Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08-06-2023 10:36
Static task
static1
Behavioral task
behavioral1
Sample
02e044f33dcb6f529b9a2cab9399a005.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
02e044f33dcb6f529b9a2cab9399a005.exe
Resource
win10v2004-20230220-en
General
-
Target
02e044f33dcb6f529b9a2cab9399a005.exe
-
Size
772KB
-
MD5
02e044f33dcb6f529b9a2cab9399a005
-
SHA1
26160bacfe6b9bae3dbe09f1bd49e351ac421589
-
SHA256
e447ae1f8224e2b964c69128ec258560a374151a8ee932670feb7a2670163682
-
SHA512
0efd491f73eaf13fd489c04a349c09a90dcb52cf5706eb806df9ac49fd60d3297e27f77a9fff422e4b41c2902dfea43f9494088db29de0194c2545521a8889f2
-
SSDEEP
24576:sy7vAUKqx3rIKX0OMHZp6oqAgM34iaqR:b0UKqrX0D5p6oqo9a
Malware Config
Extracted
redline
maxi
83.97.73.129:19068
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
AppLaunch.exea5163199.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a5163199.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5163199.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5163199.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5163199.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5163199.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5163199.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
Processes:
v0405136.exev6573730.exev4446936.exea5163199.exeb0275657.exec9324746.exepid process 972 v0405136.exe 1980 v6573730.exe 3760 v4446936.exe 1424 a5163199.exe 1272 b0275657.exe 2788 c9324746.exe -
Processes:
a5163199.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a5163199.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
v0405136.exev6573730.exev4446936.exe02e044f33dcb6f529b9a2cab9399a005.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v0405136.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v6573730.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v6573730.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4446936.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v4446936.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 02e044f33dcb6f529b9a2cab9399a005.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 02e044f33dcb6f529b9a2cab9399a005.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0405136.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b0275657.exedescription pid process target process PID 1272 set thread context of 4828 1272 b0275657.exe AppLaunch.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3640 1272 WerFault.exe b0275657.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
a5163199.exeAppLaunch.exepid process 1424 a5163199.exe 1424 a5163199.exe 4828 AppLaunch.exe 4828 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
a5163199.exeAppLaunch.exedescription pid process Token: SeDebugPrivilege 1424 a5163199.exe Token: SeDebugPrivilege 4828 AppLaunch.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
02e044f33dcb6f529b9a2cab9399a005.exev0405136.exev6573730.exev4446936.exeb0275657.exedescription pid process target process PID 1312 wrote to memory of 972 1312 02e044f33dcb6f529b9a2cab9399a005.exe v0405136.exe PID 1312 wrote to memory of 972 1312 02e044f33dcb6f529b9a2cab9399a005.exe v0405136.exe PID 1312 wrote to memory of 972 1312 02e044f33dcb6f529b9a2cab9399a005.exe v0405136.exe PID 972 wrote to memory of 1980 972 v0405136.exe v6573730.exe PID 972 wrote to memory of 1980 972 v0405136.exe v6573730.exe PID 972 wrote to memory of 1980 972 v0405136.exe v6573730.exe PID 1980 wrote to memory of 3760 1980 v6573730.exe v4446936.exe PID 1980 wrote to memory of 3760 1980 v6573730.exe v4446936.exe PID 1980 wrote to memory of 3760 1980 v6573730.exe v4446936.exe PID 3760 wrote to memory of 1424 3760 v4446936.exe a5163199.exe PID 3760 wrote to memory of 1424 3760 v4446936.exe a5163199.exe PID 3760 wrote to memory of 1272 3760 v4446936.exe b0275657.exe PID 3760 wrote to memory of 1272 3760 v4446936.exe b0275657.exe PID 3760 wrote to memory of 1272 3760 v4446936.exe b0275657.exe PID 1272 wrote to memory of 4828 1272 b0275657.exe AppLaunch.exe PID 1272 wrote to memory of 4828 1272 b0275657.exe AppLaunch.exe PID 1272 wrote to memory of 4828 1272 b0275657.exe AppLaunch.exe PID 1272 wrote to memory of 4828 1272 b0275657.exe AppLaunch.exe PID 1272 wrote to memory of 4828 1272 b0275657.exe AppLaunch.exe PID 1980 wrote to memory of 2788 1980 v6573730.exe c9324746.exe PID 1980 wrote to memory of 2788 1980 v6573730.exe c9324746.exe PID 1980 wrote to memory of 2788 1980 v6573730.exe c9324746.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\02e044f33dcb6f529b9a2cab9399a005.exe"C:\Users\Admin\AppData\Local\Temp\02e044f33dcb6f529b9a2cab9399a005.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0405136.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0405136.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6573730.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6573730.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4446936.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v4446936.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5163199.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a5163199.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1424
