Analysis
-
max time kernel
49s -
max time network
56s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
25-05-2023 01:33
Static task
static1
Behavioral task
behavioral1
Sample
84c5862f16628c85a4618e5b8deea0f7dde70498589803e9bfaf9c35cd7c8d47.exe
Resource
win10-20230220-en
General
-
Target
84c5862f16628c85a4618e5b8deea0f7dde70498589803e9bfaf9c35cd7c8d47.exe
-
Size
982KB
-
MD5
e0d1dce047e5d786a0c3b1792e0c132c
-
SHA1
871efdab8717cb6ff59bdd82804731b96d113965
-
SHA256
84c5862f16628c85a4618e5b8deea0f7dde70498589803e9bfaf9c35cd7c8d47
-
SHA512
5a216282331f45e314ec3bc16152e8a78c3251428d47f406c28157af4f0c2bdd1385b63299b39950d9d59f40e592ec9045538a916d4930982e9a1796ed38c297
-
SSDEEP
24576:ry9MbiznEd/93kFrDlxVbjTAkBhydMAtuLFDkfJ2/5:e9g0+/JkFrDHVrAahqdEt9
Malware Config
Extracted
redline
maxi
83.97.73.122:19062
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Extracted
redline
haval
83.97.73.122:19062
-
auth_value
d23dec6813deb04eb8abd82657a9b0af
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2328 v3346391.exe 2572 v3506623.exe 2636 a4877897.exe 1452 b7716794.exe 1780 c3352793.exe 4748 d5288523.exe 392 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 84c5862f16628c85a4618e5b8deea0f7dde70498589803e9bfaf9c35cd7c8d47.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 84c5862f16628c85a4618e5b8deea0f7dde70498589803e9bfaf9c35cd7c8d47.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3346391.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3346391.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3506623.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v3506623.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2636 set thread context of 4980 2636 a4877897.exe 70 PID 1780 set thread context of 1296 1780 c3352793.exe 75 PID 4748 set thread context of 4904 4748 d5288523.exe 78 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4980 AppLaunch.exe 4980 AppLaunch.exe 1452 b7716794.exe 1452 b7716794.exe 4904 AppLaunch.exe 4904 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4980 AppLaunch.exe Token: SeDebugPrivilege 1452 b7716794.exe Token: SeDebugPrivilege 4904 AppLaunch.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1296 AppLaunch.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2328 2076 84c5862f16628c85a4618e5b8deea0f7dde70498589803e9bfaf9c35cd7c8d47.exe 66 PID 2076 wrote to memory of 2328 2076 84c5862f16628c85a4618e5b8deea0f7dde70498589803e9bfaf9c35cd7c8d47.exe 66 PID 2076 wrote to memory of 2328 2076 84c5862f16628c85a4618e5b8deea0f7dde70498589803e9bfaf9c35cd7c8d47.exe 66 PID 2328 wrote to memory of 2572 2328 v3346391.exe 67 PID 2328 wrote to memory of 2572 2328 v3346391.exe 67 PID 2328 wrote to memory of 2572 2328 v3346391.exe 67 PID 2572 wrote to memory of 2636 2572 v3506623.exe 68 PID 2572 wrote to memory of 2636 2572 v3506623.exe 68 PID 2572 wrote to memory of 2636 2572 v3506623.exe 68 PID 2636 wrote to memory of 4980 2636 a4877897.exe 70 PID 2636 wrote to memory of 4980 2636 a4877897.exe 70 PID 2636 wrote to memory of 4980 2636 a4877897.exe 70 PID 2636 wrote to memory of 4980 2636 a4877897.exe 70 PID 2636 wrote to memory of 4980 2636 a4877897.exe 70 PID 2572 wrote to memory of 1452 2572 v3506623.exe 71 PID 2572 wrote to memory of 1452 2572 v3506623.exe 71 PID 2572 wrote to memory of 1452 2572 v3506623.exe 71 PID 2328 wrote to memory of 1780 2328 v3346391.exe 73 PID 2328 wrote to memory of 1780 2328 v3346391.exe 73 PID 2328 wrote to memory of 