Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 18:21
Static task
static1
Behavioral task
behavioral1
Sample
46a77609aef12de578b872298e83e820cfcfa891e34b8a254f5c01ddc20313ef.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
46a77609aef12de578b872298e83e820cfcfa891e34b8a254f5c01ddc20313ef.exe
Resource
win10v2004-20230220-en
General
-
Target
46a77609aef12de578b872298e83e820cfcfa891e34b8a254f5c01ddc20313ef.exe
-
Size
480KB
-
MD5
52fd795dcd178e6dbe8aaf27d9aeea40
-
SHA1
2d81d49e1afcd44e1170f95fde368cb3d752632e
-
SHA256
46a77609aef12de578b872298e83e820cfcfa891e34b8a254f5c01ddc20313ef
-
SHA512
ea70ab7ba5a43fc202cc70684384937ca44d71b1384dab9b6312e8c1f59e53489ff93535734e5ace145a878c31dd5e9d85d02786c04947122c038f90dcbf110f
-
SSDEEP
6144:Kry+bnr+6p0yN90QENxjvCUkWsjZNoW7p6BBK5Srg2FANwjMH+Fy6CdH06Pp2EY7:hMrmy907B4lHWFAArFaluyJqhB
Malware Config
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1376-148-0x0000000008170000-0x0000000008788000-memory.dmp redline_stealer behavioral2/memory/1376-153-0x0000000007FD0000-0x0000000008036000-memory.dmp redline_stealer behavioral2/memory/1376-159-0x0000000009730000-0x00000000098F2000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h7419443.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h7419443.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h7419443.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h7419443.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h7419443.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h7419443.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation i9218380.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 8 IoCs
pid Process 3616 x0535543.exe 1376 g0544639.exe 1208 h7419443.exe 736 i9218380.exe 228 oneetx.exe 2556 oneetx.exe 1480 oneetx.exe 3920 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4788 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h7419443.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h7419443.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x0535543.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x0535543.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 46a77609aef12de578b872298e83e820cfcfa891e34b8a254f5c01ddc20313ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 46a77609aef12de578b872298e83e820cfcfa891e34b8a254f5c01ddc20313ef.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3312 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1376 g0544639.exe 1376 g0544639.exe 1208 h7419443.exe 1208 h7419443.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1376 g0544639.exe Token: SeDebugPrivilege 1208 h7419443.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 736 i9218380.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 5044 wrote to memory of 3616 5044 46a77609aef12de578b872298e83e820cfcfa891e34b8a254f5c01ddc20313ef.exe 82 PID 5044 wrote to memory of 3616 5044 46a77609aef12de578b872298e83e820cfcfa891e34b8a254f5c01ddc20313ef.exe 82 PID 5044 wrote to memory of 3616 5044 46a77609aef12de578b872298e83e820cfcfa891e34b8a254f5c01ddc20313ef.exe 82 PID 3616 wrote to memory of 1376 3616 x0535543.exe 83 PID 3616 wrote to memory of 1376 3616 x0535543.exe 83 PID 3616 wrote to memory of 1376 3616 x0535543.exe 83 PID 3616 wrote to memory of 1208 3616 x0535543.exe 84 PID 3616 wrote to memory of 1208 3616 x0535543.exe 84 PID 3616 wrote to memory of 1208 3616 x0535543.exe 84 PID 5044 wrote to memory of 736 5044 46a77609aef12de578b872298e83e820cfcfa891e34b8a254f5c01ddc20313ef.exe 85 PID 5044 wrote to memory of 736 5044 46a77609aef12de578b872298e83e820cfcfa891e34b8a254f5c01ddc20313ef.exe 85 PID 5044 wrote to memory of 736 5044 46a77609aef12de578b872298e83e820cfcfa891e34b8a254f5c01ddc20313ef.exe 85 PID 736 wrote to memory of 228 736 i9218380.exe 86 PID 736 wrote to memory of 228 736 i9218380.exe 86 PID 736 wrote to memory of 228 736 i9218380.exe 86 PID 228 wrote to memory of 3312 228 oneetx.exe 87 PID 228 wrote to memory of 3312 228 oneetx.exe 87 PID 228 wrote to memory of 3312 228 oneetx.exe 87 PID 228 wrote to memory of 4304 228 oneetx.exe 89 PID 228 wrote to memory of 4304 228 oneetx.exe 89 PID 228 wrote to memory of 4304 228 oneetx.exe 89 PID 4304 wrote to memory of 3516 4304 cmd.exe 91 PID 4304 wrote to memory of 3516 4304 cmd.exe 91 PID 4304 wrote to memory of 3516 4304 cmd.exe 91 PID 4304 wrote to memory of 3260 4304 cmd.exe 92 PID 4304 wrote to memory of 3260 4304 cmd.exe 92 PID 4304 wrote to memory of 3260 4304 cmd.exe 92 PID 4304 wrote to memory of 3868 4304 cmd.exe 93 PID 4304 wrote to memory of 3868 4304 cmd.exe 93 PID 4304 wrote to memory of 3868 4304 cmd.exe 93 PID 4304 wrote to memory of 4080 4304 cmd.exe 94 PID 4304 wrote to memory of 4080 4304 cmd.exe 94 PID 4304 wrote to memory of 4080 4304 cmd.exe 94 PID 4304 wrote to memory of 4624 4304 cmd.exe 95 PID 4304 wrote to memory of 4624 4304 cmd.exe 95 PID 4304 wrote to memory of 4624 4304 cmd.exe 95 PID 4304 wrote to memory of 2880 4304 cmd.exe 96 PID 4304 wrote to memory of 2880 4304 cmd.exe 96 PID 4304 wrote to memory of 2880 4304 cmd.exe 96 PID 228 wrote to memory of 4788 228 oneetx.exe 99 PID 228 wrote to memory of 4788 228 oneetx.exe 99 PID 228 wrote to memory of 4788 228 oneetx.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\46a77609aef12de578b872298e83e820cfcfa891e34b8a254f5c01ddc20313ef.exe"C:\Users\Admin\AppData\Local\Temp\46a77609aef12de578b872298e83e820cfcfa891e34b8a254f5c01ddc20313ef.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0535543.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0535543.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g0544639.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g0544639.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1376
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7419443.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7419443.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1208
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9218380.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9218380.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3312
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3516
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:3260
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3868
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4080
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4624
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:2880
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4788
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2556
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1480
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3920
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5d69153eba0faac586449bff63f690494
SHA12107fbd03bc1b6a80c7a1312c575f5114feb117f
SHA256500750ea6a213dda5e6aa11124568b2005d1f8a49a10da065ab4e5d29fc6a7f5
SHA5120fe3abe63ebb88115a6cd3bb1d9fad73d3eace928a62cd934532f37907577895119b89764cdb29c41e019ddc341204001e80fc925691d67d0d53595dec956c56
-
Filesize
204KB
MD5d69153eba0faac586449bff63f690494
SHA12107fbd03bc1b6a80c7a1312c575f5114feb117f
SHA256500750ea6a213dda5e6aa11124568b2005d1f8a49a10da065ab4e5d29fc6a7f5
SHA5120fe3abe63ebb88115a6cd3bb1d9fad73d3eace928a62cd934532f37907577895119b89764cdb29c41e019ddc341204001e80fc925691d67d0d53595dec956c56
-
Filesize
307KB
MD5ed9c486d40e947e4cbf6067be36669c7
