Analysis
-
max time kernel
78s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2023 03:14
Static task
static1
Behavioral task
behavioral1
Sample
c089814163c686a278456c37d16edadce51b7cbeeb49486c1c0cf535fcb41ca2.exe
Resource
win10v2004-20230221-en
General
-
Target
c089814163c686a278456c37d16edadce51b7cbeeb49486c1c0cf535fcb41ca2.exe
-
Size
984KB
-
MD5
d2f83a4fce7c10fab330c354901c81a5
-
SHA1
18fb2fd192b97b3c4a2b8bab0b5f6d5690c5d28a
-
SHA256
c089814163c686a278456c37d16edadce51b7cbeeb49486c1c0cf535fcb41ca2
-
SHA512
ba578ace6ab7c06be5906f523d81b13afa35a3102b8c68902569bd4b14058534625ec0cdd600b8e39ef0264d725a3dd63c35f2477a94f99d44aae6007d2c0dcb
-
SSDEEP
24576:xyaVNWGy2j1+zbcB3c8OQRzGxrG22hhVFFJkfP/S:kaVN6i18cB3c8OkAGnhTtY/
Malware Config
Extracted
redline
maxi
83.97.73.122:19062
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Extracted
redline
haval
83.97.73.122:19062
-
auth_value
d23dec6813deb04eb8abd82657a9b0af
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 4060 v6933558.exe 3240 v4854124.exe 3840 a0312348.exe 4432 b8604282.exe 4752 c0886780.exe 3932 d3546965.exe 2420 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v4854124.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c089814163c686a278456c37d16edadce51b7cbeeb49486c1c0cf535fcb41ca2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c089814163c686a278456c37d16edadce51b7cbeeb49486c1c0cf535fcb41ca2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6933558.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v6933558.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4854124.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3840 set thread context of 4660 3840 a0312348.exe 87 PID 4752 set thread context of 3812 4752 c0886780.exe 91 PID 3932 set thread context of 4412 3932 d3546965.exe 94 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4660 AppLaunch.exe 4660 AppLaunch.exe 4432 b8604282.exe 4432 b8604282.exe 4412 AppLaunch.exe 4412 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4660 AppLaunch.exe Token: SeDebugPrivilege 4432 b8604282.exe Token: SeDebugPrivilege 4412 AppLaunch.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1968 wrote to memory of 4060 1968 c089814163c686a278456c37d16edadce51b7cbeeb49486c1c0cf535fcb41ca2.exe 83 PID 1968 wrote to memory of 4060 1968 c089814163c686a278456c37d16edadce51b7cbeeb49486c1c0cf535fcb41ca2.exe 83 PID 1968 wrote to memory of 4060 1968 c089814163c686a278456c37d16edadce51b7cbeeb49486c1c0cf535fcb41ca2.exe 83 PID 4060 wrote to memory of 3240 4060 v6933558.exe 84 PID 4060 wrote to memory of 3240 4060 v6933558.exe 84 PID 4060 wrote to memory of 3240 4060 v6933558.exe 84 PID 3240 wrote to memory of 3840 3240 v4854124.exe 85 PID 3240 wrote to memory of 3840 3240 v4854124.exe 85 PID 3240 wrote to memory of 3840 3240 v4854124.exe 85 PID 3840 wrote to memory of 4660 3840 a0312348.exe 87 PID 3840 wrote to memory of 4660 3840 a0312348.exe 87 PID 3840 wrote to memory of 4660 3840 a0312348.exe 87 PID 3840 wrote to memory of 4660 3840 a0312348.exe 87 PID 3840 wrote to memory of 4660 3840 a0312348.exe 87 PID 3240 wrote to memory of 4432 3240 v4854124.exe 88 PID 3240 wrote to memory of 4432 3240 v4854124.exe 88 PID 3240 wrote to memory of 4432 3240 v4854124.exe 88 PID 4060 wrote to memory of 4752 4060 v6933558.exe 89 PID 4060 wrote to memory of 4752 4060 v6933558.exe 89 PID 4060 wrote to memory of 4752 4060 v6933558.exe 89 PID 4752 wrote to memory of 3812 4752 c0886780.exe 91 PID 4752 wrote to memory of 3812 4752 c0886780.exe 91 PID 4752 wrote to memory of 3812 4752 c0886780.exe 91 PID 4752 wrote to memory of 3812 4752 c0886780.exe 91 PID 4752 wrote to memory of 3812 4752 c0886780.exe 91 PID 1968 wrote to memory of 3932 1968 c089814163c686a278456c37d16edadce51b7cbeeb49486c1c0cf535fcb41ca2.exe 92 PID 1968 wrote to memory of 3932 1968 c089814163c686a278456c37d16edadce51b7cbeeb49486c1c0cf535fcb41ca2.exe 92 PID 1968 wrote to memory of 3932 1968 c089814163c686a278456c37d16edadce51b7cbeeb49486c1c0cf535fcb41ca2.exe 92 PID 3932 wrote to memory of 4412 3932 d3546965.exe 94 PID 3932 wrote to memory of 4412 3932 d3546965.exe 94 PID 3932 wrote to memory of 4412 3932 d3546965.exe 94 PID 3932 wrote to memory of 4412 3932 d3546965.exe 94 PID 3932 wrote to memory of 4412 3932 d3546965.exe 94 PID 3812 wrote to memory of 2420 3812 AppLaunch.exe 95 PID 3812 wrote to memory of 2420 3812 AppLaunch.exe 95 PID 3812 wrote to memory of 2420 3812 AppLaunch.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\c089814163c686a278456c37d16edadce51b7cbeeb49486c1c0cf535fcb41ca2.exe"C:\Users\Admin\AppData\Local\Temp\c089814163c686a278456c37d16edadce51b7cbeeb49486c1c0cf535fcb41ca2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6933558.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6933558.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4854124.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4854124.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0312348.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0312348.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4660
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8604282.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8604282.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4432
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0886780.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0886780.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"5⤵
- Executes dropped EXE
PID:2420
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3546965.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3546965.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4412
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
328KB
MD5035e440a29b79be6fd945b1404ed1b3c
SHA1c11c26c93a1f55b8548cae2a63f51a06fe725c28
SHA2566d506fb5955828dd268eff31455314c4333a4fa8454d61284b17ae0981bce99c
SHA512453e146e3f41bff4824da6acd2c47f5a82ec4873d4094fd73c36b4001ec9966ec535a0d45aa387167195c2f337d1bb0483850dd1089362bc49c9c96f6bf8ddf5
-
Filesize
328KB
MD5035e440a29b79be6fd945b1404ed1b3c
SHA1c11c26c93a1f55b8548cae2a63f51a06fe725c28
SHA2566d506fb5955828dd268eff31455314c4333a4fa8454d61284b17ae0981bce99c
SHA512453e146e3f41bff4824da6acd2c47f5a82ec4873d4094fd73c36b4001ec9966ec535a0d45aa387167195c2f337d1bb0483850dd1089362bc49c9c96f6bf8ddf5
-
Filesize
663KB
MD55a98087c1626d67e9dd5ae2cda21592b
SHA1ef4d8a5f4940c982dfa6a83dc4d5708bea5f8c68
SHA25609af64b986a081ab89e57cbdc5807c034cb15bb47134f100aa70efc85bcbfca8
SHA51287615ef53fe3c7c849c7ad73e7618185a62eae210fc1b6871aee308b2806f2018a602c744383c0f009e43c4f5b347bbbe749a4f790f0faf907caf43b0ae9feb6
-
Filesize
663KB
MD55a98087c1626d67e9dd5ae2cda21592b
SHA1ef4d8a5f4940c982dfa6a83dc4d5708bea5f8c68
SHA25609af64b986a081ab89e57cbdc5807c034cb15bb47134f100aa70efc85bcbfca8
SHA51287615ef53fe3c7c849c7ad73e7618185a62eae210fc1b6871aee308b2806f2018a602c744383c0f009e43c4f5b347bbbe749a4f790f0faf907caf43b0ae9feb6
-
Filesize
388KB
MD54b9b9934de00f8095978a2411bb137e6
SHA14d2612ba6889105245acaa33140b32157bf69e0b
SHA2567ab97c8c25d5841d4fbe79f6f3b40c6b558a0a51091e48915801cf4d729efd3b
SHA512fba7701d2f5cec3fa6fa76071c719d1be5a6521aa838f53e4d898cd59951847ed9f898238164f90457976e85b6a5e033e8fbdda5c33419c5cb48a2d6935933f1
-
Filesize
388KB
MD54b9b9934de00f8095978a2411bb137e6
SHA14d2612ba6889105245acaa33140b32157bf69e0b
SHA2567ab97c8c25d5841d4fbe79f6f3b40c6b558a0a51091e48915801cf4d729efd3b
SHA512fba7701d2f5cec3fa6fa76071c719d1be5a6521aa838f53e4d898cd59951847ed9f898238164f90457976e85b6a5e033e8fbdda5c33419c5cb48a2d6935933f1
-
Filesize
280KB
MD5da7f546fc217ebaf928233f573c4c2c7
SHA147a3281c825cecf4a06c0f7754d895beb33f4a08
SHA256497371203178fe5250c7185b77564eca13d6037713988a457dc6f509f5a377d3
SHA512d83f8dbf33514550b50a1eaf2c05daef12b07e23928605e794f4f1f6b3cd5af9a168e9d2b8c9651576dafb5440ae25771e9b4a0e541632f74a2b3cc727f3eddc
-
Filesize
280KB
MD5da7f546fc217ebaf928233f573c4c2c7
SHA147a3281c825cecf4a06c0f7754d895beb33f4a08
SHA256497371203178fe5250c7185b77564eca13d6037713988a457dc6f509f5a377d3
SHA512d83f8dbf33514550b50a1eaf2c05daef12b07e23928605e794f4f1f6b3cd5af9a168e9d2b8c9651576dafb5440ae25771e9b4a0e541632f74a2b3cc727f3eddc
-
Filesize
194KB
MD5eacade78d4a87f0489216175124d1332
SHA1574c136d469dcf021b28ce9afbd4b2dd832866fd
SHA256d33d168db13d14241d41e5f3abecf22e0d0621af21ca2974382bc5b2262ad92a
SHA5128b9456d5eacb72688d551a2a26d78967016f44de4195529fcbc2291575e118c8e6b1077838d7361843298b04b71ead3ac9a913a6851056bc507c5c1da275fce8
-
Filesize
194KB
MD5eacade78d4a87f0489216175124d1332
SHA1574c136d469dcf021b28ce9afbd4b2dd832866fd
SHA256d33d168db13d14241d41e5f3abecf22e0d0621af21ca2974382bc5b2262ad92a
SHA5128b9456d5eacb72688d551a2a26d78967016f44de4195529fcbc2291575e118c8e6b1077838d7361843298b04b71ead3ac9a913a6851056bc507c5c1da275fce8
-
Filesize
145KB
MD5b326a3bd73925d2f0f31abfe4b2ead3e
SHA1891f6a75dae7a2120cede073051bf91af993f504
SHA256666229d4c87ae5ae2e0e40afb5c5d02b4e5968baeefa31fad9a7d75fad1eea1f
SHA512611457829edb170dc09a650e9974240b4ee1356bbd9914965e6b9ec89a943653663e4031f3011f232a5b4e201d8ad747ed5410740e4d880f760ba5c2df93e38f
-
Filesize
145KB
MD5b326a3bd73925d2f0f31abfe4b2ead3e
SHA1891f6a75dae7a2120cede073051bf91af993f504
SHA256666229d4c87ae5ae2e0e40afb5c5d02b4e5968baeefa31fad9a7d75fad1eea1f
SHA512611457829edb170dc09a650e9974240b4ee1356bbd9914965e6b9ec89a943653663e4031f3011f232a5b4e201d8ad747ed5410740e4d880f760ba5c2df93e38f
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc