Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2023 04:56
Static task
static1
Behavioral task
behavioral1
Sample
2b12b7a6becbd1b4b2c8e501929bf6ee3fc693381dc634f5027a3206ee96c66f.exe
Resource
win10v2004-20230220-en
General
-
Target
2b12b7a6becbd1b4b2c8e501929bf6ee3fc693381dc634f5027a3206ee96c66f.exe
-
Size
735KB
-
MD5
fd55c4e68d8224f9a28886c158854140
-
SHA1
da5287a1d5d02fbb24ed3f9e23235a255faef685
-
SHA256
2b12b7a6becbd1b4b2c8e501929bf6ee3fc693381dc634f5027a3206ee96c66f
-
SHA512
e4387413ba463e05e3c7b9db9561c52144bee55e88234f0ec8330f1fe3b133b3d2444ff1bb4fc447b051c4f6b0a413bbe9de22d0a9a92ac8a6e934f391ea4cb1
-
SSDEEP
12288:KMr/y90SKFBNpU6oLJswlr+8gr8x1IqEpmfnvqSlD3E1m/RElxQLJ:pysFBNpU6sJDMrXRoHqN0H
Malware Config
Extracted
redline
maxi
83.97.73.126:19048
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
AppLaunch.exea4333254.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4333254.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4333254.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a4333254.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4333254.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4333254.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4333254.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
v1452708.exev2223929.exev9383719.exea4333254.exeb1967857.exec0831126.exepid process 2668 v1452708.exe 3944 v2223929.exe 3800 v9383719.exe 2584 a4333254.exe 1280 b1967857.exe 3704 c0831126.exe -
Processes:
a4333254.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a4333254.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
v1452708.exev2223929.exev9383719.exe2b12b7a6becbd1b4b2c8e501929bf6ee3fc693381dc634f5027a3206ee96c66f.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v1452708.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2223929.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v2223929.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v9383719.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v9383719.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2b12b7a6becbd1b4b2c8e501929bf6ee3fc693381dc634f5027a3206ee96c66f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2b12b7a6becbd1b4b2c8e501929bf6ee3fc693381dc634f5027a3206ee96c66f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1452708.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b1967857.exedescription pid process target process PID 1280 set thread context of 796 1280 b1967857.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 564 1280 WerFault.exe b1967857.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
a4333254.exeAppLaunch.exepid process 2584 a4333254.exe 2584 a4333254.exe 796 AppLaunch.exe 796 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
a4333254.exeAppLaunch.exedescription pid process Token: SeDebugPrivilege 2584 a4333254.exe Token: SeDebugPrivilege 796 AppLaunch.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
2b12b7a6becbd1b4b2c8e501929bf6ee3fc693381dc634f5027a3206ee96c66f.exev1452708.exev2223929.exev9383719.exeb1967857.exedescription pid process target process PID 3300 wrote to memory of 2668 3300 2b12b7a6becbd1b4b2c8e501929bf6ee3fc693381dc634f5027a3206ee96c66f.exe v1452708.exe PID 3300 wrote to memory of 2668 3300 2b12b7a6becbd1b4b2c8e501929bf6ee3fc693381dc634f5027a3206ee96c66f.exe v1452708.exe PID 3300 wrote to memory of 2668 3300 2b12b7a6becbd1b4b2c8e501929bf6ee3fc693381dc634f5027a3206ee96c66f.exe v1452708.exe PID 2668 wrote to memory of 3944 2668 v1452708.exe v2223929.exe PID 2668 wrote to memory of 3944 2668 v1452708.exe v2223929.exe PID 2668 wrote to memory of 3944 2668 v1452708.exe v2223929.exe PID 3944 wrote to memory of 3800 3944 v2223929.exe v9383719.exe PID 3944 wrote to memory of 3800 3944 v2223929.exe v9383719.exe PID 3944 wrote to memory of 3800 3944 v2223929.exe v9383719.exe PID 3800 wrote to memory of 2584 3800 v9383719.exe a4333254.exe PID 3800 wrote to memory of 2584 3800 v9383719.exe a4333254.exe PID 3800 wrote to memory of 1280 3800 v9383719.exe b1967857.exe PID 3800 wrote to memory of 1280 3800 v9383719.exe b1967857.exe PID 3800 wrote to memory of 1280 3800 v9383719.exe b1967857.exe PID 1280 wrote to memory of 796 1280 b1967857.exe AppLaunch.exe PID 1280 wrote to memory of 796 1280 b1967857.exe AppLaunch.exe PID 1280 wrote to memory of 796 1280 b1967857.exe AppLaunch.exe PID 1280 wrote to memory of 796 1280 b1967857.exe AppLaunch.exe PID 1280 wrote to memory of 796 1280 b1967857.exe AppLaunch.exe PID 3944 wrote to memory of 3704 3944 v2223929.exe c0831126.exe PID 3944 wrote to memory of 3704 3944 v2223929.exe c0831126.exe PID 3944 wrote to memory of 3704 3944 v2223929.exe c0831126.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b12b7a6becbd1b4b2c8e501929bf6ee3fc693381dc634f5027a3206ee96c66f.exe"C:\Users\Admin\AppData\Local\Temp\2b12b7a6becbd1b4b2c8e501929bf6ee3fc693381dc634f5027a3206ee96c66f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1452708.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1452708.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2223929.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2223929.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9383719.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9383719.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a4333254.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a4333254.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1967857.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1967857.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:796 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1280 -s 1406⤵
- Program crash
PID:564 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c0831126.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c0831126.exe4⤵
- Executes dropped EXE
PID:3704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1280 -ip 12801⤵PID:1048
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1452708.exeFilesize
529KB
MD5720f309f244d042a375c3a8171c46da7
SHA10d7d7f454aab4c15ef4e3647ac5131baeec186c1
SHA256ad08dcd32e886a0655c8112df8e154a93c48e860212534b2c9c8e866155bf799
SHA512619b61e01ecdb7bce916e2db535bffefc6b8f8567a2c78ecbfc16a8e341fa158ad89f02f02959e8c0c97d95949a63dabd0249898cd164d5e2a9a047246797ab3
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1452708.exeFilesize
529KB
MD5720f309f244d042a375c3a8171c46da7
SHA10d7d7f454aab4c15ef4e3647ac5131baeec186c1
SHA256ad08dcd32e886a0655c8112df8e154a93c48e860212534b2c9c8e866155bf799
SHA512619b61e01ecdb7bce916e2db535bffefc6b8f8567a2c78ecbfc16a8e341fa158ad89f02f02959e8c0c97d95949a63dabd0249898cd164d5e2a9a047246797ab3
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2223929.exeFilesize
357KB
MD56576ed2de72a17f6018de1cb59dbd417
SHA1a1aafbdf61b4569c0282e4dffce71581e708ed9a
SHA256eb5a91b2b4d232ec5f97cf039be59b482e3aa58331ca0e196c989fbd25d8fa3f
SHA51284af7408f252d57fe8df565211824f8794252bbfa6312d3c21d8fb0ce3a760b291fef22fd1f4139bae12421931e6dba75e27c987a33c22b85dcbc9e843d323bf
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2223929.exeFilesize
357KB
MD56576ed2de72a17f6018de1cb59dbd417
SHA1a1aafbdf61b4569c0282e4dffce71581e708ed9a
SHA256eb5a91b2b4d232ec5f97cf039be59b482e3aa58331ca0e196c989fbd25d8fa3f
SHA51284af7408f252d57fe8df565211824f8794252bbfa6312d3c21d8fb0ce3a760b291fef22fd1f4139bae12421931e6dba75e27c987a33c22b85dcbc9e843d323bf
