Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2023 06:55
Static task
static1
Behavioral task
behavioral1
Sample
bf6f2187eb1f65aa3597a8a8822da3886406d30aaed132cf3d137ccbecf89b10.exe
Resource
win10v2004-20230220-en
General
-
Target
bf6f2187eb1f65aa3597a8a8822da3886406d30aaed132cf3d137ccbecf89b10.exe
-
Size
736KB
-
MD5
af714950c9d94ccba685d6f9fa5bb211
-
SHA1
c7203082a8c85bdebdbde81302ce23151ab24e3c
-
SHA256
bf6f2187eb1f65aa3597a8a8822da3886406d30aaed132cf3d137ccbecf89b10
-
SHA512
81a53c61cef4d85dff65e7960b9d10a2cba24a566384dd040c84ba1728d03f1cce44cca565884ea1ae33d48105f820e0038deb558b12df367d9c315ec09887ca
-
SSDEEP
12288:lMrmy90+5YoQQTyu3Xl9N/V8ykbyoocWzfK68yqt0e9bKrzsF8tBe8jPf03:/yUsm0Xl/V8+hn8yi7Krzs0e8jE
Malware Config
Extracted
redline
maxi
83.97.73.126:19048
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
AppLaunch.exea4206650.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a4206650.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4206650.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4206650.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4206650.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4206650.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4206650.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
v8057323.exev5224642.exev5827516.exea4206650.exeb9585049.exec1009988.exepid process 4536 v8057323.exe 1804 v5224642.exe 1976 v5827516.exe 4344 a4206650.exe 4012 b9585049.exe 3812 c1009988.exe -
Processes:
a4206650.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a4206650.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
v5827516.exebf6f2187eb1f65aa3597a8a8822da3886406d30aaed132cf3d137ccbecf89b10.exev8057323.exev5224642.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v5827516.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bf6f2187eb1f65aa3597a8a8822da3886406d30aaed132cf3d137ccbecf89b10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bf6f2187eb1f65aa3597a8a8822da3886406d30aaed132cf3d137ccbecf89b10.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8057323.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v8057323.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5224642.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v5224642.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5827516.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b9585049.exedescription pid process target process PID 4012 set thread context of 4136 4012 b9585049.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 796 4012 WerFault.exe b9585049.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
a4206650.exeAppLaunch.exepid process 4344 a4206650.exe 4344 a4206650.exe 4136 AppLaunch.exe 4136 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
a4206650.exeAppLaunch.exedescription pid process Token: SeDebugPrivilege 4344 a4206650.exe Token: SeDebugPrivilege 4136 AppLaunch.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
bf6f2187eb1f65aa3597a8a8822da3886406d30aaed132cf3d137ccbecf89b10.exev8057323.exev5224642.exev5827516.exeb9585049.exedescription pid process target process PID 2128 wrote to memory of 4536 2128 bf6f2187eb1f65aa3597a8a8822da3886406d30aaed132cf3d137ccbecf89b10.exe v8057323.exe PID 2128 wrote to memory of 4536 2128 bf6f2187eb1f65aa3597a8a8822da3886406d30aaed132cf3d137ccbecf89b10.exe v8057323.exe PID 2128 wrote to memory of 4536 2128 bf6f2187eb1f65aa3597a8a8822da3886406d30aaed132cf3d137ccbecf89b10.exe v8057323.exe PID 4536 wrote to memory of 1804 4536 v8057323.exe v5224642.exe PID 4536 wrote to memory of 1804 4536 v8057323.exe v5224642.exe PID 4536 wrote to memory of 1804 4536 v8057323.exe v5224642.exe