Analysis
-
max time kernel
138s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2023, 21:30
Static task
static1
Behavioral task
behavioral1
Sample
97ca2de4d4d69eb262e5e857be87a2771c73239236f496fb44466a74a489aa5a.exe
Resource
win10v2004-20230220-en
General
-
Target
97ca2de4d4d69eb262e5e857be87a2771c73239236f496fb44466a74a489aa5a.exe
-
Size
984KB
-
MD5
219f85d92fae9d7820499561bd0274e1
-
SHA1
9447e3e28e6ee3d1a3771cb3485681008a4d0e3b
-
SHA256
97ca2de4d4d69eb262e5e857be87a2771c73239236f496fb44466a74a489aa5a
-
SHA512
a8288ff407d4545925bad8a3adcf5c32396873111594a6112350645643fc23b19c97b31bc9f8dc42addc5d9f158ab63a539d8ec2293f0a2c3dd3acd689cb910a
-
SSDEEP
24576:EyUvaJNfON6uG16e3tT5pzhItf/qnLAtPfHzyrXiw:TUvqNIA6el5NhFngyj
Malware Config
Extracted
redline
diza
83.97.73.122:19062
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Extracted
redline
ebal
83.97.73.122:19062
-
auth_value
adedb0785152892650ba0123aadb727d
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2672 x0490971.exe 2200 x4128411.exe 1472 f6454475.exe 2744 g8034357.exe 4232 h9740034.exe 4932 i2346831.exe 4684 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x4128411.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 97ca2de4d4d69eb262e5e857be87a2771c73239236f496fb44466a74a489aa5a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 97ca2de4d4d69eb262e5e857be87a2771c73239236f496fb44466a74a489aa5a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x0490971.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x0490971.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x4128411.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2744 set thread context of 4856 2744 g8034357.exe 94 PID 4232 set thread context of 820 4232 h9740034.exe 97 PID 4932 set thread context of 4660 4932 i2346831.exe 100 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1472 f6454475.exe 1472 f6454475.exe 4856 AppLaunch.exe 4856 AppLaunch.exe 4660 AppLaunch.exe 4660 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1472 f6454475.exe Token: SeDebugPrivilege 4856 AppLaunch.exe Token: SeDebugPrivilege 4660 AppLaunch.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 820 AppLaunch.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 368 wrote to memory of 2672 368 97ca2de4d4d69eb262e5e857be87a2771c73239236f496fb44466a74a489aa5a.exe 85 PID 368 wrote to memory of 2672 368 97ca2de4d4d69eb262e5e857be87a2771c73239236f496fb44466a74a489aa5a.exe 85 PID 368 wrote to memory of 2672 368 97ca2de4d4d69eb262e5e857be87a2771c73239236f496fb44466a74a489aa5a.exe 85 PID 2672 wrote to memory of 2200 2672 x0490971.exe 86 PID 2672 wrote to memory of 2200 2672 x0490971.exe 86 PID 2672 wrote to memory of 2200 2672 x0490971.exe 86 PID 2200 wrote to memory of 1472 2200 x4128411.exe 87 PID 2200 wrote to memory of 1472 2200 x4128411.exe 87 PID 2200 wrote to memory of 1472 2200 x4128411.exe 87 PID 2200 wrote to memory of 2744 2200 x4128411.exe 92 PID 2200 wrote to memory of 2744 2200 x4128411.exe 92 PID 2200 wrote to memory of 2744 2200 x4128411.exe 92 PID 2744 wrote to memory of 4856 2744 g8034357.exe 94 PID 2744 wrote to memory of 4856 2744 g8034357.exe 94 PID 2744 