Analysis
-
max time kernel
87s -
max time network
90s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13-06-2023 13:47
Static task
static1
Behavioral task
behavioral1
Sample
203554d11cd8d9a8fcad90f71604ed56e55fc587e0f10528e3a711117106e097.exe
Resource
win7-20230220-en
General
-
Target
203554d11cd8d9a8fcad90f71604ed56e55fc587e0f10528e3a711117106e097.exe
-
Size
785KB
-
MD5
35699ee3be7623f358c8025e1be611b1
-
SHA1
99e8cacaf28ff00088e3db272a4cdae88377d27b
-
SHA256
203554d11cd8d9a8fcad90f71604ed56e55fc587e0f10528e3a711117106e097
-
SHA512
09fb9defbd5c84841e009655568a84dcc6a47e438c268946f01eda7226ef56aa1694e4635f1ce89f35d59429c6411d8bc6919886bf28f31c78766669e51ce300
-
SSDEEP
12288:rMrpy90QXmu+J5dRE9kUo6V8/x/owmJ6IbQhjPOFKcITVGRv0LWDDAPmuR51:myLYwSvNKwy1QhLOYxGmLW4P5F
Malware Config
Extracted
redline
maxi
83.97.73.126:19046
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
Processes:
AppLaunch.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" AppLaunch.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" AppLaunch.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" AppLaunch.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
Processes:
v1168060.exev2592624.exea1576033.exeb0427765.exepid process 1312 v1168060.exe 1236 v2592624.exe 1480 a1576033.exe 704 b0427765.exe -
Loads dropped DLL 8 IoCs
Processes:
203554d11cd8d9a8fcad90f71604ed56e55fc587e0f10528e3a711117106e097.exev1168060.exev2592624.exea1576033.exeb0427765.exepid process 916 203554d11cd8d9a8fcad90f71604ed56e55fc587e0f10528e3a711117106e097.exe 1312 v1168060.exe 1312 v1168060.exe 1236 v2592624.exe 1236 v2592624.exe 1480 a1576033.exe 1236 v2592624.exe 704 b0427765.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
203554d11cd8d9a8fcad90f71604ed56e55fc587e0f10528e3a711117106e097.exev1168060.exev2592624.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 203554d11cd8d9a8fcad90f71604ed56e55fc587e0f10528e3a711117106e097.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1168060.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v1168060.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2592624.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v2592624.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 203554d11cd8d9a8fcad90f71604ed56e55fc587e0f10528e3a711117106e097.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
a1576033.exedescription pid process target process PID 1480 set thread context of 1684 1480 a1576033.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
AppLaunch.exepid process 1684 AppLaunch.exe 1684 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AppLaunch.exedescription pid process Token: SeDebugPrivilege 1684 AppLaunch.exe -
Suspicious use of WriteProcessMemory 37 IoCs
Processes:
203554d11cd8d9a8fcad90f71604ed56e55fc587e0f10528e3a711117106e097.exev1168060.exev2592624.exea1576033.exedescription pid process target process PID 916 wrote to memory of 1312 916 203554d11cd8d9a8fcad90f71604ed56e55fc587e0f10528e3a711117106e097.exe v1168060.exe PID 916 wrote to memory of 1312 916 203554d11cd8d9a8fcad90f71604ed56e55fc587e0f10528e3a711117106e097.exe v1168060.exe PID 916 wrote to memory of 1312 916 203554d11cd8d9a8fcad90f71604ed56e55fc587e0f10528e3a711117106e097.exe v1168060.exe PID 916 wrote to memory of 1312 916 203554d11cd8d9a8fcad90f71604ed56e55fc587e0f10528e3a711117106e097.exe v1168060.exe PID 916 wrote to memory of 1312 916 203554d11cd8d9a8fcad90f71604ed56e55fc587e0f10528e3a711117106e097.exe v1168060.exe PID 916 wrote to memory of 1312 916 203554d11cd8d9a8fcad90f71604ed56e55fc587e0f10528e3a711117106e097.exe v1168060.exe PID 916 wrote to memory of 1312 916 203554d11cd8d9a8fcad90f71604ed56e55fc587e0f10528e3a711117106e097.exe v1168060.exe PID 1312 wrote to memory of 1236 1312 v1168060.exe v2592624.exe PID 1312 wrote to memory of 1236 1312 v1168060.exe v2592624.exe PID 1312 wrote to memory of 1236 1312 v1168060.exe v2592624.exe PID 1312 wrote to memory of 1236 1312 v1168060.exe v2592624.exe PID 1312 wrote to memory of 1236 1312 v1168060.exe v2592624.exe PID 1312 wrote to memory of 1236 1312 v1168060.exe v2592624.exe PID 1312 wrote to memory of 1236 1312 v1168060.exe v2592624.exe PID 1236 wrote to memory of 1480 1236 v2592624.exe a1576033.exe PID 1236 wrote to memory of 1480 1236 v2592624.exe a1576033.exe PID 1236 wrote to memory of 1480 1236 v2592624.exe a1576033.exe PID 1236 wrote to memory of 1480 1236 v2592624.exe a1576033.exe PID 1236 wrote to memory of 1480 1236 v2592624.exe a1576033.exe PID 1236 wrote to memory of 1480 1236 v2592624.exe a1576033.exe PID 1236 wrote to memory of 1480 1236 v2592624.exe a1576033.exe PID 1480 wrote to memory of 1684 1480 a1576033.exe AppLaunch.exe PID 1480 wrote to memory of 1684 1480 a1576033.exe AppLaunch.exe PID 1480 wrote to memory of 1684 1480 a1576033.exe AppLaunch.exe PID 1480 wrote to memory of 1684 1480 a1576033.exe AppLaunch.exe PID 1480 wrote to memory of 1684 1480 a1576033.exe AppLaunch.exe PID 1480 wrote to memory of 1684 1480 a1576033.exe AppLaunch.exe PID 1480 wrote to memory of 1684 1480 a1576033.exe AppLaunch.exe PID 1480 wrote to memory of 1684 1480 a1576033.exe AppLaunch.exe PID 1480 wrote to memory of 1684 1480 a1576033.exe AppLaunch.exe PID 1236 wrote to memory of 704 1236 v2592624.exe b0427765.exe PID 1236 wrote to memory of 704 1236 v2592624.exe b0427765.exe PID 1236 wrote to memory of 704 1236 v2592624.exe b0427765.exe PID 1236 wrote to memory of 704 1236 v2592624.exe b0427765.exe PID 1236 wrote to memory of 704 1236 v2592624.exe b0427765.exe PID 1236 wrote to memory of 704 1236 v2592624.exe b0427765.exe PID 1236 wrote to memory of 704 1236 v2592624.exe b0427765.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\203554d11cd8d9a8fcad90f71604ed56e55fc587e0f10528e3a711117106e097.exe"C:\Users\Admin\AppData\Local\Temp\203554d11cd8d9a8fcad90f71604ed56e55fc587e0f10528e3a711117106e097.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1168060.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1168060.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2592624.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2592624.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1576033.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1576033.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0427765.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0427765.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:704
