Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2023 17:15
Static task
static1
Behavioral task
behavioral1
Sample
226202b4ba98b15724602ef42dfb1e6e0e8f34379b84cd9cca0fb5c51b818d82.exe
Resource
win10v2004-20230220-en
General
-
Target
226202b4ba98b15724602ef42dfb1e6e0e8f34379b84cd9cca0fb5c51b818d82.exe
-
Size
628KB
-
MD5
6155d26477fc0a4edd8605f1dd81f940
-
SHA1
2806c9c3b58d96c4d8820873ac2c35fd2b91ba13
-
SHA256
226202b4ba98b15724602ef42dfb1e6e0e8f34379b84cd9cca0fb5c51b818d82
-
SHA512
080d56c033e37fa96ad4823b0ecb63a4ccface46eac12d537eac543404ed6ff9efdb4c51c97435f47e6f0db4baa404cdf63f2a559f1fdd2ffb5685011bbcea08
-
SSDEEP
12288:cMrTy90uJ2COxSOjMgxMfhADn9x6xD7HnCrOybe+52YCf:XyLjESOIgxshMn67HCrfK+5K
Malware Config
Extracted
redline
maxi
83.97.73.126:19046
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
v2095179.exev0378991.exea6722558.exeb7260344.exepid process 4420 v2095179.exe 3480 v0378991.exe 3572 a6722558.exe 2260 b7260344.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
226202b4ba98b15724602ef42dfb1e6e0e8f34379b84cd9cca0fb5c51b818d82.exev2095179.exev0378991.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 226202b4ba98b15724602ef42dfb1e6e0e8f34379b84cd9cca0fb5c51b818d82.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 226202b4ba98b15724602ef42dfb1e6e0e8f34379b84cd9cca0fb5c51b818d82.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2095179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2095179.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0378991.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v0378991.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
a6722558.exedescription pid process target process PID 3572 set thread context of 3036 3572 a6722558.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
Processes:
AppLaunch.exeb7260344.exepid process 3036 AppLaunch.exe 3036 AppLaunch.exe 2260 b7260344.exe 2260 b7260344.exe 2260 b7260344.exe 2260 b7260344.exe 2260 b7260344.exe 2260 b7260344.exe 2260 b7260344.exe 2260 b7260344.exe 2260 b7260344.exe 2260 b7260344.exe 2260 b7260344.exe 2260 b7260344.exe 2260 b7260344.exe 2260 b7260344.exe 2260 b7260344.exe 2260 b7260344.exe 2260 b7260344.exe 2260 b7260344.exe 2260 b7260344.exe 2260 b7260344.exe 2260 b7260344.exe 2260 b7260344.exe 2260 b7260344.exe 2260 b7260344.exe 2260 b7260344.exe 2260 b7260344.exe 2260 b7260344.exe 2260 b7260344.exe 2260 b7260344.exe 2260 b7260344.exe 2260 b7260344.exe 2260 b7260344.exe 2260 b7260344.exe 2260 b7260344.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
AppLaunch.exeb7260344.exedescription pid process Token: SeDebugPrivilege 3036 AppLaunch.exe Token: SeDebugPrivilege 2260 b7260344.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
226202b4ba98b15724602ef42dfb1e6e0e8f34379b84cd9cca0fb5c51b818d82.exev2095179.exev0378991.exea6722558.exedescription pid process target process PID 3196 wrote to memory of 4420 3196 226202b4ba98b15724602ef42dfb1e6e0e8f34379b84cd9cca0fb5c51b818d82.exe v2095179.exe PID 3196 wrote to memory of 4420 3196 226202b4ba98b15724602ef42dfb1e6e0e8f34379b84cd9cca0fb5c51b818d82.exe v2095179.exe PID 3196 wrote to memory of 4420 3196 226202b4ba98b15724602ef42dfb1e6e0e8f34379b84cd9cca0fb5c51b818d82.exe v2095179.exe PID 4420 wrote to memory of 3480 4420 v2095179.exe v0378991.exe PID 4420 wrote to memory of 3480 4420 v2095179.exe v0378991.exe PID 4420 wrote to memory of 3480 4420 v2095179.exe v0378991.exe PID 3480 wrote to memory of 3572 3480 v0378991.exe a6722558.exe PID 3480 wrote to memory of 3572 3480 v0378991.exe a6722558.exe PID 3480 wrote to memory of 3572 3480 v0378991.exe a6722558.exe PID 3572 wrote to memory of 3036 3572 a6722558.exe AppLaunch.exe PID 3572 wrote to memory of 3036 3572 a6722558.exe AppLaunch.exe PID 3572 wrote to memory of 3036 3572 a6722558.exe AppLaunch.exe PID 3572 wrote to memory of 3036 3572 a6722558.exe AppLaunch.exe PID 3572 wrote to memory of 3036 3572 a6722558.exe AppLaunch.exe PID 3480 wrote to memory of 2260 3480 v0378991.exe b7260344.exe PID 3480 wrote to memory of 2260 3480 v0378991.exe b7260344.exe PID 3480 wrote to memory of 2260 3480 v0378991.exe b7260344.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\226202b4ba98b15724602ef42dfb1e6e0e8f34379b84cd9cca0fb5c51b818d82.exe"C:\Users\Admin\AppData\Local\Temp\226202b4ba98b15724602ef42dfb1e6e0e8f34379b84cd9cca0fb5c51b818d82.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2095179.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2095179.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0378991.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0378991.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6722558.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6722558.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7260344.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7260344.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2095179.exeFilesize
