Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2023 17:11
Static task
static1
Behavioral task
behavioral1
Sample
065b784363d993986c4c51237186852169687edc211a97b12ef85363b3cf441b.exe
Resource
win10v2004-20230220-en
General
-
Target
065b784363d993986c4c51237186852169687edc211a97b12ef85363b3cf441b.exe
-
Size
768KB
-
MD5
03eef5c43d723df62024cac843000416
-
SHA1
cf15e5f75af1c6467a22cf6876fe4a1c5c164889
-
SHA256
065b784363d993986c4c51237186852169687edc211a97b12ef85363b3cf441b
-
SHA512
0d84fc6489cbb82dc12d8f87df6180db9d5d1f059b220c7b874572722f8338ced97a06e2c2e30633c34c4092f4ceb9dc3d1d389f22938f5e852bfdbd1c3fce27
-
SSDEEP
12288:eMrjy90jG3wDvLmWiwOhyNTFecDc0a3hrKUIO8G9dcPNi5mVDQ+Q+fUavc2bW1ER:tygytwXvjipI1G9ePN/DQj+8h2bDp
Malware Config
Extracted
redline
mina
83.97.73.122:19062
-
auth_value
3d04bf4b8ba2a11c4dcf9df0e388fa05
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 4696 v1583655.exe 4684 v2940904.exe 636 a3985375.exe 3432 b9902294.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 065b784363d993986c4c51237186852169687edc211a97b12ef85363b3cf441b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 065b784363d993986c4c51237186852169687edc211a97b12ef85363b3cf441b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1583655.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v1583655.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2940904.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v2940904.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 636 set thread context of 4644 636 a3985375.exe 89 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4644 AppLaunch.exe 4644 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4644 AppLaunch.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3340 wrote to memory of 4696 3340 065b784363d993986c4c51237186852169687edc211a97b12ef85363b3cf441b.exe 85 PID 3340 wrote to memory of 4696 3340 065b784363d993986c4c51237186852169687edc211a97b12ef85363b3cf441b.exe 85 PID 3340 wrote to memory of 4696 3340 065b784363d993986c4c51237186852169687edc211a97b12ef85363b3cf441b.exe 85 PID 4696 wrote to memory of 4684 4696 v1583655.exe 86 PID 4696 wrote to memory of 4684 4696 v1583655.exe 86 PID 4696 wrote to memory of 4684 4696 v1583655.exe 86 PID 4684 wrote to memory of 636 4684 v2940904.exe 87 PID 4684 wrote to memory of 636 4684 v2940904.exe 87 PID 4684 wrote to memory of 636 4684 v2940904.exe 87 PID 636 wrote to memory of 4644 636 a3985375.exe 89 PID 636 wrote to memory of 4644 636 a3985375.exe 89 PID 636 wrote to memory of 4644 636 a3985375.exe 89 PID 636 wrote to memory of 4644 636 a3985375.exe 89 PID 636 wrote to memory of 4644 636 a3985375.exe 89 PID 4684 wrote to memory of 3432 4684 v2940904.exe 90 PID 4684 wrote to memory of 3432 4684 v2940904.exe 90 PID 4684 wrote to memory of 3432 4684 v2940904.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\065b784363d993986c4c51237186852169687edc211a97b12ef85363b3cf441b.exe"C:\Users\Admin\AppData\Local\Temp\065b784363d993986c4c51237186852169687edc211a97b12ef85363b3cf441b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1583655.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1583655.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2940904.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2940904.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3985375.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3985375.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4644
