Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
04/05/2023, 04:41
Static task
static1
Behavioral task
behavioral1
Sample
3f0be2e066bc14366b99f43ceb885e5f05fdc18b88afcc15006b08ecc567a79e.exe
Resource
win10-20230220-en
General
-
Target
3f0be2e066bc14366b99f43ceb885e5f05fdc18b88afcc15006b08ecc567a79e.exe
-
Size
567KB
-
MD5
8d1f322de47d7a5c8be9f01041e5f0b9
-
SHA1
f2aaffffcd7330f7024294aaded8b67a7068066d
-
SHA256
3f0be2e066bc14366b99f43ceb885e5f05fdc18b88afcc15006b08ecc567a79e
-
SHA512
df3ca2e0c118c885d5d1299c5c0ca019c990e46a9d625978dd746a1479a2740a20e5f436fae107ba894205e46686a127579babd914914d3d47b07bd6b340a6ee
-
SSDEEP
12288:AMrCy90SbHmWQAt4giajmpvOWQ5McekES3E4hbo1O5:Sy9ixgiajOvOWQehV1e
Malware Config
Extracted
redline
daris
217.196.96.56:4138
-
auth_value
3491f24ae0250969cd45ce4b3fe77549
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h9692280.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h9692280.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h9692280.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h9692280.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h9692280.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 1184 x2106230.exe 1372 g7492477.exe 2056 h9692280.exe 3768 i5724722.exe 4028 oneetx.exe 4536 oneetx.exe 5116 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4444 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h9692280.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h9692280.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3f0be2e066bc14366b99f43ceb885e5f05fdc18b88afcc15006b08ecc567a79e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x2106230.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x2106230.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3f0be2e066bc14366b99f43ceb885e5f05fdc18b88afcc15006b08ecc567a79e.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4136 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1372 g7492477.exe 1372 g7492477.exe 2056 h9692280.exe 2056 h9692280.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1372 g7492477.exe Token: SeDebugPrivilege 2056 h9692280.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3768 i5724722.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 5048 wrote to memory of 1184 5048 3f0be2e066bc14366b99f43ceb885e5f05fdc18b88afcc15006b08ecc567a79e.exe 66 PID 5048 wrote to memory of 1184 5048 3f0be2e066bc14366b99f43ceb885e5f05fdc18b88afcc15006b08ecc567a79e.exe 66 PID 5048 wrote to memory of 1184 5048 3f0be2e066bc14366b99f43ceb885e5f05fdc18b88afcc15006b08ecc567a79e.exe 66 PID 1184 wrote to memory of 1372 1184 x2106230.exe 67 PID 1184 wrote to memory of 1372 1184 x2106230.exe 67 PID 1184 wrote to memory of 1372 1184 x2106230.exe 67 PID 1184 wrote to memory of 2056 1184 x2106230.exe 69 PID 1184 wrote to memory of 2056 1184 x2106230.exe 69 PID 1184 wrote to memory of 2056 1184 x2106230.exe 69 PID 5048 wrote to memory of 3768 5048 3f0be2e066bc14366b99f43ceb885e5f05fdc18b88afcc15006b08ecc567a79e.exe 70 PID 5048 wrote to memory of 3768 5048 3f0be2e066bc14366b99f43ceb885e5f05fdc18b88afcc15006b08ecc567a79e.exe 70 PID 5048 wrote to memory of 3768 5048 3f0be2e066bc14366b99f43ceb885e5f05fdc18b88afcc15006b08ecc567a79e.exe 70 PID 3768 wrote to memory of 4028 3768 i5724722.exe 71 PID 3768 wrote to memory of 4028 3768 i5724722.exe 71 PID 3768 wrote to memory of 4028 3768 i5724722.exe 