Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2023 20:26
Static task
static1
Behavioral task
behavioral1
Sample
b8f5f1b01e5195493c40fa2b41018c5cf332dd9f247b54f4c1d1fc073fd5fa2b.exe
Resource
win10v2004-20230221-en
General
-
Target
b8f5f1b01e5195493c40fa2b41018c5cf332dd9f247b54f4c1d1fc073fd5fa2b.exe
-
Size
723KB
-
MD5
eee23f763f055695fee6e180cae79cd7
-
SHA1
6878678daedc47891ef516081bcba51da4c4c5ca
-
SHA256
b8f5f1b01e5195493c40fa2b41018c5cf332dd9f247b54f4c1d1fc073fd5fa2b
-
SHA512
647d771ac03d3d4f100610ce5719d65cdf1f267282cc5d82711242a9d6146895665ea2a8b6db31dca534a14b5328f9b15c8a6d3faf9514b45f59d78ab5fe37f2
-
SSDEEP
12288:SMroy902ZSLO0oo4DfosTEvUfpJMPcIUNCrYjn/amQ:GyFwCDFfoHvehjnSmQ
Malware Config
Extracted
redline
maxi
83.97.73.126:19048
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
a2725233.exeAppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a2725233.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a2725233.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a2725233.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a2725233.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a2725233.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a2725233.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
v1336475.exev7251993.exev9120678.exea2725233.exeb3590451.exec9698670.exepid process 2580 v1336475.exe 4276 v7251993.exe 4468 v9120678.exe 1288 a2725233.exe 2232 b3590451.exe 2392 c9698670.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
a2725233.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a2725233.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
v9120678.exeb8f5f1b01e5195493c40fa2b41018c5cf332dd9f247b54f4c1d1fc073fd5fa2b.exev1336475.exev7251993.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v9120678.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v9120678.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b8f5f1b01e5195493c40fa2b41018c5cf332dd9f247b54f4c1d1fc073fd5fa2b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b8f5f1b01e5195493c40fa2b41018c5cf332dd9f247b54f4c1d1fc073fd5fa2b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1336475.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v1336475.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7251993.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v7251993.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
b3590451.exedescription pid process target process PID 2232 set thread context of 4716 2232 b3590451.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3148 2232 WerFault.exe b3590451.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
a2725233.exeAppLaunch.exec9698670.exepid process 1288 a2725233.exe 1288 a2725233.exe 4716 AppLaunch.exe 4716 AppLaunch.exe 2392 c9698670.exe 2392 c9698670.exe 2392 c9698670.exe 2392 c9698670.exe 2392 c9698670.exe 2392 c9698670.exe 2392 c9698670.exe 2392 c9698670.exe 2392 c9698670.exe 2392 c9698670.exe 2392 c9698670.exe 2392 c9698670.exe 2392 c9698670.exe 2392 c9698670.exe 2392 c9698670.exe 2392 c9698670.exe 2392 c9698670.exe 2392 c9698670.exe 2392 c9698670.exe 2392 c9698670.exe 2392 c9698670.exe 2392 c9698670.exe 2392 c9698670.exe 2392 c9698670.exe 2392 c9698670.exe 2392 c9698670.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
a2725233.exeAppLaunch.exec9698670.exedescription pid process Token: SeDebugPrivilege 1288 a2725233.exe Token: SeDebugPrivilege 4716 AppLaunch.exe Token: SeDebugPrivilege 2392 c9698670.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
