Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2023 13:31
Static task
static1
Behavioral task
behavioral1
Sample
2b4c0e5846698d9123d9e2372255f7ad26b4f7dcad10af96c8eceb2e20a3a1c1.exe
Resource
win10v2004-20230220-en
General
-
Target
2b4c0e5846698d9123d9e2372255f7ad26b4f7dcad10af96c8eceb2e20a3a1c1.exe
-
Size
739KB
-
MD5
0a534cb2cd92e1aec6a499ce81a96f69
-
SHA1
141b40bfb143e50635cbf27fb00c1497342ff864
-
SHA256
2b4c0e5846698d9123d9e2372255f7ad26b4f7dcad10af96c8eceb2e20a3a1c1
-
SHA512
d8b9a6fcd2d590517250b720d1905f482a4ed8534f39c2d07c540c9d9c3c1bba333ce7b710004aa404a06b2517f0fb8d335a35295fe91e90283ff4ef04a985cc
-
SSDEEP
12288:yMrqy9075/bfpVL+6R4sgSMCWHHjfNrzNWB000eVgwdzMQk2wIwswLa:0ykVxFhMCiHjf5z8+01OeMdmwO
Malware Config
Extracted
redline
maxi
83.97.73.126:19048
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
AppLaunch.exea4982016.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4982016.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4982016.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4982016.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a4982016.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4982016.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4982016.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
v0057416.exev3993417.exev3793545.exea4982016.exeb6280654.exec2830383.exepid process 1328 v0057416.exe 796 v3993417.exe 1836 v3793545.exe 3232 a4982016.exe 1872 b6280654.exe 3420 c2830383.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
a4982016.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a4982016.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
2b4c0e5846698d9123d9e2372255f7ad26b4f7dcad10af96c8eceb2e20a3a1c1.exev0057416.exev3993417.exev3793545.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2b4c0e5846698d9123d9e2372255f7ad26b4f7dcad10af96c8eceb2e20a3a1c1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2b4c0e5846698d9123d9e2372255f7ad26b4f7dcad10af96c8eceb2e20a3a1c1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0057416.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v0057416.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3993417.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v3993417.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3793545.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v3793545.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
b6280654.exedescription pid process target process PID 1872 set thread context of 3816 1872 b6280654.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4764 1872 WerFault.exe b6280654.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
a4982016.exeAppLaunch.exec2830383.exepid process 3232 a4982016.exe 3232 a4982016.exe 3816 AppLaunch.exe 3816 AppLaunch.exe 3420 c2830383.exe 3420 c2830383.exe 3420 c2830383.exe 3420 c2830383.exe 3420 c2830383.exe 3420 c2830383.exe 3420 c2830383.exe 3420 c2830383.exe 3420 c2830383.exe 3420 c2830383.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
a4982016.exeAppLaunch.exec2830383.exedescription pid process Token: SeDebugPrivilege 3232 a4982016.exe Token: SeDebugPrivilege 3816 AppLaunch.exe Token: SeDebugPrivilege 3420 c2830383.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
2b4c0e5846698d9123d9e2372255f7ad26b4f7dcad10af96c8eceb2e20a3a1c1.exev0057416.exev3993417.exev3793545.exeb6280654.exedescription pid process target process PID 1492 wrote to memory of 1328 1492 2b4c0e5846698d9123d9e2372255f7ad26b4f7dcad10af96c8eceb2e20a3a1c1.exe v0057416.exe PID 1492 wrote to memory of 1328 1492 2b4c0e5846698d9123d9e2372255f7ad26b4f7dcad10af96c8eceb2e20a3a1c1.exe v0057416.exe PID 1492 wrote to memory of 1328 1492 2b4c0e5846698d9123d9e2372255f7ad26b4f7dcad10af96c8eceb2e20a3a1c1.exe v0057416.exe PID 1328 wrote to memory of 796 1328 v0057416.exe v3993417.exe PID 1328 wrote to memory of 796 1328 v0057416.exe v3993417.exe PID 1328 wrote to memory of 796 1328 v0057416.exe v3993417.exe PID 796 wrote to