Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 16:32
Static task
static1
Behavioral task
behavioral1
Sample
d79fb9ca2f24d3bdc38255f0f15f9d70f7bb4b326aa6603ba9855e743d1c55f9.exe
Resource
win10v2004-20230220-en
General
-
Target
d79fb9ca2f24d3bdc38255f0f15f9d70f7bb4b326aa6603ba9855e743d1c55f9.exe
-
Size
479KB
-
MD5
bf7f1f181993274bd0d02e9188e998f0
-
SHA1
54cb3f55dc06e8e92eaeabc4f9dc8d7a0bf25406
-
SHA256
d79fb9ca2f24d3bdc38255f0f15f9d70f7bb4b326aa6603ba9855e743d1c55f9
-
SHA512
5a67a97e1ce0a5626e073699b059f40b3cbe19ad2605e3b48cd4eb8cabd16fa97dd4911d39a0abc826a52a7f04ecc721264a0d3a2282fe38e22bdb74fba72050
-
SSDEEP
12288:dMrwy90eccIh0tsqYhexb+Qq9tJOk+sDdU5+:py9NYIR+Qqf+jw
Malware Config
Extracted
redline
dariy
217.196.96.101:4132
-
auth_value
2f34aa0d1cb1023a826825b68ebedcc8
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h2472009.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h2472009.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h2472009.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h2472009.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h2472009.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h2472009.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation i5939445.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 4780 x9462747.exe 4776 g2475681.exe 808 h2472009.exe 4704 i5939445.exe 3460 oneetx.exe 1356 oneetx.exe 2672 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2128 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h2472009.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h2472009.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x9462747.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d79fb9ca2f24d3bdc38255f0f15f9d70f7bb4b326aa6603ba9855e743d1c55f9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d79fb9ca2f24d3bdc38255f0f15f9d70f7bb4b326aa6603ba9855e743d1c55f9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x9462747.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1020 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4776 g2475681.exe 4776 g2475681.exe 808 h2472009.exe 808 h2472009.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4776 g2475681.exe Token: SeDebugPrivilege 808 h2472009.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4704 i5939445.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2428 wrote to memory of 4780 2428 d79fb9ca2f24d3bdc38255f0f15f9d70f7bb4b326aa6603ba9855e743d1c55f9.exe 84 PID 2428 wrote to memory of 4780 2428 d79fb9ca2f24d3bdc38255f0f15f9d70f7bb4b326aa6603ba9855e743d1c55f9.exe 84 PID 2428 wrote to memory of 4780 2428 d79fb9ca2f24d3bdc38255f0f15f9d70f7bb4b326aa6603ba9855e743d1c55f9.exe 84 PID 4780 wrote to memory of 4776 4780 x9462747.exe 85 PID 4780 wrote to memory of 4776 4780 x9462747.exe 85 PID 4780 wrote to memory of 4776 4780 x9462747.exe 85 PID 4780 wrote to memory of 808 4780 x9462747.exe 92 PID 4780 wrote to memory of 808 4780 x9462747.exe 92 PID 4780 wrote to memory of 808 4780 x9462747.exe 92 PID 2428 wrote to memory of 4704 2428 d79fb9ca2f24d3bdc38255f0f15f9d70f7bb4b326aa6603ba9855e743d1c55f9.exe 93 PID 2428 wrote to memory of 4704 2428 d79fb9ca2f24d3bdc38255f0f15f9d70f7bb4b326aa6603ba9855e743d1c55f9.exe 93 PID 2428 wrote to memory of 4704 2428 d79fb9ca2f24d3bdc38255f0f15f9d70f7bb4b326aa6603ba9855e743d1c55f9.exe 93 PID 4704 wrote to memory of 3460 4704 i5939445.exe 94 PID 4704 wrote to memory of 3460 4704 i5939445.exe 94 PID 4704 wrote to memory of 3460 4704 i5939445.exe 94 PID 3460 wrote to memory of 1020 3460 oneetx.exe 95 PID 3460 wrote to memory of 1020 3460 oneetx.exe 95 PID 3460 wrote to memory of 1020 3460 oneetx.exe 95 PID 3460 wrote to memory of 4856 3460 oneetx.exe 97 PID 3460 wrote to memory of 4856 3460 oneetx.exe 97 PID 3460 wrote to memory of 4856 3460 oneetx.exe 97 PID 4856 wrote to memory of 3860 4856 cmd.exe 99 PID 4856 wrote to memory of 3860 4856 cmd.exe 99 PID 4856 wrote to memory of 3860 4856 cmd.exe 99 PID 4856 wrote to memory of 1464 4856 cmd.exe 101 PID 4856 wrote to memory of 1464 4856 cmd.exe 101 PID 4856 wrote to memory of 1464 4856 cmd.exe 101 PID 4856 wrote to memory of 3768 4856 cmd.exe 102 PID 4856 wrote to memory of 3768 4856 cmd.exe 102 PID 4856 wrote to memory of 3768 4856 cmd.exe 102 PID 4856 wrote to memory of 2240 4856 cmd.exe 103 PID 4856 wrote to memory of 2240 4856 cmd.exe 103 PID 4856 wrote to memory of 2240 4856 cmd.exe 103 PID 4856 wrote to memory of 1820 4856 cmd.exe 104 PID 4856 wrote to memory of 1820 4856 cmd.exe 104 PID 4856 wrote to memory of 1820 4856 cmd.exe 104 PID 4856 wrote to memory of 2572 4856 cmd.exe 105 PID 4856 wrote to memory of 2572 4856 cmd.exe 105 PID 4856 wrote to memory of 2572 4856 cmd.exe 105 PID 3460 wrote to memory of 2128 3460 oneetx.exe 107 PID 3460 wrote to memory of 2128 3460 oneetx.exe 107 PID 3460 wrote to memory of 2128 3460 oneetx.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\d79fb9ca2f24d3bdc38255f0f15f9d70f7bb4b326aa6603ba9855e743d1c55f9.exe"C:\Users\Admin\AppData\Local\Temp\d79fb9ca2f24d3bdc38255f0f15f9d70f7bb4b326aa6603ba9855e743d1c55f9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9462747.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9462747.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g2475681.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g2475681.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4776
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h2472009.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h2472009.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:808
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5939445.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5939445.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1020
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3860
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1464
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3768
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2240
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:1820
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:2572
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2128
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1356
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2672
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208KB
MD538af61a68108df219c4f5db28a1525f5
SHA194a0b07db20ba5a8b772e013465574ddc82732ff
SHA256e28a74f9d19b6f05eebe94d235dc7115dbf230f3a964a2c62f91994b6294b60e
SHA5129d740c31c080f5b24978cbd33bc683dd7c9a857fa20c2dc505b785c8dd9add979ad298520d062c88837dff4584ee8f99c5df14ae1ceff0974a0a600e9a638c1f
-
Filesize
208KB
MD538af61a68108df219c4f5db28a1525f5
SHA194a0b07db20ba5a8b772e013465574ddc82732ff
SHA256e28a74f9d19b6f05eebe94d235dc7115dbf230f3a964a2c62f91994b6294b60e
SHA5129d740c31c080f5b24978cbd33bc683dd7c9a857fa20c2dc505b785c8dd9add979ad298520d062c88837dff4584ee8f99c5df14ae1ceff0974a0a600e9a638c1f
-
Filesize
307KB
MD583ea81b4a6a493454f34bba3613bc323
SHA1c808fbd253f18f0edce25256d8d544358bad7e22
SHA2560fc91b8b8a41b6345304892fbbfdbc606346420381f54eb56dc3243a247f9bd3
SHA5129613af21b787ef9a8908fc7d17273cbedbd977cb33ddc412dc0d400c9313adf758a8412175f0210c741ab64b9aa482d5c90511818536aed2b702bfa3775a6e52
-
Filesize
307KB
MD583ea81b4a6a493454f34bba3613bc323
SHA1c808fbd253f18f0edce25256d8d544358bad7e22
SHA2560fc91b8b8a41b6345304892fbbfdbc606346420381f54eb56dc3243a247f9bd3
SHA5129613af21b787ef9a8908fc7d17273cbedbd977cb33ddc412dc0d400c9313adf758a8412175f0210c741ab64b9aa482d5c90511818536aed2b702bfa3775a6e52
-
Filesize
168KB
MD5e8d0ea8ba04bcf95ddf4f283aa9762de
SHA13c6a17978e4aa99c68e5ded29ec2f78f04754542
SHA256664b8871b13017a40f5e4884739291673da514f7e75c4bdb5284c9652b632296
SHA51267713ecb8af031b927a4f16dc530a457f72693379f54a8c2c5295525b91e7c9f0a54fda16613f2a8e8822d557893d3917a07666b465fb7e4515edac368b5be1f
-
Filesize
168KB
MD5e8d0ea8ba04bcf95ddf4f283aa9762de
SHA13c6a17978e4aa99c68e5ded29ec2f78f04754542
SHA256664b8871b13017a40f5e4884739291673da514f7e75c4bdb5284c9652b632296
SHA51267713ecb8af031b927a4f16dc530a457f72693379f54a8c2c5295525b91e7c9f0a54fda16613f2a8e8822d557893d3917a07666b465fb7e4515edac368b5be1f
-
Filesize
176KB
MD536a6da476cea9b97244d246d71df3dbf
SHA188c2338035a88a226408bc95c44d07795ce9478b
SHA256ab2f98017901ae92e1fdb0f4f1ca099919f5c9f93ecac285c9f0b28418c5936b
SHA512428ddbd6a6bd6f1b84542be93c4133f2083371a3e60074ff719ab65f89af0db8de30fbe8f9e868f7eaf2a297b8e1f2de1e0d2a96dd8fc133e7a7a7354353a8da
-
Filesize
176KB
MD536a6da476cea9b97244d246d71df3dbf
SHA188c2338035a88a226408bc95c44d07795ce9478b
SHA256ab2f98017901ae92e1fdb0f4f1ca099919f5c9f93ecac285c9f0b28418c5936b
SHA512428ddbd6a6bd6f1b84542be93c4133f2083371a3e60074ff719ab65f89af0db8de30fbe8f9e868f7eaf2a297b8e1f2de1e0d2a96dd8fc133e7a7a7354353a8da
-
Filesize
208KB
MD538af61a68108df219c4f5db28a1525f5
SHA194a0b07db20ba5a8b772e013465574ddc82732ff
SHA256e28a74f9d19b6f05eebe94d235dc7115dbf230f3a964a2c62f91994b6294b60e
SHA5129d740c31c080f5b24978cbd33bc683dd7c9a857fa20c2dc505b785c8dd9add979ad298520d062c88837dff4584ee8f99c5df14ae1ceff0974a0a600e9a638c1f
-
Filesize
208KB
MD538af61a68108df219c4f5db28a1525f5
SHA194a0b07db20ba5a8b772e013465574ddc82732ff
SHA256e28a74f9d19b6f05eebe94d235dc7115dbf230f3a964a2c62f91994b6294b60e
SHA5129d740c31c080f5b24978cbd33bc683dd7c9a857fa20c2dc505b785c8dd9add979ad298520d062c88837dff4584ee8f99c5df14ae1ceff0974a0a600e9a638c1f
-
Filesize
208KB
MD538af61a68108df219c4f5db28a1525f5
SHA194a0b07db20ba5a8b772e013465574ddc82732ff
SHA256e28a74f9d19b6f05eebe94d235dc7115dbf230f3a964a2c62f91994b6294b60e
SHA5129d740c31c080f5b24978cbd33bc683dd7c9a857fa20c2dc505b785c8dd9add979ad298520d062c88837dff4584ee8f99c5df14ae1ceff0974a0a600e9a638c1f
-
Filesize
208KB
MD538af61a68108df219c4f5db28a1525f5
SHA194a0b07db20ba5a8b772e013465574ddc82732ff
SHA256e28a74f9d19b6f05eebe94d235dc7115dbf230f3a964a2c62f91994b6294b60e
SHA5129d740c31c080f5b24978cbd33bc683dd7c9a857fa20c2dc505b785c8dd9add979ad298520d062c88837dff4584ee8f99c5df14ae1ceff0974a0a600e9a638c1f
-
Filesize
208KB
MD538af61a68108df219c4f5db28a1525f5
SHA194a0b07db20ba5a8b772e013465574ddc82732ff
SHA256e28a74f9d19b6f05eebe94d235dc7115dbf230f3a964a2c62f91994b6294b60e
SHA5129d740c31c080f5b24978cbd33bc683dd7c9a857fa20c2dc505b785c8dd9add979ad298520d062c88837dff4584ee8f99c5df14ae1ceff0974a0a600e9a638c1f
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5