Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2023 17:05
Static task
static1
Behavioral task
behavioral1
Sample
4a9a3a0e474dc681e7b572c15b49f9265d02258060cd7292d392042ef2771f43.exe
Resource
win10v2004-20230220-en
General
-
Target
4a9a3a0e474dc681e7b572c15b49f9265d02258060cd7292d392042ef2771f43.exe
-
Size
1.0MB
-
MD5
b5af04c07d82fe27eecbf9247e267c42
-
SHA1
1245e033e5203acd9fac73392c52f38474a5a798
-
SHA256
4a9a3a0e474dc681e7b572c15b49f9265d02258060cd7292d392042ef2771f43
-
SHA512
c886a02e9721b2249e571256cfa781315e024e41af91ad2b7202763ee31dbc0f2a08b2aadb91bad86fb23ba6f2053358baf4148eb0b638e66b9fc496a14c9c71
-
SSDEEP
24576:Yy5W1mvQwRX4rjvtN8+OMtFd2k9fnqszSS+TPXo9DFgut8j:fMCRX4rbv8xyzXYMrt
Malware Config
Extracted
redline
lizsa
83.97.73.127:19045
-
auth_value
44b0b71b36e78465dbdebb4ecfb78b77
Extracted
redline
metro
83.97.73.127:19045
-
auth_value
f7fd4aa816bdbaad933b45b51d9b6b1a
Signatures
-
Processes:
AppLaunch.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
Processes:
z0207462.exez8603922.exeo3803543.exep9863153.exer0918054.exes3455351.exes3455351.exepid process 3096 z0207462.exe 4444 z8603922.exe 1240 o3803543.exe 4060 p9863153.exe 5028 r0918054.exe 844 s3455351.exe 3728 s3455351.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
4a9a3a0e474dc681e7b572c15b49f9265d02258060cd7292d392042ef2771f43.exez0207462.exez8603922.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4a9a3a0e474dc681e7b572c15b49f9265d02258060cd7292d392042ef2771f43.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z0207462.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z0207462.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z8603922.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z8603922.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4a9a3a0e474dc681e7b572c15b49f9265d02258060cd7292d392042ef2771f43.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
o3803543.exer0918054.exes3455351.exedescription pid process target process PID 1240 set thread context of 1396 1240 o3803543.exe AppLaunch.exe PID 5028 set thread context of 2776 5028 r0918054.exe AppLaunch.exe PID 844 set thread context of 3728 844 s3455351.exe s3455351.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4468 3728 WerFault.exe s3455351.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
AppLaunch.exep9863153.exeAppLaunch.exepid process 1396 AppLaunch.exe 1396 AppLaunch.exe 4060 p9863153.exe 4060 p9863153.exe 2776 AppLaunch.exe 2776 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
AppLaunch.exep9863153.exes3455351.exeAppLaunch.exedescription pid process Token: SeDebugPrivilege 1396 AppLaunch.exe Token: SeDebugPrivilege 4060 p9863153.exe Token: SeDebugPrivilege 844 s3455351.exe Token: SeDebugPrivilege 2776 AppLaunch.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
s3455351.exepid process 3728 s3455351.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
