Analysis
-
max time kernel
52s -
max time network
70s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
24-05-2023 16:42
Static task
static1
Behavioral task
behavioral1
Sample
b3d3ec54151a2183f58a225c42d9c73d3ff8d3425af3b462402df20f29963211.exe
Resource
win10-20230220-en
General
-
Target
b3d3ec54151a2183f58a225c42d9c73d3ff8d3425af3b462402df20f29963211.exe
-
Size
872KB
-
MD5
f0282a25d4cf518bc53f4128f14ecabd
-
SHA1
6278b696b02082f654677499608e3a66dc6b3ade
-
SHA256
b3d3ec54151a2183f58a225c42d9c73d3ff8d3425af3b462402df20f29963211
-
SHA512
964d471d2edb2a3c2650057784a1f7ec7e2c5d992bf50b5b4eb1a91d5cfc46359beadf50185e97c17eb5ed2938dba3e862934d4767d6f9c450940634d9be4118
-
SSDEEP
12288:BMrOy90wlSJgnH1FGxiy6wpUEl4qHLGFw46brNkbxnJVl2LKm89qynUEcVmoC3QR:PywJgH1wwu7H6m4PPefjVmoC3jK
Malware Config
Extracted
redline
maxi
83.97.73.122:19062
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Extracted
redline
mesu
83.97.73.122:19062
-
auth_value
8ede6a157d1d9509a21427d10e999ba2
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 5068 v4553500.exe 4724 v5950840.exe 4760 a1431517.exe 404 b3682011.exe 4380 c3416620.exe 4400 d5096485.exe 3196 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v4553500.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5950840.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v5950840.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b3d3ec54151a2183f58a225c42d9c73d3ff8d3425af3b462402df20f29963211.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b3d3ec54151a2183f58a225c42d9c73d3ff8d3425af3b462402df20f29963211.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4553500.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4760 set thread context of 2964 4760 a1431517.exe 70 PID 4380 set thread context of 4364 4380 c3416620.exe 75 PID 4400 set thread context of 4684 4400 d5096485.exe 78 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2964 AppLaunch.exe 2964 AppLaunch.exe 404 b3682011.exe 404 b3682011.exe 4684 AppLaunch.exe 4684 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2964 AppLaunch.exe Token: SeDebugPrivilege 404 b3682011.exe Token: SeDebugPrivilege 4684 AppLaunch.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4456 wrote to memory of 5068 4456 b3d3ec54151a2183f58a225c42d9c73d3ff8d3425af3b462402df20f29963211.exe 66 PID 4456 wrote to memory of 5068 4456 b3d3ec54151a2183f58a225c42d9c73d3ff8d3425af3b462402df20f29963211.exe 66 PID 4456 wrote to memory of 5068 4456 b3d3ec54151a2183f58a225c42d9c73d3ff8d3425af3b462402df20f29963211.exe 66 PID 5068 wrote to memory of 4724 5068 v4553500.exe 67 PID 5068 wrote to memory of 4724 5068 v4553500.exe 67 PID 5068 wrote to memory of 4724 5068 v4553500.exe 67 PID 4724 wrote to memory of 4760 4724 v5950840.exe 68 PID 4724 wrote to memory of 4760 4724 v5950840.exe 68 PID 4724 wrote to memory of 4760 4724 v5950840.exe 68 PID 4760 wrote to memory of 2964 4760 a1431517.exe 70 PID 4760 wrote to memory of 2964 4760 a1431517.exe 70 PID 4760 wrote to memory of 2964 4760 a1431517.exe 70 PID 4760 wrote to memory of 2964 4760 a1431517.exe 70 PID 4760 wrote to memory of 2964 4760 a1431517.exe 70 PID 4724 wrote to memory of 404 4724 v5950840.exe 71 PID 4724 wrote to memory of 404 4724 v5950840.exe 71 PID 4724 wrote to memory of 404 4724 v5950840.exe 71 PID 5068 wrote to memory of 4380 5068 v4553500.exe 73 PID 5068 wrote to memory of 4380 5068 v4553500.exe 73 PID 5068 wrote to memory of 