Analysis
-
max time kernel
126s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2023, 05:46
Static task
static1
Behavioral task
behavioral1
Sample
7b6ce5aec511debdf8362a93fd34b2dd3eabb3a71c9012eeeab93a666db58b4e.exe
Resource
win10v2004-20230220-en
General
-
Target
7b6ce5aec511debdf8362a93fd34b2dd3eabb3a71c9012eeeab93a666db58b4e.exe
-
Size
588KB
-
MD5
16677b61917dcc05fbeba935ce8e6791
-
SHA1
5552bf0816cefe30ba36590eab8d9fb012199e94
-
SHA256
7b6ce5aec511debdf8362a93fd34b2dd3eabb3a71c9012eeeab93a666db58b4e
-
SHA512
dab23933a9e132c41ca5d99d220c34edc626901579ceb620911b333995555e717997d45e1e142473730e8278fb3dee46bb4a09b489791ae811bab64fa53a2241
-
SSDEEP
12288:GMrhy90X/y99XKmxgPT9P03CSl2oiNwd0NQpOg+Wk3h9K6a:HyKa99XKj9SD5MQOg+Ba
Malware Config
Extracted
redline
daris
217.196.96.56:4138
-
auth_value
3491f24ae0250969cd45ce4b3fe77549
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h5850277.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h5850277.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h5850277.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h5850277.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h5850277.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h5850277.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation i8545376.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 5104 x8116915.exe 4980 g4155036.exe 3964 h5850277.exe 448 i8545376.exe 2528 oneetx.exe 4544 oneetx.exe 1844 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4464 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h5850277.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h5850277.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7b6ce5aec511debdf8362a93fd34b2dd3eabb3a71c9012eeeab93a666db58b4e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7b6ce5aec511debdf8362a93fd34b2dd3eabb3a71c9012eeeab93a666db58b4e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x8116915.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x8116915.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3740 3964 WerFault.exe 92 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2108 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4980 g4155036.exe 4980 g4155036.exe 3964 h5850277.exe 3964 h5850277.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4980 g4155036.exe Token: SeDebugPrivilege 3964 h5850277.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 448 i8545376.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 3292 wrote to memory of 5104 3292 7b6ce5aec511debdf8362a93fd34b2dd3eabb3a71c9012eeeab93a666db58b4e.exe 84 PID 3292 wrote to memory of 5104 3292 7b6ce5aec511debdf8362a93fd34b2dd3eabb3a71c9012eeeab93a666db58b4e.exe 84 PID 3292 wrote to memory of 5104 3292 7b6ce5aec511debdf8362a93fd34b2dd3eabb3a71c9012eeeab93a666db58b4e.exe 84 PID 5104 wrote to memory of 4980 5104 x8116915.exe 85 PID 5104 wrote to memory of 4980 5104 x8116915.exe 85 PID 5104 wrote to memory of 4980 5104 x8116915.exe 85 PID 5104 wrote to memory of 3964 5104 x8116915.exe 92 PID 5104 wrote to memory of 3964 5104 x8116915.exe 92 PID 5104 wrote to memory of 3964 5104 x8116915.exe 92 PID 3292 wrote to memory of 448 3292 7b6ce5aec511debdf8362a93fd34b2dd3eabb3a71c9012eeeab93a666db58b4e.exe 96 PID 3292 wrote to memory of 448 3292 7b6ce5aec511debdf8362a93fd34b2dd3eabb3a71c9012eeeab93a666db58b4e.exe 96 PID 3292 wrote to memory of 448 3292 7b6ce5aec511debdf8362a93fd34b2dd3eabb3a71c9012eeeab93a666db58b4e.exe 96 PID 448 wrote to memory of 2528 448 i8545376.exe 97 PID 448 wrote to memory of 2528 448 i8545376.exe 97 PID 448 wrote to memory of 2528 448 i8545376.exe 97 PID 2528 wrote to memory of 2108 2528 oneetx.exe 98 PID 2528 wrote to memory of 2108 2528 oneetx.exe 98 PID 2528 wrote to memory of 2108 2528 oneetx.exe 98 PID 2528 wrote to memory of 1028 2528 oneetx.exe 100 PID 2528 wrote to memory of 1028 2528 oneetx.exe 100 PID 2528 wrote to memory of 1028 2528 oneetx.exe 100 PID 1028 wrote to memory of 2556 1028 cmd.exe 102 PID 1028 wrote to memory of 2556 1028 cmd.exe 102 PID 1028 wrote to memory of 2556 1028 cmd.exe 102 PID 1028 wrote to memory of 3336 1028 cmd.exe 103 PID 1028 wrote to memory of 3336 1028 cmd.exe 103 PID 1028 wrote to memory of 3336 1028 cmd.exe 103 PID 1028 wrote to memory of 2224 1028 cmd.exe 104 PID 1028 wrote to memory of 2224 1028 cmd.exe 104 PID 1028 wrote to memory of 2224 1028 cmd.exe 104 PID 1028 wrote to memory of 3792 1028 cmd.exe 105 PID 1028 wrote to memory of 3792 1028 cmd.exe 105 PID 1028 wrote to memory of 3792 1028 cmd.exe 105 PID 1028 wrote to memory of 4484 1028 cmd.exe 106 PID 1028 wrote to memory of 4484 1028 cmd.exe 106 PID 1028 wrote to memory of 4484 1028 cmd.exe 106 PID 1028 wrote to memory of 4120 1028 cmd.exe 107 PID 1028 wrote to memory of 4120 1028 cmd.exe 107 PID 1028 wrote to memory of 4120 1028 cmd.exe 107 PID 2528 wrote to memory of 4464 2528 oneetx.exe 109 PID 2528 wrote to memory of 4464 2528 oneetx.exe 109 PID 2528 wrote to memory of 4464 2528 oneetx.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b6ce5aec511debdf8362a93fd34b2dd3eabb3a71c9012eeeab93a666db58b4e.exe"C:\Users\Admin\AppData\Local\Temp\7b6ce5aec511debdf8362a93fd34b2dd3eabb3a71c9012eeeab93a666db58b4e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8116915.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8116915.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g4155036.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g4155036.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5850277.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5850277.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 10804⤵
- Program crash
PID:3740
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8545376.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8545376.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2108
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2556
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:3336
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:2224
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3792
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4484
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:4120
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4464
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3964 -ip 39641⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4544
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1844
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5e2038dafd2020c32f482764d95f426b4
SHA1ca8e6e9d70986100cdf337570cffe2bea37236df
SHA256f0b9061d8e563ee568345a51c61b3f57e13acd0dfc8f74d505e6ab06e7bc7e3f
SHA512dd9f54e2e6592ee4b55ebbd8c8dc8b4dfedf753a40cbdc502592f2b4271d2f3021fd789b68373a18e6ba66327d38f53838f8b3a5c33fe969922b8b324cbb3e4d
-
Filesize
206KB
MD5e2038dafd2020c32f482764d95f426b4
SHA1ca8e6e9d70986100cdf337570cffe2bea37236df
SHA256f0b9061d8e563ee568345a51c61b3f57e13acd0dfc8f74d505e6ab06e7bc7e3f
SHA512dd9f54e2e6592ee4b55ebbd8c8dc8b4dfedf753a40cbdc502592f2b4271d2f3021fd789b68373a18e6ba66327d38f53838f8b3a5c33fe969922b8b324cbb3e4d
-
Filesize
416KB
MD5d4678c1f9e8ad932fefde4adbbf0c40e
SHA13475bd6551272b140b0ef2ec8cf6098af3614657
SHA2569d875b4db5b0431ace568640588a6a32c4a5de91d1bfa25b64336e5adf780a49
SHA512ae4893a93f5b8c1cee5def03277d8c282a5c0cfdff12bcabc1fa6554607f8a315f6115c771d6c38eff28f65d530560cfe8e02856d9027f384c0c5cd552347dcb
-
Filesize
416KB
MD5d4678c1f9e8ad932fefde4adbbf0c40e
SHA13475bd6551272b140b0ef2ec8cf6098af3614657
SHA2569d875b4db5b0431ace568640588a6a32c4a5de91d1bfa25b64336e5adf780a49
SHA512ae4893a93f5b8c1cee5def03277d8c282a5c0cfdff12bcabc1fa6554607f8a315f6115c771d6c38eff28f65d530560cfe8e02856d9027f384c0c5cd552347dcb
-
Filesize
168KB
MD54cfcbb46f33318cf12743f86b873e4e3
SHA1547c6e717f13a4a6ed555eddd7e6e57b13ecceb3
SHA256ab2804ef9912bc814fa3d3f93e7e95f449f616678a90894c49c5be4efcc56e89
SHA5124c24e0b8418021caa56ab357e70b1561b09f25e55ad7fb2cf5bf553ab085ce2081cad0d271d818945c2375f7c1790744b503e9d8716d0b30cd0dfa2ddd327d6d
-
Filesize
168KB
MD54cfcbb46f33318cf12743f86b873e4e3
SHA1547c6e717f13a4a6ed555eddd7e6e57b13ecceb3
SHA256ab2804ef9912bc814fa3d3f93e7e95f449f616678a90894c49c5be4efcc56e89
SHA5124c24e0b8418021caa56ab357e70b1561b09f25e55ad7fb2cf5bf553ab085ce2081cad0d271d818945c2375f7c1790744b503e9d8716d0b30cd0dfa2ddd327d6d
-
Filesize
361KB
MD53d7153e792a3cc6aec75093b7c3c1197
SHA15d455e2651e2d9257194d133eb5ced5ac4be7c1e
SHA25670a553b530d30ae58e92ee2970119cbdc3eeb2259e499b25275c49df7818b3a3
SHA51209a7606a94a094d6bd595a29a47acc3da0acee61c85636bcf6946f4920b382251ca59645ff06afec53351d68d7a8d9cc4561ebda9667360efe1bc382b27c6229
-
Filesize
361KB
MD53d7153e792a3cc6aec75093b7c3c1197
SHA15d455e2651e2d9257194d133eb5ced5ac4be7c1e
SHA25670a553b530d30ae58e92ee2970119cbdc3eeb2259e499b25275c49df7818b3a3
SHA51209a7606a94a094d6bd595a29a47acc3da0acee61c85636bcf6946f4920b382251ca59645ff06afec53351d68d7a8d9cc4561ebda9667360efe1bc382b27c6229
-
Filesize
206KB
MD5e2038dafd2020c32f482764d95f426b4
SHA1ca8e6e9d70986100cdf337570cffe2bea37236df
SHA256f0b9061d8e563ee568345a51c61b3f57e13acd0dfc8f74d505e6ab06e7bc7e3f
SHA512dd9f54e2e6592ee4b55ebbd8c8dc8b4dfedf753a40cbdc502592f2b4271d2f3021fd789b68373a18e6ba66327d38f53838f8b3a5c33fe969922b8b324cbb3e4d
-
Filesize
206KB
MD5e2038dafd2020c32f482764d95f426b4
SHA1ca8e6e9d70986100cdf337570cffe2bea37236df
SHA256f0b9061d8e563ee568345a51c61b3f57e13acd0dfc8f74d505e6ab06e7bc7e3f
SHA512dd9f54e2e6592ee4b55ebbd8c8dc8b4dfedf753a40cbdc502592f2b4271d2f3021fd789b68373a18e6ba66327d38f53838f8b3a5c33fe969922b8b324cbb3e4d
-
Filesize
206KB
MD5e2038dafd2020c32f482764d95f426b4
SHA1ca8e6e9d70986100cdf337570cffe2bea37236df
SHA256f0b9061d8e563ee568345a51c61b3f57e13acd0dfc8f74d505e6ab06e7bc7e3f
SHA512dd9f54e2e6592ee4b55ebbd8c8dc8b4dfedf753a40cbdc502592f2b4271d2f3021fd789b68373a18e6ba66327d38f53838f8b3a5c33fe969922b8b324cbb3e4d
-
Filesize
206KB
MD5e2038dafd2020c32f482764d95f426b4
SHA1ca8e6e9d70986100cdf337570cffe2bea37236df
SHA256f0b9061d8e563ee568345a51c61b3f57e13acd0dfc8f74d505e6ab06e7bc7e3f
SHA512dd9f54e2e6592ee4b55ebbd8c8dc8b4dfedf753a40cbdc502592f2b4271d2f3021fd789b68373a18e6ba66327d38f53838f8b3a5c33fe969922b8b324cbb3e4d
-
Filesize
206KB
MD5e2038dafd2020c32f482764d95f426b4
SHA1ca8e6e9d70986100cdf337570cffe2bea37236df
SHA256f0b9061d8e563ee568345a51c61b3f57e13acd0dfc8f74d505e6ab06e7bc7e3f
SHA512dd9f54e2e6592ee4b55ebbd8c8dc8b4dfedf753a40cbdc502592f2b4271d2f3021fd789b68373a18e6ba66327d38f53838f8b3a5c33fe969922b8b324cbb3e4d
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5