Analysis
-
max time kernel
56s -
max time network
102s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
15-04-2023 05:18
Static task
static1
Behavioral task
behavioral1
Sample
eadac5c7a2a9c762d4a671ebcf25b993397680204626155c3a976eaf823be20b.exe
Resource
win10-20230220-en
General
-
Target
eadac5c7a2a9c762d4a671ebcf25b993397680204626155c3a976eaf823be20b.exe
-
Size
1.2MB
-
MD5
011763591f8c51fea5468dfe23979425
-
SHA1
a89ba6bb9ba4001cc2eeb848d83098e80350a4df
-
SHA256
eadac5c7a2a9c762d4a671ebcf25b993397680204626155c3a976eaf823be20b
-
SHA512
d917b3619cf6770e6bbdc848bceb9c2a81260cb9320e7ffe043eb6a6f81ebadb62d5bbdd0f0fe6f6ab46a4a776073b3fe529a032044cfd2f2055b80934c9f013
-
SSDEEP
24576:kyUVd7Ilh+TZnE1Km5OEzFaj3IIABRxD3aFqFDYyWJ8gCKrM6VFqrXa:zGpIlh+t+55OEuIIAB/D3aFqhYz6nCrq
Malware Config
Extracted
redline
soft
77.91.124.146:4121
-
auth_value
e65663e455bca3c5699650b66e76ceaa
Extracted
redline
lenor
77.91.124.146:4121
-
auth_value
e10993d8b80b7caba480ad0cca8e09d7
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" v1366pY.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tz8812.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" v1366pY.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" v1366pY.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" v1366pY.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tz8812.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" tz8812.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tz8812.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" tz8812.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" v1366pY.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 1000 za957394.exe 3364 za892303.exe 4472 za238737.exe 5068 tz8812.exe 2836 v1366pY.exe 4072 w90kb32.exe 4452 1.exe 1792 xRrIq86.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" tz8812.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features v1366pY.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" v1366pY.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" eadac5c7a2a9c762d4a671ebcf25b993397680204626155c3a976eaf823be20b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za957394.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" za957394.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za892303.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" za892303.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za238737.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" za238737.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce eadac5c7a2a9c762d4a671ebcf25b993397680204626155c3a976eaf823be20b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2612 1792 WerFault.exe 74 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5068 tz8812.exe 5068 tz8812.exe 2836 v1366pY.exe 2836 v1366pY.exe 4452 1.exe 4452 1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 5068 tz8812.exe Token: SeDebugPrivilege 2836 v1366pY.exe Token: SeDebugPrivilege 4072 w90kb32.exe Token: SeDebugPrivilege 4452 1.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3208 wrote to memory of 1000 3208 eadac5c7a2a9c762d4a671ebcf25b993397680204626155c3a976eaf823be20b.exe 66 PID 3208 wrote to memory of 1000 3208 eadac5c7a2a9c762d4a671ebcf25b993397680204626155c3a976eaf823be20b.exe 66 PID 3208 wrote to memory of 1000 3208 eadac5c7a2a9c762d4a671ebcf25b993397680204626155c3a976eaf823be20b.exe 66 PID 1000 wrote to memory of 3364 1000 za957394.exe 67 PID 1000 wrote to memory of 3364 1000 za957394.exe 67 PID 1000 wrote to memory of 3364 1000 za957394.exe 67 PID 3364 wrote to memory of 4472 3364 za892303.exe 68 PID 3364 wrote to memory of 4472 3364 za892303.exe 68 PID 3364 wrote to memory of 4472 3364 za892303.exe 68 PID 4472 wrote to memory of 5068 4472 za238737.exe 69 PID 4472 wrote to memory of 5068 4472 za238737.exe 69 PID 4472 wrote to memory of 2836 4472 za238737.exe 70 PID 4472 wrote to memory of 2836 4472 za238737.exe 70 PID 4472 wrote to memory of 2836 4472 za238737.exe 70 PID 3364 wrote to memory of 4072 3364 za892303.exe 71 PID 3364 wrote to memory of 4072 3364 za892303.exe 71 PID 3364 wrote to memory of 4072 3364 za892303.exe 71 PID 4072 wrote to memory of 4452 4072 w90kb32.exe 73 PID 4072 wrote to memory of 4452 4072 w90kb32.exe 73 PID 4072 wrote to memory of 4452 4072 w90kb32.exe 73 PID 1000 wrote to memory of 1792 1000 za957394.exe 74 PID 1000 wrote to memory of 1792 1000 za957394.exe 74 PID 1000 wrote to memory of 1792 1000 za957394.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\eadac5c7a2a9c762d4a671ebcf25b993397680204626155c3a976eaf823be20b.exe"C:\Users\Admin\AppData\Local\Temp\eadac5c7a2a9c762d4a671ebcf25b993397680204626155c3a976eaf823be20b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za957394.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za957394.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za892303.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za892303.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za238737.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za238737.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz8812.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz8812.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5068
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1366pY.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v1366pY.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w90kb32.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w90kb32.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4452
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xRrIq86.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xRrIq86.exe3⤵
- Executes dropped EXE
PID:1792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1792 -s 9564⤵
- Program crash
PID:2612
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD58fcd21d4a208a85a6869b13b04eb0f0d
SHA176bab41a1732079a01a1d25a4675b3ac9f69bb6c
SHA2565ca41ccc1a3f2180bd72060c5e300d9d36fcf522ab261a4cb237a284ef908e18
SHA5120407786cffe9ce416c47fa7e16ef97092004a20a159ccf920710d929bf01eec442270f79e3b926d0fc0be05eacec89593c3336880ab673f49e1014feccd95cf8
-
Filesize
1.0MB
MD58fcd21d4a208a85a6869b13b04eb0f0d
SHA176bab41a1732079a01a1d25a4675b3ac9f69bb6c
SHA2565ca41ccc1a3f2180bd72060c5e300d9d36fcf522ab261a4cb237a284ef908e18
SHA5120407786cffe9ce416c47fa7e16ef97092004a20a159ccf920710d929bf01eec442270f79e3b926d0fc0be05eacec89593c3336880ab673f49e1014feccd95cf8
-
Filesize
168KB
MD570f5d14a5d83abef0423bd9b249e1441
SHA181063b136fbcccadc5a12eede03569e20f69aab8
SHA2568a3fd457cafac3b2c57f2a33c34d0e19429ebe4d0126139d725d508848fe116e
SHA512bfd4308da8a89f0375c339f1b6e29d1786b7ca389d4d2ddffb41cbe88406e02fad2c1df1ca1f7d7b0b2ee0bbb2106ec53f6a39dd765f7fb9073464179a60706d
-
Filesize
168KB
MD570f5d14a5d83abef0423bd9b249e1441
SHA181063b136fbcccadc5a12eede03569e20f69aab8
SHA2568a3fd457cafac3b2c57f2a33c34d0e19429ebe4d0126139d725d508848fe116e
SHA512bfd4308da8a89f0375c339f1b6e29d1786b7ca389d4d2ddffb41cbe88406e02fad2c1df1ca1f7d7b0b2ee0bbb2106ec53f6a39dd765f7fb9073464179a60706d
-
Filesize
904KB
MD58ce532759c9feefc14b166e6e4cc65be
SHA166de13ef491e95ba2feb0e04feac6cc812ca0f1a
