Analysis
-
max time kernel
134s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2023, 00:12
Static task
static1
Behavioral task
behavioral1
Sample
1367b78b3b550c19d8ddd7a32dcecfe7ffb071f675e2c916e130714165288925.exe
Resource
win10v2004-20230220-en
General
-
Target
1367b78b3b550c19d8ddd7a32dcecfe7ffb071f675e2c916e130714165288925.exe
-
Size
479KB
-
MD5
f64992a27d39a53d251ea735a8f61a2d
-
SHA1
221bce2d155379bd4b4a205081b9b21994d8c188
-
SHA256
1367b78b3b550c19d8ddd7a32dcecfe7ffb071f675e2c916e130714165288925
-
SHA512
7492cc15fabfec1faa3b5d0e7ae2370223389fbbefd8ca4607665d3b453482a65dc3594f3c0eb5473919a2c90d5c4b83deb21cb20f7d87a1300f9ddb6016ff57
-
SSDEEP
12288:yMr8y90D8HyRlkRvMwFm6oWzEIdzOdZv:CyY8HEKU6oWgI4X
Malware Config
Extracted
redline
daris
217.196.96.56:4138
-
auth_value
3491f24ae0250969cd45ce4b3fe77549
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" l6764084.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" l6764084.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" l6764084.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" l6764084.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" l6764084.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection l6764084.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation m1219932.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 4188 y4277021.exe 2240 k7346676.exe 208 l6764084.exe 3092 m1219932.exe 1276 oneetx.exe 904 oneetx.exe 4256 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4504 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features l6764084.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" l6764084.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1367b78b3b550c19d8ddd7a32dcecfe7ffb071f675e2c916e130714165288925.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y4277021.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y4277021.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1367b78b3b550c19d8ddd7a32dcecfe7ffb071f675e2c916e130714165288925.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3480 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2240 k7346676.exe 2240 k7346676.exe 208 l6764084.exe 208 l6764084.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2240 k7346676.exe Token: SeDebugPrivilege 208 l6764084.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3092 m1219932.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2516 wrote to memory of 4188 2516 1367b78b3b550c19d8ddd7a32dcecfe7ffb071f675e2c916e130714165288925.exe 85 PID 2516 wrote to memory of 4188 2516 1367b78b3b550c19d8ddd7a32dcecfe7ffb071f675e2c916e130714165288925.exe 85 PID 2516 wrote to memory of 4188 2516 1367b78b3b550c19d8ddd7a32dcecfe7ffb071f675e2c916e130714165288925.exe 85 PID 4188 wrote to memory of 2240 4188 y4277021.exe 86 PID 4188 wrote to memory of 2240 4188 y4277021.exe 86 PID 4188 wrote to memory of 2240 4188 y4277021.exe 86 PID 4188 wrote to memory of 208 4188 y4277021.exe 87 PID 4188 wrote to memory of 208 4188 y4277021.exe 87 PID 4188 wrote to memory of 208 4188 y4277021.exe 87 PID 2516 wrote to memory of 3092 2516 1367b78b3b550c19d8ddd7a32dcecfe7ffb071f675e2c916e130714165288925.exe 90 PID 2516 wrote to memory of 3092 2516 1367b78b3b550c19d8ddd7a32dcecfe7ffb071f675e2c916e130714165288925.exe 90 PID 2516 wrote to memory of 3092 2516 1367b78b3b550c19d8ddd7a32dcecfe7ffb071f675e2c916e130714165288925.exe 90 PID 3092 wrote to memory of 1276 3092 m1219932.exe 91 PID 3092 wrote to