Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2023 13:48
Static task
static1
Behavioral task
behavioral1
Sample
4eacb38731971cff8cf5a14906c91d0deb6a1f6032ed8ba12379348f9a9e27ea.exe
Resource
win10v2004-20230221-en
General
-
Target
4eacb38731971cff8cf5a14906c91d0deb6a1f6032ed8ba12379348f9a9e27ea.exe
-
Size
738KB
-
MD5
10e18a2707e9318a0a7a16c01db038f2
-
SHA1
27a9d8341fde920ded27a3938d4a9b39ad58466e
-
SHA256
4eacb38731971cff8cf5a14906c91d0deb6a1f6032ed8ba12379348f9a9e27ea
-
SHA512
a3bcca06515d29cdbd2ea51650fd33650e786e37dbe2fa5efdd7cda8eb843e06a2738174252ae5ebc1f3d5865e3b454430e5da5c4a09d50a15a32ac84a3f2d0d
-
SSDEEP
12288:0Mr8y90crGBjpLTERugc/m1iRa/1NoXZky8p8jg/AeGK+rrw4wP:wyXrGBNYR/y6w4Nryc0eyf/4
Malware Config
Extracted
redline
maxi
83.97.73.126:19048
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
a5678314.exeAppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5678314.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a5678314.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5678314.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5678314.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5678314.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5678314.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
v2437455.exev7813382.exev7123689.exea5678314.exeb5548244.exec5705630.exepid process 740 v2437455.exe 2192 v7813382.exe 456 v7123689.exe 4940 a5678314.exe 652 b5548244.exe 1580 c5705630.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
a5678314.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a5678314.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
v7123689.exe4eacb38731971cff8cf5a14906c91d0deb6a1f6032ed8ba12379348f9a9e27ea.exev2437455.exev7813382.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v7123689.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4eacb38731971cff8cf5a14906c91d0deb6a1f6032ed8ba12379348f9a9e27ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4eacb38731971cff8cf5a14906c91d0deb6a1f6032ed8ba12379348f9a9e27ea.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2437455.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2437455.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7813382.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v7813382.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7123689.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
b5548244.exedescription pid process target process PID 652 set thread context of 804 652 b5548244.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3464 652 WerFault.exe b5548244.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
a5678314.exeAppLaunch.exec5705630.exepid process 4940 a5678314.exe 4940 a5678314.exe 804 AppLaunch.exe 804 AppLaunch.exe 1580 c5705630.exe 1580 c5705630.exe 1580 c5705630.exe 1580 c5705630.exe 1580 c5705630.exe 1580 c5705630.exe 1580 c5705630.exe 1580 c5705630.exe 1580 c5705630.exe 1580 c5705630.exe 1580 c5705630.exe 1580 c5705630.exe 1580 c5705630.exe 1580 c5705630.exe 1580 c5705630.exe 1580 c5705630.exe 1580 c5705630.exe 1580 c5705630.exe 1580 c5705630.exe 1580 c5705630.exe 1580 c5705630.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
a5678314.exeAppLaunch.exec5705630.exedescription pid process Token: SeDebugPrivilege 4940 a5678314.exe Token: SeDebugPrivilege 804 AppLaunch.exe Token: SeDebugPrivilege 1580 c5705630.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
4eacb38731971cff8cf5a14906c91d0deb6a1f6032ed8ba12379348f9a9e27ea.exev2437455.exev7813382.exev7123689.exeb5548244.exedescription pid process target process PID 2224 wrote to memory of 740 2224 4eacb38731971cff8cf5a14906c91d0deb6a1f6032ed8ba12379348f9a9e27ea.exe v2437455.exe PID 2224 wrote to memory of 740 2224 4eacb38731971cff8cf5a14906c91d0deb6a1f6032ed8ba12379348f9a9e27ea.exe v2437455.exe PID 2224 wrote to memory of 740 2224 4eacb38731971cff8cf5a14906c91d0deb6a1f6032ed8ba12379348f9a9e27ea.exe v2437455.exe PID 740 wrote to memory of 2192 740 v2437455.exe v7813382.exe PID 740 wrote to memory of 2192 740 v2437455.exe v7813382.exe PID 740 wrote to memory of 2192 740 v2437455.exe v7813382.exe PID 2192 wrote to memory of 456 2192 v7813382.exe v7123689.exe PID 2192 wrote to memory of 456 2192 v7813382.exe v7123689.exe PID 2192 wrote to memory of 456 2192 v7813382.exe v7123689.exe PID 456 wrote to memory of 4940 456 v7123689.exe a5678314.exe PID 456 wrote to memory of 4940 456 v7123689.exe a5678314.exe PID 456 wrote to memory of 652 456 v7123689.exe b5548244.exe PID 456 wrote to memory of 652 456 v7123689.exe b5548244.exe PID 456 wrote to memory of 652 456 v7123689.exe b5548244.exe PID 652 wrote to memory of 804 652 b5548244.exe AppLaunch.exe PID 652 wrote to memory of 804 652 b5548244.exe AppLaunch.exe PID 652 wrote to memory of 804 652 b5548244.exe AppLaunch.exe PID 652 wrote to memory of 804 652 b5548244.exe AppLaunch.exe PID 652 wrote to memory of 804 652 b5548244.exe AppLaunch.exe PID 2192 wrote to memory of 1580 2192 v7813382.exe c5705630.exe PID 2192 wrote to memory of 1580 2192 v7813382.exe c5705630.exe PID 2192 wrote to memory of 1580 2192 v7813382.exe c5705630.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4eacb38731971cff8cf5a14906c91d0deb6a1f6032ed8ba12379348f9a9e27ea.exe"C:\Users\Admin\AppData\Local\Temp\4eacb38731971cff8cf5a14906c91d0deb6a1f6032ed8ba12379348f9a9e27ea.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2437455.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2437455.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7813382.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7813382.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7123689.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7123689.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5678314.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5678314.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5548244.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5548244.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 5606⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c5705630.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c5705630.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 652 -ip 6521⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2437455.exeFilesize
531KB
MD5be6b61d9758332336685eb52122cc4f7
SHA1ae43260ed69157f9082259af3a3628b73c55e615
SHA2562401a3b5d3a94d617fa4392b5749b730c323988be2e0d81d58b6d9efdb1963b1
SHA5125ba0ae382c06c9caa15815d56c6b196d1102c64ba9a26f7c409e8a441b4c558a81bf3883461a17005c7ea3bd54e795442a07f48789e8b0269456fe81aa6b9e89
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2437455.exeFilesize
531KB
MD5be6b61d9758332336685eb52122cc4f7
SHA1ae43260ed69157f9082259af3a3628b73c55e615
SHA2562401a3b5d3a94d617fa4392b5749b730c323988be2e0d81d58b6d9efdb1963b1
SHA5125ba0ae382c06c9caa15815d56c6b196d1102c64ba9a26f7c409e8a441b4c558a81bf3883461a17005c7ea3bd54e795442a07f48789e8b0269456fe81aa6b9e89
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7813382.exeFilesize
358KB
MD515f4bdf8537cec19607fcd1effabf172
SHA1549b770d5cc534a57160cde8016dd996b4c12e15
SHA256624c1ff6bf671cfb450f40ceed50e79c6770b49dc897bc51c751c22b3333b4f2
SHA5128e17be931e8267e3c1eb606d592877853cc78a1085b4b27d7d38515cdd1227605caa89afe0dda89e6a7cfc89f4c808619abdef5602be3fd82882d38e263cb187
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7813382.exeFilesize
358KB
MD515f4bdf8537cec19607fcd1effabf172
SHA1549b770d5cc534a57160cde8016dd996b4c12e15
SHA256624c1ff6bf671cfb450f40ceed50e79c6770b49dc897bc51c751c22b3333b4f2
SHA5128e17be931e8267e3c1eb606d592877853cc78a1085b4b27d7d38515cdd1227605caa89afe0dda89e6a7cfc89f4c808619abdef5602be3fd82882d38e263cb187
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c5705630.exeFilesize
172KB
MD539c58bc1deb5fbb6892f8702ec4fe16f
SHA12f28962a5d7a189c92d135b485d3c5d69c49539f
SHA2565d88a4c9c964a437c31e9ed9d51c3ab8a5583693df5d61434ef8454f4da8fc26
SHA5124516b7f6c896778ccea2913329c98545004c3e4d083f5f1d14c6beef0f2ed65270112de53c1e2771b06d86faf6311656e910e25b8cb5a4ea5362f39e2628e0a8
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c5705630.exeFilesize
172KB
MD539c58bc1deb5fbb6892f8702ec4fe16f
SHA12f28962a5d7a189c92d135b485d3c5d69c49539f
SHA2565d88a4c9c964a437c31e9ed9d51c3ab8a5583693df5d61434ef8454f4da8fc26
SHA5124516b7f6c896778ccea2913329c98545004c3e4d083f5f1d14c6beef0f2ed65270112de53c1e2771b06d86faf6311656e910e25b8cb5a4ea5362f39e2628e0a8
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7123689.exeFilesize
203KB
MD5d1a5e6cb69629fd286da088c2ba7eb50
SHA14115d389716204e44ae2b73f94362a49885fee76
SHA256be2c464a87a6ad986a1828facdf6bdcf62db7d9b6b2d23c968ed8559a42aa649
SHA512a4b31cf1e842255604afb7574f2e35d20789277fe8f2192696a66c3871321278e5037dc2d2728e1f5be3ba5ff90d0605670685409f8e119a80a3d9d462516580
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7123689.exeFilesize
203KB
MD5d1a5e6cb69629fd286da088c2ba7eb50
SHA14115d389716204e44ae2b73f94362a49885fee76
SHA256be2c464a87a6ad986a1828facdf6bdcf62db7d9b6b2d23c968ed8559a42aa649
SHA512a4b31cf1e842255604afb7574f2e35d20789277fe8f2192696a66c3871321278e5037dc2d2728e1f5be3ba5ff90d0605670685409f8e119a80a3d9d462516580
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5678314.exeFilesize
13KB
MD5edbd5cce4624a9057086827bd2841bb3
SHA12df02a47978b2cbe0513c7600b0196431d558391
SHA256c05e650dd9132511f0091389122637fa42fa0a926e8e6b9547afcda1e6d1de89
SHA512f8792820849706ffd355222406fefc8bc30808a94915933fceb5f6a93b88cd76e08721357cd1205f8dc0560b5375378f42805f7f6b4dcfa8cb7308ff4a5ee48c
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5678314.exeFilesize
13KB
MD5edbd5cce4624a9057086827bd2841bb3
SHA12df02a47978b2cbe0513c7600b0196431d558391
SHA256c05e650dd9132511f0091389122637fa42fa0a926e8e6b9547afcda1e6d1de89
SHA512f8792820849706ffd355222406fefc8bc30808a94915933fceb5f6a93b88cd76e08721357cd1205f8dc0560b5375378f42805f7f6b4dcfa8cb7308ff4a5ee48c
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5548244.exeFilesize
120KB
MD53a44950b1269b12608d64336555e034a
SHA112cfc264a81aeed0acc14067f5ef88a0ed7549cf
SHA2562ebc5b11005ed5c2827bcd325e1c448edb24f62c5e033437ed0c3c37621a6a34
SHA512574d681f015a9ed22162724d556eb41325629e1dbcd0b702400e676d8dc5829299664a659d6d2a920468630b2ae5eecf5e4de1e0b0536e53146da7435dc46d19
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5548244.exeFilesize
120KB
MD53a44950b1269b12608d64336555e034a
SHA112cfc264a81aeed0acc14067f5ef88a0ed7549cf
SHA2562ebc5b11005ed5c2827bcd325e1c448edb24f62c5e033437ed0c3c37621a6a34
SHA512574d681f015a9ed22162724d556eb41325629e1dbcd0b702400e676d8dc5829299664a659d6d2a920468630b2ae5eecf5e4de1e0b0536e53146da7435dc46d19
-
memory/804-167-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/1580-175-0x00000000001B0000-0x00000000001E0000-memory.dmpFilesize
192KB
-
memory/1580-181-0x000000000A2A0000-0x000000000A316000-memory.dmpFilesize
472KB
-
memory/1580-176-0x000000000A4A0000-0x000000000AAB8000-memory.dmpFilesize
6.1MB
-
memory/1580-177-0x0000000009FF0000-0x000000000A0FA000-memory.dmpFilesize
1.0MB
-
memory/1580-178-0x0000000009F30000-0x0000000009F42000-memory.dmpFilesize
72KB
-
memory/1580-179-0x0000000009F90000-0x0000000009FCC000-memory.dmpFilesize
240KB
-
memory/1580-180-0x0000000004AF0000-0x0000000004B00000-memory.dmpFilesize
64KB
-
memory/1580-189-0x0000000004AF0000-0x0000000004B00000-memory.dmpFilesize
64KB
-
memory/1580-182-0x000000000AB60000-0x000000000ABF2000-memory.dmpFilesize
584KB
-
memory/1580-183-0x000000000B1B0000-0x000000000B754000-memory.dmpFilesize
5.6MB
-
memory/1580-184-0x000000000AC00000-0x000000000AC66000-memory.dmpFilesize
408KB
-
memory/1580-186-0x000000000B760000-0x000000000B922000-memory.dmpFilesize
1.8MB
-
memory/1580-187-0x000000000BE60000-0x000000000C38C000-memory.dmpFilesize
5.2MB
-
memory/1580-188-0x000000000B0C0000-0x000000000B110000-memory.dmpFilesize
320KB
-
memory/4940-161-0x0000000000130000-0x000000000013A000-memory.dmpFilesize
40KB