PID 1804 wrote to memory of 1976 1804 v5224642.exe v5827516.exe PID 1804 wrote to memory of 1976 1804 v5224642.exe v5827516.exe PID 1804 wrote to memory of 1976 1804 v5224642.exe v5827516.exe PID 1976 wrote to memory of 4344 1976 v5827516.exe a4206650.exe PID 1976 wrote to memory of 4344 1976 v5827516.exe a4206650.exe PID 1976 wrote to memory of 4012 1976 v5827516.exe b9585049.exe PID 1976 wrote to memory of 4012 1976 v5827516.exe b9585049.exe PID 1976 wrote to memory of 4012 1976 v5827516.exe b9585049.exe PID 4012 wrote to memory of 4136 4012 b9585049.exe AppLaunch.exe PID 4012 wrote to memory of 4136 4012 b9585049.exe AppLaunch.exe PID 4012 wrote to memory of 4136 4012 b9585049.exe AppLaunch.exe PID 4012 wrote to memory of 4136 4012 b9585049.exe AppLaunch.exe PID 4012 wrote to memory of 4136 4012 b9585049.exe AppLaunch.exe PID 1804 wrote to memory of 3812 1804 v5224642.exe c1009988.exe PID 1804 wrote to memory of 3812 1804 v5224642.exe c1009988.exe PID 1804 wrote to memory of 3812 1804 v5224642.exe c1009988.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf6f2187eb1f65aa3597a8a8822da3886406d30aaed132cf3d137ccbecf89b10.exe"C:\Users\Admin\AppData\Local\Temp\bf6f2187eb1f65aa3597a8a8822da3886406d30aaed132cf3d137ccbecf89b10.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8057323.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8057323.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5224642.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5224642.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5827516.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5827516.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a4206650.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a4206650.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b9585049.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b9585049.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 2206⤵
- Program crash
PID:796 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1009988.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1009988.exe4⤵
- Executes dropped EXE
PID:3812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4012 -ip 40121⤵PID:4204
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8057323.exeFilesize
530KB
MD5514313c1c629ded99f884a319fa41915
SHA1ace53e142cd1851706ad7d8ab5632cfbccdeafb7
SHA2560efbaf24d9abb8f581acc3c4b7143aef7b0eb93c71fbaa3d29082aa0c2355344
SHA5126c1e4d25f89202c7cb2134158c913e3b63acd7ea4836fa02b3078b02e08ac0a811a2a0d54e15e740a79e2e0266189babadda8ddc45de7bc078bc55b7f2f72839
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8057323.exeFilesize
530KB
MD5514313c1c629ded99f884a319fa41915
SHA1ace53e142cd1851706ad7d8ab5632cfbccdeafb7
SHA2560efbaf24d9abb8f581acc3c4b7143aef7b0eb93c71fbaa3d29082aa0c2355344
SHA5126c1e4d25f89202c7cb2134158c913e3b63acd7ea4836fa02b3078b02e08ac0a811a2a0d54e15e740a79e2e0266189babadda8ddc45de7bc078bc55b7f2f72839
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5224642.exeFilesize
357KB
MD5803ff3f5f6d8b9c7db69646c54783a0e
SHA1a005617a048350972bf107b44351b7e10e15aeda
SHA256c9ae3b14f9ee15ed5cd96438737e6ec17862d0a7a0516349e67c32dab398a7a1
SHA51212656e54ec5026db01579464621924ffb03db892f93a3365cdca09254d90811dfbc0d5347eafb10e9c1d854612fcd8f52875e497ab2e27ff352d7d5ba5003b1a
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5224642.exeFilesize
357KB
MD5803ff3f5f6d8b9c7db69646c54783a0e
SHA1a005617a048350972bf107b44351b7e10e15aeda
SHA256c9ae3b14f9ee15ed5cd96438737e6ec17862d0a7a0516349e67c32dab398a7a1
SHA51212656e54ec5026db01579464621924ffb03db892f93a3365cdca09254d90811dfbc0d5347eafb10e9c1d854612fcd8f52875e497ab2e27ff352d7d5ba5003b1a
