Analysis
-
max time kernel
135s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 19:56
Static task
static1
Behavioral task
behavioral1
Sample
d382a5b2d5d8204c6d533b71f9499b38.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d382a5b2d5d8204c6d533b71f9499b38.exe
Resource
win10v2004-20230220-en
General
-
Target
d382a5b2d5d8204c6d533b71f9499b38.exe
-
Size
479KB
-
MD5
d382a5b2d5d8204c6d533b71f9499b38
-
SHA1
b3e8e2c2dc479102e95ffa9fdb35da83c268b1a8
-
SHA256
11581748c5ef29c021f7c7310ed13ea6b835b15daa069134f37f62899e8c1ecf
-
SHA512
f94b4ea0004b27ef6d270afb2318be0d53aebead8c8fb111e4735b76bb8d814fa51f40e77def60d1e3a8141bf2159ba5258c26a5f6cdbd40fc36e1415ee87d0a
-
SSDEEP
12288:rMrVy9012quKKmDOU+6EjPKPFl1tQ5G9Ye4mK58KMAbSP:ayVK96StleG9zg87WY
Malware Config
Extracted
redline
dariy
217.196.96.101:4132
-
auth_value
2f34aa0d1cb1023a826825b68ebedcc8
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h1947578.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h1947578.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h1947578.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h1947578.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h1947578.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h1947578.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation i9749757.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 2084 x8491233.exe 532 g5396301.exe 4620 h1947578.exe 4864 i9749757.exe 2760 oneetx.exe 4840 oneetx.exe 856 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2168 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h1947578.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h1947578.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x8491233.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d382a5b2d5d8204c6d533b71f9499b38.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d382a5b2d5d8204c6d533b71f9499b38.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x8491233.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3052 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 532 g5396301.exe 532 g5396301.exe 4620 h1947578.exe 4620 h1947578.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 532 g5396301.exe Token: SeDebugPrivilege 4620 h1947578.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4864 i9749757.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4784 wrote to memory of 2084 4784 d382a5b2d5d8204c6d533b71f9499b38.exe 84 PID 4784 wrote to memory of 2084 4784 d382a5b2d5d8204c6d533b71f9499b38.exe 84 PID 4784 wrote to memory of 2084 4784 d382a5b2d5d8204c6d533b71f9499b38.exe 84 PID 2084 wrote to memory of 532 2084 x8491233.exe 85 PID 2084 wrote to memory of 532 2084 x8491233.exe 85 PID 2084 wrote to memory of 532 2084 x8491233.exe 85 PID 2084 wrote to memory of 4620 2084 x8491233.exe 92 PID 2084 wrote to memory of 4620 2084 x8491233.exe 92 PID 2084 wrote to memory of 4620 2084 x8491233.exe 92 PID 4784 wrote to memory of 4864 4784 d382a5b2d5d8204c6d533b71f9499b38.exe 93 PID 4784 wrote to memory of 4864 4784 d382a5b2d5d8204c6d533b71f9499b38.exe 93 PID 4784 wrote to memory of 4864 4784 d382a5b2d5d8204c6d533b71f9499b38.exe 93 PID 4864 wrote to memory of 2760 4864 i9749757.exe 94 PID 4864 wrote to memory of 2760 4864 i9749757.exe 94 PID 4864 wrote to memory of 2760 4864 i9749757.exe 94 PID 2760 wrote to memory of 3052 2760 oneetx.exe 95 PID 2760 wrote to memory of 3052 2760 oneetx.exe 95 PID 2760 wrote to memory of 3052 2760 oneetx.exe 95 PID 2760 wrote to memory of 5000 2760 oneetx.exe 97 PID 2760 wrote to memory of 5000 2760 oneetx.exe 97 PID 2760 wrote to memory of 5000 2760 oneetx.exe 97 PID 5000 wrote to memory of 1692 5000 cmd.exe 99 PID 5000 wrote to memory of 1692 5000 cmd.exe 99 PID 5000 wrote to memory of 1692 5000 cmd.exe 99 PID 5000 wrote to memory of 4368 5000 cmd.exe 100 PID 5000 wrote to memory of 4368 5000 cmd.exe 100 PID 5000 wrote to memory of 4368 5000 cmd.exe 100 PID 5000 wrote to memory of 4308 5000 cmd.exe 101 PID 5000 wrote to memory of 4308 5000 cmd.exe 101 PID 5000 wrote to memory of 4308 5000 cmd.exe 101 PID 5000 wrote to memory of 3252 5000 cmd.exe 102 PID 5000 wrote to memory of 3252 5000 cmd.exe 102 PID 5000 wrote to memory of 3252 5000 cmd.exe 102 PID 5000 wrote to memory of 3744 5000 cmd.exe 103 PID 5000 wrote to memory of 3744 5000 cmd.exe 103 PID 5000 wrote to memory of 3744 5000 cmd.exe 103 PID 5000 wrote to memory of 2624 5000 cmd.exe 104 PID 5000 wrote to memory of 2624 5000 cmd.exe 104 PID 5000 wrote to memory of 2624 5000 cmd.exe 104 PID 2760 wrote to memory of 2168 2760 oneetx.exe 107 PID 2760 wrote to memory of 2168 2760 oneetx.exe 107 PID 2760 wrote to memory of 2168 2760 oneetx.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\d382a5b2d5d8204c6d533b71f9499b38.exe"C:\Users\Admin\AppData\Local\Temp\d382a5b2d5d8204c6d533b71f9499b38.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8491233.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8491233.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g5396301.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g5396301.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:532
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1947578.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1947578.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9749757.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9749757.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3052
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1692
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4368
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4308
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3252
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:3744
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:2624
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2168
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4840
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:856
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208KB
MD50420697fd6d3c81a29746cc28e6425aa
SHA1d2b3024535e830ce09e27e173d5fc46cb95e96a3
SHA2560cfd065cec2891a6cdbe978cb930c1a7be3352731baede87255fdece79888985
SHA512d70ef2ce982ad25d8663e32d11f2db168f082846bec2a23ee8321c850a17e89a3ed9cd2d660a2df3a41063f6d58a38abe12e0766880df14ff354d66609434f53
-
Filesize
208KB
MD50420697fd6d3c81a29746cc28e6425aa
SHA1d2b3024535e830ce09e27e173d5fc46cb95e96a3
SHA2560cfd065cec2891a6cdbe978cb930c1a7be3352731baede87255fdece79888985
SHA512d70ef2ce982ad25d8663e32d11f2db168f082846bec2a23ee8321c850a17e89a3ed9cd2d660a2df3a41063f6d58a38abe12e0766880df14ff354d66609434f53
-
Filesize
307KB
MD5dff610772b9b334d08b54cde0868b587
SHA1b01de22ceba923dab9921a161a3798fc4fb0d624
SHA2568f886d72565f6dd71d859797b9d1624302a49419f09b31e10afb5cc723c23dd7
SHA5128d2cfd1bdc48b6edcb3b5315541a1ff2dd531bfe29b25e0cab4890fef3031b1bdd63a697d5607b6daf0c6894296689afd4a0f2067510b13a87fc3d3cd8077697
-
Filesize
307KB
MD5dff610772b9b334d08b54cde0868b587
SHA1b01de22ceba923dab9921a161a3798fc4fb0d624
SHA2568f886d72565f6dd71d859797b9d1624302a49419f09b31e10afb5cc723c23dd7
SHA5128d2cfd1bdc48b6edcb3b5315541a1ff2dd531bfe29b25e0cab4890fef3031b1bdd63a697d5607b6daf0c6894296689afd4a0f2067510b13a87fc3d3cd8077697
-
Filesize
168KB
MD5b551e1fcf16e7db19f2de36f5d2966a1
SHA115be2af45822a7774d955cf9846afc8aaa08778c
SHA25678945a064bd3d1aa364c0d1ea95c55a0ba03bb800df500730ef3a2f28f97a858
SHA512c939d29518176530911adac41ea15f791db479122691ab15236673c869ac44728e8d799b639db47590948af329b8c9401ec97cc8205db57e5d020093feb9c620
-
Filesize
168KB
MD5b551e1fcf16e7db19f2de36f5d2966a1
SHA115be2af45822a7774d955cf9846afc8aaa08778c
SHA25678945a064bd3d1aa364c0d1ea95c55a0ba03bb800df500730ef3a2f28f97a858
SHA512c939d29518176530911adac41ea15f791db479122691ab15236673c869ac44728e8d799b639db47590948af329b8c9401ec97cc8205db57e5d020093feb9c620
-
Filesize
176KB
MD5ecc53e291e0d53ea0b8b0e17bb0ecff5
SHA1d3aba1beb9d0e78789a8b768d401463594197064
SHA25636c70019846612604160a4c9d2f90f907f040a75316de3dcb27c44248994f402
SHA5120d5b551acae7821758ec8a666562b7f08e8de87eb9534028c49e1fcebe19fed5b9d47d85a6024404bcc56cd4c13921d528288cc7a2b8d1a611579038cb0109b9
-
Filesize
176KB
MD5ecc53e291e0d53ea0b8b0e17bb0ecff5
SHA1d3aba1beb9d0e78789a8b768d401463594197064
SHA25636c70019846612604160a4c9d2f90f907f040a75316de3dcb27c44248994f402
SHA5120d5b551acae7821758ec8a666562b7f08e8de87eb9534028c49e1fcebe19fed5b9d47d85a6024404bcc56cd4c13921d528288cc7a2b8d1a611579038cb0109b9
-
Filesize
208KB
MD50420697fd6d3c81a29746cc28e6425aa
SHA1d2b3024535e830ce09e27e173d5fc46cb95e96a3
SHA2560cfd065cec2891a6cdbe978cb930c1a7be3352731baede87255fdece79888985
SHA512d70ef2ce982ad25d8663e32d11f2db168f082846bec2a23ee8321c850a17e89a3ed9cd2d660a2df3a41063f6d58a38abe12e0766880df14ff354d66609434f53
-
Filesize
208KB
MD50420697fd6d3c81a29746cc28e6425aa
SHA1d2b3024535e830ce09e27e173d5fc46cb95e96a3
SHA2560cfd065cec2891a6cdbe978cb930c1a7be3352731baede87255fdece79888985
SHA512d70ef2ce982ad25d8663e32d11f2db168f082846bec2a23ee8321c850a17e89a3ed9cd2d660a2df3a41063f6d58a38abe12e0766880df14ff354d66609434f53
-
Filesize
208KB
MD50420697fd6d3c81a29746cc28e6425aa
SHA1d2b3024535e830ce09e27e173d5fc46cb95e96a3
SHA2560cfd065cec2891a6cdbe978cb930c1a7be3352731baede87255fdece79888985
SHA512d70ef2ce982ad25d8663e32d11f2db168f082846bec2a23ee8321c850a17e89a3ed9cd2d660a2df3a41063f6d58a38abe12e0766880df14ff354d66609434f53
-
Filesize
208KB
MD50420697fd6d3c81a29746cc28e6425aa
SHA1d2b3024535e830ce09e27e173d5fc46cb95e96a3
SHA2560cfd065cec2891a6cdbe978cb930c1a7be3352731baede87255fdece79888985
SHA512d70ef2ce982ad25d8663e32d11f2db168f082846bec2a23ee8321c850a17e89a3ed9cd2d660a2df3a41063f6d58a38abe12e0766880df14ff354d66609434f53
-
Filesize
208KB
MD50420697fd6d3c81a29746cc28e6425aa
SHA1d2b3024535e830ce09e27e173d5fc46cb95e96a3
SHA2560cfd065cec2891a6cdbe978cb930c1a7be3352731baede87255fdece79888985
SHA512d70ef2ce982ad25d8663e32d11f2db168f082846bec2a23ee8321c850a17e89a3ed9cd2d660a2df3a41063f6d58a38abe12e0766880df14ff354d66609434f53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5