Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2023 17:45
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
General
-
Target
tmp.exe
-
Size
627KB
-
MD5
d2def0084106d6e71ec3f01bf112d82e
-
SHA1
2480ff75eb470c56db4762545b3d70a1a79696b3
-
SHA256
ebebb7a0e4f0a8514b0b1e142d7e17fe0b6c336970066567601aa7ec17b4d13a
-
SHA512
32c910ddd3a22fe236e0ec2df8ee0e70106063559064ead304770f6d066dcaa6464e812d9222c4f5bf1061a9a2e93ae9980ed7cb38486cccc9176494b14abb0c
-
SSDEEP
12288:cMrMy90qYyW041SoNPrKVbFIWffdpo2nyKZxcLcgM/RFC/Z8auqD:Iy7odSoVrqd3fy9Lcg0RFCR8av
Malware Config
Extracted
redline
maxi
83.97.73.126:19046
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
v5387363.exev6541230.exea7621364.exeb3511224.exepid process 1548 v5387363.exe 1432 v6541230.exe 468 a7621364.exe 4552 b3511224.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
tmp.exev5387363.exev6541230.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce tmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" tmp.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5387363.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v5387363.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6541230.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v6541230.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
a7621364.exedescription pid process target process PID 468 set thread context of 2896 468 a7621364.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
Processes:
AppLaunch.exeb3511224.exepid process 2896 AppLaunch.exe 2896 AppLaunch.exe 4552 b3511224.exe 4552 b3511224.exe 4552 b3511224.exe 4552 b3511224.exe 4552 b3511224.exe 4552 b3511224.exe 4552 b3511224.exe 4552 b3511224.exe 4552 b3511224.exe 4552 b3511224.exe 4552 b3511224.exe 4552 b3511224.exe 4552 b3511224.exe 4552 b3511224.exe 4552 b3511224.exe 4552 b3511224.exe 4552 b3511224.exe 4552 b3511224.exe 4552 b3511224.exe 4552 b3511224.exe 4552 b3511224.exe 4552 b3511224.exe 4552 b3511224.exe 4552 b3511224.exe 4552 b3511224.exe 4552 b3511224.exe 4552 b3511224.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
AppLaunch.exeb3511224.exedescription pid process Token: SeDebugPrivilege 2896 AppLaunch.exe Token: SeDebugPrivilege 4552 b3511224.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
tmp.exev5387363.exev6541230.exea7621364.exedescription pid process target process PID 1664 wrote to memory of 1548 1664 tmp.exe v5387363.exe PID 1664 wrote to memory of 1548 1664 tmp.exe v5387363.exe PID 1664 wrote to memory of 1548 1664 tmp.exe v5387363.exe PID 1548 wrote to memory of 1432 1548 v5387363.exe v6541230.exe PID 1548 wrote to memory of 1432 1548 v5387363.exe v6541230.exe PID 1548 wrote to memory of 1432 1548 v5387363.exe v6541230.exe PID 1432 wrote to memory of 468 1432 v6541230.exe a7621364.exe PID 1432 wrote to memory of 468 1432 v6541230.exe a7621364.exe PID 1432 wrote to memory of 468 1432 v6541230.exe a7621364.exe PID 468 wrote to memory of 2896 468 a7621364.exe AppLaunch.exe PID 468 wrote to memory of 2896 468 a7621364.exe AppLaunch.exe PID 468 wrote to memory of 2896 468 a7621364.exe AppLaunch.exe PID 468 wrote to memory of 2896 468 a7621364.exe AppLaunch.exe PID 468 wrote to memory of 2896 468 a7621364.exe AppLaunch.exe PID 1432 wrote to memory of 4552 1432 v6541230.exe b3511224.exe PID 1432 wrote to memory of 4552 1432 v6541230.exe b3511224.exe PID 1432 wrote to memory of 4552 1432 v6541230.exe b3511224.