Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2023, 04:33
Static task
static1
Behavioral task
behavioral1
Sample
fc68d60fb59afe242de6ce0671e6f128d0ba63404b5928e37e4ad91f7a4565d3.exe
Resource
win10v2004-20230221-en
General
-
Target
fc68d60fb59afe242de6ce0671e6f128d0ba63404b5928e37e4ad91f7a4565d3.exe
-
Size
567KB
-
MD5
339f9b6fcd86cc7af4d58acffa215684
-
SHA1
f76b85978ef3e38eb67f0116fc9306d2c7da5be6
-
SHA256
fc68d60fb59afe242de6ce0671e6f128d0ba63404b5928e37e4ad91f7a4565d3
-
SHA512
6554afa16d39ec63b4625639f12d3607f736306805f81ef5b38512f19736866c6cffec411f234f3a47654a82f254dd695144bab77406251f0f3fdef8e8bfd90b
-
SSDEEP
12288:TMrry90F1K0eYpZM2/GGA26bL7ZVfJ7dU2cwi:Aycv5GDpZLdUFwi
Malware Config
Extracted
redline
daris
217.196.96.56:4138
-
auth_value
3491f24ae0250969cd45ce4b3fe77549
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h9772011.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h9772011.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h9772011.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h9772011.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h9772011.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h9772011.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation i7600189.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 8 IoCs
pid Process 2024 x6136345.exe 2812 g7132825.exe 648 h9772011.exe 2408 i7600189.exe 3972 oneetx.exe 3312 oneetx.exe 1280 oneetx.exe 4280 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2100 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h9772011.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h9772011.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fc68d60fb59afe242de6ce0671e6f128d0ba63404b5928e37e4ad91f7a4565d3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fc68d60fb59afe242de6ce0671e6f128d0ba63404b5928e37e4ad91f7a4565d3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x6136345.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6136345.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1908 648 WerFault.exe 94 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2316 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2812 g7132825.exe 2812 g7132825.exe 648 h9772011.exe 648 h9772011.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2812 g7132825.exe Token: SeDebugPrivilege 648 h9772011.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2408 i7600189.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2896 wrote to memory of 2024 2896 fc68d60fb59afe242de6ce0671e6f128d0ba63404b5928e37e4ad91f7a4565d3.exe 86 PID 2896 wrote to memory of 2024 2896 fc68d60fb59afe242de6ce0671e6f128d0ba63404b5928e37e4ad91f7a4565d3.exe 86 PID 2896 wrote to memory of 2024 2896 fc68d60fb59afe242de6ce0671e6f128d0ba63404b5928e37e4ad91f7a4565d3.exe 86 PID 2024 wrote to memory of 2812 2024 x6136345.exe 87 PID 2024 wrote to memory of 2812 2024 x6136345.exe 87 PID 2024 wrote to memory of 2812 2024 x6136345.exe 87 PID 2024 wrote to memory of 648 2024 x6136345.exe 94 PID 2024 wrote to memory of 648 2024 x6136345.exe 94 PID 2024 wrote to memory of 648 2024 x6136345.exe 94 PID 2896 wrote to memory of 2408 2896 fc68d60fb59afe242de6ce0671e6f128d0ba63404b5928e37e4ad91f7a4565d3.exe 97 PID 2896 wrote to memory of 2408 2896 fc68d60fb59afe242de6ce0671e6f128d0ba63404b5928e37e4ad91f7a4565d3.exe 97 PID 2896 wrote to memory of 2408 2896 fc68d60fb59afe242de6ce0671e6f128d0ba63404b5928e37e4ad91f7a4565d3.exe 97 PID 2408 wrote to memory of 3972 2408 i7600189.exe 98 PID 2408 wrote to memory of 3972 2408 i7600189.exe 98 PID 2408 wrote to memory of 3972 2408 i7600189.exe 98 PID 3972 wrote