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b0275657.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\b0275657.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1272 -s 1526⤵
- Program crash
PID:3640
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9324746.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\c9324746.exe4⤵
- Executes dropped EXE
PID:2788
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1272 -ip 12721⤵PID:116
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
549KB
MD59ec2233496a9c5fd2bce561f5c89ebd2
SHA1620e0258a02689040acd61b3e476effab05d8667
SHA256f7b8e00844d4c777b7103a6bf92cc5a67a495df0d4b4ebe5487ac513a7495cfa
SHA512e60c0c8ed3cc43d149b61f784ef4f12936c95b331468ee6852cfceae246eb944f071bb7ea126f67abdacda558ef8f55218aca5d0788ac92c31babc6ad6677670
-
Filesize
549KB
MD59ec2233496a9c5fd2bce561f5c89ebd2
SHA1620e0258a02689040acd61b3e476effab05d8667
SHA256f7b8e00844d4c777b7103a6bf92cc5a67a495df0d4b4ebe5487ac513a7495cfa
SHA512e60c0c8ed3cc43d149b61f784ef4f12936c95b331468ee6852cfceae246eb944f071bb7ea126f67abdacda558ef8f55218aca5d0788ac92c31babc6ad6677670
-
Filesize
377KB
MD5c7c5c5289d705f59c2a9867efebf8f3a
SHA18a6371d077529d4402de763940bb17f57f5e6e78
SHA256befefd833bca12a1d05fb369848f0e01f9ce520999151822ca84ad1f09005dd8
SHA512c8fad052364b49c1bd2fe8c96265967d393a05bda6f71f62df03733c393534a651ee2abd283e8da2873e85237c82a4e274db2f4d7b1ded8bbf6e54fe4260eee7
-
Filesize
377KB
MD5c7c5c5289d705f59c2a9867efebf8f3a
SHA18a6371d077529d4402de763940bb17f57f5e6e78
SHA256befefd833bca12a1d05fb369848f0e01f9ce520999151822ca84ad1f09005dd8
SHA512c8fad052364b49c1bd2fe8c96265967d393a05bda6f71f62df03733c393534a651ee2abd283e8da2873e85237c82a4e274db2f4d7b1ded8bbf6e54fe4260eee7
-
Filesize
172KB
MD598a688d0cfa03147c49f9c0afdb06c89
SHA1d302b0bf93681315804bc83078d58ff2f65d1fb3
SHA2569ecc9f77511fc7985a02ac17988473c0268a7cbdef2044ae807b66b1c442a44b
SHA5120502453f98bf1150f4a01780fdae6c7677b9f5cacc49dffc69cb60252664d63fab08b9d4534c6df77f2e84de198483eebfe79c0506a936eb4ae1f3dd0aeead19
-
Filesize
172KB
MD598a688d0cfa03147c49f9c0afdb06c89
SHA1d302b0bf93681315804bc83078d58ff2f65d1fb3
SHA2569ecc9f77511fc7985a02ac17988473c0268a7cbdef2044ae807b66b1c442a44b
SHA5120502453f98bf1150f4a01780fdae6c7677b9f5cacc49dffc69cb60252664d63fab08b9d4534c6df77f2e84de198483eebfe79c0506a936eb4ae1f3dd0aeead19
-
Filesize
221KB
MD50aba90473adfd6b70a5238ab204b1957
SHA1cbb3e986a04c46f100088ec3b54c1c3d9ae7ca60
SHA256498bdd35a121545e7057f88db58c2d32f4bc28ae8f821b87b324f20a64158787
SHA512f9bbcde8019532995ecb7bf369b084d1f97926e9d2cfbab54736aff64251ccf8c618bcb6f2980eec6907d43ec009b8669d5691d7748a47c354b46736d8086a97
-
Filesize
221KB
MD50aba90473adfd6b70a5238ab204b1957
SHA1cbb3e986a04c46f100088ec3b54c1c3d9ae7ca60
SHA256498bdd35a121545e7057f88db58c2d32f4bc28ae8f821b87b324f20a64158787
SHA512f9bbcde8019532995ecb7bf369b084d1f97926e9d2cfbab54736aff64251ccf8c618bcb6f2980eec6907d43ec009b8669d5691d7748a47c354b46736d8086a97
-
Filesize
14KB
MD57096f4f04b13a72a77898aa25885228d
SHA1e7a5d2785d2fdaa07af3404aad30a533270bb0d5
SHA256967fec8e4941a64b2a4cff09431b330eb5ad72af68c1898fd8a02b7072f501a7
SHA512a68c595b49774d2d8927f9ba108dabf9eb54e94578547f976d4cdae7249da6db32d7d1477a542f049bdd43dc74c5ea32e1e9bee6d70b59a744c6c23c0b48506e
-
Filesize
14KB
MD57096f4f04b13a72a77898aa25885228d
SHA1e7a5d2785d2fdaa07af3404aad30a533270bb0d5
SHA256967fec8e4941a64b2a4cff09431b330eb5ad72af68c1898fd8a02b7072f501a7
SHA512a68c595b49774d2d8927f9ba108dabf9eb54e94578547f976d4cdae7249da6db32d7d1477a542f049bdd43dc74c5ea32e1e9bee6d70b59a744c6c23c0b48506e
-
Filesize
148KB
MD5319854863f58438f17c56de870e6a868
SHA166817a3aa1996a9fd178818d2c9345526ac2a0d4
SHA2562caca525528e6347200f752bf82d67c5e24818c2717e400eb1994ed585523deb
SHA512c76ff6d790f9222b1d96786de5be3a25098737e9fa7b4e9bb278fbd7deae3f041e8bf37eeeb7b25f4e55dd364de84d4fc29d1b3993b0be59a65d953652a395b4
-
Filesize
148KB
MD5319854863f58438f17c56de870e6a868
SHA166817a3aa1996a9fd178818d2c9345526ac2a0d4
SHA2562caca525528e6347200f752bf82d67c5e24818c2717e400eb1994ed585523deb
SHA512c76ff6d790f9222b1d96786de5be3a25098737e9fa7b4e9bb278fbd7deae3f041e8bf37eeeb7b25f4e55dd364de84d4fc29d1b3993b0be59a65d953652a395b4