Analysis
-
max time kernel
116s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
06/05/2023, 14:51
Static task
static1
Behavioral task
behavioral1
Sample
abefd9014aa30843b180c84db652d9fc229d41703b580e5fb0dd6c0a35abb2e7.exe
Resource
win10-20230220-en
General
-
Target
abefd9014aa30843b180c84db652d9fc229d41703b580e5fb0dd6c0a35abb2e7.exe
-
Size
479KB
-
MD5
debd2e71354563bb0efd113fc439c51f
-
SHA1
3e1bace9df783acb2ba417483d343a032d67256b
-
SHA256
abefd9014aa30843b180c84db652d9fc229d41703b580e5fb0dd6c0a35abb2e7
-
SHA512
528d69e9c75079a385894e5141b32dc5b34d200ad4dd0850839dc92b0542917c783fe3e124a3e798fe37717b48cd15a94fd473e5f75fde82eefdbc1804219a2d
-
SSDEEP
12288:rMrMy90drZVqZb+BXZpbKxKxUJIMi7gX:ny6ZKUZpexKoYy
Malware Config
Extracted
redline
dariy
217.196.96.101:4132
-
auth_value
2f34aa0d1cb1023a826825b68ebedcc8
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h8705250.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h8705250.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h8705250.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h8705250.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h8705250.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 1716 x4736937.exe 1436 g3775664.exe 4840 h8705250.exe 1532 i3760711.exe 4908 oneetx.exe 4848 oneetx.exe 1012 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 5112 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h8705250.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h8705250.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce abefd9014aa30843b180c84db652d9fc229d41703b580e5fb0dd6c0a35abb2e7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" abefd9014aa30843b180c84db652d9fc229d41703b580e5fb0dd6c0a35abb2e7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x4736937.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x4736937.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2176 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1436 g3775664.exe 1436 g3775664.exe 4840 h8705250.exe 4840 h8705250.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1436 g3775664.exe Token: SeDebugPrivilege 4840 h8705250.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1532 i3760711.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4220 wrote to memory of 1716 4220 abefd9014aa30843b180c84db652d9fc229d41703b580e5fb0dd6c0a35abb2e7.exe 67 PID 4220 wrote to memory of 1716 4220 abefd9014aa30843b180c84db652d9fc229d41703b580e5fb0dd6c0a35abb2e7.exe 67 PID 4220 wrote to memory of 1716 4220 abefd9014aa30843b180c84db652d9fc229d41703b580e5fb0dd6c0a35abb2e7.exe 67 PID 1716 wrote to memory of 1436 1716 x4736937.exe 68 PID 1716 wrote to memory of 1436 1716 x4736937.exe 68 PID 1716 wrote to memory of 1436 1716 x4736937.exe 68 PID 1716 wrote to memory of 4840 1716 x4736937.exe 70 PID 1716 wrote to memory of 4840 1716 x4736937.exe 70 PID 1716 wrote to memory of 4840 1716 x4736937.exe 70 PID 4220 wrote to memory of 1532 4220 abefd9014aa30843b180c84db652d9fc229d41703b580e5fb0dd6c0a35abb2e7.exe 71 PID 4220 wrote to memory of 1532 4220 abefd9014aa30843b180c84db652d9fc229d41703b580e5fb0dd6c0a35abb2e7.exe 71 PID 4220 wrote to memory of 1532 4220 abefd9014aa30843b180c84db652d9fc229d41703b580e5fb0dd6c0a35abb2e7.exe 71 PID 1532 wrote to memory of 4908 1532 i3760711.exe 72 PID 1532 wrote to memory of 4908 1532 i3760711.exe 72 PID 1532 wrote to memory of 4908 1532 i3760711.exe 72 PID 4908 wrote to memory of 2176 4908 oneetx.exe 73 PID 4908 wrote to memory of 2176 4908 oneetx.exe 73 PID 4908 wrote to memory of 2176 4908 oneetx.exe 73 PID 4908 wrote to memory of 4624 4908 oneetx.exe 75 PID 4908 wrote to memory of 4624 4908 oneetx.exe 75 PID 4908 wrote to memory of 4624 4908 oneetx.exe 75 PID 4624 wrote to memory of 4520 4624 cmd.exe 77 PID 4624 wrote to memory of 4520 4624 cmd.exe 77 PID 4624 wrote to memory of 4520 4624 cmd.exe 77 PID 4624 wrote to memory of 3976 4624 cmd.exe 78 PID 4624 wrote to memory of 3976 4624 cmd.exe 78 PID 4624 wrote to memory of 3976 4624 cmd.exe 78 PID 4624 wrote to memory of 4512 4624 cmd.exe 79 PID 4624 wrote to memory of 4512 4624 cmd.exe 79 PID 4624 wrote to memory of 4512 4624 cmd.exe 79 PID 4624 wrote to memory of 4528 4624 cmd.exe 80 PID 4624 wrote to memory of 4528 4624 cmd.exe 80 PID 4624 wrote to memory of 4528 4624 cmd.exe 80 PID 4624 wrote to memory of 4532 4624 cmd.exe 81 PID 4624 wrote to memory of 4532 4624 cmd.exe 81 PID 4624 wrote to memory of 4532 4624 cmd.exe 81 PID 4624 wrote to memory of 4880 4624 cmd.exe 82 PID 4624 wrote to memory of 4880 4624 cmd.exe 82 PID 4624 wrote to memory of 4880 4624 cmd.exe 82 PID 4908 wrote to memory of 5112 4908 oneetx.exe 84 PID 4908 wrote to memory of 5112 4908 oneetx.exe 84 PID 4908 wrote to memory of 5112 4908 oneetx.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\abefd9014aa30843b180c84db652d9fc229d41703b580e5fb0dd6c0a35abb2e7.exe"C:\Users\Admin\AppData\Local\Temp\abefd9014aa30843b180c84db652d9fc229d41703b580e5fb0dd6c0a35abb2e7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4736937.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4736937.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g3775664.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g3775664.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1436
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8705250.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8705250.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4840
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i3760711.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i3760711.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2176
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4520
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:3976
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4512
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4528
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4532
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:4880
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:5112
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4848
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1012
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
207KB
MD5f66f18839c7b22115e4c57db000f6abe
SHA163eb7c1264f717caa431708f58a84c284ee6cde1
SHA2561395e6f08104d2f28c776ffca13e5e44fa6fbb9ad2b212caa9b7f26e99eba046
SHA5126e91c26442053727c2aea603b9994f9d3e85b6e6ec172ed44ca15b9d2252edc6d89c681563f385ff72060d8b3045e07eae0905f3de19f5ab65c247696f6338d2
-
Filesize
207KB
MD5f66f18839c7b22115e4c57db000f6abe
SHA163eb7c1264f717caa431708f58a84c284ee6cde1
SHA2561395e6f08104d2f28c776ffca13e5e44fa6fbb9ad2b212caa9b7f26e99eba046
SHA5126e91c26442053727c2aea603b9994f9d3e85b6e6ec172ed44ca15b9d2252edc6d89c681563f385ff72060d8b3045e07eae0905f3de19f5ab65c247696f6338d2
