File name:

37c785af889624c336e58aecb4aad524.exe

Full analysis: https://app.any.run/tasks/0c3152f4-3096-4b20-906b-39c50449d6e7
Verdict: Malicious activity
Threats:

RedLine Stealer is a malicious program that collects users’ confidential data from browsers, systems, and installed software. It also infects operating systems with other malware.

Analysis date: December 02, 2023, 16:38:23
OS: Windows 7 Professional Service Pack 1 (build: 7601, 64 bit)
Tags:
redline
stealer
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

37C785AF889624C336E58AECB4AAD524

SHA1:

B133D650CEA546B4E095D0DE96EF8C9B03C366F9

SHA256:

6099A5FD14F85882979EEEAF57950A49AC024D9E3F690B716F932FB2267CC48C

SSDEEP:

98304:FsONuxeG0u+hIlbBui8/xhgg2sFTDhYFbuaTkNnXZBY9JmDPqFuqI/1CA+HR9aPa:y9

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Connects to the CnC server

      • AppLaunch.exe (PID: 2216)
    • REDLINE has been detected (YARA)

      • AppLaunch.exe (PID: 2216)
    • Steals credentials from Web Browsers

      • AppLaunch.exe (PID: 2216)
    • REDLINE has been detected (SURICATA)

      • AppLaunch.exe (PID: 2216)
    • Actions looks like stealing of personal data

      • AppLaunch.exe (PID: 2216)
  • SUSPICIOUS

    • Connects to unusual port

      • AppLaunch.exe (PID: 2216)
    • Reads the BIOS version

      • 37c785af889624c336e58aecb4aad524.exe (PID: 2128)
    • Searches for installed software

      • AppLaunch.exe (PID: 2216)
    • Reads browser cookies

      • AppLaunch.exe (PID: 2216)
  • INFO

    • Reads Environment values

      • AppLaunch.exe (PID: 2216)
    • Reads the computer name

      • AppLaunch.exe (PID: 2216)
    • Reads the machine GUID from the registry

      • AppLaunch.exe (PID: 2216)
    • Checks supported languages

      • AppLaunch.exe (PID: 2216)
      • 37c785af889624c336e58aecb4aad524.exe (PID: 2128)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

RedLine

(PID) Process(2216) AppLaunch.exe
C2 (1)82.115.223.72:47009
Botnet01.12.23
Options
ErrorMessage
Keys
XorBunk
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:12:01 11:30:06+01:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.34
CodeSize: 735232
InitializedDataSize: 421376
UninitializedDataSize: -
EntryPoint: 0x2fec0d
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
34
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 37c785af889624c336e58aecb4aad524.exe no specs #REDLINE applaunch.exe

Process information

PID
CMD
Path
Indicators
Parent process
2128"C:\Users\admin\AppData\Local\Temp\37c785af889624c336e58aecb4aad524.exe" C:\Users\admin\AppData\Local\Temp\37c785af889624c336e58aecb4aad524.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\37c785af889624c336e58aecb4aad524.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
2216"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
37c785af889624c336e58aecb4aad524.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET ClickOnce Launch Utility
Exit code:
0
Version:
4.8.3761.0 built by: NET48REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\applaunch.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\mscoree.dll
RedLine
(PID) Process(2216) AppLaunch.exe
C2 (1)82.115.223.72:47009
Botnet01.12.23
Options
ErrorMessage
Keys
XorBunk
Total events
1 795
Read events
1 783
Write events
0
Delete events
12

Modification events

(PID) Process:(2216) AppLaunch.exeKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:RegFilesHash
Value:
DF6F177540D47C987D5F84BCF1A58E4694F792905E6F585D80F558C77AB57A10
(PID) Process:(2216) AppLaunch.exeKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:RegFiles0000
Value:
C:\Users\admin\AppData\Local\Google\Chrome\User Data\lockfile
(PID) Process:(2216) AppLaunch.exeKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:Sequence
Value:
1
(PID) Process:(2216) AppLaunch.exeKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:SessionHash
Value:
CC2CCAB17D0B6EAE31B6D0B643CFA617584A96FC5A81F96C6CC32C39B3441E7C
(PID) Process:(2216) AppLaunch.exeKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:Owner
Value:
A8080000B03799083E25DA01
(PID) Process:(2216) AppLaunch.exeKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete keyName:(default)
Value:
(PID) Process:(2216) AppLaunch.exeKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:RegFilesHash
Value:
D3DC9DB431CF6B7DFE21A0516708C3206D43AF03C29A0B46092DE32A58587C9F
(PID) Process:(2216) AppLaunch.exeKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:RegFiles0000
Value:
C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\lockfile
(PID) Process:(2216) AppLaunch.exeKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:delete valueName:SessionHash
Value:
00B1D819973F57FE278B9A916AA55D71A6F216E4D4107159214465DB939A44C2
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
6
DNS requests
1
Threats
29

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
1956
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:137
whitelisted
324
svchost.exe
224.0.0.252:5355
unknown
2216
AppLaunch.exe
82.115.223.72:47009
Partner LLC
RU
unknown

DNS requests

Domain
IP
Reputation
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

PID
Process
Class
Message
2216
AppLaunch.exe
Potentially Bad Traffic
ET INFO Microsoft net.tcp Connection Initialization Activity
2216
AppLaunch.exe
A Network Trojan was detected
ET MALWARE Redline Stealer TCP CnC Activity
2216
AppLaunch.exe
A Network Trojan was detected
ET MALWARE [ANY.RUN] RedLine Stealer Family Related (MC-NMF Authorization)
2216
AppLaunch.exe
A Network Trojan was detected
ET MALWARE Redline Stealer TCP CnC - Id1Response
2216
AppLaunch.exe
A Network Trojan was detected
ET MALWARE Redline Stealer TCP CnC Activity
2216
AppLaunch.exe
A Network Trojan was detected
ET MALWARE Redline Stealer TCP CnC Activity
2216
AppLaunch.exe
A Network Trojan was detected
ET MALWARE Redline Stealer Family Activity (Response)
2216
AppLaunch.exe
A Network Trojan was detected
ET MALWARE Redline Stealer TCP CnC Activity
2216
AppLaunch.exe
A Network Trojan was detected
ET MALWARE Redline Stealer TCP CnC Activity
2216
AppLaunch.exe
A Network Trojan was detected
ET MALWARE Redline Stealer TCP CnC Activity
No debug info