Analysis
-
max time kernel
134s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2023 09:46
Static task
static1
Behavioral task
behavioral1
Sample
57e9a2f139811a7d7c681a5f6498bdc6.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
57e9a2f139811a7d7c681a5f6498bdc6.exe
Resource
win10v2004-20230220-en
General
-
Target
57e9a2f139811a7d7c681a5f6498bdc6.exe
-
Size
735KB
-
MD5
57e9a2f139811a7d7c681a5f6498bdc6
-
SHA1
db8f3271f5d9d7b762c1ccd9621c46e40c7c8be3
-
SHA256
f979c3ad640974fa3e5b64bcb9cb9c02d61476b8b1855930dfdea45f879059c4
-
SHA512
df16a534d1fa2a9ddd0240b038891f990fbfe5a61e87ad00669c46566ffc3c6e826890da2954213d2733059a3b2435a3ae6ddf15e79168edab02037c8b279c7b
-
SSDEEP
12288:nMrgy905eUFEETWFOh6njyM7VTNYd4I8tHP2znIRyX3c9zg0G1IVN6KI:vy+i3WMxTNYSjlUTX3ce0LTI
Malware Config
Extracted
redline
maxi
83.97.73.126:19048
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
a5375617.exeAppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5375617.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a5375617.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5375617.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5375617.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5375617.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5375617.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
v1132758.exev1273129.exev5683016.exea5375617.exeb2049210.exec4189397.exepid process 636 v1132758.exe 2452 v1273129.exe 3208 v5683016.exe 1872 a5375617.exe 2684 b2049210.exe 4152 c4189397.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
a5375617.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a5375617.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
v1273129.exev5683016.exe57e9a2f139811a7d7c681a5f6498bdc6.exev1132758.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v1273129.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5683016.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v5683016.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 57e9a2f139811a7d7c681a5f6498bdc6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 57e9a2f139811a7d7c681a5f6498bdc6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1132758.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v1132758.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1273129.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
b2049210.exedescription pid process target process PID 2684 set thread context of 2160 2684 b2049210.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3920 2684 WerFault.exe b2049210.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
a5375617.exeAppLaunch.exec4189397.exepid process 1872 a5375617.exe 1872 a5375617.exe 2160 AppLaunch.exe 2160 AppLaunch.exe 4152 c4189397.exe 4152 c4189397.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
a5375617.exeAppLaunch.exec4189397.exedescription pid process Token: SeDebugPrivilege 1872 a5375617.exe Token: SeDebugPrivilege 2160 AppLaunch.exe Token: SeDebugPrivilege 4152 c4189397.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
57e9a2f139811a7d7c681a5f6498bdc6.exev1132758.exev1273129.exev5683016.exeb2049210.exedescription pid process target process PID 3628 wrote to memory of 636 3628 57e9a2f139811a7d7c681a5f6498bdc6.exe v1132758.exe PID 3628 wrote to memory of 636 3628 57e9a2f139811a7d7c681a5f6498bdc6.exe v1132758.exe PID 3628 wrote to memory of 636 3628 57e9a2f139811a7d7c681a5f6498bdc6.exe v1132758.exe PID 636 wrote to memory of 2452 636 v1132758.exe v1273129.exe PID 636 wrote to memory of 2452 636 v1132758.exe v1273129.exe PID 636 wrote to memory of 2452 636 v1132758.exe v1273129.exe PID 2452 wrote to memory of 3208 2452 v1273129.exe v5683016.exe PID 2452 wrote to memory of 3208 2452 v1273129.exe v5683016.exe PID 2452 wrote to memory of 3208 2452 v1273129.exe v5683016.exe PID 3208 wrote to memory of 1872 3208 v5683016.exe a5375617.exe PID 3208 wrote to memory of 1872 3208 v5683016.exe a5375617.exe PID 3208 wrote to memory of 2684 3208 v5683016.exe b2049210.exe PID 3208 wrote to memory of 2684 3208 v5683016.exe b2049210.exe PID 3208 wrote to memory of 2684 3208 v5683016.exe b2049210.exe PID 2684 wrote to memory of 2160 2684 b2049210.exe AppLaunch.exe PID 2684 wrote to memory of 2160 2684 b2049210.exe AppLaunch.exe PID 2684 wrote to memory of 2160 2684 b2049210.exe AppLaunch.exe PID 2684 wrote to memory of 2160 2684 b2049210.exe AppLaunch.exe PID 2684 wrote to memory of 2160 2684 b2049210.exe AppLaunch.exe PID 2452 wrote to memory of 4152 2452 v1273129.exe c4189397.exe PID 2452 wrote to memory of 4152 2452 v1273129.exe c4189397.exe PID 2452 wrote to memory of 4152 2452 v1273129.exe c4189397.