Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07/06/2023, 03:52
Static task
static1
Behavioral task
behavioral1
Sample
bdd10924ef4656d290b7285797ca3931aee97a88e510bdb7d163a1bf1aa83957.exe
Resource
win10v2004-20230220-en
General
-
Target
bdd10924ef4656d290b7285797ca3931aee97a88e510bdb7d163a1bf1aa83957.exe
-
Size
722KB
-
MD5
799c10b2f2d20f3b4d6333a77784a6ce
-
SHA1
b36c77a1779251a5fe7b8ee229a9960bc0cc0463
-
SHA256
bdd10924ef4656d290b7285797ca3931aee97a88e510bdb7d163a1bf1aa83957
-
SHA512
b9bd765cf17c9310e7165ca2df8e2423c0b048c46c2bd251a050a5e79d41bc5e06d1dd2629ae663ae35297bdb2052ac758f2d27e8718d1c8ddd185af702b2829
-
SSDEEP
12288:dMrgy90HdavB8HjuWiZjwp/yfI0AiNu3gggKaQ5Tj/MXDGb/sM+rE9unKL5RGa:dyMWB3BZjM/y7Nu3oKf0zGb/sHrE9uns
Malware Config
Extracted
redline
dasa
83.97.73.126:19048
-
auth_value
7eca6ed540c2dcd359aed5b67c4eda07
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection k5521681.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k5521681.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k5521681.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k5521681.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k5521681.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k5521681.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 4100 y5223545.exe 4480 y0400714.exe 3544 y5565553.exe 1208 j3792309.exe 1412 k5521681.exe 1900 l1989429.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" k5521681.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y0400714.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y0400714.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y5565553.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" y5565553.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bdd10924ef4656d290b7285797ca3931aee97a88e510bdb7d163a1bf1aa83957.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bdd10924ef4656d290b7285797ca3931aee97a88e510bdb7d163a1bf1aa83957.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y5223545.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y5223545.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1208 set thread context of 652 1208 j3792309.exe 88 -
Program crash 1 IoCs
pid pid_target Process procid_target 3456 1208 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 652 AppLaunch.exe 652 AppLaunch.exe 1412 k5521681.exe 1412 k5521681.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 652 AppLaunch.exe Token: SeDebugPrivilege 1412 k5521681.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3116 wrote to memory of 4100 3116 bdd10924ef4656d290b7285797ca3931aee97a88e510bdb7d163a1bf1aa83957.exe 83 PID 3116 wrote to memory of 4100 3116 bdd10924ef4656d290b7285797ca3931aee97a88e510bdb7d163a1bf1aa83957.exe 83 PID 3116 wrote to memory of 4100 3116 bdd10924ef4656d290b7285797ca3931aee97a88e510bdb7d163a1bf1aa83957.exe 83 PID 4100 wrote to memory of 4480 4100 y5223545.exe 84 PID 4100 wrote to memory of 4480 4100 y5223545.exe 84 PID 4100 wrote to memory of 4480 4100 y5223545.exe 84 PID 4480 wrote to memory of 3544 4480 y0400714.exe 85 PID 4480 wrote to memory of 3544 4480 y0400714.exe 85 PID 4480 wrote to memory of 3544 4480 y0400714.exe 85 PID 3544 wrote to memory of 1208 3544 y5565553.exe 86 PID 3544 wrote to memory of 1208 3544 y5565553.exe 86 PID 3544 wrote to memory of 1208 3544 y5565553.exe 86 PID 1208 wrote to memory of 652 1208 j3792309.exe 88 PID 1208 wrote to memory of 652 1208 j3792309.exe 88 PID 1208 wrote to memory of 652 1208 j3792309.exe 88 PID 1208 wrote to memory of 652 1208 j3792309.exe 88 PID 1208 wrote to memory of 652 1208 j3792309.exe 88 PID 3544 wrote to memory of 1412 3544 y5565553.exe 91 PID 3544 wrote to memory of 1412 3544 y5565553.exe 91 PID 4480 wrote to memory of 1900 4480 y0400714.exe 92 PID 4480 wrote to memory of 1900 4480 y0400714.exe 92 PID 4480 wrote to memory of 1900 4480 y0400714.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\bdd10924ef4656d290b7285797ca3931aee97a88e510bdb7d163a1bf1aa83957.exe"C:\Users\Admin\AppData\Local\Temp\bdd10924ef4656d290b7285797ca3931aee97a88e510bdb7d163a1bf1aa83957.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5223545.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5223545.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0400714.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0400714.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y5565553.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\y5565553.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j3792309.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\j3792309.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:652
