Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2023 18:59
Static task
static1
Behavioral task
behavioral1
Sample
fba9a3c5c886564016febbc57daedd45ddf797ec774d82b75c79b77cf3691c41.exe
Resource
win10v2004-20230220-en
General
-
Target
fba9a3c5c886564016febbc57daedd45ddf797ec774d82b75c79b77cf3691c41.exe
-
Size
738KB
-
MD5
0b4295c6a60852313ad38faad26bb12f
-
SHA1
60ba6ce2208dcee0e4fd823048a8c26f4365ea6b
-
SHA256
fba9a3c5c886564016febbc57daedd45ddf797ec774d82b75c79b77cf3691c41
-
SHA512
19119563e006bd2042d5f4628a0ce17c432edb11460c7fe7ff84a32477617dc1eecf873c15266effedb6654311b983bf35f146c3ec5d341e5d4ad1900a775f88
-
SSDEEP
12288:8Mray90zkNRjkE/nrWww7//3TMkXPfuC8Z9znUSrDJoI0nqVoAnp+N:myzrjkE/nre/jLngZl03nqVbngN
Malware Config
Extracted
redline
maxi
83.97.73.126:19048
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
a8696690.exeAppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8696690.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8696690.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a8696690.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8696690.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8696690.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8696690.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
v2489390.exev4090729.exev9001365.exea8696690.exeb2879799.exec2095137.exepid process 1280 v2489390.exe 2340 v4090729.exe 4272 v9001365.exe 2632 a8696690.exe 4852 b2879799.exe 3940 c2095137.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
a8696690.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a8696690.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
fba9a3c5c886564016febbc57daedd45ddf797ec774d82b75c79b77cf3691c41.exev2489390.exev4090729.exev9001365.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fba9a3c5c886564016febbc57daedd45ddf797ec774d82b75c79b77cf3691c41.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2489390.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2489390.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4090729.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v4090729.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v9001365.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v9001365.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fba9a3c5c886564016febbc57daedd45ddf797ec774d82b75c79b77cf3691c41.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
b2879799.exedescription pid process target process PID 4852 set thread context of 2108 4852 b2879799.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3576 4852 WerFault.exe b2879799.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
a8696690.exeAppLaunch.exec2095137.exepid process 2632 a8696690.exe 2632 a8696690.exe 2108 AppLaunch.exe 2108 AppLaunch.exe 3940 c2095137.exe 3940 c2095137.exe 3940 c2095137.exe 3940 c2095137.exe 3940 c2095137.exe 3940 c2095137.exe 3940 c2095137.exe 3940 c2095137.exe 3940 c2095137.exe 3940 c2095137.exe 3940 c2095137.exe 3940 c2095137.exe 3940 c2095137.exe 3940 c2095137.exe 3940 c2095137.exe 3940 c2095137.exe 3940 c2095137.exe 3940 c2095137.exe 3940 c2095137.exe 3940 c2095137.exe 3940 c2095137.exe 3940 c2095137.exe 3940 c2095137.exe 3940 c2095137.exe 3940 c2095137.exe 3940 c2095137.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
