Analysis
-
max time kernel
51s -
max time network
75s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
24-05-2023 21:19
Static task
static1
Behavioral task
behavioral1
Sample
53b5a446e22fe904af6ce03fca8f2c16183325a9bab3578800cce8dd4c1c9cb2.exe
Resource
win10-20230220-en
General
-
Target
53b5a446e22fe904af6ce03fca8f2c16183325a9bab3578800cce8dd4c1c9cb2.exe
-
Size
983KB
-
MD5
28547c7f55ae431083e20ca1c4bd0c07
-
SHA1
c8574a17b1180c6e5d6b7a0413cf15f5262104b8
-
SHA256
53b5a446e22fe904af6ce03fca8f2c16183325a9bab3578800cce8dd4c1c9cb2
-
SHA512
6389d54f612d47fe56a7bdcc50f42608fc7f59526307a3c7fe39ed2d446dbb805a782e8393ed47cf88cfa2069a39f5414e3e8688e6877e8be7fe4bac1b7fa25a
-
SSDEEP
24576:6yJfg3c4bcYf4dFpPbUPldWPT8lhhfawuLAgPf1IKkYrx:Ba3rbjAFpPv8Xh4E0
Malware Config
Extracted
redline
maxi
83.97.73.122:19062
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Extracted
redline
ebal
83.97.73.122:19062
-
auth_value
adedb0785152892650ba0123aadb727d
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 5048 v9158454.exe 3560 v4430652.exe 4556 a6791490.exe 3096 b1539848.exe 4348 c4457409.exe 4420 d6226311.exe 4280 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v9158454.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v9158454.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4430652.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v4430652.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 53b5a446e22fe904af6ce03fca8f2c16183325a9bab3578800cce8dd4c1c9cb2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 53b5a446e22fe904af6ce03fca8f2c16183325a9bab3578800cce8dd4c1c9cb2.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4556 set thread context of 4748 4556 a6791490.exe 70 PID 4348 set thread context of 4972 4348 c4457409.exe 75 PID 4420 set thread context of 1740 4420 d6226311.exe 78 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4748 AppLaunch.exe 4748 AppLaunch.exe 3096 b1539848.exe 3096 b1539848.exe 1740 AppLaunch.exe 1740 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4748 AppLaunch.exe Token: SeDebugPrivilege 3096 b1539848.exe Token: SeDebugPrivilege 1740 AppLaunch.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4972 AppLaunch.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 3944 wrote to memory of 5048 3944 53b5a446e22fe904af6ce03fca8f2c16183325a9bab3578800cce8dd4c1c9cb2.exe 66 PID 3944 wrote to memory of 5048 3944 53b5a446e22fe904af6ce03fca8f2c16183325a9bab3578800cce8dd4c1c9cb2.exe 66 PID 3944 wrote to memory of 5048 3944 53b5a446e22fe904af6ce03fca8f2c16183325a9bab3578800cce8dd4c1c9cb2.exe 66 PID 5048 wrote to memory of 3560 5048 v9158454.exe 67 PID 5048 wrote to memory of 3560 5048 v9158454.exe 67 PID 5048 wrote to memory of 3560 5048 v9158454.exe 67 PID 3560 wrote to memory of 4556 3560 v4430652.exe 68 PID 3560 wrote to memory of 4556 3560 v4430652.exe 68 PID 3560 wrote to memory of 4556 3560 v4430652.exe 68 PID 4556 wrote to memory of 4748 4556 a6791490.exe 70 PID 4556 wrote to memory of 4748 4556 a6791490.exe 70 PID 4556 wrote to memory of 4748 4556 a6791490.exe 70 PID 4556 wrote to memory of 4748 4556 a6791490.exe 70 PID 4556 wrote to memory of 4748 4556 a6791490.exe 70 PID 3560 wrote to memory of 3096 3560 v4430652.exe 71 PID 3560 wrote to memory of 3096 3560 v4430652.exe 71 PID 3560 wrote to memory of 3096 3560 v4430652.exe 71 PID 5048 wrote to memory of 4348 5048 v9158454.exe 73 PID 5048 wrote to memory of 4348 5048 v9158454.exe 73 PID 5048 wrote to memory of 4348 5048 v9158454.exe 73 PID 4348 wrote to memory of 4972 4348 c4457409.exe 75 PID 4348 wrote to memory of 4972 4348 c4457409.exe 75 PID 4348 wrote to memory of 4972 4348 c4457409.exe 75 PID 4348 wrote to memory of 4972 4348 c4457409.exe 75 PID 4348 wrote to memory of 4972 4348 c4457409.exe 75 PID 3944 wrote to memory of 4420 3944 53b5a446e22fe904af6ce03fca8f2c16183325a9bab3578800cce8dd4c1c9cb2.exe 76 PID 3944 wrote to memory of 4420 3944 53b5a446e22fe904af6ce03fca8f2c16183325a9bab3578800cce8dd4c1c9cb2.exe 76 PID 3944 wrote to memory of 4420 3944 53b5a446e22fe904af6ce03fca8f2c16183325a9bab3578800cce8dd4c1c9cb2.exe 76 PID 4420 wrote to memory of 1740 4420 d6226311.exe 78 PID 4420 wrote to memory of 1740 4420 d6226311.exe 78 PID 4420 wrote to memory of 1740 4420 d6226311.exe 78 PID 4420 wrote to memory of 1740 4420 d6226311.exe 78 PID 4420 wrote to memory of 1740 4420 d6226311.exe 78 PID 4972 wrote to memory of 4280 4972 AppLaunch.exe 79 PID 4972 wrote to memory of 4280 4972 AppLaunch.exe 79 PID 4972 wrote to memory of 4280 4972 AppLaunch.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\53b5a446e22fe904af6ce03fca8f2c16183325a9bab3578800cce8dd4c1c9cb2.exe"C:\Users\Admin\AppData\Local\Temp\53b5a446e22fe904af6ce03fca8f2c16183325a9bab3578800cce8dd4c1c9cb2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9158454.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9158454.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4430652.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4430652.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6791490.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6791490.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4748
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1539848.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1539848.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3096
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c4457409.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c4457409.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"4⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"5⤵
- Executes dropped EXE
PID:4280
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6226311.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6226311.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5957779c42144282d8cd83192b8fbc7cf
SHA1de83d08d2cca06b9ff3d1ef239d6b60b705d25fe
SHA2560d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51
SHA512f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd
-
Filesize
329KB
MD52ff62f35483c62f6235a8b56708b7422
SHA1cc691b20fb56964e5d2ffaf9344ff7b00e0d3339
SHA25645e8c1b99353d1b8fde5da2a1697dbc2a92fe18383092b84ca92690a8747d4c8
SHA512db070349350c5aa4bc288087e582c4869495ac0cc9dae827659472f8436b97976b82966c443d4bbe9f8235229767166fe6d022a333466e51dcfdc94afe2ea525
-
Filesize
329KB
MD52ff62f35483c62f6235a8b56708b7422
SHA1cc691b20fb56964e5d2ffaf9344ff7b00e0d3339
SHA25645e8c1b99353d1b8fde5da2a1697dbc2a92fe18383092b84ca92690a8747d4c8
SHA512db070349350c5aa4bc288087e582c4869495ac0cc9dae827659472f8436b97976b82966c443d4bbe9f8235229767166fe6d022a333466e51dcfdc94afe2ea525
-
Filesize
662KB
MD5a3a017a7932d458a61ebccd136c6be79
SHA18b804863001a21aa0d46ee2c88b4265bd4f2d114
SHA256075950d8388cd8067d9505918bb7e1450950cf0d102cc027c024783fd419672b
SHA51219ec541da20f075ddd83654dae3d154ef3d84bb53ad7708478fa8e4f95a7684a22c9dd73d5c31f2bba4fb2a58b8fcf5ee645dbe87ae1825189e52177a11ce6b6
-
Filesize
662KB
MD5a3a017a7932d458a61ebccd136c6be79
SHA18b804863001a21aa0d46ee2c88b4265bd4f2d114
SHA256075950d8388cd8067d9505918bb7e1450950cf0d102cc027c024783fd419672b
SHA51219ec541da20f075ddd83654dae3d154ef3d84bb53ad7708478fa8e4f95a7684a22c9dd73d5c31f2bba4fb2a58b8fcf5ee645dbe87ae1825189e52177a11ce6b6
-
Filesize
388KB
MD5116289f13e8bccabaa20e0beef06ed5c
SHA1b96e85739e827e57fe7975785e56f49c2229b2e6
SHA256efaf8f82d795400aaffa6d0e8236d6b462c7d402ace0efaff78df221235ae4cf
SHA5126965cb378eaf9a4a54e4563a3e9ec0417e46407422005f33a27c12a2013da0c97be849394af280e3ee69a5e740551efbb76b5ad3e735c24bab874d70989aa808
-
Filesize
388KB
MD5116289f13e8bccabaa20e0beef06ed5c
SHA1b96e85739e827e57fe7975785e56f49c2229b2e6
SHA256efaf8f82d795400aaffa6d0e8236d6b462c7d402ace0efaff78df221235ae4cf
SHA5126965cb378eaf9a4a54e4563a3e9ec0417e46407422005f33a27c12a2013da0c97be849394af280e3ee69a5e740551efbb76b5ad3e735c24bab874d70989aa808
-
Filesize
280KB
MD552865e00b59ccc445a079177ac2c7b4d
SHA142c56f5614300bc44768f907d74feb9899fc668b
SHA25696597037c44babe5194130078d12a29405c611ebf718e87da4c9651c516df749
SHA51277c2a7db9ec61ef93b12d01177bc50938d19b57430c14d6df329e511348d7f16ae3a8f5a755151416c38bbd835e491774613728835d3f73714c541f1b9bfeca0
-
Filesize
280KB
MD552865e00b59ccc445a079177ac2c7b4d
SHA142c56f5614300bc44768f907d74feb9899fc668b
SHA25696597037c44babe5194130078d12a29405c611ebf718e87da4c9651c516df749
SHA51277c2a7db9ec61ef93b12d01177bc50938d19b57430c14d6df329e511348d7f16ae3a8f5a755151416c38bbd835e491774613728835d3f73714c541f1b9bfeca0
-
Filesize
194KB
MD575dd452a5be2c240175a4f83c4398590
SHA14f8f3ed3653e30a6bb0008bc2033bcb4012748c1
SHA256c53fd9418361cea462bc520264c4c262d96b6d6e0e28804c4fb28394c2a93294
SHA512bfd63cc70e4aa4c96ef5be777d2a63f3e24a662f537f5226c0639903f22824060732f8b7449b89307f74644d75cae7430b58ec643e34cf6b95f1bd032bfdcb28
-
Filesize
194KB
MD575dd452a5be2c240175a4f83c4398590
SHA14f8f3ed3653e30a6bb0008bc2033bcb4012748c1
SHA256c53fd9418361cea462bc520264c4c262d96b6d6e0e28804c4fb28394c2a93294
SHA512bfd63cc70e4aa4c96ef5be777d2a63f3e24a662f537f5226c0639903f22824060732f8b7449b89307f74644d75cae7430b58ec643e34cf6b95f1bd032bfdcb28
-
Filesize
145KB
MD51f387e8748827ea60763bb505f33d7e6
SHA1e97562396e544dd70bcd9d8574a600e75eb2f0bf
SHA25680bc29027d5c9126c89b21fbbe6ee1e672dfb81f37b449fe5d96f80938027959
SHA51269f57e9c836cb74f9442a27662bc233660fd3c0932b6c290f5606658bf4a8e3c94686877df31a1795c65799695d334f1861d65249548cfa9ed1566905bf193ed
-
Filesize
145KB
MD51f387e8748827ea60763bb505f33d7e6
SHA1e97562396e544dd70bcd9d8574a600e75eb2f0bf
SHA25680bc29027d5c9126c89b21fbbe6ee1e672dfb81f37b449fe5d96f80938027959
SHA51269f57e9c836cb74f9442a27662bc233660fd3c0932b6c290f5606658bf4a8e3c94686877df31a1795c65799695d334f1861d65249548cfa9ed1566905bf193ed
-
Filesize
96KB
MD57825cad99621dd288da81d8d8ae13cf5
SHA1f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c
SHA256529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5
SHA5122e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4
-
Filesize
96KB
MD57825cad99621dd288da81d8d8ae13cf5
SHA1f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c
SHA256529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5
SHA5122e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4
-
Filesize
96KB
MD57825cad99621dd288da81d8d8ae13cf5
SHA1f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c
SHA256529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5
SHA5122e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4