Analysis
-
max time kernel
138s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2023, 04:55
Static task
static1
Behavioral task
behavioral1
Sample
cdf0f31c6b125f6610b7beb4330201a7400dcd30f3647f26f99043fd6ebc7716.exe
Resource
win10v2004-20230220-en
General
-
Target
cdf0f31c6b125f6610b7beb4330201a7400dcd30f3647f26f99043fd6ebc7716.exe
-
Size
567KB
-
MD5
992d6c0d40e44f335cb8e9e97a502d38
-
SHA1
47cdd9a240bd93ee81d1e47e9640785aa44fc440
-
SHA256
cdf0f31c6b125f6610b7beb4330201a7400dcd30f3647f26f99043fd6ebc7716
-
SHA512
16b1b2094bcd98a30d46d449e29a3c52e70c8d60d4a1a2ed8209ba7426c7f6487534a7486cc924ef7bfb7ef74e03d6bb0d41aa4ce9bec27563fb842c6639dca3
-
SSDEEP
12288:eMrfy90IM0YnoHVs/3eYt2FdshK5QaeMXUK:xylSo23i5QaiK
Malware Config
Extracted
redline
daris
217.196.96.56:4138
-
auth_value
3491f24ae0250969cd45ce4b3fe77549
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h5502635.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h5502635.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h5502635.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h5502635.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h5502635.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h5502635.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation i4715279.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 2028 x9800760.exe 880 g4329279.exe 4196 h5502635.exe 4332 i4715279.exe 4320 oneetx.exe 1560 oneetx.exe 2880 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2288 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h5502635.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h5502635.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cdf0f31c6b125f6610b7beb4330201a7400dcd30f3647f26f99043fd6ebc7716.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x9800760.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x9800760.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cdf0f31c6b125f6610b7beb4330201a7400dcd30f3647f26f99043fd6ebc7716.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4476 4196 WerFault.exe 91 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4944 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 880 g4329279.exe 880 g4329279.exe 4196 h5502635.exe 4196 h5502635.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 880 g4329279.exe Token: SeDebugPrivilege 4196 h5502635.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4332 i4715279.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 632 wrote to memory of 2028 632 cdf0f31c6b125f6610b7beb4330201a7400dcd30f3647f26f99043fd6ebc7716.exe 83 PID 632 wrote to memory of 2028 632 cdf0f31c6b125f6610b7beb4330201a7400dcd30f3647f26f99043fd6ebc7716.exe 83 PID 632 wrote to memory of 2028 632 cdf0f31c6b125f6610b7beb4330201a7400dcd30f3647f26f99043fd6ebc7716.exe 83 PID 2028 wrote to memory of 880 2028 x9800760.exe 84 PID 2028 wrote to memory of 880 2028 x9800760.exe 84 PID 2028 wrote to memory of 880 2028 x9800760.exe 84 PID 2028 wrote to memory of 4196 2028 x9800760.exe 91 PID 2028 wrote to memory of 4196 2028 x9800760.exe 91 PID 2028 wrote to memory of 4196 2028 x9800760.exe 91 PID 632 wrote to memory of 4332 632 cdf0f31c6b125f6610b7beb4330201a7400dcd30f3647f26f99043fd6ebc7716.exe 94 PID 632 wrote to memory of 4332 632 cdf0f31c6b125f6610b7beb4330201a7400dcd30f3647f26f99043fd6ebc7716.exe 94 PID 632 wrote to memory of 4332 632 cdf0f31c6b125f6610b7beb4330201a7400dcd30f3647f26f99043fd6ebc7716.exe 94 PID 4332 wrote to memory of 4320 4332 i4715279.exe 95 PID 4332 wrote to memory of 4320 4332 i4715279.exe 95 PID 4332 wrote to memory of 4320 4332 i4715279.exe 95 PID 4320 wrote to memory of 4944 4320 oneetx.exe 96 PID 4320 wrote to memory of 4944 4320 oneetx.exe 96 PID 4320 wrote to memory of 4944 4320 oneetx.exe 96 PID 4320 wrote to memory of 4932 4320 oneetx.exe 98 PID 4320 wrote to memory of 4932 4320 oneetx.exe 98 PID 4320 wrote to memory of 4932 4320 oneetx.exe 98 PID 4932 wrote to memory of 1396 4932 cmd.exe 100 PID 4932 wrote to memory of 1396 4932 cmd.exe 100 PID 4932 wrote to memory of 1396 4932 cmd.exe 100 PID 4932 wrote to memory of 1376 4932 cmd.exe 101 PID 4932 wrote to memory of 1376 4932 cmd.exe 101 PID 4932 wrote to memory of 1376 4932 cmd.exe 101 PID 4932 wrote to memory of 4768 4932 cmd.exe 102 PID 4932 wrote to memory of 4768 4932 cmd.exe 102 PID 4932 wrote to memory of 4768 4932 cmd.exe 102 PID 4932 wrote to memory of 1516 4932 cmd.exe 104 PID 4932 wrote to memory of 1516 4932 cmd.exe 104 PID 4932 wrote to memory of 1516 4932 cmd.exe 104 PID 4932 wrote to memory of 2688 4932 cmd.exe 105 PID 4932 wrote to memory of 2688 4932 cmd.exe 105 PID 4932 wrote to memory of 2688 4932 cmd.exe 105 PID 4932 wrote to memory of 3840 4932 cmd.exe 106 PID 4932 wrote to memory of 3840 4932 cmd.exe 106 PID 4932 wrote to memory of 3840 4932 cmd.exe 106 PID 4320 wrote to memory of 2288 4320 oneetx.exe 108 PID 4320 wrote to memory of 2288 4320 oneetx.exe 108 PID 4320 wrote to memory of 2288 4320 oneetx.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdf0f31c6b125f6610b7beb4330201a7400dcd30f3647f26f99043fd6ebc7716.exe"C:\Users\Admin\AppData\Local\Temp\cdf0f31c6b125f6610b7beb4330201a7400dcd30f3647f26f99043fd6ebc7716.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9800760.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9800760.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g4329279.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g4329279.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:880
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5502635.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5502635.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4196 -s 10804⤵
- Program crash
PID:4476
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4715279.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4715279.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4944
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1396
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1376
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4768
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1516
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:2688
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:3840
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2288
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4196 -ip 41961⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1560
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2880
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD571862689915c28346e8bea7dcae56376
SHA15923215e9fdc0d7cddad61b00ba057be3fa4dc97
SHA256b498e55cd56479d2078a38632358c909e16ebeb8382c468d95d25bb91414fd2c
SHA51227dfecddececb319f68bde33be18a815781c65b30e55ba7ea80e8ebfdcc1efb4f5102d655724ba3ef7b6a452988f88c7c7de3e6656a5dca3c27d4e63e5b493f3
-
Filesize
206KB
MD571862689915c28346e8bea7dcae56376
SHA15923215e9fdc0d7cddad61b00ba057be3fa4dc97
SHA256b498e55cd56479d2078a38632358c909e16ebeb8382c468d95d25bb91414fd2c
SHA51227dfecddececb319f68bde33be18a815781c65b30e55ba7ea80e8ebfdcc1efb4f5102d655724ba3ef7b6a452988f88c7c7de3e6656a5dca3c27d4e63e5b493f3
-
Filesize
395KB
MD543fb19d9773ce1416c1164b0533cdd00
SHA1fe9ceb39073b5f726d8078b6974c52516bcab830
SHA2567bc651467ca53570c73d02b629adf1ce9c34457332ffff51f4656d3d6c57814b
SHA512779312358b73494063614fb754d3f2060218e48bbd5eb30c5469b4808291162b39199c5406e147fb5f5cdd920a9599f218bad59b8b649866c271102be7f5dc82
-
Filesize
395KB
MD543fb19d9773ce1416c1164b0533cdd00
SHA1fe9ceb39073b5f726d8078b6974c52516bcab830
SHA2567bc651467ca53570c73d02b629adf1ce9c34457332ffff51f4656d3d6c57814b
SHA512779312358b73494063614fb754d3f2060218e48bbd5eb30c5469b4808291162b39199c5406e147fb5f5cdd920a9599f218bad59b8b649866c271102be7f5dc82
-
Filesize
168KB
MD5ac5b347506c3999c50f1aa67aeac8e32
SHA128c84e14c7771104169fa18624fa6871901ed395
SHA25688eb82d8cc44c7d2d3634929873625c6d31b6be8f51881e7bc00a85d59c6b107
SHA51212378dd97b58fb76085f83cef7323a6a6d2fee2d5fe499b10082edde9c351a94be819080b9bc6e1b09fdac48c91e86f44728d70e13c964a975dfdd5219b88333
-
Filesize
168KB
MD5ac5b347506c3999c50f1aa67aeac8e32
SHA128c84e14c7771104169fa18624fa6871901ed395
SHA25688eb82d8cc44c7d2d3634929873625c6d31b6be8f51881e7bc00a85d59c6b107
SHA51212378dd97b58fb76085f83cef7323a6a6d2fee2d5fe499b10082edde9c351a94be819080b9bc6e1b09fdac48c91e86f44728d70e13c964a975dfdd5219b88333
-
Filesize
315KB
MD594f5be1eaec95a0904655a3854180028
SHA137e5120037761c1576bf59cc06073bf89d18f418
SHA256c12ced944027ee6dda7ca418a098f46d8d4c8992295aca27ca52e488100235fd
SHA512b8078061afb84ad7c9faa7200f1a1ae624145dd58bb41cf72e4914b7ad16f76393b6803732d4a8ccf52a5735e95a273613fb8fb72c042f6463c729f58505111c
-
Filesize
315KB
MD594f5be1eaec95a0904655a3854180028
SHA137e5120037761c1576bf59cc06073bf89d18f418
SHA256c12ced944027ee6dda7ca418a098f46d8d4c8992295aca27ca52e488100235fd
SHA512b8078061afb84ad7c9faa7200f1a1ae624145dd58bb41cf72e4914b7ad16f76393b6803732d4a8ccf52a5735e95a273613fb8fb72c042f6463c729f58505111c
-
Filesize
206KB
MD571862689915c28346e8bea7dcae56376
SHA15923215e9fdc0d7cddad61b00ba057be3fa4dc97
SHA256b498e55cd56479d2078a38632358c909e16ebeb8382c468d95d25bb91414fd2c
SHA51227dfecddececb319f68bde33be18a815781c65b30e55ba7ea80e8ebfdcc1efb4f5102d655724ba3ef7b6a452988f88c7c7de3e6656a5dca3c27d4e63e5b493f3
-
Filesize
206KB
MD571862689915c28346e8bea7dcae56376
SHA15923215e9fdc0d7cddad61b00ba057be3fa4dc97
SHA256b498e55cd56479d2078a38632358c909e16ebeb8382c468d95d25bb91414fd2c
SHA51227dfecddececb319f68bde33be18a815781c65b30e55ba7ea80e8ebfdcc1efb4f5102d655724ba3ef7b6a452988f88c7c7de3e6656a5dca3c27d4e63e5b493f3
-
Filesize
206KB
MD571862689915c28346e8bea7dcae56376
SHA15923215e9fdc0d7cddad61b00ba057be3fa4dc97
SHA256b498e55cd56479d2078a38632358c909e16ebeb8382c468d95d25bb91414fd2c
SHA51227dfecddececb319f68bde33be18a815781c65b30e55ba7ea80e8ebfdcc1efb4f5102d655724ba3ef7b6a452988f88c7c7de3e6656a5dca3c27d4e63e5b493f3
-
Filesize
206KB
MD571862689915c28346e8bea7dcae56376
SHA15923215e9fdc0d7cddad61b00ba057be3fa4dc97
SHA256b498e55cd56479d2078a38632358c909e16ebeb8382c468d95d25bb91414fd2c
SHA51227dfecddececb319f68bde33be18a815781c65b30e55ba7ea80e8ebfdcc1efb4f5102d655724ba3ef7b6a452988f88c7c7de3e6656a5dca3c27d4e63e5b493f3
-
Filesize
206KB
MD571862689915c28346e8bea7dcae56376
SHA15923215e9fdc0d7cddad61b00ba057be3fa4dc97
SHA256b498e55cd56479d2078a38632358c909e16ebeb8382c468d95d25bb91414fd2c
SHA51227dfecddececb319f68bde33be18a815781c65b30e55ba7ea80e8ebfdcc1efb4f5102d655724ba3ef7b6a452988f88c7c7de3e6656a5dca3c27d4e63e5b493f3
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5