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\57e9a2f139811a7d7c681a5f6498bdc6.exe"C:\Users\Admin\AppData\Local\Temp\57e9a2f139811a7d7c681a5f6498bdc6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1132758.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1132758.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1273129.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1273129.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5683016.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v5683016.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5375617.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5375617.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2049210.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2049210.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2684 -s 1406⤵
- Program crash
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c4189397.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c4189397.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2684 -ip 26841⤵PID:548
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
532KB
MD5a66457c197433fd924f3772a19317778
SHA1af03349e2d3fe075d68415ca04fc75ca543b1a8b
SHA256ca82a9197f35e6c276c2d3878f982df03bbe2b93eb4ba9607f924741dde4a091
SHA51223b0bb3df9c26db0bbb18151eb0bc224a7c6e1a6dff7ad7d76b9179797cd0e0c662a08c750a941759e3887bde939de9c3a5640ae20bc22230ccefdf1413f992d
-
Filesize
532KB
MD5a66457c197433fd924f3772a19317778
SHA1af03349e2d3fe075d68415ca04fc75ca543b1a8b
SHA256ca82a9197f35e6c276c2d3878f982df03bbe2b93eb4ba9607f924741dde4a091
SHA51223b0bb3df9c26db0bbb18151eb0bc224a7c6e1a6dff7ad7d76b9179797cd0e0c662a08c750a941759e3887bde939de9c3a5640ae20bc22230ccefdf1413f992d
-
Filesize
359KB
MD52cd02464adebffc760345e84d163c0e4
SHA175eaff25dbba4ee0aea1bfcf4631ee5cf3bc3a9e
SHA256bc2ecff2590011ba7c2a6f042c0a2222a45d41c258ad2c3aeefc3487315565b4
SHA51296060dedec69e741137394175f8e688bb64304d45865bc7667e0537b9b63bd47fc4a1390034aa1045a4c63be3e656ceefcb07b3566fa83f72e701641343f45ff
-
Filesize
359KB
MD52cd02464adebffc760345e84d163c0e4
SHA175eaff25dbba4ee0aea1bfcf4631ee5cf3bc3a9e
SHA256bc2ecff2590011ba7c2a6f042c0a2222a45d41c258ad2c3aeefc3487315565b4
SHA51296060dedec69e741137394175f8e688bb64304d45865bc7667e0537b9b63bd47fc4a1390034aa1045a4c63be3e656ceefcb07b3566fa83f72e701641343f45ff
-
Filesize
172KB
MD523f206b50f60690a383ce7a0f51556ea
SHA127935a3a0f8eab965d69303c4301afaf7883cf05
SHA256e8ccfd769c0767b0b990515cd118bb79c6b604ff5b17363aeb0aa4461b5fcc0f
SHA5124cf99256bb08873be8329d5dcd3ca3950d708f64b3f69ae58562c70e6b217e561afc0ff4e1f74db99cfed4cc06caed90354f94c1b8edf2a7935d931b7dfeb046
-
Filesize
172KB
MD523f206b50f60690a383ce7a0f51556ea
SHA127935a3a0f8eab965d69303c4301afaf7883cf05
SHA256e8ccfd769c0767b0b990515cd118bb79c6b604ff5b17363aeb0aa4461b5fcc0f
SHA5124cf99256bb08873be8329d5dcd3ca3950d708f64b3f69ae58562c70e6b217e561afc0ff4e1f74db99cfed4cc06caed90354f94c1b8edf2a7935d931b7dfeb046
-
Filesize
204KB
MD51cc216115031acff5f95ba5ae5ede605
SHA15f785e24ba8a6c206f583545ae683466e3d63e57
SHA256099dd80c4e3be2096a5f013289136d746396cc3ffaee17a056aea9a1459c443d
SHA512c9620c0aaf7cb755c12462fca0cfb70985d34524ed0fdc9e37cf3cc256b71502823be31a20f680f3142a95406102e8ea377289dccaf1ee7ff676a4dd5c24e509
-
Filesize
204KB
MD51cc216115031acff5f95ba5ae5ede605
SHA15f785e24ba8a6c206f583545ae683466e3d63e57
SHA256099dd80c4e3be2096a5f013289136d746396cc3ffaee17a056aea9a1459c443d
SHA512c9620c0aaf7cb755c12462fca0cfb70985d34524ed0fdc9e37cf3cc256b71502823be31a20f680f3142a95406102e8ea377289dccaf1ee7ff676a4dd5c24e509
-
Filesize
13KB
MD56a5f8d8d67730a5d20c4306d53f66ca2
SHA15645f127049ef4ced9469724117609938fd250c7
SHA25634c237a06d81f1b41dc499a791ea9b41c8e75ddac46247337bf114af256a3a47
SHA512068efc44ec09af899f6646813d8ac4cbb4ca426980f671cbd8791daeed9855d6a54f6f9689bbe0d6aa3cc2cd2632179ba18dcbde6f7eaba869d2d883e7cb18bf
-
Filesize
13KB
MD56a5f8d8d67730a5d20c4306d53f66ca2
SHA15645f127049ef4ced9469724117609938fd250c7
SHA25634c237a06d81f1b41dc499a791ea9b41c8e75ddac46247337bf114af256a3a47
SHA512068efc44ec09af899f6646813d8ac4cbb4ca426980f671cbd8791daeed9855d6a54f6f9689bbe0d6aa3cc2cd2632179ba18dcbde6f7eaba869d2d883e7cb18bf
-
Filesize
120KB
MD5765ac1e3c70538f9d7b7f48fc7d79bcf
SHA1d78dcb51efb38d5baae2f701a273b6e49d093384
SHA25609a709644e41207462c99bdc1c75e7ff33530d3796ae9a46dbf948b786d23377
SHA512416d04e4137399287b3d56d042f4753d145baa2aa33242f49476bcd7ae6a603b9f30a72c01a5832583b66e6cc52f6212b27f399a1c0bae80abbb6cda789bc68a
-
Filesize
120KB
MD5765ac1e3c70538f9d7b7f48fc7d79bcf
SHA1d78dcb51efb38d5baae2f701a273b6e49d093384
SHA25609a709644e41207462c99bdc1c75e7ff33530d3796ae9a46dbf948b786d23377
SHA512416d04e4137399287b3d56d042f4753d145baa2aa33242f49476bcd7ae6a603b9f30a72c01a5832583b66e6cc52f6212b27f399a1c0bae80abbb6cda789bc68a