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1208 -s 5686⤵
- Program crash
PID:3456
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\k5521681.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\k5521681.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1412
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l1989429.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l1989429.exe4⤵
- Executes dropped EXE
PID:1900
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1208 -ip 12081⤵PID:1108
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
523KB
MD57f1d7d0ddc0c63e7a48dc0b52bf102f6
SHA19e23ecaf36d14fcdaa03d6b02d6e68bc442dc866
SHA2568fd5de7520374056030ba53314cf830096b7f6c3863b376fff76b6df5459a69d
SHA512d0f7559fdf701eacc40e6dcb649cd0a9ac27f718de21b9f285cfe3aed3a69378abc3061c8f183d0025ffde68559d74320a6b75c52473ab85ac1d18eba8d71398
-
Filesize
523KB
MD57f1d7d0ddc0c63e7a48dc0b52bf102f6
SHA19e23ecaf36d14fcdaa03d6b02d6e68bc442dc866
SHA2568fd5de7520374056030ba53314cf830096b7f6c3863b376fff76b6df5459a69d
SHA512d0f7559fdf701eacc40e6dcb649cd0a9ac27f718de21b9f285cfe3aed3a69378abc3061c8f183d0025ffde68559d74320a6b75c52473ab85ac1d18eba8d71398
-
Filesize
351KB
MD586167669156a0b1c1ef8f4463ba0b36b
SHA17e398eb28d64a4e392ecb14e8a3dbd8a2b71f65a
SHA256daad04ea233d784f7930542bab6ccd9c6d11fc89263f14d1cc64e70280e16ee0
SHA5127f0b922c077f67f5e2455ff032acc2340c2abd5ef4ebcd53b6ac12c5e6edaaf0e51ab64d850a1f506f06b966c81caf5365abc2d333e726d7e91c40e29702731a
-
Filesize
351KB
MD586167669156a0b1c1ef8f4463ba0b36b
SHA17e398eb28d64a4e392ecb14e8a3dbd8a2b71f65a
SHA256daad04ea233d784f7930542bab6ccd9c6d11fc89263f14d1cc64e70280e16ee0
SHA5127f0b922c077f67f5e2455ff032acc2340c2abd5ef4ebcd53b6ac12c5e6edaaf0e51ab64d850a1f506f06b966c81caf5365abc2d333e726d7e91c40e29702731a
-
Filesize
172KB
MD51f628ecffb69a8313ffd232768f77b76
SHA1ba43d32192b7d118b4e7440bb1629e1c024045ca
SHA256cbafb6c6afbbca84ae66e445db6b2d62d5138dbb277903455c94d15fe4b9df69
SHA51211e9adef544c64fad65b2bc55829d2a62b9add30b8b738a00b9872f5a1771cc72593c2a994ce5871d8afc73b871b61b7aad9665efcfd6c3f9424ab067aba6e3e
-
Filesize
172KB
MD51f628ecffb69a8313ffd232768f77b76
SHA1ba43d32192b7d118b4e7440bb1629e1c024045ca
SHA256cbafb6c6afbbca84ae66e445db6b2d62d5138dbb277903455c94d15fe4b9df69
SHA51211e9adef544c64fad65b2bc55829d2a62b9add30b8b738a00b9872f5a1771cc72593c2a994ce5871d8afc73b871b61b7aad9665efcfd6c3f9424ab067aba6e3e
-
Filesize
196KB
MD5cccd5dffb96ce633f62f194f8a4ad3ea
SHA11857fd15b62d730ac104d2e780e196d22ae05b47
SHA256025e0ca3d63a45e4abc754beaa4e516ce5c2bfc2a608ea7d1e62987a313c090b
SHA512a5a788ef8cd84c3f799cba461e3dcbed59292b9994d65450ebd2ae8ce4f6e74ef83c4c516f260f717eb5cf2b7e0f8d3a12b49a8f3ba3b14840fa709c88449013
-
Filesize
196KB
MD5cccd5dffb96ce633f62f194f8a4ad3ea
SHA11857fd15b62d730ac104d2e780e196d22ae05b47
SHA256025e0ca3d63a45e4abc754beaa4e516ce5c2bfc2a608ea7d1e62987a313c090b
SHA512a5a788ef8cd84c3f799cba461e3dcbed59292b9994d65450ebd2ae8ce4f6e74ef83c4c516f260f717eb5cf2b7e0f8d3a12b49a8f3ba3b14840fa709c88449013
-
Filesize
100KB
MD5a804a98ef2d29c50c9ed9e6acb4a1db4
SHA110b73d4a234c90f4d81607cf75199cc6eac44f80
SHA256e5115f48959c212bb96586c3db7a2febf4e1e08c862f9736689890206dfc5ca9
SHA512cdbf0a12a14bb627983889ae513b0ec7c2efcb48fe07808533fa7d2383bb155c455070147cf2977632e452da2dfc84055fe8642ada20538af1648eefa6d86bf0
-
Filesize
100KB
MD5a804a98ef2d29c50c9ed9e6acb4a1db4
SHA110b73d4a234c90f4d81607cf75199cc6eac44f80
SHA256e5115f48959c212bb96586c3db7a2febf4e1e08c862f9736689890206dfc5ca9
SHA512cdbf0a12a14bb627983889ae513b0ec7c2efcb48fe07808533fa7d2383bb155c455070147cf2977632e452da2dfc84055fe8642ada20538af1648eefa6d86bf0
-
Filesize
11KB
MD5deca37f9a132e24ec089ac0ddaf6c6d5
SHA1c31528bb75bcdbd0e5af6f9c38f3f6121768fe03
SHA256685d946b39e750f1327d63291be9795c435ac34cc45c2b06c9304437ba9c1a19
SHA5121ce6320d6a855a332bca720aa182bb82763e5ae130af9d3918c12e2162a1786edf894d5607c314823693154a7ab223f599ebde71a0b262b8cabba84c6f5b5e99
-
Filesize
11KB
MD5deca37f9a132e24ec089ac0ddaf6c6d5
SHA1c31528bb75bcdbd0e5af6f9c38f3f6121768fe03
SHA256685d946b39e750f1327d63291be9795c435ac34cc45c2b06c9304437ba9c1a19
SHA5121ce6320d6a855a332bca720aa182bb82763e5ae130af9d3918c12e2162a1786edf894d5607c314823693154a7ab223f599ebde71a0b262b8cabba84c6f5b5e99