Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2023 04:15
Static task
static1
Behavioral task
behavioral1
Sample
ad97962cf21b019a9d5a154c3b497a2aebf15786ed51565372938d969cb7694e.exe
Resource
win10v2004-20230220-en
General
-
Target
ad97962cf21b019a9d5a154c3b497a2aebf15786ed51565372938d969cb7694e.exe
-
Size
734KB
-
MD5
9efcf13c473aa0a1a0d6f559703bb54b
-
SHA1
2e3cc4a24e9566188dbb4201484d15ca1aaeee4c
-
SHA256
ad97962cf21b019a9d5a154c3b497a2aebf15786ed51565372938d969cb7694e
-
SHA512
1a7d1d07049eca32c2c106e66302aeba27c6002e4db604f16a18abd4b5f9fbabcf81d535fd031596600253f6f6d9d847778e4001cf37c30ef9f2f534563e0da6
-
SSDEEP
12288:TMrYy90fXmKlDFiMdFD8mUdKxDaf+RFdVoG4Ld4FYrEqjHkUjHD2/YUwjfEun:Dy4PZpbDIdOlDVC54FWhHrUwXn
Malware Config
Extracted
redline
maxi
83.97.73.126:19048
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
a2289986.exeAppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a2289986.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a2289986.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a2289986.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a2289986.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a2289986.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a2289986.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
v7314635.exev4395854.exev2632826.exea2289986.exeb7589688.exec1456205.exepid process 1624 v7314635.exe 2272 v4395854.exe 4124 v2632826.exe 4940 a2289986.exe 656 b7589688.exe 4652 c1456205.exe -
Processes:
a2289986.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a2289986.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
v7314635.exev4395854.exev2632826.exead97962cf21b019a9d5a154c3b497a2aebf15786ed51565372938d969cb7694e.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7314635.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4395854.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v4395854.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2632826.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v2632826.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ad97962cf21b019a9d5a154c3b497a2aebf15786ed51565372938d969cb7694e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ad97962cf21b019a9d5a154c3b497a2aebf15786ed51565372938d969cb7694e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7314635.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b7589688.exedescription pid process target process PID 656 set thread context of 1992 656 b7589688.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2208 656 WerFault.exe b7589688.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
a2289986.exeAppLaunch.exepid process 4940 a2289986.exe 4940 a2289986.exe 1992 AppLaunch.exe 1992 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
a2289986.exeAppLaunch.exedescription pid process Token: SeDebugPrivilege 4940 a2289986.exe Token: SeDebugPrivilege 1992 AppLaunch.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
ad97962cf21b019a9d5a154c3b497a2aebf15786ed51565372938d969cb7694e.exev7314635.exev4395854.exev2632826.exeb7589688.exedescription pid process target process PID 1192 wrote to memory of 1624 1192 ad97962cf21b019a9d5a154c3b497a2aebf15786ed51565372938d969cb7694e.exe v7314635.exe PID 1192 wrote to memory of 1624 1192 ad97962cf21b019a9d5a154c3b497a2aebf15786ed51565372938d969cb7694e.exe v7314635.exe PID 1192 wrote to memory of 1624 1192 ad97962cf21b019a9d5a154c3b497a2aebf15786ed51565372938d969cb7694e.exe v7314635.exe PID 1624 wrote to memory of 2272 1624 v7314635.exe v4395854.exe PID 1624 wrote to memory of 2272 1624 v7314635.exe v4395854.exe PID 1624 wrote to memory of 2272 1624 v7314635.exe v4395854.exe PID 2272 wrote to memory of 4124 2272 v4395854.exe v2632826.exe PID 2272 wrote to memory of 4124 2272 v4395854.exe v2632826.exe PID 2272 wrote to memory of 4124 2272 v4395854.exe v2632826.exe PID 4124 wrote to memory of 4940 4124 v2632826.exe a2289986.exe PID 4124 wrote to memory of 4940 4124 v2632826.exe a2289986.exe PID 4124 wrote to memory of 656 4124 v2632826.exe b7589688.exe PID 4124 wrote to memory of 656 4124 v2632826.exe b7589688.exe PID 4124 wrote to memory of 656 4124 v2632826.exe b7589688.exe PID 656 wrote to memory of 1992 656 b7589688.exe AppLaunch.exe PID 656 wrote to memory of 1992 656 b7589688.exe AppLaunch.exe PID 656 wrote to memory of 1992 656 b7589688.exe AppLaunch.exe PID 656 wrote to memory of 1992 656 b7589688.exe AppLaunch.exe PID 656 wrote to memory of 1992 656 b7589688.exe AppLaunch.exe PID 2272 wrote to memory of 4652 2272 v4395854.exe c1456205.exe PID 2272 wrote to memory of 4652 2272 v4395854.exe c1456205.exe PID 2272 wrote to memory of 4652 2272 v4395854.exe c1456205.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad97962cf21b019a9d5a154c3b497a2aebf15786ed51565372938d969cb7694e.exe"C:\Users\Admin\AppData\Local\Temp\ad97962cf21b019a9d5a154c3b497a2aebf15786ed51565372938d969cb7694e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7314635.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7314635.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4395854.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4395854.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2632826.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2632826.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a2289986.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a2289986.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b7589688.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b7589688.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 1406⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1456205.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1456205.exe4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 656 -ip 6561⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7314635.exeFilesize
529KB
MD5c4028e08259961a9be9a55eb18b6fc58
SHA1e6fc4ca26967ff414e519be6919d5aba00d9aa13
SHA256ae22fb2f7f1b2981e579b52e6765fb7b532fa9a8f6fb20fbf0d628c49fb8efd8
SHA512e8aca447abbccb29f5f7bad6fe2cff296bfc3ee3d8a1e3b8a73c8592dfb3e14053c7c3b3996f6f15e8ae35bf1f5b11260003c99f8b1ff55be613cd8880ca355f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7314635.exeFilesize
529KB
MD5c4028e08259961a9be9a55eb18b6fc58
SHA1e6fc4ca26967ff414e519be6919d5aba00d9aa13
SHA256ae22fb2f7f1b2981e579b52e6765fb7b532fa9a8f6fb20fbf0d628c49fb8efd8
SHA512e8aca447abbccb29f5f7bad6fe2cff296bfc3ee3d8a1e3b8a73c8592dfb3e14053c7c3b3996f6f15e8ae35bf1f5b11260003c99f8b1ff55be613cd8880ca355f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4395854.exeFilesize
357KB
MD5111800589d444214502f1381a50e7c5f
SHA1959a51984a60e794414739e314909adf360a1bd8
SHA256ca64819fab613a88d79ed0ca2e40e360cd3069e13a19f53be0f42add7341642e
SHA512e479c07829ff4f98aece20345e1e1a0dc5092429db0d2722beb9b9145c81e5fbefe73bf2295c155b048d9b46de0ac6e638ed8f989434a8470eca6472f77ed8cf
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4395854.exeFilesize
357KB
MD5111800589d444214502f1381a50e7c5f
SHA1959a51984a60e794414739e314909adf360a1bd8
SHA256ca64819fab613a88d79ed0ca2e40e360cd3069e13a19f53be0f42add7341642e
SHA512e479c07829ff4f98aece20345e1e1a0dc5092429db0d2722beb9b9145c81e5fbefe73bf2295c155b048d9b46de0ac6e638ed8f989434a8470eca6472f77ed8cf
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1456205.exeFilesize
172KB
MD58ea7a7faebfe6547e73b67c1e033ca6e
SHA192797da3b8f812af2744ae28545e6d1265bcbab3
SHA256e6c5f120099c496f49903127fe17c46a63efc7cad83319c760d39581582f604d
SHA51234d8663f9ac3809dedce3ba36a9accc4f9cc238d9e5898e50aff8e14cf85a50b06ecb961e13a1088a1c4913daf7394573c7d5425b0f3c99b121ea9c7cef86d6d
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1456205.exeFilesize
172KB
MD58ea7a7faebfe6547e73b67c1e033ca6e
SHA192797da3b8f812af2744ae28545e6d1265bcbab3
SHA256e6c5f120099c496f49903127fe17c46a63efc7cad83319c760d39581582f604d
SHA51234d8663f9ac3809dedce3ba36a9accc4f9cc238d9e5898e50aff8e14cf85a50b06ecb961e13a1088a1c4913daf7394573c7d5425b0f3c99b121ea9c7cef86d6d
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2632826.exeFilesize
202KB
MD506f83cf6119a42f5b1936b5990b783db
SHA1f46bdb9a50aa691777358c3257abc817c9d5000c
SHA25683df1119868c8da93dd8429b21af81e8dfb721109590715085070f034d324b72
SHA512ee7d198857dd067a00967abab4c904ff7bf34ae363e5337a23dc77e62ae809d730f6a81e6a10737faa68d6048f875c1eb7f3b482254b8e6765f39294b0b45a13
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2632826.exeFilesize
202KB
MD506f83cf6119a42f5b1936b5990b783db
SHA1f46bdb9a50aa691777358c3257abc817c9d5000c
SHA25683df1119868c8da93dd8429b21af81e8dfb721109590715085070f034d324b72
SHA512ee7d198857dd067a00967abab4c904ff7bf34ae363e5337a23dc77e62ae809d730f6a81e6a10737faa68d6048f875c1eb7f3b482254b8e6765f39294b0b45a13
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a2289986.exeFilesize
13KB
MD5236defbe5573a4026d42ea8cc41cd7e7
SHA1af626fbfd763bec01bd10008540d7a9905829334
SHA256195ae65217ca0881055e00525b90eaff8a9e814536f7355aa2f140da06acb2dc
SHA5123392bf53b85d4dae7947ed348ea90b7faa95c5f067c16cddee86afe16c42ac38088de428ee2870e9db2b8a8fd6f7d5c6d9458a1e64cbe30403148889f00761a2
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a2289986.exeFilesize
13KB
MD5236defbe5573a4026d42ea8cc41cd7e7
SHA1af626fbfd763bec01bd10008540d7a9905829334
SHA256195ae65217ca0881055e00525b90eaff8a9e814536f7355aa2f140da06acb2dc
SHA5123392bf53b85d4dae7947ed348ea90b7faa95c5f067c16cddee86afe16c42ac38088de428ee2870e9db2b8a8fd6f7d5c6d9458a1e64cbe30403148889f00761a2
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b7589688.exeFilesize
117KB
MD54fe308c9f7442ca84f8aa3ae91590488
SHA1161575974094f910a3a8d7e95ca615129552325f
SHA256388e3824dd7171bbbf351acf6266fc6039008ebbceede1e3401340fe6c0d9562
SHA512ebd10deb29eabdafe267812c1d77248899439d456408265b31d4a41111a450868c35240d32ca65568c286eec9a36e1fa0f4e009f8bf9f8d9f22095bd0be80bf1
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b7589688.exeFilesize
117KB
MD54fe308c9f7442ca84f8aa3ae91590488
SHA1161575974094f910a3a8d7e95ca615129552325f
SHA256388e3824dd7171bbbf351acf6266fc6039008ebbceede1e3401340fe6c0d9562
SHA512ebd10deb29eabdafe267812c1d77248899439d456408265b31d4a41111a450868c35240d32ca65568c286eec9a36e1fa0f4e009f8bf9f8d9f22095bd0be80bf1
-
memory/1992-167-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/4652-175-0x0000000000B90000-0x0000000000BC0000-memory.dmpFilesize
192KB
-
memory/4652-176-0x000000000AF10000-0x000000000B528000-memory.dmpFilesize
6.1MB
-
memory/4652-177-0x000000000AA00000-0x000000000AB0A000-memory.dmpFilesize
1.0MB
-
memory/4652-178-0x000000000A910000-0x000000000A922000-memory.dmpFilesize
72KB
-
memory/4652-179-0x000000000A970000-0x000000000A9AC000-memory.dmpFilesize
240KB
-
memory/4652-180-0x0000000005560000-0x0000000005570000-memory.dmpFilesize
64KB
-
memory/4652-182-0x0000000005560000-0x0000000005570000-memory.dmpFilesize
64KB
-
memory/4940-161-0x0000000000770000-0x000000000077A000-memory.dmpFilesize
40KB