Analysis
-
max time kernel
54s -
max time network
74s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
25-05-2023 00:54
Static task
static1
Behavioral task
behavioral1
Sample
db85964a0c20651c3f6d3cee4f57b01bb7f4f9f7fafa977cc0d47627a74cf012.exe
Resource
win10-20230220-en
General
-
Target
db85964a0c20651c3f6d3cee4f57b01bb7f4f9f7fafa977cc0d47627a74cf012.exe
-
Size
981KB
-
MD5
f0f40c086b48c00f3ddfbf01d28ff369
-
SHA1
8df936485e546b509656c299a970fc58807ce5c4
-
SHA256
db85964a0c20651c3f6d3cee4f57b01bb7f4f9f7fafa977cc0d47627a74cf012
-
SHA512
7472fb1a07f4e2dbf48025074ce64ee9270f03acc6cc033c1266c7c51a0d4cb00aad866bb1a0cb556f949f98c602d01a72f55f39799479b9341b3c70aee64587
-
SSDEEP
24576:cym/cShyrBi1xlDUAy9TGUMhfZaFx9FykftwL:Lk/OI/DUnGphf4xW
Malware Config
Extracted
redline
diza
83.97.73.122:19062
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Extracted
redline
haval
83.97.73.122:19062
-
auth_value
d23dec6813deb04eb8abd82657a9b0af
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 5064 x0009845.exe 968 x8932429.exe 4060 f5306557.exe 3552 g6796727.exe 4864 h3463385.exe 4804 i4809762.exe 3036 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" db85964a0c20651c3f6d3cee4f57b01bb7f4f9f7fafa977cc0d47627a74cf012.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x0009845.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x0009845.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x8932429.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x8932429.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce db85964a0c20651c3f6d3cee4f57b01bb7f4f9f7fafa977cc0d47627a74cf012.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3552 set thread context of 4812 3552 g6796727.exe 72 PID 4864 set thread context of 1204 4864 h3463385.exe 75 PID 4804 set thread context of 4492 4804 i4809762.exe 78 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4060 f5306557.exe 4060 f5306557.exe 4812 AppLaunch.exe 4812 AppLaunch.exe 4492 AppLaunch.exe 4492 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4060 f5306557.exe Token: SeDebugPrivilege 4812 AppLaunch.exe Token: SeDebugPrivilege 4492 AppLaunch.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1204 AppLaunch.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4640 wrote to memory of 5064 4640 db85964a0c20651c3f6d3cee4f57b01bb7f4f9f7fafa977cc0d47627a74cf012.exe 66 PID 4640 wrote to memory of 5064 4640 db85964a0c20651c3f6d3cee4f57b01bb7f4f9f7fafa977cc0d47627a74cf012.exe 66 PID 4640 wrote to memory of 5064 4640 db85964a0c20651c3f6d3cee4f57b01bb7f4f9f7fafa977cc0d47627a74cf012.exe 66 PID 5064 wrote to memory of 968 5064 x0009845.exe 67 PID 5064 wrote to memory of 968 5064 x0009845.exe 67 PID 5064 wrote to memory of 968 5064 x0009845.exe 67 PID 968 wrote to memory of 4060 968 x8932429.exe 68 PID 968 wrote to memory of 4060 968 x8932429.exe 68 PID 968 wrote to memory of 4060 968 x8932429.exe 68 PID 968 wrote to memory of 3552 968 x8932429.exe 70 PID 968 wrote to memory of 3552 968 x8932429.exe 70 PID 968 wrote to memory of 3552 968 x8932429.exe 70 PID 3552 wrote to memory of 4812 3552 g6796727.exe 72 PID 3552 wrote to memory of 4812 3552 g6796727.exe 72 PID 3552 wrote to memory of 4812 3552 g6796727.exe 72 PID 3552 wrote to memory of 4812 3552 g6796727.exe 72 PID 3552 wrote to memory of 4812 3552 g6796727.exe 72 PID 5064 wrote to memory of 4864 5064 x0009845.exe 73 PID 5064 wrote to memory of 4864 5064 x0009845.exe 73 PID 5064 wrote to memory of 4864 5064 x0009845.exe 73 PID 4864 wrote to memory of 1204 4864 h3463385.exe 75 PID 4864 wrote to memory of 1204 4864 h3463385.exe 75 PID 4864 wrote to memory of 1204 4864 h3463385.exe 75 PID 4864 wrote to memory of 1204 4864 h3463385.exe 75 PID 4864 wrote to memory of 1204 4864 h3463385.exe 75 PID 4640 wrote to memory of 4804 4640 db85964a0c20651c3f6d3cee4f57b01bb7f4f9f7fafa977cc0d47627a74cf012.exe 76 PID 4640 wrote to memory of 4804 4640 db85964a0c20651c3f6d3cee4f57b01bb7f4f9f7fafa977cc0d47627a74cf012.exe 76 PID 4640 wrote to memory of 4804 4640 db85964a0c20651c3f6d3cee4f57b01bb7f4f9f7fafa977cc0d47627a74cf012.exe 76 PID 4804 wrote to memory of 4492 4804 i4809762.exe 78 PID 4804 wrote to memory of 4492 4804 i4809762.exe 78 PID 4804 wrote to memory of 4492 4804 i4809762.exe 78 PID 4804 wrote to memory of 4492 4804 i4809762.exe 78 PID 4804 wrote to memory of 4492 4804 i4809762.exe 78 PID 1204 wrote to memory of 3036 1204 AppLaunch.exe 79 PID 1204 wrote to memory of 3036 1204 AppLaunch.exe 79 PID 1204 wrote to memory of 3036 1204 AppLaunch.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\db85964a0c20651c3f6d3cee4f57b01bb7f4f9f7fafa977cc0d47627a74cf012.exe"C:\Users\Admin\AppData\Local\Temp\db85964a0c20651c3f6d3cee4f57b01bb7f4f9f7fafa977cc0d47627a74cf012.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0009845.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0009845.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8932429.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8932429.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f5306557.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f5306557.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4060
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6796727.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6796727.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3463385.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3463385.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"4⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"5⤵
- Executes dropped EXE
PID:3036
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4809762.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4809762.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4492
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5957779c42144282d8cd83192b8fbc7cf
SHA1de83d08d2cca06b9ff3d1ef239d6b60b705d25fe
SHA2560d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51
SHA512f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd
-
Filesize
328KB
MD55743c3f34dc0f2cd42ad94b1167584e8
SHA17adfa35c0685ec7b144a186667b5ec080b2b7b04
SHA256ec52c1dc9767cbea2be759deb224f2602ebe1ec3a67e8a7d63d7af040062356b
SHA512394dc160bf2724f1a622ef0b9a2e82e5dc3b0a7f1d73e5a666c7c0f7a22fb7c3f1c4ee0a4707a05130f01c892091ef9115d78318b7d0f35916dd074d9b89f95c
-
Filesize
328KB
MD55743c3f34dc0f2cd42ad94b1167584e8
SHA17adfa35c0685ec7b144a186667b5ec080b2b7b04
SHA256ec52c1dc9767cbea2be759deb224f2602ebe1ec3a67e8a7d63d7af040062356b
SHA512394dc160bf2724f1a622ef0b9a2e82e5dc3b0a7f1d73e5a666c7c0f7a22fb7c3f1c4ee0a4707a05130f01c892091ef9115d78318b7d0f35916dd074d9b89f95c
-
Filesize
661KB
MD524c33a8e07c770c29e2d42730476601e
SHA153a61b02599ccac5b4fd4b08d96f0921b134ce8d
SHA256cf77228938bdc7c81453cc4f8d2681dbdd9698f59d4c9a0fb913e9a5745fce9c
SHA5127434708dd05c84c01fd2e989989376152ed51f567a6fb745d64588cb4e461cb2312dc31727e6e8aac89d3029521b800a36d0890f257e3a8bc8ffff6e637d9604
-
Filesize
661KB
MD524c33a8e07c770c29e2d42730476601e
SHA153a61b02599ccac5b4fd4b08d96f0921b134ce8d
SHA256cf77228938bdc7c81453cc4f8d2681dbdd9698f59d4c9a0fb913e9a5745fce9c
SHA5127434708dd05c84c01fd2e989989376152ed51f567a6fb745d64588cb4e461cb2312dc31727e6e8aac89d3029521b800a36d0890f257e3a8bc8ffff6e637d9604
-
Filesize
387KB
MD578f1ef5eee69fa43e105cae3cdf96542
SHA1600d3fe55aa0f279d0044f597fcdf79c26b9c26d
SHA256a6ace47a07c170d01695ed5cf443737ef9091856bf82d5a44160efb7e5220174
SHA5125c6d77b748acb09f3e5f58987fdfd9d58bab48d37e1bc2e056d4cfc3a30c09580397d7f3789dea1d6f294a46a3f826bd5158925b1e8a37d9855669df34723762
-
Filesize
387KB
MD578f1ef5eee69fa43e105cae3cdf96542
SHA1600d3fe55aa0f279d0044f597fcdf79c26b9c26d
SHA256a6ace47a07c170d01695ed5cf443737ef9091856bf82d5a44160efb7e5220174
SHA5125c6d77b748acb09f3e5f58987fdfd9d58bab48d37e1bc2e056d4cfc3a30c09580397d7f3789dea1d6f294a46a3f826bd5158925b1e8a37d9855669df34723762
-
Filesize
280KB
MD58b2f9a7e766ed28d1a8854cc035773bf
SHA1210970cb50bd02f2b63c9ea283b3e67c5fa72f93
SHA256aa2c1004c5d9668fe9f9d16d04c1bf19c047f792032223a000d6c71e2f1b8872
SHA5124fce2e212df590e3aa9d3a6fecf07d886c76c67371c57b084d5ddbb7ca561da26c19373061d524f698fd52992df05850fe1bc352db7cf36850f4e7764aecc8d5
-
Filesize
280KB
MD58b2f9a7e766ed28d1a8854cc035773bf
SHA1210970cb50bd02f2b63c9ea283b3e67c5fa72f93
SHA256aa2c1004c5d9668fe9f9d16d04c1bf19c047f792032223a000d6c71e2f1b8872
SHA5124fce2e212df590e3aa9d3a6fecf07d886c76c67371c57b084d5ddbb7ca561da26c19373061d524f698fd52992df05850fe1bc352db7cf36850f4e7764aecc8d5
-
Filesize
146KB
MD54433090662a8f4575567db3837da12b0
SHA17144b4ead4a87b53b9126aab1d45b453b249c1cd
SHA2562eb3fbb8c7b93661bcbecbba7524e3179a5c0218607fded6f5bea5aa2cbf8275
SHA5123d4e41f679257caadad891fd8be10260e35b0e115af63accd83b65637f2bc3e756e6a0faa1c67b80e6b1c4dc7d165587d91b245eab14f425c5c39b069bbcc0b4
-
Filesize
146KB
MD54433090662a8f4575567db3837da12b0
SHA17144b4ead4a87b53b9126aab1d45b453b249c1cd
SHA2562eb3fbb8c7b93661bcbecbba7524e3179a5c0218607fded6f5bea5aa2cbf8275
SHA5123d4e41f679257caadad891fd8be10260e35b0e115af63accd83b65637f2bc3e756e6a0faa1c67b80e6b1c4dc7d165587d91b245eab14f425c5c39b069bbcc0b4
-
Filesize
194KB
MD5086deba0ff5ecacd20120f09163e999e
SHA174d9dc462d877b4bdc9d1a9511fb7c4f2a2361fb
SHA2561909e26484c64714ff509082e33669ec2d610c73d7de3c80690f45e82d272e36
SHA5125b01724764fbd73c0779fc1b741800875f0f0cade0d2b18839d70ad49e5cc841c0505988ddcbf32e0271c0a17daa33749300c62b76fc8116f419c6b13741a84d
-
Filesize
194KB
MD5086deba0ff5ecacd20120f09163e999e
SHA174d9dc462d877b4bdc9d1a9511fb7c4f2a2361fb
SHA2561909e26484c64714ff509082e33669ec2d610c73d7de3c80690f45e82d272e36
SHA5125b01724764fbd73c0779fc1b741800875f0f0cade0d2b18839d70ad49e5cc841c0505988ddcbf32e0271c0a17daa33749300c62b76fc8116f419c6b13741a84d
-
Filesize
96KB
MD57825cad99621dd288da81d8d8ae13cf5
SHA1f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c
SHA256529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5
SHA5122e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4
-
Filesize
96KB
MD57825cad99621dd288da81d8d8ae13cf5
SHA1f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c
SHA256529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5
SHA5122e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4
-
Filesize
96KB
MD57825cad99621dd288da81d8d8ae13cf5
SHA1f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c
SHA256529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5
SHA5122e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4