Analysis
-
max time kernel
143s -
max time network
110s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14/04/2023, 07:58
Static task
static1
General
-
Target
8639290f882a6c30552c7d9b49c19dee6fb1c43b06957c7ea363ce01b99aac6e.exe
-
Size
1.0MB
-
MD5
0e524cffed5aa40e4d1b0f42c849090a
-
SHA1
46b22818621ea3e4966f2927289536221c31f9fa
-
SHA256
8639290f882a6c30552c7d9b49c19dee6fb1c43b06957c7ea363ce01b99aac6e
-
SHA512
bc1742e07cea981f3e6dd0ffcb372a8a41cf400b1255cf19500cb3cebc239db62f8295254f37bdbffb368536b001e0f6ca7df22077d5632b59ea587d977fda41
-
SSDEEP
24576:gyhXn8r6izByU1Lo1g9SNnEnyaoJjHzhWio+j/:nhMr6idl1Lo1UgnERopHAG
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it853256.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it853256.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it853256.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it853256.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it853256.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 3364 ziXB9147.exe 4236 ziDS8926.exe 4112 it853256.exe 1448 jr734419.exe 4320 1.exe 692 kp967896.exe 4240 lr797164.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it853256.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziDS8926.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziDS8926.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8639290f882a6c30552c7d9b49c19dee6fb1c43b06957c7ea363ce01b99aac6e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8639290f882a6c30552c7d9b49c19dee6fb1c43b06957c7ea363ce01b99aac6e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ziXB9147.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziXB9147.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
pid pid_target Process procid_target 3908 4240 WerFault.exe 73 4808 4240 WerFault.exe 73 1888 4240 WerFault.exe 73 2608 4240 WerFault.exe 73 2980 4240 WerFault.exe 73 4324 4240 WerFault.exe 73 3724 4240 WerFault.exe 73 4708 4240 WerFault.exe 73 3524 4240 WerFault.exe 73 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4112 it853256.exe 4112 it853256.exe 4320 1.exe 692 kp967896.exe 4320 1.exe 692 kp967896.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4112 it853256.exe Token: SeDebugPrivilege 1448 jr734419.exe Token: SeDebugPrivilege 692 kp967896.exe Token: SeDebugPrivilege 4320 1.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1600 wrote to memory of 3364 1600 8639290f882a6c30552c7d9b49c19dee6fb1c43b06957c7ea363ce01b99aac6e.exe 66 PID 1600 wrote to memory of 3364 1600 8639290f882a6c30552c7d9b49c19dee6fb1c43b06957c7ea363ce01b99aac6e.exe 66 PID 1600 wrote to memory of 3364 1600 8639290f882a6c30552c7d9b49c19dee6fb1c43b06957c7ea363ce01b99aac6e.exe 66 PID 3364 wrote to memory of 4236 3364 ziXB9147.exe 67 PID 3364 wrote to memory of 4236 3364 ziXB9147.exe 67 PID 3364 wrote to memory of 4236 3364 ziXB9147.exe 67 PID 4236 wrote to memory of 4112 4236 ziDS8926.exe 68 PID 4236 wrote to memory of 4112 4236 ziDS8926.exe 68 PID 4236 wrote to memory of 1448 4236 ziDS8926.exe 69 PID 4236 wrote to memory of 1448 4236 ziDS8926.exe 69 PID 4236 wrote to memory of 1448 4236 ziDS8926.exe 69 PID 1448 wrote to memory of 4320 1448 jr734419.exe 70 PID 1448 wrote to memory of 4320 1448 jr734419.exe 70 PID 1448 wrote to memory of 4320 1448 jr734419.exe 70 PID 3364 wrote to memory of 692 3364 ziXB9147.exe 71 PID 3364 wrote to memory of 692 3364 ziXB9147.exe 71 PID 3364 wrote to memory of 692 3364 ziXB9147.exe 71 PID 1600 wrote to memory of 4240 1600 8639290f882a6c30552c7d9b49c19dee6fb1c43b06957c7ea363ce01b99aac6e.exe 73 PID 1600 wrote to memory of 4240 1600 8639290f882a6c30552c7d9b49c19dee6fb1c43b06957c7ea363ce01b99aac6e.exe 73 PID 1600 wrote to memory of 4240 1600 8639290f882a6c30552c7d9b49c19dee6fb1c43b06957c7ea363ce01b99aac6e.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\8639290f882a6c30552c7d9b49c19dee6fb1c43b06957c7ea363ce01b99aac6e.exe"C:\Users\Admin\AppData\Local\Temp\8639290f882a6c30552c7d9b49c19dee6fb1c43b06957c7ea363ce01b99aac6e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziXB9147.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziXB9147.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziDS8926.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziDS8926.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it853256.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it853256.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4112
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr734419.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr734419.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4320
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp967896.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp967896.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:692
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr797164.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr797164.exe2⤵
- Executes dropped EXE
PID:4240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 6363⤵
- Program crash
PID:3908
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 7083⤵
- Program crash
PID:4808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 8083⤵
- Program crash
PID:1888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 8563⤵
- Program crash
PID:2608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 8883⤵
- Program crash
PID:2980
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 8643⤵
- Program crash
PID:4324
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 11283⤵
- Program crash
PID:3724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 11803⤵
- Program crash
PID:4708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 11763⤵
- Program crash
PID:3524
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
397KB
MD5dadc0d126524e7b28aab58226127e8a6
SHA1a383b6f22bbb8056ad743543ad54ef1707b1493a
SHA256af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8
SHA512dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117
-
Filesize
723KB
MD571224c607857ff393d745db3634f9ec1
SHA1d558dba0201cc967c62f943f95d2bd452b65f0f2
SHA256700cd1719f70c25a0d705a5ef893949a9969dc0d0972690c750bbac8f3f6783d
SHA512e1c3e8344f946c7b373605152ca7b2fcaa51054c08a8c47cd3876d49d6d15108d92abd48e1a9dde7e2bd31f8e4cc8f68dc0091d6afea4428f3a8192043f169d7
-
Filesize
723KB
MD571224c607857ff393d745db3634f9ec1
SHA1d558dba0201cc967c62f943f95d2bd452b65f0f2
SHA256700cd1719f70c25a0d705a5ef893949a9969dc0d0972690c750bbac8f3f6783d
SHA512e1c3e8344f946c7b373605152ca7b2fcaa51054c08a8c47cd3876d49d6d15108d92abd48e1a9dde7e2bd31f8e4cc8f68dc0091d6afea4428f3a8192043f169d7
-
Filesize
169KB
MD5cdfa8198f96d9af4bd07139ec5be8886
SHA157be36d1d6b5bc97529e679a81e22c29c2897502
SHA2562774311c0fc993f8db0cd1c8c441800108366d0174dc0e2fd44714bd6eaa278d
SHA512d2f8d227385c7c4f15b793e3f988f0bf1101ca03255f159b885f6ee83f3088891a77938eb2ff9f5809321c90a239b7990e8c94214a6467a7ee1c57daf1a5e17d
-
Filesize
169KB
MD5cdfa8198f96d9af4bd07139ec5be8886
SHA157be36d1d6b5bc97529e679a81e22c29c2897502
SHA2562774311c0fc993f8db0cd1c8c441800108366d0174dc0e2fd44714bd6eaa278d
SHA512d2f8d227385c7c4f15b793e3f988f0bf1101ca03255f159b885f6ee83f3088891a77938eb2ff9f5809321c90a239b7990e8c94214a6467a7ee1c57daf1a5e17d
-
Filesize
569KB
MD5148c2e016992d315f4f1e872e1a8a981
SHA1d3f70cee03f0def44ba5525e8738f41ee2d7600f
SHA256f28ecbdc9731a5e251f5c9d147c187375f766c7d7839a8cdb1a7e8da5dd86af7
SHA512b4d0051640f700ed32b55ed30bc6f109d7e3ec49780e87a26493e46434c197ec1e6a0df0c7fe67baf17c5e07de234fbbf8b3471d7d9d370b6477a0bce6c1430f
-
Filesize
569KB
MD5148c2e016992d315f4f1e872e1a8a981
SHA1d3f70cee03f0def44ba5525e8738f41ee2d7600f
SHA256f28ecbdc9731a5e251f5c9d147c187375f766c7d7839a8cdb1a7e8da5dd86af7
SHA512b4d0051640f700ed32b55ed30bc6f109d7e3ec49780e87a26493e46434c197ec1e6a0df0c7fe67baf17c5e07de234fbbf8b3471d7d9d370b6477a0bce6c1430f
-
Filesize
11KB
MD5d856e2a54c40acf61645d4fc57858e06
SHA14adda083305872bca81e5bcbe8b919870021ebf7
SHA256b037083ba5bd964e0da761a64efa0793fa1141cc3213a0dddeb2d0ba0fc9f13b
SHA51278d7c7912a9c551f6177a93704f29671bb84f5dee90705313881236dbff948a297f780c9d4fde102e91f28fc3dbe4d1b9f2f6a634d00e2319da17eea1d4c6caf
-
Filesize
11KB
MD5d856e2a54c40acf61645d4fc57858e06
SHA14adda083305872bca81e5bcbe8b919870021ebf7
SHA256b037083ba5bd964e0da761a64efa0793fa1141cc3213a0dddeb2d0ba0fc9f13b
SHA51278d7c7912a9c551f6177a93704f29671bb84f5dee90705313881236dbff948a297f780c9d4fde102e91f28fc3dbe4d1b9f2f6a634d00e2319da17eea1d4c6caf
-
Filesize
588KB
MD5faa256b161e2ed2283ddcacfdd976964
SHA10a61e9651c54db13004bb4385a586944e9dce06e
SHA2561c76e1bc080dc1b1e63d9006ff7ca254fce0c45f63581b6fab46d44d4274e844
SHA512da1e20bc14cc603687123d39f7a2465eb38595390c7d8cbf82991cce9b9d9c233982a8b2b259967a51f06aa80f11bdc488ab7288d127620b9ca3a5f0e0917c5b
-
Filesize
588KB
MD5faa256b161e2ed2283ddcacfdd976964
SHA10a61e9651c54db13004bb4385a586944e9dce06e
SHA2561c76e1bc080dc1b1e63d9006ff7ca254fce0c45f63581b6fab46d44d4274e844
SHA512da1e20bc14cc603687123d39f7a2465eb38595390c7d8cbf82991cce9b9d9c233982a8b2b259967a51f06aa80f11bdc488ab7288d127620b9ca3a5f0e0917c5b
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1