4a9a3a0e474dc681e7b572c15b49f9265d02258060cd7292d392042ef2771f43.exez0207462.exez8603922.exeo3803543.exer0918054.exes3455351.exedescription pid process target process PID 916 wrote to memory of 3096 916 4a9a3a0e474dc681e7b572c15b49f9265d02258060cd7292d392042ef2771f43.exe z0207462.exe PID 916 wrote to memory of 3096 916 4a9a3a0e474dc681e7b572c15b49f9265d02258060cd7292d392042ef2771f43.exe z0207462.exe PID 916 wrote to memory of 3096 916 4a9a3a0e474dc681e7b572c15b49f9265d02258060cd7292d392042ef2771f43.exe z0207462.exe PID 3096 wrote to memory of 4444 3096 z0207462.exe z8603922.exe PID 3096 wrote to memory of 4444 3096 z0207462.exe z8603922.exe PID 3096 wrote to memory of 4444 3096 z0207462.exe z8603922.exe PID 4444 wrote to memory of 1240 4444 z8603922.exe o3803543.exe PID 4444 wrote to memory of 1240 4444 z8603922.exe o3803543.exe PID 4444 wrote to memory of 1240 4444 z8603922.exe o3803543.exe PID 1240 wrote to memory of 1396 1240 o3803543.exe AppLaunch.exe PID 1240 wrote to memory of 1396 1240 o3803543.exe AppLaunch.exe PID 1240 wrote to memory of 1396 1240 o3803543.exe AppLaunch.exe PID 1240 wrote to memory of 1396 1240 o3803543.exe AppLaunch.exe PID 1240 wrote to memory of 1396 1240 o3803543.exe AppLaunch.exe PID 4444 wrote to memory of 4060 4444 z8603922.exe p9863153.exe PID 4444 wrote to memory of 4060 4444 z8603922.exe p9863153.exe PID 4444 wrote to memory of 4060 4444 z8603922.exe p9863153.exe PID 3096 wrote to memory of 5028 3096 z0207462.exe r0918054.exe PID 3096 wrote to memory of 5028 3096 z0207462.exe r0918054.exe PID 3096 wrote to memory of 5028 3096 z0207462.exe r0918054.exe PID 5028 wrote to memory of 2776 5028 r0918054.exe AppLaunch.exe PID 5028 wrote to memory of 2776 5028 r0918054.exe AppLaunch.exe PID 5028 wrote to memory of 2776 5028 r0918054.exe AppLaunch.exe PID 5028 wrote to memory of 2776 5028 r0918054.exe AppLaunch.exe PID 5028 wrote to memory of 2776 5028 r0918054.exe AppLaunch.exe PID 916 wrote to memory of 844 916 4a9a3a0e474dc681e7b572c15b49f9265d02258060cd7292d392042ef2771f43.exe s3455351.exe PID 916 wrote to memory of 844 916 4a9a3a0e474dc681e7b572c15b49f9265d02258060cd7292d392042ef2771f43.exe s3455351.exe PID 916 wrote to memory of 844 916 4a9a3a0e474dc681e7b572c15b49f9265d02258060cd7292d392042ef2771f43.exe s3455351.exe PID 844 wrote to memory of 3728 844 s3455351.exe s3455351.exe PID 844 wrote to memory of 3728 844 s3455351.exe s3455351.exe PID 844 wrote to memory of 3728 844 s3455351.exe s3455351.exe PID 844 wrote to memory of 3728 844 s3455351.exe s3455351.exe PID 844 wrote to memory of 3728 844 s3455351.exe s3455351.exe PID 844 wrote to memory of 3728 844 s3455351.exe s3455351.exe PID 844 wrote to memory of 3728 844 s3455351.exe s3455351.exe PID 844 wrote to memory of 3728 844 s3455351.exe s3455351.exe PID 844 wrote to memory of 3728 844 s3455351.exe s3455351.exe PID 844 wrote to memory of 3728 844 s3455351.exe s3455351.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a9a3a0e474dc681e7b572c15b49f9265d02258060cd7292d392042ef2771f43.exe"C:\Users\Admin\AppData\Local\Temp\4a9a3a0e474dc681e7b572c15b49f9265d02258060cd7292d392042ef2771f43.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0207462.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0207462.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8603922.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8603922.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o3803543.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o3803543.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9863153.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9863153.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r0918054.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r0918054.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s3455351.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s3455351.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s3455351.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s3455351.exe3⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 124⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3728 -ip 37281⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.logFilesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s3455351.exeFilesize
964KB
MD5d2f5668b909940c3245af1b8ad202007
SHA1dd25b60587632e72bcd5f98268e5dbbc238daa75
SHA25681507d1fb2e0a441906b58aebc37ac5a461e219da5a9a9df666c47a7b391fafa
SHA5126787bdf146e12ce9e2ebb2498890670ff000b4ca6f5d34d2e28192884bebc39bfd610274715e2b381f7c0842c85e2da622a8cf760bbcc288f285d39f2546b774
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s3455351.exeFilesize
964KB
MD5d2f5668b909940c3245af1b8ad202007
SHA1dd25b60587632e72bcd5f98268e5dbbc238daa75
SHA25681507d1fb2e0a441906b58aebc37ac5a461e219da5a9a9df666c47a7b391fafa
SHA5126787bdf146e12ce9e2ebb2498890670ff000b4ca6f5d34d2e28192884bebc39bfd610274715e2b381f7c0842c85e2da622a8cf760bbcc288f285d39f2546b774
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s3455351.exeFilesize
964KB
MD5d2f5668b909940c3245af1b8ad202007
SHA1dd25b60587632e72bcd5f98268e5dbbc238daa75
SHA25681507d1fb2e0a441906b58aebc37ac5a461e219da5a9a9df666c47a7b391fafa
SHA5126787bdf146e12ce9e2ebb2498890670ff000b4ca6f5d34d2e28192884bebc39bfd610274715e2b381f7c0842c85e2da622a8cf760bbcc288f285d39f2546b774
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0207462.exeFilesize
616KB
MD56bdbdd9e59b374d3fcbf514a3f7cfc56
SHA1632c24870445278417f2c7176754bf05ac14f5af
SHA256ae9d7ef36617fc2b18d9bd6b4e09c1d992f2c63437fc7cece5325bed83ef94c4
SHA5120af3c5e9661edf9c0ffa38e9d26e36b7b6c07f2f61c98e58211924aa5d7991c7853c237be1d073d596df9ef975b2df01120993d2d55141973d9b4d7a59f19e54
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0207462.exeFilesize
616KB
MD56bdbdd9e59b374d3fcbf514a3f7cfc56
SHA1632c24870445278417f2c7176754bf05ac14f5af
SHA256ae9d7ef36617fc2b18d9bd6b4e09c1d992f2c63437fc7cece5325bed83ef94c4
SHA5120af3c5e9661edf9c0ffa38e9d26e36b7b6c07f2f61c98e58211924aa5d7991c7853c237be1d073d596df9ef975b2df01120993d2d55141973d9b4d7a59f19e54
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r0918054.exeFilesize
321KB
MD5afac66227495ec55b2908224ce63a848
SHA1eb2204cd5a7b93f72f530268388e44a9c736ecce
SHA256d20f36297176875afc546ea75be237ee7fbe4d579d64a8f735f181b19cb862cd
SHA512028affe84fdf9300cf7589023d03207c3d63e6c478efb9352e2464789b460ef17451a8f747c29d6b3f11afe95b0e173782362a3e16605fba526f8391df6392c8
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r0918054.exeFilesize
321KB
MD5afac66227495ec55b2908224ce63a848
SHA1eb2204cd5a7b93f72f530268388e44a9c736ecce
SHA256d20f36297176875afc546ea75be237ee7fbe4d579d64a8f735f181b19cb862cd
SHA512028affe84fdf9300cf7589023d03207c3d63e6c478efb9352e2464789b460ef17451a8f747c29d6b3f11afe95b0e173782362a3e16605fba526f8391df6392c8
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8603922.exeFilesize
281KB
MD5e9ea682b52741feec9b12d08216e2cde
SHA1fe598bb204361b962d0bb10ace334cad8c0ec9b0
SHA256c5b2ef20d2a18c1dbb75124c86b720b3d8e363d944daf9497ef6f75f08309d1a
SHA512f85dfd97b6fdc15a4dc1fa068b703362c6cdbdac551717a47f8ea7e39da929b69f937172c77d170cd3419d1cdd8c50b1d25a81eeca6a29c84d222da8378252a5
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8603922.exeFilesize
281KB
MD5e9ea682b52741feec9b12d08216e2cde
SHA1fe598bb204361b962d0bb10ace334cad8c0ec9b0
SHA256c5b2ef20d2a18c1dbb75124c86b720b3d8e363d944daf9497ef6f75f08309d1a
SHA512f85dfd97b6fdc15a4dc1fa068b703362c6cdbdac551717a47f8ea7e39da929b69f937172c77d170cd3419d1cdd8c50b1d25a81eeca6a29c84d222da8378252a5
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o3803543.exeFilesize
164KB
MD51b436af645c0700065530c1fdcffcf64
SHA1e130df27c1266e5c3d7da8a48ff4c4decaff9ee0
SHA256875c505f293ad3b3ccc12b5906e423947bb680b1f11704fb44816761acea879b
SHA512c51241788f336c347a058c8fa95ee3cf55725e79a560ac6153e3ecff54280f2bb624343c28302eb7273009c64b18acac3923832aff8c2c54c62103d9710ff888
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o3803543.exeFilesize
164KB
MD51b436af645c0700065530c1fdcffcf64
SHA1e130df27c1266e5c3d7da8a48ff4c4decaff9ee0
SHA256875c505f293ad3b3ccc12b5906e423947bb680b1f11704fb44816761acea879b
SHA512c51241788f336c347a058c8fa95ee3cf55725e79a560ac6153e3ecff54280f2bb624343c28302eb7273009c64b18acac3923832aff8c2c54c62103d9710ff888
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9863153.exeFilesize
168KB
MD5d10a8921da333801a5f449b647656ea9
SHA1b12f7599c8277e7c950d3a5356a0fedf1ec369c1
SHA2564d12f2b476f59af51df38baf68f87e10475134a4e29aa3b07f00b1ece60b0197
SHA5120d7d3488bfadee356e8e6ca2e832713510d9056e179bf9cd91e841faa863190f54cd25b2e66185367387570750fa2578eb99f8f1cc65f35b114ccd5b8e88847f
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p9863153.exeFilesize
168KB
MD5d10a8921da333801a5f449b647656ea9
SHA1b12f7599c8277e7c950d3a5356a0fedf1ec369c1
SHA2564d12f2b476f59af51df38baf68f87e10475134a4e29aa3b07f00b1ece60b0197
SHA5120d7d3488bfadee356e8e6ca2e832713510d9056e179bf9cd91e841faa863190f54cd25b2e66185367387570750fa2578eb99f8f1cc65f35b114ccd5b8e88847f
-
memory/844-194-0x0000000007390000-0x00000000073A0000-memory.dmpFilesize
64KB
-
memory/844-192-0x0000000000600000-0x00000000006F8000-memory.dmpFilesize
992KB
-
memory/1396-155-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/2776-183-0x0000000000410000-0x000000000043E000-memory.dmpFilesize
184KB
-
memory/2776-193-0x0000000004980000-0x0000000004990000-memory.dmpFilesize
64KB
-
memory/3728-198-0x0000000000370000-0x0000000000370000-memory.dmp
-
memory/3728-195-0x0000000000400000-0x0000000000438000-memory.dmpFilesize
224KB
-
memory/4060-173-0x0000000005C40000-0x0000000005C90000-memory.dmpFilesize
320KB
-
memory/4060-163-0x0000000000010000-0x000000000003E000-memory.dmpFilesize
184KB
-
memory/4060-167-0x0000000004B00000-0x0000000004B3C000-memory.dmpFilesize
240KB
-
memory/4060-166-0x0000000004990000-0x00000000049A2000-memory.dmpFilesize
72KB
-
memory/4060-176-0x0000000005F70000-0x0000000006132000-memory.dmpFilesize
1.8MB
-
memory/4060-165-0x0000000004BD0000-0x0000000004CDA000-memory.dmpFilesize
1.0MB
-
memory/4060-164-0x00000000050E0000-0x00000000056F8000-memory.dmpFilesize
6.1MB
-
memory/4060-177-0x0000000008370000-0x000000000889C000-memory.dmpFilesize
5.2MB
-
memory/4060-175-0x00000000049B0000-0x00000000049C0000-memory.dmpFilesize
64KB
-
memory/4060-168-0x00000000049B0000-0x00000000049C0000-memory.dmpFilesize
64KB
-
memory/4060-172-0x00000000061A0000-0x0000000006744000-memory.dmpFilesize
5.6MB
-
memory/4060-171-0x0000000004E90000-0x0000000004EF6000-memory.dmpFilesize
408KB
-
memory/4060-170-0x0000000004F30000-0x0000000004FC2000-memory.dmpFilesize
584KB
-
memory/4060-169-0x0000000004E10000-0x0000000004E86000-memory.dmpFilesize
472KB