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1168060.exeFilesize
451KB
MD5b053b8e3b6cb33aada9cd590b0d4b8c2
SHA1c283d232f915130ff458568a0897da6e0d9b7ec9
SHA2562688c7b4750066cc1556c53be971dfaa63d8e21116792749f75053b6fc275a19
SHA51284a6e0ba8bddf3d10791f185b2e6b710af1a985089e76c66ae7453d5f456a15f51ab7e1b7639c4edba2ca4cb6aa4739a89cb0d37d9d2acd38982867352409a0f
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1168060.exeFilesize
451KB
MD5b053b8e3b6cb33aada9cd590b0d4b8c2
SHA1c283d232f915130ff458568a0897da6e0d9b7ec9
SHA2562688c7b4750066cc1556c53be971dfaa63d8e21116792749f75053b6fc275a19
SHA51284a6e0ba8bddf3d10791f185b2e6b710af1a985089e76c66ae7453d5f456a15f51ab7e1b7639c4edba2ca4cb6aa4739a89cb0d37d9d2acd38982867352409a0f
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2592624.exeFilesize
280KB
MD5fa266689b72cc97c367de0554489ff85
SHA102bf7a495c7eeaf69c8cd34e112c6d9a4fc79ce0
SHA256f2927a8ef66e80647cb542817375fff04f4c6cb5d6e44dc9ca945996d971b6e7
SHA51291523293677127596443bd113421a03797604390cec5ec9ede68bdd4ffbcbf213c4e666bc0162d724fe515dc095a72ccd76b33792993ab7ac75dedf86afcd150
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2592624.exeFilesize
280KB
MD5fa266689b72cc97c367de0554489ff85
SHA102bf7a495c7eeaf69c8cd34e112c6d9a4fc79ce0
SHA256f2927a8ef66e80647cb542817375fff04f4c6cb5d6e44dc9ca945996d971b6e7
SHA51291523293677127596443bd113421a03797604390cec5ec9ede68bdd4ffbcbf213c4e666bc0162d724fe515dc095a72ccd76b33792993ab7ac75dedf86afcd150
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1576033.exeFilesize
157KB
MD5fd2f85d69225e85749f275d90a346965
SHA18d917ea75c258394b05dc6c45257b9625f969a29
SHA25600b53e80b38522c71674e7763e41f3d9e43709f9de7b887369f308f458ebde17
SHA512ef3a2542b1bcfd3b9dc78edd506afe5b2545f7e7abe8fb521ce4ff675966d0f8f8ab78b124641964c1460dc085c1f121d70787c04831266c330176f049d1f9af
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1576033.exeFilesize
157KB
MD5fd2f85d69225e85749f275d90a346965
SHA18d917ea75c258394b05dc6c45257b9625f969a29
SHA25600b53e80b38522c71674e7763e41f3d9e43709f9de7b887369f308f458ebde17
SHA512ef3a2542b1bcfd3b9dc78edd506afe5b2545f7e7abe8fb521ce4ff675966d0f8f8ab78b124641964c1460dc085c1f121d70787c04831266c330176f049d1f9af
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0427765.exeFilesize
168KB
MD5b5c246c78c9c6fd044de60b38b709dca
SHA1cd3bc442247a1426913f80fa570576ddd391bcfd
SHA2561a0625284d2526b9bc9708cb0cfcf7b7e74bfb7c2660bcfddaadc5c82406afbc
SHA5123285c07109cdbe2ec39b214f55f812ae84ac33ee78cb56f806de35ef84db284389e3bcd31952841d749df25335471c006c25147fc0297436f61aed888102ec8c
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0427765.exeFilesize
168KB
MD5b5c246c78c9c6fd044de60b38b709dca
SHA1cd3bc442247a1426913f80fa570576ddd391bcfd
SHA2561a0625284d2526b9bc9708cb0cfcf7b7e74bfb7c2660bcfddaadc5c82406afbc
SHA5123285c07109cdbe2ec39b214f55f812ae84ac33ee78cb56f806de35ef84db284389e3bcd31952841d749df25335471c006c25147fc0297436f61aed888102ec8c
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1168060.exeFilesize
451KB
MD5b053b8e3b6cb33aada9cd590b0d4b8c2
SHA1c283d232f915130ff458568a0897da6e0d9b7ec9
SHA2562688c7b4750066cc1556c53be971dfaa63d8e21116792749f75053b6fc275a19
SHA51284a6e0ba8bddf3d10791f185b2e6b710af1a985089e76c66ae7453d5f456a15f51ab7e1b7639c4edba2ca4cb6aa4739a89cb0d37d9d2acd38982867352409a0f
