Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2023 19:40
Static task
static1
Behavioral task
behavioral1
Sample
6be535e0d34b7d84565618e9bb7e17b078d3be45cca077b89f7a739ddb7e7140.exe
Resource
win10v2004-20230220-en
General
-
Target
6be535e0d34b7d84565618e9bb7e17b078d3be45cca077b89f7a739ddb7e7140.exe
-
Size
713KB
-
MD5
ae0585ec454433acc27e248239bc32fc
-
SHA1
ca936f70d810ea9a5e42402aa929ec6ead9044ea
-
SHA256
6be535e0d34b7d84565618e9bb7e17b078d3be45cca077b89f7a739ddb7e7140
-
SHA512
2dec6739e3614aac97db36b15f1fca606012c94c6c8871fba6a8905f32947edffd7514e21b4abcc356407129107693f62c9d515286f71cce1b3ca1a0ba17fcda
-
SSDEEP
12288:BMrZy90oWa2mFqpKNIMeeQIV7GpoY0SHxmmXz/MBzhBadkXYk/:wyC9mF8KNI9eQIpGZdHxzyauXYk/
Malware Config
Extracted
redline
maxi
83.97.73.126:19048
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
AppLaunch.exea1695565.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a1695565.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a1695565.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a1695565.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a1695565.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a1695565.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a1695565.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
v9118504.exev5510010.exev7007699.exea1695565.exeb6874471.exec0252491.exepid process 1900 v9118504.exe 5084 v5510010.exe 2036 v7007699.exe 2736 a1695565.exe 1452 b6874471.exe 1996 c0252491.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
a1695565.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a1695565.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
v9118504.exev5510010.exev7007699.exe6be535e0d34b7d84565618e9bb7e17b078d3be45cca077b89f7a739ddb7e7140.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v9118504.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v9118504.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5510010.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v5510010.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7007699.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v7007699.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6be535e0d34b7d84565618e9bb7e17b078d3be45cca077b89f7a739ddb7e7140.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6be535e0d34b7d84565618e9bb7e17b078d3be45cca077b89f7a739ddb7e7140.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
b6874471.exedescription pid process target process PID 1452 set thread context of 3708 1452 b6874471.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 8 1452 WerFault.exe b6874471.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
a1695565.exeAppLaunch.exec0252491.exepid process 2736 a1695565.exe 2736 a1695565.exe 3708 AppLaunch.exe 3708 AppLaunch.exe 1996 c0252491.exe 1996 c0252491.exe 1996 c0252491.exe 1996 c0252491.exe 1996 c0252491.exe 1996 c0252491.exe 1996 c0252491.exe 1996 c0252491.exe 1996 c0252491.exe 1996 c0252491.exe 1996 c0252491.exe 1996 c0252491.exe 1996 c0252491.exe 1996 c0252491.exe 1996 c0252491.exe 1996 c0252491.exe 1996 c0252491.exe 1996 c0252491.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
a1695565.exeAppLaunch.exec0252491.exedescription pid process Token: SeDebugPrivilege 2736 a1695565.exe Token: SeDebugPrivilege 3708 AppLaunch.exe Token: SeDebugPrivilege 1996 c0252491.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
6be535e0d34b7d84565618e9bb7e17b078d3be45cca077b89f7a739ddb7e7140.exev9118504.exev5510010.exev7007699.exeb6874471.exedescription pid process target process PID 880 wrote to memory of 1900 880 6be535e0d34b7d84565618e9bb7e17b078d3be45cca077b89f7a739ddb7e7140.exe v9118504.exe PID 880 wrote to memory of 1900 880 6be535e0d34b7d84565618e9bb7e17b078d3be45cca077b89f7a739ddb7e7140.exe v9118504.exe PID 880 wrote to memory of 1900 880 6be535e0d34b7d84565618e9bb7e17b078d3be45cca077b89f7a739ddb7e7140.exe v9118504.exe PID 1900 wrote to memory of 5084 1900 v9118504.exe v5510010.exe PID 1900 wrote to memory of 5084 1900 v9118504.exe v5510010.exe PID 1900 wrote to memory of 5084 1900 v9118504.exe v5510010.exe PID 5084 wrote to memory of 2036 5084 v5510010.exe v7007699.exe PID 5084 wrote to memory of 2036 5084 v5510010.exe v7007699.exe PID 5084 wrote to memory of 2036 5084 v5510010.exe v7007699.exe PID 2036 wrote to memory of 2736 2036 v7007699.exe a1695565.exe PID 2036 wrote to memory of 2736 2036 v7007699.exe a1695565.exe PID 2036 wrote to memory of 1452 2036 v7007699.exe b6874471.exe PID 2036 wrote to memory of 1452 2036 v7007699.exe b6874471.exe PID 2036 wrote to memory of 1452 2036 v7007699.exe b6874471.exe PID 1452 wrote to memory of 3708 1452 b6874471.exe AppLaunch.exe PID 1452 wrote to memory of 3708 1452 b6874471.exe AppLaunch.exe PID 1452 wrote to memory of 3708 1452 b6874471.exe AppLaunch.exe PID 1452 wrote to memory of 3708 1452 b6874471.exe AppLaunch.exe PID 1452 wrote to memory of 3708 1452 b6874471.exe AppLaunch.exe PID 5084 wrote to memory of 1996 5084 v5510010.exe c0252491.exe PID 5084 wrote to memory of 1996 5084 v5510010.exe c0252491.exe PID 5084 wrote to memory of 1996 5084 v5510010.exe c0252491.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6be535e0d34b7d84565618e9bb7e17b078d3be45cca077b89f7a739ddb7e7140.exe"C:\Users\Admin\AppData\Local\Temp\6be535e0d34b7d84565618e9bb7e17b078d3be45cca077b89f7a739ddb7e7140.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9118504.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9118504.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5510010.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5510010.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7007699.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7007699.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1695565.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a1695565.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6874471.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b6874471.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3708
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1452 -s 5606⤵
- Program crash
PID:8
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c0252491.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c0252491.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1452 -ip 14521⤵PID:4484
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
523KB
MD5f481d65ec85f123d6e78728a73e8ec35
SHA14996ea2a8f4a45b7fbd70604149779d01eb82ca4
SHA2561752b5b17e6ce9a202d4476646f0dd1a76bc1ad717c63a9ef1fb6a3954c99309
SHA51248a256c879c3a788aa42142679c072c85c21a15d83c9133820dea2bfaa73a82054c9c50603372b1b98ea11c6c4c1bd8c9de7dc517698ee0dfe48f1e756544a71
-
Filesize
523KB
