Analysis
-
max time kernel
131s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2023 14:08
Static task
static1
Behavioral task
behavioral1
Sample
5648bcabfd28b715db96eada43c91c8dd27d2f1dfbbf46301415566fc769169d.exe
Resource
win10v2004-20230220-en
General
-
Target
5648bcabfd28b715db96eada43c91c8dd27d2f1dfbbf46301415566fc769169d.exe
-
Size
1.0MB
-
MD5
e8d03533b58fcad240a1ad1a72499485
-
SHA1
b310643e29ab264bc8c93515369678106c7c1cc1
-
SHA256
5648bcabfd28b715db96eada43c91c8dd27d2f1dfbbf46301415566fc769169d
-
SHA512
6de7d3cdcb8ccc05e0534490fb0d144d6f25d7e7ecf449d19815b8de18b1a89446d85e89695096fda0ccaf9cb0d5f54e3ba6c121897c178915e3ef8e396c071d
-
SSDEEP
24576:Hy2U8f3Bke0shMHg+QC4bkua5ic2aDb0geP8aGVKy0rfzRP:S2Us30so25byvYg9s
Malware Config
Extracted
redline
mina
83.97.73.122:19062
-
auth_value
3d04bf4b8ba2a11c4dcf9df0e388fa05
Extracted
redline
fash
83.97.73.122:19062
-
auth_value
dd7165bcd22b0ed3df426d944e12f136
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 4904 v1621828.exe 3980 v1092134.exe 2676 a4822659.exe 864 b9301560.exe 1960 c1092283.exe 2632 c1092283.exe 3612 d6618312.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5648bcabfd28b715db96eada43c91c8dd27d2f1dfbbf46301415566fc769169d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1621828.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v1621828.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1092134.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v1092134.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5648bcabfd28b715db96eada43c91c8dd27d2f1dfbbf46301415566fc769169d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2676 set thread context of 488 2676 a4822659.exe 89 PID 1960 set thread context of 2632 1960 c1092283.exe 92 PID 3612 set thread context of 2508 3612 d6618312.exe 98 -
Program crash 1 IoCs
pid pid_target Process procid_target 656 2632 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 488 AppLaunch.exe 488 AppLaunch.exe 864 b9301560.exe 864 b9301560.exe 2508 AppLaunch.exe 2508 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 488 AppLaunch.exe Token: SeDebugPrivilege 864 b9301560.exe Token: SeDebugPrivilege 1960 c1092283.exe Token: SeDebugPrivilege 2508 AppLaunch.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2632 c1092283.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 4316 wrote to memory of 4904 4316 5648bcabfd28b715db96eada43c91c8dd27d2f1dfbbf46301415566fc769169d.exe 85 PID 4316 wrote to memory of 4904 4316 5648bcabfd28b715db96eada43c91c8dd27d2f1dfbbf46301415566fc769169d.exe 85 PID 4316 wrote to memory of 4904 4316 5648bcabfd28b715db96eada43c91c8dd27d2f1dfbbf46301415566fc769169d.exe 85 PID 4904 wrote to memory of 3980 4904 v1621828.exe 86 PID 4904 wrote to memory of 3980 4904 v1621828.exe 86 PID 4904 wrote to memory of 3980 4904 v1621828.exe 86 PID 3980 wrote to memory of 2676 3980 v1092134.exe 87 PID 3980 wrote to memory of 2676 3980 v1092134.exe 87 PID 3980 wrote to memory of 2676 3980 v1092134.exe 87 PID 2676 wrote to memory of 488 2676 a4822659.exe 89 PID 2676 wrote to memory of 488 2676 a4822659.exe 89 PID 2676 wrote to memory of 488 2676 a4822659.exe 89 PID 2676 wrote to memory of 488 2676 a4822659.exe 89 PID 2676 wrote to memory of 488 2676 a4822659.exe 89 PID 3980 wrote to memory of 864 3980 v1092134.exe 90 PID 3980 wrote to memory of 864 3980 v1092134.exe 90 PID 3980 wrote to memory of 864 3980 v1092134.exe 90 PID 4904 wrote to memory of 1960 4904 v1621828.exe 91 PID 4904 wrote to memory of 1960 4904 v1621828.exe 91 PID 4904 wrote to memory of 1960 4904 v1621828.exe 91 PID 1960 wrote to memory of 2632 1960 c1092283.exe 92 PID 1960 wrote to memory of 2632 1960 c1092283.exe 92 PID 1960 wrote to memory of 2632 1960 c1092283.exe 92 PID 1960 wrote to memory of 2632 1960 c1092283.exe 92 PID 1960 wrote to memory of 2632 1960 c1092283.exe 92 PID 1960 wrote to memory of 2632 1960 c1092283.exe 92 PID 1960 wrote to memory of 2632 1960 c1092283.exe 92 PID 1960 wrote to memory of 2632 1960 c1092283.exe 92 PID 1960 wrote to memory of 2632 1960 c1092283.exe 92 PID 1960 wrote to memory of 2632 1960 c1092283.exe 92 PID 4316 wrote to memory of 3612 4316 5648bcabfd28b715db96eada43c91c8dd27d2f1dfbbf46301415566fc769169d.exe 94 PID 4316 wrote to memory of 3612 4316 5648bcabfd28b715db96eada43c91c8dd27d2f1dfbbf46301415566fc769169d.exe 94 PID 4316 wrote to memory of 3612 4316 5648bcabfd28b715db96eada43c91c8dd27d2f1dfbbf46301415566fc769169d.exe 94 PID 3612 wrote to memory of 2508 3612 d6618312.exe 98 PID 3612 wrote to memory of 2508 3612 d6618312.exe 98 PID 3612 wrote to memory of 2508 3612 d6618312.exe 98 PID 3612 wrote to memory of 2508 3612 d6618312.exe 98 PID 3612 wrote to memory of 2508 3612 d6618312.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\5648bcabfd28b715db96eada43c91c8dd27d2f1dfbbf46301415566fc769169d.exe"C:\Users\Admin\AppData\Local\Temp\5648bcabfd28b715db96eada43c91c8dd27d2f1dfbbf46301415566fc769169d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1621828.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1621828.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1092134.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1092134.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4822659.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4822659.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:488
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9301560.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9301560.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:864
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1092283.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1092283.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1092283.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1092283.exe4⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 125⤵
- Program crash
PID:656
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6618312.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6618312.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2632 -ip 26321⤵PID:264
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
328KB
MD59b2a7202b08bbc216e905680e3b74945
SHA176a91570b5d070889258ac927361028863b396b8
SHA256a5caf504e49ca15bb0e584afd47eb1ae10a96c3e5cacf402eb02bc5b314b158f
SHA512b2ea560940d9e2484a8090a5b07c3d532e893b031fef1c3c334328a652f9bc40094dd8ccf927238dce19a1433c434b5c3d60e837ff9c61768f76f6562068bec2
-
Filesize
328KB
MD59b2a7202b08bbc216e905680e3b74945
SHA176a91570b5d070889258ac927361028863b396b8
SHA256a5caf504e49ca15bb0e584afd47eb1ae10a96c3e5cacf402eb02bc5b314b158f
SHA512b2ea560940d9e2484a8090a5b07c3d532e893b031fef1c3c334328a652f9bc40094dd8ccf927238dce19a1433c434b5c3d60e837ff9c61768f76f6562068bec2
-
Filesize
724KB
MD5dc738c18d8e5fe500e58e00a6ee07368
SHA139e05e5edbe883ffbec0f65d93c535dc65b909bf
SHA256b8df6fb803e80dc4e911b9095f1e47b61119c2f2a18ea8c72fed83e150a0f9de
SHA5121b373da2a2cb30c87a2d149de8954dfd41f05c3841897343cdac92c6b860dcfe7c8946d5d139bd686f09ff5ab17772866c94a6e50951700e75297e3517fb71a5
-
Filesize
724KB
MD5dc738c18d8e5fe500e58e00a6ee07368
SHA139e05e5edbe883ffbec0f65d93c535dc65b909bf
SHA256b8df6fb803e80dc4e911b9095f1e47b61119c2f2a18ea8c72fed83e150a0f9de
SHA5121b373da2a2cb30c87a2d149de8954dfd41f05c3841897343cdac92c6b860dcfe7c8946d5d139bd686f09ff5ab17772866c94a6e50951700e75297e3517fb71a5
-
Filesize
963KB
MD52f972ab311939ac7c436d9f72b467900
SHA1c66972e2ef04cf0c4d8ca395c96afc04b59474a8
SHA256c16744f0a78821ba33133f788fa221f6930e0a6959da0d403ce2e04dfc25896a
SHA512c8b0f8ec2b5968c5dd147b3492af75ef77158901d4f9b32d1e8c1534f2dae658b99d6bd0fdf6edc2ab7ee42770f36053d7748bd072727f0f5af57fe017c94179
-
Filesize
963KB
MD52f972ab311939ac7c436d9f72b467900
SHA1c66972e2ef04cf0c4d8ca395c96afc04b59474a8
SHA256c16744f0a78821ba33133f788fa221f6930e0a6959da0d403ce2e04dfc25896a
SHA512c8b0f8ec2b5968c5dd147b3492af75ef77158901d4f9b32d1e8c1534f2dae658b99d6bd0fdf6edc2ab7ee42770f36053d7748bd072727f0f5af57fe017c94179
-
Filesize
963KB
MD52f972ab311939ac7c436d9f72b467900
SHA1c66972e2ef04cf0c4d8ca395c96afc04b59474a8
SHA256c16744f0a78821ba33133f788fa221f6930e0a6959da0d403ce2e04dfc25896a
SHA512c8b0f8ec2b5968c5dd147b3492af75ef77158901d4f9b32d1e8c1534f2dae658b99d6bd0fdf6edc2ab7ee42770f36053d7748bd072727f0f5af57fe017c94179
-
Filesize
280KB
MD5165c91d9dd33e599a553ec9f242cfab1
SHA1dddc725b10ce43a822c2ba50add56e6a3443cc38
SHA256d6d998085e21811ad2eb3fb730bed87f09fe3d0355db3f1ce2d14653494ee534
SHA512f73ab2fa3150ea1014e036cef5797a862ac03996774d355188214ee80c9592839aae8d9c23d9a72f22884db024dd6d8dfd8d5c67b4858bd469c0f6912e131660
-
Filesize
280KB
MD5165c91d9dd33e599a553ec9f242cfab1
SHA1dddc725b10ce43a822c2ba50add56e6a3443cc38
SHA256d6d998085e21811ad2eb3fb730bed87f09fe3d0355db3f1ce2d14653494ee534
SHA512f73ab2fa3150ea1014e036cef5797a862ac03996774d355188214ee80c9592839aae8d9c23d9a72f22884db024dd6d8dfd8d5c67b4858bd469c0f6912e131660
-
Filesize
194KB
MD51fd0fd47b3c81d815fb2260b7d74eae3
SHA1c275fcbb2f6365694914828cc5cc6fb6e44164dc
SHA256aa83a6dd6aa58b3cd54e8e3aac29803a65e174479ee395dd49d97734e7198063
SHA512173feab37a0503b060e6ad5bd14199d63494b046ea8927b26bbc6b2750502b99e1b0fc3f95c8f4306739015d217e1945be90f76490885f6c1b47a722785507d6
-
Filesize
194KB
MD51fd0fd47b3c81d815fb2260b7d74eae3
SHA1c275fcbb2f6365694914828cc5cc6fb6e44164dc
SHA256aa83a6dd6aa58b3cd54e8e3aac29803a65e174479ee395dd49d97734e7198063
SHA512173feab37a0503b060e6ad5bd14199d63494b046ea8927b26bbc6b2750502b99e1b0fc3f95c8f4306739015d217e1945be90f76490885f6c1b47a722785507d6
-
Filesize
145KB
MD5b9120fbd1c1e6ef0c6e1466a82b70bc2
SHA111f796590b7d23f466bd3bc2af6a6e334d6bc424
SHA25616858fd07939320f7d18381911682e35d3963d0223f04ffc2f3c34a3087a3719
SHA512c243212aef99a23c464e4f5210454871c27175a601b535c306ee1245fdd706326c3fa6f5e2f8bde6d8579ae1fbfc7e3b85bdf637e4fc6061430d602e43471846
-
Filesize
145KB
MD5b9120fbd1c1e6ef0c6e1466a82b70bc2
SHA111f796590b7d23f466bd3bc2af6a6e334d6bc424
SHA25616858fd07939320f7d18381911682e35d3963d0223f04ffc2f3c34a3087a3719
SHA512c243212aef99a23c464e4f5210454871c27175a601b535c306ee1245fdd706326c3fa6f5e2f8bde6d8579ae1fbfc7e3b85bdf637e4fc6061430d602e43471846