Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
25/05/2023, 17:20
Static task
static1
Behavioral task
behavioral1
Sample
fa58ae4baf0e3da30a2e318ee1ca45c27d39c32b4affbaea57dc4237bbee8ded.exe
Resource
win10-20230220-en
General
-
Target
fa58ae4baf0e3da30a2e318ee1ca45c27d39c32b4affbaea57dc4237bbee8ded.exe
-
Size
768KB
-
MD5
38b9105c16c49c40ff3673d08fa168a4
-
SHA1
a25a8d1ec0b9679db5dcf633162ed95b87254702
-
SHA256
fa58ae4baf0e3da30a2e318ee1ca45c27d39c32b4affbaea57dc4237bbee8ded
-
SHA512
4ba87f511edc2dcf788a317ebe4f7c2dfebe9dfa208e01bbfe57468e5d2d407672eeb585119776fb9fa063acd92dbc71d2b23259022f0b6661dd297688e0e315
-
SSDEEP
12288:VMrvy90ikE6G68nZQRuR063TjwIzO+cG3TPZ7ldVABnw3m+fGavbw4WHEvu70T:2yrdnZquaMTjwIKGj/fgw2+Oqw45NT
Malware Config
Extracted
redline
dina
83.97.73.122:19062
-
auth_value
4f77073adc624269de1bff760b9bc471
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 3968 y4098657.exe 1420 y4346922.exe 2068 k7008812.exe 2900 l8789647.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y4098657.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y4346922.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y4346922.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fa58ae4baf0e3da30a2e318ee1ca45c27d39c32b4affbaea57dc4237bbee8ded.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fa58ae4baf0e3da30a2e318ee1ca45c27d39c32b4affbaea57dc4237bbee8ded.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y4098657.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2068 set thread context of 2780 2068 k7008812.exe 70 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2780 AppLaunch.exe 2780 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2780 AppLaunch.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1608 wrote to memory of 3968 1608 fa58ae4baf0e3da30a2e318ee1ca45c27d39c32b4affbaea57dc4237bbee8ded.exe 66 PID 1608 wrote to memory of 3968 1608 fa58ae4baf0e3da30a2e318ee1ca45c27d39c32b4affbaea57dc4237bbee8ded.exe 66 PID 1608 wrote to memory of 3968 1608 fa58ae4baf0e3da30a2e318ee1ca45c27d39c32b4affbaea57dc4237bbee8ded.exe 66 PID 3968 wrote to memory of 1420 3968 y4098657.exe 67 PID 3968 wrote to memory of 1420 3968 y4098657.exe 67 PID 3968 wrote to memory of 1420 3968 y4098657.exe 67 PID 1420 wrote to memory of 2068 1420 y4346922.exe 68 PID 1420 wrote to memory of 2068 1420 y4346922.exe 68 PID 1420 wrote to memory of 2068 1420 y4346922.exe 68 PID 2068 wrote to memory of 2780 2068 k7008812.exe 70 PID 2068 wrote to memory of 2780 2068 k7008812.exe 70 PID 2068 wrote to memory of 2780 2068 k7008812.exe 70 PID 2068 wrote to memory of 2780 2068 k7008812.exe 70 PID 2068 wrote to memory of 2780 2068 k7008812.exe 70 PID 1420 wrote to memory of 2900 1420 y4346922.exe 71 PID 1420 wrote to memory of 2900 1420 y4346922.exe 71 PID 1420 wrote to memory of 2900 1420 y4346922.exe 71
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa58ae4baf0e3da30a2e318ee1ca45c27d39c32b4affbaea57dc4237bbee8ded.exe"C:\Users\Admin\AppData\Local\Temp\fa58ae4baf0e3da30a2e318ee1ca45c27d39c32b4affbaea57dc4237bbee8ded.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4098657.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4098657.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4346922.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y4346922.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k7008812.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k7008812.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l8789647.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l8789647.exe4⤵
- Executes dropped EXE
PID:2900
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
449KB
MD52b3565e3be576188611c3c769e49c4ba
SHA128e0e93b6bc5bce030439bab2dc777ee3b4fbb9d
SHA256ea6d659776324ccb54e027904b233578532b915be5ee006e209bad27a314b646
SHA5122f95e1d396e6e2f54b9d87277936529647db4cec7624ba2cc40285b5b5b872b79a28529270ceeab4e4443bcc9346c0bc98690fc0105dd3f207fcc36e2225c625
-
Filesize
449KB
MD52b3565e3be576188611c3c769e49c4ba
SHA128e0e93b6bc5bce030439bab2dc777ee3b4fbb9d
SHA256ea6d659776324ccb54e027904b233578532b915be5ee006e209bad27a314b646
SHA5122f95e1d396e6e2f54b9d87277936529647db4cec7624ba2cc40285b5b5b872b79a28529270ceeab4e4443bcc9346c0bc98690fc0105dd3f207fcc36e2225c625
-
Filesize
277KB
MD5cbfe05e4f9026e433a0889db60b04e50
SHA1cf3ca1d58036370e450550a85404455d82c51005
SHA2569c6378ac14bbda0c9528ea1795c79df4a6bb407e9b97d7ff628076ca52b35fb1
SHA51281d5ab4cb3bcb604ded176b0a4d351ccd6e166f62cba4675718db923aa2f10c52b195666e1b916cd700989ab31116247930741259018e7dceaa8b0d1afa8e765
-
Filesize
277KB
MD5cbfe05e4f9026e433a0889db60b04e50
SHA1cf3ca1d58036370e450550a85404455d82c51005
SHA2569c6378ac14bbda0c9528ea1795c79df4a6bb407e9b97d7ff628076ca52b35fb1
SHA51281d5ab4cb3bcb604ded176b0a4d351ccd6e166f62cba4675718db923aa2f10c52b195666e1b916cd700989ab31116247930741259018e7dceaa8b0d1afa8e765
-
Filesize
188KB
MD5f10adc1c54a41e09550fe70c8f3b29b8
SHA111c586b64dd9c5e8659dca82435e79c444c4feb8
SHA256ec83b909f627792cb40943acd1f2e2fb9437597bec70a99f899b5bcb276e2f5b
SHA512e938bac47b7ce460cd0e0069dda726a9c89dc6a4ba208371be386e9c3c80d6e2ef683c14b1676534d55aae1cb80a2fa29702f42aa6f675e7c51d3a79c474a813
-
Filesize
188KB
MD5f10adc1c54a41e09550fe70c8f3b29b8
SHA111c586b64dd9c5e8659dca82435e79c444c4feb8
SHA256ec83b909f627792cb40943acd1f2e2fb9437597bec70a99f899b5bcb276e2f5b
SHA512e938bac47b7ce460cd0e0069dda726a9c89dc6a4ba208371be386e9c3c80d6e2ef683c14b1676534d55aae1cb80a2fa29702f42aa6f675e7c51d3a79c474a813
-
Filesize
145KB
MD5527d627fe8475d34f1eb0ca5131f7bc9
SHA1b8677a17726846cbc8daed644b2ded7ec67a14e2
SHA256a904c4efcee9ec118b77fb721d2887fc02b5be6c593e8ae21cb8e12bcd586fcd
SHA5124646b72ececf3a04cd753b98242385b0ac28ba5be9df2fec7f9da2f8ad3d534156adc2b7080b7bff47cc194d582a448db765bbac8d60d1466f7d3553d95c20a2
-
Filesize
145KB
MD5527d627fe8475d34f1eb0ca5131f7bc9
SHA1b8677a17726846cbc8daed644b2ded7ec67a14e2
SHA256a904c4efcee9ec118b77fb721d2887fc02b5be6c593e8ae21cb8e12bcd586fcd
SHA5124646b72ececf3a04cd753b98242385b0ac28ba5be9df2fec7f9da2f8ad3d534156adc2b7080b7bff47cc194d582a448db765bbac8d60d1466f7d3553d95c20a2