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c0831126.exeFilesize
172KB
MD54c1379d0aa6bf251fd60128926061126
SHA1fc0e867b32da884e36ee9d6b45c111691f2900c2
SHA256ba9bd035a388b54eb57f68fd28c1e17e54bbcd42f904e864cf8ceace0b27cf92
SHA512a987410d727f01cdef3c923bdf0a805ad1d2fc5febc9fc76a718fdd3cf0695b399cd34e095869be8fdf5e354f17944936d4a67a6fa5f9f526325040ccdf83f32
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c0831126.exeFilesize
172KB
MD54c1379d0aa6bf251fd60128926061126
SHA1fc0e867b32da884e36ee9d6b45c111691f2900c2
SHA256ba9bd035a388b54eb57f68fd28c1e17e54bbcd42f904e864cf8ceace0b27cf92
SHA512a987410d727f01cdef3c923bdf0a805ad1d2fc5febc9fc76a718fdd3cf0695b399cd34e095869be8fdf5e354f17944936d4a67a6fa5f9f526325040ccdf83f32
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9383719.exeFilesize
202KB
MD578483fe0345813bb0c3257d8c24f0ffc
SHA1ae33449af590ba3ef17941d6e8ab0d082afa2566
SHA25607f997f058a3efcb0b5ca0cb511840fe44d228f334efb155ea5b7aefdee12011
SHA512323390019bf193e74006463603c1dc986b5589a9e14133283d9b42f52b4cce1c475cc8b0eab3bdfedb589ffc39fe804db99f6b092b46117c173aba1c687acffe
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9383719.exeFilesize
202KB
MD578483fe0345813bb0c3257d8c24f0ffc
SHA1ae33449af590ba3ef17941d6e8ab0d082afa2566
SHA25607f997f058a3efcb0b5ca0cb511840fe44d228f334efb155ea5b7aefdee12011
SHA512323390019bf193e74006463603c1dc986b5589a9e14133283d9b42f52b4cce1c475cc8b0eab3bdfedb589ffc39fe804db99f6b092b46117c173aba1c687acffe
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a4333254.exeFilesize
13KB
MD5420fb341fcce5a34b87ddc41b5bb5d6c
SHA18ceef26c3dbd0bf74b64327f66add60ec6a93415
SHA256dd482f5caa8a4a0e3a8e3006d3484230404965b5ffc48afaab62014852c0ada3
SHA51234a112c9ba75c062dc7dcc7f015ecf1fb2ccf6af7a2895baf3c05b69c66c85272a7773446896d76ba5faa7169d37de946f0129f1df0fb8e62c12f9d8bf003a62
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a4333254.exeFilesize
13KB
MD5420fb341fcce5a34b87ddc41b5bb5d6c
SHA18ceef26c3dbd0bf74b64327f66add60ec6a93415
SHA256dd482f5caa8a4a0e3a8e3006d3484230404965b5ffc48afaab62014852c0ada3
SHA51234a112c9ba75c062dc7dcc7f015ecf1fb2ccf6af7a2895baf3c05b69c66c85272a7773446896d76ba5faa7169d37de946f0129f1df0fb8e62c12f9d8bf003a62
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1967857.exeFilesize
117KB
MD52bae5540105a84767675cbc4289cfde6
SHA1d124f62466603ae8f27d67d2eb2baa8f71eb36bc
SHA2565af48dd2d41a2f0297b11114d0a5f5bc62ff2401a430f4ec01d3f9c37be680e4
SHA512ca98c1d0c26cb5a5597ed7c5d789485b1e765094da2b1e7fbbd989f69d993f05f1799aa7b4f5fd4ebfcc4136c25b9f9c4c5f10b4f1184dbc2e373cb1b45917da
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1967857.exeFilesize
117KB
MD52bae5540105a84767675cbc4289cfde6
SHA1d124f62466603ae8f27d67d2eb2baa8f71eb36bc
SHA2565af48dd2d41a2f0297b11114d0a5f5bc62ff2401a430f4ec01d3f9c37be680e4
SHA512ca98c1d0c26cb5a5597ed7c5d789485b1e765094da2b1e7fbbd989f69d993f05f1799aa7b4f5fd4ebfcc4136c25b9f9c4c5f10b4f1184dbc2e373cb1b45917da
-
memory/796-167-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/2584-161-0x0000000000740000-0x000000000074A000-memory.dmpFilesize
40KB
-
memory/3704-175-0x00000000007A0000-0x00000000007D0000-memory.dmpFilesize
192KB
-
memory/3704-176-0x000000000AA60000-0x000000000B078000-memory.dmpFilesize
6.1MB
-
memory/3704-177-0x000000000A5E0000-0x000000000A6EA000-memory.dmpFilesize
1.0MB
-
memory/3704-178-0x000000000A520000-0x000000000A532000-memory.dmpFilesize
72KB
-
memory/3704-179-0x0000000004F50000-0x0000000004F60000-memory.dmpFilesize
64KB
-
memory/3704-180-0x000000000A580000-0x000000000A5BC000-memory.dmpFilesize
240KB
-
memory/3704-182-0x0000000004F50000-0x0000000004F60000-memory.dmpFilesize
64KB