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1168060.exeFilesize
451KB
MD5b053b8e3b6cb33aada9cd590b0d4b8c2
SHA1c283d232f915130ff458568a0897da6e0d9b7ec9
SHA2562688c7b4750066cc1556c53be971dfaa63d8e21116792749f75053b6fc275a19
SHA51284a6e0ba8bddf3d10791f185b2e6b710af1a985089e76c66ae7453d5f456a15f51ab7e1b7639c4edba2ca4cb6aa4739a89cb0d37d9d2acd38982867352409a0f
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2592624.exeFilesize
280KB
MD5fa266689b72cc97c367de0554489ff85
SHA102bf7a495c7eeaf69c8cd34e112c6d9a4fc79ce0
SHA256f2927a8ef66e80647cb542817375fff04f4c6cb5d6e44dc9ca945996d971b6e7
SHA51291523293677127596443bd113421a03797604390cec5ec9ede68bdd4ffbcbf213c4e666bc0162d724fe515dc095a72ccd76b33792993ab7ac75dedf86afcd150
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2592624.exeFilesize
280KB
MD5fa266689b72cc97c367de0554489ff85
SHA102bf7a495c7eeaf69c8cd34e112c6d9a4fc79ce0
SHA256f2927a8ef66e80647cb542817375fff04f4c6cb5d6e44dc9ca945996d971b6e7
SHA51291523293677127596443bd113421a03797604390cec5ec9ede68bdd4ffbcbf213c4e666bc0162d724fe515dc095a72ccd76b33792993ab7ac75dedf86afcd150
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1576033.exeFilesize
157KB
MD5fd2f85d69225e85749f275d90a346965
SHA18d917ea75c258394b05dc6c45257b9625f969a29
SHA25600b53e80b38522c71674e7763e41f3d9e43709f9de7b887369f308f458ebde17
SHA512ef3a2542b1bcfd3b9dc78edd506afe5b2545f7e7abe8fb521ce4ff675966d0f8f8ab78b124641964c1460dc085c1f121d70787c04831266c330176f049d1f9af
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1576033.exeFilesize
157KB
MD5fd2f85d69225e85749f275d90a346965
SHA18d917ea75c258394b05dc6c45257b9625f969a29
SHA25600b53e80b38522c71674e7763e41f3d9e43709f9de7b887369f308f458ebde17
SHA512ef3a2542b1bcfd3b9dc78edd506afe5b2545f7e7abe8fb521ce4ff675966d0f8f8ab78b124641964c1460dc085c1f121d70787c04831266c330176f049d1f9af
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0427765.exeFilesize
168KB
MD5b5c246c78c9c6fd044de60b38b709dca
SHA1cd3bc442247a1426913f80fa570576ddd391bcfd
SHA2561a0625284d2526b9bc9708cb0cfcf7b7e74bfb7c2660bcfddaadc5c82406afbc
SHA5123285c07109cdbe2ec39b214f55f812ae84ac33ee78cb56f806de35ef84db284389e3bcd31952841d749df25335471c006c25147fc0297436f61aed888102ec8c
-
\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0427765.exeFilesize
168KB
MD5b5c246c78c9c6fd044de60b38b709dca
SHA1cd3bc442247a1426913f80fa570576ddd391bcfd
SHA2561a0625284d2526b9bc9708cb0cfcf7b7e74bfb7c2660bcfddaadc5c82406afbc
SHA5123285c07109cdbe2ec39b214f55f812ae84ac33ee78cb56f806de35ef84db284389e3bcd31952841d749df25335471c006c25147fc0297436f61aed888102ec8c
-
memory/704-99-0x00000000010F0000-0x000000000111E000-memory.dmpFilesize
184KB
-
memory/704-100-0x0000000000330000-0x0000000000336000-memory.dmpFilesize
24KB
-
memory/704-101-0x0000000000EA0000-0x0000000000EE0000-memory.dmpFilesize
256KB
-
memory/1684-84-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/1684-85-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/1684-89-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmpFilesize
4KB
-
memory/1684-91-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB
-
memory/1684-92-0x0000000000400000-0x000000000040A000-memory.dmpFilesize
40KB