Analysis
-
max time kernel
130s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
04-05-2023 07:19
Static task
static1
Behavioral task
behavioral1
Sample
17c03fcd209a9520f8f57084ee729208fe1d5c70aa5c5dd49bd36ad8c052d16f.exe
Resource
win10-20230220-en
General
-
Target
17c03fcd209a9520f8f57084ee729208fe1d5c70aa5c5dd49bd36ad8c052d16f.exe
-
Size
480KB
-
MD5
e21314c05c7dc0e38482f66788c83e7c
-
SHA1
6f884aa4fc38dcc35a7ba401bbc33c08b6b2cbb8
-
SHA256
17c03fcd209a9520f8f57084ee729208fe1d5c70aa5c5dd49bd36ad8c052d16f
-
SHA512
35e40a043a624ad7c38168b6c6da11f4201b9ef109d18d0e114f6e468dc3998417430d46101b0a1b579c2ea28ad07e6285ff7e7f9be882c10bc392bd6dc07977
-
SSDEEP
12288:dMrwy90Y/Byl34mgkfeao63b7CuZwZ7PKbgJTAmQnt:ZyedSAo636uYhTAmk
Malware Config
Extracted
redline
daris
217.196.96.56:4138
-
auth_value
3491f24ae0250969cd45ce4b3fe77549
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" l4317695.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" l4317695.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" l4317695.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" l4317695.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" l4317695.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 5048 y4548971.exe 820 k0875026.exe 4212 l4317695.exe 3700 m6982377.exe 3788 oneetx.exe 1588 oneetx.exe 3932 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3200 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features l4317695.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" l4317695.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 17c03fcd209a9520f8f57084ee729208fe1d5c70aa5c5dd49bd36ad8c052d16f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y4548971.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y4548971.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 17c03fcd209a9520f8f57084ee729208fe1d5c70aa5c5dd49bd36ad8c052d16f.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4640 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 820 k0875026.exe 820 k0875026.exe 4212 l4317695.exe 4212 l4317695.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 820 k0875026.exe Token: SeDebugPrivilege 4212 l4317695.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3700 m6982377.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4092 wrote to memory of 5048 4092 17c03fcd209a9520f8f57084ee729208fe1d5c70aa5c5dd49bd36ad8c052d16f.exe 66 PID 4092 wrote to memory of 5048 4092 17c03fcd209a9520f8f57084ee729208fe1d5c70aa5c5dd49bd36ad8c052d16f.exe 66 PID 4092 wrote to memory of 5048 4092 17c03fcd209a9520f8f57084ee729208fe1d5c70aa5c5dd49bd36ad8c052d16f.exe 66 PID 5048 wrote to memory of 820 5048 y4548971.exe 67 PID 5048 wrote to memory of 820 5048 y4548971.exe 67 PID 5048 wrote to memory of 820 5048 y4548971.exe 67 PID 5048 wrote to memory of 4212 5048 y4548971.exe 69 PID 5048 wrote to memory of 4212 5048 y4548971.exe 69 PID 5048 wrote to memory of 4212 5048 y4548971.exe 69 PID 4092 wrote to memory of 3700 4092 17c03fcd209a9520f8f57084ee729208fe1d5c70aa5c5dd49bd36ad8c052d16f.exe 70 PID 4092 wrote to memory of 3700 4092 17c03fcd209a9520f8f57084ee729208fe1d5c70aa5c5dd49bd36ad8c052d16f.exe 70 PID 4092 wrote to memory of 3700 4092 17c03fcd209a9520f8f57084ee729208fe1d5c70aa5c5dd49bd36ad8c052d16f.exe 70 PID 3700 wrote to memory of 3788 3700 m6982377.exe 71 PID 3700 wrote to memory of 3788 3700 m6982377.exe 71 PID 3700 wrote to memory of 3788 3700 m6982377.exe 71 PID 3788 wrote to memory of 4640 3788 oneetx.exe 72 PID 3788 wrote to memory of 4640 3788 oneetx.exe 72 PID 3788 wrote to memory of 4640 3788 oneetx.exe 72 PID 3788 wrote to memory of 1684 3788 oneetx.exe 74 PID 3788 wrote to memory of 1684 3788 oneetx.exe 74 PID 3788 wrote to memory of 1684 3788 oneetx.exe 74 PID 1684 wrote to memory of 4892 1684 cmd.exe 76 PID 1684 wrote to memory of 4892 1684 cmd.exe 76 PID 1684 wrote to memory of 4892 1684 cmd.exe 76 PID 1684 wrote to memory of 4844 1684 cmd.exe 77 PID 1684 wrote to memory of 4844 1684 cmd.exe 77 PID 1684 wrote to memory of 4844 1684 cmd.exe 77 PID 1684 wrote to memory of 3156 1684 cmd.exe 78 PID 1684 wrote to memory of 3156 1684 cmd.exe 78 PID 1684 wrote to memory of 3156 1684 cmd.exe 78 PID 1684 wrote to memory of 4532 1684 cmd.exe 79 PID 1684 wrote to memory of 4532 1684 cmd.exe 79 PID 1684 wrote to memory of 4532 1684 cmd.exe 79 PID 1684 wrote to memory of 4536 1684 cmd.exe 80 PID 1684 wrote to memory of 4536 1684 cmd.exe 80 PID 1684 wrote to memory of 4536 1684 cmd.exe 80 PID 1684 wrote to memory of 4556 1684 cmd.exe 81 PID 1684 wrote to memory of 4556 1684 cmd.exe 81 PID 1684 wrote to memory of 4556 1684 cmd.exe 81 PID 3788 wrote to memory of 3200 3788 oneetx.exe 83 PID 3788 wrote to memory of 3200 3788 oneetx.exe 83 PID 3788 wrote to memory of 3200 3788 oneetx.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\17c03fcd209a9520f8f57084ee729208fe1d5c70aa5c5dd49bd36ad8c052d16f.exe"C:\Users\Admin\AppData\Local\Temp\17c03fcd209a9520f8f57084ee729208fe1d5c70aa5c5dd49bd36ad8c052d16f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4548971.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4548971.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0875026.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0875026.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:820
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4317695.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4317695.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4212
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6982377.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6982377.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4640
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4892
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4844
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3156
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4532
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4536
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:4556
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3200
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1588
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3932
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD526895481f602956cb6e42cf9803c7b4d
SHA12277fc08316c3166999175732947b8f1b21c831f
SHA256a6d33953a4cfeb513d3c1ad36fcac3346f5675354fa688e942bf9cff5b366732
SHA5124638b94e2cd2e202a4f2a4f42e19122a91235ecccc6812a2a659547f529eab4e8a04b0d587dbc943fa7673350477e81cc08e8d6e8a4dbccbc3129a63ac948566
-
Filesize
206KB
MD526895481f602956cb6e42cf9803c7b4d
SHA12277fc08316c3166999175732947b8f1b21c831f
SHA256a6d33953a4cfeb513d3c1ad36fcac3346f5675354fa688e942bf9cff5b366732
SHA5124638b94e2cd2e202a4f2a4f42e19122a91235ecccc6812a2a659547f529eab4e8a04b0d587dbc943fa7673350477e81cc08e8d6e8a4dbccbc3129a63ac948566
-
Filesize
308KB
MD589be67eebd32e8f2eb6c84432ecd67bc
SHA1970e266997d4bd146c46e90a7c8380188f6291c5
SHA25613d9caf9fe11be122750f2b9eedfe53be2488603a52be3a4a670dea1b6edbaf7
SHA51205425a7e92da75381d0c1e618b0b05c42c39fd5e25355840fa81dd0e245e29ec89b4999d7e9923b7d48c5aaa4946bf55691ca31838146c4f71a3b0d189e2182f
-
Filesize
308KB
MD589be67eebd32e8f2eb6c84432ecd67bc
SHA1970e266997d4bd146c46e90a7c8380188f6291c5
SHA25613d9caf9fe11be122750f2b9eedfe53be2488603a52be3a4a670dea1b6edbaf7
SHA51205425a7e92da75381d0c1e618b0b05c42c39fd5e25355840fa81dd0e245e29ec89b4999d7e9923b7d48c5aaa4946bf55691ca31838146c4f71a3b0d189e2182f
-
Filesize
168KB
MD569e3110cc49144429fd33f77bef9edc8
SHA1851699559427bc8dd592b09d037952c97bf5ff14
SHA2566d023eaa070dda70ec23d30dc94348887a4ebcfa6187d280cc4e17c184f118b9
SHA51278db7c1080005e94f963d0817b8c921ba5073e0ea54e51d7099b436758c65a1e7653458e711ee81692a38694c4359006295164a9ba68ca2ce48748034dba1128
-
Filesize
168KB
MD569e3110cc49144429fd33f77bef9edc8
SHA1851699559427bc8dd592b09d037952c97bf5ff14
SHA2566d023eaa070dda70ec23d30dc94348887a4ebcfa6187d280cc4e17c184f118b9
SHA51278db7c1080005e94f963d0817b8c921ba5073e0ea54e51d7099b436758c65a1e7653458e711ee81692a38694c4359006295164a9ba68ca2ce48748034dba1128
-
Filesize
179KB
MD5226fb1ce7b0fc6c427e53a936c7cba30
SHA1669d7dbbdaafbedab5744ac5540948941a97bb40
SHA256ca83c6a7a9f0d709f209302d2a45bcb200f4f09e0af45e99d259410f366a989a
SHA51261f97cda12dc32892376abd963e61dcc0575cb2c81eeed2bfc72636454487de9ce25e63878254583ce60803dd0b9aaa963fc438714e5869cc9941125eee85a5f
-
Filesize
179KB
MD5226fb1ce7b0fc6c427e53a936c7cba30
SHA1669d7dbbdaafbedab5744ac5540948941a97bb40
SHA256ca83c6a7a9f0d709f209302d2a45bcb200f4f09e0af45e99d259410f366a989a
SHA51261f97cda12dc32892376abd963e61dcc0575cb2c81eeed2bfc72636454487de9ce25e63878254583ce60803dd0b9aaa963fc438714e5869cc9941125eee85a5f
-
Filesize
206KB
MD526895481f602956cb6e42cf9803c7b4d
SHA12277fc08316c3166999175732947b8f1b21c831f
SHA256a6d33953a4cfeb513d3c1ad36fcac3346f5675354fa688e942bf9cff5b366732
SHA5124638b94e2cd2e202a4f2a4f42e19122a91235ecccc6812a2a659547f529eab4e8a04b0d587dbc943fa7673350477e81cc08e8d6e8a4dbccbc3129a63ac948566
-
Filesize
206KB
MD526895481f602956cb6e42cf9803c7b4d
SHA12277fc08316c3166999175732947b8f1b21c831f
SHA256a6d33953a4cfeb513d3c1ad36fcac3346f5675354fa688e942bf9cff5b366732
SHA5124638b94e2cd2e202a4f2a4f42e19122a91235ecccc6812a2a659547f529eab4e8a04b0d587dbc943fa7673350477e81cc08e8d6e8a4dbccbc3129a63ac948566
-
Filesize
206KB
MD526895481f602956cb6e42cf9803c7b4d
SHA12277fc08316c3166999175732947b8f1b21c831f
SHA256a6d33953a4cfeb513d3c1ad36fcac3346f5675354fa688e942bf9cff5b366732
SHA5124638b94e2cd2e202a4f2a4f42e19122a91235ecccc6812a2a659547f529eab4e8a04b0d587dbc943fa7673350477e81cc08e8d6e8a4dbccbc3129a63ac948566
-
Filesize
206KB
MD526895481f602956cb6e42cf9803c7b4d
SHA12277fc08316c3166999175732947b8f1b21c831f
SHA256a6d33953a4cfeb513d3c1ad36fcac3346f5675354fa688e942bf9cff5b366732
SHA5124638b94e2cd2e202a4f2a4f42e19122a91235ecccc6812a2a659547f529eab4e8a04b0d587dbc943fa7673350477e81cc08e8d6e8a4dbccbc3129a63ac948566
-
Filesize
206KB
MD526895481f602956cb6e42cf9803c7b4d
SHA12277fc08316c3166999175732947b8f1b21c831f
SHA256a6d33953a4cfeb513d3c1ad36fcac3346f5675354fa688e942bf9cff5b366732
SHA5124638b94e2cd2e202a4f2a4f42e19122a91235ecccc6812a2a659547f529eab4e8a04b0d587dbc943fa7673350477e81cc08e8d6e8a4dbccbc3129a63ac948566
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53