to memory of 2316 3972 oneetx.exe 99 PID 3972 wrote to memory of 2316 3972 oneetx.exe 99 PID 3972 wrote to memory of 2316 3972 oneetx.exe 99 PID 3972 wrote to memory of 2040 3972 oneetx.exe 101 PID 3972 wrote to memory of 2040 3972 oneetx.exe 101 PID 3972 wrote to memory of 2040 3972 oneetx.exe 101 PID 2040 wrote to memory of 4156 2040 cmd.exe 103 PID 2040 wrote to memory of 4156 2040 cmd.exe 103 PID 2040 wrote to memory of 4156 2040 cmd.exe 103 PID 2040 wrote to memory of 4308 2040 cmd.exe 104 PID 2040 wrote to memory of 4308 2040 cmd.exe 104 PID 2040 wrote to memory of 4308 2040 cmd.exe 104 PID 2040 wrote to memory of 2732 2040 cmd.exe 105 PID 2040 wrote to memory of 2732 2040 cmd.exe 105 PID 2040 wrote to memory of 2732 2040 cmd.exe 105 PID 2040 wrote to memory of 3176 2040 cmd.exe 106 PID 2040 wrote to memory of 3176 2040 cmd.exe 106 PID 2040 wrote to memory of 3176 2040 cmd.exe 106 PID 2040 wrote to memory of 2908 2040 cmd.exe 107 PID 2040 wrote to memory of 2908 2040 cmd.exe 107 PID 2040 wrote to memory of 2908 2040 cmd.exe 107 PID 2040 wrote to memory of 2120 2040 cmd.exe 108 PID 2040 wrote to memory of 2120 2040 cmd.exe 108 PID 2040 wrote to memory of 2120 2040 cmd.exe 108 PID 3972 wrote to memory of 2100 3972 oneetx.exe 111 PID 3972 wrote to memory of 2100 3972 oneetx.exe 111 PID 3972 wrote to memory of 2100 3972 oneetx.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc68d60fb59afe242de6ce0671e6f128d0ba63404b5928e37e4ad91f7a4565d3.exe"C:\Users\Admin\AppData\Local\Temp\fc68d60fb59afe242de6ce0671e6f128d0ba63404b5928e37e4ad91f7a4565d3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6136345.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6136345.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7132825.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7132825.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9772011.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9772011.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 648 -s 10804⤵
- Program crash
PID:1908
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7600189.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7600189.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2316
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4156
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4308
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:2732
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3176
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:2908
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:2120
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2100
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 648 -ip 6481⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3312
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1280
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4280
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5e6439c1490253d779d840d64f0017f49
SHA172785d6f64feeac00a638115da40a7f801bfd5c8
SHA2563bdcb2f9501dd72483cf164b8a2b5e73135dab7b1e7fa345ddb04cbf83f19e24
SHA512d378af9b366ed05c67f45cf9c4d88b4cc8127ee1db5cd91a9c597eda804844b5bf668c0f74481d30ceea0f541c2f97093624c5ba95b3da22e51a5542a2cadf90
-
Filesize
206KB
MD5e6439c1490253d779d840d64f0017f49
SHA172785d6f64feeac00a638115da40a7f801bfd5c8
SHA2563bdcb2f9501dd72483cf164b8a2b5e73135dab7b1e7fa345ddb04cbf83f19e24
SHA512d378af9b366ed05c67f45cf9c4d88b4cc8127ee1db5cd91a9c597eda804844b5bf668c0f74481d30ceea0f541c2f97093624c5ba95b3da22e51a5542a2cadf90
-
Filesize
395KB
MD5896bc150c4a3c2b5c14dbdb0e426341f
SHA1e90bc011560c57830a680000d99b2b674bf76695
SHA256d7d86c58852130e3e62841ba92344048f5a6b0af2ae5aeb193ef2af0caba4da9
SHA512ff1ffb968ac3f22d0f68af7634635c562bc6458aa8eb42016962d00979b94b54b435c1ccc4a3269b023636822a55ff87e13670967932364521944e3ecca04403
-
Filesize
395KB
MD5896bc150c4a3c2b5c14dbdb0e426341f
SHA1e90bc011560c57830a680000d99b2b674bf76695
SHA256d7d86c58852130e3e62841ba92344048f5a6b0af2ae5aeb193ef2af0caba4da9
SHA512ff1ffb968ac3f22d0f68af7634635c562bc6458aa8eb42016962d00979b94b54b435c1ccc4a3269b023636822a55ff87e13670967932364521944e3ecca04403
-
Filesize
168KB
MD5ba3e14df6c351c82fa849f668c05eb60
SHA11c221659a5b43ae72a184483853a1c4adc24214e
SHA256c3b5ff24f8db19a266c6c78ff7ef0792fb1aad5012494aad114b0d2c1fd58eed
SHA5129aa6cd1be5c3d07788d63cab5071f178ce5bb6cf32e111a7addd556bc5fb645dba884a97c8e348bda6f1d4bba51c11ab41ba25904523d1ee2b1d14c1a91c89a2
-
Filesize
168KB
MD5ba3e14df6c351c82fa849f668c05eb60
SHA11c221659a5b43ae72a184483853a1c4adc24214e
SHA256c3b5ff24f8db19a266c6c78ff7ef0792fb1aad5012494aad114b0d2c1fd58eed
SHA5129aa6cd1be5c3d07788d63cab5071f178ce5bb6cf32e111a7addd556bc5fb645dba884a97c8e348bda6f1d4bba51c11ab41ba25904523d1ee2b1d14c1a91c89a2
-
Filesize
315KB
MD51b647c5695f2388c5905f73b5df16c65
SHA15f886b6e69c3f8c7cf0f18a5907110cbc9c866b2
SHA256edd27a13a4b5c72563bf2d0696a3bb9c1c33bf9c4222138e3305d582a5535496
SHA51205c784d67b47ee538fb5d62dee3432ba1f317f933e4b50632de0d6e7043ff8bf5f257d2a3925f5ef551c473d0cd3ffef00a41bb399dc3e9994efc411294bf761
-
Filesize
315KB
MD51b647c5695f2388c5905f73b5df16c65
SHA15f886b6e69c3f8c7cf0f18a5907110cbc9c866b2
SHA256edd27a13a4b5c72563bf2d0696a3bb9c1c33bf9c4222138e3305d582a5535496
SHA51205c784d67b47ee538fb5d62dee3432ba1f317f933e4b50632de0d6e7043ff8bf5f257d2a3925f5ef551c473d0cd3ffef00a41bb399dc3e9994efc411294bf761
-
Filesize
206KB
MD5e6439c1490253d779d840d64f0017f49
SHA172785d6f64feeac00a638115da40a7f801bfd5c8
SHA2563bdcb2f9501dd72483cf164b8a2b5e73135dab7b1e7fa345ddb04cbf83f19e24
SHA512d378af9b366ed05c67f45cf9c4d88b4cc8127ee1db5cd91a9c597eda804844b5bf668c0f74481d30ceea0f541c2f97093624c5ba95b3da22e51a5542a2cadf90
-
Filesize
206KB
MD5e6439c1490253d779d840d64f0017f49
SHA172785d6f64feeac00a638115da40a7f801bfd5c8
SHA2563bdcb2f9501dd72483cf164b8a2b5e73135dab7b1e7fa345ddb04cbf83f19e24
SHA512d378af9b366ed05c67f45cf9c4d88b4cc8127ee1db5cd91a9c597eda804844b5bf668c0f74481d30ceea0f541c2f97093624c5ba95b3da22e51a5542a2cadf90
-
Filesize
206KB
MD5e6439c1490253d779d840d64f0017f49
SHA172785d6f64feeac00a638115da40a7f801bfd5c8
SHA2563bdcb2f9501dd72483cf164b8a2b5e73135dab7b1e7fa345ddb04cbf83f19e24
SHA512d378af9b366ed05c67f45cf9c4d88b4cc8127ee1db5cd91a9c597eda804844b5bf668c0f74481d30ceea0f541c2f97093624c5ba95b3da22e51a5542a2cadf90
-
Filesize
206KB
MD5e6439c1490253d779d840d64f0017f49
SHA172785d6f64feeac00a638115da40a7f801bfd5c8
SHA2563bdcb2f9501dd72483cf164b8a2b5e73135dab7b1e7fa345ddb04cbf83f19e24
SHA512d378af9b366ed05c67f45cf9c4d88b4cc8127ee1db5cd91a9c597eda804844b5bf668c0f74481d30ceea0f541c2f97093624c5ba95b3da22e51a5542a2cadf90
-
Filesize
206KB
MD5e6439c1490253d779d840d64f0017f49
SHA172785d6f64feeac00a638115da40a7f801bfd5c8
SHA2563bdcb2f9501dd72483cf164b8a2b5e73135dab7b1e7fa345ddb04cbf83f19e24
SHA512d378af9b366ed05c67f45cf9c4d88b4cc8127ee1db5cd91a9c597eda804844b5bf668c0f74481d30ceea0f541c2f97093624c5ba95b3da22e51a5542a2cadf90
-
Filesize
206KB
MD5e6439c1490253d779d840d64f0017f49
SHA172785d6f64feeac00a638115da40a7f801bfd5c8
SHA2563bdcb2f9501dd72483cf164b8a2b5e73135dab7b1e7fa345ddb04cbf83f19e24
SHA512d378af9b366ed05c67f45cf9c4d88b4cc8127ee1db5cd91a9c597eda804844b5bf668c0f74481d30ceea0f541c2f97093624c5ba95b3da22e51a5542a2cadf90
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5