Analysis
-
max time kernel
91s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2023 10:36
Static task
static1
Behavioral task
behavioral1
Sample
c45bf3ac00b9bedd17ba4451505418c9cd9a4a4c0fedb05fd0c6ff5e5c986691.exe
Resource
win10v2004-20230220-en
General
-
Target
c45bf3ac00b9bedd17ba4451505418c9cd9a4a4c0fedb05fd0c6ff5e5c986691.exe
-
Size
873KB
-
MD5
411ac0f57eb2a4e6ea5024a856341983
-
SHA1
eb91be811a35d87f83c53bebf85be31ea50e8e04
-
SHA256
c45bf3ac00b9bedd17ba4451505418c9cd9a4a4c0fedb05fd0c6ff5e5c986691
-
SHA512
2e8efcdc5c56f3d0ad254bfd81f6caa8058f1ed432172eed71d24b1a6b6994790cfb439038a1bd13fb83d6babbea9df57a8d9fa348b7a1dc6563e384fbaf624f
-
SSDEEP
12288:0Mriwy90EkgZ3Rn8w9huAMD4iSBVhu4RpJ9GMVaCbd1segRRptUmfQb9DmOKKs:dyE8lM0vpJ99oXtV65mP
Malware Config
Extracted
redline
maxi
83.97.73.122:19062
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Extracted
redline
mesu
83.97.73.122:19062
-
auth_value
8ede6a157d1d9509a21427d10e999ba2
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 1720 v8830580.exe 2812 v8657226.exe 3836 a6970865.exe 312 b8916230.exe 3300 c3590494.exe 2116 d2026793.exe 3228 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8830580.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v8830580.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8657226.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v8657226.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c45bf3ac00b9bedd17ba4451505418c9cd9a4a4c0fedb05fd0c6ff5e5c986691.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c45bf3ac00b9bedd17ba4451505418c9cd9a4a4c0fedb05fd0c6ff5e5c986691.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3836 set thread context of 2840 3836 a6970865.exe 86 PID 3300 set thread context of 3216 3300 c3590494.exe 90 PID 2116 set thread context of 2348 2116 d2026793.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2840 AppLaunch.exe 2840 AppLaunch.exe 312 b8916230.exe 312 b8916230.exe 2348 AppLaunch.exe 2348 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2840 AppLaunch.exe Token: SeDebugPrivilege 312 b8916230.exe Token: SeDebugPrivilege 2348 AppLaunch.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3216 AppLaunch.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1976 wrote to memory of 1720 1976 c45bf3ac00b9bedd17ba4451505418c9cd9a4a4c0fedb05fd0c6ff5e5c986691.exe 82 PID 1976 wrote to memory of 1720 1976 c45bf3ac00b9bedd17ba4451505418c9cd9a4a4c0fedb05fd0c6ff5e5c986691.exe 82 PID 1976 wrote to memory of 1720 1976 c45bf3ac00b9bedd17ba4451505418c9cd9a4a4c0fedb05fd0c6ff5e5c986691.exe 82 PID 1720 wrote to memory of 2812 1720 v8830580.exe 83 PID 1720 wrote to memory of 2812 1720 v8830580.exe 83 PID 1720 wrote to memory of 2812 1720 v8830580.exe 83 PID 2812 wrote to memory of 3836 2812 v8657226.exe 84 PID 2812 wrote to memory of 3836 2812 v8657226.exe 84 PID 2812 wrote to memory of 3836 2812 v8657226.exe 84 PID 3836 wrote to memory of 2840 3836 a6970865.exe 86 PID 3836 wrote to memory of 2840 3836 a6970865.exe 86 PID 3836 wrote to memory of 2840 3836 a6970865.exe 86 PID 3836 wrote to memory of 2840 3836 a6970865.exe 86 PID 3836 wrote to memory of 2840 3836 a6970865.exe 86 PID 2812 wrote to memory of 312 2812 v8657226.exe 87 PID 2812 wrote to memory of 312 2812 v8657226.exe 87 PID 2812 wrote to memory of 312 2812 v8657226.exe 87 PID 1720 wrote to memory of 3300 1720 v8830580.exe 88 PID 1720 wrote to memory of 3300 1720 v8830580.exe 88 PID 1720 wrote to memory of 3300 1720 v8830580.exe 88 PID 3300 wrote to memory of 3216 3300 c3590494.exe 90 PID 3300 wrote to memory of 3216 3300 c3590494.exe 90 PID 3300 wrote to memory of 3216 3300 c3590494.exe 90 PID 3300 wrote to memory of 3216 3300 c3590494.exe 90 PID 3300 wrote to memory of 3216 3300 c3590494.exe 90 PID 1976 wrote to memory of 2116 1976 c45bf3ac00b9bedd17ba4451505418c9cd9a4a4c0fedb05fd0c6ff5e5c986691.exe 91 PID 1976 wrote to memory of 2116 1976 c45bf3ac00b9bedd17ba4451505418c9cd9a4a4c0fedb05fd0c6ff5e5c986691.exe 91 PID 1976 wrote to memory of 2116 1976 c45bf3ac00b9bedd17ba4451505418c9cd9a4a4c0fedb05fd0c6ff5e5c986691.exe 91 PID 2116 wrote to memory of 2348 2116 d2026793.exe 93 PID 2116 wrote to memory of 2348 2116 d2026793.exe 93 PID 2116 wrote to memory of 2348 2116 d2026793.exe 93 PID 2116 wrote to memory of 2348 2116 d2026793.exe 93 PID 2116 wrote to memory of 2348 2116 d2026793.exe 93 PID 3216 wrote to memory of 3228 3216 AppLaunch.exe 94 PID 3216 wrote to memory of 3228 3216 AppLaunch.exe 94 PID 3216 wrote to memory of 3228 3216 AppLaunch.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\c45bf3ac00b9bedd17ba4451505418c9cd9a4a4c0fedb05fd0c6ff5e5c986691.exe"C:\Users\Admin\AppData\Local\Temp\c45bf3ac00b9bedd17ba4451505418c9cd9a4a4c0fedb05fd0c6ff5e5c986691.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8830580.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8830580.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8657226.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8657226.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6970865.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6970865.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8916230.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8916230.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:312
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3590494.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3590494.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"4⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"5⤵
- Executes dropped EXE
PID:3228
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2026793.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2026793.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2348
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
328KB
MD58cf1597273b23ca26c0fad3012685751
SHA15773f08ae10df95b0d8277a9eb4d3e398ba7c7dc
SHA256d45029d9f3e055e32ac112a3d660c78c9ca340f22660c46c44df4ad757ae7612
SHA512265a0bd2250064e5a2bea6d058ad83c16a806513cce57908050a2af93934f4816b6a101606a7f3866cdf47e49a0af5f83f433d472e773b93ee36c866b5a66191
-
Filesize
328KB
MD58cf1597273b23ca26c0fad3012685751
SHA15773f08ae10df95b0d8277a9eb4d3e398ba7c7dc
SHA256d45029d9f3e055e32ac112a3d660c78c9ca340f22660c46c44df4ad757ae7612
SHA512265a0bd2250064e5a2bea6d058ad83c16a806513cce57908050a2af93934f4816b6a101606a7f3866cdf47e49a0af5f83f433d472e773b93ee36c866b5a66191
