Analysis
-
max time kernel
126s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2023 01:38
Static task
static1
Behavioral task
behavioral1
Sample
47bb8c81f5e779ab01a217714cb444ac59a0c98be91d792d35aac4f84fb443f0.exe
Resource
win10v2004-20230221-en
General
-
Target
47bb8c81f5e779ab01a217714cb444ac59a0c98be91d792d35aac4f84fb443f0.exe
-
Size
735KB
-
MD5
7df7f6020c08870cc7fb2650584da149
-
SHA1
dfc4575f999bf51c071ae28857bffb217bd875d9
-
SHA256
47bb8c81f5e779ab01a217714cb444ac59a0c98be91d792d35aac4f84fb443f0
-
SHA512
8ff004797e7b9e379005c138de2b3b963860fcbd1a57ef1735cc9ab59f4274f142b3bcd5e3302bd9f7df8d3c8f2c1bf00689eef104f97635d50f0df44bd9e203
-
SSDEEP
12288:KMrgy90PIem2BUzewFXCvgL2wiB9mibLVXIaGVM7Ungis7iYgVsmuDQb8H5BBbgG:eyPOUaIC4L2w6J5CkUgis7iYa78Z3bT
Malware Config
Extracted
redline
maxi
83.97.73.126:19048
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5063625.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a5063625.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5063625.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5063625.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5063625.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5063625.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 4504 v5546564.exe 4668 v0770827.exe 4368 v8276272.exe 4252 a5063625.exe 4124 b7427421.exe 224 c1875728.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a5063625.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5546564.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v5546564.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0770827.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v0770827.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8276272.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v8276272.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 47bb8c81f5e779ab01a217714cb444ac59a0c98be91d792d35aac4f84fb443f0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 47bb8c81f5e779ab01a217714cb444ac59a0c98be91d792d35aac4f84fb443f0.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4124 set thread context of 3428 4124 b7427421.exe 89 -
Program crash 1 IoCs
pid pid_target Process procid_target 556 4124 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 4252 a5063625.exe 4252 a5063625.exe 3428 AppLaunch.exe 3428 AppLaunch.exe 224 c1875728.exe 224 c1875728.exe 224 c1875728.exe 224 c1875728.exe 224 c1875728.exe 224 c1875728.exe 224 c1875728.exe 224 c1875728.exe 224 c1875728.exe 224 c1875728.exe 224 c1875728.exe 224 c1875728.exe 224 c1875728.exe 224 c1875728.exe 224 c1875728.exe 224 c1875728.exe 224 c1875728.exe 224 c1875728.exe 224 c1875728.exe 224 c1875728.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4252 a5063625.exe Token: SeDebugPrivilege 3428 AppLaunch.exe Token: SeDebugPrivilege 224 c1875728.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4580 wrote to memory of 4504 4580 47bb8c81f5e779ab01a217714cb444ac59a0c98be91d792d35aac4f84fb443f0.exe 83 PID 4580 wrote to memory of 4504 4580 47bb8c81f5e779ab01a217714cb444ac59a0c98be91d792d35aac4f84fb443f0.exe 83 PID 4580 wrote to memory of 4504 4580 47bb8c81f5e779ab01a217714cb444ac59a0c98be91d792d35aac4f84fb443f0.exe 83 PID 4504 wrote to memory of 4668 4504 v5546564.exe 84 PID 4504 wrote to memory of 4668 4504 v5546564.exe 84 PID 4504 wrote to memory of 4668 4504 v5546564.exe 84 PID 4668 wrote to memory of 4368 4668 v0770827.exe 85 PID 4668 wrote to memory of 4368 4668 v0770827.exe 85 PID 4668 wrote to memory of 4368 4668 v0770827.exe 85 PID 4368 wrote to memory of 4252 4368 v8276272.exe 86 PID 4368 wrote to memory of 4252 4368 v8276272.exe 86 PID 4368 wrote to memory of 4124 4368 v8276272.exe 87 PID 4368 wrote to memory of 4124 4368 v8276272.exe 87 PID 4368 wrote to memory of 4124 4368 v8276272.exe 87 PID 4124 wrote to memory of 3428 4124 b7427421.exe 89 PID 4124 wrote to memory of 3428 4124 b7427421.exe 89 PID 4124 wrote to memory of 3428 4124 b7427421.exe 89 PID 4124 wrote to memory of 3428 4124 b7427421.exe 89 PID 4124 wrote to memory of 3428 4124 b7427421.exe 89 PID 4668 wrote to memory of 224 4668 v0770827.exe 92 PID 4668 wrote to memory of 224 4668 v0770827.exe 92 PID 4668 wrote to memory of 224 4668 v0770827.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\47bb8c81f5e779ab01a217714cb444ac59a0c98be91d792d35aac4f84fb443f0.exe"C:\Users\Admin\AppData\Local\Temp\47bb8c81f5e779ab01a217714cb444ac59a0c98be91d792d35aac4f84fb443f0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5546564.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5546564.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0770827.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0770827.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8276272.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8276272.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5063625.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5063625.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4252