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9902294.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9902294.exe4⤵
- Executes dropped EXE
PID:3432
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
448KB
MD59e010ba2b74cfc6cc6f710bbf24a312d
SHA14cbd2d8b25e7d40a6ccb90ed5c83173084b25e53
SHA2569afde45535809ab046a8046425fa4de92048cd13679848fb7ae4b2a6b594881d
SHA512cc9f7699de34b3a4a76aa1d645a350d614a6b76b5fcc083aa6e71ba89a6369ed121cddd5cc6b6df103acdda40e6e5ada8822e5f13a311502090e68f04fa764c7
-
Filesize
448KB
MD59e010ba2b74cfc6cc6f710bbf24a312d
SHA14cbd2d8b25e7d40a6ccb90ed5c83173084b25e53
SHA2569afde45535809ab046a8046425fa4de92048cd13679848fb7ae4b2a6b594881d
SHA512cc9f7699de34b3a4a76aa1d645a350d614a6b76b5fcc083aa6e71ba89a6369ed121cddd5cc6b6df103acdda40e6e5ada8822e5f13a311502090e68f04fa764c7
-
Filesize
277KB
MD520ae5e4ced96a62bf5d8b0b8f7e7625a
SHA1f3f8f3764739038ab0dbc6b1828d5036ddee594b
SHA256aac01498850370f2199bdbef9e9ec3cbac992e44b35228424e29a8e5991879f0
SHA512c3409ba8c054bf9ba4e1de9220f1e5d678978f62d361bec3625fa7572c2a6d994213576aabcb7182ece704564ebb6e35eb5ea9bd2542a0657ca5464a68ed5f07
-
Filesize
277KB
MD520ae5e4ced96a62bf5d8b0b8f7e7625a
SHA1f3f8f3764739038ab0dbc6b1828d5036ddee594b
SHA256aac01498850370f2199bdbef9e9ec3cbac992e44b35228424e29a8e5991879f0
SHA512c3409ba8c054bf9ba4e1de9220f1e5d678978f62d361bec3625fa7572c2a6d994213576aabcb7182ece704564ebb6e35eb5ea9bd2542a0657ca5464a68ed5f07
-
Filesize
188KB
MD52b75edf77bdff100bb6faf63e3a81bfb
SHA10e8466157d03bbe1863e3cb5b869e7dc96154dc4
SHA2566fc7d2fec5b6b83619707ebcd58be8a7c788b24865520e514d4f356ecb36a90f
SHA5124183af948fc5c01bfa15f5dd789ed0fcdb4b360606b44405cd7dfa3c23c8f05d47f577a2bd7b5efeaa3d2a43ced34a378ab40ab72339d8c0e3973a4ad0edd6cf
-
Filesize
188KB
MD52b75edf77bdff100bb6faf63e3a81bfb
SHA10e8466157d03bbe1863e3cb5b869e7dc96154dc4
SHA2566fc7d2fec5b6b83619707ebcd58be8a7c788b24865520e514d4f356ecb36a90f
SHA5124183af948fc5c01bfa15f5dd789ed0fcdb4b360606b44405cd7dfa3c23c8f05d47f577a2bd7b5efeaa3d2a43ced34a378ab40ab72339d8c0e3973a4ad0edd6cf
-
Filesize
145KB
MD5edd184e3ce2b8b22acb4eea7515f04cd
SHA10fe0033d96c90afa426ec18a9516657aa35bfe5a
SHA2566bfa60c729690cde26cf3636ad4ff69ef83c69632661c57be8b87aaed9279bb3
SHA5122c45335e3fe68f143396f7553542234ebe77149f5f6d2060242e639f661d7a19d5c1d9b451bd93201daa56c67f8a48e13277328710589abdbb7147cd6253a2e6
-
Filesize
145KB
MD5edd184e3ce2b8b22acb4eea7515f04cd
SHA10fe0033d96c90afa426ec18a9516657aa35bfe5a
SHA2566bfa60c729690cde26cf3636ad4ff69ef83c69632661c57be8b87aaed9279bb3
SHA5122c45335e3fe68f143396f7553542234ebe77149f5f6d2060242e639f661d7a19d5c1d9b451bd93201daa56c67f8a48e13277328710589abdbb7147cd6253a2e6