Analysis
-
max time kernel
55s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2023 21:06
Static task
static1
Behavioral task
behavioral1
Sample
2f5079aa5054888becc752de4faeb986c783a9aa1a93b7052ecc543f0c9d3f3b.exe
Resource
win10v2004-20230220-en
General
-
Target
2f5079aa5054888becc752de4faeb986c783a9aa1a93b7052ecc543f0c9d3f3b.exe
-
Size
984KB
-
MD5
7a09013ce9da0eaa8d2ff695d5eb1712
-
SHA1
4738060b2a93cc477778ce562ae405a337ba1f9f
-
SHA256
2f5079aa5054888becc752de4faeb986c783a9aa1a93b7052ecc543f0c9d3f3b
-
SHA512
9f54a8f2a19a21968d872a74e608101df931d79ad5345c3e3e33223242e38122db5f3d618cd1611d0cb6fe345a373d7147c7a62ce05546880ef687d6b7b17a8b
-
SSDEEP
12288:wMrDy90N2CDxwU5++9aWBHa1lLUoZK/0TsAyRWgTqxvoh/ohD8mY9+s1VKfBAuPG:jye2KNUlLUp/R9TqGyh4cZAuPfqlehS
Malware Config
Extracted
redline
diza
83.97.73.122:19062
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Extracted
redline
ebal
83.97.73.122:19062
-
auth_value
adedb0785152892650ba0123aadb727d
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 724 y5902516.exe 3340 y8025602.exe 236 k5859601.exe 2084 l1881027.exe 1484 m4095682.exe 1680 n7114440.exe 4768 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y8025602.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2f5079aa5054888becc752de4faeb986c783a9aa1a93b7052ecc543f0c9d3f3b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2f5079aa5054888becc752de4faeb986c783a9aa1a93b7052ecc543f0c9d3f3b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y5902516.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y5902516.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y8025602.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 236 set thread context of 5064 236 k5859601.exe 87 PID 1484 set thread context of 3712 1484 m4095682.exe 93 PID 1680 set thread context of 2336 1680 n7114440.exe 96 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5064 AppLaunch.exe 5064 AppLaunch.exe 2084 l1881027.exe 2084 l1881027.exe 2336 AppLaunch.exe 2336 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5064 AppLaunch.exe Token: SeDebugPrivilege 2084 l1881027.exe Token: SeDebugPrivilege 2336 AppLaunch.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3712 AppLaunch.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2804 wrote to memory of 724 2804 2f5079aa5054888becc752de4faeb986c783a9aa1a93b7052ecc543f0c9d3f3b.exe 83 PID 2804 wrote to memory of 724 2804 2f5079aa5054888becc752de4faeb986c783a9aa1a93b7052ecc543f0c9d3f3b.exe 83 PID 2804 wrote to memory of 724 2804 2f5079aa5054888becc752de4faeb986c783a9aa1a93b7052ecc543f0c9d3f3b.exe 83 PID 724 wrote to memory of 3340 724 y5902516.exe 84 PID 724 wrote to memory of 3340 724 y5902516.exe 84 PID 724 wrote to memory of 3340 724 y5902516.exe 84 PID 3340 wrote to memory of 236 3340 y8025602.exe 85 PID 3340 wrote to memory of 236 3340 y8025602.exe 85 PID 3340 wrote to memory of 236 3340 y8025602.exe 85 PID 236 wrote to memory of 5064 236 k5859601.exe 87 PID 236 wrote to memory of 5064 236 k5859601.exe 87 PID 236 wrote to memory of 5064 236 k5859601.exe 87 PID 236 wrote to memory of 5064 236 k5859601.exe 87 PID 236 wrote to memory of 5064 236 k5859601.exe 87 PID 3340 wrote to memory of 2084 3340 y8025602.exe 88 PID 3340 wrote to memory of 2084 3340 y8025602.exe 88 PID 3340 wrote to memory of 2084 3340 y8025602.exe 88 PID 724 wrote to memory of 1484 724 y5902516.exe 91 PID 724 wrote to memory of 1484 724 y5902516.exe 91 PID 724 wrote to memory of 1484 724 y5902516.exe 91 PID 1484 wrote to memory of 3712 1484 m4095682.exe 93 PID 1484 wrote to memory of 3712 1484 m4095682.exe 93 PID 1484 wrote to memory of 3712 1484 m4095682.exe 93 PID 1484 wrote to memory of 3712 1484 m4095682.exe 93 PID 1484 wrote to memory of 3712 1484 m4095682.exe 93 PID 2804 wrote to memory of 1680 2804 2f5079aa5054888becc752de4faeb986c783a9aa1a93b7052ecc543f0c9d3f3b.exe 94 PID 2804 wrote to memory of 1680 2804 2f5079aa5054888becc752de4faeb986c783a9aa1a93b7052ecc543f0c9d3f3b.exe 94 PID 2804 wrote to memory of 1680 2804 2f5079aa5054888becc752de4faeb986c783a9aa1a93b7052ecc543f0c9d3f3b.exe 94 PID 1680 wrote to memory of 2336 1680 n7114440.exe 96 PID 1680 wrote to memory of 2336 1680 n7114440.exe 96 PID 1680 wrote to memory of 2336 1680 n7114440.exe 96 PID 1680 wrote to memory of 2336 1680 n7114440.exe 96 PID 1680 wrote to memory of 2336 1680 n7114440.exe 96 PID 3712 wrote to memory of 4768 3712 AppLaunch.exe 97 PID 3712 wrote to memory of 4768 3712 AppLaunch.exe 97 PID 3712 wrote to memory of 4768 3712 AppLaunch.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f5079aa5054888becc752de4faeb986c783a9aa1a93b7052ecc543f0c9d3f3b.exe"C:\Users\Admin\AppData\Local\Temp\2f5079aa5054888becc752de4faeb986c783a9aa1a93b7052ecc543f0c9d3f3b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5902516.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5902516.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8025602.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8025602.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k5859601.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k5859601.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5064
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l1881027.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l1881027.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m4095682.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m4095682.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"4⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"5⤵
- Executes dropped EXE
PID:4768
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n7114440.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n7114440.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2336
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
328KB
MD558700b5dcdd711d17322239daceba1b2
SHA162eb93d96bf3a2d40a63e834bea214969b17a81c
SHA256ddd3e855f21e15c1fbf703518bd8c62c77c0e40a4d9edc937648d6c3c9496020
SHA5123ffbda8dcb72506aa576d0c9df8c1146fff05e74d2092497ca1b40c018579463379d13e6ae8402ac849750b871eb66d302f026224ef0cac3fc853ea2918c6541
-
Filesize
328KB
MD558700b5dcdd711d17322239daceba1b2
SHA162eb93d96bf3a2d40a63e834bea214969b17a81c
SHA256ddd3e855f21e15c1fbf703518bd8c62c77c0e40a4d9edc937648d6c3c9496020
SHA5123ffbda8dcb72506aa576d0c9df8c1146fff05e74d2092497ca1b40c018579463379d13e6ae8402ac849750b871eb66d302f026224ef0cac3fc853ea2918c6541
-
Filesize
663KB
MD55eda0b1429a2f1b3e34d53c6a8c5e5f2
SHA1045eb78b274d7df6158269b53fbe6070bbd7618d
SHA256f2642c8a3fc5c30f9fc5a37a347af3d516998048a469dc12c947de13e76c1879
SHA512954add38ac2487c202f17733b1a458f84b877a9728d7c97bb7bcb7b40d3d90e010b9eaa6f33acd42c196f1e136055c1211e74ad9bb1685b397578737b301cffc
-
Filesize
663KB
MD55eda0b1429a2f1b3e34d53c6a8c5e5f2
SHA1045eb78b274d7df6158269b53fbe6070bbd7618d
SHA256f2642c8a3fc5c30f9fc5a37a347af3d516998048a469dc12c947de13e76c1879
SHA512954add38ac2487c202f17733b1a458f84b877a9728d7c97bb7bcb7b40d3d90e010b9eaa6f33acd42c196f1e136055c1211e74ad9bb1685b397578737b301cffc
-
Filesize
388KB
MD516bc1c9e5c0bce960908f6d044918a78
SHA1abb499189787987353942bae090252023ea60089
SHA2568efd01e58400dcf4c6797c61e9d59e644dbfbe9efe52cd3cc4a5af089335967f
SHA512f0d32082f78c32aa65cf62547ca07cfde31b171ee217487e90b6baf93f259750a0166357e5ac36e0f7741bb036fc8a73cfe7a5ff865f9c8423f1ed51996b523f
-
Filesize
388KB
MD516bc1c9e5c0bce960908f6d044918a78
SHA1abb499189787987353942bae090252023ea60089
SHA2568efd01e58400dcf4c6797c61e9d59e644dbfbe9efe52cd3cc4a5af089335967f
SHA512f0d32082f78c32aa65cf62547ca07cfde31b171ee217487e90b6baf93f259750a0166357e5ac36e0f7741bb036fc8a73cfe7a5ff865f9c8423f1ed51996b523f
-
Filesize
280KB
MD5ddaede5e34a393e4a106bcaff8b54836
SHA1951e87248ca0e85727775f852cbb5b5b63b9d37b
SHA256a18f40fe5d8b693445f91609a81372d162ca618a575ad255dc1b6fbd9571369d
SHA5127a7fd36d759811fab8565ad8d2728d87cfead5f7446c01247a4e2642a81febfbfa66dd1d6ce13be37bb5b0eba85242ccb9792b3cc3d9b5fe182ccae8f2b41329
-
Filesize
280KB
MD5ddaede5e34a393e4a106bcaff8b54836
SHA1951e87248ca0e85727775f852cbb5b5b63b9d37b
SHA256a18f40fe5d8b693445f91609a81372d162ca618a575ad255dc1b6fbd9571369d
SHA5127a7fd36d759811fab8565ad8d2728d87cfead5f7446c01247a4e2642a81febfbfa66dd1d6ce13be37bb5b0eba85242ccb9792b3cc3d9b5fe182ccae8f2b41329
-
Filesize
194KB
MD5201fb27fbb399174e92f9aa2b61a1d5f
SHA12b750a545d6db17a4b5d786e4373c325d097090d
SHA25639f779bbe0ddbb2bb7684630efa46575592e589a3d66ba4ca1de4bbe66bcee65
SHA5125bfbe88ddb4859cc34b114fd06f980996f47b6048086078d323d8e3a6ab045edfb490d9cf9e8f75bda17bee9df9adae8f9c29fdac521166157cb7937f4eb3567
-
Filesize
194KB
MD5201fb27fbb399174e92f9aa2b61a1d5f
SHA12b750a545d6db17a4b5d786e4373c325d097090d
SHA25639f779bbe0ddbb2bb7684630efa46575592e589a3d66ba4ca1de4bbe66bcee65
SHA5125bfbe88ddb4859cc34b114fd06f980996f47b6048086078d323d8e3a6ab045edfb490d9cf9e8f75bda17bee9df9adae8f9c29fdac521166157cb7937f4eb3567
-
Filesize
146KB
MD5fabdf4d2e14d2eb0df5743a1d8aba7a9
SHA186ebbfb8770da9a599b75cdb3ab47767923a5eb7
SHA256165adbd3a6210b58eabd70d8abbfa6f4b7e486e246cac7a13dc5d3f48e573d3e
SHA512d882859ebf0dde39292c491a65820b5d837a51b165a418774a026619afa2521172a4443735cfeec7f8b4a1f76737c1f9dbec058178fb9e730df91dae9fc92a86
-
Filesize
146KB
MD5fabdf4d2e14d2eb0df5743a1d8aba7a9
SHA186ebbfb8770da9a599b75cdb3ab47767923a5eb7
SHA256165adbd3a6210b58eabd70d8abbfa6f4b7e486e246cac7a13dc5d3f48e573d3e
SHA512d882859ebf0dde39292c491a65820b5d837a51b165a418774a026619afa2521172a4443735cfeec7f8b4a1f76737c1f9dbec058178fb9e730df91dae9fc92a86
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc