Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2023 02:38
Static task
static1
Behavioral task
behavioral1
Sample
19ac755988d43e7a2f5dbb350f42f1b10e2b87769d648fb292b70f711af21945.exe
Resource
win10v2004-20230220-en
General
-
Target
19ac755988d43e7a2f5dbb350f42f1b10e2b87769d648fb292b70f711af21945.exe
-
Size
735KB
-
MD5
b909e9c251c601a63028d59aa2974f19
-
SHA1
18300fd5e3c42c23d3bc3af68e547f2e23b47813
-
SHA256
19ac755988d43e7a2f5dbb350f42f1b10e2b87769d648fb292b70f711af21945
-
SHA512
4ac4e05cb20b0cafc198df9d5747910f255873769fe6641b30fb2e4412769e19b26ba87ea75f71f86a2d3a70ae846950eee61b531543a3f3585008807946cbb8
-
SSDEEP
12288:OMrey90NrpOKgGa7D2nf5h/WAbrNBnF98pMj+7fZQZ0Crd3mRuZIQO:kygCGnOAbrvb8p/7fZQm82AqQO
Malware Config
Extracted
redline
maxi
83.97.73.126:19048
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
a6710118.exeAppLaunch.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a6710118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a6710118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a6710118.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a6710118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a6710118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a6710118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
v1082707.exev5771530.exev5402290.exea6710118.exeb9790388.exec7682281.exepid process 3088 v1082707.exe 4448 v5771530.exe 4708 v5402290.exe 4648 a6710118.exe 632 b9790388.exe 312 c7682281.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
a6710118.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a6710118.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
v5402290.exe19ac755988d43e7a2f5dbb350f42f1b10e2b87769d648fb292b70f711af21945.exev1082707.exev5771530.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v5402290.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 19ac755988d43e7a2f5dbb350f42f1b10e2b87769d648fb292b70f711af21945.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 19ac755988d43e7a2f5dbb350f42f1b10e2b87769d648fb292b70f711af21945.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1082707.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v1082707.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5771530.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v5771530.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5402290.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
b9790388.exedescription pid process target process PID 632 set thread context of 3804 632 b9790388.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3460 632 WerFault.exe b9790388.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
Processes:
a6710118.exeAppLaunch.exec7682281.exepid process 4648 a6710118.exe 4648 a6710118.exe 3804 AppLaunch.exe 3804 AppLaunch.exe 312 c7682281.exe 312 c7682281.exe 312 c7682281.exe 312 c7682281.exe 312 c7682281.exe 312 c7682281.exe 312 c7682281.exe 312 c7682281.exe 312 c7682281.exe 312 c7682281.exe 312 c7682281.exe 312 c7682281.exe 312 c7682281.exe 312 c7682281.exe 312 c7682281.exe 312 c7682281.exe 312 c7682281.exe 312 c7682281.exe 312 c7682281.exe 312 c7682281.exe 312 c7682281.exe 312 c7682281.exe 312 c7682281.exe 312 c7682281.exe 312 c7682281.exe 312 c7682281.exe 312 c7682281.exe 312 c7682281.exe 312 c7682281.exe 312 c7682281.exe 312 c7682281.exe 312 c7682281.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
a6710118.exeAppLaunch.exec7682281.exedescription pid process Token: SeDebugPrivilege 4648 a6710118.exe Token: SeDebugPrivilege 3804 AppLaunch.exe Token: SeDebugPrivilege 312 c7682281.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
19ac755988d43e7a2f5dbb350f42f1b10e2b87769d648fb292b70f711af21945.exev1082707.exev5771530.exev5402290.exeb9790388.exedescription pid process target process PID 4340 wrote to memory of 3088 4340 19ac755988d43e7a2f5dbb350f42f1b10e2b87769d648fb292b70f711af21945.exe v1082707.exe PID 4340 wrote to memory of 3088 4340 19ac755988d43e7a2f5dbb350f42f1b10e2b87769d648fb292b70f711af21945.exe v1082707.exe PID 4340 wrote to memory of 3088 4340 19ac755988d43e7a2f5dbb350f42f1b10e2b87769d648fb292b70f711af21945.exe v1082707.exe PID 3088 wrote to memory of 4448 3088 v1082707.exe v5771530.exe PID 3088 wrote to memory of 4448 3088 v1082707.exe v5771530.exe PID 3088 wrote to memory of 4448 3088 v1082707.exe v5771530.exe PID 4448 wrote to memory of 4708 4448 v5771530.exe v5402290.exe PID 4448 wrote to memory of 4708 4448 v5771530.exe v5402290.exe PID 4448 wrote to memory of 4708 4448 v5771530.exe v5402290.exe PID 4708 wrote to memory of 4648 4708 v5402290.exe a6710118.exe PID 4708 wrote to memory of 4648 4708 v5402290.exe a6710118.exe PID 4708 wrote to memory of 632 4708 v5402290.exe b9790388.exe PID 4708 wrote to memory of 632 4708 v5402290.exe b9790388.exe PID 4708 wrote to memory of 632 4708 v5402290.exe b9790388.exe PID 632 wrote to memory of 3804 632 b9790388.exe AppLaunch.exe PID 632 wrote to memory of 3804 632 b9790388.exe AppLaunch.exe PID 632 wrote to memory of 3804 632 b9790388.exe AppLaunch.exe PID 632 wrote to memory of 3804 632 b9790388.exe AppLaunch.exe PID 632 wrote to memory of 3804 632 b9790388.exe AppLaunch.exe PID 4448 wrote to memory of 312 4448 v5771530.exe c7682281.exe PID 4448 wrote to memory of 312 4448 v5771530.exe c7682281.exe PID 4448 wrote to memory of 312 4448 v5771530.exe c7682281.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\19ac755988d43e7a2f5dbb350f42f1b10e2b87769d648fb292b70f711af21945.exe"C:\Users\Admin\AppData\Local\Temp\19ac755988d43e7a2f5dbb350f42f1b10e2b87769d648fb292b70f711af21945.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1082707.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1082707.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5771530.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5771530.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5402290.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5402290.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6710118.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6710118.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b9790388.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b9790388.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 632 -s 5726⤵
- Program crash
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c7682281.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c7682281.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 632 -ip 6321⤵PID:3872
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1082707.exeFilesize
529KB
MD55a7d170f1dc2a1f663e989d824b2111d
SHA115892b12f9d8e60506a902f15ed20e8c2639e73e
SHA25668b926a68381c91cad73b47ab3baad29831800ad9897e4a2589957ca56aa52c8
SHA5128e080a0d1b111603a2eff4ed1b3a199084dfe593db6cffa3c94ea3f12551731356d8bae44236bf5b5e301913d0f8191d992f99e0bb5a443a5855bc3a0dac6cc2
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1082707.exeFilesize
529KB
MD55a7d170f1dc2a1f663e989d824b2111d
SHA115892b12f9d8e60506a902f15ed20e8c2639e73e
SHA25668b926a68381c91cad73b47ab3baad29831800ad9897e4a2589957ca56aa52c8
SHA5128e080a0d1b111603a2eff4ed1b3a199084dfe593db6cffa3c94ea3f12551731356d8bae44236bf5b5e301913d0f8191d992f99e0bb5a443a5855bc3a0dac6cc2
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5771530.exeFilesize
357KB
MD58cfab03f14da1ec7bec9ba8e5e7e383f
SHA1bb37d2b73ea3274e655497dde453f5f3d3b3ffee
SHA256779081bf470254428307aa265f8d53ade6c1a0f263a16eb6ea91dd217f35119e
SHA512723a591a7b4f0797630ea32e22a8690faed34d3cbcb3aea91aaffddccc41e7133a2aabfd446359b8aac1375c0add46e6791ca6ee75e70e721abf986d8793b9f9
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5771530.exeFilesize
357KB
MD58cfab03f14da1ec7bec9ba8e5e7e383f
SHA1bb37d2b73ea3274e655497dde453f5f3d3b3ffee
SHA256779081bf470254428307aa265f8d53ade6c1a0f263a16eb6ea91dd217f35119e
SHA512723a591a7b4f0797630ea32e22a8690faed34d3cbcb3aea91aaffddccc41e7133a2aabfd446359b8aac1375c0add46e6791ca6ee75e70e721abf986d8793b9f9
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c7682281.exeFilesize
172KB
MD56f7bd36876d5e6f248c5728fa46bbf56
SHA1390663636db202e2c158b72f9014b1106ccd7c9f
SHA2560cdd37d4274d3a9f9444932507d662fda0ed58d4752c05860e4f2aae8e320603
SHA512107bb342e2f89b20489a1d5e52074c9381082c3d477154fc70054701242582b6bb0a0adfa536817014a6919ca6875203a5c1dbaaeb225c5cf97c07c78461c3c8
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c7682281.exeFilesize
172KB
MD56f7bd36876d5e6f248c5728fa46bbf56
SHA1390663636db202e2c158b72f9014b1106ccd7c9f
SHA2560cdd37d4274d3a9f9444932507d662fda0ed58d4752c05860e4f2aae8e320603
SHA512107bb342e2f89b20489a1d5e52074c9381082c3d477154fc70054701242582b6bb0a0adfa536817014a6919ca6875203a5c1dbaaeb225c5cf97c07c78461c3c8
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5402290.exeFilesize
202KB
MD565cd0eab17f71804e39f8eead4a9f311
SHA1bd90a868a4de06e07351b91961cc2637f5002089
SHA2563826c8e755841406af26abf829c2806428a5ccd038602be4579f54c66aca7809
SHA512f4089505186962a36622daed8efcdec71cb32ef5a6cb30a577aaffa20213feacb3d74dd0fd91148e94aae4ac45f1594899deed1e7af3a6b9af8c2e6c376c40be
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5402290.exeFilesize
202KB
MD565cd0eab17f71804e39f8eead4a9f311
SHA1bd90a868a4de06e07351b91961cc2637f5002089
SHA2563826c8e755841406af26abf829c2806428a5ccd038602be4579f54c66aca7809
SHA512f4089505186962a36622daed8efcdec71cb32ef5a6cb30a577aaffa20213feacb3d74dd0fd91148e94aae4ac45f1594899deed1e7af3a6b9af8c2e6c376c40be
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6710118.exeFilesize
13KB
MD5dc159fb79c3d3dc53699a33e00641c4f
SHA119727096e63b8219f29cc8057c0398e581ec5f29
SHA2564a662ac61de46d8ba17ea917ecaa3676f649b9de66836931a5368f31f9895baf
SHA5120dad2886b358f38e53ad89b89d5aa51942a8860c41b4666a6afe44a9bd3aeef218b2eb1c2fe27276a564a4b9472d8f1427e48b7ba37a9aa9d1e4c767e8b5492b
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6710118.exeFilesize
13KB
MD5dc159fb79c3d3dc53699a33e00641c4f
SHA119727096e63b8219f29cc8057c0398e581ec5f29
SHA2564a662ac61de46d8ba17ea917ecaa3676f649b9de66836931a5368f31f9895baf
SHA5120dad2886b358f38e53ad89b89d5aa51942a8860c41b4666a6afe44a9bd3aeef218b2eb1c2fe27276a564a4b9472d8f1427e48b7ba37a9aa9d1e4c767e8b5492b
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b9790388.exeFilesize
117KB
MD5e70fced11f2f1510550cc78f61d45473
SHA1b1a9e5b5f53fc4b40915359ebaa335757319a137
SHA25651e5077848653103fd198364fd2f6483f3a96ddb4db62847844c7578b1e6a5fb
SHA512657171ffd77c44ecfb62e10c63fe1d21b2c491988675322954bf288af30d7d47e1545066424627115b6536af821b581e2edad3b024be29903df60dc7448c86f4
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b9790388.exeFilesize
117KB
MD5e70fced11f2f1510550cc78f61d45473
SHA1b1a9e5b5f53fc4b40915359ebaa335757319a137
SHA25651e5077848653103fd198364fd2f6483f3a96ddb4db62847844c7578b1e6a5fb
SHA512657171ffd77c44ecfb62e10c63fe1d21b2c491988675322954bf288af30d7d47e1545066424627115b6536af821b581e2edad3b024be29903df60dc7448c86f4
-
memory/312-175-0x0000000000C70000-0x0000000000CA0000-memory.dmpFilesize
192KB
-
memory/312-180-0x00000000055B0000-0x00000000055C0000-memory.dmpFilesize
64KB
-
memory/312-189-0x000000000BDD0000-0x000000000BE20000-memory.dmpFilesize
320KB
-
memory/312-176-0x000000000B070000-0x000000000B688000-memory.dmpFilesize
6.1MB
-
memory/312-177-0x000000000ABF0000-0x000000000ACFA000-memory.dmpFilesize
1.0MB
-
memory/312-178-0x000000000AB30000-0x000000000AB42000-memory.dmpFilesize
72KB
-
memory/312-179-0x000000000AB90000-0x000000000ABCC000-memory.dmpFilesize
240KB
-
memory/312-188-0x00000000055B0000-0x00000000055C0000-memory.dmpFilesize
64KB
-
memory/312-181-0x000000000AEA0000-0x000000000AF16000-memory.dmpFilesize
472KB
-
memory/312-182-0x000000000AFC0000-0x000000000B052000-memory.dmpFilesize
584KB
-
memory/312-183-0x000000000AF20000-0x000000000AF86000-memory.dmpFilesize
408KB
-
memory/312-184-0x000000000C080000-0x000000000C624000-memory.dmpFilesize
5.6MB
-
memory/312-186-0x000000000C630000-0x000000000C7F2000-memory.dmpFilesize
1.8MB
-
memory/312-187-0x000000000CD30000-0x000000000D25C000-memory.dmpFilesize
5.2MB
-
memory/3804-167-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/4648-161-0x0000000000390000-0x000000000039A000-memory.dmpFilesize
40KB