Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2023 21:57
Static task
static1
Behavioral task
behavioral1
Sample
78789c5aaf0343c131fc0a3e0c0c411c3633cffbd4f6cfb9928e195cec459eb5.exe
Resource
win10v2004-20230220-en
General
-
Target
78789c5aaf0343c131fc0a3e0c0c411c3633cffbd4f6cfb9928e195cec459eb5.exe
-
Size
724KB
-
MD5
0cef1c29a3bbdaf67d2b3655fbc7f8b5
-
SHA1
2efe7f99da24978bd0cd445ee46e21a1ec710bc7
-
SHA256
78789c5aaf0343c131fc0a3e0c0c411c3633cffbd4f6cfb9928e195cec459eb5
-
SHA512
94742f814ac526dd533d79c1b32c696ab8f058b69975420f5cebfc43afd90a57170f4da1fe0ced230d7dac27c5db53c60cd85f924b3fb7fff2e9dccd1d6fb693
-
SSDEEP
12288:lMr0y90h08i79T2qWpdCEfZEKxZUHAovout+OeKlz0rbmqENFD:tyh8i79k/5feKwHAoQbOe8z8bm1FD
Malware Config
Extracted
redline
maxi
83.97.73.126:19048
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
AppLaunch.exea7601346.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a7601346.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a7601346.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a7601346.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a7601346.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a7601346.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a7601346.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
v4656787.exev8218414.exev8028049.exea7601346.exeb6908917.exec2671895.exepid process 372 v4656787.exe 1952 v8218414.exe 2168 v8028049.exe 4008 a7601346.exe 3804 b6908917.exe 1240 c2671895.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
a7601346.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a7601346.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
v8028049.exe78789c5aaf0343c131fc0a3e0c0c411c3633cffbd4f6cfb9928e195cec459eb5.exev4656787.exev8218414.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v8028049.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 78789c5aaf0343c131fc0a3e0c0c411c3633cffbd4f6cfb9928e195cec459eb5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 78789c5aaf0343c131fc0a3e0c0c411c3633cffbd4f6cfb9928e195cec459eb5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4656787.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v4656787.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8218414.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v8218414.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8028049.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
b6908917.exedescription pid process target process PID 3804 set thread context of 4768 3804 b6908917.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1156 3804 WerFault.exe b6908917.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
Processes:
a7601346.exeAppLaunch.exec2671895.exepid process 4008 a7601346.exe 4008 a7601346.exe 4768 AppLaunch.exe 4768 AppLaunch.exe 1240 c2671895.exe 1240 c2671895.exe 1240 c2671895.exe 1240 c2671895.exe 1240 c2671895.exe 1240 c2671895.exe 1240 c2671895.exe 1240 c2671895.exe 1240 c2671895.exe 1240 c2671895.exe 1240 c2671895.exe 1240 c2671895.exe 1240 c2671895.exe 1240 c2671895.exe 1240 c2671895.exe 1240 c2671895.exe 1240 c2671895.exe 1240 c2671895.exe 1240 c2671895.exe 1240 c2671895.exe 1240 c2671895.exe 1240 c2671895.exe 1240 c2671895.exe 1240 c2671895.exe 1240 c2671895.exe 1240 c2671895.exe 1240 c2671895.exe 1240 c2671895.exe 1240 c2671895.exe 1240 c2671895.exe 1240 c2671895.exe 1240 c2671895.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
a7601346.exeAppLaunch.exec2671895.exedescription pid process Token: SeDebugPrivilege 4008 a7601346.exe Token: SeDebugPrivilege 4768 AppLaunch.exe Token: SeDebugPrivilege 1240 c2671895.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
78789c5aaf0343c131fc0a3e0c0c411c3633cffbd4f6cfb9928e195cec459eb5.exev4656787.exev8218414.exev8028049.exeb6908917.exedescription pid process target process PID 4924 wrote to memory of 372 4924 78789c5aaf0343c131fc0a3e0c0c411c3633cffbd4f6cfb9928e195cec459eb5.exe v4656787.exe PID 4924 wrote to memory of 372 4924 78789c5aaf0343c131fc0a3e0c0c411c3633cffbd4f6cfb9928e195cec459eb5.exe v4656787.exe PID 4924 wrote to memory of 372 4924 78789c5aaf0343c131fc0a3e0c0c411c3633cffbd4f6cfb9928e195cec459eb5.exe v4656787.exe PID 372 wrote to memory of 1952 372 v4656787.exe v8218414.exe PID 372 wrote to memory of 1952 372 v4656787.exe v8218414.exe PID 372 wrote to memory of 1952 372 v4656787.exe v8218414.exe PID 1952 wrote to memory of 2168 1952 v8218414.exe v8028049.exe PID 1952 wrote to memory of 2168 1952 v8218414.exe v8028049.exe PID 1952 wrote to memory of 2168 1952 v8218414.exe v8028049.exe PID 2168 wrote to memory of 4008 2168 v8028049.exe a7601346.exe PID 2168 wrote to memory of 4008 2168 v8028049.exe a7601346.exe PID 2168 wrote to memory of 3804 2168 v8028049.exe b6908917.exe PID 2168 wrote to memory of 3804 2168 v8028049.exe b6908917.exe PID 2168 wrote to memory of 3804 2168 v8028049.exe b6908917.exe PID 3804 wrote to memory of 4768 3804 b6908917.exe AppLaunch.exe PID 3804 wrote to memory of 4768 3804 b6908917.exe AppLaunch.exe PID 3804 wrote to memory of 4768 3804 b6908917.exe AppLaunch.exe PID 3804 wrote to memory of 4768 3804 b6908917.exe AppLaunch.exe PID 3804 wrote to memory of 4768 3804 b6908917.exe AppLaunch.exe PID 1952 wrote to memory of 1240 1952 v8218414.exe c2671895.exe PID 1952 wrote to memory of 1240 1952 v8218414.exe c2671895.exe PID 1952 wrote to memory of 1240 1952 v8218414.exe c2671895.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\78789c5aaf0343c131fc0a3e0c0c411c3633cffbd4f6cfb9928e195cec459eb5.exe"C:\Users\Admin\AppData\Local\Temp\78789c5aaf0343c131fc0a3e0c0c411c3633cffbd4f6cfb9928e195cec459eb5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4656787.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4656787.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8218414.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8218414.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8028049.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8028049.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7601346.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7601346.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6908917.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6908917.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3804 -s 2206⤵
- Program crash
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2671895.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2671895.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3804 -ip 38041⤵PID:3996
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4656787.exeFilesize
524KB
MD57219d654b64230ca20a98f8096a06af9
SHA1379f1bdb4e629e7ca1e3f8245fac2acc1a77fba2
SHA2567c76055fca1d0b6f590816dd8408207e70a0a8e8f562a5544c19782dbb485c01
SHA512931fbcc9565fd3634e66bce46a3408d8b1544cee304eb2d699ed5ca9b76e8f5b38bf2e178a68185f431c2125fadc1b833d59576c66aed368378ec3e6c3479913
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4656787.exeFilesize
524KB
MD57219d654b64230ca20a98f8096a06af9
SHA1379f1bdb4e629e7ca1e3f8245fac2acc1a77fba2
SHA2567c76055fca1d0b6f590816dd8408207e70a0a8e8f562a5544c19782dbb485c01
SHA512931fbcc9565fd3634e66bce46a3408d8b1544cee304eb2d699ed5ca9b76e8f5b38bf2e178a68185f431c2125fadc1b833d59576c66aed368378ec3e6c3479913
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8218414.exeFilesize
352KB
MD5ed02455fc1775349754e424136d4957e
SHA1a0faee15481fe4c84a52ce06421c5308efbc9475
SHA256b91c8ba3a37b81162eed239a6da942c36fdfe88b4ce83e85750e8dd08064010e
SHA512bd3be531f1864875104be99b94b32cfdcb95b8d9d860af3074f8451173ec01dd97e972c1c6ff947e80eb2ce926a0e8fd2db370286edd0dbe200c987c8aaf2c34
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8218414.exeFilesize
352KB
MD5ed02455fc1775349754e424136d4957e
SHA1a0faee15481fe4c84a52ce06421c5308efbc9475
SHA256b91c8ba3a37b81162eed239a6da942c36fdfe88b4ce83e85750e8dd08064010e
SHA512bd3be531f1864875104be99b94b32cfdcb95b8d9d860af3074f8451173ec01dd97e972c1c6ff947e80eb2ce926a0e8fd2db370286edd0dbe200c987c8aaf2c34
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2671895.exeFilesize
172KB
MD5e75b1e63343fdb114d45cc14d1ea668f
SHA1f7862516a152d4fd90403379757eccc94982b3eb
SHA2561001cc54ae8e964c6644492710762d05b48a9af6f6c623aca0c749fe8e2a5f8e
SHA5124239365787b2199b039835e400eaf56e1ccf2107d029d10bed4c91284bed499079816b572e523eaa6796ffcc5486ff7fc03b66d155f55d3d0c2a8e93612f4bfa
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2671895.exeFilesize
172KB
MD5e75b1e63343fdb114d45cc14d1ea668f
SHA1f7862516a152d4fd90403379757eccc94982b3eb
SHA2561001cc54ae8e964c6644492710762d05b48a9af6f6c623aca0c749fe8e2a5f8e
SHA5124239365787b2199b039835e400eaf56e1ccf2107d029d10bed4c91284bed499079816b572e523eaa6796ffcc5486ff7fc03b66d155f55d3d0c2a8e93612f4bfa
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8028049.exeFilesize
196KB
MD5faf8bc378a17ac7ac2dbf641514e0966
SHA120cca4b7fd13d1c42e26fd9825dcbdd357729618
SHA25673e32df1d729d1d1066c90d89985f7ace67b9c7da07e3478a803b9b5c896f079
SHA5121a9d4f0b281eff8b00af1c39c064706f9d8caec246ef354f6debb76b6856921f5b878a2134abec7d89dec439c34ce8599340b442f151b3ded1d7c27943ea5c07
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8028049.exeFilesize
196KB
MD5faf8bc378a17ac7ac2dbf641514e0966
SHA120cca4b7fd13d1c42e26fd9825dcbdd357729618
SHA25673e32df1d729d1d1066c90d89985f7ace67b9c7da07e3478a803b9b5c896f079
SHA5121a9d4f0b281eff8b00af1c39c064706f9d8caec246ef354f6debb76b6856921f5b878a2134abec7d89dec439c34ce8599340b442f151b3ded1d7c27943ea5c07
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7601346.exeFilesize
14KB
MD5a059322d84ec313eee942d05026489aa
SHA1d5a0bb9ba0dd51834b28cab9d3276d78887b713a
SHA2561a26ec1075e3ff55c361e9a0469ca4c1e77f48a8b2f3978468b4378167c7fe4b
SHA5124bd3699249b8e7f15c854002469c87b64e1f22804d7136c9d4d53b8d1f2fb42c2cc02bd7468fd4d8aa0721e106613fd2c272e9d793f432806eef8e68a31f1216
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7601346.exeFilesize
14KB
MD5a059322d84ec313eee942d05026489aa
SHA1d5a0bb9ba0dd51834b28cab9d3276d78887b713a
SHA2561a26ec1075e3ff55c361e9a0469ca4c1e77f48a8b2f3978468b4378167c7fe4b
SHA5124bd3699249b8e7f15c854002469c87b64e1f22804d7136c9d4d53b8d1f2fb42c2cc02bd7468fd4d8aa0721e106613fd2c272e9d793f432806eef8e68a31f1216
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6908917.exeFilesize
100KB
MD5fb59e64e4ec3d1985cc42567a4c1afff
SHA1bf695baffd22eccd359a616ce21fc2dc65f1bc8d
SHA256358ab4522adbb44c30fe17b687a85db820159a8ed9b4371a622842f339c2e9ba
SHA5124716abc2fd6d3d70168be0428069c7941be8fb710f3650d24718e5c4cd22cff5c9ea65a481576644855d0d51aecace001e8d212898e9dca4e5dc3cc494cd6dc2
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6908917.exeFilesize
100KB
MD5fb59e64e4ec3d1985cc42567a4c1afff
SHA1bf695baffd22eccd359a616ce21fc2dc65f1bc8d
SHA256358ab4522adbb44c30fe17b687a85db820159a8ed9b4371a622842f339c2e9ba
SHA5124716abc2fd6d3d70168be0428069c7941be8fb710f3650d24718e5c4cd22cff5c9ea65a481576644855d0d51aecace001e8d212898e9dca4e5dc3cc494cd6dc2
-
memory/1240-175-0x0000000000560000-0x0000000000590000-memory.dmpFilesize
192KB
-
memory/1240-180-0x0000000004F00000-0x0000000004F10000-memory.dmpFilesize
64KB
-
memory/1240-189-0x0000000004F00000-0x0000000004F10000-memory.dmpFilesize
64KB
-
memory/1240-176-0x000000000A9B0000-0x000000000AFC8000-memory.dmpFilesize
6.1MB
-
memory/1240-177-0x000000000A4E0000-0x000000000A5EA000-memory.dmpFilesize
1.0MB
-
memory/1240-178-0x000000000A420000-0x000000000A432000-memory.dmpFilesize
72KB
-
memory/1240-179-0x000000000A480000-0x000000000A4BC000-memory.dmpFilesize
240KB
-
memory/1240-188-0x000000000C4A0000-0x000000000C9CC000-memory.dmpFilesize
5.2MB
-
memory/1240-181-0x000000000A890000-0x000000000A906000-memory.dmpFilesize
472KB
-
memory/1240-182-0x000000000AFD0000-0x000000000B062000-memory.dmpFilesize
584KB
-
memory/1240-183-0x000000000B620000-0x000000000BBC4000-memory.dmpFilesize
5.6MB
-
memory/1240-184-0x000000000B070000-0x000000000B0D6000-memory.dmpFilesize
408KB
-
memory/1240-185-0x000000000B4B0000-0x000000000B500000-memory.dmpFilesize
320KB
-
memory/1240-187-0x000000000BDA0000-0x000000000BF62000-memory.dmpFilesize
1.8MB
-
memory/4008-161-0x0000000000BA0000-0x0000000000BAA000-memory.dmpFilesize
40KB
-
memory/4768-167-0x00000000005D0000-0x00000000005DA000-memory.dmpFilesize
40KB