Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07-06-2023 01:59
Static task
static1
Behavioral task
behavioral1
Sample
152e377e630a9f676dde3ef11d41884af99726af69af12e0385348ad972b3970.exe
Resource
win10v2004-20230220-en
General
-
Target
152e377e630a9f676dde3ef11d41884af99726af69af12e0385348ad972b3970.exe
-
Size
776KB
-
MD5
f87f992f761726b984b7005c313bf852
-
SHA1
351ad717b39574c4e702aa1e21dc3dbf488cc5e0
-
SHA256
152e377e630a9f676dde3ef11d41884af99726af69af12e0385348ad972b3970
-
SHA512
efbf41b8b374422d7b52c38ac3a916407da6e987a6a6b7c292cc992695cc90e852c33bf07ee6f5a36722f145cd1a44ceca23035e66789af08bbe56db9e3fe208
-
SSDEEP
12288:EMrDy90A+3pyTjHgLzGd/JlZiSSCJ4tzWI8zMJeRqT042ckXQtxuE9tmRS1sCZkP:fy1gfk/JlDnI8zMIY0tXQtxuE9t+AW
Malware Config
Extracted
redline
masa
83.97.73.126:19048
-
auth_value
9f945269efb5978b14b0bdd13ea1f115
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a9882693.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a9882693.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a9882693.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a9882693.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a9882693.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a9882693.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 2180 v9326665.exe 1092 v2040264.exe 2004 v7336512.exe 1264 a9882693.exe 1664 b0590108.exe 4220 c8013605.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a9882693.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2040264.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v2040264.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7336512.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v7336512.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 152e377e630a9f676dde3ef11d41884af99726af69af12e0385348ad972b3970.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 152e377e630a9f676dde3ef11d41884af99726af69af12e0385348ad972b3970.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v9326665.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v9326665.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1664 set thread context of 2612 1664 b0590108.exe 92 -
Program crash 1 IoCs
pid pid_target Process procid_target 676 1664 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 1264 a9882693.exe 1264 a9882693.exe 2612 AppLaunch.exe 2612 AppLaunch.exe 4220 c8013605.exe 4220 c8013605.exe 4220 c8013605.exe 4220 c8013605.exe 4220 c8013605.exe 4220 c8013605.exe 4220 c8013605.exe 4220 c8013605.exe 4220 c8013605.exe 4220 c8013605.exe 4220 c8013605.exe 4220 c8013605.exe 4220 c8013605.exe 4220 c8013605.exe 4220 c8013605.exe 4220 c8013605.exe 4220 c8013605.exe 4220 c8013605.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1264 a9882693.exe Token: SeDebugPrivilege 2612 AppLaunch.exe Token: SeDebugPrivilege 4220 c8013605.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4764 wrote to memory of 2180 4764 152e377e630a9f676dde3ef11d41884af99726af69af12e0385348ad972b3970.exe 84 PID 4764 wrote to memory of 2180 4764 152e377e630a9f676dde3ef11d41884af99726af69af12e0385348ad972b3970.exe 84 PID 4764 wrote to memory of 2180 4764 152e377e630a9f676dde3ef11d41884af99726af69af12e0385348ad972b3970.exe 84 PID 2180 wrote to memory of 1092 2180 v9326665.exe 85 PID 2180 wrote to memory of 1092 2180 v9326665.exe 85 PID 2180 wrote to memory of 1092 2180 v9326665.exe 85 PID 1092 wrote to memory of 2004 1092 v2040264.exe 86 PID 1092 wrote to memory of 2004 1092 v2040264.exe 86 PID 1092 wrote to memory of 2004 1092 v2040264.exe 86 PID 2004 wrote to memory of 1264 2004 v7336512.exe 87 PID 2004 wrote to memory of 1264 2004 v7336512.exe 87 PID 2004 wrote to memory of 1664 2004 v7336512.exe 90 PID 2004 wrote to memory of 1664 2004 v7336512.exe 90 PID 2004 wrote to memory of 1664 2004 v7336512.exe 90 PID 1664 wrote to memory of 2612 1664 b0590108.exe 92 PID 1664 wrote to memory of 2612 1664 b0590108.exe 92 PID 1664 wrote to memory of 2612 1664 b0590108.exe 92 PID 1664 wrote to memory of 2612 1664 b0590108.exe 92 PID 1664 wrote to memory of 2612 1664 b0590108.exe 92 PID 1092 wrote to memory of 4220 1092 v2040264.exe 95 PID 1092 wrote to memory of 4220 1092 v2040264.exe 95 PID 1092 wrote to memory of 4220 1092 v2040264.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\152e377e630a9f676dde3ef11d41884af99726af69af12e0385348ad972b3970.exe"C:\Users\Admin\AppData\Local\Temp\152e377e630a9f676dde3ef11d41884af99726af69af12e0385348ad972b3970.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9326665.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9326665.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2040264.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2040264.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7336512.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7336512.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a9882693.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a9882693.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1264
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b0590108.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b0590108.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1664 -s 1526⤵
- Program crash
PID:676
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8013605.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c8013605.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4220
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1664 -ip 16641⤵PID:1528
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
576KB
MD50eb16eec27b5ee6b4ef64ff2b9cd3750
SHA1a6260afb7fb28b356371b0e56fdf5b35cdec6099
SHA25680250f7c610c8ae7c1a94c06b702b5affb6f668a85beeaa7273ba86bcfc06652
SHA512189771a158d73645afff945215b7a2e1a7c7335eebc2a563986638c05c5fd0d613d4241ca4948f4a4bd09b909e8f1067a8dc5eede3c21b10f4ba2753cc0838e6
-
Filesize
576KB
MD50eb16eec27b5ee6b4ef64ff2b9cd3750
SHA1a6260afb7fb28b356371b0e56fdf5b35cdec6099
SHA25680250f7c610c8ae7c1a94c06b702b5affb6f668a85beeaa7273ba86bcfc06652
SHA512189771a158d73645afff945215b7a2e1a7c7335eebc2a563986638c05c5fd0d613d4241ca4948f4a4bd09b909e8f1067a8dc5eede3c21b10f4ba2753cc0838e6
-
Filesize
351KB
MD5bdcfef2ee21c6ff5b41ac31e0fffa9a6
SHA18aeb31414754c52798804c8e47b54e64a7be4a73
SHA2561346219d470fecda9fe88b816f60d6e4dd94e00a255074804335de45b36d4307
SHA51292dd87c3b13a8879c42c0ad76738d27d15cde925b0bd040be463148fc06ccd4875f2ed2ec4fa1cb35794d2d92de389c713a5f2c9edbf0ebbaf9bf876c50a9990
-
Filesize
351KB
MD5bdcfef2ee21c6ff5b41ac31e0fffa9a6
SHA18aeb31414754c52798804c8e47b54e64a7be4a73
SHA2561346219d470fecda9fe88b816f60d6e4dd94e00a255074804335de45b36d4307
SHA51292dd87c3b13a8879c42c0ad76738d27d15cde925b0bd040be463148fc06ccd4875f2ed2ec4fa1cb35794d2d92de389c713a5f2c9edbf0ebbaf9bf876c50a9990
-
Filesize
172KB
MD549de81a59cdb3babc16e030a673b185d
SHA199788772f2fad3780ee8152db36a827dfa0e472f
SHA256ec93523ffe38d955eb6b2947e4f414f3e3a22411c5497d9021fc138244b722e9
SHA51235f0b4ce21ac4ebff6166c087fe183674963f6c0a96a9161a854e1756f28672befd16b2e6e814b8462428f87bf240bb740a40cb3fd41ed8a96dd90dd3c31ced0
-
Filesize
172KB
MD549de81a59cdb3babc16e030a673b185d
SHA199788772f2fad3780ee8152db36a827dfa0e472f
SHA256ec93523ffe38d955eb6b2947e4f414f3e3a22411c5497d9021fc138244b722e9
SHA51235f0b4ce21ac4ebff6166c087fe183674963f6c0a96a9161a854e1756f28672befd16b2e6e814b8462428f87bf240bb740a40cb3fd41ed8a96dd90dd3c31ced0
-
Filesize
196KB
MD5c479dfdd44e35d9d33d1195f4adf2fde
SHA1914879d9bbeb0df8d5bdfec74d89f0432a9a70f3
SHA25611cac9de2abb3ff745ba406ccd0cb80c452899e849c2542d73813e84199ccfeb
SHA512bd4f47f9302e093f821a46021354dcf569063e132feb43c6cead60eb7ceebe74e8f020c2b7bab1b9e494a2d17cce8483a8f421fcd55e0b9fabf2cc3fbb5e6455
-
Filesize
196KB
MD5c479dfdd44e35d9d33d1195f4adf2fde
SHA1914879d9bbeb0df8d5bdfec74d89f0432a9a70f3
SHA25611cac9de2abb3ff745ba406ccd0cb80c452899e849c2542d73813e84199ccfeb
SHA512bd4f47f9302e093f821a46021354dcf569063e132feb43c6cead60eb7ceebe74e8f020c2b7bab1b9e494a2d17cce8483a8f421fcd55e0b9fabf2cc3fbb5e6455
-
Filesize
11KB
MD5d40c769953ee308a88d266bb661e3017
SHA12c05ea6cda81ee967f5e4213818ebcd2c5a0514e
SHA2567e2a82148f949370bda9706a40b6a919fe8d7785d25851566d9b0c23d6b623bf
SHA51227bded72309ac501a34baf4595f34c28e5a4b9f46f5fd01a37c2e4560a4a8b0186df897b913175d4ea7d86fc0c56619e382eea8540f3b7eff4b3860947574ed9
-
Filesize
11KB
MD5d40c769953ee308a88d266bb661e3017
SHA12c05ea6cda81ee967f5e4213818ebcd2c5a0514e
SHA2567e2a82148f949370bda9706a40b6a919fe8d7785d25851566d9b0c23d6b623bf
SHA51227bded72309ac501a34baf4595f34c28e5a4b9f46f5fd01a37c2e4560a4a8b0186df897b913175d4ea7d86fc0c56619e382eea8540f3b7eff4b3860947574ed9
-
Filesize
101KB
MD5b6ca9f9409c55c868e1060c6ed244045
SHA1f1f65fac8fabda7f29fd839e7db40ad985b3db90
SHA256fb4db023b3c81442fa2890b89f52bccaddcd9ed471e007769ce508b5858cb755
SHA512a3602c9af5cc7abe2a4a7bbbc4ac88e387225f141202ce2c1e1bdd3c15bd5755e738571603f576e86c7572f27ad2b99ba30680d4594bfb6971d4fe4bce9e9cfb
-
Filesize
101KB
MD5b6ca9f9409c55c868e1060c6ed244045
SHA1f1f65fac8fabda7f29fd839e7db40ad985b3db90
SHA256fb4db023b3c81442fa2890b89f52bccaddcd9ed471e007769ce508b5858cb755
SHA512a3602c9af5cc7abe2a4a7bbbc4ac88e387225f141202ce2c1e1bdd3c15bd5755e738571603f576e86c7572f27ad2b99ba30680d4594bfb6971d4fe4bce9e9cfb