Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2023 16:02
Static task
static1
Behavioral task
behavioral1
Sample
1a89db3d647f3d8cc40c699720597e7a0ab28181508cc895e6890b4738512d27.exe
Resource
win10v2004-20230220-en
General
-
Target
1a89db3d647f3d8cc40c699720597e7a0ab28181508cc895e6890b4738512d27.exe
-
Size
738KB
-
MD5
43cec344ceb337c221f534adcdaa2a65
-
SHA1
93e14be40a09c497e870d4b2bcb220faa608596b
-
SHA256
1a89db3d647f3d8cc40c699720597e7a0ab28181508cc895e6890b4738512d27
-
SHA512
6d84bf7e2e137337ee08f1ef6f54017e60949bcec3246669107b6f8d7e1da4dc4a1de58c97c42d719da18da2df6caca6b41a737c36a069fb14984b1d1f76d81d
-
SSDEEP
12288:SMrJy900wjsw+7c92icSzBaoykt5MNzNkDRyOy41yUxzqIVW90Od9tMSUbkLP+4t:XyHwjsFI4fKBaoya5SzNcAENqIV+9sbk
Malware Config
Extracted
redline
maxi
83.97.73.126:19048
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
AppLaunch.exea1902467.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a1902467.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a1902467.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a1902467.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a1902467.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a1902467.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a1902467.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
v9513864.exev2294295.exev9697210.exea1902467.exeb9924498.exec3063589.exepid process 3412 v9513864.exe 4440 v2294295.exe 4468 v9697210.exe 2416 a1902467.exe 4020 b9924498.exe 2748 c3063589.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
a1902467.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a1902467.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
v9697210.exe1a89db3d647f3d8cc40c699720597e7a0ab28181508cc895e6890b4738512d27.exev9513864.exev2294295.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v9697210.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v9697210.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1a89db3d647f3d8cc40c699720597e7a0ab28181508cc895e6890b4738512d27.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1a89db3d647f3d8cc40c699720597e7a0ab28181508cc895e6890b4738512d27.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v9513864.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v9513864.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2294295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v2294295.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
b9924498.exedescription pid process target process PID 4020 set thread context of 112 4020 b9924498.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4084 4020 WerFault.exe b9924498.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
a1902467.exeAppLaunch.exec3063589.exepid process 2416 a1902467.exe 2416 a1902467.exe 112 AppLaunch.exe 112 AppLaunch.exe 2748 c3063589.exe 2748 c3063589.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
a1902467.exeAppLaunch.exec3063589.exedescription pid process Token: SeDebugPrivilege 2416 a1902467.exe Token: SeDebugPrivilege 112 AppLaunch.exe Token: SeDebugPrivilege 2748 c3063589.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
1a89db3d647f3d8cc40c699720597e7a0ab28181508cc895e6890b4738512d27.exev9513864.exev2294295.exev9697210.exeb9924498.exedescription pid process target process PID 1664 wrote to memory of 3412 1664 1a89db3d647f3d8cc40c699720597e7a0ab28181508cc895e6890b4738512d27.exe v9513864.exe PID 1664 wrote to memory of 3412 1664 1a89db3d647f3d8cc40c699720597e7a0ab28181508cc895e6890b4738512d27.exe v9513864.exe PID 1664 wrote to memory of 3412 1664 1a89db3d647f3d8cc40c699720597e7a0ab28181508cc895e6890b4738512d27.exe v9513864.exe PID 3412 wrote to memory of 4440 3412 v9513864.exe v2294295.exe PID 3412 wrote to memory of 4440 3412 v9513864.exe v2294295.exe PID 3412 wrote to memory of 4440 3412 v9513864.exe v2294295.exe PID 4440 wrote to memory of 4468 4440 v2294295.exe v9697210.exe PID 4440 wrote to memory of 4468 4440 v2294295.exe v9697210.exe PID 4440 wrote to memory of 4468 4440 v2294295.exe v9697210.exe PID 4468 wrote to memory of 2416 4468 v9697210.exe a1902467.exe PID 4468 wrote to memory of 2416 4468 v9697210.exe a1902467.exe PID 4468 wrote to memory of 4020 4468 v9697210.exe b9924498.exe PID 4468 wrote to memory of 4020 4468 v9697210.exe b9924498.exe PID 4468 wrote to memory of 4020 4468 v9697210.exe b9924498.exe PID 4020 wrote to memory of 112 4020 b9924498.exe AppLaunch.exe PID 4020 wrote to memory of 112 4020 b9924498.exe AppLaunch.exe PID 4020 wrote to memory of 112 4020 b9924498.exe AppLaunch.exe PID 4020 wrote to memory of 112 4020 b9924498.exe AppLaunch.exe PID 4020 wrote to memory of 112 4020 b9924498.exe AppLaunch.exe PID 4440 wrote to memory of 2748 4440 v2294295.exe c3063589.exe PID 4440 wrote to memory of 2748 4440 v2294295.exe c3063589.exe PID 4440 wrote to memory of 2748 4440 v2294295.exe c3063589.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a89db3d647f3d8cc40c699720597e7a0ab28181508cc895e6890b4738512d27.exe"C:\Users\Admin\AppData\Local\Temp\1a89db3d647f3d8cc40c699720597e7a0ab28181508cc895e6890b4738512d27.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9513864.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9513864.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2294295.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2294295.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9697210.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9697210.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1902467.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1902467.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b9924498.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b9924498.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4020 -s 5726⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c3063589.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c3063589.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4020 -ip 40201⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9513864.exeFilesize
531KB
MD52a3289f32c1886638d27028a95c15589
SHA12f0bddd84bd1a36b533fba122450ba928a774d34
SHA2562021efdfdc5af53d7399b0272b56dd20cd8fbf5e82599ff116708b51385ff55c
SHA512f6584e2a819e1848e0fc13eb0ddf7a99d418595588c1ac1469f81f22bf6ba02c4fddee24d5da58dfa81159b0c1a5d6e34b6cf79b900d780767609fca0ee789fd
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9513864.exeFilesize
531KB
MD52a3289f32c1886638d27028a95c15589
SHA12f0bddd84bd1a36b533fba122450ba928a774d34
SHA2562021efdfdc5af53d7399b0272b56dd20cd8fbf5e82599ff116708b51385ff55c
SHA512f6584e2a819e1848e0fc13eb0ddf7a99d418595588c1ac1469f81f22bf6ba02c4fddee24d5da58dfa81159b0c1a5d6e34b6cf79b900d780767609fca0ee789fd
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2294295.exeFilesize
359KB
MD526b68da47204e8c384d26d313c5d926f
SHA124f055595951e07fcdca57f680dde5b9689fe4be
SHA25621a710f2fef28c3a7152410a7a060589c4223583107fb8327d6ec8e6a4ac6d15
SHA512acb659d10a5310582bda383936c0a461c3a48de2639a485036b2e3003751e36771109c4f077bb87a4c25b34e2787cf267e5c9a05a74f5cd4cb8a084e094fb46e
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2294295.exeFilesize
359KB
MD526b68da47204e8c384d26d313c5d926f
SHA124f055595951e07fcdca57f680dde5b9689fe4be
SHA25621a710f2fef28c3a7152410a7a060589c4223583107fb8327d6ec8e6a4ac6d15
SHA512acb659d10a5310582bda383936c0a461c3a48de2639a485036b2e3003751e36771109c4f077bb87a4c25b34e2787cf267e5c9a05a74f5cd4cb8a084e094fb46e
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c3063589.exeFilesize
172KB
MD53af058bc13a2a578e5e236944f469b96
SHA143662ff8638a02354f767f5a3675afbcc4ff38ff
SHA2560df8910f0dfe57c644c302cc9a8ccea096cc9a35a86f488b487f718c44fcd31b
SHA5120d647f8d0ef61c6e553afe318ff73ea5deab519989c21942af69f705b53aee1ef8598a402fc836755851d0c6ec4aca334869c904cf88388f887a385202c3d9bd
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c3063589.exeFilesize
172KB
MD53af058bc13a2a578e5e236944f469b96
SHA143662ff8638a02354f767f5a3675afbcc4ff38ff
SHA2560df8910f0dfe57c644c302cc9a8ccea096cc9a35a86f488b487f718c44fcd31b
SHA5120d647f8d0ef61c6e553afe318ff73ea5deab519989c21942af69f705b53aee1ef8598a402fc836755851d0c6ec4aca334869c904cf88388f887a385202c3d9bd
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9697210.exeFilesize
204KB
MD59f1350226cbb7eda7394a0cb46918dc0
SHA1e94c63548f93e0a5ce1e8584e5d285f85c6e7e6e
SHA256f56c5d85aee141dd43d4e430cde060873e536c20bad4c2ec5573b990d10f9b47
SHA51240a0f2f402e7a71183420dae85d4b7b60e18a362642088d3fc45549aa68315f06b2246087968c3d8975059fc687b1def3acd5eefa940fe1abaf7f79d891e8b32
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9697210.exeFilesize
204KB
MD59f1350226cbb7eda7394a0cb46918dc0
SHA1e94c63548f93e0a5ce1e8584e5d285f85c6e7e6e
SHA256f56c5d85aee141dd43d4e430cde060873e536c20bad4c2ec5573b990d10f9b47
SHA51240a0f2f402e7a71183420dae85d4b7b60e18a362642088d3fc45549aa68315f06b2246087968c3d8975059fc687b1def3acd5eefa940fe1abaf7f79d891e8b32
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1902467.exeFilesize
14KB
MD510da334ea7457b04caef133e8860d90a
SHA17998abe433c3ad9c5c0fcd77338b292a1f54e321
SHA2560adb47a65e3eb987bc550e60401b9e7a9eb3c5281e98df895310aaf3a0524d50
SHA512073a648a800ab0a0884ecf0f34e00ac0a887c08e69b207d3bc929469b8f11326eb1be30c8a7687f1ec7ca2a8019d49602b72955328076be98c7bf2c4187ca009
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1902467.exeFilesize
14KB
MD510da334ea7457b04caef133e8860d90a
SHA17998abe433c3ad9c5c0fcd77338b292a1f54e321
SHA2560adb47a65e3eb987bc550e60401b9e7a9eb3c5281e98df895310aaf3a0524d50
SHA512073a648a800ab0a0884ecf0f34e00ac0a887c08e69b207d3bc929469b8f11326eb1be30c8a7687f1ec7ca2a8019d49602b72955328076be98c7bf2c4187ca009
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b9924498.exeFilesize
120KB
MD5acf0f703fb314746fd06e71ca8af4f02
SHA1fdd4bc36be023bce620c1d4ce4c5fd0d243f145e
SHA25645abf307899f45adea895a44ed2be8eded2ee7b705ad36858bee5b16ed23c65d
SHA51212e288a7866c4b407c9efa00a65787b3e9977aa59dc80ab276b1539cc6baadef3f60225d9bfd363e2520d6c55b2f4521238056040d2480f107a9d68e6878155d
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b9924498.exeFilesize
120KB
MD5acf0f703fb314746fd06e71ca8af4f02
SHA1fdd4bc36be023bce620c1d4ce4c5fd0d243f145e
SHA25645abf307899f45adea895a44ed2be8eded2ee7b705ad36858bee5b16ed23c65d
SHA51212e288a7866c4b407c9efa00a65787b3e9977aa59dc80ab276b1539cc6baadef3f60225d9bfd363e2520d6c55b2f4521238056040d2480f107a9d68e6878155d
-
memory/112-167-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/2416-161-0x0000000000130000-0x000000000013A000-memory.dmpFilesize
40KB
-
memory/2748-175-0x0000000000FE0000-0x0000000001010000-memory.dmpFilesize
192KB
-
memory/2748-176-0x000000000B2E0000-0x000000000B8F8000-memory.dmpFilesize
6.1MB
-
memory/2748-177-0x000000000AE20000-0x000000000AF2A000-memory.dmpFilesize
1.0MB
-
memory/2748-178-0x000000000AD60000-0x000000000AD72000-memory.dmpFilesize
72KB
-
memory/2748-179-0x000000000ADC0000-0x000000000ADFC000-memory.dmpFilesize
240KB
-
memory/2748-180-0x0000000005830000-0x0000000005840000-memory.dmpFilesize
64KB
-
memory/2748-182-0x0000000005830000-0x0000000005840000-memory.dmpFilesize
64KB
-
memory/2748-183-0x0000000002F60000-0x0000000002FD6000-memory.dmpFilesize
472KB
-
memory/2748-184-0x000000000B240000-0x000000000B2D2000-memory.dmpFilesize
584KB
-
memory/2748-185-0x000000000C0B0000-0x000000000C654000-memory.dmpFilesize
5.6MB
-
memory/2748-186-0x000000000BB00000-0x000000000BB66000-memory.dmpFilesize
408KB
-
memory/2748-187-0x000000000BEF0000-0x000000000BF40000-memory.dmpFilesize
320KB
-
memory/2748-188-0x000000000C830000-0x000000000C9F2000-memory.dmpFilesize
1.8MB
-
memory/2748-189-0x000000000CF30000-0x000000000D45C000-memory.dmpFilesize
5.2MB