Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2023 11:31
Static task
static1
Behavioral task
behavioral1
Sample
02092399.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
02092399.exe
Resource
win10v2004-20230221-en
General
-
Target
02092399.exe
-
Size
739KB
-
MD5
06175aac59bea0835a3e7ae09f14487f
-
SHA1
1faf1010c7555edda759bd414d17764f2263bd3c
-
SHA256
104d35b73948ce44867e406b874f6dba72c7d01a5bf0f296f470f8d076247bf8
-
SHA512
e44fba882fcab750235b1ce0a4beeb4862239be1ca3241b6cc4499d75c7e64997b8120e975a8fad7e52f77ed7557ee2eaf712ac19b7a4f845f8d792b8c7ddaf1
-
SSDEEP
12288:HMrDy90ptej0fd+/KpjQzqYcTL447fgdNRZ6APGyS+3BMkL1V8R2piNqm:My2s0fo/Kpj3TL4GfKRZ6tzkL12RqiNp
Malware Config
Extracted
redline
maxi
83.97.73.126:19048
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
a7622483.exeAppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a7622483.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a7622483.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a7622483.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a7622483.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a7622483.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a7622483.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
v1551926.exev8709820.exev8664465.exea7622483.exeb5175321.exec5398723.exepid process 1844 v1551926.exe 1936 v8709820.exe 4468 v8664465.exe 1500 a7622483.exe 4900 b5175321.exe 348 c5398723.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
a7622483.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a7622483.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
v8709820.exev8664465.exe02092399.exev1551926.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8709820.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v8709820.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8664465.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v8664465.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 02092399.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 02092399.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1551926.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v1551926.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
b5175321.exedescription pid process target process PID 4900 set thread context of 3032 4900 b5175321.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4708 4900 WerFault.exe b5175321.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
a7622483.exeAppLaunch.exec5398723.exepid process 1500 a7622483.exe 1500 a7622483.exe 3032 AppLaunch.exe 3032 AppLaunch.exe 348 c5398723.exe 348 c5398723.exe 348 c5398723.exe 348 c5398723.exe 348 c5398723.exe 348 c5398723.exe 348 c5398723.exe 348 c5398723.exe 348 c5398723.exe 348 c5398723.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
a7622483.exeAppLaunch.exec5398723.exedescription pid process Token: SeDebugPrivilege 1500 a7622483.exe Token: SeDebugPrivilege 3032 AppLaunch.exe Token: SeDebugPrivilege 348 c5398723.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
02092399.exev1551926.exev8709820.exev8664465.exeb5175321.exedescription pid process target process PID 1748 wrote to memory of 1844 1748 02092399.exe v1551926.exe PID 1748 wrote to memory of 1844 1748 02092399.exe v1551926.exe PID 1748 wrote to memory of 1844 1748 02092399.exe v1551926.exe PID 1844 wrote to memory of 1936 1844 v1551926.exe v8709820.exe PID 1844 wrote to memory of 1936 1844 v1551926.exe v8709820.exe PID 1844 wrote to memory of 1936 1844 v1551926.exe v8709820.exe PID 1936 wrote to memory of 4468 1936 v8709820.exe v8664465.exe PID 1936 wrote to memory of 4468 1936 v8709820.exe v8664465.exe PID 1936 wrote to memory of 4468 1936 v8709820.exe v8664465.exe PID 4468 wrote to memory of 1500 4468 v8664465.exe a7622483.exe PID 4468 wrote to memory of 1500 4468 v8664465.exe a7622483.exe PID 4468 wrote to memory of 4900 4468 v8664465.exe b5175321.exe PID 4468 wrote to memory of 4900 4468 v8664465.exe b5175321.exe PID 4468 wrote to memory of 4900 4468 v8664465.exe b5175321.exe PID 4900 wrote to memory of 3032 4900 b5175321.exe AppLaunch.exe PID 4900 wrote to memory of 3032 4900 b5175321.exe AppLaunch.exe PID 4900 wrote to memory of 3032 4900 b5175321.exe AppLaunch.exe PID 4900 wrote to memory of 3032 4900 b5175321.exe AppLaunch.exe PID 4900 wrote to memory of 3032 4900 b5175321.exe AppLaunch.exe PID 1936 wrote to memory of 348 1936 v8709820.exe c5398723.exe PID 1936 wrote to memory of 348 1936 v8709820.exe c5398723.exe PID 1936 wrote to memory of 348 1936 v8709820.exe c5398723.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\02092399.exe"C:\Users\Admin\AppData\Local\Temp\02092399.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1551926.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1551926.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8709820.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8709820.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8664465.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8664465.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7622483.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7622483.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5175321.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5175321.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4900 -s 2046⤵
- Program crash
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c5398723.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c5398723.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4900 -ip 49001⤵PID:3656
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1551926.exeFilesize
532KB
MD5220b4bd402d58f888d713ad40aa6908a
SHA18059f4cd911c5fa321db5986f1629128f0766181
SHA2565b66352760e0ec19a84c6aa0085e3bbdcd333c29b090865296ca9229026fb692
SHA5122d2ab5859330563f0cf614aaaf74fa35904eb7768623785fa92105eab7d5e3e62f6c24efbdb99b9fddc465a62a673bb61bf8d7df146eff8b9c3b62d273d645ac
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1551926.exeFilesize
532KB
MD5220b4bd402d58f888d713ad40aa6908a
SHA18059f4cd911c5fa321db5986f1629128f0766181
SHA2565b66352760e0ec19a84c6aa0085e3bbdcd333c29b090865296ca9229026fb692
SHA5122d2ab5859330563f0cf614aaaf74fa35904eb7768623785fa92105eab7d5e3e62f6c24efbdb99b9fddc465a62a673bb61bf8d7df146eff8b9c3b62d273d645ac
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8709820.exeFilesize
359KB
MD50639a63da76133774b5cc41d044c06ce
SHA16bfcaf320d640bac98f400ce43ec09f7293b0b16
SHA256cd1b2e8c7a73ee936d7def07d5b7f94ad7f3db15c22148b8eb2488b31972e687
SHA512cf37b57ea7b8460feda6f7c8411ba386575b70fde0ad8029acb35c2c71450ec272df718b02497de9b12c29f13ae3e637d2e8ddca17e0100dc5109a2585db16f7
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8709820.exeFilesize
359KB
MD50639a63da76133774b5cc41d044c06ce
SHA16bfcaf320d640bac98f400ce43ec09f7293b0b16
SHA256cd1b2e8c7a73ee936d7def07d5b7f94ad7f3db15c22148b8eb2488b31972e687
SHA512cf37b57ea7b8460feda6f7c8411ba386575b70fde0ad8029acb35c2c71450ec272df718b02497de9b12c29f13ae3e637d2e8ddca17e0100dc5109a2585db16f7
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c5398723.exeFilesize
172KB
MD50f4c1c71f22f9f85ebd8d90642c01567
SHA134d6ae3d3006cea438c6e2d978fd2871729a7946
SHA2562b0f10f5f3f91fbda216e25f60ad91de4c93171da390ecae94f7db7f8cb956a0
SHA512f976ac7589285c16e3d8a1261035269152091de777c0875589e6b31f39db006dab07a944cf2f712fb4133509546cdf4c92a13ef4e62a59c32efbde53005c0ace
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c5398723.exeFilesize
172KB
MD50f4c1c71f22f9f85ebd8d90642c01567
SHA134d6ae3d3006cea438c6e2d978fd2871729a7946
SHA2562b0f10f5f3f91fbda216e25f60ad91de4c93171da390ecae94f7db7f8cb956a0
SHA512f976ac7589285c16e3d8a1261035269152091de777c0875589e6b31f39db006dab07a944cf2f712fb4133509546cdf4c92a13ef4e62a59c32efbde53005c0ace
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8664465.exeFilesize
204KB
MD581914407a65654354a3f9b24a53374ae
SHA15e24840abdb85910d9c61542fcfade17b68cd70a
SHA256102ef4e445b46bf08f9bc467db19f4de1c080a9bad54bd0a5296d641b60037f0
SHA512f08442e23abe3a5425a47868301d0257ada2fcdd2614357066ed80c8d07df2c436d6eb6f0f07a9fc500553e31377400ef3b090b77757da83438e8370ecc919ed
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8664465.exeFilesize
204KB
MD581914407a65654354a3f9b24a53374ae
SHA15e24840abdb85910d9c61542fcfade17b68cd70a
SHA256102ef4e445b46bf08f9bc467db19f4de1c080a9bad54bd0a5296d641b60037f0
SHA512f08442e23abe3a5425a47868301d0257ada2fcdd2614357066ed80c8d07df2c436d6eb6f0f07a9fc500553e31377400ef3b090b77757da83438e8370ecc919ed
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7622483.exeFilesize
13KB
MD5e01af325ea6d5cd8914066931ed5eec9
SHA11f64458077f93ab84793fd1496604dac95658284
SHA2568b25265a6e5563ae813a36f8d54c12b64311cd6b84cb0926170ecba50d865683
SHA5121c5e5568e746e9aada2e4e78b565952ec4b716047b2542e1ad1fd2546f1eb862b6421b2cb398498f7ba24e28361be2bbfaac4dfb7b957d516df6aa173f4895e8
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7622483.exeFilesize
13KB
MD5e01af325ea6d5cd8914066931ed5eec9
SHA11f64458077f93ab84793fd1496604dac95658284
SHA2568b25265a6e5563ae813a36f8d54c12b64311cd6b84cb0926170ecba50d865683
SHA5121c5e5568e746e9aada2e4e78b565952ec4b716047b2542e1ad1fd2546f1eb862b6421b2cb398498f7ba24e28361be2bbfaac4dfb7b957d516df6aa173f4895e8
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5175321.exeFilesize
120KB
MD525b74c955b26b1368e856316fb69d33c
SHA1c89c503c552a5dcd268153f9ae86522e4684fcc7
SHA256b3e14bf7fcfea3865f0189e17d3563737ef83f115807dddb87ff58773a438d58
SHA512ffee63f7fbb8d139bc3cf0f46d4dfcea7102b6d5960ad9056e9d74344805b2b4eec44ef38cff683bec5e2e76b46a5f487d43a8996666cdd7c64e9bbe0bb3a111
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5175321.exeFilesize
120KB
MD525b74c955b26b1368e856316fb69d33c
SHA1c89c503c552a5dcd268153f9ae86522e4684fcc7
SHA256b3e14bf7fcfea3865f0189e17d3563737ef83f115807dddb87ff58773a438d58
SHA512ffee63f7fbb8d139bc3cf0f46d4dfcea7102b6d5960ad9056e9d74344805b2b4eec44ef38cff683bec5e2e76b46a5f487d43a8996666cdd7c64e9bbe0bb3a111
-
memory/348-175-0x0000000000850000-0x0000000000880000-memory.dmpFilesize
192KB
-
memory/348-180-0x0000000005170000-0x0000000005180000-memory.dmpFilesize
64KB
-
memory/348-189-0x000000000BA60000-0x000000000BAB0000-memory.dmpFilesize
320KB
-
memory/348-176-0x000000000AB20000-0x000000000B138000-memory.dmpFilesize
6.1MB
-
memory/348-177-0x000000000A690000-0x000000000A79A000-memory.dmpFilesize
1.0MB
-
memory/348-178-0x000000000A5D0000-0x000000000A5E2000-memory.dmpFilesize
72KB
-
memory/348-179-0x000000000A630000-0x000000000A66C000-memory.dmpFilesize
240KB
-
memory/348-188-0x000000000C610000-0x000000000CB3C000-memory.dmpFilesize
5.2MB
-
memory/348-181-0x000000000A940000-0x000000000A9B6000-memory.dmpFilesize
472KB
-
memory/348-182-0x000000000B1E0000-0x000000000B272000-memory.dmpFilesize
584KB
-
memory/348-183-0x000000000B140000-0x000000000B1A6000-memory.dmpFilesize
408KB
-
memory/348-184-0x000000000BB30000-0x000000000C0D4000-memory.dmpFilesize
5.6MB
-
memory/348-186-0x000000000B890000-0x000000000BA52000-memory.dmpFilesize
1.8MB
-
memory/348-187-0x0000000005170000-0x0000000005180000-memory.dmpFilesize
64KB
-
memory/1500-161-0x00000000008F0000-0x00000000008FA000-memory.dmpFilesize
40KB
-
memory/3032-167-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB