Analysis
-
max time kernel
95s -
max time network
147s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
06/05/2023, 12:48
Static task
static1
Behavioral task
behavioral1
Sample
4766afea4efc26ab75dd4c8c7bcd8b858c0d350b058676d9d061d66844d9b615.exe
Resource
win10-20230220-en
General
-
Target
4766afea4efc26ab75dd4c8c7bcd8b858c0d350b058676d9d061d66844d9b615.exe
-
Size
479KB
-
MD5
c7e6410ae29ebfb69d0b22f526436eaf
-
SHA1
8f6730eec0a4b048d10ee1c8dd01acd48e53dee2
-
SHA256
4766afea4efc26ab75dd4c8c7bcd8b858c0d350b058676d9d061d66844d9b615
-
SHA512
7d9a80187852811d75bb6225bdd313322e39dacb220cd3f7c41e71045c44ada152500ca0637c7984d41355cff0fa7b1c69590e439bc06f195d1273e4ee0a5de7
-
SSDEEP
6144:KSy+bnr+Op0yN90QEwdioakxV0puoCaNLmjMtPsWMMjOAcK4UtHQxjFGiz6MlEf:WMray90NqeD1a4tPs+OAqaQx59lEf
Malware Config
Extracted
redline
dariy
217.196.96.101:4132
-
auth_value
2f34aa0d1cb1023a826825b68ebedcc8
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h3569103.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h3569103.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h3569103.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h3569103.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h3569103.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 4188 x6685597.exe 2188 g9306907.exe 3120 h3569103.exe 4724 i0899710.exe 3636 oneetx.exe 4376 oneetx.exe 5100 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4900 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h3569103.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h3569103.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4766afea4efc26ab75dd4c8c7bcd8b858c0d350b058676d9d061d66844d9b615.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x6685597.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6685597.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4766afea4efc26ab75dd4c8c7bcd8b858c0d350b058676d9d061d66844d9b615.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4628 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2188 g9306907.exe 2188 g9306907.exe 3120 h3569103.exe 3120 h3569103.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2188 g9306907.exe Token: SeDebugPrivilege 3120 h3569103.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4724 i0899710.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4048 wrote to memory of 4188 4048 4766afea4efc26ab75dd4c8c7bcd8b858c0d350b058676d9d061d66844d9b615.exe 66 PID 4048 wrote to memory of 4188 4048 4766afea4efc26ab75dd4c8c7bcd8b858c0d350b058676d9d061d66844d9b615.exe 66 PID 4048 wrote to memory of 4188 4048 4766afea4efc26ab75dd4c8c7bcd8b858c0d350b058676d9d061d66844d9b615.exe 66 PID 4188 wrote to memory of 2188 4188 x6685597.exe 67 PID 4188 wrote to memory of 2188 4188 x6685597.exe 67 PID 4188 wrote to memory of 2188 4188 x6685597.exe 67 PID 4188 wrote to memory of 3120 4188 x6685597.exe 69 PID 4188 wrote to memory of 3120 4188 x6685597.exe 69 PID 4188 wrote to memory of 3120 4188 x6685597.exe 69 PID 4048 wrote to memory of 4724 4048 4766afea4efc26ab75dd4c8c7bcd8b858c0d350b058676d9d061d66844d9b615.exe 70 PID 4048 wrote to memory of 4724 4048 4766afea4efc26ab75dd4c8c7bcd8b858c0d350b058676d9d061d66844d9b615.exe 70 PID 4048 wrote to memory of 4724 4048 4766afea4efc26ab75dd4c8c7bcd8b858c0d350b058676d9d061d66844d9b615.exe 70 PID 4724 wrote to memory of 3636 4724 i0899710.exe 71 PID 4724 wrote to memory of 3636 4724 i0899710.exe 71 PID 4724 wrote to memory of 3636 4724 i0899710.exe 71 PID 3636 wrote to memory of 4628 3636 oneetx.exe 72 PID 3636 wrote to memory of 4628 3636 oneetx.exe 72 PID 3636 wrote to memory of 4628 3636 oneetx.exe 72 PID 3636 wrote to memory of 3032 3636 oneetx.exe 74 PID 3636 wrote to memory of 3032 3636 oneetx.exe 74 PID 3636 wrote to memory of 3032 3636 oneetx.exe 74 PID 3032 wrote to memory of 4476 3032 cmd.exe 76 PID 3032 wrote to memory of 4476 3032 cmd.exe 76 PID 3032 wrote to memory of 4476 3032 cmd.exe 76 PID 3032 wrote to memory of 4508 3032 cmd.exe 77 PID 3032 wrote to memory of 4508 3032 cmd.exe 77 PID 3032 wrote to memory of 4508 3032 cmd.exe 77 PID 3032 wrote to memory of 3832 3032 cmd.exe 78 PID 3032 wrote to memory of 3832 3032 cmd.exe 78 PID 3032 wrote to memory of 3832 3032 cmd.exe 78 PID 3032 wrote to memory of 4144 3032 cmd.exe 79 PID 3032 wrote to memory of 4144 3032 cmd.exe 79 PID 3032 wrote to memory of 4144 3032 cmd.exe 79 PID 3032 wrote to memory of 3248 3032 cmd.exe 80 PID 3032 wrote to memory of 3248 3032 cmd.exe 80 PID 3032 wrote to memory of 3248 3032 cmd.exe 80 PID 3032 wrote to memory of 4100 3032 cmd.exe 81 PID 3032 wrote to memory of 4100 3032 cmd.exe 81 PID 3032 wrote to memory of 4100 3032 cmd.exe 81 PID 3636 wrote to memory of 4900 3636 oneetx.exe 83 PID 3636 wrote to memory of 4900 3636 oneetx.exe 83 PID 3636 wrote to memory of 4900 3636 oneetx.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\4766afea4efc26ab75dd4c8c7bcd8b858c0d350b058676d9d061d66844d9b615.exe"C:\Users\Admin\AppData\Local\Temp\4766afea4efc26ab75dd4c8c7bcd8b858c0d350b058676d9d061d66844d9b615.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6685597.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6685597.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9306907.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9306907.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2188
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3569103.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3569103.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3120
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0899710.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0899710.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4628
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4476
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4508
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3832
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4144
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:3248
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:4100
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4900
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4376
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:5100
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207KB
MD503309d4c242a5bdb62596cdad3c4ee62
SHA13d17e699331eae487675202960ddc111b20c5755
SHA2568458385964bbdf9dafd4add417f33fb3e0e9f50156cb2b5140eef5f50b1c954a
SHA512f11ca714aeda7f75ff7bbf7f5fc81046bcef7488e54848984a675e8cd55cf2caf621e2d5bda8de76f2daa8aeeecc744d2f00c2112fb6fb988022fa07f860d0dd
-
Filesize
207KB
MD503309d4c242a5bdb62596cdad3c4ee62
SHA13d17e699331eae487675202960ddc111b20c5755
SHA2568458385964bbdf9dafd4add417f33fb3e0e9f50156cb2b5140eef5f50b1c954a
SHA512f11ca714aeda7f75ff7bbf7f5fc81046bcef7488e54848984a675e8cd55cf2caf621e2d5bda8de76f2daa8aeeecc744d2f00c2112fb6fb988022fa07f860d0dd
-
Filesize
307KB
MD53cbbd1cb1fda4c5ef7abed610884fb3c
SHA10fd81e47bb546238258523e7e7c3c39d5e242085
SHA256f2ff157a781f1559af152817be0e4ac9e91fb3bc0cb086ae07c2f00ca5c31bfb
SHA51238a6a0fa14e1f4175b87eb8f22377da3303f0794c3dc52e3cacd1987f6828a674f1faf8cf84a259facac126b8fae2fd04f8fb0ba3eec75c5a5b570ffc3d0bd76
-
Filesize
307KB
MD53cbbd1cb1fda4c5ef7abed610884fb3c
SHA10fd81e47bb546238258523e7e7c3c39d5e242085
SHA256f2ff157a781f1559af152817be0e4ac9e91fb3bc0cb086ae07c2f00ca5c31bfb
SHA51238a6a0fa14e1f4175b87eb8f22377da3303f0794c3dc52e3cacd1987f6828a674f1faf8cf84a259facac126b8fae2fd04f8fb0ba3eec75c5a5b570ffc3d0bd76
-
Filesize
168KB
MD54dcf313b74632f8b0512307794e97ae5
SHA16f8c7500d2c8da9357133f431e15c98bf659d599
SHA256ecc5bd5f2eee12fc89dec5bba517a49c005fd52a19f3aad2008b30ef5e57e36f
SHA512a73a740269a4d7aa5cb56a6ae070dc85d909edf8983b7a77e9e8e093a9e765042b4821c4e6808e779e5f201eaa4d4aafbcd093fe4b313e1e6e106dd3799639b9
-
Filesize
168KB
MD54dcf313b74632f8b0512307794e97ae5
SHA16f8c7500d2c8da9357133f431e15c98bf659d599
SHA256ecc5bd5f2eee12fc89dec5bba517a49c005fd52a19f3aad2008b30ef5e57e36f
SHA512a73a740269a4d7aa5cb56a6ae070dc85d909edf8983b7a77e9e8e093a9e765042b4821c4e6808e779e5f201eaa4d4aafbcd093fe4b313e1e6e106dd3799639b9
-
Filesize
176KB
MD52a15639cff8ff839b7a9a59a46c12119
SHA10c5e1e48cf98ed95cbe1f67516572786bfe5891d
SHA256579d076010cef1e6fe5dd274f403640d28f52eeacd958af5945722d5815d8122
SHA5122a3aa35bc36e7a320852d1bdc1a832b0a6bfacdce0c0fe5b781145867df1b37ad4a07d6325cf1d35e89bc24b8d6c20b1aeac0ccd8a9618eaaa2cc48fd3b6bed2
-
Filesize
176KB
MD52a15639cff8ff839b7a9a59a46c12119
SHA10c5e1e48cf98ed95cbe1f67516572786bfe5891d
SHA256579d076010cef1e6fe5dd274f403640d28f52eeacd958af5945722d5815d8122
SHA5122a3aa35bc36e7a320852d1bdc1a832b0a6bfacdce0c0fe5b781145867df1b37ad4a07d6325cf1d35e89bc24b8d6c20b1aeac0ccd8a9618eaaa2cc48fd3b6bed2
-
Filesize
207KB
MD503309d4c242a5bdb62596cdad3c4ee62
SHA13d17e699331eae487675202960ddc111b20c5755
SHA2568458385964bbdf9dafd4add417f33fb3e0e9f50156cb2b5140eef5f50b1c954a
SHA512f11ca714aeda7f75ff7bbf7f5fc81046bcef7488e54848984a675e8cd55cf2caf621e2d5bda8de76f2daa8aeeecc744d2f00c2112fb6fb988022fa07f860d0dd
-
Filesize
207KB
MD503309d4c242a5bdb62596cdad3c4ee62
SHA13d17e699331eae487675202960ddc111b20c5755
SHA2568458385964bbdf9dafd4add417f33fb3e0e9f50156cb2b5140eef5f50b1c954a
SHA512f11ca714aeda7f75ff7bbf7f5fc81046bcef7488e54848984a675e8cd55cf2caf621e2d5bda8de76f2daa8aeeecc744d2f00c2112fb6fb988022fa07f860d0dd
-
Filesize
207KB
MD503309d4c242a5bdb62596cdad3c4ee62
SHA13d17e699331eae487675202960ddc111b20c5755
SHA2568458385964bbdf9dafd4add417f33fb3e0e9f50156cb2b5140eef5f50b1c954a
SHA512f11ca714aeda7f75ff7bbf7f5fc81046bcef7488e54848984a675e8cd55cf2caf621e2d5bda8de76f2daa8aeeecc744d2f00c2112fb6fb988022fa07f860d0dd
-
Filesize
207KB
MD503309d4c242a5bdb62596cdad3c4ee62
SHA13d17e699331eae487675202960ddc111b20c5755
SHA2568458385964bbdf9dafd4add417f33fb3e0e9f50156cb2b5140eef5f50b1c954a
SHA512f11ca714aeda7f75ff7bbf7f5fc81046bcef7488e54848984a675e8cd55cf2caf621e2d5bda8de76f2daa8aeeecc744d2f00c2112fb6fb988022fa07f860d0dd
-
Filesize
207KB
MD503309d4c242a5bdb62596cdad3c4ee62
SHA13d17e699331eae487675202960ddc111b20c5755
SHA2568458385964bbdf9dafd4add417f33fb3e0e9f50156cb2b5140eef5f50b1c954a
SHA512f11ca714aeda7f75ff7bbf7f5fc81046bcef7488e54848984a675e8cd55cf2caf621e2d5bda8de76f2daa8aeeecc744d2f00c2112fb6fb988022fa07f860d0dd
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53