426KB
MD57d4bce4d50705a9310a0c3583199d585
SHA14e58dddf5efa71f8e88e04ca301b0845d25072c1
SHA256fc7af0bd1eb525b7f97f738a96d5ab5706eea947a525031dbc12e606784f1dad
SHA512b69b1c57c7065e381cc7a30d911e45754b2152073d79244c92100daeee162dc4670c1d8b5781cb2a8ab5ad53aed037f1c2d566e990953b39586fa3a23e9fd8ce
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2095179.exeFilesize
426KB
MD57d4bce4d50705a9310a0c3583199d585
SHA14e58dddf5efa71f8e88e04ca301b0845d25072c1
SHA256fc7af0bd1eb525b7f97f738a96d5ab5706eea947a525031dbc12e606784f1dad
SHA512b69b1c57c7065e381cc7a30d911e45754b2152073d79244c92100daeee162dc4670c1d8b5781cb2a8ab5ad53aed037f1c2d566e990953b39586fa3a23e9fd8ce
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0378991.exeFilesize
254KB
MD52b6a91155b7650765bfe8c3eb3572148
SHA170abee7ca92486825358af85c5187dbd1f4760ff
SHA256e190bb1411678b3b9d47f9ff28c7fff9db614dd1eda682212d2abbed85e8cad0
SHA5120a11b59cf384f5016bffcc28d3ea121dfdd3732c43275549d165e17ace8206f7f5d9f39f8287c54341b73dcb5cd3570164852900f9f7d0982b7682e2eae5c745
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0378991.exeFilesize
254KB
MD52b6a91155b7650765bfe8c3eb3572148
SHA170abee7ca92486825358af85c5187dbd1f4760ff
SHA256e190bb1411678b3b9d47f9ff28c7fff9db614dd1eda682212d2abbed85e8cad0
SHA5120a11b59cf384f5016bffcc28d3ea121dfdd3732c43275549d165e17ace8206f7f5d9f39f8287c54341b73dcb5cd3570164852900f9f7d0982b7682e2eae5c745
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6722558.exeFilesize
108KB
MD5951569941865f4fb044d87c04ee37846
SHA117d929227d8870c94c759c8bb55f2a62ee834c45
SHA2569115b251dfb1e9f9f123330133a55f63982b811eb10aa8d1ee0d05d62849ce5c
SHA512e5cfa60faf460419794afd56f50689c0a054048f1803130605d444f3ab198e9ed01298bd34cdcdcd981cac207135c58c12908a87326ed17ab1ef59afd8e7d52c
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6722558.exeFilesize
108KB
MD5951569941865f4fb044d87c04ee37846
SHA117d929227d8870c94c759c8bb55f2a62ee834c45
SHA2569115b251dfb1e9f9f123330133a55f63982b811eb10aa8d1ee0d05d62849ce5c
SHA512e5cfa60faf460419794afd56f50689c0a054048f1803130605d444f3ab198e9ed01298bd34cdcdcd981cac207135c58c12908a87326ed17ab1ef59afd8e7d52c
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7260344.exeFilesize
172KB
MD5c826c4cbc117d6d78f0a8dcc51f139b0
SHA15b84e90e51696a6e898b39f99e6490279761736b
SHA256be165ad36a8574e86b082908486aef293d1066af371970894ecdf58e436cb9df
SHA512369b7280965e6bb5c9acd84329028b4e50c106299b83193f5dae31a3559106e595c8706837909fc5093d9bdcbf0f2939e6daf92d52ae5688e62535f73b7a7e75
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7260344.exeFilesize
172KB
MD5c826c4cbc117d6d78f0a8dcc51f139b0
SHA15b84e90e51696a6e898b39f99e6490279761736b
SHA256be165ad36a8574e86b082908486aef293d1066af371970894ecdf58e436cb9df
SHA512369b7280965e6bb5c9acd84329028b4e50c106299b83193f5dae31a3559106e595c8706837909fc5093d9bdcbf0f2939e6daf92d52ae5688e62535f73b7a7e75
-
memory/2260-163-0x000000000A680000-0x000000000AC98000-memory.dmpFilesize
6.1MB
-
memory/2260-168-0x000000000A5B0000-0x000000000A626000-memory.dmpFilesize
472KB
-
memory/2260-176-0x000000000B3E0000-0x000000000B430000-memory.dmpFilesize
320KB
-
memory/2260-164-0x000000000A200000-0x000000000A30A000-memory.dmpFilesize
1.0MB
-
memory/2260-165-0x000000000A140000-0x000000000A152000-memory.dmpFilesize
72KB
-
memory/2260-166-0x0000000004CB0000-0x0000000004CC0000-memory.dmpFilesize
64KB
-
memory/2260-167-0x000000000A1A0000-0x000000000A1DC000-memory.dmpFilesize
240KB
-
memory/2260-162-0x0000000000280000-0x00000000002B0000-memory.dmpFilesize
192KB
-
memory/2260-169-0x000000000AD40000-0x000000000ADD2000-memory.dmpFilesize
584KB
-
memory/2260-170-0x000000000ACA0000-0x000000000AD06000-memory.dmpFilesize
408KB
-
memory/2260-171-0x000000000B690000-0x000000000BC34000-memory.dmpFilesize
5.6MB
-
memory/2260-172-0x000000000B4B0000-0x000000000B672000-memory.dmpFilesize
1.8MB
-
memory/2260-173-0x000000000C170000-0x000000000C69C000-memory.dmpFilesize
5.2MB
-
memory/2260-175-0x0000000004CB0000-0x0000000004CC0000-memory.dmpFilesize
64KB
-
memory/3036-154-0x0000000000620000-0x000000000062A000-memory.dmpFilesize
40KB