Analysis

  • max time kernel
    142s
  • max time network
    145s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04/05/2023, 06:30

General

  • Target

    d80a447c4f3445bf7ff374a513b0d013c155af40c90dde74e07124efdb760351.exe

  • Size

    479KB

  • MD5

    68b8701d0f8234eedbf1fd1cb304dd4f

  • SHA1

    4558766e01d0cf0fec3e10af40ff2d6f44f9ee74

  • SHA256

    d80a447c4f3445bf7ff374a513b0d013c155af40c90dde74e07124efdb760351

  • SHA512

    c1d0c7e1ecd00733048bbf4ac2beb5c72689b54fa66df2e2bc80607829a444deddc5be0b4fb8be25e90e7e6efa6207984d5e16ef799c73aab2a7975396d09ced

  • SSDEEP

    6144:Kny+bnr+Yp0yN90QEgkisF+dBK757VOBULIgRvbgBqIrVEZH599/crV28QE+eu9p:dMrAy909ii6ce9PqnZPERjxa

Malware Config

Extracted

Family

redline

Botnet

daris

C2

217.196.96.56:4138

Attributes
  • auth_value

    3491f24ae0250969cd45ce4b3fe77549

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d80a447c4f3445bf7ff374a513b0d013c155af40c90dde74e07124efdb760351.exe
    "C:\Users\Admin\AppData\Local\Temp\d80a447c4f3445bf7ff374a513b0d013c155af40c90dde74e07124efdb760351.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4052
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9461615.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9461615.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4436
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9566414.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9566414.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4252
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l5303987.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l5303987.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4716
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m4393452.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m4393452.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1016
      • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4300
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:3240
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4404
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:4408
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:N"
              5⤵
                PID:4364
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                5⤵
                  PID:4312
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:3700
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\c3912af058" /P "Admin:N"
                    5⤵
                      PID:3692
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\c3912af058" /P "Admin:R" /E
                      5⤵
                        PID:4756
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:4940
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:4640
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:3856

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m4393452.exe

                Filesize

                206KB

                MD5

                24048eb13dd00d4991cfc3e80d4ab0c4

                SHA1

                7db156d89d183abc428fbdd86dfb4f81b3b00f74

                SHA256

                358242b97ae19e223e51453f0c36199d5b053399feab42f5bb6145bdfae86617

                SHA512

                a4a97a91a9bee4b1d8e35428cf1439a3fdd3cf645a39c5ca3971365d74fb518da603e71e8e3c9429459739307dde94384d97166d4fea5b6fa9bf9cf7d507cf30

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m4393452.exe

                Filesize

                206KB

                MD5

                24048eb13dd00d4991cfc3e80d4ab0c4

                SHA1

                7db156d89d183abc428fbdd86dfb4f81b3b00f74

                SHA256

                358242b97ae19e223e51453f0c36199d5b053399feab42f5bb6145bdfae86617

                SHA512

                a4a97a91a9bee4b1d8e35428cf1439a3fdd3cf645a39c5ca3971365d74fb518da603e71e8e3c9429459739307dde94384d97166d4fea5b6fa9bf9cf7d507cf30

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9461615.exe

                Filesize

                308KB

                MD5

                2239388aa1d24ffd34375cb975c7922b

                SHA1

                64bfc1ddfc14d6e40ec2fd7ba9ff50fe77523437

                SHA256

                c2ab8925b547b3e24d043f15bef7fcee2c0964f2c687fea5269508f5deadb685

                SHA512

                498e1b838bfd3e49189177e9bcd26dc6a44b09b160a4c46989ec3f7bf47e9d4f35ffa190f2ab9d3775e79f1a869c8dcc7a02ab4f7c683dc1cc8b62cb4bfd73bb

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9461615.exe

                Filesize

                308KB

                MD5

                2239388aa1d24ffd34375cb975c7922b

                SHA1

                64bfc1ddfc14d6e40ec2fd7ba9ff50fe77523437

                SHA256

                c2ab8925b547b3e24d043f15bef7fcee2c0964f2c687fea5269508f5deadb685

                SHA512

                498e1b838bfd3e49189177e9bcd26dc6a44b09b160a4c46989ec3f7bf47e9d4f35ffa190f2ab9d3775e79f1a869c8dcc7a02ab4f7c683dc1cc8b62cb4bfd73bb

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9566414.exe

                Filesize

                168KB

                MD5

                9184e9a7c538a8c3b45ce0a0d53f8be6

                SHA1

                5ffed6eaca6f16d17b998d40855c0133d3179ab7

                SHA256

                17bb22ba448f04caf0e40e9df89af91247e89363046c2d204ce45c3e040d51c8

                SHA512

                5def5f3f113c2216763164c2619073b15d8f64620747d9b1fb86af519945b33b43259c9fabc67840f32e8bd7f28deffd7f906708d4f4039f908471bdb42419b8

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9566414.exe

                Filesize

                168KB

                MD5

                9184e9a7c538a8c3b45ce0a0d53f8be6

                SHA1

                5ffed6eaca6f16d17b998d40855c0133d3179ab7

                SHA256

                17bb22ba448f04caf0e40e9df89af91247e89363046c2d204ce45c3e040d51c8

                SHA512

                5def5f3f113c2216763164c2619073b15d8f64620747d9b1fb86af519945b33b43259c9fabc67840f32e8bd7f28deffd7f906708d4f4039f908471bdb42419b8

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l5303987.exe

                Filesize

                179KB

                MD5

                7b74e17d806cc2aa15887a6e2155930f

                SHA1

                713263bbb8d1fd90fd6ee07434bcea8e3966338e

                SHA256

                dcbaa6c48ccd123008490ed78c08fa211bb76eb57cf3089bafa2845038e6a5ab

                SHA512

                86fd23204ee0ec33994d7de93fbcb36ab66dc03772e53d4f228e5611083e0c3dc0d49f173541436b0caec62c21dd1d297d89a9fa4bcce93a37406922d5569e21

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l5303987.exe

                Filesize

                179KB

                MD5

                7b74e17d806cc2aa15887a6e2155930f

                SHA1

                713263bbb8d1fd90fd6ee07434bcea8e3966338e

                SHA256

                dcbaa6c48ccd123008490ed78c08fa211bb76eb57cf3089bafa2845038e6a5ab

                SHA512

                86fd23204ee0ec33994d7de93fbcb36ab66dc03772e53d4f228e5611083e0c3dc0d49f173541436b0caec62c21dd1d297d89a9fa4bcce93a37406922d5569e21

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                206KB

                MD5

                24048eb13dd00d4991cfc3e80d4ab0c4

                SHA1

                7db156d89d183abc428fbdd86dfb4f81b3b00f74

                SHA256

                358242b97ae19e223e51453f0c36199d5b053399feab42f5bb6145bdfae86617

                SHA512

                a4a97a91a9bee4b1d8e35428cf1439a3fdd3cf645a39c5ca3971365d74fb518da603e71e8e3c9429459739307dde94384d97166d4fea5b6fa9bf9cf7d507cf30

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                206KB

                MD5

                24048eb13dd00d4991cfc3e80d4ab0c4

                SHA1

                7db156d89d183abc428fbdd86dfb4f81b3b00f74

                SHA256

                358242b97ae19e223e51453f0c36199d5b053399feab42f5bb6145bdfae86617

                SHA512

                a4a97a91a9bee4b1d8e35428cf1439a3fdd3cf645a39c5ca3971365d74fb518da603e71e8e3c9429459739307dde94384d97166d4fea5b6fa9bf9cf7d507cf30

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                206KB

                MD5

                24048eb13dd00d4991cfc3e80d4ab0c4

                SHA1

                7db156d89d183abc428fbdd86dfb4f81b3b00f74

                SHA256

                358242b97ae19e223e51453f0c36199d5b053399feab42f5bb6145bdfae86617

                SHA512

                a4a97a91a9bee4b1d8e35428cf1439a3fdd3cf645a39c5ca3971365d74fb518da603e71e8e3c9429459739307dde94384d97166d4fea5b6fa9bf9cf7d507cf30

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                206KB

                MD5

                24048eb13dd00d4991cfc3e80d4ab0c4

                SHA1

                7db156d89d183abc428fbdd86dfb4f81b3b00f74

                SHA256

                358242b97ae19e223e51453f0c36199d5b053399feab42f5bb6145bdfae86617

                SHA512

                a4a97a91a9bee4b1d8e35428cf1439a3fdd3cf645a39c5ca3971365d74fb518da603e71e8e3c9429459739307dde94384d97166d4fea5b6fa9bf9cf7d507cf30

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                206KB

                MD5

                24048eb13dd00d4991cfc3e80d4ab0c4

                SHA1

                7db156d89d183abc428fbdd86dfb4f81b3b00f74

                SHA256

                358242b97ae19e223e51453f0c36199d5b053399feab42f5bb6145bdfae86617

                SHA512

                a4a97a91a9bee4b1d8e35428cf1439a3fdd3cf645a39c5ca3971365d74fb518da603e71e8e3c9429459739307dde94384d97166d4fea5b6fa9bf9cf7d507cf30

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • memory/4252-141-0x000000000A570000-0x000000000A5E6000-memory.dmp

                Filesize

                472KB

              • memory/4252-136-0x000000000A2C0000-0x000000000A3CA000-memory.dmp

                Filesize

                1.0MB

              • memory/4252-143-0x000000000B240000-0x000000000B73E000-memory.dmp

                Filesize

                5.0MB

              • memory/4252-144-0x000000000AD40000-0x000000000ADA6000-memory.dmp

                Filesize

                408KB

              • memory/4252-145-0x000000000B890000-0x000000000B8E0000-memory.dmp

                Filesize

                320KB

              • memory/4252-146-0x000000000BAB0000-0x000000000BC72000-memory.dmp

                Filesize

                1.8MB

              • memory/4252-147-0x000000000C1B0000-0x000000000C6DC000-memory.dmp

                Filesize

                5.2MB

              • memory/4252-142-0x000000000A690000-0x000000000A722000-memory.dmp

                Filesize

                584KB

              • memory/4252-137-0x000000000A1F0000-0x000000000A202000-memory.dmp

                Filesize

                72KB

              • memory/4252-135-0x000000000A730000-0x000000000AD36000-memory.dmp

                Filesize

                6.0MB

              • memory/4252-140-0x0000000004B90000-0x0000000004BA0000-memory.dmp

                Filesize

                64KB

              • memory/4252-139-0x000000000A3D0000-0x000000000A41B000-memory.dmp

                Filesize

                300KB

              • memory/4252-138-0x000000000A250000-0x000000000A28E000-memory.dmp

                Filesize

                248KB

              • memory/4252-134-0x0000000004B30000-0x0000000004B36000-memory.dmp

                Filesize

                24KB

              • memory/4252-133-0x0000000000380000-0x00000000003AE000-memory.dmp

                Filesize

                184KB

              • memory/4716-154-0x00000000020C0000-0x00000000020D2000-memory.dmp

                Filesize

                72KB

              • memory/4716-167-0x00000000020C0000-0x00000000020D2000-memory.dmp

                Filesize

                72KB

              • memory/4716-169-0x00000000020C0000-0x00000000020D2000-memory.dmp

                Filesize

                72KB

              • memory/4716-171-0x00000000020C0000-0x00000000020D2000-memory.dmp

                Filesize

                72KB

              • memory/4716-173-0x00000000020C0000-0x00000000020D2000-memory.dmp

                Filesize

                72KB

              • memory/4716-175-0x00000000020C0000-0x00000000020D2000-memory.dmp

                Filesize

                72KB

              • memory/4716-177-0x00000000020C0000-0x00000000020D2000-memory.dmp

                Filesize

                72KB

              • memory/4716-179-0x00000000020C0000-0x00000000020D2000-memory.dmp

                Filesize

                72KB

              • memory/4716-181-0x00000000020C0000-0x00000000020D2000-memory.dmp

                Filesize

                72KB

              • memory/4716-165-0x00000000020C0000-0x00000000020D2000-memory.dmp

                Filesize

                72KB

              • memory/4716-163-0x00000000020C0000-0x00000000020D2000-memory.dmp

                Filesize

                72KB

              • memory/4716-161-0x00000000020C0000-0x00000000020D2000-memory.dmp

                Filesize

                72KB

              • memory/4716-159-0x00000000020C0000-0x00000000020D2000-memory.dmp

                Filesize

                72KB

              • memory/4716-157-0x00000000020C0000-0x00000000020D2000-memory.dmp

                Filesize

                72KB

              • memory/4716-155-0x00000000020C0000-0x00000000020D2000-memory.dmp

                Filesize

                72KB

              • memory/4716-153-0x00000000020C0000-0x00000000020D8000-memory.dmp

                Filesize

                96KB

              • memory/4716-152-0x0000000000610000-0x000000000062A000-memory.dmp

                Filesize

                104KB

              • memory/4716-182-0x0000000004A70000-0x0000000004A80000-memory.dmp

                Filesize

                64KB

              • memory/4716-183-0x0000000004A70000-0x0000000004A80000-memory.dmp

                Filesize

                64KB

              • memory/4716-184-0x0000000004A70000-0x0000000004A80000-memory.dmp

                Filesize

                64KB