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1009988.exeFilesize
172KB
MD569d2891e785d8608c0a1a5fb0ef5a2f2
SHA199291f74a040bf000fc426f632758b0c2452c733
SHA25618e6e90e3b18b801f8dfc375bf2f6b2da336a3a062976c9a3627a6ea441b4e77
SHA512d9b6c587f05573df728bdde119f1e68b1e86ada5b961cfe17bd49b80c8f9a056890a8996ec3eb0f449f972614fafc20c16f67f2e0fa36424d64a69a3eee6f480
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1009988.exeFilesize
172KB
MD569d2891e785d8608c0a1a5fb0ef5a2f2
SHA199291f74a040bf000fc426f632758b0c2452c733
SHA25618e6e90e3b18b801f8dfc375bf2f6b2da336a3a062976c9a3627a6ea441b4e77
SHA512d9b6c587f05573df728bdde119f1e68b1e86ada5b961cfe17bd49b80c8f9a056890a8996ec3eb0f449f972614fafc20c16f67f2e0fa36424d64a69a3eee6f480
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5827516.exeFilesize
202KB
MD511d1d767d58fd17960bc75bc4175e783
SHA1ae4690ad353aeb49ffd57dddf18373530880cd46
SHA256201704168be2369ab1c49a699fc763b8cbf267e1180d778d66efa1b986db3e0d
SHA512b7e919e63756ea332813030cc1a2f8747660d63acccbcbd3cf1037fefee0bff5b0e0ebe0239acf5cc65077cee57a369bd092f2a62c9ca3d6806325227db3b2dc
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5827516.exeFilesize
202KB
MD511d1d767d58fd17960bc75bc4175e783
SHA1ae4690ad353aeb49ffd57dddf18373530880cd46
SHA256201704168be2369ab1c49a699fc763b8cbf267e1180d778d66efa1b986db3e0d
SHA512b7e919e63756ea332813030cc1a2f8747660d63acccbcbd3cf1037fefee0bff5b0e0ebe0239acf5cc65077cee57a369bd092f2a62c9ca3d6806325227db3b2dc
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a4206650.exeFilesize
13KB
MD5fd51e27cb7716482855885085db7497d
SHA1ed9698da1cf045f02fa6212da462dee6b77b4669
SHA2564343a66fb441daa12ccfc546f6de58999f0c7c96bea30b99729014c192e0ef83
SHA512fe88ab5c6d2a3159867ea5454720d532b9fba9fea90b18644a0421fc5fbd30592070cbe6a098adb22dd9da266cdfb04664830673588ae2afea43c5007b037b51
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a4206650.exeFilesize
13KB
MD5fd51e27cb7716482855885085db7497d
SHA1ed9698da1cf045f02fa6212da462dee6b77b4669
SHA2564343a66fb441daa12ccfc546f6de58999f0c7c96bea30b99729014c192e0ef83
SHA512fe88ab5c6d2a3159867ea5454720d532b9fba9fea90b18644a0421fc5fbd30592070cbe6a098adb22dd9da266cdfb04664830673588ae2afea43c5007b037b51
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b9585049.exeFilesize
117KB
MD5d3d0f6d92488f1ca09cfd905de0594bf
SHA1aa4f5367e8773161c405096d633058bf05cf5dc1
SHA2563835a699e55a7275875b15d7dc080d04c0efee10389f1fcea8fcb57619701256
SHA5121232382fef250336e7c5c906100a83fef3897f722b820dd62c95d4f5d3447e5875cb9bf4f9cbf7b404da15e165dadf57399aee2162a2461885200de270ee83f3
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b9585049.exeFilesize
117KB
MD5d3d0f6d92488f1ca09cfd905de0594bf
SHA1aa4f5367e8773161c405096d633058bf05cf5dc1
SHA2563835a699e55a7275875b15d7dc080d04c0efee10389f1fcea8fcb57619701256
SHA5121232382fef250336e7c5c906100a83fef3897f722b820dd62c95d4f5d3447e5875cb9bf4f9cbf7b404da15e165dadf57399aee2162a2461885200de270ee83f3
-
memory/3812-175-0x0000000000310000-0x0000000000340000-memory.dmpFilesize
192KB
-
memory/3812-176-0x000000000A730000-0x000000000AD48000-memory.dmpFilesize
6.1MB
-
memory/3812-177-0x000000000A290000-0x000000000A39A000-memory.dmpFilesize
1.0MB
-
memory/3812-178-0x000000000A1D0000-0x000000000A1E2000-memory.dmpFilesize
72KB
-
memory/3812-179-0x000000000A230000-0x000000000A26C000-memory.dmpFilesize
240KB
-
memory/3812-180-0x0000000004B40000-0x0000000004B50000-memory.dmpFilesize
64KB
-
memory/3812-182-0x0000000004B40000-0x0000000004B50000-memory.dmpFilesize
64KB
-
memory/4136-167-0x0000000000140000-0x000000000014A000-memory.dmpFilesize
40KB
-
memory/4344-161-0x0000000000460000-0x000000000046A000-memory.dmpFilesize
40KB