Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 18:25
Static task
static1
Behavioral task
behavioral1
Sample
56170c90dce23fa121d32b795cb15ea91663479bbcc449dda819cc449c30738d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
56170c90dce23fa121d32b795cb15ea91663479bbcc449dda819cc449c30738d.exe
Resource
win10v2004-20230220-en
General
-
Target
56170c90dce23fa121d32b795cb15ea91663479bbcc449dda819cc449c30738d.exe
-
Size
479KB
-
MD5
792d2b813a11107435ac8a80d9d6ddb0
-
SHA1
a0d567e43fe1a6c0a9bfe48abb9ba6361ca4fbd6
-
SHA256
56170c90dce23fa121d32b795cb15ea91663479bbcc449dda819cc449c30738d
-
SHA512
da39df8641dfebc467da7db7a746b00649e243b708f3a8b0dfd674c3988ab60823dd5f36ccd8ba580461dac2a723272b202f176990f189719841e1df3a176dd0
-
SSDEEP
12288:AMrsy90p7zC2OedxhpXQpywa6pb0fEHII6BB1Bt:8yA7OCdZIIsoI6P1P
Malware Config
Extracted
redline
daris
217.196.96.56:4138
-
auth_value
3491f24ae0250969cd45ce4b3fe77549
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4684-148-0x000000000A8C0000-0x000000000AED8000-memory.dmp redline_stealer behavioral2/memory/4684-157-0x0000000002570000-0x00000000025D6000-memory.dmp redline_stealer behavioral2/memory/4684-158-0x000000000BB40000-0x000000000BD02000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" l4203688.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" l4203688.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" l4203688.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" l4203688.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection l4203688.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" l4203688.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation m1368894.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 5 IoCs
pid Process 4476 y0929407.exe 4684 k3337541.exe 2500 l4203688.exe 4416 m1368894.exe 4628 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" l4203688.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features l4203688.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 56170c90dce23fa121d32b795cb15ea91663479bbcc449dda819cc449c30738d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y0929407.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y0929407.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 56170c90dce23fa121d32b795cb15ea91663479bbcc449dda819cc449c30738d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 404 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4684 k3337541.exe 4684 k3337541.exe 2500 l4203688.exe 2500 l4203688.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4684 k3337541.exe Token: SeDebugPrivilege 2500 l4203688.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4416 m1368894.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2620 wrote to memory of 4476 2620 56170c90dce23fa121d32b795cb15ea91663479bbcc449dda819cc449c30738d.exe 81 PID 2620 wrote to memory of 4476 2620 56170c90dce23fa121d32b795cb15ea91663479bbcc449dda819cc449c30738d.exe 81 PID 2620 wrote to memory of 4476 2620 56170c90dce23fa121d32b795cb15ea91663479bbcc449dda819cc449c30738d.exe 81 PID 4476 wrote to memory of 4684 4476 y0929407.exe 82 PID 4476 wrote to memory of 4684 4476 y0929407.exe 82 PID 4476 wrote to memory of 4684 4476 y0929407.exe 82 PID 4476 wrote to memory of 2500 4476 y0929407.exe 90 PID 4476 wrote to memory of 2500 4476 y0929407.exe 90 PID 4476 wrote to memory of 2500 4476 y0929407.exe 90 PID 2620 wrote to memory of 4416 2620 56170c90dce23fa121d32b795cb15ea91663479bbcc449dda819cc449c30738d.exe 91 PID 2620 wrote to memory of 4416 2620 56170c90dce23fa121d32b795cb15ea91663479bbcc449dda819cc449c30738d.exe 91 PID 2620 wrote to memory of 4416 2620 56170c90dce23fa121d32b795cb15ea91663479bbcc449dda819cc449c30738d.exe 91 PID 4416 wrote to memory of 4628 4416 m1368894.exe 92 PID 4416 wrote to memory of 4628 4416 m1368894.exe 92 PID 4416 wrote to memory of 4628 4416 m1368894.exe 92 PID 4628 wrote to memory of 404 4628 oneetx.exe 93 PID 4628 wrote to memory of 404 4628 oneetx.exe 93 PID 4628 wrote to memory of 404 4628 oneetx.exe 93 PID 4628 wrote to memory of 1304 4628 oneetx.exe 95 PID 4628 wrote to memory of 1304 4628 oneetx.exe 95 PID 4628 wrote to memory of 1304 4628 oneetx.exe 95 PID 1304 wrote to memory of 1716 1304 cmd.exe 97 PID 1304 wrote to memory of 1716 1304 cmd.exe 97 PID 1304 wrote to memory of 1716 1304 cmd.exe 97 PID 1304 wrote to memory of 4528 1304 cmd.exe 98 PID 1304 wrote to memory of 4528 1304 cmd.exe 98 PID 1304 wrote to memory of 4528 1304 cmd.exe 98 PID 1304 wrote to memory of 3316 1304 cmd.exe 99 PID 1304 wrote to memory of 3316 1304 cmd.exe 99 PID 1304 wrote to memory of 3316 1304 cmd.exe 99 PID 1304 wrote to memory of 4116 1304 cmd.exe 100 PID 1304 wrote to memory of 4116 1304 cmd.exe 100 PID 1304 wrote to memory of 4116 1304 cmd.exe 100 PID 1304 wrote to memory of 2408 1304 cmd.exe 101 PID 1304 wrote to memory of 2408 1304 cmd.exe 101 PID 1304 wrote to memory of 2408 1304 cmd.exe 101 PID 1304 wrote to memory of 704 1304 cmd.exe 102 PID 1304 wrote to memory of 704 1304 cmd.exe 102 PID 1304 wrote to memory of 704 1304 cmd.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\56170c90dce23fa121d32b795cb15ea91663479bbcc449dda819cc449c30738d.exe"C:\Users\Admin\AppData\Local\Temp\56170c90dce23fa121d32b795cb15ea91663479bbcc449dda819cc449c30738d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0929407.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0929407.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3337541.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3337541.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4684
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4203688.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4203688.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2500
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m1368894.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m1368894.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:404
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1716
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4528
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3316
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4116
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:2408
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:704
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD52839e267f8c0a29e78b2101a8bb0e436
SHA1429168dcc804e2068499c5cf83875039944b12d2
SHA256037433528b91a52bb2a11e13a3a1f8429519ef4c89b29b9fa626c1eaaff5d058
SHA5122eab040bd09fd647e6c53527f05d82834d6b3a7c7caaa4d2e6c8866cc27a5bc79d2ce608542a0424a99cc82959d6c6567c555ed2b7e46aa54f0da24ff23e32e5
-
Filesize
206KB
MD52839e267f8c0a29e78b2101a8bb0e436
SHA1429168dcc804e2068499c5cf83875039944b12d2
SHA256037433528b91a52bb2a11e13a3a1f8429519ef4c89b29b9fa626c1eaaff5d058
SHA5122eab040bd09fd647e6c53527f05d82834d6b3a7c7caaa4d2e6c8866cc27a5bc79d2ce608542a0424a99cc82959d6c6567c555ed2b7e46aa54f0da24ff23e32e5
-
Filesize
308KB
MD5037c38cfe834e95c0a8939fef2aa853d
SHA130d78adb62087992e60a82ecc08c83f092fe4999
SHA256093a97b1b1f11449a9ad66e6d0d4749c9d6b0c30f5ba3afcf740bb4eb1426063
SHA5129fe586b144078ddbf2395df010d7ffc70046821becd949835d498656a90331669c563fd94a37636bdb145772b7274db15b536428edbba9bd444f61d83e8824f8
-
Filesize
308KB
MD5037c38cfe834e95c0a8939fef2aa853d
SHA130d78adb62087992e60a82ecc08c83f092fe4999
SHA256093a97b1b1f11449a9ad66e6d0d4749c9d6b0c30f5ba3afcf740bb4eb1426063
SHA5129fe586b144078ddbf2395df010d7ffc70046821becd949835d498656a90331669c563fd94a37636bdb145772b7274db15b536428edbba9bd444f61d83e8824f8
-
Filesize
168KB
MD5b48273b7d540a7973eee0080c707e5cc
SHA12dc24c8c9dfbc06f925d6ae841316e82f93242d1
SHA256399b20ca4fcba5990f5b21f308ccb22b8082e4c2920dc5ba46755b962f425b9d
SHA5127e28f44298e0d8f11a6323611413c1a78d8ecb8d1fa6e5a598f7d1a0b4e9bdd9b03443d0a9241d60fab104f060c5d511e4de9847eb39273d1b2df544ca914097
-
Filesize
168KB
MD5b48273b7d540a7973eee0080c707e5cc
SHA12dc24c8c9dfbc06f925d6ae841316e82f93242d1
SHA256399b20ca4fcba5990f5b21f308ccb22b8082e4c2920dc5ba46755b962f425b9d
SHA5127e28f44298e0d8f11a6323611413c1a78d8ecb8d1fa6e5a598f7d1a0b4e9bdd9b03443d0a9241d60fab104f060c5d511e4de9847eb39273d1b2df544ca914097
-
Filesize
179KB
MD5db89d16909f84f260c6efe405c1436a6
SHA19dd6ebcbb1a01da5e799fb6fbc9457bcf3e162fa
SHA256e407d1b04330b4b6f22e51a3fe93de2f679461688ce0543d4024cca3281c8d0a
SHA5126870a48f35f371991a495d5065847fdc3a5bcf5c95273c9844a889e9b4e0018493700556669ac45edbe431fcfbec2f4607d830cfa45b70e6c3070dcc3eeb7f5a
-
Filesize
179KB
MD5db89d16909f84f260c6efe405c1436a6
SHA19dd6ebcbb1a01da5e799fb6fbc9457bcf3e162fa
SHA256e407d1b04330b4b6f22e51a3fe93de2f679461688ce0543d4024cca3281c8d0a
SHA5126870a48f35f371991a495d5065847fdc3a5bcf5c95273c9844a889e9b4e0018493700556669ac45edbe431fcfbec2f4607d830cfa45b70e6c3070dcc3eeb7f5a
-
Filesize
206KB
MD52839e267f8c0a29e78b2101a8bb0e436
SHA1429168dcc804e2068499c5cf83875039944b12d2
SHA256037433528b91a52bb2a11e13a3a1f8429519ef4c89b29b9fa626c1eaaff5d058
SHA5122eab040bd09fd647e6c53527f05d82834d6b3a7c7caaa4d2e6c8866cc27a5bc79d2ce608542a0424a99cc82959d6c6567c555ed2b7e46aa54f0da24ff23e32e5
-
Filesize
206KB
MD52839e267f8c0a29e78b2101a8bb0e436
SHA1429168dcc804e2068499c5cf83875039944b12d2
SHA256037433528b91a52bb2a11e13a3a1f8429519ef4c89b29b9fa626c1eaaff5d058
SHA5122eab040bd09fd647e6c53527f05d82834d6b3a7c7caaa4d2e6c8866cc27a5bc79d2ce608542a0424a99cc82959d6c6567c555ed2b7e46aa54f0da24ff23e32e5
-
Filesize
206KB
MD52839e267f8c0a29e78b2101a8bb0e436
SHA1429168dcc804e2068499c5cf83875039944b12d2
SHA256037433528b91a52bb2a11e13a3a1f8429519ef4c89b29b9fa626c1eaaff5d058
SHA5122eab040bd09fd647e6c53527f05d82834d6b3a7c7caaa4d2e6c8866cc27a5bc79d2ce608542a0424a99cc82959d6c6567c555ed2b7e46aa54f0da24ff23e32e5