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b7427421.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b7427421.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 1406⤵
- Program crash
PID:556
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1875728.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1875728.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:224
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4124 -ip 41241⤵PID:2016
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
529KB
MD59e0c899a8178d2ff98126aa3fc0dc580
SHA1aaf01844d6591b02a8993cc5bf0d9d7b1b2c24d9
SHA256e81542e44d60e283862c183275d327911f80f331585d3b0c1ca7a4010d901318
SHA5125d43adf41438a4772df7ffdc0816d17bec90de92ffd40e8b62aaa76677c55272892732e2867f311877a9e00cd4a899275d392218c9b06251f66e90e8920b5ab1
-
Filesize
529KB
MD59e0c899a8178d2ff98126aa3fc0dc580
SHA1aaf01844d6591b02a8993cc5bf0d9d7b1b2c24d9
SHA256e81542e44d60e283862c183275d327911f80f331585d3b0c1ca7a4010d901318
SHA5125d43adf41438a4772df7ffdc0816d17bec90de92ffd40e8b62aaa76677c55272892732e2867f311877a9e00cd4a899275d392218c9b06251f66e90e8920b5ab1
-
Filesize
357KB
MD5d390f0a55200a978a5c76c650d19da41
SHA1e3a2541a7783e2e60631b17108b1cc4460420890
SHA256730c3299030ab70b0837e0aea63451003336e11738da614408920492fce30d29
SHA512539e81d88ff27a1ba945a57990c643e3073af4797476168e5e761bb605bc0bc6d380351256d4a925b32f3c10d60464e9c2c67390a6887752268547d4d02a8615
-
Filesize
357KB
MD5d390f0a55200a978a5c76c650d19da41
SHA1e3a2541a7783e2e60631b17108b1cc4460420890
SHA256730c3299030ab70b0837e0aea63451003336e11738da614408920492fce30d29
SHA512539e81d88ff27a1ba945a57990c643e3073af4797476168e5e761bb605bc0bc6d380351256d4a925b32f3c10d60464e9c2c67390a6887752268547d4d02a8615
-
Filesize
172KB
MD590cd1697bbaf045198d11f4d1972d8fc
SHA1ff3963115e943f348f7ce9e7746cd649f2c8280b
SHA25625d35a2e963d7d2681d25e511831fe4a868d41ed344a3f619b0f097b7427574a
SHA5122f1d98365ec7b3a953d3773232d138aa20aa26cbfe6b91f6b2c4095dfd4ad7925481a293a7eaff780897698f2c846789139e4758f4b5787a952491e5cba45a19
-
Filesize
172KB
MD590cd1697bbaf045198d11f4d1972d8fc
SHA1ff3963115e943f348f7ce9e7746cd649f2c8280b
SHA25625d35a2e963d7d2681d25e511831fe4a868d41ed344a3f619b0f097b7427574a
SHA5122f1d98365ec7b3a953d3773232d138aa20aa26cbfe6b91f6b2c4095dfd4ad7925481a293a7eaff780897698f2c846789139e4758f4b5787a952491e5cba45a19
-
Filesize
202KB
MD5d8d142cb141a1791acc45a7e97731871
SHA1a507539e3bf893467c574f0d2601d7855834eaad
SHA256a31eb0c1d85c6894897ea99283b58fef5158b287ac8c33f093fa80d12ac31313
SHA51224b5073a983200ddfa75fbf86b926531fb01f897c864e09d42ca477a717ad9e827741acadb3ba0711f434fd53078f16be80c1c124f93f3096a04efdddcb9a379
-
Filesize
202KB
MD5d8d142cb141a1791acc45a7e97731871
SHA1a507539e3bf893467c574f0d2601d7855834eaad
SHA256a31eb0c1d85c6894897ea99283b58fef5158b287ac8c33f093fa80d12ac31313
SHA51224b5073a983200ddfa75fbf86b926531fb01f897c864e09d42ca477a717ad9e827741acadb3ba0711f434fd53078f16be80c1c124f93f3096a04efdddcb9a379
-
Filesize
13KB
MD516352b42517bc0e9d0582ef5aaa546fb
SHA1f95f4127f6fc1caaafa0334c7522b2af2dbcdb5c
SHA25636bfef347c8ed554d265daaae65e9289392487ebe4157f7cbe86a5fb44aacd27
SHA5120b5151c5ba00e72e7c4a01b8b93d93bcd970dc204c0a8dad3df58a09c2a88517dc0c925bc755279e3e033aa17d84a40a3955e58f52576aca9b9adf4329c35b48
-
Filesize
13KB
MD516352b42517bc0e9d0582ef5aaa546fb
SHA1f95f4127f6fc1caaafa0334c7522b2af2dbcdb5c
SHA25636bfef347c8ed554d265daaae65e9289392487ebe4157f7cbe86a5fb44aacd27
SHA5120b5151c5ba00e72e7c4a01b8b93d93bcd970dc204c0a8dad3df58a09c2a88517dc0c925bc755279e3e033aa17d84a40a3955e58f52576aca9b9adf4329c35b48
-
Filesize
117KB
MD514457a02c016aa574ab87c43d654ddd8
SHA14c54bc12e5ecac39cbdcde4f31b86a30fd9165df
SHA2564cd4af00bb16de3804cc4dde683dab9a02663cdb13e2778451ebbbfe672ba8aa
SHA512019f3fb0c2b39d82a29f35a1a710d58fcd7e798d2af3db912db64fcc482548c663ac2038e55f01358f64f330e839d8ef9942cabd2d9e2e75a802fe479fdb3c7a
-
Filesize
117KB
MD514457a02c016aa574ab87c43d654ddd8
SHA14c54bc12e5ecac39cbdcde4f31b86a30fd9165df
SHA2564cd4af00bb16de3804cc4dde683dab9a02663cdb13e2778451ebbbfe672ba8aa
SHA512019f3fb0c2b39d82a29f35a1a710d58fcd7e798d2af3db912db64fcc482548c663ac2038e55f01358f64f330e839d8ef9942cabd2d9e2e75a802fe479fdb3c7a