Analysis
-
max time kernel
140s -
max time network
106s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14-04-2023 07:42
Static task
static1
General
-
Target
b15e40db770a14a01562008a55694cf9adcd31aa0a56c701791a5e997d52efbd.exe
-
Size
1.0MB
-
MD5
e107c69580f4e76294f6bc72138cd00a
-
SHA1
2b09fc1d50e8ab9ca7cfba8b3c5f85204ba3a582
-
SHA256
b15e40db770a14a01562008a55694cf9adcd31aa0a56c701791a5e997d52efbd
-
SHA512
d769ac1e1efb7c7aff1596a2cd905c4e5eb11bb70e4bcd272856a2fa5570c5fad412aa52b9793d73ca70d9d3281a07aa13f54e11a6fb75fdb0704119d69867b5
-
SSDEEP
24576:Iyc0Wu1YtxbV0951C9wx0XcSm2OHvSCc:Pu7txC951Ok8cSmHH
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Processes:
it980147.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it980147.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it980147.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it980147.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it980147.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it980147.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
Processes:
zifS7703.exeziHl1923.exeit980147.exejr624741.exe1.exekp110282.exelr552936.exepid process 3320 zifS7703.exe 3572 ziHl1923.exe 304 it980147.exe 3924 jr624741.exe 4424 1.exe 2472 kp110282.exe 68 lr552936.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
it980147.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it980147.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
b15e40db770a14a01562008a55694cf9adcd31aa0a56c701791a5e997d52efbd.exezifS7703.exeziHl1923.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b15e40db770a14a01562008a55694cf9adcd31aa0a56c701791a5e997d52efbd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zifS7703.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zifS7703.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziHl1923.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziHl1923.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b15e40db770a14a01562008a55694cf9adcd31aa0a56c701791a5e997d52efbd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 1648 68 WerFault.exe lr552936.exe 2156 68 WerFault.exe lr552936.exe 4620 68 WerFault.exe lr552936.exe 4136 68 WerFault.exe lr552936.exe 1104 68 WerFault.exe lr552936.exe 4260 68 WerFault.exe lr552936.exe 2680 68 WerFault.exe lr552936.exe 4112 68 WerFault.exe lr552936.exe 2632 68 WerFault.exe lr552936.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
it980147.exekp110282.exe1.exepid process 304 it980147.exe 304 it980147.exe 2472 kp110282.exe 4424 1.exe 4424 1.exe 2472 kp110282.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
it980147.exejr624741.exekp110282.exe1.exedescription pid process Token: SeDebugPrivilege 304 it980147.exe Token: SeDebugPrivilege 3924 jr624741.exe Token: SeDebugPrivilege 2472 kp110282.exe Token: SeDebugPrivilege 4424 1.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
b15e40db770a14a01562008a55694cf9adcd31aa0a56c701791a5e997d52efbd.exezifS7703.exeziHl1923.exejr624741.exedescription pid process target process PID 3228 wrote to memory of 3320 3228 b15e40db770a14a01562008a55694cf9adcd31aa0a56c701791a5e997d52efbd.exe zifS7703.exe PID 3228 wrote to memory of 3320 3228 b15e40db770a14a01562008a55694cf9adcd31aa0a56c701791a5e997d52efbd.exe zifS7703.exe PID 3228 wrote to memory of 3320 3228 b15e40db770a14a01562008a55694cf9adcd31aa0a56c701791a5e997d52efbd.exe zifS7703.exe PID 3320 wrote to memory of 3572 3320 zifS7703.exe ziHl1923.exe PID 3320 wrote to memory of 3572 3320 zifS7703.exe ziHl1923.exe PID 3320 wrote to memory of 3572 3320 zifS7703.exe ziHl1923.exe PID 3572 wrote to memory of 304 3572 ziHl1923.exe it980147.exe PID 3572 wrote to memory of 304 3572 ziHl1923.exe it980147.exe PID 3572 wrote to memory of 3924 3572 ziHl1923.exe jr624741.exe PID 3572 wrote to memory of 3924 3572 ziHl1923.exe jr624741.exe PID 3572 wrote to memory of 3924 3572 ziHl1923.exe jr624741.exe PID 3924 wrote to memory of 4424 3924 jr624741.exe 1.exe PID 3924 wrote to memory of 4424 3924 jr624741.exe 1.exe PID 3924 wrote to memory of 4424 3924 jr624741.exe 1.exe PID 3320 wrote to memory of 2472 3320 zifS7703.exe kp110282.exe PID 3320 wrote to memory of 2472 3320 zifS7703.exe kp110282.exe PID 3320 wrote to memory of 2472 3320 zifS7703.exe kp110282.exe PID 3228 wrote to memory of 68 3228 b15e40db770a14a01562008a55694cf9adcd31aa0a56c701791a5e997d52efbd.exe lr552936.exe PID 3228 wrote to memory of 68 3228 b15e40db770a14a01562008a55694cf9adcd31aa0a56c701791a5e997d52efbd.exe lr552936.exe PID 3228 wrote to memory of 68 3228 b15e40db770a14a01562008a55694cf9adcd31aa0a56c701791a5e997d52efbd.exe lr552936.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b15e40db770a14a01562008a55694cf9adcd31aa0a56c701791a5e997d52efbd.exe"C:\Users\Admin\AppData\Local\Temp\b15e40db770a14a01562008a55694cf9adcd31aa0a56c701791a5e997d52efbd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zifS7703.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zifS7703.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziHl1923.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziHl1923.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it980147.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it980147.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:304
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr624741.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr624741.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4424
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp110282.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp110282.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2472
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr552936.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr552936.exe2⤵
- Executes dropped EXE
PID:68 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 68 -s 6323⤵
- Program crash
PID:1648
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 68 -s 7083⤵
- Program crash
PID:2156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 68 -s 8083⤵
- Program crash
PID:4620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 68 -s 8563⤵
- Program crash
PID:4136
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 68 -s 8923⤵
- Program crash
PID:1104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 68 -s 8723⤵
- Program crash
PID:4260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 68 -s 11323⤵
- Program crash
PID:2680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 68 -s 11643⤵
- Program crash
PID:4112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 68 -s 10923⤵
- Program crash
PID:2632
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
724KB
MD5c6a5c7f5bc23dc766ce04b2fc221366d
SHA155f0a27c16ddf22a9eef0c2b65405acf1f3e4fbc
SHA256721c8c228b72c848344a1ae82ee27ac14ad31d09f210c59e8ce0638337471f3e
SHA512f4f59bf19d2f61bbe2a4cfc22b7cc77a2bae0b9f6f9776e5539efa9da7bf1747a67ba50f37764837fccb23867dc598ea36da2ecc57f4f9c51bc132efe31db015
-
Filesize
724KB
MD5c6a5c7f5bc23dc766ce04b2fc221366d
SHA155f0a27c16ddf22a9eef0c2b65405acf1f3e4fbc
SHA256721c8c228b72c848344a1ae82ee27ac14ad31d09f210c59e8ce0638337471f3e
SHA512f4f59bf19d2f61bbe2a4cfc22b7cc77a2bae0b9f6f9776e5539efa9da7bf1747a67ba50f37764837fccb23867dc598ea36da2ecc57f4f9c51bc132efe31db015
-
Filesize
169KB
MD521c3fabc3f7f8df68d570232c6c5dc25
SHA1549a19ca85150b3951267137324bcbfdd1bc82d0
SHA2568573fb88d159ec5c8bfa703f1bc256fe984be536b1c560c16b3064a9d53e54df
SHA51252b1904780d54bb3feea0386194b5dc4af585e4027d195074626aa00fe7ad8c0ad82fa44e4cf0ee908500e38c2aaaf43909ec26c1799e3a638c40ff6099f8d95
-
Filesize
169KB
MD521c3fabc3f7f8df68d570232c6c5dc25
SHA1549a19ca85150b3951267137324bcbfdd1bc82d0
SHA2568573fb88d159ec5c8bfa703f1bc256fe984be536b1c560c16b3064a9d53e54df
SHA51252b1904780d54bb3feea0386194b5dc4af585e4027d195074626aa00fe7ad8c0ad82fa44e4cf0ee908500e38c2aaaf43909ec26c1799e3a638c40ff6099f8d95
-
Filesize
570KB
MD5ae3599a7909c21c05b45c4bc66755a18
SHA155f74da8227990062d11c901ba7dd69246b1318b
SHA25659f46343d004736422ab190ff4adfe54d062c7b31fe142c87b42da1ec75c400f
SHA512764e8042a2fb811e6b8fd1a6a3a82e7a609ed0237827ed5cdf87f9cc9f8e00e84f698e9f998ca9c7427dff10777c6a2ede58538a0fed290d504ec0c8a1f4e9bc
-
Filesize
570KB
MD5ae3599a7909c21c05b45c4bc66755a18
SHA155f74da8227990062d11c901ba7dd69246b1318b
SHA25659f46343d004736422ab190ff4adfe54d062c7b31fe142c87b42da1ec75c400f
SHA512764e8042a2fb811e6b8fd1a6a3a82e7a609ed0237827ed5cdf87f9cc9f8e00e84f698e9f998ca9c7427dff10777c6a2ede58538a0fed290d504ec0c8a1f4e9bc
-
Filesize
11KB
MD582214f0d2cd675a236846d69f7c7df5e
SHA12959a5dccd6c538949d8b9b12fc9ce93fa00ee10
SHA256f6c14557737da61a75371a250b838a2d29dd29828322fce0fadfcbb1d49ac1eb
SHA512cb799d7cb918c0bf283c4ffff50d4721e21de6dec4b1258673a25a35450bd7132ddbc073d98955bdefa6b4e2532d5f5a22c6ff45976d7f73a764ffdc5372ee24
-
Filesize
11KB
MD582214f0d2cd675a236846d69f7c7df5e
SHA12959a5dccd6c538949d8b9b12fc9ce93fa00ee10
SHA256f6c14557737da61a75371a250b838a2d29dd29828322fce0fadfcbb1d49ac1eb
SHA512cb799d7cb918c0bf283c4ffff50d4721e21de6dec4b1258673a25a35450bd7132ddbc073d98955bdefa6b4e2532d5f5a22c6ff45976d7f73a764ffdc5372ee24
-
Filesize
588KB
MD590042dbd21c1860b732b2016c3f00d82
SHA140457b9bd218f640bb74b2279b10de2253793ac9
SHA2561888fcad8907bafb5c11000250f96a8b5d7a7af3bb1b6a215e1fa7c7f53cfcb4
SHA5128595eeff83ca00fa7d256d571d0973410c867821f64677bdab48d7d84144547bb9ab512780620013159682db7d43a592ccd86faa45062626bb72494bb6362146
-
Filesize
588KB
MD590042dbd21c1860b732b2016c3f00d82
SHA140457b9bd218f640bb74b2279b10de2253793ac9
SHA2561888fcad8907bafb5c11000250f96a8b5d7a7af3bb1b6a215e1fa7c7f53cfcb4
SHA5128595eeff83ca00fa7d256d571d0973410c867821f64677bdab48d7d84144547bb9ab512780620013159682db7d43a592ccd86faa45062626bb72494bb6362146
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1