exe Token: SeDebugPrivilege 2160 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr107213.exepid process 5032 lr107213.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
97c3e6b2010672525233469655de5712aca96f7deca0a0b4977e4284c16f9131.exeziOX7083.exeziab0568.exejr188916.exedescription pid process target process PID 4600 wrote to memory of 5112 4600 97c3e6b2010672525233469655de5712aca96f7deca0a0b4977e4284c16f9131.exe ziOX7083.exe PID 4600 wrote to memory of 5112 4600 97c3e6b2010672525233469655de5712aca96f7deca0a0b4977e4284c16f9131.exe ziOX7083.exe PID 4600 wrote to memory of 5112 4600 97c3e6b2010672525233469655de5712aca96f7deca0a0b4977e4284c16f9131.exe ziOX7083.exe PID 5112 wrote to memory of 2100 5112 ziOX7083.exe ziab0568.exe PID 5112 wrote to memory of 2100 5112 ziOX7083.exe ziab0568.exe PID 5112 wrote to memory of 2100 5112 ziOX7083.exe ziab0568.exe PID 2100 wrote to memory of 4700 2100 ziab0568.exe it823999.exe PID 2100 wrote to memory of 4700 2100 ziab0568.exe it823999.exe PID 2100 wrote to memory of 2864 2100 ziab0568.exe jr188916.exe PID 2100 wrote to memory of 2864 2100 ziab0568.exe jr188916.exe PID 2100 wrote to memory of 2864 2100 ziab0568.exe jr188916.exe PID 2864 wrote to memory of 2160 2864 jr188916.exe 1.exe PID 2864 wrote to memory of 2160 2864 jr188916.exe 1.exe PID 2864 wrote to memory of 2160 2864 jr188916.exe 1.exe PID 5112 wrote to memory of 3228 5112 ziOX7083.exe kp738872.exe PID 5112 wrote to memory of 3228 5112 ziOX7083.exe kp738872.exe PID 5112 wrote to memory of 3228 5112 ziOX7083.exe kp738872.exe PID 4600 wrote to memory of 5032 4600 97c3e6b2010672525233469655de5712aca96f7deca0a0b4977e4284c16f9131.exe lr107213.exe PID 4600 wrote to memory of 5032 4600 97c3e6b2010672525233469655de5712aca96f7deca0a0b4977e4284c16f9131.exe lr107213.exe PID 4600 wrote to memory of 5032 4600 97c3e6b2010672525233469655de5712aca96f7deca0a0b4977e4284c16f9131.exe lr107213.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\97c3e6b2010672525233469655de5712aca96f7deca0a0b4977e4284c16f9131.exe"C:\Users\Admin\AppData\Local\Temp\97c3e6b2010672525233469655de5712aca96f7deca0a0b4977e4284c16f9131.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziOX7083.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziOX7083.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziab0568.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziab0568.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it823999.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it823999.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4700
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr188916.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr188916.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2160
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp738872.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp738872.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3228
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr107213.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr107213.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:5032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 6323⤵
- Program crash
PID:4808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 7083⤵
- Program crash
PID:4920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 8443⤵
- Program crash
PID:4444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 8563⤵
- Program crash
PID:4492
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 8963⤵
