Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2023 09:31
Static task
static1
Behavioral task
behavioral1
Sample
94de3b00e6c44e8d37188d026d4aedee52cbadf6351f38512854f93f6c1082f9.exe
Resource
win10v2004-20230220-en
General
-
Target
94de3b00e6c44e8d37188d026d4aedee52cbadf6351f38512854f93f6c1082f9.exe
-
Size
738KB
-
MD5
96b6e3751a8d8f27bb5670fa39895394
-
SHA1
98a5095aa9ef74dcf8fb637e30d5d27e985c0823
-
SHA256
94de3b00e6c44e8d37188d026d4aedee52cbadf6351f38512854f93f6c1082f9
-
SHA512
2c51c0f6f80f4bffa9c075288d5c1d865403667a44f601314dd67e9925f1bac6361b1b3e7b395e70eff244ab2cb0f9a1852d9e87375ab3f9209716d709374c81
-
SSDEEP
12288:tMrDy906QmkkT4Gym/VgcUW4cjAg/MSWM/gE0O80d1ie7TN0twUf+Iw5ZY7:SyvRkkdxpt4Zg/kM4Tu1iYhI/fYZY7
Malware Config
Extracted
redline
maxi
83.97.73.126:19048
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
AppLaunch.exea3545027.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a3545027.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a3545027.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a3545027.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a3545027.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a3545027.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a3545027.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
v5593616.exev6095613.exev1667182.exea3545027.exeb1818664.exec2541790.exepid process 536 v5593616.exe 4632 v6095613.exe 4056 v1667182.exe 4324 a3545027.exe 2064 b1818664.exe 3948 c2541790.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
a3545027.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a3545027.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
v1667182.exe94de3b00e6c44e8d37188d026d4aedee52cbadf6351f38512854f93f6c1082f9.exev5593616.exev6095613.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v1667182.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 94de3b00e6c44e8d37188d026d4aedee52cbadf6351f38512854f93f6c1082f9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 94de3b00e6c44e8d37188d026d4aedee52cbadf6351f38512854f93f6c1082f9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5593616.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v5593616.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6095613.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v6095613.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1667182.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
b1818664.exedescription pid process target process PID 2064 set thread context of 2072 2064 b1818664.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 232 2064 WerFault.exe b1818664.exe -
Suspicious behavior: EnumeratesProcesses 36 IoCs
Processes:
a3545027.exeAppLaunch.exec2541790.exepid process 4324 a3545027.exe 4324 a3545027.exe 2072 AppLaunch.exe 2072 AppLaunch.exe 3948 c2541790.exe 3948 c2541790.exe 3948 c2541790.exe 3948 c2541790.exe 3948 c2541790.exe 3948 c2541790.exe 3948 c2541790.exe 3948 c2541790.exe 3948 c2541790.exe 3948 c2541790.exe 3948 c2541790.exe 3948 c2541790.exe 3948 c2541790.exe 3948 c2541790.exe 3948 c2541790.exe 3948 c2541790.exe 3948 c2541790.exe 3948 c2541790.exe 3948 c2541790.exe 3948 c2541790.exe 3948 c2541790.exe 3948 c2541790.exe 3948 c2541790.exe 3948 c2541790.exe 3948 c2541790.exe 3948 c2541790.exe 3948 c2541790.exe 3948 c2541790.exe 3948 c2541790.exe 3948 c2541790.exe 3948 c2541790.exe 3948 c2541790.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
a3545027.exeAppLaunch.exec2541790.exedescription pid process Token: SeDebugPrivilege 4324 a3545027.exe Token: SeDebugPrivilege 2072 AppLaunch.exe Token: SeDebugPrivilege 3948 c2541790.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
94de3b00e6c44e8d37188d026d4aedee52cbadf6351f38512854f93f6c1082f9.exev5593616.exev6095613.exev1667182.exeb1818664.exedescription pid process target process PID 1520 wrote to memory of 536 1520 94de3b00e6c44e8d37188d026d4aedee52cbadf6351f38512854f93f6c1082f9.exe v5593616.exe PID 1520 wrote to memory of 536 1520 94de3b00e6c44e8d37188d026d4aedee52cbadf6351f38512854f93f6c1082f9.exe v5593616.exe PID 1520 wrote to memory of 536 1520 94de3b00e6c44e8d37188d026d4aedee52cbadf6351f38512854f93f6c1082f9.exe v5593616.exe PID 536 wrote to memory of 4632 536 v5593616.exe v6095613.exe PID 536 wrote to memory of 4632 536 v5593616.exe v6095613.exe PID 536 wrote to memory of 4632 536 v5593616.exe v6095613.exe PID 4632 wrote to memory of 4056 4632 v6095613.exe v1667182.exe PID 4632 wrote to memory of 4056 4632 v6095613.exe v1667182.exe PID 4632 wrote to memory of 4056 4632 v6095613.exe v1667182.exe PID 4056 wrote to memory of 4324 4056 v1667182.exe a3545027.exe PID 4056 wrote to memory of 4324 4056 v1667182.exe a3545027.exe PID 4056 wrote to memory of 2064 4056 v1667182.exe b1818664.exe PID 4056 wrote to memory of 2064 4056 v1667182.exe b1818664.exe PID 4056 wrote to memory of 2064 4056 v1667182.exe b1818664.exe PID 2064 wrote to memory of 2072 2064 b1818664.exe AppLaunch.exe PID 2064 wrote to memory of 2072 2064 b1818664.exe AppLaunch.exe PID 2064 wrote to memory of 2072 2064 b1818664.exe AppLaunch.exe PID 2064 wrote to memory of 2072 2064 b1818664.exe AppLaunch.exe PID 2064 wrote to memory of 2072 2064 b1818664.exe AppLaunch.exe PID 4632 wrote to memory of 3948 4632 v6095613.exe c2541790.exe PID 4632 wrote to memory of 3948 4632 v6095613.exe c2541790.exe PID 4632 wrote to memory of 3948 4632 v6095613.exe c2541790.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\94de3b00e6c44e8d37188d026d4aedee52cbadf6351f38512854f93f6c1082f9.exe"C:\Users\Admin\AppData\Local\Temp\94de3b00e6c44e8d37188d026d4aedee52cbadf6351f38512854f93f6c1082f9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5593616.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5593616.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6095613.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6095613.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1667182.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1667182.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3545027.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3545027.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1818664.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1818664.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2064 -s 1406⤵
- Program crash
PID:232 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2541790.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2541790.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2064 -ip 20641⤵PID:2552
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5593616.exeFilesize
532KB
MD5d8ea1543a8eaf2571bddc3b4b141015e
SHA180f5274b957767e81a3c421cead13ec42097f63e
SHA25642f65e467e731c40561c9bbb4802aab94be14c6774a7315b82e4bde160dccb35
SHA51227c7774ec541283345239da26ec6c3124b1c829b921ee5698824885cce4d6aad5b481465da7659bd56477310288672dbe602dddd48d56275e3a2ec6a6ee6682f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5593616.exeFilesize
532KB
MD5d8ea1543a8eaf2571bddc3b4b141015e
SHA180f5274b957767e81a3c421cead13ec42097f63e
SHA25642f65e467e731c40561c9bbb4802aab94be14c6774a7315b82e4bde160dccb35
SHA51227c7774ec541283345239da26ec6c3124b1c829b921ee5698824885cce4d6aad5b481465da7659bd56477310288672dbe602dddd48d56275e3a2ec6a6ee6682f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6095613.exeFilesize
359KB
MD5e0c756f720a7bf7134476d7e28a4568b
SHA1ece0beab765a73e407f4560afee1b4e545bd4bab
SHA2563d61e848e6c8e58fdcdcf7749348895b8c7b971627222915195f109ffb784656
SHA512985d41ea7402a3b4750bd1533701f681e118b5625d707bb49f633617d909f96d6ab2bb32c60989504d1f551c6be17af5e1a17184ec1afdf4907329505c38551a
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6095613.exeFilesize
359KB
MD5e0c756f720a7bf7134476d7e28a4568b
SHA1ece0beab765a73e407f4560afee1b4e545bd4bab
SHA2563d61e848e6c8e58fdcdcf7749348895b8c7b971627222915195f109ffb784656
SHA512985d41ea7402a3b4750bd1533701f681e118b5625d707bb49f633617d909f96d6ab2bb32c60989504d1f551c6be17af5e1a17184ec1afdf4907329505c38551a
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2541790.exeFilesize
172KB
MD59abf170de76df76d4f2ef1cfb077c34d
SHA11a0f5575fede4cf2864c664a7a84b080a4137cca
SHA256b986b2181c7a73d75dadebb359d915262f5451c078635da90cdb3f38a11ab5a0
SHA512b4cca9c2a59fc60553e732ab397b46927021abfa0b59799280d55dd99f572e62ac6c6422871084a19dcf719c83b4502d17758dba8cbfab57d906c5c244699066
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2541790.exeFilesize
172KB
MD59abf170de76df76d4f2ef1cfb077c34d
SHA11a0f5575fede4cf2864c664a7a84b080a4137cca
SHA256b986b2181c7a73d75dadebb359d915262f5451c078635da90cdb3f38a11ab5a0
SHA512b4cca9c2a59fc60553e732ab397b46927021abfa0b59799280d55dd99f572e62ac6c6422871084a19dcf719c83b4502d17758dba8cbfab57d906c5c244699066
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1667182.exeFilesize
204KB
MD55f4d2ad888e36d2a4d288ae18be9b967
SHA162ccf81b1ab39bc13761db0da72fae7cd382ef7d
SHA25664f2aa915b75dae565eddeeaf8f65b7390e8d8c619fc5c9d855ea4a342b6169f
SHA512ed853563346bb9acf15efe79b4e4d4f7ff31deec6abd11099c796ea92629e0d4087da54c4c8313328f369716b42e6e0898a043db8fe87ec5985679a8f9027476
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v1667182.exeFilesize
204KB
MD55f4d2ad888e36d2a4d288ae18be9b967
SHA162ccf81b1ab39bc13761db0da72fae7cd382ef7d
SHA25664f2aa915b75dae565eddeeaf8f65b7390e8d8c619fc5c9d855ea4a342b6169f
SHA512ed853563346bb9acf15efe79b4e4d4f7ff31deec6abd11099c796ea92629e0d4087da54c4c8313328f369716b42e6e0898a043db8fe87ec5985679a8f9027476
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3545027.exeFilesize
13KB
MD56369e6b0bcf26650db4587e4533cccc4
SHA1bb51c6b95d70545974ca9239fe5af4bec5be41d6
SHA256b4dcd5af84c3360bc2a17803efa59707fae01faa09e575c9e1b169af99625786
SHA5123fc8e50d0fdaed428b79d2af547a83339f423c9f6007a9bd88e8fff866d6fcb538dbd5c5bccf46455aefca4762322bd994daa176c673c90acefcc62a2879ddb1
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a3545027.exeFilesize
13KB
MD56369e6b0bcf26650db4587e4533cccc4
SHA1bb51c6b95d70545974ca9239fe5af4bec5be41d6
SHA256b4dcd5af84c3360bc2a17803efa59707fae01faa09e575c9e1b169af99625786
SHA5123fc8e50d0fdaed428b79d2af547a83339f423c9f6007a9bd88e8fff866d6fcb538dbd5c5bccf46455aefca4762322bd994daa176c673c90acefcc62a2879ddb1
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1818664.exeFilesize
120KB
MD552aac5ebec31a31a7c02a863c7a2fa08
SHA183261bb9f27004c2988865cd78cdcae8ca2f20da
SHA256d11b67ded928cb0c3d9f95a631959ae9bed89143267fc8b77abdfdad61440df5
SHA512a292d3ad21ce41248237ad3160e4fac703ad3d5c3d71c6c3887719de0bc9a889bac463a917b151d9d3d02f236605aeb6a01635f6999f070ac827f893ba8b34a6
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b1818664.exeFilesize
120KB
MD552aac5ebec31a31a7c02a863c7a2fa08
SHA183261bb9f27004c2988865cd78cdcae8ca2f20da
SHA256d11b67ded928cb0c3d9f95a631959ae9bed89143267fc8b77abdfdad61440df5
SHA512a292d3ad21ce41248237ad3160e4fac703ad3d5c3d71c6c3887719de0bc9a889bac463a917b151d9d3d02f236605aeb6a01635f6999f070ac827f893ba8b34a6
-
memory/2072-167-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/3948-175-0x00000000005B0000-0x00000000005E0000-memory.dmpFilesize
192KB
-
memory/3948-181-0x00000000053C0000-0x0000000005436000-memory.dmpFilesize
472KB
-
memory/3948-176-0x00000000056F0000-0x0000000005D08000-memory.dmpFilesize
6.1MB
-
memory/3948-177-0x00000000051E0000-0x00000000052EA000-memory.dmpFilesize
1.0MB
-
memory/3948-178-0x0000000004F40000-0x0000000004F52000-memory.dmpFilesize
72KB
-
memory/3948-179-0x00000000050D0000-0x000000000510C000-memory.dmpFilesize
240KB
-
memory/3948-180-0x0000000004FC0000-0x0000000004FD0000-memory.dmpFilesize
64KB
-
memory/3948-189-0x00000000064B0000-0x0000000006500000-memory.dmpFilesize
320KB
-
memory/3948-182-0x00000000055E0000-0x0000000005672000-memory.dmpFilesize
584KB
-
memory/3948-183-0x0000000005540000-0x00000000055A6000-memory.dmpFilesize
408KB
-
memory/3948-184-0x00000000067B0000-0x0000000006D54000-memory.dmpFilesize
5.6MB
-
memory/3948-186-0x0000000006540000-0x0000000006702000-memory.dmpFilesize
1.8MB
-
memory/3948-187-0x0000000008880000-0x0000000008DAC000-memory.dmpFilesize
5.2MB
-
memory/3948-188-0x0000000004FC0000-0x0000000004FD0000-memory.dmpFilesize
64KB
-
memory/4324-161-0x0000000000130000-0x000000000013A000-memory.dmpFilesize
40KB