Analysis
-
max time kernel
136s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2023 19:02
Static task
static1
Behavioral task
behavioral1
Sample
acb40f6b7f7c5efa55d9a7520506e22cd7b6bc2cc44eea8515b6b04385838472.exe
Resource
win10v2004-20230220-en
General
-
Target
acb40f6b7f7c5efa55d9a7520506e22cd7b6bc2cc44eea8515b6b04385838472.exe
-
Size
1.0MB
-
MD5
4c8cd67140779a8d49fa41819bdc2db9
-
SHA1
073609c75ab1f92d63f95631c57e41d4378f7b81
-
SHA256
acb40f6b7f7c5efa55d9a7520506e22cd7b6bc2cc44eea8515b6b04385838472
-
SHA512
94a7dfd6a968173b8ed02a4c7a2a320cc5c361b1fbee2ca81a1bce0bb054cab3a74ecbe0ad0cee58a5182a95d87fe7a189e440734398a82774f5229c946ffae7
-
SSDEEP
24576:7yZU06XLgGtiwM1w6jfiDin2LnVV8faRxfJdGa:uZIbgJwM1vfZSpHvG
Malware Config
Extracted
redline
lizsa
83.97.73.127:19045
-
auth_value
44b0b71b36e78465dbdebb4ecfb78b77
Extracted
redline
metro
83.97.73.127:19045
-
auth_value
f7fd4aa816bdbaad933b45b51d9b6b1a
Signatures
-
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
Processes:
z6265103.exez1943564.exeo4601331.exep0070534.exer5910902.exes6770980.exes6770980.exepid process 1708 z6265103.exe 1768 z1943564.exe 3380 o4601331.exe 1872 p0070534.exe 4772 r5910902.exe 1996 s6770980.exe 4804 s6770980.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
z6265103.exez1943564.exeacb40f6b7f7c5efa55d9a7520506e22cd7b6bc2cc44eea8515b6b04385838472.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z6265103.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z6265103.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z1943564.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z1943564.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce acb40f6b7f7c5efa55d9a7520506e22cd7b6bc2cc44eea8515b6b04385838472.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" acb40f6b7f7c5efa55d9a7520506e22cd7b6bc2cc44eea8515b6b04385838472.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
o4601331.exer5910902.exes6770980.exedescription pid process target process PID 3380 set thread context of 3032 3380 o4601331.exe AppLaunch.exe PID 4772 set thread context of 1236 4772 r5910902.exe AppLaunch.exe PID 1996 set thread context of 4804 1996 s6770980.exe s6770980.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 948 4804 WerFault.exe s6770980.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
AppLaunch.exep0070534.exeAppLaunch.exepid process 3032 AppLaunch.exe 3032 AppLaunch.exe 1872 p0070534.exe 1872 p0070534.exe 1236 AppLaunch.exe 1236 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
AppLaunch.exep0070534.exes6770980.exeAppLaunch.exedescription pid process Token: SeDebugPrivilege 3032 AppLaunch.exe Token: SeDebugPrivilege 1872 p0070534.exe Token: SeDebugPrivilege 1996 s6770980.exe Token: SeDebugPrivilege 1236 AppLaunch.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
s6770980.exepid process 4804 s6770980.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
acb40f6b7f7c5efa55d9a7520506e22cd7b6bc2cc44eea8515b6b04385838472.exez6265103.exez1943564.exeo4601331.exer5910902.exes6770980.exedescription pid process target process PID 1468 wrote to memory of 1708 1468 acb40f6b7f7c5efa55d9a7520506e22cd7b6bc2cc44eea8515b6b04385838472.exe z6265103.exe PID 1468 wrote to memory of 1708 1468 acb40f6b7f7c5efa55d9a7520506e22cd7b6bc2cc44eea8515b6b04385838472.exe z6265103.exe PID 1468 wrote to memory of 1708 1468 acb40f6b7f7c5efa55d9a7520506e22cd7b6bc2cc44eea8515b6b04385838472.exe z6265103.exe PID 1708 wrote to memory of 1768 1708 z6265103.exe z1943564.exe PID 1708 wrote to memory of 1768 1708 z6265103.exe z1943564.exe PID 1708 wrote to memory of 1768 1708 z6265103.exe z1943564.exe PID 1768 wrote to memory of 3380 1768 z1943564.exe o4601331.exe PID 1768 wrote to memory of 3380 1768 z1943564.exe o4601331.exe PID 1768 wrote to memory of 3380 1768 z1943564.exe o4601331.exe PID 3380 wrote to memory of 3032 3380 o4601331.exe AppLaunch.exe PID 3380 wrote to memory of 3032 3380 o4601331.exe AppLaunch.exe PID 3380 wrote to memory of 3032 3380 o4601331.exe AppLaunch.exe PID 3380 wrote to memory of 3032 3380 o4601331.exe AppLaunch.exe PID 3380 wrote to memory of 3032 3380 o4601331.exe AppLaunch.exe PID 1768 wrote to memory of 1872 1768 z1943564.exe p0070534.exe PID 1768 wrote to memory of 1872 1768 z1943564.exe p0070534.exe PID 1768 wrote to memory of 1872 1768 z1943564.exe p0070534.exe PID 1708 wrote to memory of 4772 1708 z6265103.exe r5910902.exe PID 1708 wrote to memory of 4772 1708 z6265103.exe r5910902.exe PID 1708 wrote to memory of 4772 1708 z6265103.exe r5910902.exe PID 4772 wrote to memory of 1236 4772 r5910902.exe AppLaunch.exe PID 4772 wrote to memory of 1236 4772 r5910902.exe AppLaunch.exe PID 4772 wrote to memory of 1236 4772 r5910902.exe AppLaunch.exe PID 4772 wrote to memory of 1236 4772 r5910902.exe AppLaunch.exe PID 4772 wrote to memory of 1236 4772 r5910902.exe AppLaunch.exe PID 1468 wrote to memory of 1996 1468 acb40f6b7f7c5efa55d9a7520506e22cd7b6bc2cc44eea8515b6b04385838472.exe s6770980.exe PID 1468 wrote to memory of 1996 1468 acb40f6b7f7c5efa55d9a7520506e22cd7b6bc2cc44eea8515b6b04385838472.exe s6770980.exe PID 1468 wrote to memory of 1996 1468 acb40f6b7f7c5efa55d9a7520506e22cd7b6bc2cc44eea8515b6b04385838472.exe s6770980.exe PID 1996 wrote to memory of 4804 1996 s6770980.exe s6770980.exe PID 1996 wrote to memory of 4804 1996 s6770980.exe s6770980.exe PID 1996 wrote to memory of 4804 1996 s6770980.exe s6770980.exe PID 1996 wrote to memory of 4804 1996 s6770980.exe s6770980.exe PID 1996 wrote to memory of 4804 1996 s6770980.exe s6770980.exe PID 1996 wrote to memory of 4804 1996 s6770980.exe s6770980.exe PID 1996 wrote to memory of 4804 1996 s6770980.exe s6770980.exe PID 1996 wrote to memory of 4804 1996 s6770980.exe s6770980.exe PID 1996 wrote to memory of 4804 1996 s6770980.exe s6770980.exe PID 1996 wrote to memory of 4804 1996 s6770980.exe s6770980.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\acb40f6b7f7c5efa55d9a7520506e22cd7b6bc2cc44eea8515b6b04385838472.exe"C:\Users\Admin\AppData\Local\Temp\acb40f6b7f7c5efa55d9a7520506e22cd7b6bc2cc44eea8515b6b04385838472.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6265103.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6265103.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1943564.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1943564.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o4601331.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o4601331.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3032
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0070534.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p0070534.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1872
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5910902.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5910902.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1236
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6770980.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6770980.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6770980.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6770980.exe3⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:4804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4804 -s 124⤵
- Program crash
PID:948
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4804 -ip 48041⤵PID:4372
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5916851e072fbabc4796d8916c5131092
SHA1d48a602229a690c512d5fdaf4c8d77547a88e7a2
SHA2567e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d
SHA51207ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521
-
Filesize
964KB
MD5f95879fa5cd3740b62adefac77a762b9
SHA19a1d3ba5fa116789bd8f3bc06fa0132faeb14b49
SHA25623ae0d3005baffb1db97a6452c8065b4e88da2cbfe663d0a5f08d6a101067d34
SHA512dbf8c3057006744b458858412578a8fee4f93a280725bb81faf7440bd0ad61a984b48013f8c8d6f898912fb156b1960d2af1ad991315db1ba02e8060748bb5bb
-
Filesize
964KB
MD5f95879fa5cd3740b62adefac77a762b9
SHA19a1d3ba5fa116789bd8f3bc06fa0132faeb14b49
SHA25623ae0d3005baffb1db97a6452c8065b4e88da2cbfe663d0a5f08d6a101067d34
SHA512dbf8c3057006744b458858412578a8fee4f93a280725bb81faf7440bd0ad61a984b48013f8c8d6f898912fb156b1960d2af1ad991315db1ba02e8060748bb5bb
-
Filesize
964KB
MD5f95879fa5cd3740b62adefac77a762b9
SHA19a1d3ba5fa116789bd8f3bc06fa0132faeb14b49
SHA25623ae0d3005baffb1db97a6452c8065b4e88da2cbfe663d0a5f08d6a101067d34
SHA512dbf8c3057006744b458858412578a8fee4f93a280725bb81faf7440bd0ad61a984b48013f8c8d6f898912fb156b1960d2af1ad991315db1ba02e8060748bb5bb
-
Filesize
616KB
MD534144ffbfdcf0db4172133b7648eb9fb
SHA1cae22088887118e1c215e8864b12144fa4cdca09
SHA25625c528be707ce676bf4a000b8c8383b7476d24eaca9ed65f97f7b627972f9c1f
SHA51212b07919b501dfe3f2c16c2c8876df59e0b1842f66d1edb42e8cfaa3df08471bb324f6768a372d67882259714ceea497692bcd7c9f866c2d3be9349dbe195a9a
-
Filesize
616KB
MD534144ffbfdcf0db4172133b7648eb9fb
SHA1cae22088887118e1c215e8864b12144fa4cdca09
SHA25625c528be707ce676bf4a000b8c8383b7476d24eaca9ed65f97f7b627972f9c1f
SHA51212b07919b501dfe3f2c16c2c8876df59e0b1842f66d1edb42e8cfaa3df08471bb324f6768a372d67882259714ceea497692bcd7c9f866c2d3be9349dbe195a9a
-
Filesize
321KB
MD5061392c1ab7fc28814ab39f7f454582b
SHA12680acb3b638ca4b69f5a7030159bb125e19cb5e
SHA2565b22bee6df6c6f2240bc58c21904769ccc4f018b5b1fc8817368d510c2c79a68
SHA512684d15b661cb9b7c53136c15a8e9b23a48514f3957e8e7a138e13c79b42dc99a387dd3ca8b8cb3d82524a147ff4993ece8b369493a3f186a808a3b37641f4158
-
Filesize
321KB
MD5061392c1ab7fc28814ab39f7f454582b
SHA12680acb3b638ca4b69f5a7030159bb125e19cb5e
SHA2565b22bee6df6c6f2240bc58c21904769ccc4f018b5b1fc8817368d510c2c79a68
SHA512684d15b661cb9b7c53136c15a8e9b23a48514f3957e8e7a138e13c79b42dc99a387dd3ca8b8cb3d82524a147ff4993ece8b369493a3f186a808a3b37641f4158
-
Filesize
281KB
MD53381dad0cabfe5d31ba1071aa9dce1d5
SHA1da5d7620a517665b97612079fee9fadab3435aa3
SHA256d1259d0eb941448fc63c9158fdd2fa24345f1287a411fab7b54da216c4f85259
SHA5121ae50b2774126f6f8c0f31d79c990bc212b1dd9256e12c26f22cfffef69c579713f702b6c9b8fdcbec7a370076510b6c5685e190f3daf4a2c7f6e5d3f741b42a
-
Filesize
281KB
MD53381dad0cabfe5d31ba1071aa9dce1d5
SHA1da5d7620a517665b97612079fee9fadab3435aa3
SHA256d1259d0eb941448fc63c9158fdd2fa24345f1287a411fab7b54da216c4f85259
SHA5121ae50b2774126f6f8c0f31d79c990bc212b1dd9256e12c26f22cfffef69c579713f702b6c9b8fdcbec7a370076510b6c5685e190f3daf4a2c7f6e5d3f741b42a
-
Filesize
164KB
MD56b749e481a9012be68d18afa984723e7
SHA1f7a965922816f34080bcbb5163f561b16698de4c
SHA256852078f3ae52f773019a42c6f60b8ec512de30912357b9d9c8c69a6d3b2403ef
SHA512af0c9c40803eec2d43888e42931cfd8553056a8f4fcfbf8ec1c9f051281f648148a9e2f9a29661e1e670ae0d7e39d3a75673a2be742d971a399e0cabedddd683
-
Filesize
164KB
MD56b749e481a9012be68d18afa984723e7
SHA1f7a965922816f34080bcbb5163f561b16698de4c
SHA256852078f3ae52f773019a42c6f60b8ec512de30912357b9d9c8c69a6d3b2403ef
SHA512af0c9c40803eec2d43888e42931cfd8553056a8f4fcfbf8ec1c9f051281f648148a9e2f9a29661e1e670ae0d7e39d3a75673a2be742d971a399e0cabedddd683
-
Filesize
168KB
MD51aae439bd2e35fc3021176bc8e1fc8be
SHA17a0fe3c2e2ae1867c4af3b4f6405636ad7186c75
SHA256abd528cc052aa7843ae60d5b34e1ecd77c1556f693cc2aefd5080a60c3c04306
SHA512992feb3cbb8db3d47f705b01b5baa752d878376e1911326486da19dc8d22fab76ceae8b24bd64139052d3e0719ef68547d82d26e4867badb1e7ee7258854c687
-
Filesize
168KB
MD51aae439bd2e35fc3021176bc8e1fc8be
SHA17a0fe3c2e2ae1867c4af3b4f6405636ad7186c75
SHA256abd528cc052aa7843ae60d5b34e1ecd77c1556f693cc2aefd5080a60c3c04306
SHA512992feb3cbb8db3d47f705b01b5baa752d878376e1911326486da19dc8d22fab76ceae8b24bd64139052d3e0719ef68547d82d26e4867badb1e7ee7258854c687