SHA10832cef529d5e4b8869f9f7c077a10c33e62aa78
SHA25619d898118083d1934ea70d8589ac3588fc5a81348faf355e97ab008766967877
SHA512d4fe68234d85f7fb07576b655c17e8c429701c95e9de1d6a84e36cfecbeeac7a63e7685ddfec3c5f1ed129a3a4f0e18816a0f22e22fcbc42076cb56ab730f830
-
Filesize
307KB
MD5ed9c486d40e947e4cbf6067be36669c7
SHA10832cef529d5e4b8869f9f7c077a10c33e62aa78
SHA25619d898118083d1934ea70d8589ac3588fc5a81348faf355e97ab008766967877
SHA512d4fe68234d85f7fb07576b655c17e8c429701c95e9de1d6a84e36cfecbeeac7a63e7685ddfec3c5f1ed129a3a4f0e18816a0f22e22fcbc42076cb56ab730f830
-
Filesize
136KB
MD50268caeaf4a3ebc16ffbbfe998000503
SHA1d18e43981c6d0bc60d52dd365f9cfdec4721191d
SHA256c77fa3860014c94a43346b0d15fca572b7a79e68c59477d8d8df39d669d4654b
SHA51212f8e9dd02951a65e3f0f32f9f04336b5961b2803db158f88af70a7be220ed88cd9a1a4449b8c5bcf131d6a7522d6a8c27de279f610ba3272bc64f9e26fd8e7b
-
Filesize
136KB
MD50268caeaf4a3ebc16ffbbfe998000503
SHA1d18e43981c6d0bc60d52dd365f9cfdec4721191d
SHA256c77fa3860014c94a43346b0d15fca572b7a79e68c59477d8d8df39d669d4654b
SHA51212f8e9dd02951a65e3f0f32f9f04336b5961b2803db158f88af70a7be220ed88cd9a1a4449b8c5bcf131d6a7522d6a8c27de279f610ba3272bc64f9e26fd8e7b
-
Filesize
176KB
MD5cb70bbff87f73e9acf31f2f4d372f19d
SHA10e69507d9f2c7597ac681aa319ce3e9d85b7263c
SHA25674d049f884e9a747c59b78dfdb957104afea9bfa9f48041d1f01d22a4da3e224
SHA512cce39039b6e5fef2bfcff026197598e0dc3004d2250d3c51a7fdcb6ca77f3b305c3a22a1357f0ed4d499d0d8fe83f375b7bc03694efe6ebd6398aaac8699890c
-
Filesize
176KB
MD5cb70bbff87f73e9acf31f2f4d372f19d
SHA10e69507d9f2c7597ac681aa319ce3e9d85b7263c
SHA25674d049f884e9a747c59b78dfdb957104afea9bfa9f48041d1f01d22a4da3e224
SHA512cce39039b6e5fef2bfcff026197598e0dc3004d2250d3c51a7fdcb6ca77f3b305c3a22a1357f0ed4d499d0d8fe83f375b7bc03694efe6ebd6398aaac8699890c
-
Filesize
204KB
MD5d69153eba0faac586449bff63f690494
SHA12107fbd03bc1b6a80c7a1312c575f5114feb117f
SHA256500750ea6a213dda5e6aa11124568b2005d1f8a49a10da065ab4e5d29fc6a7f5
SHA5120fe3abe63ebb88115a6cd3bb1d9fad73d3eace928a62cd934532f37907577895119b89764cdb29c41e019ddc341204001e80fc925691d67d0d53595dec956c56
-
Filesize
204KB
MD5d69153eba0faac586449bff63f690494
SHA12107fbd03bc1b6a80c7a1312c575f5114feb117f
SHA256500750ea6a213dda5e6aa11124568b2005d1f8a49a10da065ab4e5d29fc6a7f5
SHA5120fe3abe63ebb88115a6cd3bb1d9fad73d3eace928a62cd934532f37907577895119b89764cdb29c41e019ddc341204001e80fc925691d67d0d53595dec956c56
-
Filesize
204KB
MD5d69153eba0faac586449bff63f690494
SHA12107fbd03bc1b6a80c7a1312c575f5114feb117f
SHA256500750ea6a213dda5e6aa11124568b2005d1f8a49a10da065ab4e5d29fc6a7f5
SHA5120fe3abe63ebb88115a6cd3bb1d9fad73d3eace928a62cd934532f37907577895119b89764cdb29c41e019ddc341204001e80fc925691d67d0d53595dec956c56
-
Filesize
204KB
MD5d69153eba0faac586449bff63f690494
SHA12107fbd03bc1b6a80c7a1312c575f5114feb117f
SHA256500750ea6a213dda5e6aa11124568b2005d1f8a49a10da065ab4e5d29fc6a7f5
SHA5120fe3abe63ebb88115a6cd3bb1d9fad73d3eace928a62cd934532f37907577895119b89764cdb29c41e019ddc341204001e80fc925691d67d0d53595dec956c56
-
Filesize
204KB
MD5d69153eba0faac586449bff63f690494
SHA12107fbd03bc1b6a80c7a1312c575f5114feb117f
SHA256500750ea6a213dda5e6aa11124568b2005d1f8a49a10da065ab4e5d29fc6a7f5
SHA5120fe3abe63ebb88115a6cd3bb1d9fad73d3eace928a62cd934532f37907577895119b89764cdb29c41e019ddc341204001e80fc925691d67d0d53595dec956c56
-
Filesize
204KB
MD5d69153eba0faac586449bff63f690494
SHA12107fbd03bc1b6a80c7a1312c575f5114feb117f
SHA256500750ea6a213dda5e6aa11124568b2005d1f8a49a10da065ab4e5d29fc6a7f5
SHA5120fe3abe63ebb88115a6cd3bb1d9fad73d3eace928a62cd934532f37907577895119b89764cdb29c41e019ddc341204001e80fc925691d67d0d53595dec956c56
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5