Analysis
-
max time kernel
146s -
max time network
103s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
15/04/2023, 06:15
Static task
static1
General
-
Target
1842111e754d7a343cd21fd8bbaf66cd62274351dc8a1e9826b1c783caf4609b.exe
-
Size
1.2MB
-
MD5
5e75b754fa596b39d8621903d54d6695
-
SHA1
f2cc60b90d2be6955000fbd9bb686a560451d9e9
-
SHA256
1842111e754d7a343cd21fd8bbaf66cd62274351dc8a1e9826b1c783caf4609b
-
SHA512
52c5e8538f5542c0cdd2146bab19d84147e32a0bc74199c624ad4c50871842191e23491a6b1b1553a7b3355112104da5cd7dc76ef48f04679e4886af4cfe38d7
-
SSDEEP
24576:SypzarApbeJxXeNpS+UJ5XnKrLfq4UQfzasWP3186qTly:5pWrAQxXWpS5XXuq4UZPl
Malware Config
Extracted
redline
soft
77.91.124.146:4121
-
auth_value
e65663e455bca3c5699650b66e76ceaa
Extracted
redline
dirx
77.91.124.146:4121
-
auth_value
522d988f763be056e53e089f74d464cc
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr763185.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr763185.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr763185.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr763185.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr763185.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2444 un011939.exe 2524 un852353.exe 2124 pr763185.exe 5004 qu944711.exe 2144 1.exe 1260 rk866005.exe 4592 si914360.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr763185.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr763185.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1842111e754d7a343cd21fd8bbaf66cd62274351dc8a1e9826b1c783caf4609b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1842111e754d7a343cd21fd8bbaf66cd62274351dc8a1e9826b1c783caf4609b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un011939.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un011939.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un852353.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un852353.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 9 IoCs
pid pid_target Process procid_target 4872 4592 WerFault.exe 74 4848 4592 WerFault.exe 74 4896 4592 WerFault.exe 74 4168 4592 WerFault.exe 74 4792 4592 WerFault.exe 74 5068 4592 WerFault.exe 74 3688 4592 WerFault.exe 74 3624 4592 WerFault.exe 74 5084 4592 WerFault.exe 74 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2124 pr763185.exe 2124 pr763185.exe 2144 1.exe 1260 rk866005.exe 2144 1.exe 1260 rk866005.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2124 pr763185.exe Token: SeDebugPrivilege 5004 qu944711.exe Token: SeDebugPrivilege 2144 1.exe Token: SeDebugPrivilege 1260 rk866005.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4592 si914360.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2444 2200 1842111e754d7a343cd21fd8bbaf66cd62274351dc8a1e9826b1c783caf4609b.exe 66 PID 2200 wrote to memory of 2444 2200 1842111e754d7a343cd21fd8bbaf66cd62274351dc8a1e9826b1c783caf4609b.exe 66 PID 2200 wrote to memory of 2444 2200 1842111e754d7a343cd21fd8bbaf66cd62274351dc8a1e9826b1c783caf4609b.exe 66 PID 2444 wrote to memory of 2524 2444 un011939.exe 67 PID 2444 wrote to memory of 2524 2444 un011939.exe 67 PID 2444 wrote to memory of 2524 2444 un011939.exe 67 PID 2524 wrote to memory of 2124 2524 un852353.exe 68 PID 2524 wrote to memory of 2124 2524 un852353.exe 68 PID 2524 wrote to memory of 2124 2524 un852353.exe 68 PID 2524 wrote to memory of 5004 2524 un852353.exe 69 PID 2524 wrote to memory of 5004 2524 un852353.exe 69 PID 2524 wrote to memory of 5004 2524 un852353.exe 69 PID 5004 wrote to memory of 2144 5004 qu944711.exe 71 PID 5004 wrote to memory of 2144 5004 qu944711.exe 71 PID 5004 wrote to memory of 2144 5004 qu944711.exe 71 PID 2444 wrote to memory of 1260 2444 un011939.exe 72 PID 2444 wrote to memory of 1260 2444 un011939.exe 72 PID 2444 wrote to memory of 1260 2444 un011939.exe 72 PID 2200 wrote to memory of 4592 2200 1842111e754d7a343cd21fd8bbaf66cd62274351dc8a1e9826b1c783caf4609b.exe 74 PID 2200 wrote to memory of 4592 2200 1842111e754d7a343cd21fd8bbaf66cd62274351dc8a1e9826b1c783caf4609b.exe 74 PID 2200 wrote to memory of 4592 2200 1842111e754d7a343cd21fd8bbaf66cd62274351dc8a1e9826b1c783caf4609b.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\1842111e754d7a343cd21fd8bbaf66cd62274351dc8a1e9826b1c783caf4609b.exe"C:\Users\Admin\AppData\Local\Temp\1842111e754d7a343cd21fd8bbaf66cd62274351dc8a1e9826b1c783caf4609b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un011939.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un011939.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un852353.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un852353.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr763185.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr763185.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu944711.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu944711.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk866005.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk866005.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1260
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si914360.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si914360.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:4592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 6323⤵
- Program crash
PID:4872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 7083⤵
- Program crash
PID:4848
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 8483⤵
- Program crash
PID:4896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 8603⤵
- Program crash
PID:4168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 8843⤵
- Program crash
PID:4792
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 9043⤵
- Program crash
PID:5068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 11283⤵
- Program crash
PID:3688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 11883⤵
- Program crash
PID:3624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 12083⤵
- Program crash
PID:5084
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD5d0f6446729649ac0ed8a001b2935db90
SHA1acb4e10b42c73a85f16fc337305e40d3b1622b28
SHA25674a7e002e7bc3aa7cf8bdf70189ee41215d85faa43070c837129dcb0e0d55ca9
SHA5128e3de4ad2164f8eb3cc00007f7ff54f9fd8ff8ef2a42ba67b40eb0347747d11ddadb51e7530d637bc107c9513b1df65e895ef7eaf6622d09554b27d6c05d5c0e
-
Filesize
395KB
MD5d0f6446729649ac0ed8a001b2935db90
SHA1acb4e10b42c73a85f16fc337305e40d3b1622b28
SHA25674a7e002e7bc3aa7cf8bdf70189ee41215d85faa43070c837129dcb0e0d55ca9
SHA5128e3de4ad2164f8eb3cc00007f7ff54f9fd8ff8ef2a42ba67b40eb0347747d11ddadb51e7530d637bc107c9513b1df65e895ef7eaf6622d09554b27d6c05d5c0e
-
Filesize
863KB
MD5b1647732ed0b3bc4f930f59d536145a7
SHA16f2562bacd32c558f426378635c719224611488b
SHA256841d72fcde556cd2ee04100a1d9cfed654f289c03201f6404918993813ff76d3
