Analysis
-
max time kernel
176s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 19:46
Static task
static1
Behavioral task
behavioral1
Sample
d154b465ff49e669d7c342fc96e7171ace0e8e60474396c2a95d9b7c0e2796cd.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d154b465ff49e669d7c342fc96e7171ace0e8e60474396c2a95d9b7c0e2796cd.exe
Resource
win10v2004-20230220-en
General
-
Target
d154b465ff49e669d7c342fc96e7171ace0e8e60474396c2a95d9b7c0e2796cd.exe
-
Size
600KB
-
MD5
a131d912aa23dbca0550b79c14fc4c02
-
SHA1
13ac473d01488beb961a08dee11234f6d32789f1
-
SHA256
d154b465ff49e669d7c342fc96e7171ace0e8e60474396c2a95d9b7c0e2796cd
-
SHA512
a3559eee7b1d4872432efbd99c04f604262ed18c66bb770435d49f89acde82156dc40886839e219d72753552825d265cac5a5d176893184de76d0d7702b8518e
-
SSDEEP
12288:xMrDy90bKKbISpcfLNYWu1LzhzZ3G3i7eD:CyebISpcjMLzh8SSD
Malware Config
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4660-148-0x0000000007AB0000-0x00000000080C8000-memory.dmp redline_stealer behavioral2/memory/4660-154-0x0000000007A10000-0x0000000007A76000-memory.dmp redline_stealer behavioral2/memory/4660-159-0x0000000008F70000-0x0000000009132000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection l7376414.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" l7376414.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" l7376414.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" l7376414.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" l7376414.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" l7376414.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation m4774027.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 1972 y1629376.exe 4660 k4227334.exe 3396 l7376414.exe 1872 m4774027.exe 3392 m4774027.exe 1656 oneetx.exe 4448 oneetx.exe 5084 oneetx.exe 4656 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features l7376414.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" l7376414.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y1629376.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d154b465ff49e669d7c342fc96e7171ace0e8e60474396c2a95d9b7c0e2796cd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d154b465ff49e669d7c342fc96e7171ace0e8e60474396c2a95d9b7c0e2796cd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y1629376.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1872 set thread context of 3392 1872 m4774027.exe 83 PID 1656 set thread context of 4448 1656 oneetx.exe 85 PID 5084 set thread context of 4656 5084 oneetx.exe 97 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4468 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4660 k4227334.exe 4660 k4227334.exe 3396 l7376414.exe 3396 l7376414.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4660 k4227334.exe Token: SeDebugPrivilege 3396 l7376414.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3392 m4774027.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2296 wrote to memory of 1972 2296 d154b465ff49e669d7c342fc96e7171ace0e8e60474396c2a95d9b7c0e2796cd.exe 78 PID 2296 wrote to memory of 1972 2296 d154b465ff49e669d7c342fc96e7171ace0e8e60474396c2a95d9b7c0e2796cd.exe 78 PID 2296 wrote to memory of 1972 2296 d154b465ff49e669d7c342fc96e7171ace0e8e60474396c2a95d9b7c0e2796cd.exe 78 PID 1972 wrote to memory of 4660 1972 y1629376.exe 79 PID 1972 wrote to memory of 4660 1972 y1629376.exe 79 PID 1972 wrote to memory of 4660 1972 y1629376.exe 79 PID 1972 wrote to memory of 3396 1972 y1629376.exe 81 PID 1972 wrote to memory of 3396 1972 y1629376.exe 81 PID 1972 wrote to memory of 3396 1972 y1629376.exe 81 PID 2296 wrote to memory of 1872 2296 d154b465ff49e669d7c342fc96e7171ace0e8e60474396c2a95d9b7c0e2796cd.exe 82 PID 2296 wrote to memory of 1872 2296 d154b465ff49e669d7c342fc96e7171ace0e8e60474396c2a95d9b7c0e2796cd.exe 82 PID 2296 wrote to memory of 1872 2296 d154b465ff49e669d7c342fc96e7171ace0e8e60474396c2a95d9b7c0e2796cd.exe 82 PID 1872 wrote to memory of 3392 1872 m4774027.exe 83 PID 1872 wrote to memory of 3392 1872 m4774027.exe 83 PID 1872 wrote to memory of 3392 1872 m4774027.exe 83 PID 1872 wrote to memory of 3392 1872 m4774027.exe 83 PID 1872 wrote to memory of 3392 1872 m4774027.exe 83 PID 1872 wrote to memory of 3392 1872 m4774027.exe 83 PID 1872 wrote to memory of 3392 1872 m4774027.exe 83 PID 1872 wrote to memory of 3392 1872 m4774027.exe 83 PID 1872 wrote to memory of 3392 1872 m4774027.exe 83 PID 1872 wrote to memory of 3392 1872 m4774027.exe 83 PID 3392 wrote to memory of 1656 3392 m4774027.exe 84 PID 3392 wrote to memory of 1656 3392 m4774027.exe 84 PID 3392 wrote to memory of 1656 3392 m4774027.exe 84 PID 1656 wrote to memory of 4448 1656 oneetx.exe 85 PID 1656 wrote to memory of 4448 1656 oneetx.exe 85 PID 1656 wrote to memory of 4448 1656 oneetx.exe 85 PID 1656 wrote to memory of 4448 1656 oneetx.exe 85 PID 1656 wrote to memory of 4448 1656 oneetx.exe 85 PID 1656 wrote to memory of 4448 1656 oneetx.exe 85 PID 1656 wrote to memory of 4448 1656 oneetx.exe 85 PID 1656 wrote to memory of 4448 1656 oneetx.exe 85 PID 1656 wrote to memory of 4448 1656 oneetx.exe 85 PID 1656 wrote to memory of 4448 1656 oneetx.exe 85 PID 4448 wrote to memory of 4468 4448 oneetx.exe 86 PID 4448 wrote to memory of 4468 4448 oneetx.exe 86 PID 4448 wrote to memory of 4468 4448 oneetx.exe 86 PID 4448 wrote to memory of 1196 4448 oneetx.exe 88 PID 4448 wrote to memory of 1196 4448 oneetx.exe 88 PID 4448 wrote to memory of 1196 4448 oneetx.exe 88 PID 1196 wrote to memory of 3828 1196 cmd.exe 90 PID 1196 wrote to memory of 3828 1196 cmd.exe 90 PID 1196 wrote to memory of 3828 1196 cmd.exe 90 PID 1196 wrote to memory of 4104 1196 cmd.exe 91 PID 1196 wrote to memory of 4104 1196 cmd.exe 91 PID 1196 wrote to memory of 4104 1196 cmd.exe 91 PID 1196 wrote to memory of 1164 1196 cmd.exe 92 PID 1196 wrote to memory of 1164 1196 cmd.exe 92 PID 1196 wrote to memory of 1164 1196 cmd.exe 92 PID 1196 wrote to memory of 1648 1196 cmd.exe 93 PID 1196 wrote to memory of 1648 1196 cmd.exe 93 PID 1196 wrote to memory of 1648 1196 cmd.exe 93 PID 1196 wrote to memory of 4392 1196 cmd.exe 94 PID 1196 wrote to memory of 4392 1196 cmd.exe 94 PID 1196 wrote to memory of 4392 1196 cmd.exe 94 PID 1196 wrote to memory of 2316 1196 cmd.exe 95 PID 1196 wrote to memory of 2316 1196 cmd.exe 95 PID 1196 wrote to memory of 2316 1196 cmd.exe 95 PID 5084 wrote to memory of 4656 5084 oneetx.exe 97 PID 5084 wrote to memory of 4656 5084 oneetx.exe 97 PID 5084 wrote to memory of 4656 5084 oneetx.exe 97 PID 5084 wrote to memory of 4656 5084 oneetx.exe 97 PID 5084 wrote to memory of 4656 5084 oneetx.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\d154b465ff49e669d7c342fc96e7171ace0e8e60474396c2a95d9b7c0e2796cd.exe"C:\Users\Admin\AppData\Local\Temp\d154b465ff49e669d7c342fc96e7171ace0e8e60474396c2a95d9b7c0e2796cd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1629376.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1629376.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k4227334.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k4227334.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4660
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7376414.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7376414.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3396
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m4774027.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m4774027.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m4774027.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m4774027.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F6⤵
- Creates scheduled task(s)
PID:4468
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit6⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:3828
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"7⤵PID:4104
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E7⤵PID:1164
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"7⤵PID:1648
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"7⤵PID:4392
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E7⤵PID:2316
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe2⤵
- Executes dropped EXE
PID:4656
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340KB
MD57f1e80efbe744ca8a1170d3f539cff8a
SHA102f4e19b77b15676d1b5861290d4af819234e1be
SHA256935cfaf2ab3850b6942cddbb9691a373b4ca5e3945ab394125d92e8f94214df4
SHA512d334d59d058c4d51f69794db21e38bede7b0b0c487ab8487d65b94af50e9396c2612f99cdbd80ec9f3f7c766b9800d3ab44ff52346283f760237922f641481db
-
Filesize
340KB
MD57f1e80efbe744ca8a1170d3f539cff8a
SHA102f4e19b77b15676d1b5861290d4af819234e1be
SHA256935cfaf2ab3850b6942cddbb9691a373b4ca5e3945ab394125d92e8f94214df4
SHA512d334d59d058c4d51f69794db21e38bede7b0b0c487ab8487d65b94af50e9396c2612f99cdbd80ec9f3f7c766b9800d3ab44ff52346283f760237922f641481db
-
Filesize
340KB
MD57f1e80efbe744ca8a1170d3f539cff8a
SHA102f4e19b77b15676d1b5861290d4af819234e1be
SHA256935cfaf2ab3850b6942cddbb9691a373b4ca5e3945ab394125d92e8f94214df4
SHA512d334d59d058c4d51f69794db21e38bede7b0b0c487ab8487d65b94af50e9396c2612f99cdbd80ec9f3f7c766b9800d3ab44ff52346283f760237922f641481db
-
Filesize
308KB
MD52e177563ad1fab3ad302011ba579fb76
SHA12da9689b38f76cb6b74fb6c78c050791a87b91be
SHA25696e3dd619840224491bf7c325e644d461b8b31e554a557ba0c715ca37f67531b
SHA51284659b3a341946fd3320c85317cad8504a9e5f98a035354242ded7dc481ad53fb2083d633530f169ce30cb28ecf86af094ca3c2c996f51e870e6b2c3c094ff76
-
Filesize
308KB
MD52e177563ad1fab3ad302011ba579fb76
SHA12da9689b38f76cb6b74fb6c78c050791a87b91be
SHA25696e3dd619840224491bf7c325e644d461b8b31e554a557ba0c715ca37f67531b
SHA51284659b3a341946fd3320c85317cad8504a9e5f98a035354242ded7dc481ad53fb2083d633530f169ce30cb28ecf86af094ca3c2c996f51e870e6b2c3c094ff76
-
Filesize
136KB
MD50bd5a397fc4468b45a670a80b8fc86ab
SHA1ff5f25a71a9ecd612006cf9f4d110cfc3424a096
SHA2569c3577e6ba5daae34229bcefff18e53ff6f89233b335efb75c1a2f64ff0f819b
SHA512cd3f11a89d2c1c9f6a77932b747c84d8ef0cbd78777de0ce8e7557f99c3c701001a62aa546f1c88d11600e54b13146bb643831ad82f6cf5d7d5655e2bf725645
-
Filesize
136KB
MD50bd5a397fc4468b45a670a80b8fc86ab
SHA1ff5f25a71a9ecd612006cf9f4d110cfc3424a096
SHA2569c3577e6ba5daae34229bcefff18e53ff6f89233b335efb75c1a2f64ff0f819b
SHA512cd3f11a89d2c1c9f6a77932b747c84d8ef0cbd78777de0ce8e7557f99c3c701001a62aa546f1c88d11600e54b13146bb643831ad82f6cf5d7d5655e2bf725645
-
Filesize
175KB
MD5a185d5b3de57dbf8e6fe0e3b96b424c9
SHA14ccc2c30689de58084656436001c2e62e83238de
SHA256658035f7c0d43fdef7d6b7944a088015bec4e78540c534785db69b58974248f3
SHA512a608ec7d8d7720c884957feaa1214801786d616173a0e23bd379e4f6103d33acc6150d2f6dd4a756036bf76c082855e2b5438683b8a9a27b180c5bcfed562fcd
-
Filesize
175KB
MD5a185d5b3de57dbf8e6fe0e3b96b424c9
SHA14ccc2c30689de58084656436001c2e62e83238de
SHA256658035f7c0d43fdef7d6b7944a088015bec4e78540c534785db69b58974248f3
SHA512a608ec7d8d7720c884957feaa1214801786d616173a0e23bd379e4f6103d33acc6150d2f6dd4a756036bf76c082855e2b5438683b8a9a27b180c5bcfed562fcd
-
Filesize
340KB
MD57f1e80efbe744ca8a1170d3f539cff8a
SHA102f4e19b77b15676d1b5861290d4af819234e1be
SHA256935cfaf2ab3850b6942cddbb9691a373b4ca5e3945ab394125d92e8f94214df4
SHA512d334d59d058c4d51f69794db21e38bede7b0b0c487ab8487d65b94af50e9396c2612f99cdbd80ec9f3f7c766b9800d3ab44ff52346283f760237922f641481db
-
Filesize
340KB
MD57f1e80efbe744ca8a1170d3f539cff8a
SHA102f4e19b77b15676d1b5861290d4af819234e1be
SHA256935cfaf2ab3850b6942cddbb9691a373b4ca5e3945ab394125d92e8f94214df4
SHA512d334d59d058c4d51f69794db21e38bede7b0b0c487ab8487d65b94af50e9396c2612f99cdbd80ec9f3f7c766b9800d3ab44ff52346283f760237922f641481db
-
Filesize
340KB
MD57f1e80efbe744ca8a1170d3f539cff8a
SHA102f4e19b77b15676d1b5861290d4af819234e1be
SHA256935cfaf2ab3850b6942cddbb9691a373b4ca5e3945ab394125d92e8f94214df4
SHA512d334d59d058c4d51f69794db21e38bede7b0b0c487ab8487d65b94af50e9396c2612f99cdbd80ec9f3f7c766b9800d3ab44ff52346283f760237922f641481db
-
Filesize
340KB
MD57f1e80efbe744ca8a1170d3f539cff8a
SHA102f4e19b77b15676d1b5861290d4af819234e1be
SHA256935cfaf2ab3850b6942cddbb9691a373b4ca5e3945ab394125d92e8f94214df4
SHA512d334d59d058c4d51f69794db21e38bede7b0b0c487ab8487d65b94af50e9396c2612f99cdbd80ec9f3f7c766b9800d3ab44ff52346283f760237922f641481db
-
Filesize
340KB
MD57f1e80efbe744ca8a1170d3f539cff8a
SHA102f4e19b77b15676d1b5861290d4af819234e1be
SHA256935cfaf2ab3850b6942cddbb9691a373b4ca5e3945ab394125d92e8f94214df4
SHA512d334d59d058c4d51f69794db21e38bede7b0b0c487ab8487d65b94af50e9396c2612f99cdbd80ec9f3f7c766b9800d3ab44ff52346283f760237922f641481db
-
Filesize
340KB
MD57f1e80efbe744ca8a1170d3f539cff8a
SHA102f4e19b77b15676d1b5861290d4af819234e1be
SHA256935cfaf2ab3850b6942cddbb9691a373b4ca5e3945ab394125d92e8f94214df4
SHA512d334d59d058c4d51f69794db21e38bede7b0b0c487ab8487d65b94af50e9396c2612f99cdbd80ec9f3f7c766b9800d3ab44ff52346283f760237922f641481db