-
Filesize
307KB
MD5221cf080d8626617839082253d43c0be
SHA1b7a48636a6be45bedb1a170d26dde16398f250d4
SHA25661283be6924fee084859429eaa172761992f46f3a68d4dcd6b8d21a9c2f40b74
SHA512a150b5d083399c22cab3e157869d8bb303784e9c9bc205971b8f26118e964f51cd75e5ef2061edd4d7ae9ed751afcb2da1abee0d6804398c78b8e4f6d4d10401
-
Filesize
307KB
MD5221cf080d8626617839082253d43c0be
SHA1b7a48636a6be45bedb1a170d26dde16398f250d4
SHA25661283be6924fee084859429eaa172761992f46f3a68d4dcd6b8d21a9c2f40b74
SHA512a150b5d083399c22cab3e157869d8bb303784e9c9bc205971b8f26118e964f51cd75e5ef2061edd4d7ae9ed751afcb2da1abee0d6804398c78b8e4f6d4d10401
-
Filesize
168KB
MD5c38a26ae8f9339646c73b6656cfd3653
SHA17d9ce52f0a4639cae922c9e517f79b7402beaf01
SHA256c9ea37094b5e566a971349b8f08f745438b4c939edba7980d13d0884809e3fde
SHA512204a3fa29a6d46877085287a8b3c950db4c7d69c03c5eff047c59e8596bc7fe2574cbee6d9e355965ba49bddff2a22fde3610d16c943985431ae616a2155d465
-
Filesize
168KB
MD5c38a26ae8f9339646c73b6656cfd3653
SHA17d9ce52f0a4639cae922c9e517f79b7402beaf01
SHA256c9ea37094b5e566a971349b8f08f745438b4c939edba7980d13d0884809e3fde
SHA512204a3fa29a6d46877085287a8b3c950db4c7d69c03c5eff047c59e8596bc7fe2574cbee6d9e355965ba49bddff2a22fde3610d16c943985431ae616a2155d465
-
Filesize
176KB
MD5940fe7244a0855e24940d73fcd08b6e7
SHA1b7bca164ad2b89efb514c39ded36abf238db2009
SHA2565af317b65e291563fe8a3eaadeb415991d8e72210d35cdef3634969d6c6a72a0
SHA5125c9b8d3e155eeb454e5070da9b7fd463f96db0810eb7e2026f64876a4f4b701b5f104e83c8059d4538db27f9d88194aa1a7a53b47645082c7a43409c98cf72f2
-
Filesize
176KB
MD5940fe7244a0855e24940d73fcd08b6e7
SHA1b7bca164ad2b89efb514c39ded36abf238db2009
SHA2565af317b65e291563fe8a3eaadeb415991d8e72210d35cdef3634969d6c6a72a0
SHA5125c9b8d3e155eeb454e5070da9b7fd463f96db0810eb7e2026f64876a4f4b701b5f104e83c8059d4538db27f9d88194aa1a7a53b47645082c7a43409c98cf72f2
-
Filesize
207KB
MD5f66f18839c7b22115e4c57db000f6abe
SHA163eb7c1264f717caa431708f58a84c284ee6cde1
SHA2561395e6f08104d2f28c776ffca13e5e44fa6fbb9ad2b212caa9b7f26e99eba046
SHA5126e91c26442053727c2aea603b9994f9d3e85b6e6ec172ed44ca15b9d2252edc6d89c681563f385ff72060d8b3045e07eae0905f3de19f5ab65c247696f6338d2
-
Filesize
207KB
MD5f66f18839c7b22115e4c57db000f6abe
SHA163eb7c1264f717caa431708f58a84c284ee6cde1
SHA2561395e6f08104d2f28c776ffca13e5e44fa6fbb9ad2b212caa9b7f26e99eba046
SHA5126e91c26442053727c2aea603b9994f9d3e85b6e6ec172ed44ca15b9d2252edc6d89c681563f385ff72060d8b3045e07eae0905f3de19f5ab65c247696f6338d2
-
Filesize
207KB
MD5f66f18839c7b22115e4c57db000f6abe
SHA163eb7c1264f717caa431708f58a84c284ee6cde1
SHA2561395e6f08104d2f28c776ffca13e5e44fa6fbb9ad2b212caa9b7f26e99eba046
SHA5126e91c26442053727c2aea603b9994f9d3e85b6e6ec172ed44ca15b9d2252edc6d89c681563f385ff72060d8b3045e07eae0905f3de19f5ab65c247696f6338d2
-
Filesize
207KB
MD5f66f18839c7b22115e4c57db000f6abe
SHA163eb7c1264f717caa431708f58a84c284ee6cde1
SHA2561395e6f08104d2f28c776ffca13e5e44fa6fbb9ad2b212caa9b7f26e99eba046
SHA5126e91c26442053727c2aea603b9994f9d3e85b6e6ec172ed44ca15b9d2252edc6d89c681563f385ff72060d8b3045e07eae0905f3de19f5ab65c247696f6338d2
-
Filesize
207KB
MD5f66f18839c7b22115e4c57db000f6abe
SHA163eb7c1264f717caa431708f58a84c284ee6cde1
SHA2561395e6f08104d2f28c776ffca13e5e44fa6fbb9ad2b212caa9b7f26e99eba046
SHA5126e91c26442053727c2aea603b9994f9d3e85b6e6ec172ed44ca15b9d2252edc6d89c681563f385ff72060d8b3045e07eae0905f3de19f5ab65c247696f6338d2
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53