4380 5068 v4553500.exe 73 PID 4380 wrote to memory of 4364 4380 c3416620.exe 75 PID 4380 wrote to memory of 4364 4380 c3416620.exe 75 PID 4380 wrote to memory of 4364 4380 c3416620.exe 75 PID 4380 wrote to memory of 4364 4380 c3416620.exe 75 PID 4380 wrote to memory of 4364 4380 c3416620.exe 75 PID 4456 wrote to memory of 4400 4456 b3d3ec54151a2183f58a225c42d9c73d3ff8d3425af3b462402df20f29963211.exe 76 PID 4456 wrote to memory of 4400 4456 b3d3ec54151a2183f58a225c42d9c73d3ff8d3425af3b462402df20f29963211.exe 76 PID 4456 wrote to memory of 4400 4456 b3d3ec54151a2183f58a225c42d9c73d3ff8d3425af3b462402df20f29963211.exe 76 PID 4400 wrote to memory of 4684 4400 d5096485.exe 78 PID 4400 wrote to memory of 4684 4400 d5096485.exe 78 PID 4400 wrote to memory of 4684 4400 d5096485.exe 78 PID 4400 wrote to memory of 4684 4400 d5096485.exe 78 PID 4400 wrote to memory of 4684 4400 d5096485.exe 78 PID 4364 wrote to memory of 3196 4364 AppLaunch.exe 79 PID 4364 wrote to memory of 3196 4364 AppLaunch.exe 79 PID 4364 wrote to memory of 3196 4364 AppLaunch.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3d3ec54151a2183f58a225c42d9c73d3ff8d3425af3b462402df20f29963211.exe"C:\Users\Admin\AppData\Local\Temp\b3d3ec54151a2183f58a225c42d9c73d3ff8d3425af3b462402df20f29963211.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4553500.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4553500.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5950840.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5950840.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1431517.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1431517.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3682011.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3682011.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:404
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3416620.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3416620.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"5⤵
- Executes dropped EXE
PID:3196
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5096485.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5096485.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4684
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5957779c42144282d8cd83192b8fbc7cf
SHA1de83d08d2cca06b9ff3d1ef239d6b60b705d25fe
SHA2560d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51
SHA512f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd
-
Filesize
329KB
MD59edc68c19142662d6dff6ab85e439fe5
SHA15c21ea7598890032ae9b71c46604c562125c0420
SHA256cd4391c2aa12b56d54c9981d69d5a3a1788bc0d14e875f552f8e5afb712dede1
SHA512e612b287a123c9647ff23c834ea64c6392d6eac3828f414f7a43ccfecb9bcffa470cfd8e1454427658c88953dca245c0aa91b96cf9282d945d521c134f5e4f62
-
Filesize
329KB
MD59edc68c19142662d6dff6ab85e439fe5
SHA15c21ea7598890032ae9b71c46604c562125c0420
SHA256cd4391c2aa12b56d54c9981d69d5a3a1788bc0d14e875f552f8e5afb712dede1
SHA512e612b287a123c9647ff23c834ea64c6392d6eac3828f414f7a43ccfecb9bcffa470cfd8e1454427658c88953dca245c0aa91b96cf9282d945d521c134f5e4f62
-
Filesize
601KB
MD54a5c6d52884bb4d3a09b6d9a7ee6207d
SHA11270ee75b5934534d27ab1db3d5a67db93c85f43
SHA2569fc014202cf0d8c5c5ca06f2a6e0e38e6c495d954bd4b3583cb6123a7155b425
SHA5121152df42059dded318c91159463f8f58ca26bb1df44b92277ffd0a7e2cb9374aedc10e8abe49643eebfb1346d93c45c624671967af4c0cc8931de4d3d5607889
-
Filesize
601KB
MD54a5c6d52884bb4d3a09b6d9a7ee6207d
SHA11270ee75b5934534d27ab1db3d5a67db93c85f43
SHA2569fc014202cf0d8c5c5ca06f2a6e0e38e6c495d954bd4b3583cb6123a7155b425
SHA5121152df42059dded318c91159463f8f58ca26bb1df44b92277ffd0a7e2cb9374aedc10e8abe49643eebfb1346d93c45c624671967af4c0cc8931de4d3d5607889
-
Filesize
387KB
MD5611af53dc21141374409bccabf63ad08
SHA1f984b64bf422e1a19bb436c6140221d68694ea44
SHA25683de214f5d0d8764678fbf5967b1b71f380d604eb34d41c120f36c605262e6e0
SHA51280ad24b237806fe6542e0d08933cf9f1a1623161f268f76064cf8dc8439f212bf1cd8972c6772a9f79b7d2530e096dcfa6098d9db96253b33dc7e275ba51833b
-
Filesize
387KB
MD5611af53dc21141374409bccabf63ad08
SHA1f984b64bf422e1a19bb436c6140221d68694ea44
SHA25683de214f5d0d8764678fbf5967b1b71f380d604eb34d41c120f36c605262e6e0
SHA51280ad24b237806fe6542e0d08933cf9f1a1623161f268f76064cf8dc8439f212bf1cd8972c6772a9f79b7d2530e096dcfa6098d9db96253b33dc7e275ba51833b
-
Filesize
276KB
MD50197308140af7de39d8e0ee64e655ace
SHA133cc8bc2df16259636946a8bb5cfac4bee15ec4e
SHA25624991d1cf0996c14014b84ed4fe37f42374cc3ff6edce5b05210e5095c4fd51c
SHA5125ada182371b2970ce6d48391b35e0027b45e5f6345adeb3670fd96eeee8281fb862104b63233810e0ca11ace2cda9f2e5527886a229b008dca889c0f75e9bc9b
-
Filesize
276KB
MD50197308140af7de39d8e0ee64e655ace
SHA133cc8bc2df16259636946a8bb5cfac4bee15ec4e
SHA25624991d1cf0996c14014b84ed4fe37f42374cc3ff6edce5b05210e5095c4fd51c
SHA5125ada182371b2970ce6d48391b35e0027b45e5f6345adeb3670fd96eeee8281fb862104b63233810e0ca11ace2cda9f2e5527886a229b008dca889c0f75e9bc9b
-
Filesize
194KB
MD51be0ef20de8deb0c852eb70b0e59de92
SHA118edc892ccc66a8646f6c06085465ddbb92f2120
SHA256145113a43efb5e030c7286f6c0263fe81a8c7e3e06a3f214d1cb50d737a84f98
SHA512a56a2464e795e62336d864adbb8599160d9141dc245c81e9da5085f046dad78c375b42b9d0264e70faa0deabced72fa6f732d0d429de59090625fe31f58c7ce3
-
Filesize
194KB
MD51be0ef20de8deb0c852eb70b0e59de92
SHA118edc892ccc66a8646f6c06085465ddbb92f2120
SHA256145113a43efb5e030c7286f6c0263fe81a8c7e3e06a3f214d1cb50d737a84f98
SHA512a56a2464e795e62336d864adbb8599160d9141dc245c81e9da5085f046dad78c375b42b9d0264e70faa0deabced72fa6f732d0d429de59090625fe31f58c7ce3
-
Filesize
145KB
MD5fc17aa76e9dcbd0f838f7569c7a19988
SHA1e2d67f67541f1cd66f4f4b668d46b4d9478c9e32
SHA2565e899beb927fe1b3ade33688b012da5e148d5ff8fba1abb36fc7cd3dce3eaf43
SHA51207966b4dc458a1b646b83393d980f7c6626ade3a6ab6bea354d6a4079895abbac77ec429b5c201ec09949bd39592a4c19382143d6f02627d49b3e81c261daef2
-
Filesize
145KB
MD5fc17aa76e9dcbd0f838f7569c7a19988
SHA1e2d67f67541f1cd66f4f4b668d46b4d9478c9e32
SHA2565e899beb927fe1b3ade33688b012da5e148d5ff8fba1abb36fc7cd3dce3eaf43
SHA51207966b4dc458a1b646b83393d980f7c6626ade3a6ab6bea354d6a4079895abbac77ec429b5c201ec09949bd39592a4c19382143d6f02627d49b3e81c261daef2
-
Filesize
96KB
MD57825cad99621dd288da81d8d8ae13cf5
SHA1f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c
SHA256529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5
SHA5122e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4
-
Filesize
96KB
MD57825cad99621dd288da81d8d8ae13cf5
SHA1f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c
SHA256529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5
SHA5122e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4
-
Filesize
96KB
MD57825cad99621dd288da81d8d8ae13cf5
SHA1f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c
SHA256529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5
SHA5122e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4