Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 18:24
Static task
static1
Behavioral task
behavioral1
Sample
50c7015e7d805d1607e821a77a868dddf839a9869d580aa2337573e4319c367e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
50c7015e7d805d1607e821a77a868dddf839a9869d580aa2337573e4319c367e.exe
Resource
win10v2004-20230220-en
General
-
Target
50c7015e7d805d1607e821a77a868dddf839a9869d580aa2337573e4319c367e.exe
-
Size
479KB
-
MD5
c40c57b7e161f1275d0ae03b9e04eebe
-
SHA1
83b5833db7ee8b0a3f6ab72e74fcd5fa73f9938b
-
SHA256
50c7015e7d805d1607e821a77a868dddf839a9869d580aa2337573e4319c367e
-
SHA512
d971f86beaa65a564843909e2e37bde324f207803d0f6d04c8b01f40a693ffc3fdb8093d03a422fa272a13db4e5e706ae6ae5642dcacd2188c492f96a80901df
-
SSDEEP
12288:AMriy90NdGaCb9vQ2YzGs5YGp5Kyt7Y9:yyS454jZ/ptm
Malware Config
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1640-148-0x0000000007320000-0x0000000007938000-memory.dmp redline_stealer behavioral2/memory/1640-153-0x0000000007120000-0x0000000007186000-memory.dmp redline_stealer behavioral2/memory/1640-157-0x00000000086A0000-0x0000000008862000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection l9467952.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" l9467952.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" l9467952.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" l9467952.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" l9467952.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" l9467952.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation m4539665.exe -
Executes dropped EXE 7 IoCs
pid Process 2980 y4022273.exe 1640 k0716129.exe 4496 l9467952.exe 828 m4539665.exe 3120 oneetx.exe 2540 oneetx.exe 1068 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1060 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features l9467952.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" l9467952.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y4022273.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 50c7015e7d805d1607e821a77a868dddf839a9869d580aa2337573e4319c367e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 50c7015e7d805d1607e821a77a868dddf839a9869d580aa2337573e4319c367e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y4022273.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1888 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1640 k0716129.exe 1640 k0716129.exe 4496 l9467952.exe 4496 l9467952.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1640 k0716129.exe Token: SeDebugPrivilege 4496 l9467952.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 828 m4539665.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4596 wrote to memory of 2980 4596 50c7015e7d805d1607e821a77a868dddf839a9869d580aa2337573e4319c367e.exe 84 PID 4596 wrote to memory of 2980 4596 50c7015e7d805d1607e821a77a868dddf839a9869d580aa2337573e4319c367e.exe 84 PID 4596 wrote to memory of 2980 4596 50c7015e7d805d1607e821a77a868dddf839a9869d580aa2337573e4319c367e.exe 84 PID 2980 wrote to memory of 1640 2980 y4022273.exe 85 PID 2980 wrote to memory of 1640 2980 y4022273.exe 85 PID 2980 wrote to memory of 1640 2980 y4022273.exe 85 PID 2980 wrote to memory of 4496 2980 y4022273.exe 91 PID 2980 wrote to memory of 4496 2980 y4022273.exe 91 PID 2980 wrote to memory of 4496 2980 y4022273.exe 91 PID 4596 wrote to memory of 828 4596 50c7015e7d805d1607e821a77a868dddf839a9869d580aa2337573e4319c367e.exe 94 PID 4596 wrote to memory of 828 4596 50c7015e7d805d1607e821a77a868dddf839a9869d580aa2337573e4319c367e.exe 94 PID 4596 wrote to memory of 828 4596 50c7015e7d805d1607e821a77a868dddf839a9869d580aa2337573e4319c367e.exe 94 PID 828 wrote to memory of 3120 828 m4539665.exe 95 PID 828 wrote to memory of 3120 828 m4539665.exe 95 PID 828 wrote to memory of 3120 828 m4539665.exe 95 PID 3120 wrote to memory of 1888 3120 oneetx.exe 96 PID 3120 wrote to memory of 1888 3120 oneetx.exe 96 PID 3120 wrote to memory of 1888 3120 oneetx.exe 96 PID 3120 wrote to memory of 4288 3120 oneetx.exe 98 PID 3120 wrote to memory of 4288 3120 oneetx.exe 98 PID 3120 wrote to memory of 4288 3120 oneetx.exe 98 PID 4288 wrote to memory of 1072 4288 cmd.exe 100 PID 4288 wrote to memory of 1072 4288 cmd.exe 100 PID 4288 wrote to memory of 1072 4288 cmd.exe 100 PID 4288 wrote to memory of 1504 4288 cmd.exe 101 PID 4288 wrote to memory of 1504 4288 cmd.exe 101 PID 4288 wrote to memory of 1504 4288 cmd.exe 101 PID 4288 wrote to memory of 3936 4288 cmd.exe 102 PID 4288 wrote to memory of 3936 4288 cmd.exe 102 PID 4288 wrote to memory of 3936 4288 cmd.exe 102 PID 4288 wrote to memory of 2232 4288 cmd.exe 104 PID 4288 wrote to memory of 2232 4288 cmd.exe 104 PID 4288 wrote to memory of 2232 4288 cmd.exe 104 PID 4288 wrote to memory of 3920 4288 cmd.exe 103 PID 4288 wrote to memory of 3920 4288 cmd.exe 103 PID 4288 wrote to memory of 3920 4288 cmd.exe 103 PID 4288 wrote to memory of 2404 4288 cmd.exe 105 PID 4288 wrote to memory of 2404 4288 cmd.exe 105 PID 4288 wrote to memory of 2404 4288 cmd.exe 105 PID 3120 wrote to memory of 1060 3120 oneetx.exe 106 PID 3120 wrote to memory of 1060 3120 oneetx.exe 106 PID 3120 wrote to memory of 1060 3120 oneetx.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\50c7015e7d805d1607e821a77a868dddf839a9869d580aa2337573e4319c367e.exe"C:\Users\Admin\AppData\Local\Temp\50c7015e7d805d1607e821a77a868dddf839a9869d580aa2337573e4319c367e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4022273.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4022273.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0716129.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0716129.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9467952.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9467952.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4496
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m4539665.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m4539665.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1888
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1072
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1504
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3936
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:3920
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2232
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:2404
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1060
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2540
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1068
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5fb48c34ec1aab6c5173a830e25eeeb22
SHA1167645d3d4fc2021a2be888dff297e1eabd39e3d
SHA2567b44e475ce9769213a054101d3017241ad0f89af1fc39b3e6bdf6b611e0b0588
SHA5121d2283004b903e5310db0a2a85542f638e4251fbfe2ddd1214fd24cfe61298b95d3671634367e48a6b7b2bbd225e1c7b1793c632b77918361131363d800b92ba
-
Filesize
204KB
MD5fb48c34ec1aab6c5173a830e25eeeb22
SHA1167645d3d4fc2021a2be888dff297e1eabd39e3d
SHA2567b44e475ce9769213a054101d3017241ad0f89af1fc39b3e6bdf6b611e0b0588
SHA5121d2283004b903e5310db0a2a85542f638e4251fbfe2ddd1214fd24cfe61298b95d3671634367e48a6b7b2bbd225e1c7b1793c632b77918361131363d800b92ba
-
Filesize
307KB
MD5f626fde65c1232f477fd11a19045db71
SHA1179298995d367dbf95fb729f38bd8e040674dbda
SHA256105532e85a7f94d05e1d5b5f19a697f10276de349f28adda59e76f6729c74456
SHA512e0051e74f7df1617766f6b206aff24f40e4709dbe72001a8894540d2461c0ab365c63bd00f46b8e033f56c8979a720df15e8b7635b6b016fd1328fec0f066f81
-
Filesize
307KB
MD5f626fde65c1232f477fd11a19045db71
SHA1179298995d367dbf95fb729f38bd8e040674dbda
SHA256105532e85a7f94d05e1d5b5f19a697f10276de349f28adda59e76f6729c74456
SHA512e0051e74f7df1617766f6b206aff24f40e4709dbe72001a8894540d2461c0ab365c63bd00f46b8e033f56c8979a720df15e8b7635b6b016fd1328fec0f066f81
-
Filesize
136KB
MD57b2c3c27cc80730d65ed71d631bf69e4
SHA1cf5e33720a442c15bc1c90cf43ee0dcbcb20a3aa
SHA256edc49c2dfc9a56f1e10e1114fae7dd783a3aea2d146aedc805be7295db4e0f56
SHA51288cc0327dff7784778f0a18c1e94ac7b2f3cefa33d713842fc2ea590274769063fe4512fa74787e21635e6b247e8bbe6bd2e59a1b0f2f57465ae5fee912538b6
-
Filesize
136KB
MD57b2c3c27cc80730d65ed71d631bf69e4
SHA1cf5e33720a442c15bc1c90cf43ee0dcbcb20a3aa
SHA256edc49c2dfc9a56f1e10e1114fae7dd783a3aea2d146aedc805be7295db4e0f56
SHA51288cc0327dff7784778f0a18c1e94ac7b2f3cefa33d713842fc2ea590274769063fe4512fa74787e21635e6b247e8bbe6bd2e59a1b0f2f57465ae5fee912538b6
-
Filesize
175KB
MD5aafe65c9aa10b2b8bfdd7891ddea1f8c
SHA1393021f4b2cc00d2372fb2cff20e4129ef33f7e2
SHA256aaa02d2cd4a57b7d1d337bcbcd82e7297a128a7c52c2ae7e6c920646591d94b4
SHA5127e31f0ea7600a344d9d9764241b3732dcf8e539e8ad94688d40debfd19902e414717f4ba87be896d3c0db20f0e88fef8f3263f72de3d078d44ffa38a4e46400f
-
Filesize
175KB
MD5aafe65c9aa10b2b8bfdd7891ddea1f8c
SHA1393021f4b2cc00d2372fb2cff20e4129ef33f7e2
SHA256aaa02d2cd4a57b7d1d337bcbcd82e7297a128a7c52c2ae7e6c920646591d94b4
SHA5127e31f0ea7600a344d9d9764241b3732dcf8e539e8ad94688d40debfd19902e414717f4ba87be896d3c0db20f0e88fef8f3263f72de3d078d44ffa38a4e46400f
-
Filesize
204KB
MD5fb48c34ec1aab6c5173a830e25eeeb22
SHA1167645d3d4fc2021a2be888dff297e1eabd39e3d
SHA2567b44e475ce9769213a054101d3017241ad0f89af1fc39b3e6bdf6b611e0b0588
SHA5121d2283004b903e5310db0a2a85542f638e4251fbfe2ddd1214fd24cfe61298b95d3671634367e48a6b7b2bbd225e1c7b1793c632b77918361131363d800b92ba
-
Filesize
204KB
MD5fb48c34ec1aab6c5173a830e25eeeb22
SHA1167645d3d4fc2021a2be888dff297e1eabd39e3d
SHA2567b44e475ce9769213a054101d3017241ad0f89af1fc39b3e6bdf6b611e0b0588
SHA5121d2283004b903e5310db0a2a85542f638e4251fbfe2ddd1214fd24cfe61298b95d3671634367e48a6b7b2bbd225e1c7b1793c632b77918361131363d800b92ba
-
Filesize
204KB
MD5fb48c34ec1aab6c5173a830e25eeeb22
SHA1167645d3d4fc2021a2be888dff297e1eabd39e3d
SHA2567b44e475ce9769213a054101d3017241ad0f89af1fc39b3e6bdf6b611e0b0588
SHA5121d2283004b903e5310db0a2a85542f638e4251fbfe2ddd1214fd24cfe61298b95d3671634367e48a6b7b2bbd225e1c7b1793c632b77918361131363d800b92ba
-
Filesize
204KB
MD5fb48c34ec1aab6c5173a830e25eeeb22
SHA1167645d3d4fc2021a2be888dff297e1eabd39e3d
SHA2567b44e475ce9769213a054101d3017241ad0f89af1fc39b3e6bdf6b611e0b0588
SHA5121d2283004b903e5310db0a2a85542f638e4251fbfe2ddd1214fd24cfe61298b95d3671634367e48a6b7b2bbd225e1c7b1793c632b77918361131363d800b92ba
-
Filesize
204KB
MD5fb48c34ec1aab6c5173a830e25eeeb22
SHA1167645d3d4fc2021a2be888dff297e1eabd39e3d
SHA2567b44e475ce9769213a054101d3017241ad0f89af1fc39b3e6bdf6b611e0b0588
SHA5121d2283004b903e5310db0a2a85542f638e4251fbfe2ddd1214fd24cfe61298b95d3671634367e48a6b7b2bbd225e1c7b1793c632b77918361131363d800b92ba
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5