Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2023 08:34
Static task
static1
Behavioral task
behavioral1
Sample
2b7af77364d53031bad18f6c713f56575779a5b3cc54f29c2d1ca992df0a2687.exe
Resource
win10v2004-20230220-en
General
-
Target
2b7af77364d53031bad18f6c713f56575779a5b3cc54f29c2d1ca992df0a2687.exe
-
Size
737KB
-
MD5
1d474540a1122e116b1fe4080f2b887f
-
SHA1
0505ee0b836c2bf37cca82fd3c7e3a8ec81de1ae
-
SHA256
2b7af77364d53031bad18f6c713f56575779a5b3cc54f29c2d1ca992df0a2687
-
SHA512
4fde82f4fdf5353363d86be1723ca7d0676d2051e35cd190310dd6cdd1d073cd62cd886585a940b8fb504cebf193dd7313084122c680b5b2bb233d69a1d42d2a
-
SSDEEP
12288:JMrYy90QSlnzqq1VamqABWhSka6L5Zw48NTdOIIleSRcyqFDJzBB58BBIRTAPZG2:By3SlnzXLWhba6L5+4yhClRcFBBafZl
Malware Config
Extracted
redline
maxi
83.97.73.126:19048
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
a3613203.exeAppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a3613203.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a3613203.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a3613203.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a3613203.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a3613203.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a3613203.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
v8489624.exev5112260.exev4298125.exea3613203.exeb1937847.exec1971636.exepid process 3976 v8489624.exe 1960 v5112260.exe 4528 v4298125.exe 2540 a3613203.exe 2744 b1937847.exe 4248 c1971636.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
a3613203.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a3613203.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
v8489624.exev5112260.exev4298125.exe2b7af77364d53031bad18f6c713f56575779a5b3cc54f29c2d1ca992df0a2687.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v8489624.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5112260.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v5112260.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4298125.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v4298125.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2b7af77364d53031bad18f6c713f56575779a5b3cc54f29c2d1ca992df0a2687.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2b7af77364d53031bad18f6c713f56575779a5b3cc54f29c2d1ca992df0a2687.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8489624.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
b1937847.exedescription pid process target process PID 2744 set thread context of 5068 2744 b1937847.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 736 2744 WerFault.exe b1937847.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
Processes:
a3613203.exeAppLaunch.exec1971636.exepid process 2540 a3613203.exe 2540 a3613203.exe 5068 AppLaunch.exe 5068 AppLaunch.exe 4248 c1971636.exe 4248 c1971636.exe 4248 c1971636.exe 4248 c1971636.exe 4248 c1971636.exe 4248 c1971636.exe 4248 c1971636.exe 4248 c1971636.exe 4248 c1971636.exe 4248 c1971636.exe 4248 c1971636.exe 4248 c1971636.exe 4248 c1971636.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
a3613203.exeAppLaunch.exec1971636.exedescription pid process Token: SeDebugPrivilege 2540 a3613203.exe Token: SeDebugPrivilege 5068 AppLaunch.exe Token: SeDebugPrivilege 4248 c1971636.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
2b7af77364d53031bad18f6c713f56575779a5b3cc54f29c2d1ca992df0a2687.exev8489624.exev5112260.exev4298125.exeb1937847.exedescription pid process target process PID 3372 wrote to memory of 3976 3372 2b7af77364d53031bad18f6c713f56575779a5b3cc54f29c2d1ca992df0a2687.exe v8489624.exe PID 3372 wrote to memory of 3976 3372 2b7af77364d53031bad18f6c713f56575779a5b3cc54f29c2d1ca992df0a2687.exe v8489624.exe PID 3372 wrote to memory of 3976 3372 2b7af77364d53031bad18f6c713f56575779a5b3cc54f29c2d1ca992df0a2687.exe v8489624.exe PID 3976 wrote to memory of 1960 3976 v8489624.exe v5112260.exe PID 3976 wrote to memory of 1960 3976 v8489624.exe v5112260.exe