memory of 1836 796 v3993417.exe v3793545.exe PID 796 wrote to memory of 1836 796 v3993417.exe v3793545.exe PID 796 wrote to memory of 1836 796 v3993417.exe v3793545.exe PID 1836 wrote to memory of 3232 1836 v3793545.exe a4982016.exe PID 1836 wrote to memory of 3232 1836 v3793545.exe a4982016.exe PID 1836 wrote to memory of 1872 1836 v3793545.exe b6280654.exe PID 1836 wrote to memory of 1872 1836 v3793545.exe b6280654.exe PID 1836 wrote to memory of 1872 1836 v3793545.exe b6280654.exe PID 1872 wrote to memory of 3816 1872 b6280654.exe AppLaunch.exe PID 1872 wrote to memory of 3816 1872 b6280654.exe AppLaunch.exe PID 1872 wrote to memory of 3816 1872 b6280654.exe AppLaunch.exe PID 1872 wrote to memory of 3816 1872 b6280654.exe AppLaunch.exe PID 1872 wrote to memory of 3816 1872 b6280654.exe AppLaunch.exe PID 796 wrote to memory of 3420 796 v3993417.exe c2830383.exe PID 796 wrote to memory of 3420 796 v3993417.exe c2830383.exe PID 796 wrote to memory of 3420 796 v3993417.exe c2830383.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b4c0e5846698d9123d9e2372255f7ad26b4f7dcad10af96c8eceb2e20a3a1c1.exe"C:\Users\Admin\AppData\Local\Temp\2b4c0e5846698d9123d9e2372255f7ad26b4f7dcad10af96c8eceb2e20a3a1c1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0057416.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0057416.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3993417.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3993417.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3793545.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3793545.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a4982016.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a4982016.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3232 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6280654.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6280654.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3816 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1872 -s 1406⤵
- Program crash
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2830383.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2830383.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1872 -ip 18721⤵PID:216
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0057416.exeFilesize
532KB
MD5560cfd601a5a6bc506080ae404a602f3
SHA122b21253a5a989886db1f8d4ca5d92dd85fa7e17
SHA256a9bcf46533974d473a4c19f51722f5e237074cfc3f51697ec9b2d637c1bc3aad
SHA512a52e07f66c28881a4c60a8229e571f7333d263e9038e85d7a8eeffbfd17dd3bd3f3756a6047de14437c2e5a44582ab492345a85b4ca9a3692c76c65bc0f17d06
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0057416.exeFilesize
532KB
MD5560cfd601a5a6bc506080ae404a602f3
SHA122b21253a5a989886db1f8d4ca5d92dd85fa7e17
SHA256a9bcf46533974d473a4c19f51722f5e237074cfc3f51697ec9b2d637c1bc3aad
SHA512a52e07f66c28881a4c60a8229e571f7333d263e9038e85d7a8eeffbfd17dd3bd3f3756a6047de14437c2e5a44582ab492345a85b4ca9a3692c76c65bc0f17d06
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3993417.exeFilesize
359KB
MD5261b349bda315f796ae924e4dbafce10
SHA19489e308a728cb0f13f7905b00b9b35c3ee0a6a4
SHA256a67de6982b10a753755a5ad2ceb714468006f6ed0d0cd5ad7c3168d2a3a9b556
SHA51267deacb93039db8f357a74f01a753379dba2a525cd717b30c0ef7bc46627c41f902e04936a77b1b19d8c31deb50c0129bc59ae7f2f85a8aa2617b3d0a001fce6
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3993417.exeFilesize
359KB
MD5261b349bda315f796ae924e4dbafce10
SHA19489e308a728cb0f13f7905b00b9b35c3ee0a6a4
SHA256a67de6982b10a753755a5ad2ceb714468006f6ed0d0cd5ad7c3168d2a3a9b556
SHA51267deacb93039db8f357a74f01a753379dba2a525cd717b30c0ef7bc46627c41f902e04936a77b1b19d8c31deb50c0129bc59ae7f2f85a8aa2617b3d0a001fce6
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2830383.exeFilesize
172KB
MD5ce6f544c8e9ef9052196ed735bcf48dd
SHA1bdc535f618e38866b81d8fcbff318d8f69a978be
SHA2569eb6bd9ae08152f8c69cebdb273adff1ea2cae59fd0d575013e0b483a935cd1b
