Analysis
-
max time kernel
138s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2023 21:33
Static task
static1
Behavioral task
behavioral1
Sample
55d8ac5c70ce9c9870ada10c033ffb630f70b53407d1a786ab1e529becee2967.exe
Resource
win10v2004-20230220-en
General
-
Target
55d8ac5c70ce9c9870ada10c033ffb630f70b53407d1a786ab1e529becee2967.exe
-
Size
723KB
-
MD5
a412cd19a656ed6d2e8350401a4915d8
-
SHA1
177889cddf795c23362ddac7835853dd88248d58
-
SHA256
55d8ac5c70ce9c9870ada10c033ffb630f70b53407d1a786ab1e529becee2967
-
SHA512
332d493a759ea429ee660ac5a0529e0df48a4166a08a1084564a70579b44f0f450c1cbcd1a5676c6e007a29d7e527a44369ff80b8659df4fc94c298c33c312cf
-
SSDEEP
12288:vMrfy90o4C+v001z3XZP43lqVSmc3UmMVDpFU/d24WJl5ZEG7F/BCKQt3Zdds0Aq:MyadvHz3XZA3I5HFAd2D/ZHFNQt3Zdd1
Malware Config
Extracted
redline
maxi
83.97.73.126:19048
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
a1099696.exeAppLaunch.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a1099696.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a1099696.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a1099696.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a1099696.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a1099696.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a1099696.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
v8208517.exev5098588.exev3880685.exea1099696.exeb6214718.exec7218988.exepid process 4596 v8208517.exe 1616 v5098588.exe 3816 v3880685.exe 1408 a1099696.exe 1776 b6214718.exe 4276 c7218988.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
a1099696.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a1099696.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
v8208517.exev5098588.exev3880685.exe55d8ac5c70ce9c9870ada10c033ffb630f70b53407d1a786ab1e529becee2967.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8208517.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v8208517.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5098588.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v5098588.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3880685.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v3880685.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 55d8ac5c70ce9c9870ada10c033ffb630f70b53407d1a786ab1e529becee2967.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 55d8ac5c70ce9c9870ada10c033ffb630f70b53407d1a786ab1e529becee2967.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
b6214718.exedescription pid process target process PID 1776 set thread context of 3316 1776 b6214718.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2968 1776 WerFault.exe b6214718.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
a1099696.exeAppLaunch.exec7218988.exepid process 1408 a1099696.exe 1408 a1099696.exe 3316 AppLaunch.exe 3316 AppLaunch.exe 4276 c7218988.exe 4276 c7218988.exe 4276 c7218988.exe 4276 c7218988.exe 4276 c7218988.exe 4276 c7218988.exe 4276 c7218988.exe 4276 c7218988.exe 4276 c7218988.exe 4276 c7218988.exe 4276 c7218988.exe 4276 c7218988.exe 4276 c7218988.exe 4276 c7218988.exe 4276 c7218988.exe 4276 c7218988.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
a1099696.exeAppLaunch.exec7218988.exedescription pid process Token: SeDebugPrivilege 1408 a1099696.exe Token: SeDebugPrivilege 3316 AppLaunch.exe Token: SeDebugPrivilege 4276 c7218988.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
55d8ac5c70ce9c9870ada10c033ffb630f70b53407d1a786ab1e529becee2967.exev8208517.exev5098588.exev3880685.exeb6214718.exedescription pid process target process PID 4504 wrote to memory of 4596 4504 55d8ac5c70ce9c9870ada10c033ffb630f70b53407d1a786ab1e529becee2967.exe v8208517.exe PID 4504 wrote to memory of 4596 4504 55d8ac5c70ce9c9870ada10c033ffb630f70b53407d1a786ab1e529becee2967.exe v8208517.exe PID 4504 wrote to memory of 4596 4504 55d8ac5c70ce9c9870ada10c033ffb630f70b53407d1a786ab1e529becee2967.exe v8208517.exe PID 4596 wrote to memory of 1616 4596 v8208517.exe v5098588.exe PID 4596 wrote to memory of 1616 4596 v8208517.exe v5098588.exe PID 4596 wrote to memory of 1616 4596 v8208517.exe v5098588.exe PID 1616 wrote to memory of 3816 1616 v5098588.exe v3880685.exe PID 1616 wrote to memory of 3816 1616 v5098588.exe v3880685.exe PID 1616 wrote to memory of 3816 1616 v5098588.exe v3880685.exe PID 3816 wrote to memory of 1408 3816 v3880685.exe a1099696.exe PID 3816 wrote to memory of 1408 3816 v3880685.exe a1099696.exe PID 3816 wrote to memory of 1776 3816 v3880685.exe b6214718.exe PID 3816 wrote to memory of 1776 3816 v3880685.exe b6214718.exe PID 3816 wrote to memory of 1776 3816 v3880685.exe b6214718.exe PID 1776 wrote to memory of 3316 1776 b6214718.exe AppLaunch.exe PID 1776 wrote to memory of 3316 1776 b6214718.exe AppLaunch.exe PID 1776 wrote to memory of 3316 1776 b6214718.exe AppLaunch.exe PID 1776 wrote to memory of 3316 1776 b6214718.exe AppLaunch.exe PID 1776 wrote to memory of 3316 1776 b6214718.exe AppLaunch.exe PID 1616 wrote to memory of 4276 1616 v5098588.exe c7218988.exe PID 1616 wrote to memory of 4276 1616 v5098588.exe c7218988.exe PID 1616 wrote to memory of 4276 1616 v5098588.exe c7218988.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\55d8ac5c70ce9c9870ada10c033ffb630f70b53407d1a786ab1e529becee2967.exe"C:\Users\Admin\AppData\Local\Temp\55d8ac5c70ce9c9870ada10c033ffb630f70b53407d1a786ab1e529becee2967.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8208517.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8208517.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5098588.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5098588.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3880685.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3880685.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1099696.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1099696.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1408
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6214718.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6214718.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1776 -s 1406⤵
- Program crash
PID:2968
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c7218988.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c7218988.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4276
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 1776 -ip 17761⤵PID:2400
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
523KB
MD5e9e7910d4d5122a6f79e478aeafa0b71
SHA12cb8993e9723b2a8aef183e79c79c6b04cbdc13e
SHA256d65e3069a91b2f17fc117990c73ed5bed37ce7a9d0a0d8aecd0bf86461e8dd97
SHA5124e96de6f72bebe856bf8c23721a51c17559c3f968ce103649c787fac6108b71f3f7b2572e7071a545f94ddd3fe6993dfe902716988371dc1ff6717cbcfcb82f6
-
Filesize
523KB
MD5e9e7910d4d5122a6f79e478aeafa0b71
SHA12cb8993e9723b2a8aef183e79c79c6b04cbdc13e
SHA256d65e3069a91b2f17fc117990c73ed5bed37ce7a9d0a0d8aecd0bf86461e8dd97
SHA5124e96de6f72bebe856bf8c23721a51c17559c3f968ce103649c787fac6108b71f3f7b2572e7071a545f94ddd3fe6993dfe902716988371dc1ff6717cbcfcb82f6
-
Filesize
351KB
MD54e70bb02fb1c4ac7ad87b66a201d9ba8
SHA1f39c48fb2ead730db0b6f04d719acadd22c5ae1f
SHA256516e0ef5b1bf81cca77bb0876991ae2d8c626ef9962c035fb3af3eb8236b6473
SHA51266a924ca09532628744a55013e210a407390554f4cd368a9da8eaea0100a85f13358aa4bfcf648ab7fd47e1cd7e6161e537faa88c14ce3aa8d8b7c697b79781d
-
Filesize
351KB
MD54e70bb02fb1c4ac7ad87b66a201d9ba8
SHA1f39c48fb2ead730db0b6f04d719acadd22c5ae1f
SHA256516e0ef5b1bf81cca77bb0876991ae2d8c626ef9962c035fb3af3eb8236b6473
SHA51266a924ca09532628744a55013e210a407390554f4cd368a9da8eaea0100a85f13358aa4bfcf648ab7fd47e1cd7e6161e537faa88c14ce3aa8d8b7c697b79781d
-
Filesize
172KB
MD5839ebd7675293dbfa63b8fd2be3194a9
SHA10db6c44256d28964b84c50d3fa4a9c956168502b
SHA256f4a8236529245208e70fdb1c553c73c92614325a74b5e12d6fe7cc8b0f1590f6
SHA5128f5a1dfae025b25673961a75074ba93ffd4c2e6d487cf35b7fb4644e6e75299460e308550eafb6494fddb4ec18635e26bce90037d3e97597c0bdb80d8b01e660
-
Filesize
172KB
MD5839ebd7675293dbfa63b8fd2be3194a9
SHA10db6c44256d28964b84c50d3fa4a9c956168502b
SHA256f4a8236529245208e70fdb1c553c73c92614325a74b5e12d6fe7cc8b0f1590f6
SHA5128f5a1dfae025b25673961a75074ba93ffd4c2e6d487cf35b7fb4644e6e75299460e308550eafb6494fddb4ec18635e26bce90037d3e97597c0bdb80d8b01e660
-
Filesize
196KB
MD5adc0eb6743ceb9ad8cd98245c35cea78
SHA1c491c6e9f03d3b61f093a37c57e40edce0b78708
SHA2567576669ebc4d26e7f6ba5f032383487a26008fbd6d0cb47da444b3fd4e3afcce
SHA512144647b4266a3c9cf1c896557112c3ec33fb5c1af2f8033836930cadc33661dd680f64f30f935aa1087683e03d3456cdab0bb64838b6085fb1efbe556454b5f3
-
Filesize
196KB
MD5adc0eb6743ceb9ad8cd98245c35cea78
SHA1c491c6e9f03d3b61f093a37c57e40edce0b78708
SHA2567576669ebc4d26e7f6ba5f032383487a26008fbd6d0cb47da444b3fd4e3afcce
SHA512144647b4266a3c9cf1c896557112c3ec33fb5c1af2f8033836930cadc33661dd680f64f30f935aa1087683e03d3456cdab0bb64838b6085fb1efbe556454b5f3
-
Filesize
14KB
MD5c5a72362ced300a7c4aa9a6e484b60ae
SHA137536539b0e75b637208b368baadad443478365f
SHA256eaf544fa9f35779f8394792312f7a0d6da30b2054ce6bdbd5b6f8cb02716bd1a
SHA51262bdb95bb8777d8a6a806c732c2fceea081dac51a8ac885b7f94da985d9fc8c21924cb46bfecf2df7cd428121ff21fdcf7c7a2961f1afd2f7239c626bb8738d4
-
Filesize
14KB
MD5c5a72362ced300a7c4aa9a6e484b60ae
SHA137536539b0e75b637208b368baadad443478365f
SHA256eaf544fa9f35779f8394792312f7a0d6da30b2054ce6bdbd5b6f8cb02716bd1a
SHA51262bdb95bb8777d8a6a806c732c2fceea081dac51a8ac885b7f94da985d9fc8c21924cb46bfecf2df7cd428121ff21fdcf7c7a2961f1afd2f7239c626bb8738d4
-
Filesize
100KB
MD5ad581a4f388fb2a3ad0c2d4ba2e6146a
SHA1eb5f802e4f50bdbc27e9cfa2185af1a505313f70
SHA256449d4395de2c6df6f9296c68595e587f2993bd0651fb5d3147c60ccb6666146e
SHA512f06a9d7c09c6250e8cd3c85664a26f2a8306ffc7bdb135deb9aaf1cca01d08776914eae5d9179d04f76f71ebaccc2706a4cb033a594a3bd337a35486702d3431
-
Filesize
100KB
MD5ad581a4f388fb2a3ad0c2d4ba2e6146a
SHA1eb5f802e4f50bdbc27e9cfa2185af1a505313f70
SHA256449d4395de2c6df6f9296c68595e587f2993bd0651fb5d3147c60ccb6666146e
SHA512f06a9d7c09c6250e8cd3c85664a26f2a8306ffc7bdb135deb9aaf1cca01d08776914eae5d9179d04f76f71ebaccc2706a4cb033a594a3bd337a35486702d3431