a8696690.exeAppLaunch.exec2095137.exedescription pid process Token: SeDebugPrivilege 2632 a8696690.exe Token: SeDebugPrivilege 2108 AppLaunch.exe Token: SeDebugPrivilege 3940 c2095137.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
fba9a3c5c886564016febbc57daedd45ddf797ec774d82b75c79b77cf3691c41.exev2489390.exev4090729.exev9001365.exeb2879799.exedescription pid process target process PID 2992 wrote to memory of 1280 2992 fba9a3c5c886564016febbc57daedd45ddf797ec774d82b75c79b77cf3691c41.exe v2489390.exe PID 2992 wrote to memory of 1280 2992 fba9a3c5c886564016febbc57daedd45ddf797ec774d82b75c79b77cf3691c41.exe v2489390.exe PID 2992 wrote to memory of 1280 2992 fba9a3c5c886564016febbc57daedd45ddf797ec774d82b75c79b77cf3691c41.exe v2489390.exe PID 1280 wrote to memory of 2340 1280 v2489390.exe v4090729.exe PID 1280 wrote to memory of 2340 1280 v2489390.exe v4090729.exe PID 1280 wrote to memory of 2340 1280 v2489390.exe v4090729.exe PID 2340 wrote to memory of 4272 2340 v4090729.exe v9001365.exe PID 2340 wrote to memory of 4272 2340 v4090729.exe v9001365.exe PID 2340 wrote to memory of 4272 2340 v4090729.exe v9001365.exe PID 4272 wrote to memory of 2632 4272 v9001365.exe a8696690.exe PID 4272 wrote to memory of 2632 4272 v9001365.exe a8696690.exe PID 4272 wrote to memory of 4852 4272 v9001365.exe b2879799.exe PID 4272 wrote to memory of 4852 4272 v9001365.exe b2879799.exe PID 4272 wrote to memory of 4852 4272 v9001365.exe b2879799.exe PID 4852 wrote to memory of 2108 4852 b2879799.exe AppLaunch.exe PID 4852 wrote to memory of 2108 4852 b2879799.exe AppLaunch.exe PID 4852 wrote to memory of 2108 4852 b2879799.exe AppLaunch.exe PID 4852 wrote to memory of 2108 4852 b2879799.exe AppLaunch.exe PID 4852 wrote to memory of 2108 4852 b2879799.exe AppLaunch.exe PID 2340 wrote to memory of 3940 2340 v4090729.exe c2095137.exe PID 2340 wrote to memory of 3940 2340 v4090729.exe c2095137.exe PID 2340 wrote to memory of 3940 2340 v4090729.exe c2095137.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fba9a3c5c886564016febbc57daedd45ddf797ec774d82b75c79b77cf3691c41.exe"C:\Users\Admin\AppData\Local\Temp\fba9a3c5c886564016febbc57daedd45ddf797ec774d82b75c79b77cf3691c41.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2489390.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2489390.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4090729.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4090729.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9001365.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9001365.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8696690.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a8696690.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2879799.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b2879799.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4852 -s 1406⤵
- Program crash
PID:3576
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2095137.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c2095137.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3940
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4852 -ip 48521⤵PID:3396
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
532KB
MD5031bff5fe0057e206d27c24d9ecbc448
SHA14af47be4645b470b37b9f8466dccdfa034b9205a
SHA256954674406e2747c3f3ce42cd834be88211327229bbbad84d8acfe8d511bac0e0
SHA512835645266ec124fc47154e0eb0bdf45d314d2ba84ca8ff4ffd648b01f5dcb5b2ed1b868e9546994dd18e333aa05ba01e21f0392b2239f0067e46e9aca7bde628
