Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2023 00:00
Static task
static1
Behavioral task
behavioral1
Sample
0bc9e2b03c67de8dd1769c5dadc0505c9b36529b700a780fc9ce100ea1928ca7.exe
Resource
win10v2004-20230220-en
General
-
Target
0bc9e2b03c67de8dd1769c5dadc0505c9b36529b700a780fc9ce100ea1928ca7.exe
-
Size
479KB
-
MD5
52753d04454f5942c57a2f7eb3b079d3
-
SHA1
d4e0acd051b97ef4154afc0f5bab215d93bcc784
-
SHA256
0bc9e2b03c67de8dd1769c5dadc0505c9b36529b700a780fc9ce100ea1928ca7
-
SHA512
76420e5ef5b9f4b5163fba193a8b6631d079cea2a4248374f57ba82b1bdd8a410c84afed991ec47ff6b5de8f1a160f9aeece416b29c9ec785de803e9eefad1ef
-
SSDEEP
6144:Kyy+bnr+ip0yN90QEJqoXr750UcFKDYjk95GtR53VMBSpeFQXxvCkvuqxF3n/:uMrGy90Lq475qFsYz9S2AQh6kWSX/
Malware Config
Extracted
redline
darm
217.196.96.56:4138
-
auth_value
d88ac8ccc04ab9979b04b46313db1648
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection l2573660.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" l2573660.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" l2573660.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" l2573660.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" l2573660.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" l2573660.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation m3963384.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 5036 y0011949.exe 1028 k9045512.exe 2088 l2573660.exe 2476 m3963384.exe 4848 oneetx.exe 2000 oneetx.exe 684 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1232 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features l2573660.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" l2573660.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0bc9e2b03c67de8dd1769c5dadc0505c9b36529b700a780fc9ce100ea1928ca7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0bc9e2b03c67de8dd1769c5dadc0505c9b36529b700a780fc9ce100ea1928ca7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y0011949.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y0011949.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4804 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1028 k9045512.exe 1028 k9045512.exe 2088 l2573660.exe 2088 l2573660.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1028 k9045512.exe Token: SeDebugPrivilege 2088 l2573660.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2476 m3963384.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4272 wrote to memory of 5036 4272 0bc9e2b03c67de8dd1769c5dadc0505c9b36529b700a780fc9ce100ea1928ca7.exe 85 PID 4272 wrote to memory of 5036 4272 0bc9e2b03c67de8dd1769c5dadc0505c9b36529b700a780fc9ce100ea1928ca7.exe 85 PID 4272 wrote to memory of 5036 4272 0bc9e2b03c67de8dd1769c5dadc0505c9b36529b700a780fc9ce100ea1928ca7.exe 85 PID 5036 wrote to memory of 1028 5036 y0011949.exe 86 PID 5036 wrote to memory of 1028 5036 y0011949.exe 86 PID 5036 wrote to memory of 1028 5036 y0011949.exe 86 PID 5036 wrote to memory of 2088 5036 y0011949.exe 93 PID 5036 wrote to memory of 2088 5036 y0011949.exe 93 PID 5036 wrote to memory of 2088 5036 y0011949.exe 93 PID 4272 wrote to memory of 2476 4272 0bc9e2b03c67de8dd1769c5dadc0505c9b36529b700a780fc9ce100ea1928ca7.exe 94 PID 4272 wrote to memory of 2476 4272 0bc9e2b03c67de8dd1769c5dadc0505c9b36529b700a780fc9ce100ea1928ca7.exe 94 PID 4272 wrote to memory of 2476 4272 0bc9e2b03c67de8dd1769c5dadc0505c9b36529b700a780fc9ce100ea1928ca7.exe 94 PID 2476 wrote to memory of 4848 2476 m3963384.exe 