Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2023 12:53
Static task
static1
Behavioral task
behavioral1
Sample
2cb6b40c254bc0eef5c5c1d1210f9d07bbf1c0e52c9ef86ecb8c483ffd5e77dd.exe
Resource
win10v2004-20230220-en
General
-
Target
2cb6b40c254bc0eef5c5c1d1210f9d07bbf1c0e52c9ef86ecb8c483ffd5e77dd.exe
-
Size
1.0MB
-
MD5
5683c4ba64e3fa32ddb70b4089096107
-
SHA1
fc8e6eab0da9a3fb737b09f8917dc251cc9e0ca8
-
SHA256
2cb6b40c254bc0eef5c5c1d1210f9d07bbf1c0e52c9ef86ecb8c483ffd5e77dd
-
SHA512
0cb86021f885a62ff9af1a344605e0f59ce01e9da3a6da4242d09f9b051c58b9b5b80a6c30bb983c2e7a69fa8d3af779815a818e8ee571782cc3c708ac55ce94
-
SSDEEP
24576:LyXRwYj7jUt/iuNt/oWWL/XjP200PfjMd:+BFzQoWij2k
Malware Config
Extracted
redline
mina
83.97.73.122:19062
-
auth_value
3d04bf4b8ba2a11c4dcf9df0e388fa05
Extracted
redline
fash
83.97.73.122:19062
-
auth_value
dd7165bcd22b0ed3df426d944e12f136
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 1820 v6758247.exe 4428 v6430152.exe 1836 a3529427.exe 1388 b5722200.exe 5044 c7129869.exe 4640 c7129869.exe 3128 d6401977.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2cb6b40c254bc0eef5c5c1d1210f9d07bbf1c0e52c9ef86ecb8c483ffd5e77dd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6758247.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v6758247.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6430152.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v6430152.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2cb6b40c254bc0eef5c5c1d1210f9d07bbf1c0e52c9ef86ecb8c483ffd5e77dd.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1836 set thread context of 3896 1836 a3529427.exe 89 PID 5044 set thread context of 4640 5044 c7129869.exe 98 PID 3128 set thread context of 4232 3128 d6401977.exe 103 -
Program crash 1 IoCs
pid pid_target Process procid_target 2996 4640 WerFault.exe 98 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3896 AppLaunch.exe 3896 AppLaunch.exe 1388 b5722200.exe 1388 b5722200.exe 4232 AppLaunch.exe 4232 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3896 AppLaunch.exe Token: SeDebugPrivilege 1388 b5722200.exe Token: SeDebugPrivilege 5044 c7129869.exe Token: SeDebugPrivilege 4232 AppLaunch.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4640 c7129869.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 5032 wrote to memory of 1820 5032 2cb6b40c254bc0eef5c5c1d1210f9d07bbf1c0e52c9ef86ecb8c483ffd5e77dd.exe 85 PID 5032 wrote to memory of 1820 5032 2cb6b40c254bc0eef5c5c1d1210f9d07bbf1c0e52c9ef86ecb8c483ffd5e77dd.exe 85 PID 5032 wrote to memory of 1820 5032 2cb6b40c254bc0eef5c5c1d1210f9d07bbf1c0e52c9ef86ecb8c483ffd5e77dd.exe 85 PID 1820 wrote to memory of 4428 1820 v6758247.exe 86 PID 1820 wrote to memory of 4428 1820 v6758247.exe 86 PID 1820 wrote to memory of 4428 1820 v6758247.exe 86 PID 4428 wrote to memory of 1836 4428 v6430152.exe 87 PID 4428 wrote to memory of 1836 4428 v6430152.exe 87 PID 4428 wrote to memory of 1836 4428 v6430152.exe 87 PID 1836 wrote to memory of 3896 1836 a3529427.exe 89 PID 1836 wrote to memory of 3896 1836 a3529427.exe 89 PID 1836 wrote to memory of 3896 1836 a3529427.exe 89 PID 1836 wrote to memory of 3896 1836 a3529427.exe 89 PID 1836 wrote to memory of 3896 1836 a3529427.exe 89 PID 4428 wrote to memory of 1388 4428 v6430152.exe 90 PID 4428 wrote to memory of 1388 4428 v6430152.exe 90 PID 4428 wrote to memory of 1388 4428 v6430152.exe 90 PID 1820 wrote to memory of 5044 1820 v6758247.exe 97 PID 1820 wrote to memory of 5044 1820 v6758247.exe 97 PID 1820 wrote to memory of 5044 1820 v6758247.exe 97 PID 5044 wrote to memory of 4640 5044 c7129869.exe 98 PID 5044 wrote to memory of 4640 5044 c7129869.exe 98 PID 5044 wrote to memory of 4640 5044 c7129869.exe 98 PID 5044 wrote to memory of 4640 5044 c7129869.exe 98 PID 5044 wrote to memory of 4640 5044 c7129869.exe 98 PID 5044 wrote to memory of 4640 5044 c7129869.exe 98 PID 5044 wrote to memory of 4640 5044 c7129869.exe 98 PID 5044 wrote to memory of 4640 5044 c7129869.exe 98 PID 5044 wrote to memory of 4640 5044 c7129869.exe 98 PID 5044 wrote to memory of 4640 5044 c7129869.exe 98 PID 5032 wrote to memory of 3128 5032 2cb6b40c254bc0eef5c5c1d1210f9d07bbf1c0e52c9ef86ecb8c483ffd5e77dd.exe 100 PID 5032 wrote to memory of 3128 5032 2cb6b40c254bc0eef5c5c1d1210f9d07bbf1c0e52c9ef86ecb8c483ffd5e77dd.exe 100 PID 5032 wrote to memory of 3128 5032 2cb6b40c254bc0eef5c5c1d1210f9d07bbf1c0e52c9ef86ecb8c483ffd5e77dd.exe 100 PID 3128 wrote to memory of 4232 3128 d6401977.exe 103 PID 3128 wrote to memory of 4232 3128 d6401977.exe 103 PID 3128 wrote to memory of 4232 3128 d6401977.exe 103 PID 3128 wrote to memory of 4232 3128 d6401977.exe 103 PID 3128 wrote to memory of 4232 3128 d6401977.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\2cb6b40c254bc0eef5c5c1d1210f9d07bbf1c0e52c9ef86ecb8c483ffd5e77dd.exe"C:\Users\Admin\AppData\Local\Temp\2cb6b40c254bc0eef5c5c1d1210f9d07bbf1c0e52c9ef86ecb8c483ffd5e77dd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6758247.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6758247.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6430152.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6430152.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3529427.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3529427.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3896
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5722200.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5722200.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1388
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c7129869.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c7129869.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c7129869.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c7129869.exe4⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4640 -s 125⤵
- Program crash
PID:2996
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6401977.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6401977.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4232
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4640 -ip 46401⤵PID:4696
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
328KB
MD5440763afc5f3a657cf7c1b4752acdc5d
SHA1cc03036cb3d8865a9786032c0f86d337febf47ec
SHA2568bb61d3feb438caf12f0f390a269f7b5d857688ea590ad6b78a07ccef66e6ad4
SHA51209764502513f787179097a74d403792778a3829e50aefd1e8ab97ce710b48dc9407c5897e2338d5ee5c47f79f28ce6f8825c35d02439d50ca5468c35e514c5cb
-
Filesize
328KB
MD5440763afc5f3a657cf7c1b4752acdc5d
SHA1cc03036cb3d8865a9786032c0f86d337febf47ec
SHA2568bb61d3feb438caf12f0f390a269f7b5d857688ea590ad6b78a07ccef66e6ad4
SHA51209764502513f787179097a74d403792778a3829e50aefd1e8ab97ce710b48dc9407c5897e2338d5ee5c47f79f28ce6f8825c35d02439d50ca5468c35e514c5cb
-
Filesize
726KB
MD55d66bfe375d0068971aeffdd2ff8ab94
SHA1d8ae022ad91cc86b0f34f45c2d51d38d30f6dc3f
SHA2565c2a4f796f44ceef6e9b1257945b4e9452dd5988c6a8ce2bb06450cb06fe2fa8
SHA51238723ed63e45ce0d26e80d7b5e1c82c1984380436f098cec02a2a38b66120bc2420b7e431594af99cc6cdbdcf1e81ff067124d0c5ec62056a635977c4c9d6cf2
-
Filesize
726KB
MD55d66bfe375d0068971aeffdd2ff8ab94
SHA1d8ae022ad91cc86b0f34f45c2d51d38d30f6dc3f
SHA2565c2a4f796f44ceef6e9b1257945b4e9452dd5988c6a8ce2bb06450cb06fe2fa8
SHA51238723ed63e45ce0d26e80d7b5e1c82c1984380436f098cec02a2a38b66120bc2420b7e431594af99cc6cdbdcf1e81ff067124d0c5ec62056a635977c4c9d6cf2
-
Filesize
963KB
MD53ad1d9eb60a9522e515dc254e16b2ca7
SHA19e605ccd29f555a45080587031502be116228398
SHA25663b5ec53e7216a6db12144d001091699b25319f28b6b6c75ba20e8a1e39bff81
SHA512fa56d6af5e73c6b9d2877c78f74b5e6b864b49810d83b984e805cc05f1d4c1e03f3b240c2cfebb8a1b9fab2740b8e50828a84743ac654a3cf14edea2ca215822
-
Filesize
963KB
MD53ad1d9eb60a9522e515dc254e16b2ca7
SHA19e605ccd29f555a45080587031502be116228398
SHA25663b5ec53e7216a6db12144d001091699b25319f28b6b6c75ba20e8a1e39bff81
SHA512fa56d6af5e73c6b9d2877c78f74b5e6b864b49810d83b984e805cc05f1d4c1e03f3b240c2cfebb8a1b9fab2740b8e50828a84743ac654a3cf14edea2ca215822
-
Filesize
963KB
MD53ad1d9eb60a9522e515dc254e16b2ca7
SHA19e605ccd29f555a45080587031502be116228398
SHA25663b5ec53e7216a6db12144d001091699b25319f28b6b6c75ba20e8a1e39bff81
SHA512fa56d6af5e73c6b9d2877c78f74b5e6b864b49810d83b984e805cc05f1d4c1e03f3b240c2cfebb8a1b9fab2740b8e50828a84743ac654a3cf14edea2ca215822
-
Filesize
280KB
MD572675909fba3414c2058fc4b822321e6
SHA1230d9933f8b951552de4fd48e6e3a2c8e62daffa
SHA2568220e0b423ab6d8a977d7d63642c6642d963a73213cbce891839ddd8122e22f1
SHA512f3d3fdd257a7d8b48a140ac2d01fe0e769e6bc3e046ce8997c6cb3dca3e7f3e6a1834db0e4701c78d590fc4ffa7f602afac05536a6386a47fd90b7924825ba42
-
Filesize
280KB
MD572675909fba3414c2058fc4b822321e6
SHA1230d9933f8b951552de4fd48e6e3a2c8e62daffa
SHA2568220e0b423ab6d8a977d7d63642c6642d963a73213cbce891839ddd8122e22f1
SHA512f3d3fdd257a7d8b48a140ac2d01fe0e769e6bc3e046ce8997c6cb3dca3e7f3e6a1834db0e4701c78d590fc4ffa7f602afac05536a6386a47fd90b7924825ba42
-
Filesize
194KB
MD5e8e2df0929efa54f9715097e6f2fc100
SHA195ec80402351930211f32cb8e214ab134ca00c81
SHA256c54a44c451a1961472e93a69f625e2af29e6bf3a472519df4dcd999dc6061614
SHA512f4c7fbb79c58abc38cc3c6e19bff568ffc9bfce0c43b6cdfb0709f921fdecd884df92bc4b4f3932419d55690a9f3ff28153f80736655787168f360850194259e
-
Filesize
194KB
MD5e8e2df0929efa54f9715097e6f2fc100
SHA195ec80402351930211f32cb8e214ab134ca00c81
SHA256c54a44c451a1961472e93a69f625e2af29e6bf3a472519df4dcd999dc6061614
SHA512f4c7fbb79c58abc38cc3c6e19bff568ffc9bfce0c43b6cdfb0709f921fdecd884df92bc4b4f3932419d55690a9f3ff28153f80736655787168f360850194259e
-
Filesize
145KB
MD5be5562889c096c8a3224ae763ce662b1
SHA16d39d296e3cc66a5f84ba997026c0366fda38882
SHA256cd99110cd9be9b248c3c6c6140055e2a63777a951462f0216914f3672254b357
SHA5127381144811e9b94d9253b53ce6fbd7841ebbc501f602f4ede594ca6d1fb304351fa6b1b9ebbe077b55bdb2a40a0b0f713e2fafbd95ab1c029d36be37d2e62913
-
Filesize
145KB
MD5be5562889c096c8a3224ae763ce662b1
SHA16d39d296e3cc66a5f84ba997026c0366fda38882
SHA256cd99110cd9be9b248c3c6c6140055e2a63777a951462f0216914f3672254b357
SHA5127381144811e9b94d9253b53ce6fbd7841ebbc501f602f4ede594ca6d1fb304351fa6b1b9ebbe077b55bdb2a40a0b0f713e2fafbd95ab1c029d36be37d2e62913