Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2023 07:51
Static task
static1
Behavioral task
behavioral1
Sample
2dccea09a33b86f5e770514fedea1b4f4eff4b3136853c28022f36afd1554c26.exe
Resource
win10v2004-20230221-en
General
-
Target
2dccea09a33b86f5e770514fedea1b4f4eff4b3136853c28022f36afd1554c26.exe
-
Size
735KB
-
MD5
127750909e73ad4bd01c25f5ddf5f667
-
SHA1
5c764efc7c1d2e30e0cf6e59430c8ea0ab81a968
-
SHA256
2dccea09a33b86f5e770514fedea1b4f4eff4b3136853c28022f36afd1554c26
-
SHA512
191d95b80bab0bb2a4c0f68a49023a827cfd2c93bbcfa31d959f6fca184a0b0055fe75aa3d8baca07fb3e3ed1ba89a60f936764ef1a49ec99b24a01d8e13bd7a
-
SSDEEP
12288:DMr5y90vQe4KwVj+UX8L97glNRsduypBTaoUo2FU3ZnCkTqGJkxZlNWAFRvbL3:Gy3eFwVw7glcVdao92FUFvTqGSzFRvbL
Malware Config
Extracted
redline
maxi
83.97.73.126:19048
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
a7064705.exeAppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a7064705.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a7064705.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a7064705.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a7064705.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a7064705.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a7064705.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
v5581753.exev8918610.exev0955646.exea7064705.exeb6716630.exec9077097.exepid process 1888 v5581753.exe 380 v8918610.exe 2628 v0955646.exe 3916 a7064705.exe 3948 b6716630.exe 4276 c9077097.exe -
Processes:
a7064705.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a7064705.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
v0955646.exe2dccea09a33b86f5e770514fedea1b4f4eff4b3136853c28022f36afd1554c26.exev5581753.exev8918610.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0955646.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v0955646.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2dccea09a33b86f5e770514fedea1b4f4eff4b3136853c28022f36afd1554c26.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2dccea09a33b86f5e770514fedea1b4f4eff4b3136853c28022f36afd1554c26.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5581753.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v5581753.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8918610.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v8918610.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b6716630.exedescription pid process target process PID 3948 set thread context of 3296 3948 b6716630.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2388 3948 WerFault.exe b6716630.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
a7064705.exeAppLaunch.exepid process 3916 a7064705.exe 3916 a7064705.exe 3296 AppLaunch.exe 3296 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
a7064705.exeAppLaunch.exedescription pid process Token: SeDebugPrivilege 3916 a7064705.exe Token: SeDebugPrivilege 3296 AppLaunch.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
2dccea09a33b86f5e770514fedea1b4f4eff4b3136853c28022f36afd1554c26.exev5581753.exev8918610.exev0955646.exeb6716630.exedescription pid process target process PID 3444 wrote to memory of 1888 3444 2dccea09a33b86f5e770514fedea1b4f4eff4b3136853c28022f36afd1554c26.exe v5581753.exe PID 3444 wrote to memory of 1888 3444 2dccea09a33b86f5e770514fedea1b4f4eff4b3136853c28022f36afd1554c26.exe v5581753.exe PID 3444 wrote to memory of 1888 3444 2dccea09a33b86f5e770514fedea1b4f4eff4b3136853c28022f36afd1554c26.exe v5581753.exe PID 1888 wrote to memory of 380 1888 v5581753.exe v8918610.exe PID 1888 wrote to memory of 380 1888 v5581753.exe v8918610.exe PID 1888 wrote to memory of 380 1888 v5581753.exe v8918610.exe PID 380 