95 PID 2476 wrote to memory of 4848 2476 m3963384.exe 95 PID 2476 wrote to memory of 4848 2476 m3963384.exe 95 PID 4848 wrote to memory of 4804 4848 oneetx.exe 96 PID 4848 wrote to memory of 4804 4848 oneetx.exe 96 PID 4848 wrote to memory of 4804 4848 oneetx.exe 96 PID 4848 wrote to memory of 4776 4848 oneetx.exe 98 PID 4848 wrote to memory of 4776 4848 oneetx.exe 98 PID 4848 wrote to memory of 4776 4848 oneetx.exe 98 PID 4776 wrote to memory of 1336 4776 cmd.exe 100 PID 4776 wrote to memory of 1336 4776 cmd.exe 100 PID 4776 wrote to memory of 1336 4776 cmd.exe 100 PID 4776 wrote to memory of 1644 4776 cmd.exe 101 PID 4776 wrote to memory of 1644 4776 cmd.exe 101 PID 4776 wrote to memory of 1644 4776 cmd.exe 101 PID 4776 wrote to memory of 4548 4776 cmd.exe 102 PID 4776 wrote to memory of 4548 4776 cmd.exe 102 PID 4776 wrote to memory of 4548 4776 cmd.exe 102 PID 4776 wrote to memory of 1896 4776 cmd.exe 103 PID 4776 wrote to memory of 1896 4776 cmd.exe 103 PID 4776 wrote to memory of 1896 4776 cmd.exe 103 PID 4776 wrote to memory of 3676 4776 cmd.exe 104 PID 4776 wrote to memory of 3676 4776 cmd.exe 104 PID 4776 wrote to memory of 3676 4776 cmd.exe 104 PID 4776 wrote to memory of 1408 4776 cmd.exe 105 PID 4776 wrote to memory of 1408 4776 cmd.exe 105 PID 4776 wrote to memory of 1408 4776 cmd.exe 105 PID 4848 wrote to memory of 1232 4848 oneetx.exe 107 PID 4848 wrote to memory of 1232 4848 oneetx.exe 107 PID 4848 wrote to memory of 1232 4848 oneetx.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bc9e2b03c67de8dd1769c5dadc0505c9b36529b700a780fc9ce100ea1928ca7.exe"C:\Users\Admin\AppData\Local\Temp\0bc9e2b03c67de8dd1769c5dadc0505c9b36529b700a780fc9ce100ea1928ca7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0011949.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0011949.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9045512.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9045512.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1028
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2573660.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2573660.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m3963384.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m3963384.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4804
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1336
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1644
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4548
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1896
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:3676
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:1408
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1232
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2000
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:684
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD5b969c6cb4c951469f8c60abdf0c3f2b2
SHA1dc1bcc3ea42e2ca90b9b6ea23ec0e228837a8029
SHA2569457e4deaaaf1f527dee851f009cd2129be52fbf8e1abd72b4f9cfb074d7e00e
SHA51215bf861f60193bf31eb1824b18eb898ee763902effaa6cdaa38edf4d8d3bb20ac6bbcc645e86fb452de9edbcc8d0939020d7354422d07028a608eb84f8bd963c
-
Filesize
205KB
MD5b969c6cb4c951469f8c60abdf0c3f2b2
SHA1dc1bcc3ea42e2ca90b9b6ea23ec0e228837a8029
SHA2569457e4deaaaf1f527dee851f009cd2129be52fbf8e1abd72b4f9cfb074d7e00e
SHA51215bf861f60193bf31eb1824b18eb898ee763902effaa6cdaa38edf4d8d3bb20ac6bbcc645e86fb452de9edbcc8d0939020d7354422d07028a608eb84f8bd963c
-
Filesize
307KB
MD57ca7c1a1e3520b42ee24d3b82c215022
SHA11b2394ce0934a55e09f29874d70a41f80943608b
SHA256127723360773375a1005cb7ffdbb02b75f03e7f7a488e47fc79f18439c3371ba
SHA5120e115f5b0af7d7dbced850c883ef63fcac7bf4cef8d7897c9dce247ff0220e2c3273a0ce57ee426487276fdc85ac6198f83d7123576320ca4083ab5ad85c5feb
-
Filesize
307KB
MD57ca7c1a1e3520b42ee24d3b82c215022
SHA11b2394ce0934a55e09f29874d70a41f80943608b
SHA256127723360773375a1005cb7ffdbb02b75f03e7f7a488e47fc79f18439c3371ba
SHA5120e115f5b0af7d7dbced850c883ef63fcac7bf4cef8d7897c9dce247ff0220e2c3273a0ce57ee426487276fdc85ac6198f83d7123576320ca4083ab5ad85c5feb
-
Filesize
169KB
MD5df2e676c830f164d9f214c8959e674a5
SHA1590743303ba64d989b5e8dc0a4779b87c2a05be7
SHA256d2c29095234fb20d37c2763193d3b21ca708f11ec501db6c6c52b797752e9dc1
SHA512e743b3683816475376d1e985120d96ba3b82497389cc2eef156583de8f83fdd31d0fa9712ca69a2e2ec35fa32fb240f78206d311fcfaf55000976b318155bfd0
-
Filesize
169KB
MD5df2e676c830f164d9f214c8959e674a5
SHA1590743303ba64d989b5e8dc0a4779b87c2a05be7
SHA256d2c29095234fb20d37c2763193d3b21ca708f11ec501db6c6c52b797752e9dc1
SHA512e743b3683816475376d1e985120d96ba3b82497389cc2eef156583de8f83fdd31d0fa9712ca69a2e2ec35fa32fb240f78206d311fcfaf55000976b318155bfd0
-
Filesize
178KB
MD5f8f35ec329aa90110d896b3d03794980
SHA15b9ca7c9834d5fba3a78a9188096aa424ad2210b
SHA25691d4da2202cacc0d53513d7d1061e19e33d20654aba97e45565b2a4839e1d389
SHA5120f535ecdd7bee747d51d1f4923052dbcc91dcb520c34956a1e538dc227277764b7455a23361ad8c9f9df8225e0ab1eeb56c2d76dee697025dff36f7dcd32c469
-
Filesize
178KB
MD5f8f35ec329aa90110d896b3d03794980
SHA15b9ca7c9834d5fba3a78a9188096aa424ad2210b
SHA25691d4da2202cacc0d53513d7d1061e19e33d20654aba97e45565b2a4839e1d389
SHA5120f535ecdd7bee747d51d1f4923052dbcc91dcb520c34956a1e538dc227277764b7455a23361ad8c9f9df8225e0ab1eeb56c2d76dee697025dff36f7dcd32c469
-
Filesize
205KB
MD5b969c6cb4c951469f8c60abdf0c3f2b2
SHA1dc1bcc3ea42e2ca90b9b6ea23ec0e228837a8029
SHA2569457e4deaaaf1f527dee851f009cd2129be52fbf8e1abd72b4f9cfb074d7e00e
SHA51215bf861f60193bf31eb1824b18eb898ee763902effaa6cdaa38edf4d8d3bb20ac6bbcc645e86fb452de9edbcc8d0939020d7354422d07028a608eb84f8bd963c
-
Filesize
205KB
MD5b969c6cb4c951469f8c60abdf0c3f2b2
SHA1dc1bcc3ea42e2ca90b9b6ea23ec0e228837a8029
SHA2569457e4deaaaf1f527dee851f009cd2129be52fbf8e1abd72b4f9cfb074d7e00e
SHA51215bf861f60193bf31eb1824b18eb898ee763902effaa6cdaa38edf4d8d3bb20ac6bbcc645e86fb452de9edbcc8d0939020d7354422d07028a608eb84f8bd963c
-
Filesize
205KB
MD5b969c6cb4c951469f8c60abdf0c3f2b2
SHA1dc1bcc3ea42e2ca90b9b6ea23ec0e228837a8029
SHA2569457e4deaaaf1f527dee851f009cd2129be52fbf8e1abd72b4f9cfb074d7e00e
SHA51215bf861f60193bf31eb1824b18eb898ee763902effaa6cdaa38edf4d8d3bb20ac6bbcc645e86fb452de9edbcc8d0939020d7354422d07028a608eb84f8bd963c
-
Filesize
205KB
MD5b969c6cb4c951469f8c60abdf0c3f2b2
SHA1dc1bcc3ea42e2ca90b9b6ea23ec0e228837a8029
SHA2569457e4deaaaf1f527dee851f009cd2129be52fbf8e1abd72b4f9cfb074d7e00e
SHA51215bf861f60193bf31eb1824b18eb898ee763902effaa6cdaa38edf4d8d3bb20ac6bbcc645e86fb452de9edbcc8d0939020d7354422d07028a608eb84f8bd963c
-
Filesize
205KB
MD5b969c6cb4c951469f8c60abdf0c3f2b2
SHA1dc1bcc3ea42e2ca90b9b6ea23ec0e228837a8029
SHA2569457e4deaaaf1f527dee851f009cd2129be52fbf8e1abd72b4f9cfb074d7e00e
SHA51215bf861f60193bf31eb1824b18eb898ee763902effaa6cdaa38edf4d8d3bb20ac6bbcc645e86fb452de9edbcc8d0939020d7354422d07028a608eb84f8bd963c
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5