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5387363.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5387363.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6541230.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6541230.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7621364.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7621364.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3511224.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3511224.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4552
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425KB
MD5d67bbeee039b8d650bcd1065abc87961
SHA1f9301c877e491f0750d38f66d2e7448f1b551743
SHA256aab805e421a7eb381e46f363c5ee5dbfd997f847560c24e449a017c360645072
SHA51244da3ec7e40bbc9e136f70841530bdd91f5dd1715cb8860bac65ea296608e339dae429fcec7a005908654f724c4dc9850da05ccc1e8f7e59373e8a0d78d37acc
-
Filesize
425KB
MD5d67bbeee039b8d650bcd1065abc87961
SHA1f9301c877e491f0750d38f66d2e7448f1b551743
SHA256aab805e421a7eb381e46f363c5ee5dbfd997f847560c24e449a017c360645072
SHA51244da3ec7e40bbc9e136f70841530bdd91f5dd1715cb8860bac65ea296608e339dae429fcec7a005908654f724c4dc9850da05ccc1e8f7e59373e8a0d78d37acc
-
Filesize
254KB
MD57f991f72157b903cac0c69532f65c422
SHA106209f2c7341ef82195e0c480753caed0dd4eed4
SHA256ef4c5bf7b4cc7fb3fe1c6cbb4893f90807d9916b9630333cf623338071d7c1a6
SHA512f2434e058d98a37bbb856bddc6a59ab7fe96b40e8325e9662fc2c92490a7cd27b3848251c1b60d958029e63e84cdb70f576352e818b73924db2cf68491a7d7de
-
Filesize
254KB
MD57f991f72157b903cac0c69532f65c422
SHA106209f2c7341ef82195e0c480753caed0dd4eed4
SHA256ef4c5bf7b4cc7fb3fe1c6cbb4893f90807d9916b9630333cf623338071d7c1a6
SHA512f2434e058d98a37bbb856bddc6a59ab7fe96b40e8325e9662fc2c92490a7cd27b3848251c1b60d958029e63e84cdb70f576352e818b73924db2cf68491a7d7de
-
Filesize
108KB
MD5edd967e9176e91837da5d1ddcee897c0
SHA1a68799909279d6b3040300701808b71c5e1995c4
SHA256fe4842288e041020243b724386e9167707db41abf362a9f2aa784b5979c3f805
SHA51256a5f6e5bbef59ac1e8cd05d7d0967c320d02d9e6480aac860503193e6efbaba549fa7e49f8a2d43ff6b42ea7092efe57e5fcd94a0be343c8c329a44e12a53f3
-
Filesize
108KB
MD5edd967e9176e91837da5d1ddcee897c0
SHA1a68799909279d6b3040300701808b71c5e1995c4
SHA256fe4842288e041020243b724386e9167707db41abf362a9f2aa784b5979c3f805
SHA51256a5f6e5bbef59ac1e8cd05d7d0967c320d02d9e6480aac860503193e6efbaba549fa7e49f8a2d43ff6b42ea7092efe57e5fcd94a0be343c8c329a44e12a53f3
-
Filesize
172KB
MD5d1925563c6a3da713c97baead6741903
SHA1d9f680d3e0af2ef7fdc5d6e490a65c10abe47840
SHA256147591c3ea3dd79c626062a17dc718441cd98728a5adf7a82bf207a263e7355f
SHA51226fa7b5cd63f7aa36f65eec66ddb5690e4d93cc45bc124bb04b4890297dfcdfee59bc3c42272da11b56ddff895193cbe9a8cbf95c2a75253e7c4b0b684cded60
-
Filesize
172KB
MD5d1925563c6a3da713c97baead6741903
SHA1d9f680d3e0af2ef7fdc5d6e490a65c10abe47840
SHA256147591c3ea3dd79c626062a17dc718441cd98728a5adf7a82bf207a263e7355f
SHA51226fa7b5cd63f7aa36f65eec66ddb5690e4d93cc45bc124bb04b4890297dfcdfee59bc3c42272da11b56ddff895193cbe9a8cbf95c2a75253e7c4b0b684cded60