Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2023 17:01
Static task
static1
Behavioral task
behavioral1
Sample
1948d73d252613238ba6edbe05d7c9d736bb78147eeb2de170231f72066211ba.exe
Resource
win10v2004-20230221-en
General
-
Target
1948d73d252613238ba6edbe05d7c9d736bb78147eeb2de170231f72066211ba.exe
-
Size
739KB
-
MD5
08c34d7a3b8710a6500616800143a4bb
-
SHA1
73cc95e35ff5aa5dbecc876dd3e99126ecff3b54
-
SHA256
1948d73d252613238ba6edbe05d7c9d736bb78147eeb2de170231f72066211ba
-
SHA512
f21f2d6e45092070c9505658ee1a12305354628ab09ce39767fab7ebdcad0a30d47aaa8bf27ca1af438a34286d4391e6bec3eb57248a904fdfd3b7703b32b0b6
-
SSDEEP
12288:UMrWy900swcruRTW35f2nBFTmZPCu4evxOoMVxXYBoVG8Yb6HZjlH:yytswcraTot2BFTmZ/OhIBofYmjlH
Malware Config
Extracted
redline
maxi
83.97.73.126:19048
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
a8997518.exeAppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8997518.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8997518.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8997518.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a8997518.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8997518.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8997518.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
v7233150.exev2582090.exev7693349.exea8997518.exeb5843083.exec6979883.exepid process 4940 v7233150.exe 4452 v2582090.exe 4668 v7693349.exe 4380 a8997518.exe 4916 b5843083.exe 4152 c6979883.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
a8997518.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a8997518.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
v7693349.exe1948d73d252613238ba6edbe05d7c9d736bb78147eeb2de170231f72066211ba.exev7233150.exev2582090.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7693349.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v7693349.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1948d73d252613238ba6edbe05d7c9d736bb78147eeb2de170231f72066211ba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1948d73d252613238ba6edbe05d7c9d736bb78147eeb2de170231f72066211ba.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7233150.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7233150.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2582090.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v2582090.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
b5843083.exedescription pid process target process PID 4916 set thread context of 1292 4916 b5843083.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 216 4916 WerFault.exe b5843083.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
a8997518.exeAppLaunch.exec6979883.exepid process 4380 a8997518.exe 4380 a8997518.exe 1292 AppLaunch.exe 1292 AppLaunch.exe 4152 c6979883.exe 4152 c6979883.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
a8997518.exeAppLaunch.exec6979883.exedescription pid process Token: SeDebugPrivilege 4380 a8997518.exe Token: SeDebugPrivilege 1292 AppLaunch.exe Token: SeDebugPrivilege 4152 c6979883.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
1948d73d252613238ba6edbe05d7c9d736bb78147eeb2de170231f72066211ba.exev7233150.exev2582090.exev7693349.exeb5843083.exedescription pid process target process PID 4256 wrote to memory of 4940 4256 1948d73d252613238ba6edbe05d7c9d736bb78147eeb2de170231f72066211ba.exe v7233150.exe PID 4256 wrote to memory of 4940 4256 1948d73d252613238ba6edbe05d7c9d736bb78147eeb2de170231f72066211ba.exe v7233150.exe PID 4256 wrote to memory of 4940 4256 1948d73d252613238ba6edbe05d7c9d736bb78147eeb2de170231f72066211ba.exe v7233150.exe PID 4940 wrote to memory of 4452 4940 v7233150.exe v2582090.exe PID 4940 wrote to memory of 4452 4940 v7233150.exe v2582090.exe PID 4940 wrote to memory of 4452 4940 v7233150.exe v2582090.exe PID 4452 wrote to memory of 4668 4452 v2582090.exe v7693349.exe PID 4452 wrote to memory of 4668 4452 v2582090.exe v7693349.exe PID 4452 wrote to memory of 4668 4452 v2582090.exe v7693349.exe PID 4668 wrote to memory of 4380 4668 v7693349.exe a8997518.exe PID 4668 wrote to memory of 4380 4668 v7693349.exe a8997518.exe PID 4668 wrote to memory of 4916 4668 v7693349.exe b5843083.exe PID 4668 wrote to memory of 4916 4668 v7693349.exe b5843083.exe PID 4668 wrote to memory of 4916 4668 v7693349.exe b5843083.exe PID 4916 wrote to memory of 1292 4916 b5843083.exe AppLaunch.exe PID 4916 wrote to memory of 1292 4916 b5843083.exe AppLaunch.exe PID 4916 wrote to memory of 1292 4916 b5843083.exe AppLaunch.exe PID 4916 wrote to memory of 1292 4916 b5843083.exe AppLaunch.exe PID 4916 wrote to memory of 1292 4916 b5843083.exe AppLaunch.exe PID 4452 wrote to memory of 4152 4452 v2582090.exe c6979883.exe PID 4452 wrote to memory of 4152 4452 v2582090.exe c6979883.exe PID 4452 wrote to memory of 4152 4452 v2582090.exe c6979883.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1948d73d252613238ba6edbe05d7c9d736bb78147eeb2de170231f72066211ba.exe"C:\Users\Admin\AppData\Local\Temp\1948d73d252613238ba6edbe05d7c9d736bb78147eeb2de170231f72066211ba.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7233150.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7233150.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2582090.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2582090.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7693349.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7693349.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8997518.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8997518.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4380
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5843083.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b5843083.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 1526⤵
- Program crash
PID:216
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c6979883.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c6979883.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4152
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4916 -ip 49161⤵PID:872
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
532KB
MD511e13823fc06074e75928f8d91283b52
SHA185e3a82e9305cd4aab6101b4235e86581654e13a
SHA256acf4043ea2bd597cdafb4fae09f0d037180a817b1da0442724a03ccdb6970fc5
SHA512a9e05ca03ff38ab2d6ac5bd9520f9b0fba1e6478ac699be0ac7a76916d7b10f4fd613b31dccda1bd949134a8a6b9034e0c248542bfbd353a645a28dd9f972ba5
-
Filesize
532KB
MD511e13823fc06074e75928f8d91283b52
SHA185e3a82e9305cd4aab6101b4235e86581654e13a
SHA256acf4043ea2bd597cdafb4fae09f0d037180a817b1da0442724a03ccdb6970fc5
SHA512a9e05ca03ff38ab2d6ac5bd9520f9b0fba1e6478ac699be0ac7a76916d7b10f4fd613b31dccda1bd949134a8a6b9034e0c248542bfbd353a645a28dd9f972ba5
-
Filesize
359KB
MD55104b7df88965e1752439bae88700de9
SHA1d973e7406803918ce35791087d3dc67aa710cb24
SHA2565854bf15aa6f4f38aa5dc0d1f19d6e5a5b85915142cd151a6d7b5065f7be29a2
SHA5123843b777ac4e012f855f79b5fc193ccb857c4b3f329f1ce777c745fba557e2330f9a4aa60ed3a27cf4243838f3971d566689f2b0471012c7752cb8cf8be0f4e0
-
Filesize
359KB
MD55104b7df88965e1752439bae88700de9
SHA1d973e7406803918ce35791087d3dc67aa710cb24
SHA2565854bf15aa6f4f38aa5dc0d1f19d6e5a5b85915142cd151a6d7b5065f7be29a2
SHA5123843b777ac4e012f855f79b5fc193ccb857c4b3f329f1ce777c745fba557e2330f9a4aa60ed3a27cf4243838f3971d566689f2b0471012c7752cb8cf8be0f4e0
-
Filesize
172KB
MD57778923012f1551c3e39b87ad830bcaf
SHA17abd0ccf3df5ba1c1d2d76647bdc30be8e6d79dc
SHA2566f78874964d54a349627d0464ef474807a473e9cb1dbaf3996e1d790c5e453cf
SHA512f2227e997ae76f61794fdc80a886212106958f84a30b6765c9f339074d4f61526274750efc727362e75d39777999b753496ea562d7e20b1d6eded56b2ad9df42
-
Filesize
172KB
MD57778923012f1551c3e39b87ad830bcaf
SHA17abd0ccf3df5ba1c1d2d76647bdc30be8e6d79dc
SHA2566f78874964d54a349627d0464ef474807a473e9cb1dbaf3996e1d790c5e453cf
SHA512f2227e997ae76f61794fdc80a886212106958f84a30b6765c9f339074d4f61526274750efc727362e75d39777999b753496ea562d7e20b1d6eded56b2ad9df42
-
Filesize
204KB
MD5dfbb01e41b9acac899c0126e1dec679d
SHA1dec3fb9bd4317b8c602119f965df0abc57d722f0
SHA256ad40d3b54c37b775e7406c77f7baaf52f24e657f2fa9a6f41b62c6d7586374d7
SHA512842d90ffa4835e80a24e6dbfb2ba7495e6c73ae1a82d8a982667c4604bb7d974fc3b8cb1864f71e61661f1268d7dfffa1d04e04a69a2b5ab69fba5cc8e0ec086
-
Filesize
204KB
MD5dfbb01e41b9acac899c0126e1dec679d
SHA1dec3fb9bd4317b8c602119f965df0abc57d722f0
SHA256ad40d3b54c37b775e7406c77f7baaf52f24e657f2fa9a6f41b62c6d7586374d7
SHA512842d90ffa4835e80a24e6dbfb2ba7495e6c73ae1a82d8a982667c4604bb7d974fc3b8cb1864f71e61661f1268d7dfffa1d04e04a69a2b5ab69fba5cc8e0ec086
-
Filesize
14KB
MD56989ab83a290fe6f7b385ea7e46e91d1
SHA143b585e7dab88cc9e46035ab994e424fb3b70687
SHA2564b529bbfb552887229a650475ce70c0acbc37ddc8337b76a45b3e00d0e5f9cf8
SHA512d4e5fa4014be238b0fa98f3ec18447cb0a6d282a5144abe3b4842a654c69dee6f536aeeac5ade5e2b06f0b27cc91464642401a38fd30e40986a3db327a8bf20c
-
Filesize
14KB
MD56989ab83a290fe6f7b385ea7e46e91d1
SHA143b585e7dab88cc9e46035ab994e424fb3b70687
SHA2564b529bbfb552887229a650475ce70c0acbc37ddc8337b76a45b3e00d0e5f9cf8
SHA512d4e5fa4014be238b0fa98f3ec18447cb0a6d282a5144abe3b4842a654c69dee6f536aeeac5ade5e2b06f0b27cc91464642401a38fd30e40986a3db327a8bf20c
-
Filesize
120KB
MD5b7563c945c8cfaca2961fb48db3893aa
SHA1256d60ba63b0990decdf62318e4db9f3c763027b
SHA2563aef15cef84d62d6cdb0e2a6154ed75615261c490479344d7e4209683cc529f2
SHA512f4b82b2415efbc5568b37c7fb40b8094de9423d3bd6dc4086febb5c4845b42e472b8881f517a2b3c9d4e50c72d1e540d2d0f0f330150700fd1711a58770c486a
-
Filesize
120KB
MD5b7563c945c8cfaca2961fb48db3893aa
SHA1256d60ba63b0990decdf62318e4db9f3c763027b
SHA2563aef15cef84d62d6cdb0e2a6154ed75615261c490479344d7e4209683cc529f2
SHA512f4b82b2415efbc5568b37c7fb40b8094de9423d3bd6dc4086febb5c4845b42e472b8881f517a2b3c9d4e50c72d1e540d2d0f0f330150700fd1711a58770c486a