71 PID 4028 wrote to memory of 4136 4028 oneetx.exe 72 PID 4028 wrote to memory of 4136 4028 oneetx.exe 72 PID 4028 wrote to memory of 4136 4028 oneetx.exe 72 PID 4028 wrote to memory of 4956 4028 oneetx.exe 74 PID 4028 wrote to memory of 4956 4028 oneetx.exe 74 PID 4028 wrote to memory of 4956 4028 oneetx.exe 74 PID 4956 wrote to memory of 4868 4956 cmd.exe 76 PID 4956 wrote to memory of 4868 4956 cmd.exe 76 PID 4956 wrote to memory of 4868 4956 cmd.exe 76 PID 4956 wrote to memory of 516 4956 cmd.exe 77 PID 4956 wrote to memory of 516 4956 cmd.exe 77 PID 4956 wrote to memory of 516 4956 cmd.exe 77 PID 4956 wrote to memory of 3208 4956 cmd.exe 78 PID 4956 wrote to memory of 3208 4956 cmd.exe 78 PID 4956 wrote to memory of 3208 4956 cmd.exe 78 PID 4956 wrote to memory of 784 4956 cmd.exe 79 PID 4956 wrote to memory of 784 4956 cmd.exe 79 PID 4956 wrote to memory of 784 4956 cmd.exe 79 PID 4956 wrote to memory of 4588 4956 cmd.exe 80 PID 4956 wrote to memory of 4588 4956 cmd.exe 80 PID 4956 wrote to memory of 4588 4956 cmd.exe 80 PID 4956 wrote to memory of 4508 4956 cmd.exe 81 PID 4956 wrote to memory of 4508 4956 cmd.exe 81 PID 4956 wrote to memory of 4508 4956 cmd.exe 81 PID 4028 wrote to memory of 4444 4028 oneetx.exe 83 PID 4028 wrote to memory of 4444 4028 oneetx.exe 83 PID 4028 wrote to memory of 4444 4028 oneetx.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f0be2e066bc14366b99f43ceb885e5f05fdc18b88afcc15006b08ecc567a79e.exe"C:\Users\Admin\AppData\Local\Temp\3f0be2e066bc14366b99f43ceb885e5f05fdc18b88afcc15006b08ecc567a79e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2106230.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2106230.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7492477.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7492477.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1372
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9692280.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9692280.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5724722.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5724722.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4136
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4868
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:516
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3208
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:784
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4588
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:4508
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4444
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4536
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:5116
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5858da9dbd1c79222cff4ab985b874b29
SHA1e991851ca063cddc8e51915623759bcf7163a039
SHA256f2943217de6806811240308f562bc4e66f14d9c1e53b5746516475323fa3572a
SHA512e64e1b5fbcd1dc8706c19b390d4584087fc2de3f6567483eb737c4843288115ae861de9a4da6c2c2da5e7cefd67c9d372063676b364488a15bc005fbcfba48d2
-
Filesize
206KB
MD5858da9dbd1c79222cff4ab985b874b29
SHA1e991851ca063cddc8e51915623759bcf7163a039
SHA256f2943217de6806811240308f562bc4e66f14d9c1e53b5746516475323fa3572a
SHA512e64e1b5fbcd1dc8706c19b390d4584087fc2de3f6567483eb737c4843288115ae861de9a4da6c2c2da5e7cefd67c9d372063676b364488a15bc005fbcfba48d2
-
Filesize
395KB
MD5b7a059cfec861959f3f840db0f664774
SHA15721ef8e7500b362fcc97e7615a2aba4c6c88e63
SHA25618a1e20a265fb41b929e73fdae3d8779bc32e282507c80a16e2b99d46f85e5f3
SHA512b922a348d521f1b238826cfb0dce9b9eae11180f605a9e77aaa3996715388a4a8974cb4391bfebf4084b9aa102513970ea445b99661e22d66d4cd39d9fd8303b
-
Filesize
395KB
MD5b7a059cfec861959f3f840db0f664774
SHA15721ef8e7500b362fcc97e7615a2aba4c6c88e63
SHA25618a1e20a265fb41b929e73fdae3d8779bc32e282507c80a16e2b99d46f85e5f3
SHA512b922a348d521f1b238826cfb0dce9b9eae11180f605a9e77aaa3996715388a4a8974cb4391bfebf4084b9aa102513970ea445b99661e22d66d4cd39d9fd8303b
-
Filesize
168KB
MD586928935115764abe77ad9a09a8c98f4
SHA16336027fe8d843da2fd17eb5cad04efecc6caca8
SHA256363e7b87fca26dd43b99fb1786f695ee64aa50f2abb7d67cdc36456beec91a7b
SHA5120ab5ce96fec0ed76c5428900acf46bf63bb9bf27297056cae4dbf5b6e2505ea146558c5b82aa485c417754fc0a2be9d9c05bd441a2c5a0be027e2a6e06f11f04
-
Filesize
168KB
MD586928935115764abe77ad9a09a8c98f4
SHA16336027fe8d843da2fd17eb5cad04efecc6caca8
SHA256363e7b87fca26dd43b99fb1786f695ee64aa50f2abb7d67cdc36456beec91a7b
SHA5120ab5ce96fec0ed76c5428900acf46bf63bb9bf27297056cae4dbf5b6e2505ea146558c5b82aa485c417754fc0a2be9d9c05bd441a2c5a0be027e2a6e06f11f04
-
Filesize
315KB
MD5ba183998c7fd311ee23aca317a107edb
SHA143c0dbb0dd787dcc2df4fd4076e0f9d5a4b6e55d
SHA2565140918e2d090a6abeb69479c2d414ec72819dbe126981834d046a40ae8c5dd6
SHA512f28e397384a1cae52582d771ba4210783c064e34d0ab81ba173da554b30a34c00bb3d9bd8dfe572841562a89c5fdbc54cdadfa7ec9c9fdad111e647bf7305895
-
Filesize
315KB
MD5ba183998c7fd311ee23aca317a107edb
SHA143c0dbb0dd787dcc2df4fd4076e0f9d5a4b6e55d
SHA2565140918e2d090a6abeb69479c2d414ec72819dbe126981834d046a40ae8c5dd6
SHA512f28e397384a1cae52582d771ba4210783c064e34d0ab81ba173da554b30a34c00bb3d9bd8dfe572841562a89c5fdbc54cdadfa7ec9c9fdad111e647bf7305895
-
Filesize
206KB
MD5858da9dbd1c79222cff4ab985b874b29
SHA1e991851ca063cddc8e51915623759bcf7163a039
SHA256f2943217de6806811240308f562bc4e66f14d9c1e53b5746516475323fa3572a
SHA512e64e1b5fbcd1dc8706c19b390d4584087fc2de3f6567483eb737c4843288115ae861de9a4da6c2c2da5e7cefd67c9d372063676b364488a15bc005fbcfba48d2
-
Filesize
206KB
MD5858da9dbd1c79222cff4ab985b874b29
SHA1e991851ca063cddc8e51915623759bcf7163a039
SHA256f2943217de6806811240308f562bc4e66f14d9c1e53b5746516475323fa3572a
SHA512e64e1b5fbcd1dc8706c19b390d4584087fc2de3f6567483eb737c4843288115ae861de9a4da6c2c2da5e7cefd67c9d372063676b364488a15bc005fbcfba48d2
-
Filesize
206KB
MD5858da9dbd1c79222cff4ab985b874b29
SHA1e991851ca063cddc8e51915623759bcf7163a039
SHA256f2943217de6806811240308f562bc4e66f14d9c1e53b5746516475323fa3572a
SHA512e64e1b5fbcd1dc8706c19b390d4584087fc2de3f6567483eb737c4843288115ae861de9a4da6c2c2da5e7cefd67c9d372063676b364488a15bc005fbcfba48d2
-
Filesize
206KB
MD5858da9dbd1c79222cff4ab985b874b29
SHA1e991851ca063cddc8e51915623759bcf7163a039
SHA256f2943217de6806811240308f562bc4e66f14d9c1e53b5746516475323fa3572a
SHA512e64e1b5fbcd1dc8706c19b390d4584087fc2de3f6567483eb737c4843288115ae861de9a4da6c2c2da5e7cefd67c9d372063676b364488a15bc005fbcfba48d2
-
Filesize
206KB
MD5858da9dbd1c79222cff4ab985b874b29
SHA1e991851ca063cddc8e51915623759bcf7163a039
SHA256f2943217de6806811240308f562bc4e66f14d9c1e53b5746516475323fa3572a
SHA512e64e1b5fbcd1dc8706c19b390d4584087fc2de3f6567483eb737c4843288115ae861de9a4da6c2c2da5e7cefd67c9d372063676b364488a15bc005fbcfba48d2
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53