Analysis
-
max time kernel
180s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 22:07
Static task
static1
Behavioral task
behavioral1
Sample
d6ac2965b772025cbbb37e2fe6504fbcc2ee1f1916e5c46733218d49ec31fe1d.exe
Resource
win10v2004-20230220-en
General
-
Target
d6ac2965b772025cbbb37e2fe6504fbcc2ee1f1916e5c46733218d49ec31fe1d.exe
-
Size
480KB
-
MD5
12a4ecbe0bc0b0c3159ba7dee38d1eee
-
SHA1
725890476a2b0418bd23fca3f2f84e9bea3f4317
-
SHA256
d6ac2965b772025cbbb37e2fe6504fbcc2ee1f1916e5c46733218d49ec31fe1d
-
SHA512
6255659cf65bd58ea3a6ff2dd5c6bf545e10ec38b3b9e179a64dcf6463c1727e18ecdc32f2c1838e108c5d6e6499eea53852d2d3b7763eaa38642374c5824511
-
SSDEEP
12288:dMr8y90fknZC+uPx1l61YILdzvK7T2RsacWMqJpBa:dyF76EYONvKTmhp4
Malware Config
Extracted
redline
dariy
217.196.96.101:4132
-
auth_value
2f34aa0d1cb1023a826825b68ebedcc8
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k4850392.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k4850392.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k4850392.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k4850392.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k4850392.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k4850392.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation m7269822.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 5 IoCs
pid Process 2008 y5930199.exe 2304 k4850392.exe 1260 l8667707.exe 4800 m7269822.exe 2832 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k4850392.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k4850392.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d6ac2965b772025cbbb37e2fe6504fbcc2ee1f1916e5c46733218d49ec31fe1d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y5930199.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y5930199.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d6ac2965b772025cbbb37e2fe6504fbcc2ee1f1916e5c46733218d49ec31fe1d.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2516 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2304 k4850392.exe 2304 k4850392.exe 1260 l8667707.exe 1260 l8667707.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2304 k4850392.exe Token: SeDebugPrivilege 1260 l8667707.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4800 m7269822.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 588 wrote to memory of 2008 588 d6ac2965b772025cbbb37e2fe6504fbcc2ee1f1916e5c46733218d49ec31fe1d.exe 82 PID 588 wrote to memory of 2008 588 d6ac2965b772025cbbb37e2fe6504fbcc2ee1f1916e5c46733218d49ec31fe1d.exe 82 PID 588 wrote to memory of 2008 588 d6ac2965b772025cbbb37e2fe6504fbcc2ee1f1916e5c46733218d49ec31fe1d.exe 82 PID 2008 wrote to memory of 2304 2008 y5930199.exe 83 PID 2008 wrote to memory of 2304 2008 y5930199.exe 83 PID 2008 wrote to memory of 2304 2008 y5930199.exe 83 PID 2008 wrote to memory of 1260 2008 y5930199.exe 84 PID 2008 wrote to memory of 1260 2008 y5930199.exe 84 PID 2008 wrote to memory of 1260 2008 y5930199.exe 84 PID 588 wrote to memory of 4800 588 d6ac2965b772025cbbb37e2fe6504fbcc2ee1f1916e5c46733218d49ec31fe1d.exe 85 PID 588 wrote to memory of 4800 588 d6ac2965b772025cbbb37e2fe6504fbcc2ee1f1916e5c46733218d49ec31fe1d.exe 85 PID 588 wrote to memory of 4800 588 d6ac2965b772025cbbb37e2fe6504fbcc2ee1f1916e5c46733218d49ec31fe1d.exe 85 PID 4800 wrote to memory of 2832 4800 m7269822.exe 86 PID 4800 wrote to memory of 2832 4800 m7269822.exe 86 PID 4800 wrote to memory of 2832 4800 m7269822.exe 86 PID 2832 wrote to memory of 2516 2832 oneetx.exe 87 PID 2832 wrote to memory of 2516 2832 oneetx.exe 87 PID 2832 wrote to memory of 2516 2832 oneetx.exe 87 PID 2832 wrote to memory of 4164 2832 oneetx.exe 89 PID 2832 wrote to memory of 4164 2832 oneetx.exe 89 PID 2832 wrote to memory of 4164 2832 oneetx.exe 89 PID 4164 wrote to memory of 1684 4164 cmd.exe 91 PID 4164 wrote to memory of 1684 4164 cmd.exe 91 PID 4164 wrote to memory of 1684 4164 cmd.exe 91 PID 4164 wrote to memory of 3596 4164 cmd.exe 92 PID 4164 wrote to memory of 3596 4164 cmd.exe 92 PID 4164 wrote to memory of 3596 4164 cmd.exe 92 PID 4164 wrote to memory of 4100 4164 cmd.exe 93 PID 4164 wrote to memory of 4100 4164 cmd.exe 93 PID 4164 wrote to memory of 4100 4164 cmd.exe 93 PID 4164 wrote to memory of 1856 4164 cmd.exe 94 PID 4164 wrote to memory of 1856 4164 cmd.exe 94 PID 4164 wrote to memory of 1856 4164 cmd.exe 94 PID 4164 wrote to memory of 4364 4164 cmd.exe 95 PID 4164 wrote to memory of 4364 4164 cmd.exe 95 PID 4164 wrote to memory of 4364 4164 cmd.exe 95 PID 4164 wrote to memory of 808 4164 cmd.exe 96 PID 4164 wrote to memory of 808 4164 cmd.exe 96 PID 4164 wrote to memory of 808 4164 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6ac2965b772025cbbb37e2fe6504fbcc2ee1f1916e5c46733218d49ec31fe1d.exe"C:\Users\Admin\AppData\Local\Temp\d6ac2965b772025cbbb37e2fe6504fbcc2ee1f1916e5c46733218d49ec31fe1d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5930199.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5930199.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k4850392.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k4850392.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l8667707.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l8667707.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1260
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m7269822.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m7269822.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2516
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1684
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:3596
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4100
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1856
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4364
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:808
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208KB
MD563677709f365fac4b135497a154fafda
SHA1da56a31d4c729d71b23500099890d87b424dcda8
SHA256fd3d3621166f5e5247cd886b72b397216837f6673282311f5ae1ab3afcaeb267
SHA512790cebf65e78393e57c0da0775c79472c25418dcae5aa404e8f1a8a83e383228359d8897c7917f0d3c889bdb07237f1a1c2d129ff16db6a7990e7cd7d2e58a35
-
Filesize
208KB
MD563677709f365fac4b135497a154fafda
SHA1da56a31d4c729d71b23500099890d87b424dcda8
SHA256fd3d3621166f5e5247cd886b72b397216837f6673282311f5ae1ab3afcaeb267
SHA512790cebf65e78393e57c0da0775c79472c25418dcae5aa404e8f1a8a83e383228359d8897c7917f0d3c889bdb07237f1a1c2d129ff16db6a7990e7cd7d2e58a35
-
Filesize
309KB
MD5bb9a755625d9a83697b0f24755f9acd7
SHA1902005870f478fa416fb69063aa4b3f8f19aa5e1
SHA256e3a7b3db75ef2e295c74042cf393773dc78f600510f917916f01ba6f67e7bc90
SHA512127c0e210c5bb13d21a88fc81fe5db74454fe5bd626fe790dcdf927697dcfd1a87efe6f66afceed0e5691bf5b679c28421fd17ae132447caed62896980c46e51
-
Filesize
309KB
MD5bb9a755625d9a83697b0f24755f9acd7
SHA1902005870f478fa416fb69063aa4b3f8f19aa5e1
SHA256e3a7b3db75ef2e295c74042cf393773dc78f600510f917916f01ba6f67e7bc90
SHA512127c0e210c5bb13d21a88fc81fe5db74454fe5bd626fe790dcdf927697dcfd1a87efe6f66afceed0e5691bf5b679c28421fd17ae132447caed62896980c46e51
-
Filesize
176KB
MD5bf976d486668015ee28685c6760c57b6
SHA1a28b576d2a225da83176ad2f0c0ce518e382cff4
SHA25679a7535cc81e1117f665c74931a4c4cd1b8c2a2c33f6cb50582586a1839c6ea8
SHA512954555c0715596e7a437dc3dc9c6efda9293273a2b92adc8e94edb77108513f69d424fadb20b4238890b3db805615c1c1a348ce533b287ceab6a992def9f54d1
-
Filesize
176KB
MD5bf976d486668015ee28685c6760c57b6
SHA1a28b576d2a225da83176ad2f0c0ce518e382cff4
SHA25679a7535cc81e1117f665c74931a4c4cd1b8c2a2c33f6cb50582586a1839c6ea8
SHA512954555c0715596e7a437dc3dc9c6efda9293273a2b92adc8e94edb77108513f69d424fadb20b4238890b3db805615c1c1a348ce533b287ceab6a992def9f54d1
-
Filesize
168KB
MD5ec9ded14e9294caf84f4c3db868ddf1c
SHA199d9ef67706df37e94e8c954ea602814a1e3b378
SHA256fb1dc45288588aaf7a2d062819a9d86844d3a1ec5a2f5a0c6b68dc47a5e62d43
SHA5120a4c86b73a0cd5e080efb8af45ee5a91f7d61d5ef7b7182bab3b39e48bb2a69025b572082813d0301d00e2b60f01e2ce46b15868b883a29bcea260e7be75e939
-
Filesize
168KB
MD5ec9ded14e9294caf84f4c3db868ddf1c
SHA199d9ef67706df37e94e8c954ea602814a1e3b378
SHA256fb1dc45288588aaf7a2d062819a9d86844d3a1ec5a2f5a0c6b68dc47a5e62d43
SHA5120a4c86b73a0cd5e080efb8af45ee5a91f7d61d5ef7b7182bab3b39e48bb2a69025b572082813d0301d00e2b60f01e2ce46b15868b883a29bcea260e7be75e939
-
Filesize
208KB
MD563677709f365fac4b135497a154fafda
SHA1da56a31d4c729d71b23500099890d87b424dcda8
SHA256fd3d3621166f5e5247cd886b72b397216837f6673282311f5ae1ab3afcaeb267
SHA512790cebf65e78393e57c0da0775c79472c25418dcae5aa404e8f1a8a83e383228359d8897c7917f0d3c889bdb07237f1a1c2d129ff16db6a7990e7cd7d2e58a35
-
Filesize
208KB
MD563677709f365fac4b135497a154fafda
SHA1da56a31d4c729d71b23500099890d87b424dcda8
SHA256fd3d3621166f5e5247cd886b72b397216837f6673282311f5ae1ab3afcaeb267
SHA512790cebf65e78393e57c0da0775c79472c25418dcae5aa404e8f1a8a83e383228359d8897c7917f0d3c889bdb07237f1a1c2d129ff16db6a7990e7cd7d2e58a35
-
Filesize
208KB
MD563677709f365fac4b135497a154fafda
SHA1da56a31d4c729d71b23500099890d87b424dcda8
SHA256fd3d3621166f5e5247cd886b72b397216837f6673282311f5ae1ab3afcaeb267
SHA512790cebf65e78393e57c0da0775c79472c25418dcae5aa404e8f1a8a83e383228359d8897c7917f0d3c889bdb07237f1a1c2d129ff16db6a7990e7cd7d2e58a35