memory of 1276 3092 m1219932.exe 91 PID 3092 wrote to memory of 1276 3092 m1219932.exe 91 PID 1276 wrote to memory of 3480 1276 oneetx.exe 92 PID 1276 wrote to memory of 3480 1276 oneetx.exe 92 PID 1276 wrote to memory of 3480 1276 oneetx.exe 92 PID 1276 wrote to memory of 3824 1276 oneetx.exe 94 PID 1276 wrote to memory of 3824 1276 oneetx.exe 94 PID 1276 wrote to memory of 3824 1276 oneetx.exe 94 PID 3824 wrote to memory of 2944 3824 cmd.exe 96 PID 3824 wrote to memory of 2944 3824 cmd.exe 96 PID 3824 wrote to memory of 2944 3824 cmd.exe 96 PID 3824 wrote to memory of 1896 3824 cmd.exe 97 PID 3824 wrote to memory of 1896 3824 cmd.exe 97 PID 3824 wrote to memory of 1896 3824 cmd.exe 97 PID 3824 wrote to memory of 2612 3824 cmd.exe 98 PID 3824 wrote to memory of 2612 3824 cmd.exe 98 PID 3824 wrote to memory of 2612 3824 cmd.exe 98 PID 3824 wrote to memory of 3192 3824 cmd.exe 99 PID 3824 wrote to memory of 3192 3824 cmd.exe 99 PID 3824 wrote to memory of 3192 3824 cmd.exe 99 PID 3824 wrote to memory of 4900 3824 cmd.exe 100 PID 3824 wrote to memory of 4900 3824 cmd.exe 100 PID 3824 wrote to memory of 4900 3824 cmd.exe 100 PID 3824 wrote to memory of 984 3824 cmd.exe 101 PID 3824 wrote to memory of 984 3824 cmd.exe 101 PID 3824 wrote to memory of 984 3824 cmd.exe 101 PID 1276 wrote to memory of 4504 1276 oneetx.exe 104 PID 1276 wrote to memory of 4504 1276 oneetx.exe 104 PID 1276 wrote to memory of 4504 1276 oneetx.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\1367b78b3b550c19d8ddd7a32dcecfe7ffb071f675e2c916e130714165288925.exe"C:\Users\Admin\AppData\Local\Temp\1367b78b3b550c19d8ddd7a32dcecfe7ffb071f675e2c916e130714165288925.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4277021.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4277021.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7346676.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7346676.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2240
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6764084.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6764084.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:208
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m1219932.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m1219932.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3480
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2944
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1896
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:2612
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3192
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4900
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:984
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4504
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:904
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4256
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD552f737653e9a8ce5796a7b5aa65e611a
SHA10324b85f12e311ff9f09ea68e79d6ed6b0238248
SHA2560a262b41b7d26c1aab5024170a31e2736a84fe217ceddb9a650d7a6f5ae960d7
SHA5123f0334ce763d939577bc41ad778def94af1cda7d11ab0be65264c450dc479466e8cd4bdd95db8e4ef5cb5ef3012a29f0c58013a30d4894054dce16fc1439ff01
-
Filesize
205KB
MD552f737653e9a8ce5796a7b5aa65e611a
SHA10324b85f12e311ff9f09ea68e79d6ed6b0238248
SHA2560a262b41b7d26c1aab5024170a31e2736a84fe217ceddb9a650d7a6f5ae960d7
SHA5123f0334ce763d939577bc41ad778def94af1cda7d11ab0be65264c450dc479466e8cd4bdd95db8e4ef5cb5ef3012a29f0c58013a30d4894054dce16fc1439ff01
-
Filesize
308KB
MD5617c4f9d5daf621f4dbd900874eb4ead
SHA17bb01ec117a616aeaab97d041e2cd32ada10d271
SHA25601c3575fd82c7ba0d7748edf9342f3f78b17850ab621c96d4dd9754f6b09e51b
SHA512ac435cf30dd9c4e56034e68e3171b42345ac9c12cb0e6147861114bec8554164972cfd8a85a7147d9b47cbde76cce2d2a3b6bf4fb3015c088b579ddfea9975d1
-
Filesize
308KB
MD5617c4f9d5daf621f4dbd900874eb4ead
SHA17bb01ec117a616aeaab97d041e2cd32ada10d271
SHA25601c3575fd82c7ba0d7748edf9342f3f78b17850ab621c96d4dd9754f6b09e51b
SHA512ac435cf30dd9c4e56034e68e3171b42345ac9c12cb0e6147861114bec8554164972cfd8a85a7147d9b47cbde76cce2d2a3b6bf4fb3015c088b579ddfea9975d1
-
Filesize
168KB
MD577273492c08dcd33f9d02bc36d18a4d0
SHA1882c11f02727dcbe7b72c2699c2cc05e1e9b0ed6
SHA25608c1d8b6527350db4dfeb9b76af15994a7596715179ade13cdb82cd0787cd820
SHA5122e39047d02af4df26b1544d083b8add8ab0bac18b8b48593eeb0fc2d93eea357c832597a4ee6b6ef50a35956858ad4f0ff10b414492b86e3fcf3b45aa7511a02
-
Filesize
168KB
MD577273492c08dcd33f9d02bc36d18a4d0
SHA1882c11f02727dcbe7b72c2699c2cc05e1e9b0ed6
SHA25608c1d8b6527350db4dfeb9b76af15994a7596715179ade13cdb82cd0787cd820
SHA5122e39047d02af4df26b1544d083b8add8ab0bac18b8b48593eeb0fc2d93eea357c832597a4ee6b6ef50a35956858ad4f0ff10b414492b86e3fcf3b45aa7511a02
-
Filesize
178KB
MD52e43429819432f7da6419c52a2f67448
SHA1e1f8853ae4205c670475f9357fb8affa7c94fb32
SHA256b69b10807c79b437b9674e9cec0baf7e26b19723a447cc11bc303de636f4bd90
SHA5126d547959c909663c7573c4a67544e1fd6df146e13ded9fae5e9db355c7e50d0dfb27deb5b9964e4507c39a17e84586eef91244575d88c7b1d6fa58d849954809
-
Filesize
178KB
MD52e43429819432f7da6419c52a2f67448
SHA1e1f8853ae4205c670475f9357fb8affa7c94fb32
SHA256b69b10807c79b437b9674e9cec0baf7e26b19723a447cc11bc303de636f4bd90
SHA5126d547959c909663c7573c4a67544e1fd6df146e13ded9fae5e9db355c7e50d0dfb27deb5b9964e4507c39a17e84586eef91244575d88c7b1d6fa58d849954809
-
Filesize
205KB
MD552f737653e9a8ce5796a7b5aa65e611a
SHA10324b85f12e311ff9f09ea68e79d6ed6b0238248
SHA2560a262b41b7d26c1aab5024170a31e2736a84fe217ceddb9a650d7a6f5ae960d7
SHA5123f0334ce763d939577bc41ad778def94af1cda7d11ab0be65264c450dc479466e8cd4bdd95db8e4ef5cb5ef3012a29f0c58013a30d4894054dce16fc1439ff01
-
Filesize
205KB
MD552f737653e9a8ce5796a7b5aa65e611a
SHA10324b85f12e311ff9f09ea68e79d6ed6b0238248
SHA2560a262b41b7d26c1aab5024170a31e2736a84fe217ceddb9a650d7a6f5ae960d7
SHA5123f0334ce763d939577bc41ad778def94af1cda7d11ab0be65264c450dc479466e8cd4bdd95db8e4ef5cb5ef3012a29f0c58013a30d4894054dce16fc1439ff01
-
Filesize
205KB
MD552f737653e9a8ce5796a7b5aa65e611a
SHA10324b85f12e311ff9f09ea68e79d6ed6b0238248
SHA2560a262b41b7d26c1aab5024170a31e2736a84fe217ceddb9a650d7a6f5ae960d7
SHA5123f0334ce763d939577bc41ad778def94af1cda7d11ab0be65264c450dc479466e8cd4bdd95db8e4ef5cb5ef3012a29f0c58013a30d4894054dce16fc1439ff01
-
Filesize
205KB
MD552f737653e9a8ce5796a7b5aa65e611a
SHA10324b85f12e311ff9f09ea68e79d6ed6b0238248
SHA2560a262b41b7d26c1aab5024170a31e2736a84fe217ceddb9a650d7a6f5ae960d7
SHA5123f0334ce763d939577bc41ad778def94af1cda7d11ab0be65264c450dc479466e8cd4bdd95db8e4ef5cb5ef3012a29f0c58013a30d4894054dce16fc1439ff01
-
Filesize
205KB
MD552f737653e9a8ce5796a7b5aa65e611a
SHA10324b85f12e311ff9f09ea68e79d6ed6b0238248
SHA2560a262b41b7d26c1aab5024170a31e2736a84fe217ceddb9a650d7a6f5ae960d7
SHA5123f0334ce763d939577bc41ad778def94af1cda7d11ab0be65264c450dc479466e8cd4bdd95db8e4ef5cb5ef3012a29f0c58013a30d4894054dce16fc1439ff01
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5