Analysis

  • max time kernel
    138s
  • max time network
    144s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04-05-2023 05:13

General

  • Target

    b978ade05fe7250ba800ed2d26eadce3e5e58d3175c7a294e18383e1e42f0394.exe

  • Size

    567KB

  • MD5

    ec9c6a609db680d2457b503a10d8b054

  • SHA1

    68367d40d31cea67309fbb33ae6ff43ad484a9c5

  • SHA256

    b978ade05fe7250ba800ed2d26eadce3e5e58d3175c7a294e18383e1e42f0394

  • SHA512

    b4bfd3439c8605a06c9798c01d6b3e4f3ec24a7834d938eb60aa9cb1c0733504de783e4754e7a621d034e6af262f90cdcf9f82c937f124cf9438dab8fb5c739f

  • SSDEEP

    12288:CMrHy90WhG0F1eaVyCcUuUck0CAyll0VeWTwFh6+v:tym0XWVUHcM0TwP6+v

Malware Config

Extracted

Family

redline

Botnet

daris

C2

217.196.96.56:4138

Attributes
  • auth_value

    3491f24ae0250969cd45ce4b3fe77549

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b978ade05fe7250ba800ed2d26eadce3e5e58d3175c7a294e18383e1e42f0394.exe
    "C:\Users\Admin\AppData\Local\Temp\b978ade05fe7250ba800ed2d26eadce3e5e58d3175c7a294e18383e1e42f0394.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4604
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7241442.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7241442.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g6491691.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g6491691.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2140
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3832317.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3832317.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4864
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8696309.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8696309.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4192
      • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3708
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4952
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3964
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:4708
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:N"
              5⤵
                PID:4652
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                5⤵
                  PID:4336
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4944
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\c3912af058" /P "Admin:N"
                    5⤵
                      PID:3200
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\c3912af058" /P "Admin:R" /E
                      5⤵
                        PID:704
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:4312
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:3924
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:412

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8696309.exe

                Filesize

                206KB

                MD5

                ecb832245de933875813bddfdb683ab6

                SHA1

                64a6e07864c5b933d27c8391927c6f4bf36c4386

                SHA256

                74df54a0bd4f665cb60ea707b7a8cbb3ca95191b19a782e9045013a33ff895da

                SHA512

                d1e6d601e35918343c49f582ede3cda05eeb79b9026ee9f984c0412f556a137561462a09ec934ebd7a30f4074c041f5b5b5b22873f38c0762ea717424c8937ae

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8696309.exe

                Filesize

                206KB

                MD5

                ecb832245de933875813bddfdb683ab6

                SHA1

                64a6e07864c5b933d27c8391927c6f4bf36c4386

                SHA256

                74df54a0bd4f665cb60ea707b7a8cbb3ca95191b19a782e9045013a33ff895da

                SHA512

                d1e6d601e35918343c49f582ede3cda05eeb79b9026ee9f984c0412f556a137561462a09ec934ebd7a30f4074c041f5b5b5b22873f38c0762ea717424c8937ae

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7241442.exe

                Filesize

                395KB

                MD5

                ee8993937a95e7823dcd78a493ce0a77

                SHA1

                49c3f3e0afa043071fa9e97f8e8f2909aeb5bde8

                SHA256

                1601f37fc9f48cf4511faa0f7b8fd0ffc79086b9966aea870649c861db13cf51

                SHA512

                050315aefab5c60c7a5404619975bdd3a1b9713cbfbee466f11973d6585019c609c9dc3ae9e077315fc1483364e1c8bc9bd063ea4df1d5c38da5da075f5077aa

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7241442.exe

                Filesize

                395KB

                MD5

                ee8993937a95e7823dcd78a493ce0a77

                SHA1

                49c3f3e0afa043071fa9e97f8e8f2909aeb5bde8

                SHA256

                1601f37fc9f48cf4511faa0f7b8fd0ffc79086b9966aea870649c861db13cf51

                SHA512

                050315aefab5c60c7a5404619975bdd3a1b9713cbfbee466f11973d6585019c609c9dc3ae9e077315fc1483364e1c8bc9bd063ea4df1d5c38da5da075f5077aa

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g6491691.exe

                Filesize

                168KB

                MD5

                f6ac50d425254fe2ff611c9f6cc72a6b

                SHA1

                eb3f09d17a1d44f4cdcecf9e4e437b4a4756eb2f

                SHA256

                9d0fb663e7a10f37429786ef7d643cb398580130a8b96f7b57288e021b5fc114

                SHA512

                4cd1adea37a8e77f96e198e6d76afc47221796a233929097e114e351040e1912c7e76505e7fccdec70cbe2bf8b5dce9b4e5f4df6c58c6c8b03c39a955f37f7c7

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g6491691.exe

                Filesize

                168KB

                MD5

                f6ac50d425254fe2ff611c9f6cc72a6b

                SHA1

                eb3f09d17a1d44f4cdcecf9e4e437b4a4756eb2f

                SHA256

                9d0fb663e7a10f37429786ef7d643cb398580130a8b96f7b57288e021b5fc114

                SHA512

                4cd1adea37a8e77f96e198e6d76afc47221796a233929097e114e351040e1912c7e76505e7fccdec70cbe2bf8b5dce9b4e5f4df6c58c6c8b03c39a955f37f7c7

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3832317.exe

                Filesize

                315KB

                MD5

                c7b2a87ef5436e3724ad9f304b500dcc

                SHA1

                6bcda23c2722e5bba81bab8dac8b7d7109095886

                SHA256

                72e658bd3f175bdac178ed093fce9392397c614286674f64dab08d4479d5a769

                SHA512

                1c5081c5b6f04b02e955d04dd10605c687546de4a73bc0345c98b14bfe77397ffa7c4015931415494fddf9f5a5c56c41cbd9e86968f7ec70d06beaa9f573428e

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3832317.exe

                Filesize

                315KB

                MD5

                c7b2a87ef5436e3724ad9f304b500dcc

                SHA1

                6bcda23c2722e5bba81bab8dac8b7d7109095886

                SHA256

                72e658bd3f175bdac178ed093fce9392397c614286674f64dab08d4479d5a769

                SHA512

                1c5081c5b6f04b02e955d04dd10605c687546de4a73bc0345c98b14bfe77397ffa7c4015931415494fddf9f5a5c56c41cbd9e86968f7ec70d06beaa9f573428e

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                206KB

                MD5

                ecb832245de933875813bddfdb683ab6

                SHA1

                64a6e07864c5b933d27c8391927c6f4bf36c4386

                SHA256

                74df54a0bd4f665cb60ea707b7a8cbb3ca95191b19a782e9045013a33ff895da

                SHA512

                d1e6d601e35918343c49f582ede3cda05eeb79b9026ee9f984c0412f556a137561462a09ec934ebd7a30f4074c041f5b5b5b22873f38c0762ea717424c8937ae

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                206KB

                MD5

                ecb832245de933875813bddfdb683ab6

                SHA1

                64a6e07864c5b933d27c8391927c6f4bf36c4386

                SHA256

                74df54a0bd4f665cb60ea707b7a8cbb3ca95191b19a782e9045013a33ff895da

                SHA512

                d1e6d601e35918343c49f582ede3cda05eeb79b9026ee9f984c0412f556a137561462a09ec934ebd7a30f4074c041f5b5b5b22873f38c0762ea717424c8937ae

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                206KB

                MD5

                ecb832245de933875813bddfdb683ab6

                SHA1

                64a6e07864c5b933d27c8391927c6f4bf36c4386

                SHA256

                74df54a0bd4f665cb60ea707b7a8cbb3ca95191b19a782e9045013a33ff895da

                SHA512

                d1e6d601e35918343c49f582ede3cda05eeb79b9026ee9f984c0412f556a137561462a09ec934ebd7a30f4074c041f5b5b5b22873f38c0762ea717424c8937ae

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                206KB

                MD5

                ecb832245de933875813bddfdb683ab6

                SHA1

                64a6e07864c5b933d27c8391927c6f4bf36c4386

                SHA256

                74df54a0bd4f665cb60ea707b7a8cbb3ca95191b19a782e9045013a33ff895da

                SHA512

                d1e6d601e35918343c49f582ede3cda05eeb79b9026ee9f984c0412f556a137561462a09ec934ebd7a30f4074c041f5b5b5b22873f38c0762ea717424c8937ae

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                206KB

                MD5

                ecb832245de933875813bddfdb683ab6

                SHA1

                64a6e07864c5b933d27c8391927c6f4bf36c4386

                SHA256

                74df54a0bd4f665cb60ea707b7a8cbb3ca95191b19a782e9045013a33ff895da

                SHA512

                d1e6d601e35918343c49f582ede3cda05eeb79b9026ee9f984c0412f556a137561462a09ec934ebd7a30f4074c041f5b5b5b22873f38c0762ea717424c8937ae

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • memory/2140-140-0x00000000055A0000-0x00000000055EB000-memory.dmp

                Filesize

                300KB

              • memory/2140-142-0x0000000005990000-0x0000000005A22000-memory.dmp

                Filesize

                584KB

              • memory/2140-143-0x0000000006A80000-0x0000000006F7E000-memory.dmp

                Filesize

                5.0MB

              • memory/2140-144-0x0000000005A30000-0x0000000005A96000-memory.dmp

                Filesize

                408KB

              • memory/2140-145-0x0000000007150000-0x0000000007312000-memory.dmp

                Filesize

                1.8MB

              • memory/2140-146-0x0000000008D00000-0x000000000922C000-memory.dmp

                Filesize

                5.2MB

              • memory/2140-147-0x0000000005440000-0x0000000005450000-memory.dmp

                Filesize

                64KB

              • memory/2140-148-0x00000000068F0000-0x0000000006940000-memory.dmp

                Filesize

                320KB

              • memory/2140-141-0x0000000005870000-0x00000000058E6000-memory.dmp

                Filesize

                472KB

              • memory/2140-139-0x0000000005550000-0x000000000558E000-memory.dmp

                Filesize

                248KB

              • memory/2140-138-0x0000000005440000-0x0000000005450000-memory.dmp

                Filesize

                64KB

              • memory/2140-137-0x00000000053E0000-0x00000000053F2000-memory.dmp

                Filesize

                72KB

              • memory/2140-136-0x0000000005660000-0x000000000576A000-memory.dmp

                Filesize

                1.0MB

              • memory/2140-135-0x0000000005B60000-0x0000000006166000-memory.dmp

                Filesize

                6.0MB

              • memory/2140-134-0x0000000002C70000-0x0000000002C76000-memory.dmp

                Filesize

                24KB

              • memory/2140-133-0x0000000000AA0000-0x0000000000ACE000-memory.dmp

                Filesize

                184KB

              • memory/4864-157-0x0000000004C00000-0x0000000004C10000-memory.dmp

                Filesize

                64KB

              • memory/4864-165-0x0000000002250000-0x0000000002262000-memory.dmp

                Filesize

                72KB

              • memory/4864-167-0x0000000002250000-0x0000000002262000-memory.dmp

                Filesize

                72KB

              • memory/4864-169-0x0000000002250000-0x0000000002262000-memory.dmp

                Filesize

                72KB

              • memory/4864-171-0x0000000002250000-0x0000000002262000-memory.dmp

                Filesize

                72KB

              • memory/4864-173-0x0000000002250000-0x0000000002262000-memory.dmp

                Filesize

                72KB

              • memory/4864-175-0x0000000002250000-0x0000000002262000-memory.dmp

                Filesize

                72KB

              • memory/4864-177-0x0000000002250000-0x0000000002262000-memory.dmp

                Filesize

                72KB

              • memory/4864-179-0x0000000002250000-0x0000000002262000-memory.dmp

                Filesize

                72KB

              • memory/4864-181-0x0000000002250000-0x0000000002262000-memory.dmp

                Filesize

                72KB

              • memory/4864-183-0x0000000002250000-0x0000000002262000-memory.dmp

                Filesize

                72KB

              • memory/4864-185-0x0000000002250000-0x0000000002262000-memory.dmp

                Filesize

                72KB

              • memory/4864-187-0x0000000002250000-0x0000000002262000-memory.dmp

                Filesize

                72KB

              • memory/4864-188-0x0000000000400000-0x0000000000485000-memory.dmp

                Filesize

                532KB

              • memory/4864-189-0x0000000004C00000-0x0000000004C10000-memory.dmp

                Filesize

                64KB

              • memory/4864-163-0x0000000002250000-0x0000000002262000-memory.dmp

                Filesize

                72KB

              • memory/4864-161-0x0000000002250000-0x0000000002262000-memory.dmp

                Filesize

                72KB

              • memory/4864-160-0x0000000002250000-0x0000000002262000-memory.dmp

                Filesize

                72KB

              • memory/4864-159-0x0000000004C00000-0x0000000004C10000-memory.dmp

                Filesize

                64KB

              • memory/4864-158-0x0000000004C00000-0x0000000004C10000-memory.dmp

                Filesize

                64KB

              • memory/4864-156-0x00000000001D0000-0x00000000001FD000-memory.dmp

                Filesize

                180KB

              • memory/4864-155-0x0000000002250000-0x0000000002268000-memory.dmp

                Filesize

                96KB

              • memory/4864-154-0x00000000007B0000-0x00000000007CA000-memory.dmp

                Filesize

                104KB

              • memory/4864-190-0x0000000004C00000-0x0000000004C10000-memory.dmp

                Filesize

                64KB

              • memory/4864-191-0x0000000004C00000-0x0000000004C10000-memory.dmp

                Filesize

                64KB

              • memory/4864-193-0x0000000000400000-0x0000000000485000-memory.dmp

                Filesize

                532KB