Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2023 12:17
Static task
static1
Behavioral task
behavioral1
Sample
3ebfa871a8b6ab2e3a911b6e652908e069aec940315acbdb0039981fcfdc6ca9.exe
Resource
win10v2004-20230221-en
General
-
Target
3ebfa871a8b6ab2e3a911b6e652908e069aec940315acbdb0039981fcfdc6ca9.exe
-
Size
735KB
-
MD5
cab1864e8205635e834abae78c520ce9
-
SHA1
f6eeb9793c868cfafa8ae83de108660172d03218
-
SHA256
3ebfa871a8b6ab2e3a911b6e652908e069aec940315acbdb0039981fcfdc6ca9
-
SHA512
76e22375aa6c975bb8796f1b134a1d3d5c0dfb692957fb3ca1ad96188f5c45f7b0132f25ce6fd42b495460fee1234353de6ea8d3ec0f43eb85ffa19133dd5e57
-
SSDEEP
12288:OMr8y90ayogIwKLvrOdAHeeqRsYkgSfM4gs9TfIXWi2IRXyG3vKzreJ:WydmInLvr2e3qSfM0TfyXyG3uC
Malware Config
Extracted
redline
maxi
83.97.73.126:19048
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
a0923226.exeAppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a0923226.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a0923226.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a0923226.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a0923226.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a0923226.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a0923226.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
v5852309.exev3896943.exev8066316.exea0923226.exeb5399704.exec7229968.exepid process 960 v5852309.exe 964 v3896943.exe 4520 v8066316.exe 1884 a0923226.exe 3228 b5399704.exe 3864 c7229968.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
a0923226.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a0923226.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
3ebfa871a8b6ab2e3a911b6e652908e069aec940315acbdb0039981fcfdc6ca9.exev5852309.exev3896943.exev8066316.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3ebfa871a8b6ab2e3a911b6e652908e069aec940315acbdb0039981fcfdc6ca9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3ebfa871a8b6ab2e3a911b6e652908e069aec940315acbdb0039981fcfdc6ca9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5852309.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v5852309.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3896943.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v3896943.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8066316.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v8066316.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
b5399704.exedescription pid process target process PID 3228 set thread context of 3820 3228 b5399704.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4768 3228 WerFault.exe b5399704.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
a0923226.exeAppLaunch.exec7229968.exepid process 1884 a0923226.exe 1884 a0923226.exe 3820 AppLaunch.exe 3820 AppLaunch.exe 3864 c7229968.exe 3864 c7229968.exe 3864 c7229968.exe 3864 c7229968.exe 3864 c7229968.exe 3864 c7229968.exe 3864 c7229968.exe 3864 c7229968.exe 3864 c7229968.exe 3864 c7229968.exe 3864 c7229968.exe 3864 c7229968.exe 3864 c7229968.exe 3864 c7229968.exe 3864 c7229968.exe 3864 c7229968.exe 3864 c7229968.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
a0923226.exeAppLaunch.exec7229968.exedescription pid process Token: SeDebugPrivilege 1884 a0923226.exe Token: SeDebugPrivilege 3820 AppLaunch.exe Token: SeDebugPrivilege 3864 c7229968.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
3ebfa871a8b6ab2e3a911b6e652908e069aec940315acbdb0039981fcfdc6ca9.exev5852309.exev3896943.exev8066316.exeb5399704.exedescription pid process target process PID 2676 wrote to memory of 960 2676 3ebfa871a8b6ab2e3a911b6e652908e069aec940315acbdb0039981fcfdc6ca9.exe v5852309.exe PID 2676 wrote to memory of 960 2676 3ebfa871a8b6ab2e3a911b6e652908e069aec940315acbdb0039981fcfdc6ca9.exe v5852309.exe PID 2676 wrote to memory of 960 2676 3ebfa871a8b6ab2e3a911b6e652908e069aec940315acbdb0039981fcfdc6ca9.exe v5852309.exe PID 960 wrote to memory of 964 960 v5852309.exe v3896943.exe PID 960 wrote to memory of 964 960 v5852309.exe v3896943.exe PID 960 wrote to memory of 964 960 v5852309.exe v3896943.exe PID 964 wrote to memory of 4520 964 v3896943.exe v8066316.exe PID 964 wrote to memory of 4520 964 v3896943.exe v8066316.exe PID 964 wrote to memory of 4520 964 v3896943.exe v8066316.exe PID 4520 wrote to memory of 1884 4520 v8066316.exe a0923226.exe PID 4520 wrote to memory of 1884 4520 v8066316.exe a0923226.exe PID 4520 wrote to memory of 3228 4520 v8066316.exe b5399704.exe PID 4520 wrote to memory of 3228 4520 v8066316.exe b5399704.exe PID 4520 wrote to memory of 3228 4520 v8066316.exe b5399704.exe PID 3228 wrote to memory of 3820 3228 b5399704.exe AppLaunch.exe PID 3228 wrote to memory of 3820 3228 b5399704.exe AppLaunch.exe PID 3228 wrote to memory of 3820 3228 b5399704.exe AppLaunch.exe PID 3228 wrote to memory of 3820 3228 b5399704.exe AppLaunch.exe PID 3228 wrote to memory of 3820 3228 b5399704.exe AppLaunch.exe PID 964 wrote to memory of 3864 964 v3896943.exe c7229968.exe PID 964 wrote to memory of 3864 964 v3896943.exe c7229968.exe PID 964 wrote to memory of 3864 964 v3896943.exe c7229968.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ebfa871a8b6ab2e3a911b6e652908e069aec940315acbdb0039981fcfdc6ca9.exe"C:\Users\Admin\AppData\Local\Temp\3ebfa871a8b6ab2e3a911b6e652908e069aec940315acbdb0039981fcfdc6ca9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5852309.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5852309.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3896943.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3896943.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8066316.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8066316.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a0923226.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a0923226.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5399704.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5399704.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3228 -s 1406⤵
- Program crash
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c7229968.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c7229968.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3228 -ip 32281⤵PID:4544
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5852309.exeFilesize
530KB
MD5f0ff97eba34e46e25f8c09ddbd6d57e5
SHA1a328148844a0c0a01d76a2c9d497e1a087a43231
SHA256975845cf97de2b373e6434ef758a24c29285d98721c9b59c30dd08d498a6fbb3
SHA5127bba67f28ffa2f432ca77b327083dee8868ccbcfa9218cbf587967bc89c80b7ac152480fb51a3a8abfe8cc87765b2c0d8e8d96b2e595b21ea3a86806650d8818
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5852309.exeFilesize
530KB
MD5f0ff97eba34e46e25f8c09ddbd6d57e5
SHA1a328148844a0c0a01d76a2c9d497e1a087a43231
SHA256975845cf97de2b373e6434ef758a24c29285d98721c9b59c30dd08d498a6fbb3
SHA5127bba67f28ffa2f432ca77b327083dee8868ccbcfa9218cbf587967bc89c80b7ac152480fb51a3a8abfe8cc87765b2c0d8e8d96b2e595b21ea3a86806650d8818
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3896943.exeFilesize
358KB
MD5e0df60375579ca58d4062fb750f2d555
SHA1025ee274e6abca0729ce48ae3c2f71ee58e5f607
SHA256bbcc186311859cee07d8784c23616bf0225f2fe0bc6aa3daeefa0dbb4eabaa0d
SHA51249b4c70689b2d8123407f590f89904764db7dadc4eaca68b2becea9fca605d6562b87fdc4e22a2641392f08987b7ce10f11e3df36edb367c341a3997071e9be1
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3896943.exeFilesize
358KB
MD5e0df60375579ca58d4062fb750f2d555
SHA1025ee274e6abca0729ce48ae3c2f71ee58e5f607
SHA256bbcc186311859cee07d8784c23616bf0225f2fe0bc6aa3daeefa0dbb4eabaa0d
SHA51249b4c70689b2d8123407f590f89904764db7dadc4eaca68b2becea9fca605d6562b87fdc4e22a2641392f08987b7ce10f11e3df36edb367c341a3997071e9be1
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c7229968.exeFilesize
172KB
MD568b9cf0d3ea4978f448636d7bf7024c5
SHA1aa5f59dda309084217b072bdbd6b43b8f32e90ce
SHA256e89f186a32aadd0bb5abd06f354993cae29e6f6361793acec6d94890cb256f0b
SHA512a4bc335a9be356924c76966e21dbf47faddcecad768df5bdbab5e3199e33909d8c1f7894643a8d30fbfdaa523b8edc78424569182c91d9a196b26a731572bfe6
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c7229968.exeFilesize
172KB
MD568b9cf0d3ea4978f448636d7bf7024c5
SHA1aa5f59dda309084217b072bdbd6b43b8f32e90ce
SHA256e89f186a32aadd0bb5abd06f354993cae29e6f6361793acec6d94890cb256f0b
SHA512a4bc335a9be356924c76966e21dbf47faddcecad768df5bdbab5e3199e33909d8c1f7894643a8d30fbfdaa523b8edc78424569182c91d9a196b26a731572bfe6
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8066316.exeFilesize
203KB
MD51703b6b6fa73edd86681526c8a1eeae9
SHA14e773a88e30ebfa6a3cfe358d32f617d8e064a37
SHA256cee6ed9fc61628066b313c74b2a4b7242097470ebe54ec180c3aece30788e830
SHA5120e442f758761e23a4f1a0db7e4317b8f269b0e602bf843964af57ee1b4d35d15ad62d1afaf321d3150cc604a10c19d791ff6ba02955c6bc73c899134fb878a40
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v8066316.exeFilesize
203KB
MD51703b6b6fa73edd86681526c8a1eeae9
SHA14e773a88e30ebfa6a3cfe358d32f617d8e064a37
SHA256cee6ed9fc61628066b313c74b2a4b7242097470ebe54ec180c3aece30788e830
SHA5120e442f758761e23a4f1a0db7e4317b8f269b0e602bf843964af57ee1b4d35d15ad62d1afaf321d3150cc604a10c19d791ff6ba02955c6bc73c899134fb878a40
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a0923226.exeFilesize
13KB
MD50a4646229b5234e8194360e053f16388
SHA126bae3e2643fe61ae8680310337ce2c4115aa731
SHA2568231765cac37ee401133861bf87d50800afd264086c7300996987795adeb04b4
SHA512ae8d6c8cb3f72ad865e50df62456df28000566e9056fe13ab38afe4add6bb1da598e60128546eaa6ced9b3195f1f2dc6ef16f7adf6d703d275faa5a2180bf4cd
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a0923226.exeFilesize
13KB
MD50a4646229b5234e8194360e053f16388
SHA126bae3e2643fe61ae8680310337ce2c4115aa731
SHA2568231765cac37ee401133861bf87d50800afd264086c7300996987795adeb04b4
SHA512ae8d6c8cb3f72ad865e50df62456df28000566e9056fe13ab38afe4add6bb1da598e60128546eaa6ced9b3195f1f2dc6ef16f7adf6d703d275faa5a2180bf4cd
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5399704.exeFilesize
120KB
MD584adf94cc212c6a19f2af362f87eabc6
SHA1e5c749ccb1fc465e8ad63fd4240bb070df47adfa
SHA25689b08acca450372cbd1b9421a8010546183363482e43f29d00d0567990c47343
SHA5123a8cb3c8ead10cf14ebdc6587809948667b7278edf3cde3e528d48a662c7e9582c286d2e8a62e492d660fab2484b21bd1179ec5daaa51e567b0e82ea3659e696
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5399704.exeFilesize
120KB
MD584adf94cc212c6a19f2af362f87eabc6
SHA1e5c749ccb1fc465e8ad63fd4240bb070df47adfa
SHA25689b08acca450372cbd1b9421a8010546183363482e43f29d00d0567990c47343
SHA5123a8cb3c8ead10cf14ebdc6587809948667b7278edf3cde3e528d48a662c7e9582c286d2e8a62e492d660fab2484b21bd1179ec5daaa51e567b0e82ea3659e696
-
memory/1884-161-0x0000000000FA0000-0x0000000000FAA000-memory.dmpFilesize
40KB
-
memory/3820-167-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/3864-175-0x00000000008F0000-0x0000000000920000-memory.dmpFilesize
192KB
-
memory/3864-176-0x000000000ACF0000-0x000000000B308000-memory.dmpFilesize
6.1MB
-
memory/3864-177-0x000000000A870000-0x000000000A97A000-memory.dmpFilesize
1.0MB
-
memory/3864-178-0x000000000A7B0000-0x000000000A7C2000-memory.dmpFilesize
72KB
-
memory/3864-179-0x000000000A810000-0x000000000A84C000-memory.dmpFilesize
240KB
-
memory/3864-180-0x0000000002B00000-0x0000000002B10000-memory.dmpFilesize
64KB
-
memory/3864-181-0x000000000AC20000-0x000000000AC96000-memory.dmpFilesize
472KB
-
memory/3864-182-0x000000000B3B0000-0x000000000B442000-memory.dmpFilesize
584KB
-
memory/3864-183-0x000000000BA00000-0x000000000BFA4000-memory.dmpFilesize
5.6MB
-
memory/3864-184-0x000000000B450000-0x000000000B4B6000-memory.dmpFilesize
408KB
-
memory/3864-185-0x000000000C180000-0x000000000C342000-memory.dmpFilesize
1.8MB
-
memory/3864-186-0x000000000C880000-0x000000000CDAC000-memory.dmpFilesize
5.2MB
-
memory/3864-188-0x000000000B920000-0x000000000B970000-memory.dmpFilesize
320KB
-
memory/3864-189-0x0000000002B00000-0x0000000002B10000-memory.dmpFilesize
64KB