b8f5f1b01e5195493c40fa2b41018c5cf332dd9f247b54f4c1d1fc073fd5fa2b.exev1336475.exev7251993.exev9120678.exeb3590451.exedescription pid process target process PID 2700 wrote to memory of 2580 2700 b8f5f1b01e5195493c40fa2b41018c5cf332dd9f247b54f4c1d1fc073fd5fa2b.exe v1336475.exe PID 2700 wrote to memory of 2580 2700 b8f5f1b01e5195493c40fa2b41018c5cf332dd9f247b54f4c1d1fc073fd5fa2b.exe v1336475.exe PID 2700 wrote to memory of 2580 2700 b8f5f1b01e5195493c40fa2b41018c5cf332dd9f247b54f4c1d1fc073fd5fa2b.exe v1336475.exe PID 2580 wrote to memory of 4276 2580 v1336475.exe v7251993.exe PID 2580 wrote to memory of 4276 2580 v1336475.exe v7251993.exe PID 2580 wrote to memory of 4276 2580 v1336475.exe v7251993.exe PID 4276 wrote to memory of 4468 4276 v7251993.exe v9120678.exe PID 4276 wrote to memory of 4468 4276 v7251993.exe v9120678.exe PID 4276 wrote to memory of 4468 4276 v7251993.exe v9120678.exe PID 4468 wrote to memory of 1288 4468 v9120678.exe a2725233.exe PID 4468 wrote to memory of 1288 4468 v9120678.exe a2725233.exe PID 4468 wrote to memory of 2232 4468 v9120678.exe b3590451.exe PID 4468 wrote to memory of 2232 4468 v9120678.exe b3590451.exe PID 4468 wrote to memory of 2232 4468 v9120678.exe b3590451.exe PID 2232 wrote to memory of 4716 2232 b3590451.exe AppLaunch.exe PID 2232 wrote to memory of 4716 2232 b3590451.exe AppLaunch.exe PID 2232 wrote to memory of 4716 2232 b3590451.exe AppLaunch.exe PID 2232 wrote to memory of 4716 2232 b3590451.exe AppLaunch.exe PID 2232 wrote to memory of 4716 2232 b3590451.exe AppLaunch.exe PID 4276 wrote to memory of 2392 4276 v7251993.exe c9698670.exe PID 4276 wrote to memory of 2392 4276 v7251993.exe c9698670.exe PID 4276 wrote to memory of 2392 4276 v7251993.exe c9698670.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8f5f1b01e5195493c40fa2b41018c5cf332dd9f247b54f4c1d1fc073fd5fa2b.exe"C:\Users\Admin\AppData\Local\Temp\b8f5f1b01e5195493c40fa2b41018c5cf332dd9f247b54f4c1d1fc073fd5fa2b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1336475.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1336475.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7251993.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7251993.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9120678.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9120678.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a2725233.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a2725233.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b3590451.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b3590451.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 1486⤵
- Program crash
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9698670.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9698670.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2232 -ip 22321⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1336475.exeFilesize
523KB
MD53184c31437f8a33367797c927d275b1b
SHA106de303e77935d3559a845c1b60d87dfee51f81b
SHA256921d194959eeee2e4ea3398eb8cc0c8ab3f4e0103b066a3c5b461db293994f4e
SHA5123711013647d8d97ee0e7e3bf33b6af73eb959fbe82290ef4cc020703abc939729749ebbf614c0af0c1517de1c93743b0f7e61fd3d98d6e336a0c636168184b10
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1336475.exeFilesize
523KB
MD53184c31437f8a33367797c927d275b1b
SHA106de303e77935d3559a845c1b60d87dfee51f81b
SHA256921d194959eeee2e4ea3398eb8cc0c8ab3f4e0103b066a3c5b461db293994f4e
SHA5123711013647d8d97ee0e7e3bf33b6af73eb959fbe82290ef4cc020703abc939729749ebbf614c0af0c1517de1c93743b0f7e61fd3d98d6e336a0c636168184b10
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7251993.exeFilesize
351KB
MD537218486487a22032c86ef482f41c612
SHA1020e45c5927b2a91d8a6bf667156e5c49632ceab
SHA256653390bd32ea903630fec6f5ae96b6e2553c03889056f64c3a50ea1d132f4b5b
SHA512d6d59f1607e136ec7eccef1393574b9c6a818f21af7b3ca228288488bdff7e4e81d507e0aa1160913cf44651c23c0c4fb5f69b18c5f21af2628e51478e3a6705
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7251993.exeFilesize
351KB
MD537218486487a22032c86ef482f41c612
SHA1020e45c5927b2a91d8a6bf667156e5c49632ceab
SHA256653390bd32ea903630fec6f5ae96b6e2553c03889056f64c3a50ea1d132f4b5b
SHA512d6d59f1607e136ec7eccef1393574b9c6a818f21af7b3ca228288488bdff7e4e81d507e0aa1160913cf44651c23c0c4fb5f69b18c5f21af2628e51478e3a6705
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9698670.exeFilesize
172KB
MD59990f8d60c6f986bc6e676d81a266aa8
SHA1d85b6735389ad9d8856956ec443ccdd94caf1409
SHA256117111cd6197ea86348aa82a76cccc4bbca1d34ff60fd3edcf3b8fa87b2025e7
SHA5120cdfb0415b4bc77b0ddde7556aeb2cc94ec3e0d8b0fe13e6aa831e463c7a9cd2709e1575fb068a85ab3e56b63df83eef1f3c743a2528d3e2ff7630d6ebf9d303
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9698670.exeFilesize
172KB
MD59990f8d60c6f986bc6e676d81a266aa8
SHA1d85b6735389ad9d8856956ec443ccdd94caf1409
SHA256117111cd6197ea86348aa82a76cccc4bbca1d34ff60fd3edcf3b8fa87b2025e7
SHA5120cdfb0415b4bc77b0ddde7556aeb2cc94ec3e0d8b0fe13e6aa831e463c7a9cd2709e1575fb068a85ab3e56b63df83eef1f3c743a2528d3e2ff7630d6ebf9d303
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9120678.exeFilesize
196KB
MD5d922678dd560542bd3c4c46ab1e09db6
SHA1e2e132b24b420b96b663de87f21f5271ce4845e6
SHA256aa60bf1d537c3b590f3c703c50c6e29f8780ebd5b9cbb952382781f4d753ece5
SHA512b03a0fdb7dde6345a9b114f331402fc37955de462aa694f4c5572f03f3bd424c60e6ca3ba740e060e2425badb4466a83c1e2c18ff517fee89b0db0bebd6500b2
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v9120678.exeFilesize
196KB
MD5d922678dd560542bd3c4c46ab1e09db6
SHA1e2e132b24b420b96b663de87f21f5271ce4845e6
SHA256aa60bf1d537c3b590f3c703c50c6e29f8780ebd5b9cbb952382781f4d753ece5
SHA512b03a0fdb7dde6345a9b114f331402fc37955de462aa694f4c5572f03f3bd424c60e6ca3ba740e060e2425badb4466a83c1e2c18ff517fee89b0db0bebd6500b2
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a2725233.exeFilesize
14KB
MD535688b7743671b5f5dc8b97fdd2a82db
SHA1b3195404dc52768194d613f83cd44a217f7a5619
SHA256442f066bd5316a045cc2555261a258c592d0ae43651e6287b6fec3be25df160a
SHA512a8f626c9685b6ae6d85e4461a297244c14894619fa6d06d83cf6e261397c0b8061b8a0effb6c35478d34a4b68296ea6a97b2b6cf1b67b2f9da19718d8a29fcb7
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a2725233.exeFilesize
14KB
MD535688b7743671b5f5dc8b97fdd2a82db
SHA1b3195404dc52768194d613f83cd44a217f7a5619
SHA256442f066bd5316a045cc2555261a258c592d0ae43651e6287b6fec3be25df160a
SHA512a8f626c9685b6ae6d85e4461a297244c14894619fa6d06d83cf6e261397c0b8061b8a0effb6c35478d34a4b68296ea6a97b2b6cf1b67b2f9da19718d8a29fcb7
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b3590451.exeFilesize
100KB
MD5f28662e6c9dee6cb0f883c29a6288408
SHA1210e7662ebdb82fb0fd5a115d829ed846b0bef63
SHA25677f9e7763315d972894ce45e586265d00bdd41dcccbf6f97fc60fde6f78e805a
SHA512a18ac150c46c9a94a3c91c4e4aa947b2a862fbdbb01e997f9abaf8e01271016852e174f27941183d98a9940cdf7cea693baab59c5b24a916d7e04dde53ba7e42
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b3590451.exeFilesize
100KB
MD5f28662e6c9dee6cb0f883c29a6288408
SHA1210e7662ebdb82fb0fd5a115d829ed846b0bef63
SHA25677f9e7763315d972894ce45e586265d00bdd41dcccbf6f97fc60fde6f78e805a
SHA512a18ac150c46c9a94a3c91c4e4aa947b2a862fbdbb01e997f9abaf8e01271016852e174f27941183d98a9940cdf7cea693baab59c5b24a916d7e04dde53ba7e42
-
memory/1288-161-0x00000000006B0000-0x00000000006BA000-memory.dmpFilesize
40KB
-
memory/2392-175-0x0000000000050000-0x0000000000080000-memory.dmpFilesize
192KB
-
memory/2392-181-0x000000000A280000-0x000000000A2F6000-memory.dmpFilesize
472KB
-
memory/2392-176-0x000000000A4D0000-0x000000000AAE8000-memory.dmpFilesize
6.1MB
-
memory/2392-177-0x0000000009FD0000-0x000000000A0DA000-memory.dmpFilesize
1.0MB
-
memory/2392-178-0x0000000009F10000-0x0000000009F22000-memory.dmpFilesize
72KB
-
memory/2392-179-0x0000000009F70000-0x0000000009FAC000-memory.dmpFilesize
240KB
-
memory/2392-180-0x0000000004920000-0x0000000004930000-memory.dmpFilesize
64KB
-
memory/2392-189-0x0000000004920000-0x0000000004930000-memory.dmpFilesize
64KB
-
memory/2392-182-0x000000000A3A0000-0x000000000A432000-memory.dmpFilesize
584KB
-
memory/2392-183-0x000000000A300000-0x000000000A366000-memory.dmpFilesize
408KB
-
memory/2392-184-0x000000000B4A0000-0x000000000BA44000-memory.dmpFilesize
5.6MB
-
memory/2392-186-0x000000000B180000-0x000000000B342000-memory.dmpFilesize
1.8MB
-
memory/2392-187-0x000000000BF80000-0x000000000C4AC000-memory.dmpFilesize
5.2MB
-
memory/2392-188-0x000000000B0A0000-0x000000000B0F0000-memory.dmpFilesize
320KB
-
memory/4716-167-0x00000000001C0000-0x00000000001CA000-memory.dmpFilesize
40KB