Analysis
-
max time kernel
53s -
max time network
65s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
30-05-2023 11:25
Static task
static1
Behavioral task
behavioral1
Sample
6111b9a6a3f1fb6bf6c76aa7eb64a8a2133b0a4cac1f35c62b4a667db4a5b72e.exe
Resource
win10-20230220-en
General
-
Target
6111b9a6a3f1fb6bf6c76aa7eb64a8a2133b0a4cac1f35c62b4a667db4a5b72e.exe
-
Size
1.0MB
-
MD5
9ff1722f6b4e169a30a82d4500135204
-
SHA1
1519bc565da9e59e8904eecb1ea8cd2ce4beec1a
-
SHA256
6111b9a6a3f1fb6bf6c76aa7eb64a8a2133b0a4cac1f35c62b4a667db4a5b72e
-
SHA512
3f6c9f93bed34779b1113df5f8e0c2ecfb9bb976fa751d154362f232b7b9b6f2f50bd395ce9c478c2d37327f143f8abc8cac49434176cacdc63ce8ba07a613b8
-
SSDEEP
12288:5Mrby901+gBKg+AyyoR7VP9mNIKnkwENqq7/JYPOJseRkUTqb9ryD528Tm6mB/Hp:Kyjrg+q8MIKnEnBrRaWTmjkYqTaTVr
Malware Config
Extracted
redline
liza
83.97.73.127:19045
-
auth_value
198e3e9b188d6cfab0a2b0fb100bb7c5
Extracted
redline
ronin
83.97.73.127:19045
-
auth_value
4cce855f5ba9b9b6e5b1400f102745de
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 3048 z2884016.exe 5072 z2383905.exe 2056 o0822401.exe 4792 p5667858.exe 4988 r6257322.exe 488 s0731098.exe 4884 s0731098.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z2383905.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6111b9a6a3f1fb6bf6c76aa7eb64a8a2133b0a4cac1f35c62b4a667db4a5b72e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6111b9a6a3f1fb6bf6c76aa7eb64a8a2133b0a4cac1f35c62b4a667db4a5b72e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z2884016.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z2884016.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z2383905.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2056 set thread context of 4224 2056 o0822401.exe 70 PID 4988 set thread context of 780 4988 r6257322.exe 75 PID 488 set thread context of 4884 488 s0731098.exe 77 -
Program crash 1 IoCs
pid pid_target Process procid_target 4404 4884 WerFault.exe 77 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4224 AppLaunch.exe 4224 AppLaunch.exe 4792 p5667858.exe 4792 p5667858.exe 780 AppLaunch.exe 780 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4224 AppLaunch.exe Token: SeDebugPrivilege 4792 p5667858.exe Token: SeDebugPrivilege 488 s0731098.exe Token: SeDebugPrivilege 780 AppLaunch.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2532 wrote to memory of 3048 2532 6111b9a6a3f1fb6bf6c76aa7eb64a8a2133b0a4cac1f35c62b4a667db4a5b72e.exe 66 PID 2532 wrote to memory of 3048 2532 6111b9a6a3f1fb6bf6c76aa7eb64a8a2133b0a4cac1f35c62b4a667db4a5b72e.exe 66 PID 2532 wrote to memory of 3048 2532 6111b9a6a3f1fb6bf6c76aa7eb64a8a2133b0a4cac1f35c62b4a667db4a5b72e.exe 66 PID 3048 wrote to memory of 5072 3048 z2884016.exe 67 PID 3048 wrote to memory of 5072 3048 z2884016.exe 67 PID 3048 wrote to memory of 5072 3048 z2884016.exe 67 PID 5072 wrote to memory of 2056 5072 z2383905.exe 68 PID 5072 wrote to memory of 2056 5072 z2383905.exe 68 PID 5072 wrote to memory of 2056 5072 z2383905.exe 68 PID 2056 wrote to memory of 4224 2056 o0822401.exe 70 PID 2056 wrote to memory of 4224 2056 o0822401.exe 70 PID 2056 wrote to memory of 4224 2056 o0822401.exe 70 PID 2056 wrote to memory of 4224 2056 o0822401.exe 70 PID 2056 wrote to memory of 4224 2056 o0822401.exe 70 PID 5072 wrote to memory of 4792 5072 z2383905.exe 71 PID 5072 wrote to memory of 4792 5072 z2383905.exe 71 PID 5072 wrote to memory of 4792 5072 z2383905.exe 71 PID 3048 wrote to memory of 4988 3048 z2884016.exe 73 PID 3048 wrote to memory of 4988 3048 z2884016.exe 73 PID 3048 wrote to memory of 4988 3048 z2884016.exe 73 PID 4988 wrote to memory of 780 4988 r6257322.exe 75 PID 4988 wrote to memory of 780 4988 r6257322.exe 75 PID 4988 wrote to memory of 780 4988 r6257322.exe 75 PID 4988 wrote to memory of 780 4988 r6257322.exe 75 PID 4988 wrote to memory of 780 4988 r6257322.exe 75 PID 2532 wrote to memory of 488 2532 6111b9a6a3f1fb6bf6c76aa7eb64a8a2133b0a4cac1f35c62b4a667db4a5b72e.exe 76 PID 2532 wrote to memory of 488 2532 6111b9a6a3f1fb6bf6c76aa7eb64a8a2133b0a4cac1f35c62b4a667db4a5b72e.exe 76 PID 2532 wrote to memory of 488 2532 6111b9a6a3f1fb6bf6c76aa7eb64a8a2133b0a4cac1f35c62b4a667db4a5b72e.exe 76 PID 488 wrote to memory of 4884 488 s0731098.exe 77 PID 488 wrote to memory of 4884 488 s0731098.exe 77 PID 488 wrote to memory of 4884 488 s0731098.exe 77 PID 488 wrote to memory of 4884 488 s0731098.exe 77 PID 488 wrote to memory of 4884 488 s0731098.exe 77 PID 488 wrote to memory of 4884 488 s0731098.exe 77 PID 488 wrote to memory of 4884 488 s0731098.exe 77 PID 488 wrote to memory of 4884 488 s0731098.exe 77 PID 488 wrote to memory of 4884 488 s0731098.exe 77 PID 488 wrote to memory of 4884 488 s0731098.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\6111b9a6a3f1fb6bf6c76aa7eb64a8a2133b0a4cac1f35c62b4a667db4a5b72e.exe"C:\Users\Admin\AppData\Local\Temp\6111b9a6a3f1fb6bf6c76aa7eb64a8a2133b0a4cac1f35c62b4a667db4a5b72e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2884016.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2884016.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2383905.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z2383905.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0822401.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0822401.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4224
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p5667858.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p5667858.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4792
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6257322.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6257322.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:780
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0731098.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0731098.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:488 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0731098.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0731098.exe3⤵
- Executes dropped EXE
PID:4884 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4884 -s 244⤵
- Program crash
PID:4404
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD5957779c42144282d8cd83192b8fbc7cf
SHA1de83d08d2cca06b9ff3d1ef239d6b60b705d25fe
SHA2560d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51
SHA512f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd
-
Filesize
964KB
MD5824b86ae7273ed68070bb10f9ad7dbfa
SHA1c34487fc268adefbdab3f88004aef64c1830d071
SHA256a7266213ccbe0b780e13c67acf50903c8c7ed2269a685802f805fedbfcff280e
SHA512146a6a39d44715bf1f844f072672195304ffd58c97213b68616fe753a0983474fb2f807bf85d15520a47f27b8e76823a0704f851470fc8fce22176790b1e4127
-
Filesize
964KB
MD5824b86ae7273ed68070bb10f9ad7dbfa
SHA1c34487fc268adefbdab3f88004aef64c1830d071
SHA256a7266213ccbe0b780e13c67acf50903c8c7ed2269a685802f805fedbfcff280e
SHA512146a6a39d44715bf1f844f072672195304ffd58c97213b68616fe753a0983474fb2f807bf85d15520a47f27b8e76823a0704f851470fc8fce22176790b1e4127
-
Filesize
964KB
MD5824b86ae7273ed68070bb10f9ad7dbfa
SHA1c34487fc268adefbdab3f88004aef64c1830d071
SHA256a7266213ccbe0b780e13c67acf50903c8c7ed2269a685802f805fedbfcff280e
SHA512146a6a39d44715bf1f844f072672195304ffd58c97213b68616fe753a0983474fb2f807bf85d15520a47f27b8e76823a0704f851470fc8fce22176790b1e4127
-
Filesize
580KB
MD57bc0628542b150aa26d4fe996d3f068b
SHA1390014bf295a3fb51c021a082bbbfc06d8ef3456
SHA2569c08e127f2b3cbee1deafd240d4a9117809c6613737c29a63758446a8bf757d3
SHA5126270daa81bb89a46fdc8d1833354f7094b435169ce6419f91ca072b614fd469509d8b9c3e0ef89c138f3574e0a219c0cf21952cb8fb6b6d9ca72290e180bbcff
-
Filesize
580KB
MD57bc0628542b150aa26d4fe996d3f068b
SHA1390014bf295a3fb51c021a082bbbfc06d8ef3456
SHA2569c08e127f2b3cbee1deafd240d4a9117809c6613737c29a63758446a8bf757d3
SHA5126270daa81bb89a46fdc8d1833354f7094b435169ce6419f91ca072b614fd469509d8b9c3e0ef89c138f3574e0a219c0cf21952cb8fb6b6d9ca72290e180bbcff
-
Filesize
327KB
MD567f7e1ada2460e46fee17ab75064cf0f
SHA1643886aebafde0935a4b64011f01142b631f46ef
SHA256e0c5b826f9a403ae6f6b6c73f0f25514d53540ff0bc337554f27b5eb29a51729
SHA512e00e9d4cf443a1086e7943df993fd43520465d22b61f4ca372099ebacb2d93490520970daff763bdd2631093b572b4dfe8ce1cb28ee20c8bdaaad628b5e440fd
-
Filesize
327KB
MD567f7e1ada2460e46fee17ab75064cf0f
SHA1643886aebafde0935a4b64011f01142b631f46ef
SHA256e0c5b826f9a403ae6f6b6c73f0f25514d53540ff0bc337554f27b5eb29a51729
SHA512e00e9d4cf443a1086e7943df993fd43520465d22b61f4ca372099ebacb2d93490520970daff763bdd2631093b572b4dfe8ce1cb28ee20c8bdaaad628b5e440fd
-
Filesize
281KB
MD53a0f6c868bb6eeca8f47ab064f0f03e8
SHA15e5d7917f6a241a0f22578169c6e0fee8d50e699
SHA25606698e624ef2d9ad7d2033266550db50a8dcc7f647008848d7d99b5d71653e5c
SHA512952a1f8b62f2ce5a092842a8bcd9b9e69c043fa76e3a91cc595cf72cd93fc14f462c27cff2eff8f85f9726209562c7486e6d1ae732bcc513f4c2e98da14ea993
-
Filesize
281KB
MD53a0f6c868bb6eeca8f47ab064f0f03e8
SHA15e5d7917f6a241a0f22578169c6e0fee8d50e699
SHA25606698e624ef2d9ad7d2033266550db50a8dcc7f647008848d7d99b5d71653e5c
SHA512952a1f8b62f2ce5a092842a8bcd9b9e69c043fa76e3a91cc595cf72cd93fc14f462c27cff2eff8f85f9726209562c7486e6d1ae732bcc513f4c2e98da14ea993
-
Filesize
170KB
MD5b7dbfd41d8301bd1f3f4bfc180afb87c
SHA156a49d9d60fa9f58367122df032eb3db9b8bae37
SHA256ce3ef8673e4bb3bc1950674372bbeece5b8e7893489f078ee2f187fcbc149c5d
SHA512c9a62c5176d2d2ea4185c48b08ea807bfe17be0f095c2da774a79a4132943c70a6e31c1c345e25b4267487bf4d25dd693202dc7899684af3c62869f3865e369a
-
Filesize
170KB
MD5b7dbfd41d8301bd1f3f4bfc180afb87c
SHA156a49d9d60fa9f58367122df032eb3db9b8bae37
SHA256ce3ef8673e4bb3bc1950674372bbeece5b8e7893489f078ee2f187fcbc149c5d
SHA512c9a62c5176d2d2ea4185c48b08ea807bfe17be0f095c2da774a79a4132943c70a6e31c1c345e25b4267487bf4d25dd693202dc7899684af3c62869f3865e369a
-
Filesize
168KB
MD54ff533500739036406a0984173a4fd01
SHA144730ea21f0ca5df19fece305f45b124b2e97852
SHA25689671d6f96a07c5cd6277e12145b4276695df4ddaaa58f9de8c8f6c23b358e49
SHA5127e195496e7bae0e52f799a09f45427e9c92360c63732b12211193c88bb89c74f73a01e38415cccf373fc809c62a942dd754c923e4576f7e211e6004e3a6c302a
-
Filesize
168KB
MD54ff533500739036406a0984173a4fd01
SHA144730ea21f0ca5df19fece305f45b124b2e97852
SHA25689671d6f96a07c5cd6277e12145b4276695df4ddaaa58f9de8c8f6c23b358e49
SHA5127e195496e7bae0e52f799a09f45427e9c92360c63732b12211193c88bb89c74f73a01e38415cccf373fc809c62a942dd754c923e4576f7e211e6004e3a6c302a