Analysis
-
max time kernel
144s -
max time network
139s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14-04-2023 07:52
Static task
static1
General
-
Target
62bc10ee439a7705fdfea29c5ac64956ae46b2ee62f8a79ca944b3cff963fbf9.exe
-
Size
1.2MB
-
MD5
9a1cc2664cba66b638d1b8a123920f5c
-
SHA1
9a3fb48aae8ca5b33184b35bc5250f874f3009fc
-
SHA256
62bc10ee439a7705fdfea29c5ac64956ae46b2ee62f8a79ca944b3cff963fbf9
-
SHA512
ae8782d0a27f5f311989ff1da20b51cd34d79340ad07e013ea0b6b7f98f1a6dee732c19690b2941e9f3b03eb08f4ae86ec057fb6d6585bb688551907db909c03
-
SSDEEP
24576:RyTODyKH3+q8M9WQu2v32XT1S9NbSOqa31s06I:EyDyZqHWS+XT1+N0y6
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr383196.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr383196.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr383196.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr383196.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr383196.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 3548 un700899.exe 2348 un889176.exe 5108 pr383196.exe 4552 qu750361.exe 208 1.exe 2104 rk077440.exe 3644 si760077.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr383196.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr383196.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 62bc10ee439a7705fdfea29c5ac64956ae46b2ee62f8a79ca944b3cff963fbf9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 62bc10ee439a7705fdfea29c5ac64956ae46b2ee62f8a79ca944b3cff963fbf9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un700899.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un700899.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un889176.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un889176.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
pid pid_target Process procid_target 4232 3644 WerFault.exe 73 4292 3644 WerFault.exe 73 4272 3644 WerFault.exe 73 2616 3644 WerFault.exe 73 2148 3644 WerFault.exe 73 5092 3644 WerFault.exe 73 4920 3644 WerFault.exe 73 4616 3644 WerFault.exe 73 1960 3644 WerFault.exe 73 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5108 pr383196.exe 5108 pr383196.exe 208 1.exe 2104 rk077440.exe 2104 rk077440.exe 208 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 5108 pr383196.exe Token: SeDebugPrivilege 4552 qu750361.exe Token: SeDebugPrivilege 208 1.exe Token: SeDebugPrivilege 2104 rk077440.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3644 si760077.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4124 wrote to memory of 3548 4124 62bc10ee439a7705fdfea29c5ac64956ae46b2ee62f8a79ca944b3cff963fbf9.exe 66 PID 4124 wrote to memory of 3548 4124 62bc10ee439a7705fdfea29c5ac64956ae46b2ee62f8a79ca944b3cff963fbf9.exe 66 PID 4124 wrote to memory of 3548 4124 62bc10ee439a7705fdfea29c5ac64956ae46b2ee62f8a79ca944b3cff963fbf9.exe 66 PID 3548 wrote to memory of 2348 3548 un700899.exe 67 PID 3548 wrote to memory of 2348 3548 un700899.exe 67 PID 3548 wrote to memory of 2348 3548 un700899.exe 67 PID 2348 wrote to memory of 5108 2348 un889176.exe 68 PID 2348 wrote to memory of 5108 2348 un889176.exe 68 PID 2348 wrote to memory of 5108 2348 un889176.exe 68 PID 2348 wrote to memory of 4552 2348 un889176.exe 69 PID 2348 wrote to memory of 4552 2348 un889176.exe 69 PID 2348 wrote to memory of 4552 2348 un889176.exe 69 PID 4552 wrote to memory of 208 4552 qu750361.exe 70 PID 4552 wrote to memory of 208 4552 qu750361.exe 70 PID 4552 wrote to memory of 208 4552 qu750361.exe 70 PID 3548 wrote to memory of 2104 3548 un700899.exe 71 PID 3548 wrote to memory of 2104 3548 un700899.exe 71 PID 3548 wrote to memory of 2104 3548 un700899.exe 71 PID 4124 wrote to memory of 3644 4124 62bc10ee439a7705fdfea29c5ac64956ae46b2ee62f8a79ca944b3cff963fbf9.exe 73 PID 4124 wrote to memory of 3644 4124 62bc10ee439a7705fdfea29c5ac64956ae46b2ee62f8a79ca944b3cff963fbf9.exe 73 PID 4124 wrote to memory of 3644 4124 62bc10ee439a7705fdfea29c5ac64956ae46b2ee62f8a79ca944b3cff963fbf9.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\62bc10ee439a7705fdfea29c5ac64956ae46b2ee62f8a79ca944b3cff963fbf9.exe"C:\Users\Admin\AppData\Local\Temp\62bc10ee439a7705fdfea29c5ac64956ae46b2ee62f8a79ca944b3cff963fbf9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un700899.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un700899.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un889176.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un889176.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr383196.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr383196.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5108
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu750361.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu750361.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:208
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk077440.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk077440.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2104
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si760077.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si760077.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:3644 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 6323⤵
- Program crash
PID:4232
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 7083⤵
- Program crash
PID:4292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 8483⤵
- Program crash
PID:4272
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 8363⤵
- Program crash
PID:2616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 8963⤵
- Program crash
PID:2148
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 8843⤵
- Program crash
PID:5092
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 11243⤵
- Program crash
PID:4920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 11523⤵
- Program crash
PID:4616
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 11963⤵
- Program crash
PID:1960
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
862KB
MD52e11247c6572135d9213760151a138c9
SHA10951a5a900ca6e0a8e2cbacf045c351539032ca8
SHA25613c3a6dea6a57bfc86ccfea249f81a32933d7cb975734fd49358a844fa6444ca
SHA512b378d87affb833354c88857376f937a5c4c0aa757f2e8aa4c573dc109a5b00209f170ca773ee53d0ec0b99f6df7f6adaf299cb471d6b0775f1f1ad9137aa9dde
-
Filesize
862KB
MD52e11247c6572135d9213760151a138c9
SHA10951a5a900ca6e0a8e2cbacf045c351539032ca8
SHA25613c3a6dea6a57bfc86ccfea249f81a32933d7cb975734fd49358a844fa6444ca
SHA512b378d87affb833354c88857376f937a5c4c0aa757f2e8aa4c573dc109a5b00209f170ca773ee53d0ec0b99f6df7f6adaf299cb471d6b0775f1f1ad9137aa9dde
-
Filesize
169KB
MD57823e29f3c79cfe265c5a37eb6bda87e
SHA1fe51c09cf73348cf5d2940deaad680cb2f8ae093
SHA256349438701b6bec74cf3dd7ae3660f603b0098c7b97c917f3493b75485e0c3637
SHA5123011391d6bce7d852dc3362c59b6a07a5d7ab84d9fdb21d2b58548f702f916e89238764f9de3b09974cce94676202e788596313cfd3892c190502a24c51b1184
-
Filesize
169KB
MD57823e29f3c79cfe265c5a37eb6bda87e
SHA1fe51c09cf73348cf5d2940deaad680cb2f8ae093
SHA256349438701b6bec74cf3dd7ae3660f603b0098c7b97c917f3493b75485e0c3637
SHA5123011391d6bce7d852dc3362c59b6a07a5d7ab84d9fdb21d2b58548f702f916e89238764f9de3b09974cce94676202e788596313cfd3892c190502a24c51b1184
-
Filesize
708KB
MD5e6f5f2d4a213888de0ab3362f421750c
SHA1459fe3a4a0331aea061a1bd3654aabb73a30df6e
SHA256c92d619ae05e3d8b8eb476fa255338a363197ced4ccebd680a57c9b2d2d53f95
SHA51236fb177125c4e2f2a9d443f57c2fa2c05197f9958f856fb9715fe9f4e07d244c923d7eff0bc43f0df2cc620f8acf9d2c2dcfd689256316979059e664955db537
-
Filesize
708KB
MD5e6f5f2d4a213888de0ab3362f421750c
SHA1459fe3a4a0331aea061a1bd3654aabb73a30df6e
SHA256c92d619ae05e3d8b8eb476fa255338a363197ced4ccebd680a57c9b2d2d53f95
SHA51236fb177125c4e2f2a9d443f57c2fa2c05197f9958f856fb9715fe9f4e07d244c923d7eff0bc43f0df2cc620f8acf9d2c2dcfd689256316979059e664955db537
-
Filesize
404KB
MD5b0cd31b63a09c3295f4c63aa91fecf52
SHA1296f12f7001ae7e42b453c60a197c6e865500b14
SHA256f24e448d13c8ed903912c45dd192751d96332de05a1f8311b016478d3014e40a
SHA512000b69db941ad7e4fe910fba7f5f61e85aa40e57721cb9f4160ade26ed636755389cabd64ea92174f0d0c94850eafe032ab36b19b43e17a3dec005de36406ea6
-
Filesize
404KB
MD5b0cd31b63a09c3295f4c63aa91fecf52
SHA1296f12f7001ae7e42b453c60a197c6e865500b14
SHA256f24e448d13c8ed903912c45dd192751d96332de05a1f8311b016478d3014e40a
SHA512000b69db941ad7e4fe910fba7f5f61e85aa40e57721cb9f4160ade26ed636755389cabd64ea92174f0d0c94850eafe032ab36b19b43e17a3dec005de36406ea6
-
Filesize
588KB
MD56ec4a84c64ee983aa9da26d115d40896
SHA141fd88338edbabd103b32ecdce52f5f48d0990ba
SHA2567b3b83ffac9a20aef08b551a16111903b684d271c0530e83f68bbceaf5baef94
SHA512afc450f38e096152f1ce83352a46c2435b83134ef3f76141d2e98ae846cb558626f186e3931a4f768ad63a5a6d0db0041776f7f555a0decff19253888bcf2d12
-
Filesize
588KB
MD56ec4a84c64ee983aa9da26d115d40896
SHA141fd88338edbabd103b32ecdce52f5f48d0990ba
SHA2567b3b83ffac9a20aef08b551a16111903b684d271c0530e83f68bbceaf5baef94
SHA512afc450f38e096152f1ce83352a46c2435b83134ef3f76141d2e98ae846cb558626f186e3931a4f768ad63a5a6d0db0041776f7f555a0decff19253888bcf2d12
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1