Analysis
-
max time kernel
85s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2023 03:45
Static task
static1
Behavioral task
behavioral1
Sample
81768de38ce302d10041c419691a4181c1a26d7bf2b05c94919b277bd91ffd04.exe
Resource
win10v2004-20230221-en
General
-
Target
81768de38ce302d10041c419691a4181c1a26d7bf2b05c94919b277bd91ffd04.exe
-
Size
735KB
-
MD5
aeeb8a5443318465235ee20862092762
-
SHA1
c0fb85a50c87a11203c3429bf626ae596536aaa5
-
SHA256
81768de38ce302d10041c419691a4181c1a26d7bf2b05c94919b277bd91ffd04
-
SHA512
885274d14d2444925097e477769e588fba1849054063c203318ad3f0137a13871d15fb65b88c8ab5c736c3e25ae1111b640ba1c4e148ea2207cd86d5f2331241
-
SSDEEP
12288:oMrSy90HBrqo+p6zX3rW70nIjafx8qozQV626QRB2qiFVqFO/2tsiWm:ayKpnPLfx8J8V62av+OOtDWm
Malware Config
Extracted
redline
maxi
83.97.73.126:19048
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
a6655497.exeAppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a6655497.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a6655497.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a6655497.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a6655497.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a6655497.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a6655497.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
v5934584.exev1989329.exev3955544.exea6655497.exeb1486320.exec8573938.exepid process 1380 v5934584.exe 2168 v1989329.exe 2504 v3955544.exe 2112 a6655497.exe 3428 b1486320.exe 308 c8573938.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
a6655497.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a6655497.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
81768de38ce302d10041c419691a4181c1a26d7bf2b05c94919b277bd91ffd04.exev5934584.exev1989329.exev3955544.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 81768de38ce302d10041c419691a4181c1a26d7bf2b05c94919b277bd91ffd04.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5934584.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v5934584.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1989329.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v1989329.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3955544.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v3955544.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 81768de38ce302d10041c419691a4181c1a26d7bf2b05c94919b277bd91ffd04.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
b1486320.exedescription pid process target process PID 3428 set thread context of 2020 3428 b1486320.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1448 3428 WerFault.exe b1486320.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
a6655497.exeAppLaunch.exec8573938.exepid process 2112 a6655497.exe 2112 a6655497.exe 2020 AppLaunch.exe 2020 AppLaunch.exe 308 c8573938.exe 308 c8573938.exe 308 c8573938.exe 308 c8573938.exe 308 c8573938.exe 308 c8573938.exe 308 c8573938.exe 308 c8573938.exe 308 c8573938.exe 308 c8573938.exe 308 c8573938.exe 308 c8573938.exe 308 c8573938.exe 308 c8573938.exe 308 c8573938.exe 308 c8573938.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
a6655497.exeAppLaunch.exec8573938.exedescription pid process Token: SeDebugPrivilege 2112 a6655497.exe Token: SeDebugPrivilege 2020 AppLaunch.exe Token: SeDebugPrivilege 308 c8573938.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
81768de38ce302d10041c419691a4181c1a26d7bf2b05c94919b277bd91ffd04.exev5934584.exev1989329.exev3955544.exeb1486320.exedescription pid process target process PID 2312 wrote to memory of 1380 2312 81768de38ce302d10041c419691a4181c1a26d7bf2b05c94919b277bd91ffd04.exe v5934584.exe PID 2312 wrote to memory of 1380 2312 81768de38ce302d10041c419691a4181c1a26d7bf2b05c94919b277bd91ffd04.exe v5934584.exe PID 2312 wrote to memory of 1380 2312 81768de38ce302d10041c419691a4181c1a26d7bf2b05c94919b277bd91ffd04.exe v5934584.exe PID 1380 wrote to memory of 2168 1380 v5934584.exe v1989329.exe PID 1380 wrote to memory of 2168 1380 v5934584.exe v1989329.exe PID 1380 wrote to memory of 2168 1380 v5934584.exe v1989329.exe PID 2168 wrote to memory of 2504 2168 v1989329.exe v3955544.exe PID 2168 wrote to memory of 2504 2168 v1989329.exe v3955544.exe PID 2168 wrote to memory of 2504 2168 v1989329.exe v3955544.exe PID 2504 wrote to memory of 2112 2504 v3955544.exe a6655497.exe PID 2504 wrote to memory of 2112 2504 v3955544.exe a6655497.exe PID 2504 wrote to memory of 3428 2504 v3955544.exe b1486320.exe PID 2504 wrote to memory of 3428 2504 v3955544.exe b1486320.exe PID 2504 wrote to memory of 3428 2504 v3955544.exe b1486320.exe PID 3428 wrote to memory of 2020 3428 b1486320.exe AppLaunch.exe PID 3428 wrote to memory of 2020 3428 b1486320.exe AppLaunch.exe PID 3428 wrote to memory of 2020 3428 b1486320.exe AppLaunch.exe PID 3428 wrote to memory of 2020 3428 b1486320.exe AppLaunch.exe PID 3428 wrote to memory of 2020 3428 b1486320.exe AppLaunch.exe PID 2168 wrote to memory of 308 2168 v1989329.exe c8573938.exe PID 2168 wrote to memory of 308 2168 v1989329.exe c8573938.exe PID 2168 wrote to memory of 308 2168 v1989329.exe c8573938.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\81768de38ce302d10041c419691a4181c1a26d7bf2b05c94919b277bd91ffd04.exe"C:\Users\Admin\AppData\Local\Temp\81768de38ce302d10041c419691a4181c1a26d7bf2b05c94919b277bd91ffd04.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5934584.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5934584.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1989329.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1989329.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3955544.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3955544.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6655497.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6655497.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1486320.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1486320.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 1406⤵
- Program crash
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8573938.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8573938.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3428 -ip 34281⤵PID:3436
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5934584.exeFilesize
530KB
MD5c5f01eb78c15ae4005b45c1d7560414f
SHA1f2c58499c2c63b446caa6057f3765cf0f53fc112
SHA2562c76f7057f321b206cfb5b2311f125729dce5cb7ad1988ac45649b93db6b023f
SHA5126e77a650d2bf51a3963ddd9ca4c777b7765320b8db9f4070582c38e16262d66d4be5b1453a13862e2bcd05cfb7deb5356da1d36f11297912d4d9234b53548cfb
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5934584.exeFilesize
530KB
MD5c5f01eb78c15ae4005b45c1d7560414f
SHA1f2c58499c2c63b446caa6057f3765cf0f53fc112
SHA2562c76f7057f321b206cfb5b2311f125729dce5cb7ad1988ac45649b93db6b023f
SHA5126e77a650d2bf51a3963ddd9ca4c777b7765320b8db9f4070582c38e16262d66d4be5b1453a13862e2bcd05cfb7deb5356da1d36f11297912d4d9234b53548cfb
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1989329.exeFilesize
357KB
MD51547ddfd2e93ed7d208c73215f18f84c
SHA1f1d1195a83cf0a91c34698c85b681699354e1136
SHA256ceff4b11caed895ffe77fe95407ce959d7e39e0f84b538dc0d57f926a99ec43b
SHA512b255e0b6814d1f1dafb9c7971e2db706c0bf862ca9a70f5544b6568a5a2d381740f3e75cf11dea208fedb34cc7041358f7f2cc464529c92d6984f3ac8a72938e
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1989329.exeFilesize
357KB
MD51547ddfd2e93ed7d208c73215f18f84c
SHA1f1d1195a83cf0a91c34698c85b681699354e1136
SHA256ceff4b11caed895ffe77fe95407ce959d7e39e0f84b538dc0d57f926a99ec43b
SHA512b255e0b6814d1f1dafb9c7971e2db706c0bf862ca9a70f5544b6568a5a2d381740f3e75cf11dea208fedb34cc7041358f7f2cc464529c92d6984f3ac8a72938e
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8573938.exeFilesize
172KB
MD584727ed31ac0bfa4a57af897271fadff
SHA1ace03c88c4740d3d580e4097a873195a2e8475b0
SHA2565c4dbd288bb71c6f03e8ad78150b0775502d15419f84fb1c9559a6e9418a30bf
SHA51280e68a6b83fe136a34aae0f2232973ecd6cbaa2770c9c919f7c73cfedd22f6af4c29e2f55732a17a78568e2906c0d2425df2ea99f03a97e75686bb2c5a4b00fc
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8573938.exeFilesize
172KB
MD584727ed31ac0bfa4a57af897271fadff
SHA1ace03c88c4740d3d580e4097a873195a2e8475b0
SHA2565c4dbd288bb71c6f03e8ad78150b0775502d15419f84fb1c9559a6e9418a30bf
SHA51280e68a6b83fe136a34aae0f2232973ecd6cbaa2770c9c919f7c73cfedd22f6af4c29e2f55732a17a78568e2906c0d2425df2ea99f03a97e75686bb2c5a4b00fc
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3955544.exeFilesize
202KB
MD5f382081437fa69dc0473fd147a359d41
SHA1849f6e855c25134f8338a9787d1278cc06af29c4
SHA2567107e92647a1e19b057d85ff922f7628a3cebb88551be4e5eaeec79bba1a268d
SHA5123eb0fda2e3ecb2ed6074ae10b0e5fb24c1cb35f440be3fd21e21b536bc59c5b39d807f5c6bdc9777f2538ee9c660948d005fdbfff007a38622039694b8964c61
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3955544.exeFilesize
202KB
MD5f382081437fa69dc0473fd147a359d41
SHA1849f6e855c25134f8338a9787d1278cc06af29c4
SHA2567107e92647a1e19b057d85ff922f7628a3cebb88551be4e5eaeec79bba1a268d
SHA5123eb0fda2e3ecb2ed6074ae10b0e5fb24c1cb35f440be3fd21e21b536bc59c5b39d807f5c6bdc9777f2538ee9c660948d005fdbfff007a38622039694b8964c61
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6655497.exeFilesize
13KB
MD5cf4f11298c393d7687009410b8f138c7
SHA19e6419ba345df7ffe7af1e62f589566cfbcff7ce
SHA256abba528e2227398b6304f64ad152247377d30488b0742b09b48cb7c18caf4821
SHA512cb51ec5e181c01706a9667b1c885ac494248b8cc8a2f2a80e52ba2faba8154c6e45c0db950a05bf99e828b06ae0abebbf3d8bedf077573ea7b28c78e17b778bb
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a6655497.exeFilesize
13KB
MD5cf4f11298c393d7687009410b8f138c7
SHA19e6419ba345df7ffe7af1e62f589566cfbcff7ce
SHA256abba528e2227398b6304f64ad152247377d30488b0742b09b48cb7c18caf4821
SHA512cb51ec5e181c01706a9667b1c885ac494248b8cc8a2f2a80e52ba2faba8154c6e45c0db950a05bf99e828b06ae0abebbf3d8bedf077573ea7b28c78e17b778bb
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1486320.exeFilesize
117KB
MD5aa5d9491b448c05363ef909c28baf92f
SHA16fa7306df765063c10a190d44f93718af14325b7
SHA2569228ef4c26b3581745e0ce2b0875ef77d041f37acc8a46c7e47d1b78e86e2948
SHA51268bd05c401ec87044a173c79fc80a7543cd6ef13d24431822639b03dad801eb371748574b84e98bd03678ceaa094a14fbcda069687ccef8a0b45e70c69c79552
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1486320.exeFilesize
117KB
MD5aa5d9491b448c05363ef909c28baf92f
SHA16fa7306df765063c10a190d44f93718af14325b7
SHA2569228ef4c26b3581745e0ce2b0875ef77d041f37acc8a46c7e47d1b78e86e2948
SHA51268bd05c401ec87044a173c79fc80a7543cd6ef13d24431822639b03dad801eb371748574b84e98bd03678ceaa094a14fbcda069687ccef8a0b45e70c69c79552
-
memory/308-175-0x0000000000F80000-0x0000000000FB0000-memory.dmpFilesize
192KB
-
memory/308-180-0x0000000005780000-0x0000000005790000-memory.dmpFilesize
64KB
-
memory/308-189-0x000000000CF10000-0x000000000D43C000-memory.dmpFilesize
5.2MB
-
memory/308-176-0x000000000B380000-0x000000000B998000-memory.dmpFilesize
6.1MB
-
memory/308-177-0x000000000AF00000-0x000000000B00A000-memory.dmpFilesize
1.0MB
-
memory/308-178-0x000000000AE40000-0x000000000AE52000-memory.dmpFilesize
72KB
-
memory/308-179-0x000000000AEA0000-0x000000000AEDC000-memory.dmpFilesize
240KB
-
memory/308-188-0x000000000C810000-0x000000000C9D2000-memory.dmpFilesize
1.8MB
-
memory/308-181-0x000000000B2B0000-0x000000000B326000-memory.dmpFilesize
472KB
-
memory/308-182-0x000000000BA40000-0x000000000BAD2000-memory.dmpFilesize
584KB
-
memory/308-183-0x000000000C090000-0x000000000C634000-memory.dmpFilesize
5.6MB
-
memory/308-184-0x000000000BAE0000-0x000000000BB46000-memory.dmpFilesize
408KB
-
memory/308-186-0x000000000BFD0000-0x000000000C020000-memory.dmpFilesize
320KB
-
memory/308-187-0x0000000005780000-0x0000000005790000-memory.dmpFilesize
64KB
-
memory/2020-167-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/2112-161-0x00000000004C0000-0x00000000004CA000-memory.dmpFilesize
40KB