Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 19:07
Static task
static1
Behavioral task
behavioral1
Sample
b42827239ab4ff5c0671ba1c9f2771d4b1358237f41ac43d9db7ea8abacec18c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b42827239ab4ff5c0671ba1c9f2771d4b1358237f41ac43d9db7ea8abacec18c.exe
Resource
win10v2004-20230220-en
General
-
Target
b42827239ab4ff5c0671ba1c9f2771d4b1358237f41ac43d9db7ea8abacec18c.exe
-
Size
480KB
-
MD5
c3cd05934b7f357589fa2f4753bcf73f
-
SHA1
5749762ade9b77c8113d331b14169856c5011fe4
-
SHA256
b42827239ab4ff5c0671ba1c9f2771d4b1358237f41ac43d9db7ea8abacec18c
-
SHA512
bc56e7e0e5a1a191cbc9bc9d395fa5558d6cac4a57b4d03b31445af9febe048a2334626805f228da63d878e1ec22acb1fd79bb674b5ef0221f50b239c31b4278
-
SSDEEP
12288:+Mrwy90GKeeX981vP/mI3RQbpLcoVb/x:qyJtB3iwAbZ
Malware Config
Extracted
redline
daris
217.196.96.56:4138
-
auth_value
3491f24ae0250969cd45ce4b3fe77549
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4300-148-0x000000000B390000-0x000000000B9A8000-memory.dmp redline_stealer behavioral2/memory/4300-156-0x000000000BAB0000-0x000000000BB16000-memory.dmp redline_stealer behavioral2/memory/4300-157-0x000000000C6E0000-0x000000000C8A2000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection l0546202.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" l0546202.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" l0546202.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" l0546202.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" l0546202.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" l0546202.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation m6426589.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 4012 y3475260.exe 4300 k1458069.exe 2404 l0546202.exe 4108 m6426589.exe 540 oneetx.exe 4256 oneetx.exe 4856 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2280 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features l0546202.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" l0546202.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b42827239ab4ff5c0671ba1c9f2771d4b1358237f41ac43d9db7ea8abacec18c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b42827239ab4ff5c0671ba1c9f2771d4b1358237f41ac43d9db7ea8abacec18c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y3475260.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y3475260.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2756 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4300 k1458069.exe 4300 k1458069.exe 2404 l0546202.exe 2404 l0546202.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4300 k1458069.exe Token: SeDebugPrivilege 2404 l0546202.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4108 m6426589.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2156 wrote to memory of 4012 2156 b42827239ab4ff5c0671ba1c9f2771d4b1358237f41ac43d9db7ea8abacec18c.exe 82 PID 2156 wrote to memory of 4012 2156 b42827239ab4ff5c0671ba1c9f2771d4b1358237f41ac43d9db7ea8abacec18c.exe 82 PID 2156 wrote to memory of 4012 2156 b42827239ab4ff5c0671ba1c9f2771d4b1358237f41ac43d9db7ea8abacec18c.exe 82 PID 4012 wrote to memory of 4300 4012 y3475260.exe 83 PID 4012 wrote to memory of 4300 4012 y3475260.exe 83 PID 4012 wrote to memory of 4300 4012 y3475260.exe 83 PID 4012 wrote to memory of 2404 4012 y3475260.exe 90 PID 4012 wrote to memory of 2404 4012 y3475260.exe 90 PID 4012 wrote to memory of 2404 4012 y3475260.exe 90 PID 2156 wrote to memory of 4108 2156 b42827239ab4ff5c0671ba1c9f2771d4b1358237f41ac43d9db7ea8abacec18c.exe 92 PID 2156 wrote to memory of 4108 2156 b42827239ab4ff5c0671ba1c9f2771d4b1358237f41ac43d9db7ea8abacec18c.exe 92 PID 2156 wrote to memory of 4108 2156 b42827239ab4ff5c0671ba1c9f2771d4b1358237f41ac43d9db7ea8abacec18c.exe 92 PID 4108 wrote to memory of 540 4108 m6426589.exe 93 PID 4108 wrote to memory of 540 4108 m6426589.exe 93 PID 4108 wrote to memory of 540 4108 m6426589.exe 93 PID 540 wrote to memory of 2756 540 oneetx.exe 94 PID 540 wrote to memory of 2756 540 oneetx.exe 94 PID 540 wrote to memory of 2756 540 oneetx.exe 94 PID 540 wrote to memory of 2256 540 oneetx.exe 96 PID 540 wrote to memory of 2256 540 oneetx.exe 96 PID 540 wrote to memory of 2256 540 oneetx.exe 96 PID 2256 wrote to memory of 2788 2256 cmd.exe 98 PID 2256 wrote to memory of 2788 2256 cmd.exe 98 PID 2256 wrote to memory of 2788 2256 cmd.exe 98 PID 2256 wrote to memory of 1304 2256 cmd.exe 99 PID 2256 wrote to memory of 1304 2256 cmd.exe 99 PID 2256 wrote to memory of 1304 2256 cmd.exe 99 PID 2256 wrote to memory of 2716 2256 cmd.exe 100 PID 2256 wrote to memory of 2716 2256 cmd.exe 100 PID 2256 wrote to memory of 2716 2256 cmd.exe 100 PID 2256 wrote to memory of 4960 2256 cmd.exe 101 PID 2256 wrote to memory of 4960 2256 cmd.exe 101 PID 2256 wrote to memory of 4960 2256 cmd.exe 101 PID 2256 wrote to memory of 3868 2256 cmd.exe 102 PID 2256 wrote to memory of 3868 2256 cmd.exe 102 PID 2256 wrote to memory of 3868 2256 cmd.exe 102 PID 2256 wrote to memory of 1788 2256 cmd.exe 103 PID 2256 wrote to memory of 1788 2256 cmd.exe 103 PID 2256 wrote to memory of 1788 2256 cmd.exe 103 PID 540 wrote to memory of 2280 540 oneetx.exe 104 PID 540 wrote to memory of 2280 540 oneetx.exe 104 PID 540 wrote to memory of 2280 540 oneetx.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\b42827239ab4ff5c0671ba1c9f2771d4b1358237f41ac43d9db7ea8abacec18c.exe"C:\Users\Admin\AppData\Local\Temp\b42827239ab4ff5c0671ba1c9f2771d4b1358237f41ac43d9db7ea8abacec18c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3475260.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3475260.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k1458069.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k1458069.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4300
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l0546202.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l0546202.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2404
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6426589.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6426589.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2756
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2788
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1304
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:2716
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4960
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:3868
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:1788
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2280
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4256
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4856
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD598115d1e8c6286c3c0b9b76889197a5a
SHA15681f55e3327c2e4c734324ed3bfe485bf15f8c1
SHA256c8f7cfb9168a78cb8884bc87d91084a57d9a14b4528e096b8fc7d73dcb27846b
SHA512dd38b8cbdc9ba9a6e018d813c1cd4cd8bdb34065c90654385a17b2ce75f1350fa7fcb15f9b65d94638d7168e5349f489e39dbc62c12f6053967319b3d24c6d3d
-
Filesize
206KB
MD598115d1e8c6286c3c0b9b76889197a5a
SHA15681f55e3327c2e4c734324ed3bfe485bf15f8c1
SHA256c8f7cfb9168a78cb8884bc87d91084a57d9a14b4528e096b8fc7d73dcb27846b
SHA512dd38b8cbdc9ba9a6e018d813c1cd4cd8bdb34065c90654385a17b2ce75f1350fa7fcb15f9b65d94638d7168e5349f489e39dbc62c12f6053967319b3d24c6d3d
-
Filesize
308KB
MD50b4c8edfd885163944f4fa72283827ec
SHA1db0689306c561c1381c8f3ca6cf971dd51799eea
SHA2564eee6353070f03486d9c2837d5e39718347110ddd0fc1ad632db76f02007ba0d
SHA51272b729cb94c381e954493fe4ca90493896a35cd0fa868dd91aaea69e83deb2ffd35da10bf678bac71a8c163e2cbbf191e93da746cb1489c630a7817a91aeb9ea
-
Filesize
308KB
MD50b4c8edfd885163944f4fa72283827ec
SHA1db0689306c561c1381c8f3ca6cf971dd51799eea
SHA2564eee6353070f03486d9c2837d5e39718347110ddd0fc1ad632db76f02007ba0d
SHA51272b729cb94c381e954493fe4ca90493896a35cd0fa868dd91aaea69e83deb2ffd35da10bf678bac71a8c163e2cbbf191e93da746cb1489c630a7817a91aeb9ea
-
Filesize
168KB
MD5647019e17ee5dc9763c9455b88559644
SHA1dcf96b38072f650e6163880476d7bb959ab289b6
SHA2561eb39a99994da9c757f2653fdc1fb05f958d21920be0a308fdaf16172fca1652
SHA5127b2a210db44b61ccba0e80d04d2849e4243fa105df64fd2750004278cd3f546ee2ff54481c0461d751f5501ea1677e3a748da6c5ac8b12d84febd1e6f756a858
-
Filesize
168KB
MD5647019e17ee5dc9763c9455b88559644
SHA1dcf96b38072f650e6163880476d7bb959ab289b6
SHA2561eb39a99994da9c757f2653fdc1fb05f958d21920be0a308fdaf16172fca1652
SHA5127b2a210db44b61ccba0e80d04d2849e4243fa105df64fd2750004278cd3f546ee2ff54481c0461d751f5501ea1677e3a748da6c5ac8b12d84febd1e6f756a858
-
Filesize
179KB
MD58804a678858491e1beff54cf2d64a9f5
SHA1941249989735d64e64787de9ce2ddc9134d9dd12
SHA25633b0c04539a446a0335babdbc07ac2315cfe68761c6d053c67a1f1b06a23db04
SHA5124b6fd46f62b3a81d61702032f0408dcdfbc6e7841a5ae733ff79dc18386187786ddb2d77557807f5825e6a2ad46f216b9497f74d679473e357f57822d26fb88c
-
Filesize
179KB
MD58804a678858491e1beff54cf2d64a9f5
SHA1941249989735d64e64787de9ce2ddc9134d9dd12
SHA25633b0c04539a446a0335babdbc07ac2315cfe68761c6d053c67a1f1b06a23db04
SHA5124b6fd46f62b3a81d61702032f0408dcdfbc6e7841a5ae733ff79dc18386187786ddb2d77557807f5825e6a2ad46f216b9497f74d679473e357f57822d26fb88c
-
Filesize
206KB
MD598115d1e8c6286c3c0b9b76889197a5a
SHA15681f55e3327c2e4c734324ed3bfe485bf15f8c1
SHA256c8f7cfb9168a78cb8884bc87d91084a57d9a14b4528e096b8fc7d73dcb27846b
SHA512dd38b8cbdc9ba9a6e018d813c1cd4cd8bdb34065c90654385a17b2ce75f1350fa7fcb15f9b65d94638d7168e5349f489e39dbc62c12f6053967319b3d24c6d3d
-
Filesize
206KB
MD598115d1e8c6286c3c0b9b76889197a5a
SHA15681f55e3327c2e4c734324ed3bfe485bf15f8c1
SHA256c8f7cfb9168a78cb8884bc87d91084a57d9a14b4528e096b8fc7d73dcb27846b
SHA512dd38b8cbdc9ba9a6e018d813c1cd4cd8bdb34065c90654385a17b2ce75f1350fa7fcb15f9b65d94638d7168e5349f489e39dbc62c12f6053967319b3d24c6d3d
-
Filesize
206KB
MD598115d1e8c6286c3c0b9b76889197a5a
SHA15681f55e3327c2e4c734324ed3bfe485bf15f8c1
SHA256c8f7cfb9168a78cb8884bc87d91084a57d9a14b4528e096b8fc7d73dcb27846b
SHA512dd38b8cbdc9ba9a6e018d813c1cd4cd8bdb34065c90654385a17b2ce75f1350fa7fcb15f9b65d94638d7168e5349f489e39dbc62c12f6053967319b3d24c6d3d
-
Filesize
206KB
MD598115d1e8c6286c3c0b9b76889197a5a
SHA15681f55e3327c2e4c734324ed3bfe485bf15f8c1
SHA256c8f7cfb9168a78cb8884bc87d91084a57d9a14b4528e096b8fc7d73dcb27846b
SHA512dd38b8cbdc9ba9a6e018d813c1cd4cd8bdb34065c90654385a17b2ce75f1350fa7fcb15f9b65d94638d7168e5349f489e39dbc62c12f6053967319b3d24c6d3d
-
Filesize
206KB
MD598115d1e8c6286c3c0b9b76889197a5a
SHA15681f55e3327c2e4c734324ed3bfe485bf15f8c1
SHA256c8f7cfb9168a78cb8884bc87d91084a57d9a14b4528e096b8fc7d73dcb27846b
SHA512dd38b8cbdc9ba9a6e018d813c1cd4cd8bdb34065c90654385a17b2ce75f1350fa7fcb15f9b65d94638d7168e5349f489e39dbc62c12f6053967319b3d24c6d3d
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5