PID 3976 wrote to memory of 1960 3976 v8489624.exe v5112260.exe PID 1960 wrote to memory of 4528 1960 v5112260.exe v4298125.exe PID 1960 wrote to memory of 4528 1960 v5112260.exe v4298125.exe PID 1960 wrote to memory of 4528 1960 v5112260.exe v4298125.exe PID 4528 wrote to memory of 2540 4528 v4298125.exe a3613203.exe PID 4528 wrote to memory of 2540 4528 v4298125.exe a3613203.exe PID 4528 wrote to memory of 2744 4528 v4298125.exe b1937847.exe PID 4528 wrote to memory of 2744 4528 v4298125.exe b1937847.exe PID 4528 wrote to memory of 2744 4528 v4298125.exe b1937847.exe PID 2744 wrote to memory of 5068 2744 b1937847.exe AppLaunch.exe PID 2744 wrote to memory of 5068 2744 b1937847.exe AppLaunch.exe PID 2744 wrote to memory of 5068 2744 b1937847.exe AppLaunch.exe PID 2744 wrote to memory of 5068 2744 b1937847.exe AppLaunch.exe PID 2744 wrote to memory of 5068 2744 b1937847.exe AppLaunch.exe PID 1960 wrote to memory of 4248 1960 v5112260.exe c1971636.exe PID 1960 wrote to memory of 4248 1960 v5112260.exe c1971636.exe PID 1960 wrote to memory of 4248 1960 v5112260.exe c1971636.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b7af77364d53031bad18f6c713f56575779a5b3cc54f29c2d1ca992df0a2687.exe"C:\Users\Admin\AppData\Local\Temp\2b7af77364d53031bad18f6c713f56575779a5b3cc54f29c2d1ca992df0a2687.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8489624.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8489624.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5112260.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5112260.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4298125.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4298125.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3613203.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3613203.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1937847.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1937847.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2744 -s 1526⤵
- Program crash
PID:736 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1971636.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1971636.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2744 -ip 27441⤵PID:5076
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8489624.exeFilesize
531KB
MD503942b8bc7c596bdb1197f4f6b665db7
SHA14c165378989f7738a05b6951036a20e1e459a5b5
SHA2561721df276ec56ca60a6737fefb04aa8b76ee1acb96c894349cb81f63336ed055
SHA5124dece7cb2ea92015b5db6b4efecabee2fd671aff87647c1303333d3d3cd4ab78adb8aa93eca6ab33389557f711868f86268800fa49b3be96b973cabfe49924c4
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8489624.exeFilesize
531KB
MD503942b8bc7c596bdb1197f4f6b665db7
SHA14c165378989f7738a05b6951036a20e1e459a5b5
SHA2561721df276ec56ca60a6737fefb04aa8b76ee1acb96c894349cb81f63336ed055
SHA5124dece7cb2ea92015b5db6b4efecabee2fd671aff87647c1303333d3d3cd4ab78adb8aa93eca6ab33389557f711868f86268800fa49b3be96b973cabfe49924c4
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5112260.exeFilesize
358KB
MD5f4f8b512061ccb326d0c4b193c2edb4a
SHA142148fb83ec037446148a03f1a8c66758e14bfd6
SHA2568d743418f1ad20caafc64473188d6dc8fc329ee4d7c2f3068bc72ee49969149b
SHA5122671a04f816e38926dfac7f06bb6b47848f758f26a109c7f3af184264f43735bdbd50686d66a0be38c4b0a21ad0f4c8228b976467f7658fe23a9fadd32344209
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5112260.exeFilesize
358KB
MD5f4f8b512061ccb326d0c4b193c2edb4a
SHA142148fb83ec037446148a03f1a8c66758e14bfd6
SHA2568d743418f1ad20caafc64473188d6dc8fc329ee4d7c2f3068bc72ee49969149b
SHA5122671a04f816e38926dfac7f06bb6b47848f758f26a109c7f3af184264f43735bdbd50686d66a0be38c4b0a21ad0f4c8228b976467f7658fe23a9fadd32344209
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1971636.exeFilesize
172KB
MD58dd5b3a442d9337a3bd710d52e0fcbca
SHA1caf55c56a5722f5e6765156b3a1f4492579c0e1a
SHA256991a5937e597deb0286243fdb0fcea88b1b2aeaad7b4a618900f678d32025f04
SHA512226b4b447ea6acffe3dbcd397e268a83984d037eab006fed58a375702a73e793ddb734a65202647aec6474efd009049fd24afd881ab176c3a2aa4ddda1b851dd
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1971636.exeFilesize
172KB
MD58dd5b3a442d9337a3bd710d52e0fcbca
SHA1caf55c56a5722f5e6765156b3a1f4492579c0e1a
SHA256991a5937e597deb0286243fdb0fcea88b1b2aeaad7b4a618900f678d32025f04
SHA512226b4b447ea6acffe3dbcd397e268a83984d037eab006fed58a375702a73e793ddb734a65202647aec6474efd009049fd24afd881ab176c3a2aa4ddda1b851dd
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4298125.exeFilesize
203KB
MD52024852491dadf08f16ff402a4d91c7e
SHA141982eda60d0514b3a3d3314a2fa910c83f2b318
SHA256c47199eed69b87e8dabd1cc81dde86d420b91ef7bbbdf1d53107080651e11410
SHA512699957242c08d7fc4472310a223935c31376bc14487a7bc4575c16c4f010f22611c2c8cf16c1104e27192f2239c1c0aa78ec5f7ebaa906bd9e27c1e5a6a9e89d
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4298125.exeFilesize
203KB
MD52024852491dadf08f16ff402a4d91c7e
SHA141982eda60d0514b3a3d3314a2fa910c83f2b318
SHA256c47199eed69b87e8dabd1cc81dde86d420b91ef7bbbdf1d53107080651e11410
SHA512699957242c08d7fc4472310a223935c31376bc14487a7bc4575c16c4f010f22611c2c8cf16c1104e27192f2239c1c0aa78ec5f7ebaa906bd9e27c1e5a6a9e89d
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3613203.exeFilesize
13KB
MD593f1aae2f1fe5bb30a3312c566f15281
SHA14da51090aa2e49a722306a8384111601f3f86f67
SHA256d290df5bc452eb1c9968552ebf8e243cbc2797233fb7c4ceba7f185b7852bfbb
SHA512de9ea969ed792ce52a02bf00d2437f81bfd26bedf7e04f483bc031ba3303990f65ac269061d8561ffa41f0fd383b0cf742fba9b115295a962b288afb7231216d
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3613203.exeFilesize
13KB
MD593f1aae2f1fe5bb30a3312c566f15281
SHA14da51090aa2e49a722306a8384111601f3f86f67
SHA256d290df5bc452eb1c9968552ebf8e243cbc2797233fb7c4ceba7f185b7852bfbb
SHA512de9ea969ed792ce52a02bf00d2437f81bfd26bedf7e04f483bc031ba3303990f65ac269061d8561ffa41f0fd383b0cf742fba9b115295a962b288afb7231216d
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1937847.exeFilesize
120KB
MD5896e1e72c62b917e2f57ae4a42011795
SHA1ba72ecfa9e3c448c2036912af6e6d011ff653361
SHA256f76e03cc5f2dd5b7329e628cb89f052d76b83cf970819420fb1d7629e742752c
SHA512ab8069095fe8834097e4816617e984780bc01e28567cd71fd2e17530bace70ad079c3ac180597d276ae90c5ea00d1be68e638a0d33b97d3fca299fdc379f7d69
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1937847.exeFilesize
120KB
MD5896e1e72c62b917e2f57ae4a42011795
SHA1ba72ecfa9e3c448c2036912af6e6d011ff653361
SHA256f76e03cc5f2dd5b7329e628cb89f052d76b83cf970819420fb1d7629e742752c
SHA512ab8069095fe8834097e4816617e984780bc01e28567cd71fd2e17530bace70ad079c3ac180597d276ae90c5ea00d1be68e638a0d33b97d3fca299fdc379f7d69
-
memory/2540-161-0x0000000000B30000-0x0000000000B3A000-memory.dmpFilesize
40KB
-
memory/4248-175-0x0000000000CF0000-0x0000000000D20000-memory.dmpFilesize
192KB
-
memory/4248-181-0x000000000ADE0000-0x000000000AE56000-memory.dmpFilesize
472KB
-
memory/4248-176-0x000000000AFE0000-0x000000000B5F8000-memory.dmpFilesize
6.1MB
-
memory/4248-177-0x000000000AB30000-0x000000000AC3A000-memory.dmpFilesize
1.0MB
-
memory/4248-178-0x000000000AA70000-0x000000000AA82000-memory.dmpFilesize
72KB
-
memory/4248-179-0x000000000AAD0000-0x000000000AB0C000-memory.dmpFilesize
240KB
-
memory/4248-180-0x0000000005630000-0x0000000005640000-memory.dmpFilesize
64KB
-
memory/4248-189-0x000000000CAD0000-0x000000000CFFC000-memory.dmpFilesize
5.2MB
-
memory/4248-182-0x000000000B6A0000-0x000000000B732000-memory.dmpFilesize
584KB
-
memory/4248-183-0x000000000AF60000-0x000000000AFC6000-memory.dmpFilesize
408KB
-
memory/4248-185-0x000000000BFF0000-0x000000000C594000-memory.dmpFilesize
5.6MB
-
memory/4248-186-0x0000000005630000-0x0000000005640000-memory.dmpFilesize
64KB
-
memory/4248-187-0x000000000BC00000-0x000000000BC50000-memory.dmpFilesize
320KB
-
memory/4248-188-0x000000000BE20000-0x000000000BFE2000-memory.dmpFilesize
1.8MB
-
memory/5068-167-0x0000000000180000-0x000000000018A000-memory.dmpFilesize
40KB