wrote to memory of 2628 380 v8918610.exe v0955646.exe PID 380 wrote to memory of 2628 380 v8918610.exe v0955646.exe PID 380 wrote to memory of 2628 380 v8918610.exe v0955646.exe PID 2628 wrote to memory of 3916 2628 v0955646.exe a7064705.exe PID 2628 wrote to memory of 3916 2628 v0955646.exe a7064705.exe PID 2628 wrote to memory of 3948 2628 v0955646.exe b6716630.exe PID 2628 wrote to memory of 3948 2628 v0955646.exe b6716630.exe PID 2628 wrote to memory of 3948 2628 v0955646.exe b6716630.exe PID 3948 wrote to memory of 3296 3948 b6716630.exe AppLaunch.exe PID 3948 wrote to memory of 3296 3948 b6716630.exe AppLaunch.exe PID 3948 wrote to memory of 3296 3948 b6716630.exe AppLaunch.exe PID 3948 wrote to memory of 3296 3948 b6716630.exe AppLaunch.exe PID 3948 wrote to memory of 3296 3948 b6716630.exe AppLaunch.exe PID 380 wrote to memory of 4276 380 v8918610.exe c9077097.exe PID 380 wrote to memory of 4276 380 v8918610.exe c9077097.exe PID 380 wrote to memory of 4276 380 v8918610.exe c9077097.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2dccea09a33b86f5e770514fedea1b4f4eff4b3136853c28022f36afd1554c26.exe"C:\Users\Admin\AppData\Local\Temp\2dccea09a33b86f5e770514fedea1b4f4eff4b3136853c28022f36afd1554c26.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5581753.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5581753.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8918610.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8918610.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0955646.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0955646.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7064705.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7064705.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6716630.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6716630.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3296 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3948 -s 1406⤵
- Program crash
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9077097.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9077097.exe4⤵
- Executes dropped EXE
PID:4276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 3948 -ip 39481⤵PID:2760
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5581753.exeFilesize
529KB
MD5529a7eea48dc4d4a8aeb9769c3874079
SHA15a37504a5e1722cdc266009e300864622804018c
SHA256f90b5c99a73dc8a09c9f5285b0468b49dd20c1ba19d58aba5b001eb87e53e4c1
SHA5121f58d7b9e4acaeb4ca47abd00f25ef50b0d032b8d5c5691387941b53e8911dd83bf14a625bb4d8f5faf45c14c558da296e5b35577b1b5478edf3a2498d5d7491
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5581753.exeFilesize
529KB
MD5529a7eea48dc4d4a8aeb9769c3874079
SHA15a37504a5e1722cdc266009e300864622804018c
SHA256f90b5c99a73dc8a09c9f5285b0468b49dd20c1ba19d58aba5b001eb87e53e4c1
SHA5121f58d7b9e4acaeb4ca47abd00f25ef50b0d032b8d5c5691387941b53e8911dd83bf14a625bb4d8f5faf45c14c558da296e5b35577b1b5478edf3a2498d5d7491
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8918610.exeFilesize
357KB
MD5d2b24c2622d035ad29d96133c2590fc9
SHA1107f3a3014b8f752daed2c9b4ca3aef374a0ca0d
SHA256c4bd38c81d5d22294bf27b57d0d3d8589741b8fccf238ea602882dbf046f79d9
SHA51265905f7d1fc92c44d5ff43c38b390cdb467ebe825dc5c43738a97e8c1b7826d76e674f54fc0f5b008646b70315d9d980b40746e34bbae5cc6656a416d91fbde6
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8918610.exeFilesize
357KB
MD5d2b24c2622d035ad29d96133c2590fc9
SHA1107f3a3014b8f752daed2c9b4ca3aef374a0ca0d
SHA256c4bd38c81d5d22294bf27b57d0d3d8589741b8fccf238ea602882dbf046f79d9
SHA51265905f7d1fc92c44d5ff43c38b390cdb467ebe825dc5c43738a97e8c1b7826d76e674f54fc0f5b008646b70315d9d980b40746e34bbae5cc6656a416d91fbde6