1780 2328 v3346391.exe 73 PID 1780 wrote to memory of 1296 1780 c3352793.exe 75 PID 1780 wrote to memory of 1296 1780 c3352793.exe 75 PID 1780 wrote to memory of 1296 1780 c3352793.exe 75 PID 1780 wrote to memory of 1296 1780 c3352793.exe 75 PID 1780 wrote to memory of 1296 1780 c3352793.exe 75 PID 2076 wrote to memory of 4748 2076 84c5862f16628c85a4618e5b8deea0f7dde70498589803e9bfaf9c35cd7c8d47.exe 76 PID 2076 wrote to memory of 4748 2076 84c5862f16628c85a4618e5b8deea0f7dde70498589803e9bfaf9c35cd7c8d47.exe 76 PID 2076 wrote to memory of 4748 2076 84c5862f16628c85a4618e5b8deea0f7dde70498589803e9bfaf9c35cd7c8d47.exe 76 PID 4748 wrote to memory of 4904 4748 d5288523.exe 78 PID 4748 wrote to memory of 4904 4748 d5288523.exe 78 PID 4748 wrote to memory of 4904 4748 d5288523.exe 78 PID 4748 wrote to memory of 4904 4748 d5288523.exe 78 PID 4748 wrote to memory of 4904 4748 d5288523.exe 78 PID 1296 wrote to memory of 392 1296 AppLaunch.exe 79 PID 1296 wrote to memory of 392 1296 AppLaunch.exe 79 PID 1296 wrote to memory of 392 1296 AppLaunch.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\84c5862f16628c85a4618e5b8deea0f7dde70498589803e9bfaf9c35cd7c8d47.exe"C:\Users\Admin\AppData\Local\Temp\84c5862f16628c85a4618e5b8deea0f7dde70498589803e9bfaf9c35cd7c8d47.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3346391.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3346391.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3506623.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3506623.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4877897.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4877897.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7716794.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7716794.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1452
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3352793.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3352793.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"4⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"5⤵
- Executes dropped EXE
PID:392
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5288523.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5288523.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4904
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5957779c42144282d8cd83192b8fbc7cf
SHA1de83d08d2cca06b9ff3d1ef239d6b60b705d25fe
SHA2560d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51
SHA512f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd
-
Filesize
328KB
MD58d1a701393c04ba5348bb0df46235e93
SHA1829f408877feb6d7ce7d0e985e2cc25ec461cbe2
SHA256218dab9be2b7a2127fc91f6a45651bb5fe394397654b112ddaeecae09a2505d7
SHA51220b2f9fe6a331dcaef2944acb51da1545539edc2beeb59c2175d351fe987bfd2fb1b6b1189215d99de5b11ad270d3bb85cd595a20cfa4c679de517f851ce6287
-
Filesize
328KB
MD58d1a701393c04ba5348bb0df46235e93
SHA1829f408877feb6d7ce7d0e985e2cc25ec461cbe2
SHA256218dab9be2b7a2127fc91f6a45651bb5fe394397654b112ddaeecae09a2505d7
SHA51220b2f9fe6a331dcaef2944acb51da1545539edc2beeb59c2175d351fe987bfd2fb1b6b1189215d99de5b11ad270d3bb85cd595a20cfa4c679de517f851ce6287
-
Filesize
661KB
MD5863787165bac02e9209eb3dd2d407ba6
SHA1439667ce1225f156e0e88054d4be7375019c3871
SHA256e5d1158eaeb39eb8266672f089c93e8d461ae43d47c49cca61547857dc1bd08b
SHA512393c823461d66c52ddd5395380532e694bd65e5185fa62e44342a8ee3777885639f4802da82c8861bdef4d528a0e23ac12fcc653665493d1dfcd61ee19b8ef0b
-
Filesize
661KB
MD5863787165bac02e9209eb3dd2d407ba6
SHA1439667ce1225f156e0e88054d4be7375019c3871
SHA256e5d1158eaeb39eb8266672f089c93e8d461ae43d47c49cca61547857dc1bd08b
SHA512393c823461d66c52ddd5395380532e694bd65e5185fa62e44342a8ee3777885639f4802da82c8861bdef4d528a0e23ac12fcc653665493d1dfcd61ee19b8ef0b
-
Filesize
388KB
MD59b689109f51fd2247b0e6971cf59505a
SHA1e2afef32a404b7311349784f561047bd0bd6be7b
SHA256cfa154865d2db3954e79b73b2bf599c38bb1a6e09c22b5d92d76c076a23e7afb
SHA51273e9a0cc19250fd60556be809a2c662c30ab94d7ef4a950a3dd372f798c09c94ddb8d89511209ea4853dad6f7386728a667f890e3263ff6bd33075e12ae647f5
-
Filesize
388KB
MD59b689109f51fd2247b0e6971cf59505a
SHA1e2afef32a404b7311349784f561047bd0bd6be7b
SHA256cfa154865d2db3954e79b73b2bf599c38bb1a6e09c22b5d92d76c076a23e7afb
SHA51273e9a0cc19250fd60556be809a2c662c30ab94d7ef4a950a3dd372f798c09c94ddb8d89511209ea4853dad6f7386728a667f890e3263ff6bd33075e12ae647f5
-
Filesize
280KB
MD5684e88c4d04e9e23605ade095345fa7f
SHA167889c8c2bcb63d2013e3594f210b3978d6c6d7a
SHA25621f1b4bbbb0ee56d52b34df37170765bd4330444825a56123e0d331ad058a80b
SHA512de2832f4206410b15a601b54ba08ac5a84e84858b108dd650c6c352de6a2c2450892901c81af7f84a19624d9554f454ac80d01b362c0d124f83e4f2031437b93
-
Filesize
280KB
MD5684e88c4d04e9e23605ade095345fa7f
SHA167889c8c2bcb63d2013e3594f210b3978d6c6d7a
SHA25621f1b4bbbb0ee56d52b34df37170765bd4330444825a56123e0d331ad058a80b
SHA512de2832f4206410b15a601b54ba08ac5a84e84858b108dd650c6c352de6a2c2450892901c81af7f84a19624d9554f454ac80d01b362c0d124f83e4f2031437b93
-
Filesize
194KB
MD58e6184575f76746c48f6abedd1a78afe
SHA1c8d3821a0c3c168265c8b4bb7969067aaa5d72bb
SHA2563302c1bd1ee250f70bbe9edfd0c326a8cf784d980c6d08d1c0aa6d6e0ef4c1ba
SHA512be1f40f88d5d4a28b777f9a4cec6eb38a1b554e008842e68afeea7885971b623f4bd7c6655395f416085b69e301b7b616d216232d3a75b9001a23dcce3e4ca57
-
Filesize
194KB
MD58e6184575f76746c48f6abedd1a78afe
SHA1c8d3821a0c3c168265c8b4bb7969067aaa5d72bb
SHA2563302c1bd1ee250f70bbe9edfd0c326a8cf784d980c6d08d1c0aa6d6e0ef4c1ba
SHA512be1f40f88d5d4a28b777f9a4cec6eb38a1b554e008842e68afeea7885971b623f4bd7c6655395f416085b69e301b7b616d216232d3a75b9001a23dcce3e4ca57
-
Filesize
145KB
MD5f423687c66197379289f5f7707e804a4
SHA12cf8548aa44a15df892f37bd57b269dfe40b20aa
SHA2565fe3eff7487d1432a24937b19c9e248506d116987638e137eda10efa6c9ec8d0
SHA51204a62c3bd66862c8ff06b6490d8c7d71cc133d673bec67bcd57506250d6c67b80cb5d7648b5f3ddf28955fcdd6717641aaf17e8136d3ea838e25783dac15d8d9
-
Filesize
145KB
MD5f423687c66197379289f5f7707e804a4
SHA12cf8548aa44a15df892f37bd57b269dfe40b20aa
SHA2565fe3eff7487d1432a24937b19c9e248506d116987638e137eda10efa6c9ec8d0
SHA51204a62c3bd66862c8ff06b6490d8c7d71cc133d673bec67bcd57506250d6c67b80cb5d7648b5f3ddf28955fcdd6717641aaf17e8136d3ea838e25783dac15d8d9
-
Filesize
96KB
MD57825cad99621dd288da81d8d8ae13cf5
SHA1f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c
SHA256529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5
SHA5122e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4
-
Filesize
96KB
MD57825cad99621dd288da81d8d8ae13cf5
SHA1f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c
SHA256529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5
SHA5122e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4
-
Filesize
96KB
MD57825cad99621dd288da81d8d8ae13cf5
SHA1f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c
SHA256529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5
SHA5122e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4