Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 13:39
Static task
static1
Behavioral task
behavioral1
Sample
d67506c1a8fcf9b81015cc3437e208bb4e3af801f6f6e07e9e5ae32cce31d4f7.exe
Resource
win10v2004-20230220-en
General
-
Target
d67506c1a8fcf9b81015cc3437e208bb4e3af801f6f6e07e9e5ae32cce31d4f7.exe
-
Size
492KB
-
MD5
6f986f157d5b0a217126d61353514fee
-
SHA1
99e27c89b807b3764e8d4638b1df2c415ba1444c
-
SHA256
d67506c1a8fcf9b81015cc3437e208bb4e3af801f6f6e07e9e5ae32cce31d4f7
-
SHA512
592d9368ea4319c27c895f383cedbc98d7e92f364e2f9fdebd684f1633a5aae06f37d7e6d1fd459f419156ac37e6a6d18c9e3a13d975aa4c1221fd7e931df2b1
-
SSDEEP
12288:/MrGy90YCYTr6QCKiBpPvVuODOTy0/oYQ2lsdH:xyrhkBZtd6Tl/8H
Malware Config
Extracted
redline
luna
217.196.96.101:4132
-
auth_value
3372be6f6fa192ff878fa6fe9be73f6e
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o8385605.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o8385605.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o8385605.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o8385605.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o8385605.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o8385605.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation s2782622.exe -
Executes dropped EXE 7 IoCs
pid Process 2192 z6701308.exe 2724 o8385605.exe 5012 r2503119.exe 1016 s2782622.exe 3156 oneetx.exe 2200 oneetx.exe 3344 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1884 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o8385605.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o8385605.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d67506c1a8fcf9b81015cc3437e208bb4e3af801f6f6e07e9e5ae32cce31d4f7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d67506c1a8fcf9b81015cc3437e208bb4e3af801f6f6e07e9e5ae32cce31d4f7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z6701308.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z6701308.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4564 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2724 o8385605.exe 2724 o8385605.exe 5012 r2503119.exe 5012 r2503119.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2724 o8385605.exe Token: SeDebugPrivilege 5012 r2503119.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1016 s2782622.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2192 2528 d67506c1a8fcf9b81015cc3437e208bb4e3af801f6f6e07e9e5ae32cce31d4f7.exe 83 PID 2528 wrote to memory of 2192 2528 d67506c1a8fcf9b81015cc3437e208bb4e3af801f6f6e07e9e5ae32cce31d4f7.exe 83 PID 2528 wrote to memory of 2192 2528 d67506c1a8fcf9b81015cc3437e208bb4e3af801f6f6e07e9e5ae32cce31d4f7.exe 83 PID 2192 wrote to memory of 2724 2192 z6701308.exe 84 PID 2192 wrote to memory of 2724 2192 z6701308.exe 84 PID 2192 wrote to memory of 2724 2192 z6701308.exe 84 PID 2192 wrote to memory of 5012 2192 z6701308.exe 91 PID 2192 wrote to memory of 5012 2192 z6701308.exe 91 PID 2192 wrote to memory of 5012 2192 z6701308.exe 91 PID 2528 wrote to memory of 1016 2528 d67506c1a8fcf9b81015cc3437e208bb4e3af801f6f6e07e9e5ae32cce31d4f7.exe 94 PID 2528 wrote to memory of 1016 2528 d67506c1a8fcf9b81015cc3437e208bb4e3af801f6f6e07e9e5ae32cce31d4f7.exe 94 PID 2528 wrote to memory of 1016 2528 d67506c1a8fcf9b81015cc3437e208bb4e3af801f6f6e07e9e5ae32cce31d4f7.exe 94 PID 1016 wrote to memory of 3156 1016 s2782622.exe 95 PID 1016 wrote to memory of 3156 1016 s2782622.exe 95 PID 1016 wrote to memory of 3156 1016 s2782622.exe 95 PID 3156 wrote to memory of 4564 3156 oneetx.exe 96 PID 3156 wrote to memory of 4564 3156 oneetx.exe 96 PID 3156 wrote to memory of 4564 3156 oneetx.exe 96 PID 3156 wrote to memory of 1884 3156 oneetx.exe 99 PID 3156 wrote to memory of 1884 3156 oneetx.exe 99 PID 3156 wrote to memory of 1884 3156 oneetx.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\d67506c1a8fcf9b81015cc3437e208bb4e3af801f6f6e07e9e5ae32cce31d4f7.exe"C:\Users\Admin\AppData\Local\Temp\d67506c1a8fcf9b81015cc3437e208bb4e3af801f6f6e07e9e5ae32cce31d4f7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6701308.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6701308.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o8385605.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o8385605.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2503119.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r2503119.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5012
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2782622.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s2782622.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4564
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1884
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:2200
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:3344
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
230KB
MD5fa241b01eadb208c7c29da28458226e2
SHA1d3dc7d2b0ed9004d352a70da2dd21069445af4bb
SHA256876e86532ca2b4cbfa4122a9f7325a67d78a6125708699ab96366cfba4929145
SHA512baf7a274800f08a94decd5cc1434ffb0b7fb1a331febfa5612e250d85a90d3ac4312dd7831d5e517d4db0f225b063ff2c3a90829a51f137003852ca744d166cf
-
Filesize
230KB
MD5fa241b01eadb208c7c29da28458226e2
SHA1d3dc7d2b0ed9004d352a70da2dd21069445af4bb
SHA256876e86532ca2b4cbfa4122a9f7325a67d78a6125708699ab96366cfba4929145
SHA512baf7a274800f08a94decd5cc1434ffb0b7fb1a331febfa5612e250d85a90d3ac4312dd7831d5e517d4db0f225b063ff2c3a90829a51f137003852ca744d166cf
-
Filesize
230KB
MD5fa241b01eadb208c7c29da28458226e2
SHA1d3dc7d2b0ed9004d352a70da2dd21069445af4bb
SHA256876e86532ca2b4cbfa4122a9f7325a67d78a6125708699ab96366cfba4929145
SHA512baf7a274800f08a94decd5cc1434ffb0b7fb1a331febfa5612e250d85a90d3ac4312dd7831d5e517d4db0f225b063ff2c3a90829a51f137003852ca744d166cf
-
Filesize
230KB
MD5fa241b01eadb208c7c29da28458226e2
SHA1d3dc7d2b0ed9004d352a70da2dd21069445af4bb
SHA256876e86532ca2b4cbfa4122a9f7325a67d78a6125708699ab96366cfba4929145
SHA512baf7a274800f08a94decd5cc1434ffb0b7fb1a331febfa5612e250d85a90d3ac4312dd7831d5e517d4db0f225b063ff2c3a90829a51f137003852ca744d166cf
-
Filesize
230KB
MD5fa241b01eadb208c7c29da28458226e2
SHA1d3dc7d2b0ed9004d352a70da2dd21069445af4bb
SHA256876e86532ca2b4cbfa4122a9f7325a67d78a6125708699ab96366cfba4929145
SHA512baf7a274800f08a94decd5cc1434ffb0b7fb1a331febfa5612e250d85a90d3ac4312dd7831d5e517d4db0f225b063ff2c3a90829a51f137003852ca744d166cf
-
Filesize
230KB
MD5fa241b01eadb208c7c29da28458226e2
SHA1d3dc7d2b0ed9004d352a70da2dd21069445af4bb
SHA256876e86532ca2b4cbfa4122a9f7325a67d78a6125708699ab96366cfba4929145
SHA512baf7a274800f08a94decd5cc1434ffb0b7fb1a331febfa5612e250d85a90d3ac4312dd7831d5e517d4db0f225b063ff2c3a90829a51f137003852ca744d166cf
-
Filesize
230KB
MD5fa241b01eadb208c7c29da28458226e2
SHA1d3dc7d2b0ed9004d352a70da2dd21069445af4bb
SHA256876e86532ca2b4cbfa4122a9f7325a67d78a6125708699ab96366cfba4929145
SHA512baf7a274800f08a94decd5cc1434ffb0b7fb1a331febfa5612e250d85a90d3ac4312dd7831d5e517d4db0f225b063ff2c3a90829a51f137003852ca744d166cf
-
Filesize
309KB
MD508c19d0a2cdf970914248d17c6870779
SHA14055231175f258b85a16be3b88719b9b02cf8f92
SHA2564ffb881d77a3599052ee056ed1ac39bd5af5781c072d7e701bb3a04608ec75e9
SHA5125691981ab0d66fbb81f2d261a46def96dd0583819642a47207528e0529612faaae8fd6b9fc1edb191d32a8c6cbc80c3ed1c5e7108b61f32fb29a2d608b2c8957
-
Filesize
309KB
MD508c19d0a2cdf970914248d17c6870779
SHA14055231175f258b85a16be3b88719b9b02cf8f92
SHA2564ffb881d77a3599052ee056ed1ac39bd5af5781c072d7e701bb3a04608ec75e9
SHA5125691981ab0d66fbb81f2d261a46def96dd0583819642a47207528e0529612faaae8fd6b9fc1edb191d32a8c6cbc80c3ed1c5e7108b61f32fb29a2d608b2c8957
-
Filesize
176KB
MD57500977fc70b888480a0cd395e00a478
SHA1e89a701336a93e03cebcaa36b9d4b2d344217b18
SHA25621427bf4bbbe3084d940b83fe006de7b451c13931a021742f5c849d5a2899cbc
SHA51243768fbf607a471454054a677da251e583106dc7fabf55731edd39b30642de8c257f99c472b6bd4d71ff654cdfd55223776f376ac8c85228829f1d5ea060d387
-
Filesize
176KB
MD57500977fc70b888480a0cd395e00a478
SHA1e89a701336a93e03cebcaa36b9d4b2d344217b18
SHA25621427bf4bbbe3084d940b83fe006de7b451c13931a021742f5c849d5a2899cbc
SHA51243768fbf607a471454054a677da251e583106dc7fabf55731edd39b30642de8c257f99c472b6bd4d71ff654cdfd55223776f376ac8c85228829f1d5ea060d387
-
Filesize
168KB
MD5a186d79b055c481d23a53d50b3d3d54c
SHA1459eda93ac6d72cfe16674dd4ac4408dc3728faf
SHA256080930a0b7339282db1d067dfd565a5b4e7aba10c94e69674eb34c7ce804a0d1
SHA512bd6e99a7a1fe895949e5e4e91357b5f5ea02e9dd871783b0d3ee0ae1e6c444b3b81b309156e2bb60afde401b73893db7c0646d4ebd481431218bad86fb1a6ad1
-
Filesize
168KB
MD5a186d79b055c481d23a53d50b3d3d54c
SHA1459eda93ac6d72cfe16674dd4ac4408dc3728faf
SHA256080930a0b7339282db1d067dfd565a5b4e7aba10c94e69674eb34c7ce804a0d1
SHA512bd6e99a7a1fe895949e5e4e91357b5f5ea02e9dd871783b0d3ee0ae1e6c444b3b81b309156e2bb60afde401b73893db7c0646d4ebd481431218bad86fb1a6ad1
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5