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9077097.exeFilesize
172KB
MD556f624e5991f4e448b3853b26971c536
SHA181ffa5becf7e9d7a5a91c0b6ba1643e300a4b9a9
SHA2564d456e773bc9d560da191638f0ec76e218b0634beaec6f49fe23a9e7b7f51163
SHA5128643aed6bfd75eeab69931f19699bf247f613b57baa9867429eb364a9457bba32f59eb49450b84797f525745e0dc995900f3c1e96f3b45293ed11b179b56ccee
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9077097.exeFilesize
172KB
MD556f624e5991f4e448b3853b26971c536
SHA181ffa5becf7e9d7a5a91c0b6ba1643e300a4b9a9
SHA2564d456e773bc9d560da191638f0ec76e218b0634beaec6f49fe23a9e7b7f51163
SHA5128643aed6bfd75eeab69931f19699bf247f613b57baa9867429eb364a9457bba32f59eb49450b84797f525745e0dc995900f3c1e96f3b45293ed11b179b56ccee
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0955646.exeFilesize
202KB
MD5f1a03e9df84d5f7a41c5f41f0f4b31b4
SHA1eff6444df29f5f2622cbb8274c5900ff61951df2
SHA256ba4865fc7920bf4e64fc2a488bf3148ce037330d119ece99f2bf62524a21c85d
SHA5126d78ee98c5ae6fcb9cbcefe46d609c3dfe6480d06b0b83352836b24b68271d3bedd5b44c92d6eeca4d93b46f2317609e8436b78d44ae404e0423f268db4a1df0
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0955646.exeFilesize
202KB
MD5f1a03e9df84d5f7a41c5f41f0f4b31b4
SHA1eff6444df29f5f2622cbb8274c5900ff61951df2
SHA256ba4865fc7920bf4e64fc2a488bf3148ce037330d119ece99f2bf62524a21c85d
SHA5126d78ee98c5ae6fcb9cbcefe46d609c3dfe6480d06b0b83352836b24b68271d3bedd5b44c92d6eeca4d93b46f2317609e8436b78d44ae404e0423f268db4a1df0
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7064705.exeFilesize
13KB
MD544df6669823b38330ec7b06a9782b830
SHA14812fd08da1663cf0795d251ef59c3ac7d985010
SHA2568aac8fe8b8956f364274085021a82e3417efbbc7036eb8f7a493a29af0dc35aa
SHA5129d798dcaf5845c6656d18107802935484e17be9e39027159d6a296ebe01a51581e93ae5c174c442d28122fbe45c7f69d11f08008ed02a9732fd199c08f9445f1
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7064705.exeFilesize
13KB
MD544df6669823b38330ec7b06a9782b830
SHA14812fd08da1663cf0795d251ef59c3ac7d985010
SHA2568aac8fe8b8956f364274085021a82e3417efbbc7036eb8f7a493a29af0dc35aa
SHA5129d798dcaf5845c6656d18107802935484e17be9e39027159d6a296ebe01a51581e93ae5c174c442d28122fbe45c7f69d11f08008ed02a9732fd199c08f9445f1
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6716630.exeFilesize
117KB
MD535fcb8d4de61d262de7772d00cb828ce
SHA164f1a2afd9f759dbce6168aa940face49a78298e
SHA256eb7a54fa16258f9c6a38a2cdb6c6904ade573949f57b83a33ee82fef0acdc9ce
SHA512f5331db200531843f076716177d12f5a8a9681e22ca0b9e522aa7461747c35d83953b0314ac6cb1550161d58b71c3df3a7a93775ecd799e63bba9b9cdf95dc77
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6716630.exeFilesize
117KB
MD535fcb8d4de61d262de7772d00cb828ce
SHA164f1a2afd9f759dbce6168aa940face49a78298e
SHA256eb7a54fa16258f9c6a38a2cdb6c6904ade573949f57b83a33ee82fef0acdc9ce
SHA512f5331db200531843f076716177d12f5a8a9681e22ca0b9e522aa7461747c35d83953b0314ac6cb1550161d58b71c3df3a7a93775ecd799e63bba9b9cdf95dc77
-
memory/3296-167-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/3916-161-0x0000000000160000-0x000000000016A000-memory.dmpFilesize
40KB
-
memory/4276-175-0x0000000000D80000-0x0000000000DB0000-memory.dmpFilesize
192KB
-
memory/4276-176-0x0000000005E30000-0x0000000006448000-memory.dmpFilesize
6.1MB
-
memory/4276-177-0x0000000005920000-0x0000000005A2A000-memory.dmpFilesize
1.0MB
-
memory/4276-178-0x0000000005830000-0x0000000005842000-memory.dmpFilesize
72KB
-
memory/4276-179-0x0000000005890000-0x00000000058CC000-memory.dmpFilesize
240KB
-
memory/4276-180-0x0000000005700000-0x0000000005710000-memory.dmpFilesize
64KB
-
memory/4276-182-0x0000000005700000-0x0000000005710000-memory.dmpFilesize
64KB