Analysis
-
max time kernel
148s -
max time network
105s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14-04-2023 08:10
Static task
static1
General
-
Target
08dc546e878330b082f87955dd9099047df01c97867c0883db4cd66a3a6bbcae.exe
-
Size
1.2MB
-
MD5
a589de6485aa1f78a1eb20df98e6c59e
-
SHA1
29e824f4015273fe87e26da711a5d3c289a6bf69
-
SHA256
08dc546e878330b082f87955dd9099047df01c97867c0883db4cd66a3a6bbcae
-
SHA512
500bde4c74705ed908b47c828ebe4624e2c3b9ac1bc61db34dc8c3f8831ea34b89bc079cad75af1685e284a68bbbbe00db61c36860dc585304923f8e276d2805
-
SSDEEP
24576:FykcpAhtyJ5zKV7Hbi1O9NH6sdMCOdeOs5HDC2ft:gVpatyzzKV7Hbi1i54dSHD
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
pr158215.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr158215.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr158215.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr158215.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr158215.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr158215.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
Processes:
un224200.exeun984500.exepr158215.exequ627849.exe1.exerk387473.exesi038272.exepid process 3488 un224200.exe 2692 un984500.exe 3976 pr158215.exe 4876 qu627849.exe 2560 1.exe 1152 rk387473.exe 3968 si038272.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
pr158215.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr158215.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr158215.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
08dc546e878330b082f87955dd9099047df01c97867c0883db4cd66a3a6bbcae.exeun224200.exeun984500.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 08dc546e878330b082f87955dd9099047df01c97867c0883db4cd66a3a6bbcae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 08dc546e878330b082f87955dd9099047df01c97867c0883db4cd66a3a6bbcae.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un224200.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un224200.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un984500.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un984500.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 4400 3968 WerFault.exe si038272.exe 4632 3968 WerFault.exe si038272.exe 4092 3968 WerFault.exe si038272.exe 4764 3968 WerFault.exe si038272.exe 4852 3968 WerFault.exe si038272.exe 3568 3968 WerFault.exe si038272.exe 1192 3968 WerFault.exe si038272.exe 2216 3968 WerFault.exe si038272.exe 3564 3968 WerFault.exe si038272.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
pr158215.exerk387473.exe1.exepid process 3976 pr158215.exe 3976 pr158215.exe 1152 rk387473.exe 2560 1.exe 2560 1.exe 1152 rk387473.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
pr158215.exequ627849.exerk387473.exe1.exedescription pid process Token: SeDebugPrivilege 3976 pr158215.exe Token: SeDebugPrivilege 4876 qu627849.exe Token: SeDebugPrivilege 1152 rk387473.exe Token: SeDebugPrivilege 2560 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
si038272.exepid process 3968 si038272.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
08dc546e878330b082f87955dd9099047df01c97867c0883db4cd66a3a6bbcae.exeun224200.exeun984500.exequ627849.exedescription pid process target process PID 4024 wrote to memory of 3488 4024 08dc546e878330b082f87955dd9099047df01c97867c0883db4cd66a3a6bbcae.exe un224200.exe PID 4024 wrote to memory of 3488 4024 08dc546e878330b082f87955dd9099047df01c97867c0883db4cd66a3a6bbcae.exe un224200.exe PID 4024 wrote to memory of 3488 4024 08dc546e878330b082f87955dd9099047df01c97867c0883db4cd66a3a6bbcae.exe un224200.exe PID 3488 wrote to memory of 2692 3488 un224200.exe un984500.exe PID 3488 wrote to memory of 2692 3488 un224200.exe un984500.exe PID 3488 wrote to memory of 2692 3488 un224200.exe un984500.exe PID 2692 wrote to memory of 3976 2692 un984500.exe pr158215.exe PID 2692 wrote to memory of 3976 2692 un984500.exe pr158215.exe PID 2692 wrote to memory of 3976 2692 un984500.exe pr158215.exe PID 2692 wrote to memory of 4876 2692 un984500.exe qu627849.exe PID 2692 wrote to memory of 4876 2692 un984500.exe qu627849.exe PID 2692 wrote to memory of 4876 2692 un984500.exe qu627849.exe PID 4876 wrote to memory of 2560 4876 qu627849.exe 1.exe PID 4876 wrote to memory of 2560 4876 qu627849.exe 1.exe PID 4876 wrote to memory of 2560 4876 qu627849.exe 1.exe PID 3488 wrote to memory of 1152 3488 un224200.exe rk387473.exe PID 3488 wrote to memory of 1152 3488 un224200.exe rk387473.exe PID 3488 wrote to memory of 1152 3488 un224200.exe rk387473.exe PID 4024 wrote to memory of 3968 4024 08dc546e878330b082f87955dd9099047df01c97867c0883db4cd66a3a6bbcae.exe si038272.exe PID 4024 wrote to memory of 3968 4024 08dc546e878330b082f87955dd9099047df01c97867c0883db4cd66a3a6bbcae.exe si038272.exe PID 4024 wrote to memory of 3968 4024 08dc546e878330b082f87955dd9099047df01c97867c0883db4cd66a3a6bbcae.exe si038272.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\08dc546e878330b082f87955dd9099047df01c97867c0883db4cd66a3a6bbcae.exe"C:\Users\Admin\AppData\Local\Temp\08dc546e878330b082f87955dd9099047df01c97867c0883db4cd66a3a6bbcae.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un224200.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un224200.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un984500.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un984500.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr158215.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr158215.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3976
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu627849.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu627849.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk387473.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk387473.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1152
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si038272.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si038272.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:3968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 6323⤵
- Program crash
PID:4400
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 7083⤵
- Program crash
PID:4632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 8483⤵
- Program crash
PID:4092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 8563⤵
- Program crash
PID:4764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 8843⤵
- Program crash
PID:4852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 9323⤵
- Program crash
PID:3568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 11283⤵
- Program crash
PID:1192
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 11883⤵
- Program crash
PID:2216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 11483⤵
- Program crash
PID:3564
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
862KB
MD512f017f543a3ef843029e7705003e3f8
SHA12e4a717b55d6bfee469aa213dc1c2c11151c11ca
SHA25603c2fb3b9c0ef6a0b91678b13c3e58f4cd886b0f055b6910d9e38d209f632ff8
SHA5125af48dc2005370875dfd5b9c9fd572defda8b32edf2f88489233cb2dc5123ece78321610da13c658bad59cecc37e976d2495f0e44bd241aacb4ca50f2e590f83
-
Filesize
862KB
MD512f017f543a3ef843029e7705003e3f8
SHA12e4a717b55d6bfee469aa213dc1c2c11151c11ca
SHA25603c2fb3b9c0ef6a0b91678b13c3e58f4cd886b0f055b6910d9e38d209f632ff8
SHA5125af48dc2005370875dfd5b9c9fd572defda8b32edf2f88489233cb2dc5123ece78321610da13c658bad59cecc37e976d2495f0e44bd241aacb4ca50f2e590f83
-
Filesize
169KB
MD5860d6e78d281e42498bed86f05294faf
SHA1231fd1dd31281a0cb620e37337872012c1e309cd
SHA2566b5bdd86687e696d2783c26944f2450ee7755eb42a450841abf55b7ba354a6a7
SHA51259db2be9da97fb6b0789b6d6e1e4cce5f731a0c9775a2c35a9e35043768dc5e8d8fdfcd3c7b37b1b15ece4fb0a2404b7624417ba42eae2247de0454456827671
-
Filesize
169KB
MD5860d6e78d281e42498bed86f05294faf
SHA1231fd1dd31281a0cb620e37337872012c1e309cd
SHA2566b5bdd86687e696d2783c26944f2450ee7755eb42a450841abf55b7ba354a6a7
SHA51259db2be9da97fb6b0789b6d6e1e4cce5f731a0c9775a2c35a9e35043768dc5e8d8fdfcd3c7b37b1b15ece4fb0a2404b7624417ba42eae2247de0454456827671
-
Filesize
709KB
MD5fed96e078c5fd33831cc71321988c3e4
SHA15f5d1e9b26c595b0bf20a3139167775614909cee
SHA256e3fc84da0946269c1a60d9f414da3674760d8a4e913a003a8178ba5cc9ad15f5
SHA5121097189887d4e1bf5a6fbc2a5e6b5ec55fa094800f57549cb6c111c51487a3937bffeec962f69d72dddd8625668bee86daacc9e18b28a473efd951dd38f9abc7
-
Filesize
709KB
MD5fed96e078c5fd33831cc71321988c3e4
SHA15f5d1e9b26c595b0bf20a3139167775614909cee
SHA256e3fc84da0946269c1a60d9f414da3674760d8a4e913a003a8178ba5cc9ad15f5
SHA5121097189887d4e1bf5a6fbc2a5e6b5ec55fa094800f57549cb6c111c51487a3937bffeec962f69d72dddd8625668bee86daacc9e18b28a473efd951dd38f9abc7
-
Filesize
404KB
MD599973162e1ab13dc56e5b425b9daa1c2
SHA1d3b2f5e611186a8eddbaa506405de6a01c0138e2
SHA256009e4c46bebdc0fbccb78ea09e04188abc693742204274cce8c03dcf0a4d42ca
SHA512224b2d8af2f287ce31652ad859770f0b2658b2b4d52b03e491e2641888c185d394f032d77e55ab9f8ff500705e439852c450821ca2a44cee86a55e4a7318e3d4
-
Filesize
404KB
MD599973162e1ab13dc56e5b425b9daa1c2
SHA1d3b2f5e611186a8eddbaa506405de6a01c0138e2
SHA256009e4c46bebdc0fbccb78ea09e04188abc693742204274cce8c03dcf0a4d42ca
SHA512224b2d8af2f287ce31652ad859770f0b2658b2b4d52b03e491e2641888c185d394f032d77e55ab9f8ff500705e439852c450821ca2a44cee86a55e4a7318e3d4
-
Filesize
588KB
MD5798bebfff2666b6576dab39e5936a22c
SHA143a214d9d6400868c4318f8b9c0f045a1065fead
SHA256194f7667d3cdad1698d5730faa56897cb4afa7fdcf212ae22dffcef2bba15d3b
SHA512444b2433ae7ceda2edf08a75efb8e9fdddd7802cd4dd511301cd6de10b5f466aee50681f40b2abf9d4d4a9ac2a5d1c3faed1aebce5c27f93a5270830ce298fea
-
Filesize
588KB
MD5798bebfff2666b6576dab39e5936a22c
SHA143a214d9d6400868c4318f8b9c0f045a1065fead
SHA256194f7667d3cdad1698d5730faa56897cb4afa7fdcf212ae22dffcef2bba15d3b
SHA512444b2433ae7ceda2edf08a75efb8e9fdddd7802cd4dd511301cd6de10b5f466aee50681f40b2abf9d4d4a9ac2a5d1c3faed1aebce5c27f93a5270830ce298fea
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1