-
Filesize
602KB
MD5a917fdc3eab38ccdbe049d847100b6d6
SHA1a9af9f399fe7e631b55c38e059dc00fffdd40d0e
SHA2569085a9c864409d3c712798f3769909a6e1e1f3d8c7348fca553d37448168f90b
SHA5122b0ed37a70ac85f4677c472e4086969a1979fcad056f90d2f67dad5054fbd17f6bdc7bc91c9eeef721199f3fe337f504bc5408b99cda3dfbe38820f471996f4b
-
Filesize
602KB
MD5a917fdc3eab38ccdbe049d847100b6d6
SHA1a9af9f399fe7e631b55c38e059dc00fffdd40d0e
SHA2569085a9c864409d3c712798f3769909a6e1e1f3d8c7348fca553d37448168f90b
SHA5122b0ed37a70ac85f4677c472e4086969a1979fcad056f90d2f67dad5054fbd17f6bdc7bc91c9eeef721199f3fe337f504bc5408b99cda3dfbe38820f471996f4b
-
Filesize
387KB
MD59350273ac4a64f065a1b3b5746d643e9
SHA12804a0daf022cd1400fa3d2a89015e05b202bd0a
SHA256ffa405c2cc9d74534454cebbbb8059bdc039c9730575dbc7f61ab11da9c9bebe
SHA512d6c3ec3f2b75cca44d3763423e831d74aec9cc3ef983ee30226e230856dab10a6e89738415dcc2d8d0d365ae22a2ae7e5e4b7b8a589f4a74a91e2fffc1be1818
-
Filesize
387KB
MD59350273ac4a64f065a1b3b5746d643e9
SHA12804a0daf022cd1400fa3d2a89015e05b202bd0a
SHA256ffa405c2cc9d74534454cebbbb8059bdc039c9730575dbc7f61ab11da9c9bebe
SHA512d6c3ec3f2b75cca44d3763423e831d74aec9cc3ef983ee30226e230856dab10a6e89738415dcc2d8d0d365ae22a2ae7e5e4b7b8a589f4a74a91e2fffc1be1818
-
Filesize
276KB
MD54d2fe8c88c8a248771acb0e1ea1e4ad0
SHA195ae1f21113ce8a9904c42142b6f629c8f49c33a
SHA2562660f41ab4cd64b4c896f789dda291051965368e37803e1f240d6cf93cc46a10
SHA5123b219969aa76fff17287122085447e4f750a0d5ad710d30e5ece25950a3c2ea2ff4a2297a8cc2fc6069dafaf2989882c991aff0a94613045df9ba1021d45eeed
-
Filesize
276KB
MD54d2fe8c88c8a248771acb0e1ea1e4ad0
SHA195ae1f21113ce8a9904c42142b6f629c8f49c33a
SHA2562660f41ab4cd64b4c896f789dda291051965368e37803e1f240d6cf93cc46a10
SHA5123b219969aa76fff17287122085447e4f750a0d5ad710d30e5ece25950a3c2ea2ff4a2297a8cc2fc6069dafaf2989882c991aff0a94613045df9ba1021d45eeed
-
Filesize
194KB
MD553028b3f3d5581d68d58badf624418d0
SHA18ca6de9e8153ad7e7d808c87e3bb242963e44437
SHA256eb8009591d1073ab8f90771cde605c4c88f4f9584e10c636a42ac1bf0177bbd3
SHA512a5d9b44b8ac2030ae84383da9a1e331d1c4058098bb20f198f134dabefde88b9789e37c82bb338231dcc712e9b5c1b7500be8bba5b2ee4200c6c98b9e212f2a4
-
Filesize
194KB
MD553028b3f3d5581d68d58badf624418d0
SHA18ca6de9e8153ad7e7d808c87e3bb242963e44437
SHA256eb8009591d1073ab8f90771cde605c4c88f4f9584e10c636a42ac1bf0177bbd3
SHA512a5d9b44b8ac2030ae84383da9a1e331d1c4058098bb20f198f134dabefde88b9789e37c82bb338231dcc712e9b5c1b7500be8bba5b2ee4200c6c98b9e212f2a4
-
Filesize
145KB
MD57f2a3c289432ccffd51f8e16778f6038
SHA186c2300eb48eca3a8b5e2a0b19f0a35c55609d7b
SHA256cf38305390ec171611e52151d51e3f31914c0b26c63a6f062df35ea1192f11e7
SHA512180b6d01eb6be3d970266c43739e74154a08c26b25c8d749243f2238efcd2d3da23c2bed9bb0973a7e1643351810da3dd6e00b40610cf9255f2f83bca8c860cf
-
Filesize
145KB
MD57f2a3c289432ccffd51f8e16778f6038
SHA186c2300eb48eca3a8b5e2a0b19f0a35c55609d7b
SHA256cf38305390ec171611e52151d51e3f31914c0b26c63a6f062df35ea1192f11e7
SHA512180b6d01eb6be3d970266c43739e74154a08c26b25c8d749243f2238efcd2d3da23c2bed9bb0973a7e1643351810da3dd6e00b40610cf9255f2f83bca8c860cf
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc