Analysis
-
max time kernel
117s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 20:33
Static task
static1
Behavioral task
behavioral1
Sample
f8630ed946118738e9ba136f9228af86c8b74bbc9a42f338bf25ede42a6e8225.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f8630ed946118738e9ba136f9228af86c8b74bbc9a42f338bf25ede42a6e8225.exe
Resource
win10v2004-20230220-en
General
-
Target
f8630ed946118738e9ba136f9228af86c8b74bbc9a42f338bf25ede42a6e8225.exe
-
Size
480KB
-
MD5
eb92cc3ae7817f709f81c14b5881143c
-
SHA1
ed183568f80998bc3ecf0385ced9fe685d792d8c
-
SHA256
f8630ed946118738e9ba136f9228af86c8b74bbc9a42f338bf25ede42a6e8225
-
SHA512
b102f2c55915af5c59b151403c3ea0e84164472e39fb0e8f417d3a2978ccb151e6a625522f1aa54035c48df3bae2e405a4bed25094d52596f781d970b00d4822
-
SSDEEP
12288:RMrBy90wWj0y8LNhnG+Obe38prb09yuo8p5H+:kyejv8L7Gtq87wp5e
Malware Config
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1976-186-0x0000000007460000-0x0000000007A78000-memory.dmp redline_stealer behavioral2/memory/1976-191-0x0000000007280000-0x00000000072E6000-memory.dmp redline_stealer behavioral2/memory/1976-194-0x00000000088E0000-0x0000000008AA2000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a8961677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8961677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8961677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8961677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8961677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8961677.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation c5530648.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 4240 v5781664.exe 1688 a8961677.exe 1976 b2730561.exe 1008 c5530648.exe 4344 oneetx.exe 1816 oneetx.exe 4664 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1584 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a8961677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a8961677.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f8630ed946118738e9ba136f9228af86c8b74bbc9a42f338bf25ede42a6e8225.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f8630ed946118738e9ba136f9228af86c8b74bbc9a42f338bf25ede42a6e8225.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v5781664.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v5781664.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2232 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1688 a8961677.exe 1688 a8961677.exe 1976 b2730561.exe 1976 b2730561.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1688 a8961677.exe Token: SeDebugPrivilege 1976 b2730561.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1008 c5530648.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1404 wrote to memory of 4240 1404 f8630ed946118738e9ba136f9228af86c8b74bbc9a42f338bf25ede42a6e8225.exe 84 PID 1404 wrote to memory of 4240 1404 f8630ed946118738e9ba136f9228af86c8b74bbc9a42f338bf25ede42a6e8225.exe 84 PID 1404 wrote to memory of 4240 1404 f8630ed946118738e9ba136f9228af86c8b74bbc9a42f338bf25ede42a6e8225.exe 84 PID 4240 wrote to memory of 1688 4240 v5781664.exe 85 PID 4240 wrote to memory of 1688 4240 v5781664.exe 85 PID 4240 wrote to memory of 1688 4240 v5781664.exe 85 PID 4240 wrote to memory of 1976 4240 v5781664.exe 86 PID 4240 wrote to memory of 1976 4240 v5781664.exe 86 PID 4240 wrote to memory of 1976 4240 v5781664.exe 86 PID 1404 wrote to memory of 1008 1404 f8630ed946118738e9ba136f9228af86c8b74bbc9a42f338bf25ede42a6e8225.exe 87 PID 1404 wrote to memory of 1008 1404 f8630ed946118738e9ba136f9228af86c8b74bbc9a42f338bf25ede42a6e8225.exe 87 PID 1404 wrote to memory of 1008 1404 f8630ed946118738e9ba136f9228af86c8b74bbc9a42f338bf25ede42a6e8225.exe 87 PID 1008 wrote to memory of 4344 1008 c5530648.exe 88 PID 1008 wrote to memory of 4344 1008 c5530648.exe 88 PID 1008 wrote to memory of 4344 1008 c5530648.exe 88 PID 4344 wrote to memory of 2232 4344 oneetx.exe 89 PID 4344 wrote to memory of 2232 4344 oneetx.exe 89 PID 4344 wrote to memory of 2232 4344 oneetx.exe 89 PID 4344 wrote to memory of 424 4344 oneetx.exe 91 PID 4344 wrote to memory of 424 4344 oneetx.exe 91 PID 4344 wrote to memory of 424 4344 oneetx.exe 91 PID 424 wrote to memory of 884 424 cmd.exe 93 PID 424 wrote to memory of 884 424 cmd.exe 93 PID 424 wrote to memory of 884 424 cmd.exe 93 PID 424 wrote to memory of 4812 424 cmd.exe 94 PID 424 wrote to memory of 4812 424 cmd.exe 94 PID 424 wrote to memory of 4812 424 cmd.exe 94 PID 424 wrote to memory of 2844 424 cmd.exe 95 PID 424 wrote to memory of 2844 424 cmd.exe 95 PID 424 wrote to memory of 2844 424 cmd.exe 95 PID 424 wrote to memory of 3744 424 cmd.exe 96 PID 424 wrote to memory of 3744 424 cmd.exe 96 PID 424 wrote to memory of 3744 424 cmd.exe 96 PID 424 wrote to memory of 3652 424 cmd.exe 97 PID 424 wrote to memory of 3652 424 cmd.exe 97 PID 424 wrote to memory of 3652 424 cmd.exe 97 PID 424 wrote to memory of 4200 424 cmd.exe 98 PID 424 wrote to memory of 4200 424 cmd.exe 98 PID 424 wrote to memory of 4200 424 cmd.exe 98 PID 4344 wrote to memory of 1584 4344 oneetx.exe 101 PID 4344 wrote to memory of 1584 4344 oneetx.exe 101 PID 4344 wrote to memory of 1584 4344 oneetx.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8630ed946118738e9ba136f9228af86c8b74bbc9a42f338bf25ede42a6e8225.exe"C:\Users\Admin\AppData\Local\Temp\f8630ed946118738e9ba136f9228af86c8b74bbc9a42f338bf25ede42a6e8225.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5781664.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5781664.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a8961677.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a8961677.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1688
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b2730561.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b2730561.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c5530648.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c5530648.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2232
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:424 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:884
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4812
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:2844
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3744
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:3652
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:4200
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1584
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1816
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4664
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD57a914be2c9856ef6f318984e7b353b02
SHA1971c978a40597110841e0b44e7b2dea9e336241a
SHA2564c97636084feea7fd59cd4e6a5da4eb44305055aefc71ef2837dd599aa9ab1fe
SHA512708035ddbc5cef9860b535e787d857d6ed064b9f47dcebbc0e3e09452bed43101a131bbd1526b2bbe1cc96508349efd3c90612ff4ba1fa060acb61f92784c085
-
Filesize
204KB
MD57a914be2c9856ef6f318984e7b353b02
SHA1971c978a40597110841e0b44e7b2dea9e336241a
SHA2564c97636084feea7fd59cd4e6a5da4eb44305055aefc71ef2837dd599aa9ab1fe
SHA512708035ddbc5cef9860b535e787d857d6ed064b9f47dcebbc0e3e09452bed43101a131bbd1526b2bbe1cc96508349efd3c90612ff4ba1fa060acb61f92784c085
-
Filesize
308KB
MD556861ffb0895ffea1b0136b32da1fe7f
SHA1d91aac91c6b8c409105274d2ace9c51b71c10f71
SHA256169256f4ddd88e7891ca58d9a3b73e510d399718fbcb1d4b8a25c56ad0f9dbd1
SHA5125748a67fc0606ac6edab5813dea5bdb359c7eea7d9351c6f682dce8d8c5884a510e92882e1cb756c8298dd7ae308b3cba6f8c7215bca3120529b66d0bb302760
-
Filesize
308KB
MD556861ffb0895ffea1b0136b32da1fe7f
SHA1d91aac91c6b8c409105274d2ace9c51b71c10f71
SHA256169256f4ddd88e7891ca58d9a3b73e510d399718fbcb1d4b8a25c56ad0f9dbd1
SHA5125748a67fc0606ac6edab5813dea5bdb359c7eea7d9351c6f682dce8d8c5884a510e92882e1cb756c8298dd7ae308b3cba6f8c7215bca3120529b66d0bb302760
-
Filesize
176KB
MD521a0c81011c393f6e0426a0dbf954d21
SHA1392a50f65dde161d1a9b1d2d9fd660f4f377d8d2
SHA256c74fa3ee1aae7f829d22490b0f80f5c5ef9a004d2dfa02ef2506c6fe62307e8b
SHA512ee15947f324c3ca4c890ee7d6ad6ba5f10ccb1301fc117f3930b1c62ddf4da8884df26ae5b8d79aa759144b5beb64ea03f198e028bb26e91e4bc9923d1a5af6e
-
Filesize
176KB
MD521a0c81011c393f6e0426a0dbf954d21
SHA1392a50f65dde161d1a9b1d2d9fd660f4f377d8d2
SHA256c74fa3ee1aae7f829d22490b0f80f5c5ef9a004d2dfa02ef2506c6fe62307e8b
SHA512ee15947f324c3ca4c890ee7d6ad6ba5f10ccb1301fc117f3930b1c62ddf4da8884df26ae5b8d79aa759144b5beb64ea03f198e028bb26e91e4bc9923d1a5af6e
-
Filesize
136KB
MD5885e8188d281193981b7d1c4f94ec239
SHA1b3ba987278e4e16a3188d1a034c5d1ae7c5f5ec1
SHA256f9d256d2d4739fe7a08affa17b68f2b966c1544bba41e7203e9d4e15e00ecbc9
SHA5123e2ab1760863b402c6f22e178ac4e28d9f757a9a712bf6f75cf0ee3b9d938694793c2b66ef03e246122e56c8cacb784be58029752c318f3a42b46df45de29367
-
Filesize
136KB
MD5885e8188d281193981b7d1c4f94ec239
SHA1b3ba987278e4e16a3188d1a034c5d1ae7c5f5ec1
SHA256f9d256d2d4739fe7a08affa17b68f2b966c1544bba41e7203e9d4e15e00ecbc9
SHA5123e2ab1760863b402c6f22e178ac4e28d9f757a9a712bf6f75cf0ee3b9d938694793c2b66ef03e246122e56c8cacb784be58029752c318f3a42b46df45de29367
-
Filesize
204KB
MD57a914be2c9856ef6f318984e7b353b02
SHA1971c978a40597110841e0b44e7b2dea9e336241a
SHA2564c97636084feea7fd59cd4e6a5da4eb44305055aefc71ef2837dd599aa9ab1fe
SHA512708035ddbc5cef9860b535e787d857d6ed064b9f47dcebbc0e3e09452bed43101a131bbd1526b2bbe1cc96508349efd3c90612ff4ba1fa060acb61f92784c085
-
Filesize
204KB
MD57a914be2c9856ef6f318984e7b353b02
SHA1971c978a40597110841e0b44e7b2dea9e336241a
SHA2564c97636084feea7fd59cd4e6a5da4eb44305055aefc71ef2837dd599aa9ab1fe
SHA512708035ddbc5cef9860b535e787d857d6ed064b9f47dcebbc0e3e09452bed43101a131bbd1526b2bbe1cc96508349efd3c90612ff4ba1fa060acb61f92784c085
-
Filesize
204KB
MD57a914be2c9856ef6f318984e7b353b02
SHA1971c978a40597110841e0b44e7b2dea9e336241a
SHA2564c97636084feea7fd59cd4e6a5da4eb44305055aefc71ef2837dd599aa9ab1fe
SHA512708035ddbc5cef9860b535e787d857d6ed064b9f47dcebbc0e3e09452bed43101a131bbd1526b2bbe1cc96508349efd3c90612ff4ba1fa060acb61f92784c085
-
Filesize
204KB
MD57a914be2c9856ef6f318984e7b353b02
SHA1971c978a40597110841e0b44e7b2dea9e336241a
SHA2564c97636084feea7fd59cd4e6a5da4eb44305055aefc71ef2837dd599aa9ab1fe
SHA512708035ddbc5cef9860b535e787d857d6ed064b9f47dcebbc0e3e09452bed43101a131bbd1526b2bbe1cc96508349efd3c90612ff4ba1fa060acb61f92784c085
-
Filesize
204KB
MD57a914be2c9856ef6f318984e7b353b02
SHA1971c978a40597110841e0b44e7b2dea9e336241a
SHA2564c97636084feea7fd59cd4e6a5da4eb44305055aefc71ef2837dd599aa9ab1fe
SHA512708035ddbc5cef9860b535e787d857d6ed064b9f47dcebbc0e3e09452bed43101a131bbd1526b2bbe1cc96508349efd3c90612ff4ba1fa060acb61f92784c085
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5