-
Filesize
532KB
MD5031bff5fe0057e206d27c24d9ecbc448
SHA14af47be4645b470b37b9f8466dccdfa034b9205a
SHA256954674406e2747c3f3ce42cd834be88211327229bbbad84d8acfe8d511bac0e0
SHA512835645266ec124fc47154e0eb0bdf45d314d2ba84ca8ff4ffd648b01f5dcb5b2ed1b868e9546994dd18e333aa05ba01e21f0392b2239f0067e46e9aca7bde628
-
Filesize
359KB
MD5b78643ea6d8c30af502e6c82879ad48f
SHA1f9d61ac2bf9276aabc8132f517fd5ee3d8c0e0df
SHA256b410143c70c424eb3005face1ad76a40a7086fe07c4101a5fa9c58ddc4406648
SHA5124ec98d819caf4023ab92bb531c090de04c41205efa17d7ff8563cb507edfc59129fa0e9706bc66a24ff0c54f1c81fca2ba26c2defe70ff2ab0337dae28db7e46
-
Filesize
359KB
MD5b78643ea6d8c30af502e6c82879ad48f
SHA1f9d61ac2bf9276aabc8132f517fd5ee3d8c0e0df
SHA256b410143c70c424eb3005face1ad76a40a7086fe07c4101a5fa9c58ddc4406648
SHA5124ec98d819caf4023ab92bb531c090de04c41205efa17d7ff8563cb507edfc59129fa0e9706bc66a24ff0c54f1c81fca2ba26c2defe70ff2ab0337dae28db7e46
-
Filesize
172KB
MD50b2922957b15529e24c091901245aac6
SHA134f3a91a9251f0cf409b8bcc57b61c87c38bd17a
SHA256976331d4e331ec7cc4eb932409147330d92bdb1b48298ca6c28c957cd6843b99
SHA512ce06ca5236ddc55bac4aa050bc897ab69dcd05507c7840267516a8f3763f9691578977652f765d1bb486dd613f809c8977194c5a7093edded1ccff5142c2fd32
-
Filesize
172KB
MD50b2922957b15529e24c091901245aac6
SHA134f3a91a9251f0cf409b8bcc57b61c87c38bd17a
SHA256976331d4e331ec7cc4eb932409147330d92bdb1b48298ca6c28c957cd6843b99
SHA512ce06ca5236ddc55bac4aa050bc897ab69dcd05507c7840267516a8f3763f9691578977652f765d1bb486dd613f809c8977194c5a7093edded1ccff5142c2fd32
-
Filesize
204KB
MD5ddb261296b08b3797927463c770f6b8b
SHA1ae0402450e3c32b6c33e9f049b07ef36c08ebce3
SHA2560bbab5a3da86e2d28f2b02459134a12910b70090db49219da792ae47c3bf1259
SHA51201b129ea9ec77993f0163b35ba2578a26329eb7210393295bc61f25848383bd49acbfabc11ac21706be0ab7ad0c45f7c18a08cd49129c614661e144b80b6b7f3
-
Filesize
204KB
MD5ddb261296b08b3797927463c770f6b8b
SHA1ae0402450e3c32b6c33e9f049b07ef36c08ebce3
SHA2560bbab5a3da86e2d28f2b02459134a12910b70090db49219da792ae47c3bf1259
SHA51201b129ea9ec77993f0163b35ba2578a26329eb7210393295bc61f25848383bd49acbfabc11ac21706be0ab7ad0c45f7c18a08cd49129c614661e144b80b6b7f3
-
Filesize
14KB
MD5665b7d5fe556c70f89671cf10183cf81
SHA1b7d5bed292a861af8f4ccf36d4f8f469262c94fd
SHA256c02aad5d7b917eef310db5d8218e8f208a94183ab1af1064ecf826d7e1c5e597
SHA51283b7de1e638badf120f442c57e118a1123b0d75ff3a1b23f1fd12e2694a0cffc74a3e36b22f1ee691bc7cfdab06bbe24e8f8e7a7832dc765af0b6a7a25ceae4d
-
Filesize
14KB
MD5665b7d5fe556c70f89671cf10183cf81
SHA1b7d5bed292a861af8f4ccf36d4f8f469262c94fd
SHA256c02aad5d7b917eef310db5d8218e8f208a94183ab1af1064ecf826d7e1c5e597
SHA51283b7de1e638badf120f442c57e118a1123b0d75ff3a1b23f1fd12e2694a0cffc74a3e36b22f1ee691bc7cfdab06bbe24e8f8e7a7832dc765af0b6a7a25ceae4d
-
Filesize
120KB
MD5863d87f6410d24ad2e81717dcc32d818
SHA1aaa73aa0293386b077f945971aa4f758101da0ad
SHA2569bee28299287ff4e12f51ebaf88c0f00fc5c59e02628704c65b31a2e36479725
SHA512f750513c18bee6c53a56119661df950108c6794afe4c23b36e240429f7d8cdc5e97f95de0e04fc5daa63ab81b02d3e8f50c5711d32d28f98e9c53e25c7be6acf
-
Filesize
120KB
MD5863d87f6410d24ad2e81717dcc32d818
SHA1aaa73aa0293386b077f945971aa4f758101da0ad
SHA2569bee28299287ff4e12f51ebaf88c0f00fc5c59e02628704c65b31a2e36479725
SHA512f750513c18bee6c53a56119661df950108c6794afe4c23b36e240429f7d8cdc5e97f95de0e04fc5daa63ab81b02d3e8f50c5711d32d28f98e9c53e25c7be6acf