SHA512d79f025e658462b35a6e4961d503b9acccff6b16c220df5f51fee50de398a3667497721625ef046f1aecd8a5d75323f165d4874e834408a12ca9fb4efee4bebb
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2830383.exeFilesize
172KB
MD5ce6f544c8e9ef9052196ed735bcf48dd
SHA1bdc535f618e38866b81d8fcbff318d8f69a978be
SHA2569eb6bd9ae08152f8c69cebdb273adff1ea2cae59fd0d575013e0b483a935cd1b
SHA512d79f025e658462b35a6e4961d503b9acccff6b16c220df5f51fee50de398a3667497721625ef046f1aecd8a5d75323f165d4874e834408a12ca9fb4efee4bebb
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3793545.exeFilesize
204KB
MD541ef8fdcbfc8408812afc32518a964ec
SHA185efcb7da7ebde71a09a6b62e592af0ec29d55bd
SHA2563ad90962f37e1fd3882ec6e5b751cc832987733dac54548ac4cdfaddc50b5a88
SHA5122911372edec85e15ce2c053f253268a71ea574207639e1954532066835f875a27dc852773fb4c77023ba39705fab4a00c943f6064f39893affa8b2f4d3ce6966
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3793545.exeFilesize
204KB
MD541ef8fdcbfc8408812afc32518a964ec
SHA185efcb7da7ebde71a09a6b62e592af0ec29d55bd
SHA2563ad90962f37e1fd3882ec6e5b751cc832987733dac54548ac4cdfaddc50b5a88
SHA5122911372edec85e15ce2c053f253268a71ea574207639e1954532066835f875a27dc852773fb4c77023ba39705fab4a00c943f6064f39893affa8b2f4d3ce6966
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a4982016.exeFilesize
13KB
MD564fef4cf6fc7cd982c1e3967385b6dc8
SHA130f307ad0ff6a2bf5c90743f09fb2b53705e9660
SHA256f7ce92d9f78ff144184570d99e5951f58f6f3b8bcab899f785cea40643e43243
SHA512b4875804448ce8d04f4b4138cf4228f25986f6e84bd0523706a4283def46be864ba07584019afbb7e52cb0b2dc997de0288f7062962c11a8515d12f1c1f0119c
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a4982016.exeFilesize
13KB
MD564fef4cf6fc7cd982c1e3967385b6dc8
SHA130f307ad0ff6a2bf5c90743f09fb2b53705e9660
SHA256f7ce92d9f78ff144184570d99e5951f58f6f3b8bcab899f785cea40643e43243
SHA512b4875804448ce8d04f4b4138cf4228f25986f6e84bd0523706a4283def46be864ba07584019afbb7e52cb0b2dc997de0288f7062962c11a8515d12f1c1f0119c
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6280654.exeFilesize
120KB
MD56016a2fcdd2f1573842a6eeee63bbc66
SHA121e57f9fc5981098ab7380fc0a10233138f38996
SHA2568ae6100ef275de8a5e65855f3d31affa515ed886b9b94bd15912eaabfe406443
SHA5120ea701e3c1a047b6d2c82b701c875bd9719b94e22ca7ca4d0b6b557255f0ab59ff7b60a8a496508f1ebf930abd3ee59d6960fc45e9fbd99cb48bb7c50eebd42e
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6280654.exeFilesize
120KB
MD56016a2fcdd2f1573842a6eeee63bbc66
SHA121e57f9fc5981098ab7380fc0a10233138f38996
SHA2568ae6100ef275de8a5e65855f3d31affa515ed886b9b94bd15912eaabfe406443
SHA5120ea701e3c1a047b6d2c82b701c875bd9719b94e22ca7ca4d0b6b557255f0ab59ff7b60a8a496508f1ebf930abd3ee59d6960fc45e9fbd99cb48bb7c50eebd42e
-
memory/3232-161-0x0000000000AB0000-0x0000000000ABA000-memory.dmpFilesize
40KB
-
memory/3420-175-0x0000000000FB0000-0x0000000000FE0000-memory.dmpFilesize
192KB
-
memory/3420-182-0x0000000005860000-0x0000000005870000-memory.dmpFilesize
64KB
-
memory/3420-176-0x0000000006090000-0x00000000066A8000-memory.dmpFilesize
6.1MB
-
memory/3420-177-0x0000000005B80000-0x0000000005C8A000-memory.dmpFilesize
1.0MB
-
memory/3420-178-0x0000000005840000-0x0000000005852000-memory.dmpFilesize
72KB
-
memory/3420-179-0x0000000005AB0000-0x0000000005AEC000-memory.dmpFilesize
240KB
-
memory/3420-180-0x0000000005860000-0x0000000005870000-memory.dmpFilesize
64KB
-
memory/3420-189-0x0000000006B30000-0x0000000006B80000-memory.dmpFilesize
320KB
-
memory/3420-183-0x0000000002FF0000-0x0000000003066000-memory.dmpFilesize
472KB
-
memory/3420-184-0x0000000005970000-0x0000000005A02000-memory.dmpFilesize
584KB
-
memory/3420-185-0x0000000007050000-0x00000000075F4000-memory.dmpFilesize
5.6MB
-
memory/3420-186-0x0000000003070000-0x00000000030D6000-memory.dmpFilesize
408KB
-
memory/3420-187-0x0000000006E70000-0x0000000007032000-memory.dmpFilesize
1.8MB
-
memory/3420-188-0x0000000009220000-0x000000000974C000-memory.dmpFilesize
5.2MB
-
memory/3816-167-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB