Analysis
-
max time kernel
183s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 18:28
Static task
static1
Behavioral task
behavioral1
Sample
62da59f6e34bdff32fdb43bba3f71e9ea7ee98ba2ac19aad239d7341e14796f1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
62da59f6e34bdff32fdb43bba3f71e9ea7ee98ba2ac19aad239d7341e14796f1.exe
Resource
win10v2004-20230220-en
General
-
Target
62da59f6e34bdff32fdb43bba3f71e9ea7ee98ba2ac19aad239d7341e14796f1.exe
-
Size
587KB
-
MD5
593fb7a49943d69b1fb17eed8dfb9e03
-
SHA1
c8a12df31f544074b214d3238ef16e71a7fa80ed
-
SHA256
62da59f6e34bdff32fdb43bba3f71e9ea7ee98ba2ac19aad239d7341e14796f1
-
SHA512
b597b7b0b6b5b31024842b2b0e668cb21490cfe632af8f6a8fa1dd1e7bfc845e9f7a5ff1e21ed7c7af8b8646c7bb876e029a556264e33c8986f68aee86570f61
-
SSDEEP
12288:0MrJy90l1y6m38pNxe07yR6h/J8cpf1t/KbY6M9BHt0Y2:VyOcTMxXFhfxfiY6eBN0X
Malware Config
Extracted
redline
daris
217.196.96.56:4138
-
auth_value
3491f24ae0250969cd45ce4b3fe77549
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4376-148-0x000000000AD40000-0x000000000B358000-memory.dmp redline_stealer behavioral2/memory/4376-156-0x000000000B4D0000-0x000000000B536000-memory.dmp redline_stealer behavioral2/memory/4376-158-0x000000000C090000-0x000000000C252000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h6155124.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h6155124.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h6155124.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h6155124.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h6155124.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h6155124.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation i1223240.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 5 IoCs
pid Process 692 x4368243.exe 4376 g7327173.exe 4320 h6155124.exe 4192 i1223240.exe 4964 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h6155124.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h6155124.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x4368243.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 62da59f6e34bdff32fdb43bba3f71e9ea7ee98ba2ac19aad239d7341e14796f1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 62da59f6e34bdff32fdb43bba3f71e9ea7ee98ba2ac19aad239d7341e14796f1.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x4368243.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4424 4320 WerFault.exe 85 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 788 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4376 g7327173.exe 4376 g7327173.exe 4320 h6155124.exe 4320 h6155124.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4376 g7327173.exe Token: SeDebugPrivilege 4320 h6155124.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4192 i1223240.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2028 wrote to memory of 692 2028 62da59f6e34bdff32fdb43bba3f71e9ea7ee98ba2ac19aad239d7341e14796f1.exe 80 PID 2028 wrote to memory of 692 2028 62da59f6e34bdff32fdb43bba3f71e9ea7ee98ba2ac19aad239d7341e14796f1.exe 80 PID 2028 wrote to memory of 692 2028 62da59f6e34bdff32fdb43bba3f71e9ea7ee98ba2ac19aad239d7341e14796f1.exe 80 PID 692 wrote to memory of 4376 692 x4368243.exe 81 PID 692 wrote to memory of 4376 692 x4368243.exe 81 PID 692 wrote to memory of 4376 692 x4368243.exe 81 PID 692 wrote to memory of 4320 692 x4368243.exe 85 PID 692 wrote to memory of 4320 692 x4368243.exe 85 PID 692 wrote to memory of 4320 692 x4368243.exe 85 PID 2028 wrote to memory of 4192 2028 62da59f6e34bdff32fdb43bba3f71e9ea7ee98ba2ac19aad239d7341e14796f1.exe 92 PID 2028 wrote to memory of 4192 2028 62da59f6e34bdff32fdb43bba3f71e9ea7ee98ba2ac19aad239d7341e14796f1.exe 92 PID 2028 wrote to memory of 4192 2028 62da59f6e34bdff32fdb43bba3f71e9ea7ee98ba2ac19aad239d7341e14796f1.exe 92 PID 4192 wrote to memory of 4964 4192 i1223240.exe 93 PID 4192 wrote to memory of 4964 4192 i1223240.exe 93 PID 4192 wrote to memory of 4964 4192 i1223240.exe 93 PID 4964 wrote to memory of 788 4964 oneetx.exe 94 PID 4964 wrote to memory of 788 4964 oneetx.exe 94 PID 4964 wrote to memory of 788 4964 oneetx.exe 94 PID 4964 wrote to memory of 1460 4964 oneetx.exe 96 PID 4964 wrote to memory of 1460 4964 oneetx.exe 96 PID 4964 wrote to memory of 1460 4964 oneetx.exe 96 PID 1460 wrote to memory of 2216 1460 cmd.exe 98 PID 1460 wrote to memory of 2216 1460 cmd.exe 98 PID 1460 wrote to memory of 2216 1460 cmd.exe 98 PID 1460 wrote to memory of 1896 1460 cmd.exe 99 PID 1460 wrote to memory of 1896 1460 cmd.exe 99 PID 1460 wrote to memory of 1896 1460 cmd.exe 99 PID 1460 wrote to memory of 3624 1460 cmd.exe 100 PID 1460 wrote to memory of 3624 1460 cmd.exe 100 PID 1460 wrote to memory of 3624 1460 cmd.exe 100 PID 1460 wrote to memory of 1988 1460 cmd.exe 101 PID 1460 wrote to memory of 1988 1460 cmd.exe 101 PID 1460 wrote to memory of 1988 1460 cmd.exe 101 PID 1460 wrote to memory of 4788 1460 cmd.exe 102 PID 1460 wrote to memory of 4788 1460 cmd.exe 102 PID 1460 wrote to memory of 4788 1460 cmd.exe 102 PID 1460 wrote to memory of 1828 1460 cmd.exe 103 PID 1460 wrote to memory of 1828 1460 cmd.exe 103 PID 1460 wrote to memory of 1828 1460 cmd.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\62da59f6e34bdff32fdb43bba3f71e9ea7ee98ba2ac19aad239d7341e14796f1.exe"C:\Users\Admin\AppData\Local\Temp\62da59f6e34bdff32fdb43bba3f71e9ea7ee98ba2ac19aad239d7341e14796f1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4368243.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4368243.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7327173.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g7327173.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4376
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h6155124.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h6155124.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4320 -s 10804⤵
- Program crash
PID:4424
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i1223240.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i1223240.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:788
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2216
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1896
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3624
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1988
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4788
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:1828
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4320 -ip 43201⤵PID:2712
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5ab1fe75ea37a013876416c5b94841209
SHA18af0f0d5d6e599f063c28fcff93ba52abccaca40
SHA25620e7a1165fc8390bed9b3dc9bf64be7f33608a4dd27b531a2e7a9fb608869326
SHA5120d6db88c5e7ca1ea8b42a71ac19aca908ad11d41dba5064b9a9fbcb53d52f8d0f93c24f006c171edf5c242ed58866a61d102683705b6181afdf53b4829c7652e
-
Filesize
206KB
MD5ab1fe75ea37a013876416c5b94841209
SHA18af0f0d5d6e599f063c28fcff93ba52abccaca40
SHA25620e7a1165fc8390bed9b3dc9bf64be7f33608a4dd27b531a2e7a9fb608869326
SHA5120d6db88c5e7ca1ea8b42a71ac19aca908ad11d41dba5064b9a9fbcb53d52f8d0f93c24f006c171edf5c242ed58866a61d102683705b6181afdf53b4829c7652e
-
Filesize
416KB
MD51e975257d0c601ba9009afa99cf27f0f
SHA1a2b60ac559723e28c7c367f9a05c4a2a345c65cb
SHA25677a734253020985071888099c0ad4be3f768870cbe6e9a3d05b9255ccae5b049
SHA5120f0750831db1c65446a5d72a7cfb80e9d613281d0c9a77483d68a58131a99d4997305b818d7ca3eca635a3a73dee7a688d45ad8ab99a45792f5a75377b133494
-
Filesize
416KB
MD51e975257d0c601ba9009afa99cf27f0f
SHA1a2b60ac559723e28c7c367f9a05c4a2a345c65cb
SHA25677a734253020985071888099c0ad4be3f768870cbe6e9a3d05b9255ccae5b049
SHA5120f0750831db1c65446a5d72a7cfb80e9d613281d0c9a77483d68a58131a99d4997305b818d7ca3eca635a3a73dee7a688d45ad8ab99a45792f5a75377b133494
-
Filesize
168KB
MD56c3cc56500b34f99d1933f7cfc74d368
SHA1edfbfc93de31ce04c488fe4dcfb1c27abf1c7b6a
SHA2565a3b06e1f5f6cb24eb36cf8cad6ea7e165a3007b9979bb18cdc65c3f1c5d8000
SHA512dc29291a73aa5eb6c1eabc88900b260ab6e368c61d40cd35f22033340d745d7444ef9ed2b6b276a5d3303a4aeb58ab7e412616918f1b1e13e2f627faeb2838cc
-
Filesize
168KB
MD56c3cc56500b34f99d1933f7cfc74d368
SHA1edfbfc93de31ce04c488fe4dcfb1c27abf1c7b6a
SHA2565a3b06e1f5f6cb24eb36cf8cad6ea7e165a3007b9979bb18cdc65c3f1c5d8000
SHA512dc29291a73aa5eb6c1eabc88900b260ab6e368c61d40cd35f22033340d745d7444ef9ed2b6b276a5d3303a4aeb58ab7e412616918f1b1e13e2f627faeb2838cc
-
Filesize
360KB
MD5f15af42878a58face96e702a4b700b41
SHA1bff41272ede2263be1362d83fbf2a58c5ba35f6f
SHA256b0abef0363c461f93a6fd7d19056c1f714d4ada9cbcca72157926becde25b936
SHA5126546da2be00fc0f16025b2501c09cf2edf8e1e4c3c91d4f4fa1fe49fe0f8a8857dfc74acdea6be60de28b09d9cacc2352167142fc480c9dd6ada493262cca569
-
Filesize
360KB
MD5f15af42878a58face96e702a4b700b41
SHA1bff41272ede2263be1362d83fbf2a58c5ba35f6f
SHA256b0abef0363c461f93a6fd7d19056c1f714d4ada9cbcca72157926becde25b936
SHA5126546da2be00fc0f16025b2501c09cf2edf8e1e4c3c91d4f4fa1fe49fe0f8a8857dfc74acdea6be60de28b09d9cacc2352167142fc480c9dd6ada493262cca569
-
Filesize
206KB
MD5ab1fe75ea37a013876416c5b94841209
SHA18af0f0d5d6e599f063c28fcff93ba52abccaca40
SHA25620e7a1165fc8390bed9b3dc9bf64be7f33608a4dd27b531a2e7a9fb608869326
SHA5120d6db88c5e7ca1ea8b42a71ac19aca908ad11d41dba5064b9a9fbcb53d52f8d0f93c24f006c171edf5c242ed58866a61d102683705b6181afdf53b4829c7652e
-
Filesize
206KB
MD5ab1fe75ea37a013876416c5b94841209
SHA18af0f0d5d6e599f063c28fcff93ba52abccaca40
SHA25620e7a1165fc8390bed9b3dc9bf64be7f33608a4dd27b531a2e7a9fb608869326
SHA5120d6db88c5e7ca1ea8b42a71ac19aca908ad11d41dba5064b9a9fbcb53d52f8d0f93c24f006c171edf5c242ed58866a61d102683705b6181afdf53b4829c7652e
-
Filesize
206KB
MD5ab1fe75ea37a013876416c5b94841209
SHA18af0f0d5d6e599f063c28fcff93ba52abccaca40
SHA25620e7a1165fc8390bed9b3dc9bf64be7f33608a4dd27b531a2e7a9fb608869326
SHA5120d6db88c5e7ca1ea8b42a71ac19aca908ad11d41dba5064b9a9fbcb53d52f8d0f93c24f006c171edf5c242ed58866a61d102683705b6181afdf53b4829c7652e