Analysis
-
max time kernel
135s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2023 10:26
Static task
static1
Behavioral task
behavioral1
Sample
a3efe98d3d853ecaf2edc69edd94d489b6db4a7c8e6969b3cb2fa48a2dc337db.exe
Resource
win10v2004-20230221-en
General
-
Target
a3efe98d3d853ecaf2edc69edd94d489b6db4a7c8e6969b3cb2fa48a2dc337db.exe
-
Size
873KB
-
MD5
6561801c4d7b3989c54ed493ce06dfaa
-
SHA1
e983f7f9d5f40069cad0008460f293d289fe22ec
-
SHA256
a3efe98d3d853ecaf2edc69edd94d489b6db4a7c8e6969b3cb2fa48a2dc337db
-
SHA512
bbde2137ef96e689f7df6efe56905ddb8826f92a16b9573a60f62991db455116369d0e94951b2d94bebf6bf9e7e13733d55f24bd1e2180337862b8afec92546e
-
SSDEEP
12288:BMr/y90OYm9sJzGhb9yGnyfNp8a4uzntjZYQ3GH/Gd+rAleNkb4axCq65zEUDxe4:6yRWBeAGyfN3RGfGUUlsY4axuS6
Malware Config
Extracted
redline
maxi
83.97.73.122:19062
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Extracted
redline
mesu
83.97.73.122:19062
-
auth_value
8ede6a157d1d9509a21427d10e999ba2
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 4800 v7876583.exe 4808 v4482524.exe 2112 a8655688.exe 4380 b4781098.exe 264 c6957065.exe 1048 d0319217.exe 2440 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a3efe98d3d853ecaf2edc69edd94d489b6db4a7c8e6969b3cb2fa48a2dc337db.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a3efe98d3d853ecaf2edc69edd94d489b6db4a7c8e6969b3cb2fa48a2dc337db.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7876583.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7876583.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4482524.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v4482524.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2112 set thread context of 4676 2112 a8655688.exe 86 PID 264 set thread context of 3120 264 c6957065.exe 92 PID 1048 set thread context of 2236 1048 d0319217.exe 95 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4676 AppLaunch.exe 4676 AppLaunch.exe 4380 b4781098.exe 4380 b4781098.exe 2236 AppLaunch.exe 2236 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4676 AppLaunch.exe Token: SeDebugPrivilege 4380 b4781098.exe Token: SeDebugPrivilege 2236 AppLaunch.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3120 AppLaunch.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 5076 wrote to memory of 4800 5076 a3efe98d3d853ecaf2edc69edd94d489b6db4a7c8e6969b3cb2fa48a2dc337db.exe 82 PID 5076 wrote to memory of 4800 5076 a3efe98d3d853ecaf2edc69edd94d489b6db4a7c8e6969b3cb2fa48a2dc337db.exe 82 PID 5076 wrote to memory of 4800 5076 a3efe98d3d853ecaf2edc69edd94d489b6db4a7c8e6969b3cb2fa48a2dc337db.exe 82 PID 4800 wrote to memory of 4808 4800 v7876583.exe 83 PID 4800 wrote to memory of 4808 4800 v7876583.exe 83 PID 4800 wrote to memory of 4808 4800 v7876583.exe 83 PID 4808 wrote to memory of 2112 4808 v4482524.exe 84 PID 4808 wrote to memory of 2112 4808 v4482524.exe 84 PID 4808 wrote to memory of 2112 4808 v4482524.exe 84 PID 2112 wrote to memory of 4676 2112 a8655688.exe 86 PID 2112 wrote to memory of 4676 2112 a8655688.exe 86 PID 2112 wrote to memory of 4676 2112 a8655688.exe 86 PID 2112 wrote to memory of 4676 2112 a8655688.exe 86 PID 2112 wrote to memory of 4676 2112 a8655688.exe 86 PID 4808 