Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2023 20:17
Static task
static1
Behavioral task
behavioral1
Sample
2ec52981ea279df8f74de6852e781bfd87162704e9b85f32e181b3d739cd4a00.exe
Resource
win10v2004-20230220-en
General
-
Target
2ec52981ea279df8f74de6852e781bfd87162704e9b85f32e181b3d739cd4a00.exe
-
Size
723KB
-
MD5
2ba1eaa9c928f5f6ab47a56668ba1708
-
SHA1
afeaad60777b0b8c59a2fb2c5f7fbb400c1ab522
-
SHA256
2ec52981ea279df8f74de6852e781bfd87162704e9b85f32e181b3d739cd4a00
-
SHA512
358684c4fc2f5628c8e1b83afc768bc228ddcc80c214f9773c2a2b5a51f3ff9e278aee4d62a957b9e8cf3e96c31accf87bd763df24050095ecedff7bf1332fe4
-
SSDEEP
12288:9Mrvy904BLkdPw6++hQCAdZmZ3NQkm03IAvWnv35/ski7SXnSIstTjyXV97U6s:KyPBINXhQ5Zq3Gk14JR/sUXnSIst6/7s
Malware Config
Extracted
redline
maxi
83.97.73.126:19048
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
AppLaunch.exea7599656.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a7599656.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a7599656.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a7599656.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a7599656.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a7599656.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a7599656.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
v6950759.exev9171114.exev0682209.exea7599656.exeb8222994.exec1517470.exepid process 3544 v6950759.exe 632 v9171114.exe 2812 v0682209.exe 2472 a7599656.exe 1568 b8222994.exe 4408 c1517470.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
a7599656.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a7599656.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
v0682209.exe2ec52981ea279df8f74de6852e781bfd87162704e9b85f32e181b3d739cd4a00.exev6950759.exev9171114.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0682209.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v0682209.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2ec52981ea279df8f74de6852e781bfd87162704e9b85f32e181b3d739cd4a00.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2ec52981ea279df8f74de6852e781bfd87162704e9b85f32e181b3d739cd4a00.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6950759.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v6950759.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v9171114.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v9171114.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
b8222994.exedescription pid process target process PID 1568 set thread context of 4264 1568 b8222994.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3876 1568 WerFault.exe b8222994.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
a7599656.exeAppLaunch.exec1517470.exepid process 2472 a7599656.exe 2472 a7599656.exe 4264 AppLaunch.exe 4264 AppLaunch.exe 4408 c1517470.exe 4408 c1517470.exe 4408 c1517470.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
a7599656.exeAppLaunch.exec1517470.exedescription pid process Token: SeDebugPrivilege 2472 a7599656.exe Token: SeDebugPrivilege 4264 AppLaunch.exe Token: SeDebugPrivilege 4408 c1517470.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
2ec52981ea279df8f74de6852e781bfd87162704e9b85f32e181b3d739cd4a00.exev6950759.exev9171114.exev0682209.exeb8222994.exedescription pid process target process PID 3996 wrote to memory of 3544 3996 2ec52981ea279df8f74de6852e781bfd87162704e9b85f32e181b3d739cd4a00.exe v6950759.exe PID 3996 wrote to memory of 3544 3996 2ec52981ea279df8f74de6852e781bfd87162704e9b85f32e181b3d739cd4a00.exe v6950759.exe PID 3996 wrote to memory of 3544 3996 2ec52981ea279df8f74de6852e781bfd87162704e9b85f32e181b3d739cd4a00.exe v6950759.exe PID 3544 wrote to memory of 632 3544 v6950759.exe v9171114.exe PID 3544 wrote to memory of 632 3544 v6950759.exe v9171114.exe PID 3544 wrote to memory of 632 3544 v6950759.exe v9171114.exe PID 632 wrote to memory of 2812 632 v9171114.exe v0682209.exe PID 632 wrote to memory of 2812 632 v9171114.exe v0682209.exe PID 632 wrote to memory of 2812 632 v9171114.exe v0682209.exe PID 2812 wrote to memory of 2472 2812 v0682209.exe a7599656.exe PID 2812 wrote to memory of 2472 2812 v0682209.exe a7599656.exe PID 2812 wrote to memory of 1568 2812 v0682209.exe b8222994.exe PID 2812 wrote to memory of 1568 2812 v0682209.exe b8222994.exe PID 2812 wrote to memory of 1568 2812 v0682209.exe b8222994.exe PID 1568 wrote to memory of 4264 1568 b8222994.exe AppLaunch.exe PID 1568 wrote to memory of 4264 1568 b8222994.exe AppLaunch.exe PID 1568 wrote to memory of 4264 1568 b8222994.exe AppLaunch.exe PID 1568 wrote to memory of 4264 1568 b8222994.exe AppLaunch.exe PID 1568 wrote to memory of 4264 1568 b8222994.exe AppLaunch.exe PID 632 wrote to memory of 4408 632 v9171114.exe c1517470.exe PID 632 wrote to memory of 4408 632 v9171114.exe c1517470.exe PID 632 wrote to memory of 4408 632 v9171114.exe c1517470.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ec52981ea279df8f74de6852e781bfd87162704e9b85f32e181b3d739cd4a00.exe"C:\Users\Admin\AppData\Local\Temp\2ec52981ea279df8f74de6852e781bfd87162704e9b85f32e181b3d739cd4a00.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6950759.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6950759.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9171114.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9171114.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0682209.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0682209.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7599656.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7599656.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b8222994.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b8222994.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 1526⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1517470.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1517470.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1568 -ip 15681⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6950759.exeFilesize
523KB
MD5c0e98184a8d3e1062d3e73d4ba815b10
SHA1832a536aa3244d2b24ae5b33f48b47fff81a2773
SHA256a84a3cb00a7993f5c27024041a803651a0fa328ae7466d281cb44a667187c32b
SHA5123c1a7048ff12915f9ca49e5f7d49c4ba6e99392b69533a382c416657496068372ad27238def2a3501064f460534ea50b0dc8704687b227680646c63551a45dd4
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6950759.exeFilesize
523KB
MD5c0e98184a8d3e1062d3e73d4ba815b10
SHA1832a536aa3244d2b24ae5b33f48b47fff81a2773
SHA256a84a3cb00a7993f5c27024041a803651a0fa328ae7466d281cb44a667187c32b
SHA5123c1a7048ff12915f9ca49e5f7d49c4ba6e99392b69533a382c416657496068372ad27238def2a3501064f460534ea50b0dc8704687b227680646c63551a45dd4
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9171114.exeFilesize
351KB
MD5bc197adb664b2ebd6854c6b4e2bbd626
SHA1a9e9dd362ee5701b99b29b554193aaf4cc4667db
SHA2566014d5c4cb95a71cf485e2c9ec29a5c87e717b22ff4190e2a68a66da0589e002
SHA512841be71e8e70c8fb38c4a026e8ec947a16c0cf5f647babbad3a072bb411e9b1b5ee7b9ac816ad7008945c18e5db15709e26c51fd78ce7b3f13bd3f31d3fa985c
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9171114.exeFilesize
351KB
MD5bc197adb664b2ebd6854c6b4e2bbd626
SHA1a9e9dd362ee5701b99b29b554193aaf4cc4667db
SHA2566014d5c4cb95a71cf485e2c9ec29a5c87e717b22ff4190e2a68a66da0589e002
SHA512841be71e8e70c8fb38c4a026e8ec947a16c0cf5f647babbad3a072bb411e9b1b5ee7b9ac816ad7008945c18e5db15709e26c51fd78ce7b3f13bd3f31d3fa985c
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1517470.exeFilesize
172KB
MD5eea26240d0a13f46d66314f73b6b0abc
SHA17d3081ecb4e5e7da8176042a774d32e628965da7
SHA2562ef531066e1c626a02ab9f559c658ecb13195e4f625d37ea19a13c3ab503e593
SHA512b7633e136f07cd3e6c768ec7f01edc876078818f5e46fc7e7ca09f0c7a39f0e142abe2a85e68c9f5ac7d177cc195065a20ffc16d5c0c8694dbef5232bea7892d
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c1517470.exeFilesize
172KB
MD5eea26240d0a13f46d66314f73b6b0abc
SHA17d3081ecb4e5e7da8176042a774d32e628965da7
SHA2562ef531066e1c626a02ab9f559c658ecb13195e4f625d37ea19a13c3ab503e593
SHA512b7633e136f07cd3e6c768ec7f01edc876078818f5e46fc7e7ca09f0c7a39f0e142abe2a85e68c9f5ac7d177cc195065a20ffc16d5c0c8694dbef5232bea7892d
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0682209.exeFilesize
196KB
MD530771aa8fa6279f30e63689691c62662
SHA1974a8df756d2067c3e60957d9c6fa7d19229846d
SHA256b4d39cda25d2d5311801e59fea9f672eeef7b648ad106851120ade377604fdf9
SHA512935f305f23314bbb44a1077d17734e707ad284eb1c31a9f297f0a8f88eb9d37ba3ec0d51072726f829bcf6fb62a6ed546eb1680b1813e802f653441ea42ba13c
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v0682209.exeFilesize
196KB
MD530771aa8fa6279f30e63689691c62662
SHA1974a8df756d2067c3e60957d9c6fa7d19229846d
SHA256b4d39cda25d2d5311801e59fea9f672eeef7b648ad106851120ade377604fdf9
SHA512935f305f23314bbb44a1077d17734e707ad284eb1c31a9f297f0a8f88eb9d37ba3ec0d51072726f829bcf6fb62a6ed546eb1680b1813e802f653441ea42ba13c
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7599656.exeFilesize
14KB
MD5c1ec937db99e7a2a944e30243c834de3
SHA1ac5012c8d21c5dd2a9f5da1e119ccbe9cba2720e
SHA256f650df17af7301e103f64a2ab7503fa014065e1ba01ff43adf849428a3ab02f1
SHA512b1923072e808ffdef0195e835fa80865f2f510ce9ea3f8ef1a39fe1a3c868307fec35592abb444c7fda990d0c9961fa9a60154373db0a6a571999ab73061a278
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7599656.exeFilesize
14KB
MD5c1ec937db99e7a2a944e30243c834de3
SHA1ac5012c8d21c5dd2a9f5da1e119ccbe9cba2720e
SHA256f650df17af7301e103f64a2ab7503fa014065e1ba01ff43adf849428a3ab02f1
SHA512b1923072e808ffdef0195e835fa80865f2f510ce9ea3f8ef1a39fe1a3c868307fec35592abb444c7fda990d0c9961fa9a60154373db0a6a571999ab73061a278
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b8222994.exeFilesize
100KB
MD525ff6c3591dd552896002b4530d4eaa2
SHA19e9141db277d5a3780a7c73908d3a1e81aa1cf02
SHA256b406f8999a055e8154583f71dabafd09b3811e5f50ba93427aa1c59c63d26826
SHA5128c1125638ebbb4155261af1e368886ea4cbb4a65d6c291fefc5f84fff3c670e9c6684583c426b9d15b0dbc9403667800ec8c328dde574e31412433aca251bc75
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b8222994.exeFilesize
100KB
MD525ff6c3591dd552896002b4530d4eaa2
SHA19e9141db277d5a3780a7c73908d3a1e81aa1cf02
SHA256b406f8999a055e8154583f71dabafd09b3811e5f50ba93427aa1c59c63d26826
SHA5128c1125638ebbb4155261af1e368886ea4cbb4a65d6c291fefc5f84fff3c670e9c6684583c426b9d15b0dbc9403667800ec8c328dde574e31412433aca251bc75
-
memory/2472-161-0x0000000000870000-0x000000000087A000-memory.dmpFilesize
40KB
-
memory/4264-167-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/4408-175-0x0000000000A20000-0x0000000000A50000-memory.dmpFilesize
192KB
-
memory/4408-176-0x000000000AE90000-0x000000000B4A8000-memory.dmpFilesize
6.1MB
-
memory/4408-177-0x000000000A9A0000-0x000000000AAAA000-memory.dmpFilesize
1.0MB
-
memory/4408-178-0x000000000A8E0000-0x000000000A8F2000-memory.dmpFilesize
72KB
-
memory/4408-179-0x000000000A940000-0x000000000A97C000-memory.dmpFilesize
240KB
-
memory/4408-180-0x00000000053E0000-0x00000000053F0000-memory.dmpFilesize
64KB
-
memory/4408-181-0x000000000AC50000-0x000000000ACC6000-memory.dmpFilesize
472KB
-
memory/4408-182-0x000000000AD70000-0x000000000AE02000-memory.dmpFilesize
584KB
-
memory/4408-183-0x000000000BA60000-0x000000000C004000-memory.dmpFilesize
5.6MB
-
memory/4408-184-0x000000000AE10000-0x000000000AE76000-memory.dmpFilesize
408KB
-
memory/4408-186-0x000000000B970000-0x000000000B9C0000-memory.dmpFilesize
320KB
-
memory/4408-187-0x00000000053E0000-0x00000000053F0000-memory.dmpFilesize
64KB
-
memory/4408-188-0x000000000C2E0000-0x000000000C4A2000-memory.dmpFilesize
1.8MB
-
memory/4408-189-0x000000000C9E0000-0x000000000CF0C000-memory.dmpFilesize
5.2MB