Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2023 12:43
Static task
static1
Behavioral task
behavioral1
Sample
9a472b0c97378c4b88ed92ce10e71b2bba9dca1763a229d582692a82a20ae379.exe
Resource
win10v2004-20230220-en
General
-
Target
9a472b0c97378c4b88ed92ce10e71b2bba9dca1763a229d582692a82a20ae379.exe
-
Size
728KB
-
MD5
e62fef3a9c5d0c2dfad1bdb1e91dcb9e
-
SHA1
71d84ebb595d60690b501ddd13c919bf8f8f0d68
-
SHA256
9a472b0c97378c4b88ed92ce10e71b2bba9dca1763a229d582692a82a20ae379
-
SHA512
2455470cd945e9e2a61b83b9c1127e263fafe4cb2d0ab1b2281288cb3a65265989b795d613cb6e64566a3034ca3ff556a61f344d7873eae70ec6dd37b221bb76
-
SSDEEP
12288:DMrHy90OjaIyVN/0pHP5kizHKAUNdd/SztvaVVesPHaHLEJFRYLh/e2RyN:4yXaIy3M15tzHVAPHSEJF0deUyN
Malware Config
Extracted
redline
maxi
83.97.73.126:19046
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
a5354283.exeAppLaunch.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a5354283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5354283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5354283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5354283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5354283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5354283.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
v8524570.exev0336868.exev6738877.exea5354283.exeb0767219.exec1130499.exepid process 3372 v8524570.exe 2972 v0336868.exe 2064 v6738877.exe 4420 a5354283.exe 4488 b0767219.exe 4884 c1130499.exe -
Processes:
a5354283.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a5354283.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
v8524570.exev0336868.exev6738877.exe9a472b0c97378c4b88ed92ce10e71b2bba9dca1763a229d582692a82a20ae379.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v8524570.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0336868.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v0336868.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6738877.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v6738877.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9a472b0c97378c4b88ed92ce10e71b2bba9dca1763a229d582692a82a20ae379.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9a472b0c97378c4b88ed92ce10e71b2bba9dca1763a229d582692a82a20ae379.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8524570.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b0767219.exedescription pid process target process PID 4488 set thread context of 4588 4488 b0767219.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
a5354283.exeAppLaunch.exepid process 4420 a5354283.exe 4420 a5354283.exe 4588 AppLaunch.exe 4588 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
a5354283.exeAppLaunch.exedescription pid process Token: SeDebugPrivilege 4420 a5354283.exe Token: SeDebugPrivilege 4588 AppLaunch.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
9a472b0c97378c4b88ed92ce10e71b2bba9dca1763a229d582692a82a20ae379.exev8524570.exev0336868.exev6738877.exeb0767219.exedescription pid process target process PID 3532 wrote to memory of 3372 3532 9a472b0c97378c4b88ed92ce10e71b2bba9dca1763a229d582692a82a20ae379.exe v8524570.exe PID 3532 wrote to memory of 3372 3532 9a472b0c97378c4b88ed92ce10e71b2bba9dca1763a229d582692a82a20ae379.exe v8524570.exe PID 3532 wrote to memory of 3372 3532 9a472b0c97378c4b88ed92ce10e71b2bba9dca1763a229d582692a82a20ae379.exe v8524570.exe PID 3372 wrote to memory of 2972 3372 v8524570.exe v0336868.exe PID 3372 wrote to memory of 2972 3372 v8524570.exe v0336868.exe PID 3372 wrote to memory of 2972 3372 v8524570.exe v0336868.exe PID 2972 wrote to memory of 2064 2972 v0336868.exe v6738877.exe PID 2972 wrote to memory of 2064 2972 v0336868.exe v6738877.exe PID 2972 wrote to memory of 2064 2972 v0336868.exe v6738877.exe PID 2064 wrote to memory of 4420 2064 v6738877.exe a5354283.exe PID 2064 wrote to memory of 4420 2064 v6738877.exe a5354283.exe PID 2064 wrote to memory of 4488 2064 v6738877.exe b0767219.exe PID 2064 wrote to memory of 4488 2064 v6738877.exe b0767219.exe PID 2064 wrote to memory of 4488 2064 v6738877.exe b0767219.exe PID 4488 wrote to memory of 4588 4488 b0767219.exe AppLaunch.exe PID 4488 wrote to memory of 4588 4488 b0767219.exe AppLaunch.exe PID 4488 wrote to memory of 4588 4488 b0767219.exe AppLaunch.exe PID 4488 wrote to memory of 4588 4488 b0767219.exe AppLaunch.exe PID 4488 wrote to memory of 4588 4488 b0767219.exe AppLaunch.exe PID 2972 wrote to memory of 4884 2972 v0336868.exe c1130499.exe PID 2972 wrote to memory of 4884 2972 v0336868.exe c1130499.exe PID 2972 wrote to memory of 4884 2972 v0336868.exe c1130499.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a472b0c97378c4b88ed92ce10e71b2bba9dca1763a229d582692a82a20ae379.exe"C:\Users\Admin\AppData\Local\Temp\9a472b0c97378c4b88ed92ce10e71b2bba9dca1763a229d582692a82a20ae379.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8524570.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8524570.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0336868.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0336868.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6738877.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6738877.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5354283.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5354283.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b0767219.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b0767219.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1130499.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1130499.exe4⤵
- Executes dropped EXE
PID:4884
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
526KB
MD56b682aa74ec8cd5e57bd21b8abb584bd
SHA1d34af992a3efce21f6f2d931c97fb526c53462f4
SHA2565c4c776577c94f5dce199e445be71201412a592ea63e574c8a1b1fc50396b012
SHA512757564b476a4afd52d40a3b37dc93dd2dd714517797576b071a607c1487b89cc99b557b70d9bdfd0f829c1a947405fb39a00a2dc431be904c1ac8cbb71d211b7
-
Filesize
526KB
MD56b682aa74ec8cd5e57bd21b8abb584bd
SHA1d34af992a3efce21f6f2d931c97fb526c53462f4
SHA2565c4c776577c94f5dce199e445be71201412a592ea63e574c8a1b1fc50396b012
SHA512757564b476a4afd52d40a3b37dc93dd2dd714517797576b071a607c1487b89cc99b557b70d9bdfd0f829c1a947405fb39a00a2dc431be904c1ac8cbb71d211b7
-
Filesize
354KB
MD52687e9aa861da1d57cf84b2f43b610d2
SHA135d4e2a428cfa32c3fa031cf265a14b5af1ee01f
SHA2568bb1a2bf8c2ca702d99e7730063808d55d138ce2ca5b64005e7c3f2489c24e39
SHA51270a2a597b2394a6a2adef9457940b7587b034039332a75fa66a0817fc9473976774ededf309874a20a32be6d22df0ad947511b619abfd041c4c4d5a0c5047645
-
Filesize
354KB
MD52687e9aa861da1d57cf84b2f43b610d2
SHA135d4e2a428cfa32c3fa031cf265a14b5af1ee01f
SHA2568bb1a2bf8c2ca702d99e7730063808d55d138ce2ca5b64005e7c3f2489c24e39
SHA51270a2a597b2394a6a2adef9457940b7587b034039332a75fa66a0817fc9473976774ededf309874a20a32be6d22df0ad947511b619abfd041c4c4d5a0c5047645
-
Filesize
172KB
MD5b65882607ff155289a2a531ea32b2cc2
SHA1f12508ff5b501bf562f36665bb658147af37607a
SHA256e5f3ada9a58847170c18ff34635e7cae2363d2b54654ea4062292d3f0220abf9
SHA512068b867e2e9d067d9d157788662eadac1178b68459ec0bf046875188ad86147828e471f227df944d6adad6fdb804349123c0bfda9f201a9d0a8ee5af4e786c66
-
Filesize
172KB
MD5b65882607ff155289a2a531ea32b2cc2
SHA1f12508ff5b501bf562f36665bb658147af37607a
SHA256e5f3ada9a58847170c18ff34635e7cae2363d2b54654ea4062292d3f0220abf9
SHA512068b867e2e9d067d9d157788662eadac1178b68459ec0bf046875188ad86147828e471f227df944d6adad6fdb804349123c0bfda9f201a9d0a8ee5af4e786c66
-
Filesize
199KB
MD56f96069962901115cd9385e5f8bc0c90
SHA11c56fd79021f406ba16bc1d55f8898c26eaf5e6a
SHA256886a9fccd59e5fee4fbc6f9e6c48b45229bd36ff10338e7a0c4ade8ef28a7222
SHA5124116dcf7949999d455beeacd0b45f2662d2f2fd7e3dddff27db2f7ac7c67e45e28f78f3f5ae5abac83816fe235a59349dfec4ee3f09e8c60eb5f49b31eacd85a
-
Filesize
199KB
MD56f96069962901115cd9385e5f8bc0c90
SHA11c56fd79021f406ba16bc1d55f8898c26eaf5e6a
SHA256886a9fccd59e5fee4fbc6f9e6c48b45229bd36ff10338e7a0c4ade8ef28a7222
SHA5124116dcf7949999d455beeacd0b45f2662d2f2fd7e3dddff27db2f7ac7c67e45e28f78f3f5ae5abac83816fe235a59349dfec4ee3f09e8c60eb5f49b31eacd85a
-
Filesize
12KB
MD5f900b07411b5555ffc3775e25a423fcf
SHA1d022123c255f527778efc9d92535e0630a87abd7
SHA2568a38c2f849ad02064bf8e57e70a8e79331afad8d59f34f72466804491d0de4ef
SHA512ead2fa3561e6bbac875a0f3ee70e4ab3046853e4787373fba7455c99ff00ca572e1c86bacea9b7c3b77ef902378ec453dbc4f38d4ba80df53a9ed0cc5710b6e4
-
Filesize
12KB
MD5f900b07411b5555ffc3775e25a423fcf
SHA1d022123c255f527778efc9d92535e0630a87abd7
SHA2568a38c2f849ad02064bf8e57e70a8e79331afad8d59f34f72466804491d0de4ef
SHA512ead2fa3561e6bbac875a0f3ee70e4ab3046853e4787373fba7455c99ff00ca572e1c86bacea9b7c3b77ef902378ec453dbc4f38d4ba80df53a9ed0cc5710b6e4
-
Filesize
105KB
MD578887be303c9e99ee91e63c196608269
SHA1a1cbfcf74ead91294069a947832d2c5a94116195
SHA256dc35ac1f6a472993a803375ec6f5d353dadbce25f641c44888e42595dfdc5c4f
SHA512052b2f855a129a303e534e83b3ca53628c483ce755984f1ae3310f5f117a1670581e86751cd2f053c0cebc871733fc7e93a8270de931742b1095c852cd6b3877
-
Filesize
105KB
MD578887be303c9e99ee91e63c196608269
SHA1a1cbfcf74ead91294069a947832d2c5a94116195
SHA256dc35ac1f6a472993a803375ec6f5d353dadbce25f641c44888e42595dfdc5c4f
SHA512052b2f855a129a303e534e83b3ca53628c483ce755984f1ae3310f5f117a1670581e86751cd2f053c0cebc871733fc7e93a8270de931742b1095c852cd6b3877