wrote to memory of 4380 4808 v4482524.exe 87 PID 4808 wrote to memory of 4380 4808 v4482524.exe 87 PID 4808 wrote to memory of 4380 4808 v4482524.exe 87 PID 4800 wrote to memory of 264 4800 v7876583.exe 90 PID 4800 wrote to memory of 264 4800 v7876583.exe 90 PID 4800 wrote to memory of 264 4800 v7876583.exe 90 PID 264 wrote to memory of 3120 264 c6957065.exe 92 PID 264 wrote to memory of 3120 264 c6957065.exe 92 PID 264 wrote to memory of 3120 264 c6957065.exe 92 PID 264 wrote to memory of 3120 264 c6957065.exe 92 PID 264 wrote to memory of 3120 264 c6957065.exe 92 PID 5076 wrote to memory of 1048 5076 a3efe98d3d853ecaf2edc69edd94d489b6db4a7c8e6969b3cb2fa48a2dc337db.exe 93 PID 5076 wrote to memory of 1048 5076 a3efe98d3d853ecaf2edc69edd94d489b6db4a7c8e6969b3cb2fa48a2dc337db.exe 93 PID 5076 wrote to memory of 1048 5076 a3efe98d3d853ecaf2edc69edd94d489b6db4a7c8e6969b3cb2fa48a2dc337db.exe 93 PID 1048 wrote to memory of 2236 1048 d0319217.exe 95 PID 1048 wrote to memory of 2236 1048 d0319217.exe 95 PID 1048 wrote to memory of 2236 1048 d0319217.exe 95 PID 1048 wrote to memory of 2236 1048 d0319217.exe 95 PID 1048 wrote to memory of 2236 1048 d0319217.exe 95 PID 3120 wrote to memory of 2440 3120 AppLaunch.exe 96 PID 3120 wrote to memory of 2440 3120 AppLaunch.exe 96 PID 3120 wrote to memory of 2440 3120 AppLaunch.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3efe98d3d853ecaf2edc69edd94d489b6db4a7c8e6969b3cb2fa48a2dc337db.exe"C:\Users\Admin\AppData\Local\Temp\a3efe98d3d853ecaf2edc69edd94d489b6db4a7c8e6969b3cb2fa48a2dc337db.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7876583.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7876583.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4482524.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4482524.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8655688.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8655688.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4676
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4781098.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4781098.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4380
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6957065.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6957065.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"4⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"5⤵
- Executes dropped EXE
PID:2440
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d0319217.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d0319217.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2236
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
328KB
MD53638b4cc92e82dc459ae040132f12b6a
SHA197ed70093fecb894049c800df8ea973d7aa419d7
SHA2560fd66ca3cb444a712c6b96dd4b51204f2c1088fca442b37bba93a1fdfae8e47a
SHA512dba61c2fb0ff46b713826480a8b5e2066a53dedc3d2cff03b79a348eaa3af367523aeff82c5a87150ab4633b7e7ef91deff933fdfd344757f0aa4d27d5485fd8
-
Filesize
328KB
MD53638b4cc92e82dc459ae040132f12b6a
SHA197ed70093fecb894049c800df8ea973d7aa419d7
SHA2560fd66ca3cb444a712c6b96dd4b51204f2c1088fca442b37bba93a1fdfae8e47a
SHA512dba61c2fb0ff46b713826480a8b5e2066a53dedc3d2cff03b79a348eaa3af367523aeff82c5a87150ab4633b7e7ef91deff933fdfd344757f0aa4d27d5485fd8
-
Filesize
602KB
MD54549e4a9bf9d247d74a095e3e2d46e9a
SHA1a015bfd0b5941dacdf3aaaea0e479b7449e5c2f1
SHA256da67288869747fd2d68c88300a05a3279400093d9e0effd3d0027e9eba9998a3
SHA5126c5b05534679b17137e3cea336391809a0cc57f021adc19bbddfa4eebf3fbfc2a23ff004793073117f1268dc979153ae00843256db429247e85339a0d2c9f767
-
Filesize
602KB
MD54549e4a9bf9d247d74a095e3e2d46e9a
SHA1a015bfd0b5941dacdf3aaaea0e479b7449e5c2f1
SHA256da67288869747fd2d68c88300a05a3279400093d9e0effd3d0027e9eba9998a3
SHA5126c5b05534679b17137e3cea336391809a0cc57f021adc19bbddfa4eebf3fbfc2a23ff004793073117f1268dc979153ae00843256db429247e85339a0d2c9f767
-
Filesize
387KB
MD5604b9561ec4ab9c8d908078cf4608507
SHA1a244b2e3abe88f1ddcebd9a0d499a7f810f79323
SHA25617a66240a5070b40dc859dc685e416e0de24552308c22fa85498df4b5787ceda
SHA5122cbf4f9dfa4bacc3bcd82bee90fb41c172bba62157159200df81c5a799412f047b8820e7f49985630d14047604aec4baaaa55b97d386c15a174df85421bfbfa8
-
Filesize
387KB
MD5604b9561ec4ab9c8d908078cf4608507
SHA1a244b2e3abe88f1ddcebd9a0d499a7f810f79323
SHA25617a66240a5070b40dc859dc685e416e0de24552308c22fa85498df4b5787ceda
SHA5122cbf4f9dfa4bacc3bcd82bee90fb41c172bba62157159200df81c5a799412f047b8820e7f49985630d14047604aec4baaaa55b97d386c15a174df85421bfbfa8
-
Filesize
276KB
MD530cc2717be00f5b166c7e3e04e0f2e45
SHA1889667a434da1be4b07e7dbe2bdab54ecd0e07d5
SHA256c452a1fba31b7ff37d5b68d9e5975335d828e57612c811dda8dab924dc472ff3
SHA512b14dc55d35219a502b4d8845a9db8a2b179a6e228f60f4d41795d00dca02c9cffa4cb2b01d4db314ec3d608d73ac0af7887fca5365f0061b797b59ce50668fc6
-
Filesize
276KB
MD530cc2717be00f5b166c7e3e04e0f2e45
SHA1889667a434da1be4b07e7dbe2bdab54ecd0e07d5
SHA256c452a1fba31b7ff37d5b68d9e5975335d828e57612c811dda8dab924dc472ff3
SHA512b14dc55d35219a502b4d8845a9db8a2b179a6e228f60f4d41795d00dca02c9cffa4cb2b01d4db314ec3d608d73ac0af7887fca5365f0061b797b59ce50668fc6
-
Filesize
194KB
MD53376df79785e55515cda4bf05ad2a103
SHA1b190586e9e300663482b304f86d90f59bd7fe0fe
SHA2562c2664d566660753460046e02590f10056b358af65a2279e270ee43e85a985df
SHA512e7a55d8e048750df67dcccdbf8d01202683d6daabcca05216db8aa3bf285bab60abfc571d2f212a0e6c8559500ab24e6efeae4558fec197c0f6e03f58094701c
-
Filesize
194KB
MD53376df79785e55515cda4bf05ad2a103
SHA1b190586e9e300663482b304f86d90f59bd7fe0fe
SHA2562c2664d566660753460046e02590f10056b358af65a2279e270ee43e85a985df
SHA512e7a55d8e048750df67dcccdbf8d01202683d6daabcca05216db8aa3bf285bab60abfc571d2f212a0e6c8559500ab24e6efeae4558fec197c0f6e03f58094701c
-
Filesize
145KB
MD55c0ddf2a1afcb4a062fc785dc3c5173d
SHA148241c875a521a1cf4c7a5c627eb9fa955ab5a5c
SHA2561da5b60e869eb4079610677e5cd285387d12cd4eaf95ba705c8746adce0288cd
SHA5128ccd9b6109670cd12c6d7c1e965c6c5cc1b3104e0326e08c109aa632d55bad78729bf778051be163d33d0e2140f0b1908e49805f1c857e6ec65f49178065392b
-
Filesize
145KB
MD55c0ddf2a1afcb4a062fc785dc3c5173d
SHA148241c875a521a1cf4c7a5c627eb9fa955ab5a5c
SHA2561da5b60e869eb4079610677e5cd285387d12cd4eaf95ba705c8746adce0288cd
SHA5128ccd9b6109670cd12c6d7c1e965c6c5cc1b3104e0326e08c109aa632d55bad78729bf778051be163d33d0e2140f0b1908e49805f1c857e6ec65f49178065392b
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc