Analysis
-
max time kernel
53s -
max time network
66s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
24/05/2023, 20:40
Static task
static1
Behavioral task
behavioral1
Sample
8f9798e96fc468fb5b5b21a58ce3d46d49a716f5390b46ac37c5a32e31befcc8.exe
Resource
win10-20230220-en
General
-
Target
8f9798e96fc468fb5b5b21a58ce3d46d49a716f5390b46ac37c5a32e31befcc8.exe
-
Size
983KB
-
MD5
ddbbdc58fe6c72266416fda891a4b3db
-
SHA1
84f542daff89c1d3c73bd58aa4afc521e8442a48
-
SHA256
8f9798e96fc468fb5b5b21a58ce3d46d49a716f5390b46ac37c5a32e31befcc8
-
SHA512
373adbd2af4b2abf514a3505cfef7044990a0036b207cbc0ebd5ca26f61776d20f24597af2022c1bd9ce250ccaeb7932405dfb55f08dc9e9844d449e17be9cdc
-
SSDEEP
24576:fy30B6dpVdgpiTXVshZvgGLAmPfPwDMC4d31R:qkBizgEXuhZvX/PC4dl
Malware Config
Extracted
redline
maxi
83.97.73.122:19062
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Extracted
redline
ebal
83.97.73.122:19062
-
auth_value
adedb0785152892650ba0123aadb727d
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2516 v0970371.exe 2872 v4688217.exe 4100 a7538723.exe 4148 b5253179.exe 4552 c5217362.exe 5088 d2936843.exe 3344 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8f9798e96fc468fb5b5b21a58ce3d46d49a716f5390b46ac37c5a32e31befcc8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8f9798e96fc468fb5b5b21a58ce3d46d49a716f5390b46ac37c5a32e31befcc8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0970371.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v0970371.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4688217.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v4688217.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4100 set thread context of 4488 4100 a7538723.exe 70 PID 4552 set thread context of 5068 4552 c5217362.exe 75 PID 5088 set thread context of 4604 5088 d2936843.exe 78 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4488 AppLaunch.exe 4488 AppLaunch.exe 4148 b5253179.exe 4148 b5253179.exe 4604 AppLaunch.exe 4604 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4488 AppLaunch.exe Token: SeDebugPrivilege 4148 b5253179.exe Token: SeDebugPrivilege 4604 AppLaunch.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2516 2460 8f9798e96fc468fb5b5b21a58ce3d46d49a716f5390b46ac37c5a32e31befcc8.exe 66 PID 2460 wrote to memory of 2516 2460 8f9798e96fc468fb5b5b21a58ce3d46d49a716f5390b46ac37c5a32e31befcc8.exe 66 PID 2460 wrote to memory of 2516 2460 8f9798e96fc468fb5b5b21a58ce3d46d49a716f5390b46ac37c5a32e31befcc8.exe 66 PID 2516 wrote to memory of 2872 2516 v0970371.exe 67 PID 2516 wrote to memory of 2872 2516 v0970371.exe 67 PID 2516 wrote to memory of 2872 2516 v0970371.exe 67 PID 2872 wrote to memory of 4100 2872 v4688217.exe 68 PID 2872 wrote to memory of 4100 2872 v4688217.exe 68 PID 2872 wrote to memory of 4100 2872 v4688217.exe 68 PID 4100 wrote to memory of 4488 4100 a7538723.exe 70 PID 4100 wrote to memory of 4488 4100 a7538723.exe 70 PID 4100 wrote to memory of 4488 4100 a7538723.exe 70 PID 4100 wrote to memory of 4488 4100 a7538723.exe 70 PID 4100 wrote to memory of 4488 4100 a7538723.exe 70 PID 2872 wrote to memory of 4148 2872 v4688217.exe 71 PID 2872 wrote to memory of 4148 2872 v4688217.exe 71 PID 2872 wrote to memory of 4148 2872 v4688217.exe 71 PID 2516 wrote to memory of 4552 2516 v0970371.exe 73 PID 2516 wrote to memory of 4552 2516 v0970371.exe 73 PID 2516 wrote to memory of 4552 2516 v0970371.exe 73 PID 4552 wrote to memory of 5068 4552 c5217362.exe 75 PID 4552 wrote to memory of 5068 4552 c5217362.exe 75 PID 4552 wrote to memory of 5068 4552 c5217362.exe 75 PID 4552 wrote to memory of 5068 4552 c5217362.exe 75 PID 4552 wrote to memory of 5068 4552 c5217362.exe 75 PID 2460 wrote to memory of 5088 2460 8f9798e96fc468fb5b5b21a58ce3d46d49a716f5390b46ac37c5a32e31befcc8.exe 76 PID 2460 wrote to memory of 5088 2460 8f9798e96fc468fb5b5b21a58ce3d46d49a716f5390b46ac37c5a32e31befcc8.exe 76 PID 2460 wrote to memory of 5088 2460 8f9798e96fc468fb5b5b21a58ce3d46d49a716f5390b46ac37c5a32e31befcc8.exe 76 PID 5088 wrote to memory of 4604 5088 d2936843.exe 78 PID 5088 wrote to memory of 4604 5088 d2936843.exe 78 PID 5088 wrote to memory of 4604 5088 d2936843.exe 78 PID 5088 wrote to memory of 4604 5088 d2936843.exe 78 PID 5088 wrote to memory of 4604 5088 d2936843.exe 78 PID 5068 wrote to memory of 3344 5068 AppLaunch.exe 79 PID 5068 wrote to memory of 3344 5068 AppLaunch.exe 79 PID 5068 wrote to memory of 3344 5068 AppLaunch.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f9798e96fc468fb5b5b21a58ce3d46d49a716f5390b46ac37c5a32e31befcc8.exe"C:\Users\Admin\AppData\Local\Temp\8f9798e96fc468fb5b5b21a58ce3d46d49a716f5390b46ac37c5a32e31befcc8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0970371.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0970371.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4688217.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4688217.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7538723.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7538723.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4488
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5253179.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5253179.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4148
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5217362.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5217362.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"5⤵
- Executes dropped EXE
PID:3344
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2936843.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2936843.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4604
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5957779c42144282d8cd83192b8fbc7cf
SHA1de83d08d2cca06b9ff3d1ef239d6b60b705d25fe
SHA2560d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51
SHA512f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd
-
Filesize
329KB
MD501d8de68dc93b39db0543e2c04178b24
SHA183ca8e285c1a5d73f9deb4b993a20ece314906f4
SHA256e406ec39d0a0ece2ba3645dde890b84e8a38d30b167388ef2a7d5e7eab5e7785
SHA512103e15e6f1403495f44a02459942ed8f4227f92da29813882b42f0b524bdb2a62542ef2b5a88f071bbfb3da4986a95fb70e586955bd5021124faee0322f509a6
-
Filesize
329KB
MD501d8de68dc93b39db0543e2c04178b24
SHA183ca8e285c1a5d73f9deb4b993a20ece314906f4
SHA256e406ec39d0a0ece2ba3645dde890b84e8a38d30b167388ef2a7d5e7eab5e7785
SHA512103e15e6f1403495f44a02459942ed8f4227f92da29813882b42f0b524bdb2a62542ef2b5a88f071bbfb3da4986a95fb70e586955bd5021124faee0322f509a6
-
Filesize
662KB
MD541a205ccb00723ec150da515ac0a5636
SHA100bc529c3b6e88663d3761273ea31a688a0d31e7
SHA2568bedaa830f1bb153d049c38d846a27f88d09e7f1aecabc0f6b82e42302037d19
SHA512f146def057c3138d730070ec947705d9a81d39cbb1176100686d56f2ab83ca26e0642886954ed61e3dafe0c9db951e4e837bfd2d22605a10d5adedc28ae5a83b
-
Filesize
662KB
MD541a205ccb00723ec150da515ac0a5636
SHA100bc529c3b6e88663d3761273ea31a688a0d31e7
SHA2568bedaa830f1bb153d049c38d846a27f88d09e7f1aecabc0f6b82e42302037d19
SHA512f146def057c3138d730070ec947705d9a81d39cbb1176100686d56f2ab83ca26e0642886954ed61e3dafe0c9db951e4e837bfd2d22605a10d5adedc28ae5a83b
-
Filesize
388KB
MD560db716b1e412fd33ecb8c7d3c82c13d
SHA179834dc25e39442a6d2e5c4c11b755bae3c784ca
SHA2561a3c897bc75535178e5b3a78b9384818493d5d2e681ffafd7ded5ab16fe5773f
SHA512ff0c764ee93616e3907e54d913b834b0e7495ea5908fc7cb6c60a8d28414bb5cb6d828d486b02485819cc8d10dd1d0f29d3f2f90259921d1550bdaa562f388f8
-
Filesize
388KB
MD560db716b1e412fd33ecb8c7d3c82c13d
SHA179834dc25e39442a6d2e5c4c11b755bae3c784ca
SHA2561a3c897bc75535178e5b3a78b9384818493d5d2e681ffafd7ded5ab16fe5773f
SHA512ff0c764ee93616e3907e54d913b834b0e7495ea5908fc7cb6c60a8d28414bb5cb6d828d486b02485819cc8d10dd1d0f29d3f2f90259921d1550bdaa562f388f8
-
Filesize
280KB
MD5ee722c1519c9d4765033111a12387e6c
SHA1a87512bf8adf8627cb0e81d2cc7b2afbec65a564
SHA256024cdc51b0de8e07fb4d54c790f51355257b7f6c341190f3eae51f0c8138968c
SHA5124345922b311675ce3c1e8e086b343110d4b16a35b459b977a32aa3467833178ff666aadeb96cb453686bc6b87ce9f13c33e66cab01b63dbcc8c247f601b78e0f
-
Filesize
280KB
MD5ee722c1519c9d4765033111a12387e6c
SHA1a87512bf8adf8627cb0e81d2cc7b2afbec65a564
SHA256024cdc51b0de8e07fb4d54c790f51355257b7f6c341190f3eae51f0c8138968c
SHA5124345922b311675ce3c1e8e086b343110d4b16a35b459b977a32aa3467833178ff666aadeb96cb453686bc6b87ce9f13c33e66cab01b63dbcc8c247f601b78e0f
-
Filesize
194KB
MD5b9dafdb4bc1bbd422684c8a6c50624d0
SHA185b811fe1900a31ee95f5140ab673401e661ce0c
SHA25665e367481112e6d76b2fd02cae8dca52fbba99d8debf021b6a3628496b0ab5fb
SHA51297fa9478518cc86eadb8a4b0bb8772e3b90b4ba4f6e4e3195564f21a1ca4f638b6b7fa569454a59993c9cfe8fadee5b71763b4f73d1e7ddef4551093e7dab479
-
Filesize
194KB
MD5b9dafdb4bc1bbd422684c8a6c50624d0
SHA185b811fe1900a31ee95f5140ab673401e661ce0c
SHA25665e367481112e6d76b2fd02cae8dca52fbba99d8debf021b6a3628496b0ab5fb
SHA51297fa9478518cc86eadb8a4b0bb8772e3b90b4ba4f6e4e3195564f21a1ca4f638b6b7fa569454a59993c9cfe8fadee5b71763b4f73d1e7ddef4551093e7dab479
-
Filesize
145KB
MD5f11d820105c077f31fd4b9c8571b30bd
SHA173bf50338e1b9c13b8b4cf56db515287184cd0e2
SHA256f0183ba98229196c8ca90df31792a99db5bcfce90b32dfe9a98b49cad7cd096e
SHA512b04b89dd6581401283ae0498473228ebcad3f15e90581d3d2c9218857ede7347363bb1a00f27a805868f962c90f737bb87bd55873f3c7892c403c65766411d13
-
Filesize
145KB
MD5f11d820105c077f31fd4b9c8571b30bd
SHA173bf50338e1b9c13b8b4cf56db515287184cd0e2
SHA256f0183ba98229196c8ca90df31792a99db5bcfce90b32dfe9a98b49cad7cd096e
SHA512b04b89dd6581401283ae0498473228ebcad3f15e90581d3d2c9218857ede7347363bb1a00f27a805868f962c90f737bb87bd55873f3c7892c403c65766411d13
-
Filesize
96KB
MD57825cad99621dd288da81d8d8ae13cf5
SHA1f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c
SHA256529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5
SHA5122e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4
-
Filesize
96KB
MD57825cad99621dd288da81d8d8ae13cf5
SHA1f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c
SHA256529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5
SHA5122e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4
-
Filesize
96KB
MD57825cad99621dd288da81d8d8ae13cf5
SHA1f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c
SHA256529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5
SHA5122e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4