SHA256c1a3c6d0dba3da7b6b679264ee19b156c3f54dd01e699ddf2f8461d54f387571
SHA512bebba8a32b98e8d772dae50b6c940acd6b76eb94f5ab558754d309819a47d864ca76132e9cdf19c2476aa069c038893581a815813588c39d25e6497855f21d4b
-
Filesize
904KB
MD58ce532759c9feefc14b166e6e4cc65be
SHA166de13ef491e95ba2feb0e04feac6cc812ca0f1a
SHA256c1a3c6d0dba3da7b6b679264ee19b156c3f54dd01e699ddf2f8461d54f387571
SHA512bebba8a32b98e8d772dae50b6c940acd6b76eb94f5ab558754d309819a47d864ca76132e9cdf19c2476aa069c038893581a815813588c39d25e6497855f21d4b
-
Filesize
588KB
MD5e336ef40bb19e52c73e334f1b7785664
SHA1a06de7644ba306c1e1a742278da49bf9f373b063
SHA256ce65e8ad6c35db1bd297b7bd894e9387802471e0c2cca21d8f35939441ffd617
SHA5123b9066325ce21ea915fc387413e21b13b9eeafee2915929c59d59c6e6a062b39ccd9c2d38334e13cdb87d5a2b0b64019bce0da696a9267650f0a86b286b367fe
-
Filesize
588KB
MD5e336ef40bb19e52c73e334f1b7785664
SHA1a06de7644ba306c1e1a742278da49bf9f373b063
SHA256ce65e8ad6c35db1bd297b7bd894e9387802471e0c2cca21d8f35939441ffd617
SHA5123b9066325ce21ea915fc387413e21b13b9eeafee2915929c59d59c6e6a062b39ccd9c2d38334e13cdb87d5a2b0b64019bce0da696a9267650f0a86b286b367fe
-
Filesize
386KB
MD5555ab5fe6976df57e808d207c27a684d
SHA1b8b4662a9cc9c3e3c079e220b84ebd03c245c107
SHA256f0ddfca65408b9e21b484438eb0702d200dc90bcb5c152c0aff49860603250d6
SHA512d50d927a76ef16ecbf8bfdbb2e2cd37fa6e690d185258b42529c204bb1cd17ad4cc71a001813b48d123f3f14408b059b5aa0a838e1a17f819bad41caf61d8aa9
-
Filesize
386KB
MD5555ab5fe6976df57e808d207c27a684d
SHA1b8b4662a9cc9c3e3c079e220b84ebd03c245c107
SHA256f0ddfca65408b9e21b484438eb0702d200dc90bcb5c152c0aff49860603250d6
SHA512d50d927a76ef16ecbf8bfdbb2e2cd37fa6e690d185258b42529c204bb1cd17ad4cc71a001813b48d123f3f14408b059b5aa0a838e1a17f819bad41caf61d8aa9
-
Filesize
11KB
MD5b56255d57ccfa39a05f39a20ee60cc0a
SHA1af80c1eecfabcdd48fece68cec63d3e15fb20b80
SHA256288ed88964e563607ae87c0e8f825e2cf64f1b3378cf2cba47c2d72d9a484055
SHA512b861b16a21c5abb6d6afd1949a80f0c2179eed779fb768fa3ba6868b0f50da0c4f75c3515662cba0e591c503d5ca2c68ae8c1f40e7570aebe9e280288d88060f
-
Filesize
11KB
MD5b56255d57ccfa39a05f39a20ee60cc0a
SHA1af80c1eecfabcdd48fece68cec63d3e15fb20b80
SHA256288ed88964e563607ae87c0e8f825e2cf64f1b3378cf2cba47c2d72d9a484055
SHA512b861b16a21c5abb6d6afd1949a80f0c2179eed779fb768fa3ba6868b0f50da0c4f75c3515662cba0e591c503d5ca2c68ae8c1f40e7570aebe9e280288d88060f
-
Filesize
403KB
MD5baa45aee087c288af18bd62f1d2957e0
SHA1ef725179ae1fbd99acdfda0fbd9f5610f3c6acc4
SHA256c39ce88176c38a832836a4dba307c2b90d2d04bc774ea3553bc780fd3ed503d0
SHA5126cdf97c6bb89e81b2aaed81bb852d55de48c0caabe2b734bb5411d2c5bb8fa81867995c26983719554d765b4236eb6caa4bd9e5cefc0d445685ad969e8300552
-
Filesize
403KB
MD5baa45aee087c288af18bd62f1d2957e0
SHA1ef725179ae1fbd99acdfda0fbd9f5610f3c6acc4
SHA256c39ce88176c38a832836a4dba307c2b90d2d04bc774ea3553bc780fd3ed503d0
SHA5126cdf97c6bb89e81b2aaed81bb852d55de48c0caabe2b734bb5411d2c5bb8fa81867995c26983719554d765b4236eb6caa4bd9e5cefc0d445685ad969e8300552
-
Filesize
168KB
MD51eed54a048b387471d40ab1094221ef1
SHA15004d555d2e74a72b07a7fe1e512cb8f8ee5ba98
SHA256c97ba12c976ee628111a13331099e868c64bff78b392fe156662235ce9c4dc19
SHA512e781886c99944ef136036514f5773eb3566cb0b4f331bd013492ee2cd36fbb6decc1a88d25f21a86ad9205dbac5c53cacd145c9b10b638e3ac04742795c43c13
-
Filesize
168KB
MD51eed54a048b387471d40ab1094221ef1
SHA15004d555d2e74a72b07a7fe1e512cb8f8ee5ba98
SHA256c97ba12c976ee628111a13331099e868c64bff78b392fe156662235ce9c4dc19
SHA512e781886c99944ef136036514f5773eb3566cb0b4f331bd013492ee2cd36fbb6decc1a88d25f21a86ad9205dbac5c53cacd145c9b10b638e3ac04742795c43c13