Analysis
-
max time kernel
97s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2023, 03:24
Static task
static1
Behavioral task
behavioral1
Sample
ce9ac8bb30bcf226928270644820a3da32f12c530869d120292e4a5ada38c522.exe
Resource
win10v2004-20230220-en
General
-
Target
ce9ac8bb30bcf226928270644820a3da32f12c530869d120292e4a5ada38c522.exe
-
Size
982KB
-
MD5
a00de4597aae894bb3f93de4321918d0
-
SHA1
a16daff87b73341684e5cbfc655ac2138687c61a
-
SHA256
ce9ac8bb30bcf226928270644820a3da32f12c530869d120292e4a5ada38c522
-
SHA512
eeb6ad06e96d8f086fad191bd1a1aaea63d35f8af9e5add4328267c36370784d93e644feb9b0cb47deffacaad3925c3c4a0dca4b655dea74334c85c740e25c88
-
SSDEEP
24576:Cy1t+/+jhBAcByO/IN8GJwUiTTGL2hEg5LFtkfdAK:pz+/+VeOwN8a/UGChEg5D
Malware Config
Extracted
redline
maxi
83.97.73.122:19062
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Extracted
redline
haval
83.97.73.122:19062
-
auth_value
d23dec6813deb04eb8abd82657a9b0af
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 3560 v1461132.exe 5040 v2559893.exe 4500 a6330779.exe 364 b7450523.exe 1784 c2542861.exe 1828 d2908948.exe 692 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v1461132.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2559893.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v2559893.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ce9ac8bb30bcf226928270644820a3da32f12c530869d120292e4a5ada38c522.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ce9ac8bb30bcf226928270644820a3da32f12c530869d120292e4a5ada38c522.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1461132.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4500 set thread context of 4052 4500 a6330779.exe 86 PID 1784 set thread context of 4672 1784 c2542861.exe 90 PID 1828 set thread context of 4760 1828 d2908948.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4052 AppLaunch.exe 4052 AppLaunch.exe 364 b7450523.exe 364 b7450523.exe 4760 AppLaunch.exe 4760 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4052 AppLaunch.exe Token: SeDebugPrivilege 364 b7450523.exe Token: SeDebugPrivilege 4760 AppLaunch.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4672 AppLaunch.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4088 wrote to memory of 3560 4088 ce9ac8bb30bcf226928270644820a3da32f12c530869d120292e4a5ada38c522.exe 82 PID 4088 wrote to memory of 3560 4088 ce9ac8bb30bcf226928270644820a3da32f12c530869d120292e4a5ada38c522.exe 82 PID 4088 wrote to memory of 3560 4088 ce9ac8bb30bcf226928270644820a3da32f12c530869d120292e4a5ada38c522.exe 82 PID 3560 wrote to memory of 5040 3560 v1461132.exe 83 PID 3560 wrote to memory of 5040 3560 v1461132.exe 83 PID 3560 wrote to memory of 5040 3560 v1461132.exe 83 PID 5040 wrote to memory of 4500 5040 v2559893.exe 84 PID 5040 wrote to memory of 4500 5040 v2559893.exe 84 PID 5040 wrote to memory of 4500 5040 v2559893.exe 84 PID 4500 wrote to memory of 4052 4500 a6330779.exe 86 PID 4500 wrote to memory of 4052 4500 a6330779.exe 86 PID 4500 wrote to memory of 4052 4500 a6330779.exe 86 PID 4500 wrote to memory of 4052 4500 a6330779.exe 86 PID 4500 wrote to memory of 4052 4500 a6330779.exe 86 PID 5040 wrote to memory of 364 5040 v2559893.exe 87 PID 5040 wrote to memory of 364 5040 v2559893.exe 87 PID 5040 wrote to memory of 364 5040 v2559893.exe 87 PID 3560 wrote to memory of 1784 3560 v1461132.exe 88 PID 3560 wrote to memory of 1784 3560 v1461132.exe 88 PID 3560 wrote to memory of 1784 3560 v1461132.exe 88 PID 1784 wrote to memory of 4672 1784 c2542861.exe 90 PID 1784 wrote to memory of 4672 1784 c2542861.exe 90 PID 1784 wrote to memory of 4672 1784 c2542861.exe 90 PID 1784 wrote to memory of 4672 1784 c2542861.exe 90 PID 1784 wrote to memory of 4672 1784 c2542861.exe 90 PID 4088 wrote to memory of 1828 4088 ce9ac8bb30bcf226928270644820a3da32f12c530869d120292e4a5ada38c522.exe 91 PID 4088 wrote to memory of 1828 4088 ce9ac8bb30bcf226928270644820a3da32f12c530869d120292e4a5ada38c522.exe 91 PID 4088 wrote to memory of 1828 4088 ce9ac8bb30bcf226928270644820a3da32f12c530869d120292e4a5ada38c522.exe 91 PID 1828 wrote to memory of 4760 1828 d2908948.exe 93 PID 1828 wrote to memory of 4760 1828 d2908948.exe 93 PID 1828 wrote to memory of 4760 1828 d2908948.exe 93 PID 1828 wrote to memory of 4760 1828 d2908948.exe 93 PID 1828 wrote to memory of 4760 1828 d2908948.exe 93 PID 4672 wrote to memory of 692 4672 AppLaunch.exe 94 PID 4672 wrote to memory of 692 4672 AppLaunch.exe 94 PID 4672 wrote to memory of 692 4672 AppLaunch.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce9ac8bb30bcf226928270644820a3da32f12c530869d120292e4a5ada38c522.exe"C:\Users\Admin\AppData\Local\Temp\ce9ac8bb30bcf226928270644820a3da32f12c530869d120292e4a5ada38c522.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1461132.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1461132.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2559893.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2559893.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6330779.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6330779.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4052
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7450523.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7450523.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:364
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2542861.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2542861.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"4⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"5⤵
- Executes dropped EXE
PID:692
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2908948.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2908948.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4760
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
328KB
MD5b63ac2b93c72e98c666588eea8464f13
SHA1fcfbbc4fe64f7534a6311dd732c751a7794b7205
SHA256d330cb3ef823939b9d0c522938a392e4bfa081d02672d9487dfdf77c85853b36
SHA5124aec5632551cb5737f61deafb9c9eef777edc4a908d21b237b8fcfafeb5ec2609974ef73daebd2aa233d1c95e95475a38b2b6499bfd23224242f9f1204656233
-
Filesize
328KB
MD5b63ac2b93c72e98c666588eea8464f13
SHA1fcfbbc4fe64f7534a6311dd732c751a7794b7205
SHA256d330cb3ef823939b9d0c522938a392e4bfa081d02672d9487dfdf77c85853b36
SHA5124aec5632551cb5737f61deafb9c9eef777edc4a908d21b237b8fcfafeb5ec2609974ef73daebd2aa233d1c95e95475a38b2b6499bfd23224242f9f1204656233
-
Filesize
661KB
MD5e68c133ad4bd9a3f1eb3858906012a07
SHA1187d82a08a66ec6f05f3ac734ec064b221881a1b
SHA25629f7b94b0068b50ddd658f213334ccbf12793e332e4e3bbb6cf0090be1c00120
SHA51270b7b0ccc11fb0e4c0405d3f33866790e4909f8ca1dfdfa825a93bd6fcea77dae72b5c40d499695afd0bbd0b883908ffcbbd63c28a6f7291e960e8ac8a3d35e8
-
Filesize
661KB
MD5e68c133ad4bd9a3f1eb3858906012a07
SHA1187d82a08a66ec6f05f3ac734ec064b221881a1b
SHA25629f7b94b0068b50ddd658f213334ccbf12793e332e4e3bbb6cf0090be1c00120
SHA51270b7b0ccc11fb0e4c0405d3f33866790e4909f8ca1dfdfa825a93bd6fcea77dae72b5c40d499695afd0bbd0b883908ffcbbd63c28a6f7291e960e8ac8a3d35e8
-
Filesize
388KB
MD5b534496b0865e31636c6990c2e45fd09
SHA18c3d4db3e0be271249f1da44e5b4970c7c18a05e
SHA256bc5fb530f61926058a634fb5d307e71dfd28b1834d77dc22816bae24b7c1fda2
SHA512b303d0133d68882473246b417f3205696a4682a3b15b683b61c9176a4ea4a6f7d8b1134d477fb858d1e9317f9fccfa1217ec12682cdde6c53bf434f81f94f1c4
-
Filesize
388KB
MD5b534496b0865e31636c6990c2e45fd09
SHA18c3d4db3e0be271249f1da44e5b4970c7c18a05e
SHA256bc5fb530f61926058a634fb5d307e71dfd28b1834d77dc22816bae24b7c1fda2
SHA512b303d0133d68882473246b417f3205696a4682a3b15b683b61c9176a4ea4a6f7d8b1134d477fb858d1e9317f9fccfa1217ec12682cdde6c53bf434f81f94f1c4
-
Filesize
280KB
MD51732427c95d36c23ef52955989c290a4
SHA171dc2ead3442e266a291c10d64840b3c7022ab55
SHA25669655c728d2cac3255e4d79f4f5872dd6f8e05b97a7f911ad7737c33494e7ec0
SHA512a4e5cb9f61410a89e642fdc5a8a49786fa2ad1974fff8c25888194e293338707ef42ab623cc87a0cf1da956567571b89d018e53fb0b386aa32af6c8253a9f967
-
Filesize
280KB
MD51732427c95d36c23ef52955989c290a4
SHA171dc2ead3442e266a291c10d64840b3c7022ab55
SHA25669655c728d2cac3255e4d79f4f5872dd6f8e05b97a7f911ad7737c33494e7ec0
SHA512a4e5cb9f61410a89e642fdc5a8a49786fa2ad1974fff8c25888194e293338707ef42ab623cc87a0cf1da956567571b89d018e53fb0b386aa32af6c8253a9f967
-
Filesize
194KB
MD57a9e00b53c659baae66ae064a9637384
SHA1a1be8f72beff62cd29989d2c35875f9510572e8a
SHA2561081279332b759179205c88255b1b9a0bbeafbc2ad399238d49028984e4cf4ca
SHA512610d778d6be4d0daf6e1e8344cf89c9dc18e59d8b7603bef35597ca38d2f3dfbab38939377b8e1c18f3e8e979731cf6f0c95073cbcfff187ff6f2e3ca5b2a437
-
Filesize
194KB
MD57a9e00b53c659baae66ae064a9637384
SHA1a1be8f72beff62cd29989d2c35875f9510572e8a
SHA2561081279332b759179205c88255b1b9a0bbeafbc2ad399238d49028984e4cf4ca
SHA512610d778d6be4d0daf6e1e8344cf89c9dc18e59d8b7603bef35597ca38d2f3dfbab38939377b8e1c18f3e8e979731cf6f0c95073cbcfff187ff6f2e3ca5b2a437
-
Filesize
145KB
MD5c900215bf123bd6d715a92d1e3b1f602
SHA1dfe99ea079b4a89dec6e77eb62ddad500bf9c00b
SHA256e9477a23d7e4d09b133a82f97273b7d638702f07e9b6050ea4a928e1745f81b5
SHA51209733e29732fb0fd8a219b34dc5a934c11292bde8472d2b433b42793c39a723e31104925856157c7beac28fbc803a6fed449f1386a957c1b6c849af6d3d5b8c2
-
Filesize
145KB
MD5c900215bf123bd6d715a92d1e3b1f602
SHA1dfe99ea079b4a89dec6e77eb62ddad500bf9c00b
SHA256e9477a23d7e4d09b133a82f97273b7d638702f07e9b6050ea4a928e1745f81b5
SHA51209733e29732fb0fd8a219b34dc5a934c11292bde8472d2b433b42793c39a723e31104925856157c7beac28fbc803a6fed449f1386a957c1b6c849af6d3d5b8c2
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc
-
Filesize
101KB
MD589d41e1cf478a3d3c2c701a27a5692b2
SHA1691e20583ef80cb9a2fd3258560e7f02481d12fd
SHA256dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac
SHA5125c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc