Analysis
-
max time kernel
137s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2023 22:38
Static task
static1
Behavioral task
behavioral1
Sample
a0bf2e9cda112a33e01e538a27e0eeffee84dfd1e71edcf063ba591b992a4670.exe
Resource
win10v2004-20230221-en
General
-
Target
a0bf2e9cda112a33e01e538a27e0eeffee84dfd1e71edcf063ba591b992a4670.exe
-
Size
716KB
-
MD5
406c5556d8c40ba45aa8e0384cda586e
-
SHA1
fdc42dfc3f5f0d391529c410162e71995cbc481d
-
SHA256
a0bf2e9cda112a33e01e538a27e0eeffee84dfd1e71edcf063ba591b992a4670
-
SHA512
4ff29899e5dfee2f409d58fc864beb826899e0aa5b99ec30062c1bce09a9ca885d53ccc50e17b832eea5336de297dcd81bbaf04c6222fffef2a5429c2b1456de
-
SSDEEP
12288:5MrFy90AKLb99P6XbZdpNVkzsCzrbXGVoy/apDu:sysb8ZLNVkzsCzPvyP
Malware Config
Extracted
redline
maxi
83.97.73.126:19048
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
AppLaunch.exea5126794.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a5126794.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5126794.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5126794.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5126794.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5126794.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5126794.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
v8546992.exev2277681.exev3381671.exea5126794.exeb7073516.exec9839190.exepid process 1968 v8546992.exe 2436 v2277681.exe 4520 v3381671.exe 4032 a5126794.exe 4512 b7073516.exe 3384 c9839190.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
a5126794.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a5126794.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
a0bf2e9cda112a33e01e538a27e0eeffee84dfd1e71edcf063ba591b992a4670.exev8546992.exev2277681.exev3381671.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a0bf2e9cda112a33e01e538a27e0eeffee84dfd1e71edcf063ba591b992a4670.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a0bf2e9cda112a33e01e538a27e0eeffee84dfd1e71edcf063ba591b992a4670.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8546992.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v8546992.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2277681.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v2277681.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3381671.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v3381671.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
b7073516.exedescription pid process target process PID 4512 set thread context of 1576 4512 b7073516.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1956 4512 WerFault.exe b7073516.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
a5126794.exeAppLaunch.exec9839190.exepid process 4032 a5126794.exe 4032 a5126794.exe 1576 AppLaunch.exe 1576 AppLaunch.exe 3384 c9839190.exe 3384 c9839190.exe 3384 c9839190.exe 3384 c9839190.exe 3384 c9839190.exe 3384 c9839190.exe 3384 c9839190.exe 3384 c9839190.exe 3384 c9839190.exe 3384 c9839190.exe 3384 c9839190.exe 3384 c9839190.exe 3384 c9839190.exe 3384 c9839190.exe 3384 c9839190.exe 3384 c9839190.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
a5126794.exeAppLaunch.exec9839190.exedescription pid process Token: SeDebugPrivilege 4032 a5126794.exe Token: SeDebugPrivilege 1576 AppLaunch.exe Token: SeDebugPrivilege 3384 c9839190.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
a0bf2e9cda112a33e01e538a27e0eeffee84dfd1e71edcf063ba591b992a4670.exev8546992.exev2277681.exev3381671.exeb7073516.exedescription pid process target process PID 2676 wrote to memory of 1968 2676 a0bf2e9cda112a33e01e538a27e0eeffee84dfd1e71edcf063ba591b992a4670.exe v8546992.exe PID 2676 wrote to memory of 1968 2676 a0bf2e9cda112a33e01e538a27e0eeffee84dfd1e71edcf063ba591b992a4670.exe v8546992.exe PID 2676 wrote to memory of 1968 2676 a0bf2e9cda112a33e01e538a27e0eeffee84dfd1e71edcf063ba591b992a4670.exe v8546992.exe PID 1968 wrote to memory of 2436 1968 v8546992.exe v2277681.exe PID 1968 wrote to memory of 2436 1968 v8546992.exe v2277681.exe PID 1968 wrote to memory of 2436 1968 v8546992.exe v2277681.exe PID 2436 wrote to memory of 4520 2436 v2277681.exe v3381671.exe PID 2436 wrote to memory of 4520 2436 v2277681.exe v3381671.exe PID 2436 wrote to memory of 4520 2436 v2277681.exe v3381671.exe PID 4520 wrote to memory of 4032 4520 v3381671.exe a5126794.exe PID 4520 wrote to memory of 4032 4520 v3381671.exe a5126794.exe PID 4520 wrote to memory of 4512 4520 v3381671.exe b7073516.exe PID 4520 wrote to memory of 4512 4520 v3381671.exe b7073516.exe PID 4520 wrote to memory of 4512 4520 v3381671.exe b7073516.exe PID 4512 wrote to memory of 1576 4512 b7073516.exe AppLaunch.exe PID 4512 wrote to memory of 1576 4512 b7073516.exe AppLaunch.exe PID 4512 wrote to memory of 1576 4512 b7073516.exe AppLaunch.exe PID 4512 wrote to memory of 1576 4512 b7073516.exe AppLaunch.exe PID 4512 wrote to memory of 1576 4512 b7073516.exe AppLaunch.exe PID 2436 wrote to memory of 3384 2436 v2277681.exe c9839190.exe PID 2436 wrote to memory of 3384 2436 v2277681.exe c9839190.exe PID 2436 wrote to memory of 3384 2436 v2277681.exe c9839190.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0bf2e9cda112a33e01e538a27e0eeffee84dfd1e71edcf063ba591b992a4670.exe"C:\Users\Admin\AppData\Local\Temp\a0bf2e9cda112a33e01e538a27e0eeffee84dfd1e71edcf063ba591b992a4670.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8546992.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8546992.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2277681.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2277681.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3381671.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3381671.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5126794.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5126794.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4032
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b7073516.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b7073516.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1576
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4512 -s 2206⤵
- Program crash
PID:1956
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9839190.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9839190.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3384
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4512 -ip 45121⤵PID:100
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
523KB
MD5ed4c3fa0d0fe838f1baae7fc8c05da8b
SHA14c745ef744e9054b39881359f85de74cf77221e7
SHA25694aa709a4b01424a69f781fcd3c2550f41266a2b9fe154cabebe59b257a16063
SHA5128a77ef5326f30e1d95d87cee6d104b954cd6de59adfb5ee1aaefd7212c6985c2d2b74699f0ccd3b742f2da49d85ecb4c0c644894a433af04dfbf8790d39bef2f
-
Filesize
523KB
MD5ed4c3fa0d0fe838f1baae7fc8c05da8b
SHA14c745ef744e9054b39881359f85de74cf77221e7
SHA25694aa709a4b01424a69f781fcd3c2550f41266a2b9fe154cabebe59b257a16063
SHA5128a77ef5326f30e1d95d87cee6d104b954cd6de59adfb5ee1aaefd7212c6985c2d2b74699f0ccd3b742f2da49d85ecb4c0c644894a433af04dfbf8790d39bef2f
-
Filesize
351KB
MD534acbaf6480cdbfe0b640805398f4c37
SHA1f18722c5b6df9eae69f9b00d75e278014c8ccfe0
SHA25643a283d8f76436f4aea972597cec5a133b3ddbf0dcfec9a11cf6928de3c19184
SHA5123f127e87271a88346d29dbcc12efd02ff148276d60866b4cf5466c2f97f2f223cf821d3754615e0bb100ca002eebd8d02aec5d77fb3215b3d60f37d573de3cbf
-
Filesize
351KB
MD534acbaf6480cdbfe0b640805398f4c37
SHA1f18722c5b6df9eae69f9b00d75e278014c8ccfe0
SHA25643a283d8f76436f4aea972597cec5a133b3ddbf0dcfec9a11cf6928de3c19184
SHA5123f127e87271a88346d29dbcc12efd02ff148276d60866b4cf5466c2f97f2f223cf821d3754615e0bb100ca002eebd8d02aec5d77fb3215b3d60f37d573de3cbf
-
Filesize
172KB
MD5d29ce149b28ddd90ed4f555db80a62be
SHA15787eb3af832f9bb474a03af765bd3b84cc008f9
SHA2565fd7843800900acdc7ea0b2a32a0748c54c1c519a948e61d8e89dbd1fb7069d6
SHA5122d293aa9c7b26d9c1756b0c9d21747c3106f24ed05571523ea235ef78dda6fe7b4fe4ea4bf34cdb32f0f170706bddc0e1a0e34d3621eb9382f240feebdc52adc
-
Filesize
172KB
MD5d29ce149b28ddd90ed4f555db80a62be
SHA15787eb3af832f9bb474a03af765bd3b84cc008f9
SHA2565fd7843800900acdc7ea0b2a32a0748c54c1c519a948e61d8e89dbd1fb7069d6
SHA5122d293aa9c7b26d9c1756b0c9d21747c3106f24ed05571523ea235ef78dda6fe7b4fe4ea4bf34cdb32f0f170706bddc0e1a0e34d3621eb9382f240feebdc52adc
-
Filesize
196KB
MD50963c88bd06b1b1c831ad632d475e1af
SHA1df34621659ec6ba01e06d048dd28f2d62395151e
SHA2561aca2328156a8a841fe0dd49a0761e08f8c0feb8e15990ab44ba6a68c6aa2688
SHA512ebd9b7ae085e1cbcbed18a3a3c9b6447490483d9fe271bdd504947d53652db5214e42134afe3df778d9462eacf603912e5e4153b684c1526a9bb851e7386e857
-
Filesize
196KB
MD50963c88bd06b1b1c831ad632d475e1af
SHA1df34621659ec6ba01e06d048dd28f2d62395151e
SHA2561aca2328156a8a841fe0dd49a0761e08f8c0feb8e15990ab44ba6a68c6aa2688
SHA512ebd9b7ae085e1cbcbed18a3a3c9b6447490483d9fe271bdd504947d53652db5214e42134afe3df778d9462eacf603912e5e4153b684c1526a9bb851e7386e857
-
Filesize
14KB
MD5c07d66690f9a8e25e09db3e1aa38d0b6
SHA10d6771353c0943bfff56d970aad61b6f859282ee
SHA2560516e9acdae728f4b635e15f73ecd8dc44358416b77c41155974a75ffb69b302
SHA5129cc37bd721b691db2f8ed34092e237aa52683746e4c34193c0dd2d24b566b3fceb9ac419b30698a94f1c31aec6fb0b53af5e19ce5e6cfccd1ee346f77a72ca9c
-
Filesize
14KB
MD5c07d66690f9a8e25e09db3e1aa38d0b6
SHA10d6771353c0943bfff56d970aad61b6f859282ee
SHA2560516e9acdae728f4b635e15f73ecd8dc44358416b77c41155974a75ffb69b302
SHA5129cc37bd721b691db2f8ed34092e237aa52683746e4c34193c0dd2d24b566b3fceb9ac419b30698a94f1c31aec6fb0b53af5e19ce5e6cfccd1ee346f77a72ca9c
-
Filesize
100KB
MD54b7d470dbe19739036bf3e25df5a925d
SHA17b1f65ff53124a156157ff2733789d6152f2627a
SHA2561d30a600fca53187b39cfdf8b670a975bfd5b70f908943d5a73b2ea2d714eb29
SHA51200f54bfa706fcb16e792313742b6d9253f4300896f8f7e7cb5fe797cec2216db2548a40826aedb9dc680489fb286490bab87e10ffa89b21afe7285071bfbd446
-
Filesize
100KB
MD54b7d470dbe19739036bf3e25df5a925d
SHA17b1f65ff53124a156157ff2733789d6152f2627a
SHA2561d30a600fca53187b39cfdf8b670a975bfd5b70f908943d5a73b2ea2d714eb29
SHA51200f54bfa706fcb16e792313742b6d9253f4300896f8f7e7cb5fe797cec2216db2548a40826aedb9dc680489fb286490bab87e10ffa89b21afe7285071bfbd446