- Program crash
PID:944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 9043⤵
- Program crash
PID:2660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 11283⤵
- Program crash
PID:1244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 11523⤵
- Program crash
PID:4972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 11923⤵
- Program crash
PID:4448
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
723KB
MD5d4e3732ab5b0a2dd1058b219b083b9e4
SHA1b959948881ea08e6deb06b414330c4583b6866a1
SHA256f8e69b153845b65d7c57e0ac3c77a42d014553ff4d69f947c22ff4d426c61397
SHA512ccb3fe88ff853798ebf9c5365e846d888ff4fe41bd288bd925f0ee6fe826d01c936c95bf821cd77153b910259fb8a58f494c9d384785049c0a34f0bd6dcccaa1
-
Filesize
723KB
MD5d4e3732ab5b0a2dd1058b219b083b9e4
SHA1b959948881ea08e6deb06b414330c4583b6866a1
SHA256f8e69b153845b65d7c57e0ac3c77a42d014553ff4d69f947c22ff4d426c61397
SHA512ccb3fe88ff853798ebf9c5365e846d888ff4fe41bd288bd925f0ee6fe826d01c936c95bf821cd77153b910259fb8a58f494c9d384785049c0a34f0bd6dcccaa1
-
Filesize
169KB
MD570fec48493a3d15d76fc43e0be1b025c
SHA1354a12a7bfec2e8c2953f47c0c8450ade699a830
SHA2565213b0b94096ec10cabd1d99f93363ebbe2f5e166ce3cff54198ff35d3abc2db
SHA5127061ae651781c6d206b1bfa4f3961e7734073cf65f6ef85ba6d02459073f42579f6498fa1612aa074003608e5f1832e3ac7b980e0f60db2e32563f287afc604e
-
Filesize
169KB
MD570fec48493a3d15d76fc43e0be1b025c
SHA1354a12a7bfec2e8c2953f47c0c8450ade699a830
SHA2565213b0b94096ec10cabd1d99f93363ebbe2f5e166ce3cff54198ff35d3abc2db
SHA5127061ae651781c6d206b1bfa4f3961e7734073cf65f6ef85ba6d02459073f42579f6498fa1612aa074003608e5f1832e3ac7b980e0f60db2e32563f287afc604e
-
Filesize
569KB
MD55689b56e4fe5fd82d7ca99b494973726
SHA1b5e45fde1c401f277151f4cccf65c93ea5297862
SHA256a627f9d337338b1b47074dc4bb89acd5c71846fb3f0eeaa1b862be007e86ca63
SHA512636decab5a1c6f75d20a0c1e43c5405fb3145353df336ed0b2554a259586ad1e7287a88b84cb724c9ee16f2390defb5454ec6aa640f9ffe8591c9839afab3fe3
-
Filesize
569KB
MD55689b56e4fe5fd82d7ca99b494973726
SHA1b5e45fde1c401f277151f4cccf65c93ea5297862
SHA256a627f9d337338b1b47074dc4bb89acd5c71846fb3f0eeaa1b862be007e86ca63
SHA512636decab5a1c6f75d20a0c1e43c5405fb3145353df336ed0b2554a259586ad1e7287a88b84cb724c9ee16f2390defb5454ec6aa640f9ffe8591c9839afab3fe3
-
Filesize
11KB
MD50825fdc5fdac0ab4bdc3463180013898
SHA1efdfa93e549adc360db65eb77433d7b762425cc2
SHA256cbe8b8c20e3ef76e9fe7f0d9710c3c7c64d50d1e5163e22de8d7b7ba5ead53ee
SHA51255ef5a7678a225970065a5e544bdfdcf195cd2b7586a8cbb7a3f0aa086eb9f27f61580036ceb7851f79bd6b525488efa1a162b3457596e251741a58f7b78bbb8
-
Filesize
11KB
MD50825fdc5fdac0ab4bdc3463180013898
SHA1efdfa93e549adc360db65eb77433d7b762425cc2
SHA256cbe8b8c20e3ef76e9fe7f0d9710c3c7c64d50d1e5163e22de8d7b7ba5ead53ee
SHA51255ef5a7678a225970065a5e544bdfdcf195cd2b7586a8cbb7a3f0aa086eb9f27f61580036ceb7851f79bd6b525488efa1a162b3457596e251741a58f7b78bbb8
-
Filesize
587KB
MD5d3bbabd84eb43da76f189e378504d612
SHA1e3a5c760539713a1888da03c981348107faa5823
SHA256863ad11189d6541591ac99686b0b564dd2fa8e4c8da04fe8feaa6304b869be80
SHA51247a0a65268ec4edb64d431197c7d8b9e88509ebeaba9cd23149a444a09d684bbb7a35017081b192448640a22886a7f0131c80bcbb8cf174dd4a3f8a7d1b7bc67
-
Filesize
587KB
MD5d3bbabd84eb43da76f189e378504d612
SHA1e3a5c760539713a1888da03c981348107faa5823
SHA256863ad11189d6541591ac99686b0b564dd2fa8e4c8da04fe8feaa6304b869be80
SHA51247a0a65268ec4edb64d431197c7d8b9e88509ebeaba9cd23149a444a09d684bbb7a35017081b192448640a22886a7f0131c80bcbb8cf174dd4a3f8a7d1b7bc67
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1