Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 19:08
Static task
static1
Behavioral task
behavioral1
Sample
b50e1264373e1b5f823f9a6e18a944e3633f758caca3481acfd8843536a75c0c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b50e1264373e1b5f823f9a6e18a944e3633f758caca3481acfd8843536a75c0c.exe
Resource
win10v2004-20230220-en
General
-
Target
b50e1264373e1b5f823f9a6e18a944e3633f758caca3481acfd8843536a75c0c.exe
-
Size
567KB
-
MD5
a93add69d9b5cfd4f6cee2e8b5715a06
-
SHA1
e1e55e643bc2b37f67e19c4d12f5a604a3b26bbf
-
SHA256
b50e1264373e1b5f823f9a6e18a944e3633f758caca3481acfd8843536a75c0c
-
SHA512
75319b876dfdac2d21f75c8244bb5a002615d447267747125e64578f4eea6df2eca6f94c2809d8ef436ccd2bdf4091510373545dbd8ac07cc80571e8995f6783
-
SSDEEP
12288:xMrky90jevUaBiV98yIRF2Q+4QTqjaswlGd0bYerS/IjIl:lyq2Ra8yIR0Q+4YMa9GibS/CIl
Malware Config
Extracted
redline
daris
217.196.96.56:4138
-
auth_value
3491f24ae0250969cd45ce4b3fe77549
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4560-148-0x0000000005570000-0x0000000005B88000-memory.dmp redline_stealer behavioral2/memory/4560-156-0x0000000005C90000-0x0000000005CF6000-memory.dmp redline_stealer behavioral2/memory/4560-158-0x0000000006CB0000-0x0000000006E72000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h0535321.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h0535321.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h0535321.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h0535321.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h0535321.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h0535321.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation i8921705.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 5 IoCs
pid Process 4148 x8311628.exe 4560 g2430838.exe 1844 h0535321.exe 3992 i8921705.exe 1172 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 408 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h0535321.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h0535321.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x8311628.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x8311628.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b50e1264373e1b5f823f9a6e18a944e3633f758caca3481acfd8843536a75c0c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b50e1264373e1b5f823f9a6e18a944e3633f758caca3481acfd8843536a75c0c.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3768 1844 WerFault.exe 88 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3492 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4560 g2430838.exe 4560 g2430838.exe 1844 h0535321.exe 1844 h0535321.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4560 g2430838.exe Token: SeDebugPrivilege 1844 h0535321.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3992 i8921705.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4208 wrote to memory of 4148 4208 b50e1264373e1b5f823f9a6e18a944e3633f758caca3481acfd8843536a75c0c.exe 79 PID 4208 wrote to memory of 4148 4208 b50e1264373e1b5f823f9a6e18a944e3633f758caca3481acfd8843536a75c0c.exe 79 PID 4208 wrote to memory of 4148 4208 b50e1264373e1b5f823f9a6e18a944e3633f758caca3481acfd8843536a75c0c.exe 79 PID 4148 wrote to memory of 4560 4148 x8311628.exe 80 PID 4148 wrote to memory of 4560 4148 x8311628.exe 80 PID 4148 wrote to memory of 4560 4148 x8311628.exe 80 PID 4148 wrote to memory of 1844 4148 x8311628.exe 88 PID 4148 wrote to memory of 1844 4148 x8311628.exe 88 PID 4148 wrote to memory of 1844 4148 x8311628.exe 88 PID 4208 wrote to memory of 3992 4208 b50e1264373e1b5f823f9a6e18a944e3633f758caca3481acfd8843536a75c0c.exe 93 PID 4208 wrote to memory of 3992 4208 b50e1264373e1b5f823f9a6e18a944e3633f758caca3481acfd8843536a75c0c.exe 93 PID 4208 wrote to memory of 3992 4208 b50e1264373e1b5f823f9a6e18a944e3633f758caca3481acfd8843536a75c0c.exe 93 PID 3992 wrote to memory of 1172 3992 i8921705.exe 94 PID 3992 wrote to memory of 1172 3992 i8921705.exe 94 PID 3992 wrote to memory of 1172 3992 i8921705.exe 94 PID 1172 wrote to memory of 3492 1172 oneetx.exe 95 PID 1172 wrote to memory of 3492 1172 oneetx.exe 95 PID 1172 wrote to memory of 3492 1172 oneetx.exe 95 PID 1172 wrote to memory of 3564 1172 oneetx.exe 97 PID 1172 wrote to memory of 3564 1172 oneetx.exe 97 PID 1172 wrote to memory of 3564 1172 oneetx.exe 97 PID 3564 wrote to memory of 4024 3564 cmd.exe 99 PID 3564 wrote to memory of 4024 3564 cmd.exe 99 PID 3564 wrote to memory of 4024 3564 cmd.exe 99 PID 3564 wrote to memory of 1440 3564 cmd.exe 100 PID 3564 wrote to memory of 1440 3564 cmd.exe 100 PID 3564 wrote to memory of 1440 3564 cmd.exe 100 PID 3564 wrote to memory of 3252 3564 cmd.exe 101 PID 3564 wrote to memory of 3252 3564 cmd.exe 101 PID 3564 wrote to memory of 3252 3564 cmd.exe 101 PID 3564 wrote to memory of 1956 3564 cmd.exe 102 PID 3564 wrote to memory of 1956 3564 cmd.exe 102 PID 3564 wrote to memory of 1956 3564 cmd.exe 102 PID 3564 wrote to memory of 2148 3564 cmd.exe 103 PID 3564 wrote to memory of 2148 3564 cmd.exe 103 PID 3564 wrote to memory of 2148 3564 cmd.exe 103 PID 3564 wrote to memory of 1048 3564 cmd.exe 104 PID 3564 wrote to memory of 1048 3564 cmd.exe 104 PID 3564 wrote to memory of 1048 3564 cmd.exe 104 PID 1172 wrote to memory of 408 1172 oneetx.exe 105 PID 1172 wrote to memory of 408 1172 oneetx.exe 105 PID 1172 wrote to memory of 408 1172 oneetx.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\b50e1264373e1b5f823f9a6e18a944e3633f758caca3481acfd8843536a75c0c.exe"C:\Users\Admin\AppData\Local\Temp\b50e1264373e1b5f823f9a6e18a944e3633f758caca3481acfd8843536a75c0c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8311628.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8311628.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g2430838.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g2430838.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4560
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h0535321.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h0535321.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 10764⤵
- Program crash
PID:3768
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8921705.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8921705.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3492
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4024
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1440
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3252
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1956
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:2148
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:1048
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:408
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1844 -ip 18441⤵PID:3876
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD53e1b855eb223150a827c69761fe58231
SHA163f1a9deade5009cb5efc062342169769ddaf9a0
SHA256cd11d40fd5325557789e0eaf897d39d322ce47f6d3c7c5a115cf16fa6d0db4ff
SHA512409aa2decfdea95521eeca2e9fb9e9bb1d5e063885d6c63fa63783c1225d430a984057926275b57415b01552639df3a52f9b114684ecc6905f586b74acec3e24
-
Filesize
206KB
MD53e1b855eb223150a827c69761fe58231
SHA163f1a9deade5009cb5efc062342169769ddaf9a0
SHA256cd11d40fd5325557789e0eaf897d39d322ce47f6d3c7c5a115cf16fa6d0db4ff
SHA512409aa2decfdea95521eeca2e9fb9e9bb1d5e063885d6c63fa63783c1225d430a984057926275b57415b01552639df3a52f9b114684ecc6905f586b74acec3e24
-
Filesize
395KB
MD5ce6983841ba0ebe7a0b85f76c3652368
SHA1b6dab33843a3d6d16eb6c7f237694b9dc7b57f76
SHA256c79a7386970fa4e9c08bf1bf27e7ce5a0b08370b11506ba486a11e9e0d65c8e1
SHA512468e62aadf36d386e47e093440e42d3c27e40749b201486a69b9a7d893f32a09d51ccfcfb0064b643ee4e5c03416c96187d2049c4b7697549257dc1d288853de
-
Filesize
395KB
MD5ce6983841ba0ebe7a0b85f76c3652368
SHA1b6dab33843a3d6d16eb6c7f237694b9dc7b57f76
SHA256c79a7386970fa4e9c08bf1bf27e7ce5a0b08370b11506ba486a11e9e0d65c8e1
SHA512468e62aadf36d386e47e093440e42d3c27e40749b201486a69b9a7d893f32a09d51ccfcfb0064b643ee4e5c03416c96187d2049c4b7697549257dc1d288853de
-
Filesize
168KB
MD5eaaba36d9f68a658c371e2b0d1ed43db
SHA167c4c84548afb969549fb1a010a3eb13e88b4ff9
SHA25638a197b8c15ead25950499aecf419a1c5979ed7ecd58e60cd66937ac3aa8735e
SHA512c9f5ac28f6814863b36ddb056b0692784225938071be3be79798259ed8b07959e0e9c54db0a47166418bb2da1a5ed584015c99cc43245512308475b1aac673bc
-
Filesize
168KB
MD5eaaba36d9f68a658c371e2b0d1ed43db
SHA167c4c84548afb969549fb1a010a3eb13e88b4ff9
SHA25638a197b8c15ead25950499aecf419a1c5979ed7ecd58e60cd66937ac3aa8735e
SHA512c9f5ac28f6814863b36ddb056b0692784225938071be3be79798259ed8b07959e0e9c54db0a47166418bb2da1a5ed584015c99cc43245512308475b1aac673bc
-
Filesize
315KB
MD568aa3312001763dce8911c3eeb9a5724
SHA1fd4d795f0d0cff5d7e26d7a264c68425c1d1db61
SHA2561b793d1f98fab8e987bc99d5ebd8e4a1ec99ac157687489ccbc79b047d10ccf6
SHA51217e775a3cf76ab077d2d1c75892aacb17dab03051f4d0787036baa580d15ff9e926eb9b73f6994a44f2e07a98bf4238434dfe98d5e99d4a0cba7f4347fecb26d
-
Filesize
315KB
MD568aa3312001763dce8911c3eeb9a5724
SHA1fd4d795f0d0cff5d7e26d7a264c68425c1d1db61
SHA2561b793d1f98fab8e987bc99d5ebd8e4a1ec99ac157687489ccbc79b047d10ccf6
SHA51217e775a3cf76ab077d2d1c75892aacb17dab03051f4d0787036baa580d15ff9e926eb9b73f6994a44f2e07a98bf4238434dfe98d5e99d4a0cba7f4347fecb26d
-
Filesize
206KB
MD53e1b855eb223150a827c69761fe58231
SHA163f1a9deade5009cb5efc062342169769ddaf9a0
SHA256cd11d40fd5325557789e0eaf897d39d322ce47f6d3c7c5a115cf16fa6d0db4ff
SHA512409aa2decfdea95521eeca2e9fb9e9bb1d5e063885d6c63fa63783c1225d430a984057926275b57415b01552639df3a52f9b114684ecc6905f586b74acec3e24
-
Filesize
206KB
MD53e1b855eb223150a827c69761fe58231
SHA163f1a9deade5009cb5efc062342169769ddaf9a0
SHA256cd11d40fd5325557789e0eaf897d39d322ce47f6d3c7c5a115cf16fa6d0db4ff
SHA512409aa2decfdea95521eeca2e9fb9e9bb1d5e063885d6c63fa63783c1225d430a984057926275b57415b01552639df3a52f9b114684ecc6905f586b74acec3e24
-
Filesize
206KB
MD53e1b855eb223150a827c69761fe58231
SHA163f1a9deade5009cb5efc062342169769ddaf9a0
SHA256cd11d40fd5325557789e0eaf897d39d322ce47f6d3c7c5a115cf16fa6d0db4ff
SHA512409aa2decfdea95521eeca2e9fb9e9bb1d5e063885d6c63fa63783c1225d430a984057926275b57415b01552639df3a52f9b114684ecc6905f586b74acec3e24
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5