MD5f481d65ec85f123d6e78728a73e8ec35
SHA14996ea2a8f4a45b7fbd70604149779d01eb82ca4
SHA2561752b5b17e6ce9a202d4476646f0dd1a76bc1ad717c63a9ef1fb6a3954c99309
SHA51248a256c879c3a788aa42142679c072c85c21a15d83c9133820dea2bfaa73a82054c9c50603372b1b98ea11c6c4c1bd8c9de7dc517698ee0dfe48f1e756544a71
-
Filesize
351KB
MD5dceffba932dc20466349f2b3c7284982
SHA140dde08042a426cec4f8a6b9084cb2186bec8e9a
SHA256205a124a536fc6e16e41ec9e7017c742ef07a5abdafa35bc002b3c835ab4848a
SHA512551b0d249d399f1c2b100a9ab4159e3f0b38ff4d8381915b34b8ab9722943a018cba3c51a0201257ce5b3a884f1bf9450574b4b89a1c58d65f81c794d78ca1ba
-
Filesize
351KB
MD5dceffba932dc20466349f2b3c7284982
SHA140dde08042a426cec4f8a6b9084cb2186bec8e9a
SHA256205a124a536fc6e16e41ec9e7017c742ef07a5abdafa35bc002b3c835ab4848a
SHA512551b0d249d399f1c2b100a9ab4159e3f0b38ff4d8381915b34b8ab9722943a018cba3c51a0201257ce5b3a884f1bf9450574b4b89a1c58d65f81c794d78ca1ba
-
Filesize
172KB
MD557a97011dbdc4e6c177168ff3fc19e35
SHA1b1fcebeb04da67681235ea0fb617c5d037246986
SHA25659c3623faa52742568d2c405853692a845be93b4813826f4e534ea8ee0414385
SHA512157a3dcd78459700eefb32a21cfce49be3ba3a792a29e904b03ec46b5e776b094ceec647285469c5904f7d21214ad54a3c379a28fd6bd0913d32c6891c29726a
-
Filesize
172KB
MD557a97011dbdc4e6c177168ff3fc19e35
SHA1b1fcebeb04da67681235ea0fb617c5d037246986
SHA25659c3623faa52742568d2c405853692a845be93b4813826f4e534ea8ee0414385
SHA512157a3dcd78459700eefb32a21cfce49be3ba3a792a29e904b03ec46b5e776b094ceec647285469c5904f7d21214ad54a3c379a28fd6bd0913d32c6891c29726a
-
Filesize
196KB
MD532b57255582b5e470f363d9d5d781fb8
SHA1594efd829f643921e61e2db2ac9f8b1a96a1a9e3
SHA25684a057fa412e192a4d06bebe14aa2e025abc600c7fdd0000ccb3085a76876f05
SHA51271ad8c6ec602f1d09a12cdb0a14a8a2fd1033b3bfc5d5c31cb6ae6e6120b24422c3915d58c79e9c06d54e3ec1e67678af02068c14192c2b3a8ebc173f36166f5
-
Filesize
196KB
MD532b57255582b5e470f363d9d5d781fb8
SHA1594efd829f643921e61e2db2ac9f8b1a96a1a9e3
SHA25684a057fa412e192a4d06bebe14aa2e025abc600c7fdd0000ccb3085a76876f05
SHA51271ad8c6ec602f1d09a12cdb0a14a8a2fd1033b3bfc5d5c31cb6ae6e6120b24422c3915d58c79e9c06d54e3ec1e67678af02068c14192c2b3a8ebc173f36166f5
-
Filesize
14KB
MD5cf7561a184f8c2d7836583090692c767
SHA1c918aaf80b21caa53c196374f80dcd5375265d8a
SHA256436e5fd8bb3f6412d54f83111e1324c325e7fce42a7645a4f6f8bc794598b559
SHA5120ba61c7462c48a293932902fb37286612dffefe5f59c9b915bdaaaad5ad65f6e2c18b21e03aa9b832a46059553c911e4831ea2461cd5fd020f1f319be544eba9
-
Filesize
14KB
MD5cf7561a184f8c2d7836583090692c767
SHA1c918aaf80b21caa53c196374f80dcd5375265d8a
SHA256436e5fd8bb3f6412d54f83111e1324c325e7fce42a7645a4f6f8bc794598b559
SHA5120ba61c7462c48a293932902fb37286612dffefe5f59c9b915bdaaaad5ad65f6e2c18b21e03aa9b832a46059553c911e4831ea2461cd5fd020f1f319be544eba9
-
Filesize
100KB
MD5d37d54622528f61b663b6edb2ab4ba5b
SHA1a62f0a5102dd998a91f968633278b47e3bcca922
SHA2566741d8fc8d6c26278f1d10c9d35debff32ca1a10f72e24c8e62f33a0e33445d4
SHA512b28096fab8f1ced73d76203588fa00944d41890e2774b39c04a8df861e48995cfe8798d208a0f3a2fabffe5efd4e1c3b6568adef5df9572214b3534cc4f9ab89
-
Filesize
100KB
MD5d37d54622528f61b663b6edb2ab4ba5b
SHA1a62f0a5102dd998a91f968633278b47e3bcca922
SHA2566741d8fc8d6c26278f1d10c9d35debff32ca1a10f72e24c8e62f33a0e33445d4
SHA512b28096fab8f1ced73d76203588fa00944d41890e2774b39c04a8df861e48995cfe8798d208a0f3a2fabffe5efd4e1c3b6568adef5df9572214b3534cc4f9ab89