Analysis
-
max time kernel
136s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2023, 12:39
Static task
static1
Behavioral task
behavioral1
Sample
08431499.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
08431499.exe
Resource
win10v2004-20230221-en
General
-
Target
08431499.exe
-
Size
778KB
-
MD5
9c79d66839648790644b9fd1120aa08d
-
SHA1
0ff6a6076233097a4ce2a9c49f39d11f540becc1
-
SHA256
a12dd546e54d84d55eddaa14e045718f345bec3edf54cc55a78ae9fe26d26cb8
-
SHA512
01fb349021b6a0a1da3c200e00f7ad64ef4989ff3638cfca5f70c0073519d718a8461096aa87a8fc2a62db90c3f7e6c48bd3fb2f868b073f779f6d012a58e8f7
-
SSDEEP
12288:/Mrey90e7fJgds3Cf4Q/Xwhr/uZFY3k9RAbP+C+R3llDXAuAxRFk:Fy7TJrSAQvy/ubYwRs+hpllsuh
Malware Config
Extracted
redline
dusa
83.97.73.126:19046
-
auth_value
ee896466545fedf9de5406175fb82de5
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 4780 y1560467.exe 5048 y5618804.exe 3264 k3868894.exe 2496 l6816319.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y5618804.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 08431499.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 08431499.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y1560467.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y1560467.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y5618804.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3264 set thread context of 3576 3264 k3868894.exe 87 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3576 AppLaunch.exe 3576 AppLaunch.exe 2496 l6816319.exe 2496 l6816319.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3576 AppLaunch.exe Token: SeDebugPrivilege 2496 l6816319.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1464 wrote to memory of 4780 1464 08431499.exe 83 PID 1464 wrote to memory of 4780 1464 08431499.exe 83 PID 1464 wrote to memory of 4780 1464 08431499.exe 83 PID 4780 wrote to memory of 5048 4780 y1560467.exe 84 PID 4780 wrote to memory of 5048 4780 y1560467.exe 84 PID 4780 wrote to memory of 5048 4780 y1560467.exe 84 PID 5048 wrote to memory of 3264 5048 y5618804.exe 85 PID 5048 wrote to memory of 3264 5048 y5618804.exe 85 PID 5048 wrote to memory of 3264 5048 y5618804.exe 85 PID 3264 wrote to memory of 3576 3264 k3868894.exe 87 PID 3264 wrote to memory of 3576 3264 k3868894.exe 87 PID 3264 wrote to memory of 3576 3264 k3868894.exe 87 PID 3264 wrote to memory of 3576 3264 k3868894.exe 87 PID 3264 wrote to memory of 3576 3264 k3868894.exe 87 PID 5048 wrote to memory of 2496 5048 y5618804.exe 88 PID 5048 wrote to memory of 2496 5048 y5618804.exe 88 PID 5048 wrote to memory of 2496 5048 y5618804.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\08431499.exe"C:\Users\Admin\AppData\Local\Temp\08431499.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1560467.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1560467.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5618804.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y5618804.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k3868894.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k3868894.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3576
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l6816319.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l6816319.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2496
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
448KB
MD56f1bb9f510619c425208b5fcacb0ef0d
SHA1d675666c38fe0bee5c8ec5eabf498b8f8448bc2a
SHA2560e200cf4ea5b9f44fd5569f3a01e90d8c207c07d7d036be2f51b955da59f1154
SHA512cfc17ce728250896fe85deec2deb8fac0ccd8958ae90999e012a3c13db97737e3577d3b986fc5a0a67c59ece7dd5558bda5fd976496a7d90cb7128101e5db964
-
Filesize
448KB
MD56f1bb9f510619c425208b5fcacb0ef0d
SHA1d675666c38fe0bee5c8ec5eabf498b8f8448bc2a
SHA2560e200cf4ea5b9f44fd5569f3a01e90d8c207c07d7d036be2f51b955da59f1154
SHA512cfc17ce728250896fe85deec2deb8fac0ccd8958ae90999e012a3c13db97737e3577d3b986fc5a0a67c59ece7dd5558bda5fd976496a7d90cb7128101e5db964
-
Filesize
276KB
MD584100923a4b8916a09a2319a85684ac2
SHA1b8626f7932b042ca1263ea4a6396b6736f73c194
SHA2564adcaa271f1776938ba253b31ef7a3839c27a091aa2fac55af94f019e490d26e
SHA512c8bb0c9337ee8c82f2ea7874b5a2ccafac9eb69ee92f7ec4a169fa110eb41cbffc74f5123df6b4900c542e7186772157e5cf87c2eb0d34f36b17d8fa27fb1a3a
-
Filesize
276KB
MD584100923a4b8916a09a2319a85684ac2
SHA1b8626f7932b042ca1263ea4a6396b6736f73c194
SHA2564adcaa271f1776938ba253b31ef7a3839c27a091aa2fac55af94f019e490d26e
SHA512c8bb0c9337ee8c82f2ea7874b5a2ccafac9eb69ee92f7ec4a169fa110eb41cbffc74f5123df6b4900c542e7186772157e5cf87c2eb0d34f36b17d8fa27fb1a3a
-
Filesize
147KB
MD523b4a4efcb740903967f4d9b45626097
SHA140cafa7a13f0b50332671f26f9bc98c6a4640680
SHA256b06728a4b8123c6664447c056b4cadb3e938312e2c88e56d1a1e207972d52d37
SHA512f99db74d23d47cbc3ee7123812cb52a5bef86091b90fd4d96ad5089ea8c0770568b38c23e2e9767ad04348e141d7587ab2767285f6f3feb89783fa159c6a8d8f
-
Filesize
147KB
MD523b4a4efcb740903967f4d9b45626097
SHA140cafa7a13f0b50332671f26f9bc98c6a4640680
SHA256b06728a4b8123c6664447c056b4cadb3e938312e2c88e56d1a1e207972d52d37
SHA512f99db74d23d47cbc3ee7123812cb52a5bef86091b90fd4d96ad5089ea8c0770568b38c23e2e9767ad04348e141d7587ab2767285f6f3feb89783fa159c6a8d8f
-
Filesize
168KB
MD550a86a280202839aadf80508cef194c3
SHA15cfc0ce02d7c3cb1834fc2442579ff05b26f75f4
SHA256bc0ad2cdb7de69c2caf63611eb24569b7c026f432d4db0c73e428af9f869b7bf
SHA5120b9927cdf4fc1cd08d19dc75d1fc72dc954a8dfe28a0ade9fcdfdd9245b8251a022c71fd46bce5e66acb3be8c71c9788b7ceedf67220643c69ffee09ba6cc95e
-
Filesize
168KB
MD550a86a280202839aadf80508cef194c3
SHA15cfc0ce02d7c3cb1834fc2442579ff05b26f75f4
SHA256bc0ad2cdb7de69c2caf63611eb24569b7c026f432d4db0c73e428af9f869b7bf
SHA5120b9927cdf4fc1cd08d19dc75d1fc72dc954a8dfe28a0ade9fcdfdd9245b8251a022c71fd46bce5e66acb3be8c71c9788b7ceedf67220643c69ffee09ba6cc95e