wrote to memory of 4856 2744 g8034357.exe 94 PID 2744 wrote to memory of 4856 2744 g8034357.exe 94 PID 2744 wrote to memory of 4856 2744 g8034357.exe 94 PID 2672 wrote to memory of 4232 2672 x0490971.exe 95 PID 2672 wrote to memory of 4232 2672 x0490971.exe 95 PID 2672 wrote to memory of 4232 2672 x0490971.exe 95 PID 4232 wrote to memory of 820 4232 h9740034.exe 97 PID 4232 wrote to memory of 820 4232 h9740034.exe 97 PID 4232 wrote to memory of 820 4232 h9740034.exe 97 PID 4232 wrote to memory of 820 4232 h9740034.exe 97 PID 4232 wrote to memory of 820 4232 h9740034.exe 97 PID 368 wrote to memory of 4932 368 97ca2de4d4d69eb262e5e857be87a2771c73239236f496fb44466a74a489aa5a.exe 98 PID 368 wrote to memory of 4932 368 97ca2de4d4d69eb262e5e857be87a2771c73239236f496fb44466a74a489aa5a.exe 98 PID 368 wrote to memory of 4932 368 97ca2de4d4d69eb262e5e857be87a2771c73239236f496fb44466a74a489aa5a.exe 98 PID 4932 wrote to memory of 4660 4932 i2346831.exe 100 PID 4932 wrote to memory of 4660 4932 i2346831.exe 100 PID 4932 wrote to memory of 4660 4932 i2346831.exe 100 PID 4932 wrote to memory of 4660 4932 i2346831.exe 100 PID 4932 wrote to memory of 4660 4932 i2346831.exe 100 PID 820 wrote to memory of 4684 820 AppLaunch.exe 101 PID 820 wrote to memory of 4684 820 AppLaunch.exe 101 PID 820 wrote to memory of 4684 820 AppLaunch.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\97ca2de4d4d69eb262e5e857be87a2771c73239236f496fb44466a74a489aa5a.exe"C:\Users\Admin\AppData\Local\Temp\97ca2de4d4d69eb262e5e857be87a2771c73239236f496fb44466a74a489aa5a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0490971.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0490971.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4128411.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4128411.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f6454475.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f6454475.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8034357.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8034357.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4856
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9740034.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9740034.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"4⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"5⤵
- Executes dropped EXE
PID:4684
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2346831.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2346831.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4660
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
329KB
MD5523bc8917e057c0077015d3c89eb7715
SHA18da93dd417ad3d97255f596e8f381b95e3e431e9
SHA256a37d03b86692fa3ec0393701d3cf34e84de75c6b3c2c8bf7303428b4ddac5ef6
SHA512352788172acbabd0cfe96e7f40e8e26a17cbdb7189fe71312a0945c5a112b13fe1f1d250ebac5d08621f4d6a66adf78e332285e527db1943505eb5f67bbbed38
-
Filesize
329KB
MD5523bc8917e057c0077015d3c89eb7715
SHA18da93dd417ad3d97255f596e8f381b95e3e431e9
SHA256a37d03b86692fa3ec0393701d3cf34e84de75c6b3c2c8bf7303428b4ddac5ef6
SHA512352788172acbabd0cfe96e7f40e8e26a17cbdb7189fe71312a0945c5a112b13fe1f1d250ebac5d08621f4d6a66adf78e332285e527db1943505eb5f67bbbed38
-
Filesize
662KB
MD509dc0573389188bb04d7959780d71e46
SHA136ba4386d2c4765af80445b6c3a971f179a5ae15
SHA256e87ca428fcabd4da5e20c7b9acc9e367154d7b8c5a8c28b88b08d5525195af68
SHA5129a18e32ef25cc00c36cde032195ed276622d4e2592fa400e1c25a1c6ea8cf16d6c470bae607e5f889f2586dbdd7486ab4564d51e7e8af30cd28ff48a8a702921
-
Filesize
662KB
MD509dc0573389188bb04d7959780d71e46
SHA136ba4386d2c4765af80445b6c3a971f179a5ae15
SHA256e87ca428fcabd4da5e20c7b9acc9e367154d7b8c5a8c28b88b08d5525195af68
SHA5129a18e32ef25cc00c36cde032195ed276622d4e2592fa400e1c25a1c6ea8cf16d6c470bae607e5f889f2586dbdd7486ab4564d51e7e8af30cd28ff48a8a702921
-
Filesize
388KB
MD513aaf2bdacb784ff8a79da4b169b857f
SHA11f7d26b42d366bf4b8cfc4e1a986e288a3d38e57
SHA256894596359dc5fdfe1d57ea68da868eef1fd8a7e2521086a452d6ad8086cf71be
SHA51292a377154fd728c8e7013b51d054d1e29519e4a9383a298bcd30bd61f856ddc463c37a463111688b4d543e4deef3851b21589e699d3d690fb6e032e1248fc12a
-
Filesize
388KB
MD513aaf2bdacb784ff8a79da4b169b857f
SHA11f7d26b42d366bf4b8cfc4e1a986e288a3d38e57
SHA256894596359dc5fdfe1d57ea68da868eef1fd8a7e2521086a452d6ad8086cf71be
SHA51292a377154fd728c8e7013b51d054d1e29519e4a9383a298bcd30bd61f856ddc463c37a463111688b4d543e4deef3851b21589e699d3d690fb6e032e1248fc12a
-
Filesize
280KB
MD5e208f5ebc2136c1ea4836d51fa63b805
SHA17f0d09a6d73cbe733991da08c0378dc8ef49f3fe
SHA256b2204e68ff7a9ee96701fd50d0c87c833d6bde0995c66e806a1ecfbcb3773b62
SHA5125beab19886856e8fe971c178db9fdbea303b1af6e95ccc8db6fbcee9cd141b269c9883c7f7413c4cb76834a4a9c4143b5d2acda88290463bc28d2545e3f3b108
-
Filesize
280KB
MD5e208f5ebc2136c1ea4836d51fa63b805
SHA17f0d09a6d73cbe733991da08c0378dc8ef49f3fe
SHA256b2204e68ff7a9ee96701fd50d0c87c833d6bde0995c66e806a1ecfbcb3773b62
SHA5125beab19886856e8fe971c178db9fdbea303b1af6e95ccc8db6fbcee9cd141b269c9883c7f7413c4cb76834a4a9c4143b5d2acda88290463bc28d2545e3f3b108
-
Filesize
146KB
MD56559a3bcccc0f7e884d4e485a61ea34a
SHA1db5816f7201a88b434e809a6883a3702b4994df3
SHA25618f9fd7c28b9088e56163bfc13f6d23629fe6dd9afdef2b06047822c0d3ce3f5
SHA512f723751c0110193d0ec52ff001fa9ba513d9f064ac31be922f6df9381160ae8177df835d5a01460cfd42a4e96f0035546afcf82f79e67ce9dde1765ecaf9d9ab
-
Filesize
146KB
MD56559a3bcccc0f7e884d4e485a61ea34a
SHA1db5816f7201a88b434e809a6883a3702b4994df3
SHA25618f9fd7c28b9088e56163bfc13f6d23629fe6dd9afdef2b06047822c0d3ce3f5
SHA512f723751c0110193d0ec52ff001fa9ba513d9f064ac31be922f6df9381160ae8177df835d5a01460cfd42a4e96f0035546afcf82f79e67ce9dde1765ecaf9d9ab
-
Filesize
194KB
MD5d39eedafcac441eec8b2b447a385e027
SHA1913ff4b1a3b53c66ef740cae3baec2b3cf7e8b9c
SHA256ce8ea8eeca1be0f62570a67db136682b14e1bba7a3b23923da25c4bc4b280496
SHA512eac79df5f5274fdb75b8448db067f9ea9519ce30c05b14f9de4054ff963920355caeb546ad49be817866a6808d9d53c167cc7699388b6f4d12766c78d29c20ba
-
Filesize
194KB
MD5d39eedafcac441eec8b2b447a385e027
SHA1913ff4b1a3b53c66ef740cae3baec2b3cf7e8b9c
SHA256ce8ea8eeca1be0f62570a67db136682b14e1bba7a3b23923da25c4bc4b280496
SHA512eac79df5f5274fdb75b8448db067f9ea9519ce30c05b14f9de4054ff963920355caeb546ad49be817866a6808d9d53c167cc7699388b6f4d12766c78d29c20ba
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc