Analysis
-
max time kernel
147s -
max time network
104s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14-04-2023 07:01
Static task
static1
General
-
Target
31dc24b543c306cd664467d2e1a1d7010fb33b6d852895796edd44b073647ce6.exe
-
Size
1.0MB
-
MD5
94bfaa0d77de2eb7a6dc64ef61965b01
-
SHA1
3fed9432b2222bb418c8a38770b2177276833159
-
SHA256
31dc24b543c306cd664467d2e1a1d7010fb33b6d852895796edd44b073647ce6
-
SHA512
ea4dadb912ecf45f4622254a720b6982dbf7c4feca369f1390496dfc19e07b7b8daf3bfb37d0792d3ddd16a2af096fdbbb9ad0ba50b148a8b929928ab1fd527b
-
SSDEEP
24576:9yQQvwt1+yyBRxVeUILeghN7AkNqg6Zj1s:YQQ+1+yyBbQeMN7AfZj
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it716426.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it716426.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it716426.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it716426.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it716426.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it716426.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
Processes:
zihj3443.exeziQD3971.exeit716426.exejr409416.exe1.exekp813828.exelr796479.exepid process 2336 zihj3443.exe 2532 ziQD3971.exe 2636 it716426.exe 3844 jr409416.exe 3348 1.exe 1016 kp813828.exe 2068 lr796479.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it716426.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it716426.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
ziQD3971.exe31dc24b543c306cd664467d2e1a1d7010fb33b6d852895796edd44b073647ce6.exezihj3443.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziQD3971.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziQD3971.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 31dc24b543c306cd664467d2e1a1d7010fb33b6d852895796edd44b073647ce6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 31dc24b543c306cd664467d2e1a1d7010fb33b6d852895796edd44b073647ce6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zihj3443.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zihj3443.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 436 2068 WerFault.exe lr796479.exe 3692 2068 WerFault.exe lr796479.exe 1504 2068 WerFault.exe lr796479.exe 2668 2068 WerFault.exe lr796479.exe 1984 2068 WerFault.exe lr796479.exe 1616 2068 WerFault.exe lr796479.exe 4048 2068 WerFault.exe lr796479.exe 4028 2068 WerFault.exe lr796479.exe 2556 2068 WerFault.exe lr796479.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it716426.exe1.exekp813828.exepid process 2636 it716426.exe 2636 it716426.exe 3348 1.exe 1016 kp813828.exe 3348 1.exe 1016 kp813828.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it716426.exejr409416.exe1.exekp813828.exedescription pid process Token: SeDebugPrivilege 2636 it716426.exe Token: SeDebugPrivilege 3844 jr409416.exe Token: SeDebugPrivilege 3348 1.exe Token: SeDebugPrivilege 1016 kp813828.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr796479.exepid process 2068 lr796479.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
31dc24b543c306cd664467d2e1a1d7010fb33b6d852895796edd44b073647ce6.exezihj3443.exeziQD3971.exejr409416.exedescription pid process target process PID 2096 wrote to memory of 2336 2096 31dc24b543c306cd664467d2e1a1d7010fb33b6d852895796edd44b073647ce6.exe zihj3443.exe PID 2096 wrote to memory of 2336 2096 31dc24b543c306cd664467d2e1a1d7010fb33b6d852895796edd44b073647ce6.exe zihj3443.exe PID 2096 wrote to memory of 2336 2096 31dc24b543c306cd664467d2e1a1d7010fb33b6d852895796edd44b073647ce6.exe zihj3443.exe PID 2336 wrote to memory of 2532 2336 zihj3443.exe ziQD3971.exe PID 2336 wrote to memory of 2532 2336 zihj3443.exe ziQD3971.exe PID 2336 wrote to memory of 2532 2336 zihj3443.exe ziQD3971.exe PID 2532 wrote to memory of 2636 2532 ziQD3971.exe it716426.exe PID 2532 wrote to memory of 2636 2532 ziQD3971.exe it716426.exe PID 2532 wrote to memory of 3844 2532 ziQD3971.exe jr409416.exe PID 2532 wrote to memory of 3844 2532 ziQD3971.exe jr409416.exe PID 2532 wrote to memory of 3844 2532 ziQD3971.exe jr409416.exe PID 3844 wrote to memory of 3348 3844 jr409416.exe 1.exe PID 3844 wrote to memory of 3348 3844 jr409416.exe 1.exe PID 3844 wrote to memory of 3348 3844 jr409416.exe 1.exe PID 2336 wrote to memory of 1016 2336 zihj3443.exe kp813828.exe PID 2336 wrote to memory of 1016 2336 zihj3443.exe kp813828.exe PID 2336 wrote to memory of 1016 2336 zihj3443.exe kp813828.exe PID 2096 wrote to memory of 2068 2096 31dc24b543c306cd664467d2e1a1d7010fb33b6d852895796edd44b073647ce6.exe lr796479.exe PID 2096 wrote to memory of 2068 2096 31dc24b543c306cd664467d2e1a1d7010fb33b6d852895796edd44b073647ce6.exe lr796479.exe PID 2096 wrote to memory of 2068 2096 31dc24b543c306cd664467d2e1a1d7010fb33b6d852895796edd44b073647ce6.exe lr796479.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\31dc24b543c306cd664467d2e1a1d7010fb33b6d852895796edd44b073647ce6.exe"C:\Users\Admin\AppData\Local\Temp\31dc24b543c306cd664467d2e1a1d7010fb33b6d852895796edd44b073647ce6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihj3443.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihj3443.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziQD3971.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziQD3971.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it716426.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it716426.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr409416.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr409416.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3348
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp813828.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp813828.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1016
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr796479.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr796479.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:2068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 6323⤵
- Program crash
PID:436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 7083⤵
- Program crash
PID:3692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 8483⤵
- Program crash
PID:1504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 8363⤵
- Program crash
PID:2668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 8843⤵
- Program crash
PID:1984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 6963⤵
- Program crash
PID:1616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 11243⤵
- Program crash
PID:4048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 11643⤵
- Program crash
PID:4028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 11723⤵
- Program crash
PID:2556
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
396KB
MD52d5adc88b61f67dd4a3d0af63556a9b2
SHA1be2a227a96abc93b9ae975d80e298b30f7397ff9
SHA2561e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318
SHA512e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a
-
Filesize
723KB
MD53bd057c39deb71d70f25c789f4be98d9
SHA148e57f1734f7d89972b6f908594f7291846adbe9
SHA2565e0cf9949d9638433b0ecf873d8517004a5743ff1d02a025b5f9d7b323e3159f
SHA5128fa091059aeebb616cbf26a1bd1067d01ca6294c5cb210aa621812f11749512ea4b8fbb739a9356788de9c1ddc10963294f675da7adc6ac841c4a5d3f3f135a8
-
Filesize
723KB
MD53bd057c39deb71d70f25c789f4be98d9
SHA148e57f1734f7d89972b6f908594f7291846adbe9
SHA2565e0cf9949d9638433b0ecf873d8517004a5743ff1d02a025b5f9d7b323e3159f
SHA5128fa091059aeebb616cbf26a1bd1067d01ca6294c5cb210aa621812f11749512ea4b8fbb739a9356788de9c1ddc10963294f675da7adc6ac841c4a5d3f3f135a8
-
Filesize
169KB
MD5bcdadc79c99caea306636ed3e2b96f89
SHA1acd40249115ecee3259268918781812bc900fa55
SHA25643e69c1693bb52eb3e42a0595815598e9d25ae64a96436c760b3a0c1c46f4aad
SHA512b7a82e13efb365cea8670aa343cf18d8ce585d6efe3054cb2a1b25a390a69846d9f7d15bca2677772c8b16856e8773ccb2ee9e8b394f27695fe42f03d682c3c9
-
Filesize
169KB
MD5bcdadc79c99caea306636ed3e2b96f89
SHA1acd40249115ecee3259268918781812bc900fa55
SHA25643e69c1693bb52eb3e42a0595815598e9d25ae64a96436c760b3a0c1c46f4aad
SHA512b7a82e13efb365cea8670aa343cf18d8ce585d6efe3054cb2a1b25a390a69846d9f7d15bca2677772c8b16856e8773ccb2ee9e8b394f27695fe42f03d682c3c9
-
Filesize
569KB
MD51e0af9b89941be0533e9fd0ad0c94e05
SHA15141d775b686f51b42c0f6666279dc5a0583d2bf
SHA256fec27b0a9bf514432c2c4f7c9253209f24b768bf6600cd74fee045f141975366
SHA512f9d2e7c581024113848643d30f743308fcead172a789d9702ff84e092993650e0f658ec707eebd089afc18c92477d2a725927644c64b3a901454f5444b60692e
-
Filesize
569KB
MD51e0af9b89941be0533e9fd0ad0c94e05
SHA15141d775b686f51b42c0f6666279dc5a0583d2bf
SHA256fec27b0a9bf514432c2c4f7c9253209f24b768bf6600cd74fee045f141975366
SHA512f9d2e7c581024113848643d30f743308fcead172a789d9702ff84e092993650e0f658ec707eebd089afc18c92477d2a725927644c64b3a901454f5444b60692e
-
Filesize
11KB
MD533827ef6670492655add2ff6c82e2920
SHA14b21e0bef991b2bbfd36559d94360f3acb8889f5
SHA256e3b0a0a7e3495b4e313154afdda221087beceeb402ea5407496eb94a05f9da84
SHA512a595d1e07a7b6aef0ee2fe21ba5495168ca9131743c8f98d2008faca3e70270e26fbca152447711823ded74140ffbd7a50873cf3ed20adafce40a5d170ce8429
-
Filesize
11KB
MD533827ef6670492655add2ff6c82e2920
SHA14b21e0bef991b2bbfd36559d94360f3acb8889f5
SHA256e3b0a0a7e3495b4e313154afdda221087beceeb402ea5407496eb94a05f9da84
SHA512a595d1e07a7b6aef0ee2fe21ba5495168ca9131743c8f98d2008faca3e70270e26fbca152447711823ded74140ffbd7a50873cf3ed20adafce40a5d170ce8429
-
Filesize
587KB
MD5d8877a6970bba6a8ba623309938b1487
SHA144b9e7c81551580a37b8954aa42af0e3cb85ff3a
SHA256bb41bf767d57c1ae623dbcb941a5b3d1ce6f2f552a524181ca66d78e07ed1d81
SHA512c6d6ab76ec6f990bccb54f1ac8f6bdbda5b5f9958f8740e6b5410d476f7c55e5fe20ad44f16cb7e7f0e21db9488e1aacba6fd6d2d5d9fd13d982864f439274b4
-
Filesize
587KB
MD5d8877a6970bba6a8ba623309938b1487
SHA144b9e7c81551580a37b8954aa42af0e3cb85ff3a
SHA256bb41bf767d57c1ae623dbcb941a5b3d1ce6f2f552a524181ca66d78e07ed1d81
SHA512c6d6ab76ec6f990bccb54f1ac8f6bdbda5b5f9958f8740e6b5410d476f7c55e5fe20ad44f16cb7e7f0e21db9488e1aacba6fd6d2d5d9fd13d982864f439274b4
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1