Analysis
-
max time kernel
112s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
06-05-2023 12:05
Static task
static1
Behavioral task
behavioral1
Sample
36eaf80480a6d7de76b35a999a58d561b4e138ef3671625794b5155e01e6cb18.exe
Resource
win10-20230220-en
General
-
Target
36eaf80480a6d7de76b35a999a58d561b4e138ef3671625794b5155e01e6cb18.exe
-
Size
479KB
-
MD5
0a826a8adaf49af3d4401cb6e59b8d9b
-
SHA1
9078d562b7bf6ba3fab480c32923490a06804cdc
-
SHA256
36eaf80480a6d7de76b35a999a58d561b4e138ef3671625794b5155e01e6cb18
-
SHA512
c015ecf0875a461a6ca9406ed16c850d7ba06d9e8965987cbca5d1077fb440269e57b04932d6d731dc9aa896e970bb4020678df4c61c6e8c61d7d96a0a9dc431
-
SSDEEP
12288:ZMr8y90UZLPzB/MSicZv432ANLWfGRm54vqQ5n/14mei+:hy3ZLPzB/EcZQrW/gL5ntk
Malware Config
Extracted
redline
dariy
217.196.96.101:4132
-
auth_value
2f34aa0d1cb1023a826825b68ebedcc8
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k0822801.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k0822801.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k0822801.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k0822801.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k0822801.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2472 y3428308.exe 404 k0822801.exe 4700 l4493984.exe 1060 m9716943.exe 4444 oneetx.exe 3640 oneetx.exe 4572 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 704 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k0822801.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k0822801.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 36eaf80480a6d7de76b35a999a58d561b4e138ef3671625794b5155e01e6cb18.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 36eaf80480a6d7de76b35a999a58d561b4e138ef3671625794b5155e01e6cb18.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y3428308.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y3428308.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4936 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 404 k0822801.exe 404 k0822801.exe 4700 l4493984.exe 4700 l4493984.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 404 k0822801.exe Token: SeDebugPrivilege 4700 l4493984.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1060 m9716943.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4080 wrote to memory of 2472 4080 36eaf80480a6d7de76b35a999a58d561b4e138ef3671625794b5155e01e6cb18.exe 66 PID 4080 wrote to memory of 2472 4080 36eaf80480a6d7de76b35a999a58d561b4e138ef3671625794b5155e01e6cb18.exe 66 PID 4080 wrote to memory of 2472 4080 36eaf80480a6d7de76b35a999a58d561b4e138ef3671625794b5155e01e6cb18.exe 66 PID 2472 wrote to memory of 404 2472 y3428308.exe 67 PID 2472 wrote to memory of 404 2472 y3428308.exe 67 PID 2472 wrote to memory of 404 2472 y3428308.exe 67 PID 2472 wrote to memory of 4700 2472 y3428308.exe 68 PID 2472 wrote to memory of 4700 2472 y3428308.exe 68 PID 2472 wrote to memory of 4700 2472 y3428308.exe 68 PID 4080 wrote to memory of 1060 4080 36eaf80480a6d7de76b35a999a58d561b4e138ef3671625794b5155e01e6cb18.exe 70 PID 4080 wrote to memory of 1060 4080 36eaf80480a6d7de76b35a999a58d561b4e138ef3671625794b5155e01e6cb18.exe 70 PID 4080 wrote to memory of 1060 4080 36eaf80480a6d7de76b35a999a58d561b4e138ef3671625794b5155e01e6cb18.exe 70 PID 1060 wrote to memory of 4444 1060 m9716943.exe 71 PID 1060 wrote to memory of 4444 1060 m9716943.exe 71 PID 1060 wrote to memory of 4444 1060 m9716943.exe 71 PID 4444 wrote to memory of 4936 4444 oneetx.exe 72 PID 4444 wrote to memory of 4936 4444 oneetx.exe 72 PID 4444 wrote to memory of 4936 4444 oneetx.exe 72 PID 4444 wrote to memory of 4476 4444 oneetx.exe 74 PID 4444 wrote to memory of 4476 4444 oneetx.exe 74 PID 4444 wrote to memory of 4476 4444 oneetx.exe 74 PID 4476 wrote to memory of 4348 4476 cmd.exe 76 PID 4476 wrote to memory of 4348 4476 cmd.exe 76 PID 4476 wrote to memory of 4348 4476 cmd.exe 76 PID 4476 wrote to memory of 1792 4476 cmd.exe 77 PID 4476 wrote to memory of 1792 4476 cmd.exe 77 PID 4476 wrote to memory of 1792 4476 cmd.exe 77 PID 4476 wrote to memory of 2564 4476 cmd.exe 78 PID 4476 wrote to memory of 2564 4476 cmd.exe 78 PID 4476 wrote to memory of 2564 4476 cmd.exe 78 PID 4476 wrote to memory of 5084 4476 cmd.exe 79 PID 4476 wrote to memory of 5084 4476 cmd.exe 79 PID 4476 wrote to memory of 5084 4476 cmd.exe 79 PID 4476 wrote to memory of 4364 4476 cmd.exe 80 PID 4476 wrote to memory of 4364 4476 cmd.exe 80 PID 4476 wrote to memory of 4364 4476 cmd.exe 80 PID 4476 wrote to memory of 4464 4476 cmd.exe 81 PID 4476 wrote to memory of 4464 4476 cmd.exe 81 PID 4476 wrote to memory of 4464 4476 cmd.exe 81 PID 4444 wrote to memory of 704 4444 oneetx.exe 83 PID 4444 wrote to memory of 704 4444 oneetx.exe 83 PID 4444 wrote to memory of 704 4444 oneetx.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\36eaf80480a6d7de76b35a999a58d561b4e138ef3671625794b5155e01e6cb18.exe"C:\Users\Admin\AppData\Local\Temp\36eaf80480a6d7de76b35a999a58d561b4e138ef3671625794b5155e01e6cb18.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3428308.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3428308.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0822801.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0822801.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:404
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4493984.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4493984.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4700
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m9716943.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m9716943.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4936
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4348
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1792
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:2564
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:5084
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4364
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:4464
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:704
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3640
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4572
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207KB
MD58e987883743462812e526f10445e1c39
SHA10d2d545a34ff4fc0d0db428f6296743d5d5a0dbd
SHA2568cca52b74ec5700c990b3c482ed22bb68314f3fc7e80d9640a39f2bd589b1bee
SHA5127b7ad3e3816343c9d3031fbc6081cba016f2e1877f9abb3544c6129c828dbdca063b9340c73a48cbdffee459ec73c1dcc1d0cfb6ce9dabd935f1cc4bb90ada1e
-
Filesize
207KB
MD58e987883743462812e526f10445e1c39
SHA10d2d545a34ff4fc0d0db428f6296743d5d5a0dbd
SHA2568cca52b74ec5700c990b3c482ed22bb68314f3fc7e80d9640a39f2bd589b1bee
SHA5127b7ad3e3816343c9d3031fbc6081cba016f2e1877f9abb3544c6129c828dbdca063b9340c73a48cbdffee459ec73c1dcc1d0cfb6ce9dabd935f1cc4bb90ada1e
-
Filesize
307KB
MD5b89719478cccc59912553c9cf6fddb97
SHA19c7edd0ec981b90a0cd5909002a4eece6300add1
SHA2562b1f01fb698516922393c15e8df55e70bbe2e10f4686bebe629207d5e39b2b5a
SHA512477d8174d015e78d25ce82b1398e3d8424d3ea558ecf4c45b18d440b417b5f0ea6a6bda738d9e0518c5bb4c4683443add94b5ab058af1a1da48fd30a68f81a33
-
Filesize
307KB
MD5b89719478cccc59912553c9cf6fddb97
SHA19c7edd0ec981b90a0cd5909002a4eece6300add1
SHA2562b1f01fb698516922393c15e8df55e70bbe2e10f4686bebe629207d5e39b2b5a
SHA512477d8174d015e78d25ce82b1398e3d8424d3ea558ecf4c45b18d440b417b5f0ea6a6bda738d9e0518c5bb4c4683443add94b5ab058af1a1da48fd30a68f81a33
-
Filesize
176KB
MD5c9e89254b63b4c80f4177ea99d3f1099
SHA14b6235ecd86b0d6e2eb2e587410298598746720a
SHA25652358cf9347180ed3dabe89f36d48515a2052b90083b4853b597a4c3b35dab1e
SHA512a7bc9282005074541a76a7843d7f867022e0a5bc265d290eb954884b8f5b3a75157b217a3acee86e9c5c7faedd15a16ba079f83a78815bc9f43e9316814bb7c9
-
Filesize
176KB
MD5c9e89254b63b4c80f4177ea99d3f1099
SHA14b6235ecd86b0d6e2eb2e587410298598746720a
SHA25652358cf9347180ed3dabe89f36d48515a2052b90083b4853b597a4c3b35dab1e
SHA512a7bc9282005074541a76a7843d7f867022e0a5bc265d290eb954884b8f5b3a75157b217a3acee86e9c5c7faedd15a16ba079f83a78815bc9f43e9316814bb7c9
-
Filesize
168KB
MD52f9756af310f96747664e49851a95da0
SHA171185d798021f9cae1a4c8a6fa54df7ca499bfa9
SHA256ca293e36f2b431d46ade5b0a151a1275b2184c6c061b62be493d48a218a625af
SHA512ef4b58be931a083145594bf57283e22126b8adaf35edb05975f8709182e030490e0077e4362dcfa8e4218a6a6ac1d79d9c66d20215caf9e0413ed1dda81fedec
-
Filesize
168KB
MD52f9756af310f96747664e49851a95da0
SHA171185d798021f9cae1a4c8a6fa54df7ca499bfa9
SHA256ca293e36f2b431d46ade5b0a151a1275b2184c6c061b62be493d48a218a625af
SHA512ef4b58be931a083145594bf57283e22126b8adaf35edb05975f8709182e030490e0077e4362dcfa8e4218a6a6ac1d79d9c66d20215caf9e0413ed1dda81fedec
-
Filesize
207KB
MD58e987883743462812e526f10445e1c39
SHA10d2d545a34ff4fc0d0db428f6296743d5d5a0dbd
SHA2568cca52b74ec5700c990b3c482ed22bb68314f3fc7e80d9640a39f2bd589b1bee
SHA5127b7ad3e3816343c9d3031fbc6081cba016f2e1877f9abb3544c6129c828dbdca063b9340c73a48cbdffee459ec73c1dcc1d0cfb6ce9dabd935f1cc4bb90ada1e
-
Filesize
207KB
MD58e987883743462812e526f10445e1c39
SHA10d2d545a34ff4fc0d0db428f6296743d5d5a0dbd
SHA2568cca52b74ec5700c990b3c482ed22bb68314f3fc7e80d9640a39f2bd589b1bee
SHA5127b7ad3e3816343c9d3031fbc6081cba016f2e1877f9abb3544c6129c828dbdca063b9340c73a48cbdffee459ec73c1dcc1d0cfb6ce9dabd935f1cc4bb90ada1e
-
Filesize
207KB
MD58e987883743462812e526f10445e1c39
SHA10d2d545a34ff4fc0d0db428f6296743d5d5a0dbd
SHA2568cca52b74ec5700c990b3c482ed22bb68314f3fc7e80d9640a39f2bd589b1bee
SHA5127b7ad3e3816343c9d3031fbc6081cba016f2e1877f9abb3544c6129c828dbdca063b9340c73a48cbdffee459ec73c1dcc1d0cfb6ce9dabd935f1cc4bb90ada1e
-
Filesize
207KB
MD58e987883743462812e526f10445e1c39
SHA10d2d545a34ff4fc0d0db428f6296743d5d5a0dbd
SHA2568cca52b74ec5700c990b3c482ed22bb68314f3fc7e80d9640a39f2bd589b1bee
SHA5127b7ad3e3816343c9d3031fbc6081cba016f2e1877f9abb3544c6129c828dbdca063b9340c73a48cbdffee459ec73c1dcc1d0cfb6ce9dabd935f1cc4bb90ada1e
-
Filesize
207KB
MD58e987883743462812e526f10445e1c39
SHA10d2d545a34ff4fc0d0db428f6296743d5d5a0dbd
SHA2568cca52b74ec5700c990b3c482ed22bb68314f3fc7e80d9640a39f2bd589b1bee
SHA5127b7ad3e3816343c9d3031fbc6081cba016f2e1877f9abb3544c6129c828dbdca063b9340c73a48cbdffee459ec73c1dcc1d0cfb6ce9dabd935f1cc4bb90ada1e
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53