Analysis
-
max time kernel
147s -
max time network
104s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
14-04-2023 12:13
Static task
static1
General
-
Target
186ef53c4fc082d533e9c1884355ad69cddb8d7ce31b8455ad9bd1590d9ed308.exe
-
Size
1.2MB
-
MD5
388eb615faa9f8996debabea08569f47
-
SHA1
5fda02737f3162524d8b3033c9c783f4ecc3940d
-
SHA256
186ef53c4fc082d533e9c1884355ad69cddb8d7ce31b8455ad9bd1590d9ed308
-
SHA512
976d783ba27d5a7f642bcad841aa37cecc2c4c20b553e3c48bdd3e36e94c2e586e05899e820f6a7d2f0cbd63ae3264c177df34e34e33b054002da6750e633463
-
SSDEEP
24576:PyPaQxPq9+lvDdMCRz6dXVuFH58r5Re5s4J9y3Nm6hmx/xDlKoY1:aPaWS9+lvKxd0FC5RX4Jwg6e59
Malware Config
Extracted
redline
soft
77.91.124.146:4121
-
auth_value
e65663e455bca3c5699650b66e76ceaa
Extracted
redline
dirx
77.91.124.146:4121
-
auth_value
522d988f763be056e53e089f74d464cc
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr040117.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr040117.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr040117.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr040117.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr040117.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2388 un277013.exe 2516 un387369.exe 3060 pr040117.exe 3800 qu619615.exe 3388 1.exe 1640 rk506817.exe 3040 si655840.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr040117.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr040117.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 186ef53c4fc082d533e9c1884355ad69cddb8d7ce31b8455ad9bd1590d9ed308.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 186ef53c4fc082d533e9c1884355ad69cddb8d7ce31b8455ad9bd1590d9ed308.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un277013.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un277013.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un387369.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un387369.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
pid pid_target Process procid_target 5072 3040 WerFault.exe 74 3964 3040 WerFault.exe 74 2864 3040 WerFault.exe 74 3788 3040 WerFault.exe 74 3576 3040 WerFault.exe 74 3796 3040 WerFault.exe 74 3652 3040 WerFault.exe 74 1568 3040 WerFault.exe 74 1380 3040 WerFault.exe 74 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3060 pr040117.exe 3060 pr040117.exe 1640 rk506817.exe 3388 1.exe 3388 1.exe 1640 rk506817.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3060 pr040117.exe Token: SeDebugPrivilege 3800 qu619615.exe Token: SeDebugPrivilege 1640 rk506817.exe Token: SeDebugPrivilege 3388 1.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3040 si655840.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2388 2272 186ef53c4fc082d533e9c1884355ad69cddb8d7ce31b8455ad9bd1590d9ed308.exe 66 PID 2272 wrote to memory of 2388 2272 186ef53c4fc082d533e9c1884355ad69cddb8d7ce31b8455ad9bd1590d9ed308.exe 66 PID 2272 wrote to memory of 2388 2272 186ef53c4fc082d533e9c1884355ad69cddb8d7ce31b8455ad9bd1590d9ed308.exe 66 PID 2388 wrote to memory of 2516 2388 un277013.exe 67 PID 2388 wrote to memory of 2516 2388 un277013.exe 67 PID 2388 wrote to memory of 2516 2388 un277013.exe 67 PID 2516 wrote to memory of 3060 2516 un387369.exe 68 PID 2516 wrote to memory of 3060 2516 un387369.exe 68 PID 2516 wrote to memory of 3060 2516 un387369.exe 68 PID 2516 wrote to memory of 3800 2516 un387369.exe 69 PID 2516 wrote to memory of 3800 2516 un387369.exe 69 PID 2516 wrote to memory of 3800 2516 un387369.exe 69 PID 3800 wrote to memory of 3388 3800 qu619615.exe 71 PID 3800 wrote to memory of 3388 3800 qu619615.exe 71 PID 3800 wrote to memory of 3388 3800 qu619615.exe 71 PID 2388 wrote to memory of 1640 2388 un277013.exe 72 PID 2388 wrote to memory of 1640 2388 un277013.exe 72 PID 2388 wrote to memory of 1640 2388 un277013.exe 72 PID 2272 wrote to memory of 3040 2272 186ef53c4fc082d533e9c1884355ad69cddb8d7ce31b8455ad9bd1590d9ed308.exe 74 PID 2272 wrote to memory of 3040 2272 186ef53c4fc082d533e9c1884355ad69cddb8d7ce31b8455ad9bd1590d9ed308.exe 74 PID 2272 wrote to memory of 3040 2272 186ef53c4fc082d533e9c1884355ad69cddb8d7ce31b8455ad9bd1590d9ed308.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\186ef53c4fc082d533e9c1884355ad69cddb8d7ce31b8455ad9bd1590d9ed308.exe"C:\Users\Admin\AppData\Local\Temp\186ef53c4fc082d533e9c1884355ad69cddb8d7ce31b8455ad9bd1590d9ed308.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un277013.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un277013.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un387369.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un387369.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr040117.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr040117.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu619615.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu619615.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3388
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk506817.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk506817.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si655840.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si655840.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:3040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 6323⤵
- Program crash
PID:5072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 7083⤵
- Program crash
PID:3964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 8443⤵
- Program crash
PID:2864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 8243⤵
- Program crash
PID:3788
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 9203⤵
- Program crash
PID:3576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 9203⤵
- Program crash
PID:3796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 11243⤵
- Program crash
PID:3652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 11563⤵
- Program crash
PID:1568
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 11083⤵
- Program crash
PID:1380
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD5cc057c9e33359007ae6c7eb8e6510745
SHA131d57cf599d00235ec4a14453e68f1993253758d
SHA256ac58a29d76075cb470a03a1ca58afa7c0aaf9ddc1b221996fa286fd5b87b5d1f
SHA5125c7e6c915d0738bb27d695ebd7a284ac73ff2d0a4e5cdec34a370eabd98c3b0130ab04af5b9c82a7900712a6b538fdce3b721798635fd9792c8550039dbe1f8a
-
Filesize
395KB
MD5cc057c9e33359007ae6c7eb8e6510745
SHA131d57cf599d00235ec4a14453e68f1993253758d
SHA256ac58a29d76075cb470a03a1ca58afa7c0aaf9ddc1b221996fa286fd5b87b5d1f
SHA5125c7e6c915d0738bb27d695ebd7a284ac73ff2d0a4e5cdec34a370eabd98c3b0130ab04af5b9c82a7900712a6b538fdce3b721798635fd9792c8550039dbe1f8a
-
Filesize
863KB
MD5d4dac5d9ecb78979b6b2613b1be13573
SHA1ecfc5388c388afdff1b2ee38d4ed3272b5f9e3ec
SHA25620f2dcde31023490d2f30bc33e66d6509867e3acf9d85891a57ef836dd6db246
SHA5127a23b0750b3d771bf0200d75535466312af033bd62143b6c14154753ab8aa528b4f0be8a07fb58c3426fea8b7a7ca3967b2da80ad143cce033d7b4dc3aa3cba7
-
Filesize
863KB
MD5d4dac5d9ecb78979b6b2613b1be13573
SHA1ecfc5388c388afdff1b2ee38d4ed3272b5f9e3ec
SHA25620f2dcde31023490d2f30bc33e66d6509867e3acf9d85891a57ef836dd6db246
SHA5127a23b0750b3d771bf0200d75535466312af033bd62143b6c14154753ab8aa528b4f0be8a07fb58c3426fea8b7a7ca3967b2da80ad143cce033d7b4dc3aa3cba7
-
Filesize
168KB
MD56cb9a99fd40ca1b3c7f72a6030589197
SHA1abcb1e268cb03befd3c439fa6753790ecfca6384
SHA2566a7d7e57103188b4138fc3b9396d19613f347699c97e4ac0e469f7f9ba7733c2
SHA51230beef5eefa0d9eda56d6b07643161e1e5460d69e0f82860bf0ea6d7eb99538732e2bb4132235e12e665cd5b04f0ac4753848ebc9e127e4c5f060ec69daca4e4
-
Filesize
168KB
MD56cb9a99fd40ca1b3c7f72a6030589197
SHA1abcb1e268cb03befd3c439fa6753790ecfca6384
SHA2566a7d7e57103188b4138fc3b9396d19613f347699c97e4ac0e469f7f9ba7733c2
SHA51230beef5eefa0d9eda56d6b07643161e1e5460d69e0f82860bf0ea6d7eb99538732e2bb4132235e12e665cd5b04f0ac4753848ebc9e127e4c5f060ec69daca4e4
-
Filesize
709KB
MD504f54c2d858987dc42de7a0f121c9380
SHA1c5c215ba71cfde5a1f61d20212414bc9aca7c8dc
SHA25683fc28ab0da7d9544e3898383a62ebc2c32db3482975b6a407465a777fae1274
SHA5126eb22ee76299ffb7f4b8d08d503b76821967824778e196d472751c9d3025b592db0279a680146646b1e5df8d99c4cc805918010823e0c8b7d4c4a9f4fe9ec224
-
Filesize
709KB
MD504f54c2d858987dc42de7a0f121c9380
SHA1c5c215ba71cfde5a1f61d20212414bc9aca7c8dc
SHA25683fc28ab0da7d9544e3898383a62ebc2c32db3482975b6a407465a777fae1274
SHA5126eb22ee76299ffb7f4b8d08d503b76821967824778e196d472751c9d3025b592db0279a680146646b1e5df8d99c4cc805918010823e0c8b7d4c4a9f4fe9ec224
-
Filesize
403KB
MD531b58d027a8dae892eff3c87246dbf67
SHA1779cc5f9cfbf1e48bd0908a225af38510c858288
SHA256a8daa5f5c0d05f535a337765598d178699324422440dc4010b2a73a931d6e4d7
SHA512258ad0317fa8a22f52fc9e03a957a30b81490ab948bb11098134a6ad9e7a3df9e4e8d5b87d86505dbdb69e06ae4ec7ff637c8e7f2426cdfd144accc6ee88a700
-
Filesize
403KB
MD531b58d027a8dae892eff3c87246dbf67
SHA1779cc5f9cfbf1e48bd0908a225af38510c858288
SHA256a8daa5f5c0d05f535a337765598d178699324422440dc4010b2a73a931d6e4d7
SHA512258ad0317fa8a22f52fc9e03a957a30b81490ab948bb11098134a6ad9e7a3df9e4e8d5b87d86505dbdb69e06ae4ec7ff637c8e7f2426cdfd144accc6ee88a700
-
Filesize
587KB
MD538ba7dd3cb28d71b39402007661b87cf
SHA163154496f2ae39c53ce6e8edecbe5c49abd94f89
SHA25678accca1ee69eca665fb5469cfb5c1cca098bc4a7c7b8dde5908306608299baa
SHA512cf4dfb501d279c99c0f86fdf8ee56fc26f61cd0b2120de50d793c41d0d65f5e56a308f5a13f218afc89c1eb9a92c7112daa13cb54ee5a7a12172136d315147a9
-
Filesize
587KB
MD538ba7dd3cb28d71b39402007661b87cf
SHA163154496f2ae39c53ce6e8edecbe5c49abd94f89
SHA25678accca1ee69eca665fb5469cfb5c1cca098bc4a7c7b8dde5908306608299baa
SHA512cf4dfb501d279c99c0f86fdf8ee56fc26f61cd0b2120de50d793c41d0d65f5e56a308f5a13f218afc89c1eb9a92c7112daa13cb54ee5a7a12172136d315147a9
-
Filesize
168KB
MD51eed54a048b387471d40ab1094221ef1
SHA15004d555d2e74a72b07a7fe1e512cb8f8ee5ba98
SHA256c97ba12c976ee628111a13331099e868c64bff78b392fe156662235ce9c4dc19
SHA512e781886c99944ef136036514f5773eb3566cb0b4f331bd013492ee2cd36fbb6decc1a88d25f21a86ad9205dbac5c53cacd145c9b10b638e3ac04742795c43c13
-
Filesize
168KB
MD51eed54a048b387471d40ab1094221ef1
SHA15004d555d2e74a72b07a7fe1e512cb8f8ee5ba98
SHA256c97ba12c976ee628111a13331099e868c64bff78b392fe156662235ce9c4dc19
SHA512e781886c99944ef136036514f5773eb3566cb0b4f331bd013492ee2cd36fbb6decc1a88d25f21a86ad9205dbac5c53cacd145c9b10b638e3ac04742795c43c13