SHA51262d0a769c104bcf5752db7f1e2cfebf6a79576b3a0e8e68a2557c8af78a0cbb04f18bb86bbb40d9037f48213846bdb2112f1b6db848105cddfb2d0933d012a60
-
Filesize
863KB
MD5b1647732ed0b3bc4f930f59d536145a7
SHA16f2562bacd32c558f426378635c719224611488b
SHA256841d72fcde556cd2ee04100a1d9cfed654f289c03201f6404918993813ff76d3
SHA51262d0a769c104bcf5752db7f1e2cfebf6a79576b3a0e8e68a2557c8af78a0cbb04f18bb86bbb40d9037f48213846bdb2112f1b6db848105cddfb2d0933d012a60
-
Filesize
169KB
MD535aafe13d80a56a0672612b02aabd27c
SHA10f6f84fd12d61e4adbcfee4fb69708d745ae6440
SHA2563f9e04799cc5882bba3235ca4a838f7891241619fb4957a94323d67bd8f7781d
SHA51270de1bdf0b9ce1559805df2115215b47c47fc956de7d78bb6bfcc53394bfccee1ec083f56ac780d379e98ec545ee5c756b1442a3440a62c74134a5eb057346d4
-
Filesize
169KB
MD535aafe13d80a56a0672612b02aabd27c
SHA10f6f84fd12d61e4adbcfee4fb69708d745ae6440
SHA2563f9e04799cc5882bba3235ca4a838f7891241619fb4957a94323d67bd8f7781d
SHA51270de1bdf0b9ce1559805df2115215b47c47fc956de7d78bb6bfcc53394bfccee1ec083f56ac780d379e98ec545ee5c756b1442a3440a62c74134a5eb057346d4
-
Filesize
709KB
MD54874e2145d6cfd6b8b576b7d89d6d2e8
SHA12cd28878d178aa04cfafff0082151768b9dddf46
SHA2565452bca0748a36daf3ceef97314b98efe0fdb821cc0dab6f95001ecd1c9f7445
SHA512357e482dc7299602488473a8d4cfdbfe29968b03beb0ec2a92aff6a87a43f5aac1f0c3721e0769c43e05d7dd686d87a58edddc0485e9b27ac56a2e45954a1cb6
-
Filesize
709KB
MD54874e2145d6cfd6b8b576b7d89d6d2e8
SHA12cd28878d178aa04cfafff0082151768b9dddf46
SHA2565452bca0748a36daf3ceef97314b98efe0fdb821cc0dab6f95001ecd1c9f7445
SHA512357e482dc7299602488473a8d4cfdbfe29968b03beb0ec2a92aff6a87a43f5aac1f0c3721e0769c43e05d7dd686d87a58edddc0485e9b27ac56a2e45954a1cb6
-
Filesize
403KB
MD5ef490571377fe1afafe8417528037ab5
SHA183d441a3521e2591d4a78b3395ecff46f34a96ba
SHA25615d3e1ae66c9cad7ab1360fbf39cc9358f50c8ffcb26aba548dccb3006b76d35
SHA51286fd1cb24b21c63d11c6d892bdf816acb185a51d8f95e5809c064a010a32a9e29da6c8c603f5a7c9d1d3ad2d1811e56a9ca1b24565fc83872833a5090faf83bd
-
Filesize
403KB
MD5ef490571377fe1afafe8417528037ab5
SHA183d441a3521e2591d4a78b3395ecff46f34a96ba
SHA25615d3e1ae66c9cad7ab1360fbf39cc9358f50c8ffcb26aba548dccb3006b76d35
SHA51286fd1cb24b21c63d11c6d892bdf816acb185a51d8f95e5809c064a010a32a9e29da6c8c603f5a7c9d1d3ad2d1811e56a9ca1b24565fc83872833a5090faf83bd
-
Filesize
588KB
MD5bef9ab4288dd8424150c6bb5cff0575e
SHA195a03838b99f14c5297cb722938caf489a3f955d
SHA2564aa5f322422781a2150f372357057b791d1e7c8ca2df77f1b290934162186e65
SHA51252f89b280f056f866d81d2a9aacde9c68b104151459d15b0d6b003ae582ce1672c8f30041b3704cd723c2741f6cfa11d3dab3d7fdc2a772ea2733b4ff68da379
-
Filesize
588KB
MD5bef9ab4288dd8424150c6bb5cff0575e
SHA195a03838b99f14c5297cb722938caf489a3f955d
SHA2564aa5f322422781a2150f372357057b791d1e7c8ca2df77f1b290934162186e65
SHA51252f89b280f056f866d81d2a9aacde9c68b104151459d15b0d6b003ae582ce1672c8f30041b3704cd723c2741f6cfa11d3dab3d7fdc2a772ea2733b4ff68da379
-
Filesize
168KB
MD51eed54a048b387471d40ab1094221ef1
SHA15004d555d2e74a72b07a7fe1e512cb8f8ee5ba98
SHA256c97ba12c976ee628111a13331099e868c64bff78b392fe156662235ce9c4dc19
SHA512e781886c99944ef136036514f5773eb3566cb0b4f331bd013492ee2cd36fbb6decc1a88d25f21a86ad9205dbac5c53cacd145c9b10b638e3ac04742795c43c13
-
Filesize
168KB
MD51eed54a048b387471d40ab1094221ef1
SHA15004d555d2e74a72b07a7fe1e512cb8f8ee5ba98
SHA256c97ba12c976ee628111a13331099e868c64bff78b392fe156662235ce9c4dc19
SHA512e781886c99944ef136036514f5773eb3566cb0b4f331bd013492ee2cd36fbb6decc1a88d25f21a86ad9205dbac5c53cacd145c9b10b638e3ac04742795c43c13