Analysis
-
max time kernel
146s -
max time network
104s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14-04-2023 07:38
Static task
static1
General
-
Target
f6eb00bb4a87946ea8c1030233ba119aa1589af761a7e0b3e4c503f325ad8d76.exe
-
Size
1.0MB
-
MD5
aeb573a875ebe645e4523034501c9522
-
SHA1
b1fcf9df6e086d622c9df9cacc88ea29dd88fdbc
-
SHA256
f6eb00bb4a87946ea8c1030233ba119aa1589af761a7e0b3e4c503f325ad8d76
-
SHA512
46a019b7fd3fe2df6b923518e6f910d1d7468a390395f632ea0c0066761f8803ca9f22ff8325eb8cee8e04174527e71b268c2343503f11f6b09a8836ea62f0f7
-
SSDEEP
24576:WyZzInAhCHA6wKEyLWXc1P9WWUOrfJ9XbQ0gw2Jo:lZzIAhCHAyHaXc1l5UOrXc052
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it029980.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it029980.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it029980.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it029980.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it029980.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it029980.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
Processes:
ziLE4804.exezivL6659.exeit029980.exejr247588.exe1.exekp678555.exelr371878.exepid process 2504 ziLE4804.exe 2560 zivL6659.exe 3012 it029980.exe 5016 jr247588.exe 336 1.exe 164 kp678555.exe 2168 lr371878.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it029980.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it029980.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
ziLE4804.exezivL6659.exef6eb00bb4a87946ea8c1030233ba119aa1589af761a7e0b3e4c503f325ad8d76.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziLE4804.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zivL6659.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zivL6659.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f6eb00bb4a87946ea8c1030233ba119aa1589af761a7e0b3e4c503f325ad8d76.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f6eb00bb4a87946ea8c1030233ba119aa1589af761a7e0b3e4c503f325ad8d76.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziLE4804.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3452 2168 WerFault.exe lr371878.exe 2484 2168 WerFault.exe lr371878.exe 2588 2168 WerFault.exe lr371878.exe 2648 2168 WerFault.exe lr371878.exe 4992 2168 WerFault.exe lr371878.exe 2088 2168 WerFault.exe lr371878.exe 1448 2168 WerFault.exe lr371878.exe 4700 2168 WerFault.exe lr371878.exe 2808 2168 WerFault.exe lr371878.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it029980.exe1.exekp678555.exepid process 3012 it029980.exe 3012 it029980.exe 336 1.exe 336 1.exe 164 kp678555.exe 164 kp678555.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it029980.exejr247588.exe1.exekp678555.exedescription pid process Token: SeDebugPrivilege 3012 it029980.exe Token: SeDebugPrivilege 5016 jr247588.exe Token: SeDebugPrivilege 336 1.exe Token: SeDebugPrivilege 164 kp678555.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
lr371878.exepid process 2168 lr371878.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
f6eb00bb4a87946ea8c1030233ba119aa1589af761a7e0b3e4c503f325ad8d76.exeziLE4804.exezivL6659.exejr247588.exedescription pid process target process PID 1792 wrote to memory of 2504 1792 f6eb00bb4a87946ea8c1030233ba119aa1589af761a7e0b3e4c503f325ad8d76.exe ziLE4804.exe PID 1792 wrote to memory of 2504 1792 f6eb00bb4a87946ea8c1030233ba119aa1589af761a7e0b3e4c503f325ad8d76.exe ziLE4804.exe PID 1792 wrote to memory of 2504 1792 f6eb00bb4a87946ea8c1030233ba119aa1589af761a7e0b3e4c503f325ad8d76.exe ziLE4804.exe PID 2504 wrote to memory of 2560 2504 ziLE4804.exe zivL6659.exe PID 2504 wrote to memory of 2560 2504 ziLE4804.exe zivL6659.exe PID 2504 wrote to memory of 2560 2504 ziLE4804.exe zivL6659.exe PID 2560 wrote to memory of 3012 2560 zivL6659.exe it029980.exe PID 2560 wrote to memory of 3012 2560 zivL6659.exe it029980.exe PID 2560 wrote to memory of 5016 2560 zivL6659.exe jr247588.exe PID 2560 wrote to memory of 5016 2560 zivL6659.exe jr247588.exe PID 2560 wrote to memory of 5016 2560 zivL6659.exe jr247588.exe PID 5016 wrote to memory of 336 5016 jr247588.exe 1.exe PID 5016 wrote to memory of 336 5016 jr247588.exe 1.exe PID 5016 wrote to memory of 336 5016 jr247588.exe 1.exe PID 2504 wrote to memory of 164 2504 ziLE4804.exe kp678555.exe PID 2504 wrote to memory of 164 2504 ziLE4804.exe kp678555.exe PID 2504 wrote to memory of 164 2504 ziLE4804.exe kp678555.exe PID 1792 wrote to memory of 2168 1792 f6eb00bb4a87946ea8c1030233ba119aa1589af761a7e0b3e4c503f325ad8d76.exe lr371878.exe PID 1792 wrote to memory of 2168 1792 f6eb00bb4a87946ea8c1030233ba119aa1589af761a7e0b3e4c503f325ad8d76.exe lr371878.exe PID 1792 wrote to memory of 2168 1792 f6eb00bb4a87946ea8c1030233ba119aa1589af761a7e0b3e4c503f325ad8d76.exe lr371878.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6eb00bb4a87946ea8c1030233ba119aa1589af761a7e0b3e4c503f325ad8d76.exe"C:\Users\Admin\AppData\Local\Temp\f6eb00bb4a87946ea8c1030233ba119aa1589af761a7e0b3e4c503f325ad8d76.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLE4804.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLE4804.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zivL6659.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zivL6659.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it029980.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it029980.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3012
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr247588.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr247588.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:336
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp678555.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp678555.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:164
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr371878.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr371878.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:2168 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 6323⤵
- Program crash
PID:3452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 7083⤵
- Program crash
PID:2484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 8483⤵
- Program crash
PID:2588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 8603⤵
- Program crash
PID:2648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 8843⤵
- Program crash
PID:4992
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 8203⤵
- Program crash
PID:2088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 11323⤵
- Program crash
PID:1448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 11523⤵
- Program crash
PID:4700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 12363⤵
- Program crash
PID:2808
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
723KB
MD5132fc4ced23f2dcdbc39dfd47c90f05f
SHA1abc9c234d62691eb9ccd70bb9de82b00665daa14
SHA2562ff49dc986f08be9be4e8b7ec352a53361e92814aa4273da8b53d108b3402fab
SHA512c07aa99f6d11aa9d2be4abf3ee9607056fcd35ee224644afa9b547198422086d60fc8baa9c4e4dfb22ced2ff7f31d5ec5ae24f51a4d0c773548f306682d45136
-
Filesize
723KB
MD5132fc4ced23f2dcdbc39dfd47c90f05f
SHA1abc9c234d62691eb9ccd70bb9de82b00665daa14
SHA2562ff49dc986f08be9be4e8b7ec352a53361e92814aa4273da8b53d108b3402fab
SHA512c07aa99f6d11aa9d2be4abf3ee9607056fcd35ee224644afa9b547198422086d60fc8baa9c4e4dfb22ced2ff7f31d5ec5ae24f51a4d0c773548f306682d45136
-
Filesize
169KB
MD5f2b713d2af2f742b18d2a1edda8652c5
SHA14d109d570927d290eb5739312af5269474fe9d3a
SHA256ef305f02a848d4cf14a4e6dd4158176be5c570e1e17b9c58b144183fa18040c2
SHA512c15d2a94b6576b1596f76e997841094b28599446e03cd351238ebb30e9305e99c5f8630d715886df5790aafb6d49c6948482ed16c406155ab26b7be413c70786
-
Filesize
169KB
MD5f2b713d2af2f742b18d2a1edda8652c5
SHA14d109d570927d290eb5739312af5269474fe9d3a
SHA256ef305f02a848d4cf14a4e6dd4158176be5c570e1e17b9c58b144183fa18040c2
SHA512c15d2a94b6576b1596f76e997841094b28599446e03cd351238ebb30e9305e99c5f8630d715886df5790aafb6d49c6948482ed16c406155ab26b7be413c70786
-
Filesize
569KB
MD5e05a7e7dc5d1c1c843ae3a197210fe4b
SHA1186f36a18810abafa3a580c5f321fe2b037d6d26
SHA25662a7357d310e9707ae7bd7541a838f5290c008c998f05a51556d43cd741c9838
SHA5129c79f528a7e526717b27cad89cd045d049d05bace1863fd59e92e348f569a83dd9b0bacb8fd4721083cd845a2291b88d5a35d47394ea4428e003824f6c709501
-
Filesize
569KB
MD5e05a7e7dc5d1c1c843ae3a197210fe4b
SHA1186f36a18810abafa3a580c5f321fe2b037d6d26
SHA25662a7357d310e9707ae7bd7541a838f5290c008c998f05a51556d43cd741c9838
SHA5129c79f528a7e526717b27cad89cd045d049d05bace1863fd59e92e348f569a83dd9b0bacb8fd4721083cd845a2291b88d5a35d47394ea4428e003824f6c709501
-
Filesize
11KB
MD537ddbd2d6563f5be14e577a45cc8f89a
SHA1a5c2fd0229966f1a559401f6fdb4e7b04add9635
SHA256217849bd7730433ae39c1e260d738e9f9fabce5e779d22aa7ee072943badbb94
SHA5120fdd2d4d119fd3bce36181a5601afcf1d2cd71de81bc4c2b7c2488d5859212cc276ff51f71cef30dc9ce6bf194210b34dbc8754667f0c8ac79f980a8ca8e89e7
-
Filesize
11KB
MD537ddbd2d6563f5be14e577a45cc8f89a
SHA1a5c2fd0229966f1a559401f6fdb4e7b04add9635
SHA256217849bd7730433ae39c1e260d738e9f9fabce5e779d22aa7ee072943badbb94
SHA5120fdd2d4d119fd3bce36181a5601afcf1d2cd71de81bc4c2b7c2488d5859212cc276ff51f71cef30dc9ce6bf194210b34dbc8754667f0c8ac79f980a8ca8e89e7
-
Filesize
588KB
MD59a535eb2b7a7dc8f67c1d73f7e272cae
SHA1be86c88db86e67ee8e12d090daf610ef5f7f69e5
SHA256bd2dfd77f2e008e22d94c4ef6710a73041e08a0797890fae3db52b239866d5bf
SHA512e8a5a1ad75939634103452befc2c391f5209f2cd779b9254758e38959393b1866481b1fe5554c50149ba52fdce062edbbb89dcfe334567aa1d08db03e78aa60d
-
Filesize
588KB
MD59a535eb2b7a7dc8f67c1d73f7e272cae
SHA1be86c88db86e67ee8e12d090daf610ef5f7f69e5
SHA256bd2dfd77f2e008e22d94c4ef6710a73041e08a0797890fae3db52b239866d5bf
SHA512e8a5a1ad75939634103452befc2c391f5209f2cd779b9254758e38959393b1866481b1fe5554c50149ba52fdce062edbbb89dcfe334567aa1d08db03e78aa60d
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1