Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2023 17:35
Static task
static1
Behavioral task
behavioral1
Sample
cb64db45db9439dbcc3bc7e4e99188c9ddfebab22eb919e105f273f48b32dac2.exe
Resource
win10v2004-20230220-en
General
-
Target
cb64db45db9439dbcc3bc7e4e99188c9ddfebab22eb919e105f273f48b32dac2.exe
-
Size
628KB
-
MD5
0e365d81ba1fc6b36873aec3e28b8055
-
SHA1
a7973409cd766b6b1de27d310ef4e6c5666c3d47
-
SHA256
cb64db45db9439dbcc3bc7e4e99188c9ddfebab22eb919e105f273f48b32dac2
-
SHA512
bbddf3de494ab1866796522e99eaa145723cb297c7bc102e6d2f9092002e30ef3dd7fb513d003dfc08f34b4ab617a4470c915fa0a13f1c868e3bff320467d2a5
-
SSDEEP
12288:nMrvy90AOdMaQ3lXrFf4Mm5J3IVqSqCxB6kbCR39O5f/LNpHN+CDij:0yKQ3xx83Mvqo81wRP+CDij
Malware Config
Extracted
redline
diza
83.97.73.126:19046
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 2828 y9638147.exe 800 y0595583.exe 4052 k7696076.exe 4528 l0365920.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y9638147.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y9638147.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y0595583.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y0595583.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cb64db45db9439dbcc3bc7e4e99188c9ddfebab22eb919e105f273f48b32dac2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cb64db45db9439dbcc3bc7e4e99188c9ddfebab22eb919e105f273f48b32dac2.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4052 set thread context of 3004 4052 k7696076.exe 91 -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 3004 AppLaunch.exe 3004 AppLaunch.exe 4528 l0365920.exe 4528 l0365920.exe 4528 l0365920.exe 4528 l0365920.exe 4528 l0365920.exe 4528 l0365920.exe 4528 l0365920.exe 4528 l0365920.exe 4528 l0365920.exe 4528 l0365920.exe 4528 l0365920.exe 4528 l0365920.exe 4528 l0365920.exe 4528 l0365920.exe 4528 l0365920.exe 4528 l0365920.exe 4528 l0365920.exe 4528 l0365920.exe 4528 l0365920.exe 4528 l0365920.exe 4528 l0365920.exe 4528 l0365920.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3004 AppLaunch.exe Token: SeDebugPrivilege 4528 l0365920.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 536 wrote to memory of 2828 536 cb64db45db9439dbcc3bc7e4e99188c9ddfebab22eb919e105f273f48b32dac2.exe 87 PID 536 wrote to memory of 2828 536 cb64db45db9439dbcc3bc7e4e99188c9ddfebab22eb919e105f273f48b32dac2.exe 87 PID 536 wrote to memory of 2828 536 cb64db45db9439dbcc3bc7e4e99188c9ddfebab22eb919e105f273f48b32dac2.exe 87 PID 2828 wrote to memory of 800 2828 y9638147.exe 88 PID 2828 wrote to memory of 800 2828 y9638147.exe 88 PID 2828 wrote to memory of 800 2828 y9638147.exe 88 PID 800 wrote to memory of 4052 800 y0595583.exe 89 PID 800 wrote to memory of 4052 800 y0595583.exe 89 PID 800 wrote to memory of 4052 800 y0595583.exe 89 PID 4052 wrote to memory of 3004 4052 k7696076.exe 91 PID 4052 wrote to memory of 3004 4052 k7696076.exe 91 PID 4052 wrote to memory of 3004 4052 k7696076.exe 91 PID 4052 wrote to memory of 3004 4052 k7696076.exe 91 PID 4052 wrote to memory of 3004 4052 k7696076.exe 91 PID 800 wrote to memory of 4528 800 y0595583.exe 92 PID 800 wrote to memory of 4528 800 y0595583.exe 92 PID 800 wrote to memory of 4528 800 y0595583.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb64db45db9439dbcc3bc7e4e99188c9ddfebab22eb919e105f273f48b32dac2.exe"C:\Users\Admin\AppData\Local\Temp\cb64db45db9439dbcc3bc7e4e99188c9ddfebab22eb919e105f273f48b32dac2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9638147.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9638147.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0595583.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0595583.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k7696076.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k7696076.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l0365920.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l0365920.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4528
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
426KB
MD558a898c4ebb7b82f46a7ff36a6bec8e3
SHA17971a820ebcfeeb2ee22248f5f8e7e932b4b658a
SHA256c0a900b77ce25297aa4c5bf0a59147805127e5c1ca5c2f0e5d3a2cf8000fc3fe
SHA512b3ce1577e20e68b9c38da8bb5be358814bda1f22cbc03937d70cf3ec98fcb032410a659e573399402781d20b45dd61b8678208466a9e5870523c4453efa6c45e
-
Filesize
426KB
MD558a898c4ebb7b82f46a7ff36a6bec8e3
SHA17971a820ebcfeeb2ee22248f5f8e7e932b4b658a
SHA256c0a900b77ce25297aa4c5bf0a59147805127e5c1ca5c2f0e5d3a2cf8000fc3fe
SHA512b3ce1577e20e68b9c38da8bb5be358814bda1f22cbc03937d70cf3ec98fcb032410a659e573399402781d20b45dd61b8678208466a9e5870523c4453efa6c45e
-
Filesize
254KB
MD58f3d9713c9b79f8e3faa8a719d6c893f
SHA130466617efeb5bfe317b75277106f1da5e8a95a1
SHA256c4abbd728bd2c5dbbed9190549f43966e231f1ea3f6199534aa4ddb90635cf84
SHA512afd708a4d7b96ebaaffc92670dceade8e37d3a939d9ff8dbda837a558302d4e2bd02a4b2d1ca9d0391750f4c9b2cf73540632b3b8c91f994a2c7509999cf6088
-
Filesize
254KB
MD58f3d9713c9b79f8e3faa8a719d6c893f
SHA130466617efeb5bfe317b75277106f1da5e8a95a1
SHA256c4abbd728bd2c5dbbed9190549f43966e231f1ea3f6199534aa4ddb90635cf84
SHA512afd708a4d7b96ebaaffc92670dceade8e37d3a939d9ff8dbda837a558302d4e2bd02a4b2d1ca9d0391750f4c9b2cf73540632b3b8c91f994a2c7509999cf6088
-
Filesize
108KB
MD57a81d41f2a10497ceebbbc4655a96e7b
SHA1af2a20c7df24bac1d33077d05b4a98cd6ecf35f1
SHA256fa31ede220d6e180c4c6ba235a0ebd9dab5b3d21cd4e38dd86a300ad94386ef1
SHA512daa2372854f20c1cbff86f247589cf79eb9caed2fe9f1c7832d5250b79bb3b4f603e77a9032021774adcabd01bf2cbd8095389e368c8b66857633ed11087f2e2
-
Filesize
108KB
MD57a81d41f2a10497ceebbbc4655a96e7b
SHA1af2a20c7df24bac1d33077d05b4a98cd6ecf35f1
SHA256fa31ede220d6e180c4c6ba235a0ebd9dab5b3d21cd4e38dd86a300ad94386ef1
SHA512daa2372854f20c1cbff86f247589cf79eb9caed2fe9f1c7832d5250b79bb3b4f603e77a9032021774adcabd01bf2cbd8095389e368c8b66857633ed11087f2e2
-
Filesize
172KB
MD5f04fbd35c80a64ee3dc6ded9c3435b84
SHA111e9212b52e6625e61c0562d1c6de97c94caeaeb
SHA256e84730f3fd61cfd642f4017c41cfc64371c47625ca7d6a4bcf02b402484026a4
SHA5128da794b7df383af3b8ff1b5f2153df77f31cdb2b82e720aa2fc82adbf99fd470d8b8ccaa92efd6b4a6343d522c41f98c807677cc9b6bf1dd8f9b1c08d0fb5d6c
-
Filesize
172KB
MD5f04fbd35c80a64ee3dc6ded9c3435b84
SHA111e9212b52e6625e61c0562d1c6de97c94caeaeb
SHA256e84730f3fd61cfd642f4017c41cfc64371c47625ca7d6a4bcf02b402484026a4
SHA5128da794b7df383af3b8ff1b5f2153df77f31cdb2b82e720aa2fc82adbf99fd470d8b8ccaa92efd6b4a6343d522c41f98c807677cc9b6bf1dd8f9b1c08d0fb5d6c