Analysis
-
max time kernel
53s -
max time network
156s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
25/05/2023, 04:51
Static task
static1
Behavioral task
behavioral1
Sample
e17f277f3bb90d7d1ce064377f2b8db2880468944d302b84de9251fa70e4d136.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e17f277f3bb90d7d1ce064377f2b8db2880468944d302b84de9251fa70e4d136.exe
Resource
win10-20230220-en
General
-
Target
e17f277f3bb90d7d1ce064377f2b8db2880468944d302b84de9251fa70e4d136.exe
-
Size
982KB
-
MD5
d718a52951f6a5aa750bbdd67e5a9d88
-
SHA1
90aebfe65e2356a8f00a398259d12b47c2641a8c
-
SHA256
e17f277f3bb90d7d1ce064377f2b8db2880468944d302b84de9251fa70e4d136
-
SHA512
dcc52194360a9827d9fbbd44d2fd6f8281bbc10bbb554d2b1b3913082db3a1543d1d94fb1c71fe38d686cc7fb8cd0b5ac3f8bc07cbe9a07ec30aa15008e7ec4c
-
SSDEEP
24576:py5ux9qlLWxxbkyLjFNWTG3qh1KQ3F5FpkfV9YVdpDT:c69GLhyLjyGah1x3FRaGn
Malware Config
Extracted
redline
diza
83.97.73.122:19062
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Extracted
redline
haval
83.97.73.122:19062
-
auth_value
d23dec6813deb04eb8abd82657a9b0af
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2884 x3331803.exe 5096 x8277484.exe 4548 f2232946.exe 1368 g6954746.exe 3664 h9386696.exe 5000 i2452113.exe 4692 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3331803.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x8277484.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x8277484.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e17f277f3bb90d7d1ce064377f2b8db2880468944d302b84de9251fa70e4d136.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e17f277f3bb90d7d1ce064377f2b8db2880468944d302b84de9251fa70e4d136.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x3331803.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1368 set thread context of 3668 1368 g6954746.exe 72 PID 3664 set thread context of 4976 3664 h9386696.exe 75 PID 5000 set thread context of 1340 5000 i2452113.exe 78 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4548 f2232946.exe 4548 f2232946.exe 3668 AppLaunch.exe 3668 AppLaunch.exe 1340 AppLaunch.exe 1340 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4548 f2232946.exe Token: SeDebugPrivilege 3668 AppLaunch.exe Token: SeDebugPrivilege 1340 AppLaunch.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4976 AppLaunch.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2884 2544 e17f277f3bb90d7d1ce064377f2b8db2880468944d302b84de9251fa70e4d136.exe 66 PID 2544 wrote to memory of 2884 2544 e17f277f3bb90d7d1ce064377f2b8db2880468944d302b84de9251fa70e4d136.exe 66 PID 2544 wrote to memory of 2884 2544 e17f277f3bb90d7d1ce064377f2b8db2880468944d302b84de9251fa70e4d136.exe 66 PID 2884 wrote to memory of 5096 2884 x3331803.exe 67 PID 2884 wrote to memory of 5096 2884 x3331803.exe 67 PID 2884 wrote to memory of 5096 2884 x3331803.exe 67 PID 5096 wrote to memory of 4548 5096 x8277484.exe 68 PID 5096 wrote to memory of 4548 5096 x8277484.exe 68 PID 5096 wrote to memory of 4548 5096 x8277484.exe 68 PID 5096 wrote to memory of 1368 5096 x8277484.exe 70 PID 5096 wrote to memory of 1368 5096 x8277484.exe 70 PID 5096 wrote to memory of 1368 5096 x8277484.exe 70 PID 1368 wrote to memory of 3668 1368 g6954746.exe 72 PID 1368 wrote to memory of 3668 1368 g6954746.exe 72 PID 1368 wrote to memory of 3668 1368 g6954746.exe 72 PID 1368 wrote to memory of 3668 1368 g6954746.exe 72 PID 1368 wrote to memory of 3668 1368 g6954746.exe 72 PID 2884 wrote to memory of 3664 2884 x3331803.exe 73 PID 2884 wrote to memory of 3664 2884 x3331803.exe 73 PID 2884 wrote to memory of 3664 2884 x3331803.exe 73 PID 3664 wrote to memory of 4976 3664 h9386696.exe 75 PID 3664 wrote to memory of 4976 3664 h9386696.exe 75 PID 3664 wrote to memory of 4976 3664 h9386696.exe 75 PID 3664 wrote to memory of 4976 3664 h9386696.exe 75 PID 3664 wrote to memory of 4976 3664 h9386696.exe 75 PID 2544 wrote to memory of 5000 2544 e17f277f3bb90d7d1ce064377f2b8db2880468944d302b84de9251fa70e4d136.exe 76 PID 2544 wrote to memory of 5000 2544 e17f277f3bb90d7d1ce064377f2b8db2880468944d302b84de9251fa70e4d136.exe 76 PID 2544 wrote to memory of 5000 2544 e17f277f3bb90d7d1ce064377f2b8db2880468944d302b84de9251fa70e4d136.exe 76 PID 5000 wrote to memory of 1340 5000 i2452113.exe 78 PID 5000 wrote to memory of 1340 5000 i2452113.exe 78 PID 5000 wrote to memory of 1340 5000 i2452113.exe 78 PID 5000 wrote to memory of 1340 5000 i2452113.exe 78 PID 5000 wrote to memory of 1340 5000 i2452113.exe 78 PID 4976 wrote to memory of 4692 4976 AppLaunch.exe 79 PID 4976 wrote to memory of 4692 4976 AppLaunch.exe 79 PID 4976 wrote to memory of 4692 4976 AppLaunch.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\e17f277f3bb90d7d1ce064377f2b8db2880468944d302b84de9251fa70e4d136.exe"C:\Users\Admin\AppData\Local\Temp\e17f277f3bb90d7d1ce064377f2b8db2880468944d302b84de9251fa70e4d136.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3331803.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3331803.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8277484.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8277484.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2232946.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f2232946.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4548
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6954746.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6954746.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3668
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9386696.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9386696.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"4⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"5⤵
- Executes dropped EXE
PID:4692
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2452113.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2452113.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1340
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5911ae024136ac24734b4fb1623f5721e
SHA1377c2b092d4a67d86a1571681c52d40767b9d2c1
SHA2563da9b5e0e2871bc6861e77cd11f485a104fd9fd354a2532309f7d85a8a240bbd
SHA51247ada4c3177d65ef1f4e65751ebe91e2b77880b4b886942eb66d41bab7ddb1e1c7b6ab78837bbb7d7dd80638ace076a1c7407161e98b87ace657948ac84f13aa
-
Filesize
328KB
MD56a718a7b4ad2a40d1d8404d3d7a30df6
SHA1005447e43a27bf59972743236c6555f17c576101
SHA2567c460752b3942b61d83fd55ade7de1a71eed63185eda23d17a1f7d88c730691e
SHA51217ef9854e60ba85fbcb4dff467798d2dd91c0e9be9f2cde38390886db24d74f01a051b2ee4cc8fa684b9352d9991c2f65e36904d87e5c96bb1f88dbb6fb00045
-
Filesize
328KB
MD56a718a7b4ad2a40d1d8404d3d7a30df6
SHA1005447e43a27bf59972743236c6555f17c576101
SHA2567c460752b3942b61d83fd55ade7de1a71eed63185eda23d17a1f7d88c730691e
SHA51217ef9854e60ba85fbcb4dff467798d2dd91c0e9be9f2cde38390886db24d74f01a051b2ee4cc8fa684b9352d9991c2f65e36904d87e5c96bb1f88dbb6fb00045
-
Filesize
661KB
MD51a4125c192aac39bedd50053b9d7f74d
SHA1a2a64813d1d7154c568ba3ea0d7819a144df3af9
SHA256ea1ea0c3a41683c1f2f1347f70f5d58079980208a19a0036db1c5a9108f6c391
SHA5126872331642a2bedcd964145cbdcf7508ac38c08c0af053923d7c4cd7a8df51200a8b1eaa5e4d846f5bf60af3539d92c2335c5fe4f38c38ad645346e78a6c6049
-
Filesize
661KB
MD51a4125c192aac39bedd50053b9d7f74d
SHA1a2a64813d1d7154c568ba3ea0d7819a144df3af9
SHA256ea1ea0c3a41683c1f2f1347f70f5d58079980208a19a0036db1c5a9108f6c391
SHA5126872331642a2bedcd964145cbdcf7508ac38c08c0af053923d7c4cd7a8df51200a8b1eaa5e4d846f5bf60af3539d92c2335c5fe4f38c38ad645346e78a6c6049
-
Filesize
388KB
MD5c7d8219e40b4eafdf6b88ba282bbe9e4
SHA19ca93217249500aef9c0f5bf467227913b6d2069
SHA2569fd27c9929586e07d01b736c0dec8b3e3a13bd91621811d1f84c6e95994bcde0
SHA512f96a2e3c4674c6930f9812b73b910e640a608be589398e494dd8d43462943bded3442650d2da7accb8c647838cf24d5213fc6ae855ccada1779df18c059b0d6f
-
Filesize
388KB
MD5c7d8219e40b4eafdf6b88ba282bbe9e4
SHA19ca93217249500aef9c0f5bf467227913b6d2069
SHA2569fd27c9929586e07d01b736c0dec8b3e3a13bd91621811d1f84c6e95994bcde0
SHA512f96a2e3c4674c6930f9812b73b910e640a608be589398e494dd8d43462943bded3442650d2da7accb8c647838cf24d5213fc6ae855ccada1779df18c059b0d6f
-
Filesize
280KB
MD594801ac76070cc47fc21b37eebba1064
SHA126a83fb18c7c4892d991d71c74bf26c0e7a4b30f
SHA25688efc56e5a61de77ed0f7c4f5c995ed8bbda73e79a4f6d72487b8fa2fd13c5ed
SHA51291a4823f53e7ad0b9e5b9e55c376208e5a74e8386ce6ec3f1397d0ed8b8bdba43ac780ce009e81b21d89fa67204aaad7c62ee92520eaf372e24ba6b4ab7919c1
-
Filesize
280KB
MD594801ac76070cc47fc21b37eebba1064
SHA126a83fb18c7c4892d991d71c74bf26c0e7a4b30f
SHA25688efc56e5a61de77ed0f7c4f5c995ed8bbda73e79a4f6d72487b8fa2fd13c5ed
SHA51291a4823f53e7ad0b9e5b9e55c376208e5a74e8386ce6ec3f1397d0ed8b8bdba43ac780ce009e81b21d89fa67204aaad7c62ee92520eaf372e24ba6b4ab7919c1
-
Filesize
146KB
MD532544c0b2de223b2b7a1ffbe3fc41627
SHA1e0605090e5e112c6973a45b55cd7257f8526525a
SHA256a6192f56dc5fabe1ccb8953c9f9d75f9164313377f4db5a91f836836fc8ece93
SHA5120ba9a7433123ac07367f896cdec43b14ecd8517d5cde3f3eaff0f4dc399fa0b7844206efc5ca73ef66988744895b422aa7d2e309859de2d549940abea3531ca2
-
Filesize
146KB
MD532544c0b2de223b2b7a1ffbe3fc41627
SHA1e0605090e5e112c6973a45b55cd7257f8526525a
SHA256a6192f56dc5fabe1ccb8953c9f9d75f9164313377f4db5a91f836836fc8ece93
SHA5120ba9a7433123ac07367f896cdec43b14ecd8517d5cde3f3eaff0f4dc399fa0b7844206efc5ca73ef66988744895b422aa7d2e309859de2d549940abea3531ca2
-
Filesize
194KB
MD5b9be5eeaa5062ccd6a7085ae55968839
SHA13c861b5cbae123dc326b9853cc54ab35ce8e9279
SHA2569eb0a001f377471718cee97e45a07604ffadd45e299bc6ccda9b5a163c6a3bbb
SHA51296bde2f0c2f6353578162f30d119acb17562a880960d9ccf66232bde3c44630580fc46da274283dc4fbfc1d44527fed5e8199c0f16427daf4e555eb075a8fc3c
-
Filesize
194KB
MD5b9be5eeaa5062ccd6a7085ae55968839
SHA13c861b5cbae123dc326b9853cc54ab35ce8e9279
SHA2569eb0a001f377471718cee97e45a07604ffadd45e299bc6ccda9b5a163c6a3bbb
SHA51296bde2f0c2f6353578162f30d119acb17562a880960d9ccf66232bde3c44630580fc46da274283dc4fbfc1d44527fed5e8199c0f16427daf4e555eb075a8fc3c
-
Filesize
96KB
MD57825cad99621dd288da81d8d8ae13cf5
SHA1f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c
SHA256529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5
SHA5122e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4
-
Filesize
96KB
MD57825cad99621dd288da81d8d8ae13cf5
SHA1f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c
SHA256529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5
SHA5122e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4
-
Filesize
96KB
MD57825cad99621dd288da81d8d8ae13cf5
SHA1f3e1ab0c8e4f22e718cdeb6fa5faa87b0e61e73c
SHA256529088553fe9cb3e497ef704ce9bc7bc07630f6ddfad44afb92acfe639789ec5
SHA5122e81251a2c140a96f681fa95d82eee531b391e2654daa90da08d1dd00f13cba949136d465a2dc37507d40b4a708b6fc695baa716f19737591b1a89bd2a4b60b4