Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 20:36
Static task
static1
Behavioral task
behavioral1
Sample
13e6c0df9ee6b9e5e713cd8d7e7011ab5e441e31bc0814f3d704c74bbc810118.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
13e6c0df9ee6b9e5e713cd8d7e7011ab5e441e31bc0814f3d704c74bbc810118.exe
Resource
win10v2004-20230220-en
General
-
Target
13e6c0df9ee6b9e5e713cd8d7e7011ab5e441e31bc0814f3d704c74bbc810118.exe
-
Size
479KB
-
MD5
cffcf260254da4f1380dea1804312b73
-
SHA1
33b9be2b7bbb876a4fb52807e9b0d2d1d5041cdb
-
SHA256
13e6c0df9ee6b9e5e713cd8d7e7011ab5e441e31bc0814f3d704c74bbc810118
-
SHA512
57900e47f4f6bb90bc31edcc2ff6d10ce8ddd219c979de63ce1efe84440bf83d89c49d8434437a151006d433c2cb338d664ca8230a3dfd4d6026dafc16674b0b
-
SSDEEP
12288:3Mrvy90hMS92c7D3FRy9miMszRU1Q5USLg:IyEMaVRG5U10US8
Malware Config
Extracted
redline
maxud
217.196.96.101:4132
-
auth_value
f1403d964c52b6641ba1ef14803e6e74
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/2672-186-0x000000000A650000-0x000000000AC68000-memory.dmp redline_stealer behavioral2/memory/2672-194-0x000000000A4F0000-0x000000000A556000-memory.dmp redline_stealer behavioral2/memory/2672-196-0x000000000BC10000-0x000000000BDD2000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a9952226.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a9952226.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a9952226.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a9952226.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a9952226.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a9952226.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation d8251489.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 2496 v3682443.exe 1760 a9952226.exe 2672 b7338405.exe 1860 d8251489.exe 2060 oneetx.exe 1016 oneetx.exe 3304 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4216 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a9952226.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a9952226.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3682443.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3682443.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 13e6c0df9ee6b9e5e713cd8d7e7011ab5e441e31bc0814f3d704c74bbc810118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 13e6c0df9ee6b9e5e713cd8d7e7011ab5e441e31bc0814f3d704c74bbc810118.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3548 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1760 a9952226.exe 1760 a9952226.exe 2672 b7338405.exe 2672 b7338405.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1760 a9952226.exe Token: SeDebugPrivilege 2672 b7338405.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1860 d8251489.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2496 1640 13e6c0df9ee6b9e5e713cd8d7e7011ab5e441e31bc0814f3d704c74bbc810118.exe 83 PID 1640 wrote to memory of 2496 1640 13e6c0df9ee6b9e5e713cd8d7e7011ab5e441e31bc0814f3d704c74bbc810118.exe 83 PID 1640 wrote to memory of 2496 1640 13e6c0df9ee6b9e5e713cd8d7e7011ab5e441e31bc0814f3d704c74bbc810118.exe 83 PID 2496 wrote to memory of 1760 2496 v3682443.exe 84 PID 2496 wrote to memory of 1760 2496 v3682443.exe 84 PID 2496 wrote to memory of 1760 2496 v3682443.exe 84 PID 2496 wrote to memory of 2672 2496 v3682443.exe 85 PID 2496 wrote to memory of 2672 2496 v3682443.exe 85 PID 2496 wrote to memory of 2672 2496 v3682443.exe 85 PID 1640 wrote to memory of 1860 1640 13e6c0df9ee6b9e5e713cd8d7e7011ab5e441e31bc0814f3d704c74bbc810118.exe 87 PID 1640 wrote to memory of 1860 1640 13e6c0df9ee6b9e5e713cd8d7e7011ab5e441e31bc0814f3d704c74bbc810118.exe 87 PID 1640 wrote to memory of 1860 1640 13e6c0df9ee6b9e5e713cd8d7e7011ab5e441e31bc0814f3d704c74bbc810118.exe 87 PID 1860 wrote to memory of 2060 1860 d8251489.exe 88 PID 1860 wrote to memory of 2060 1860 d8251489.exe 88 PID 1860 wrote to memory of 2060 1860 d8251489.exe 88 PID 2060 wrote to memory of 3548 2060 oneetx.exe 89 PID 2060 wrote to memory of 3548 2060 oneetx.exe 89 PID 2060 wrote to memory of 3548 2060 oneetx.exe 89 PID 2060 wrote to memory of 1172 2060 oneetx.exe 91 PID 2060 wrote to memory of 1172 2060 oneetx.exe 91 PID 2060 wrote to memory of 1172 2060 oneetx.exe 91 PID 1172 wrote to memory of 3276 1172 cmd.exe 93 PID 1172 wrote to memory of 3276 1172 cmd.exe 93 PID 1172 wrote to memory of 3276 1172 cmd.exe 93 PID 1172 wrote to memory of 2152 1172 cmd.exe 94 PID 1172 wrote to memory of 2152 1172 cmd.exe 94 PID 1172 wrote to memory of 2152 1172 cmd.exe 94 PID 1172 wrote to memory of 936 1172 cmd.exe 95 PID 1172 wrote to memory of 936 1172 cmd.exe 95 PID 1172 wrote to memory of 936 1172 cmd.exe 95 PID 1172 wrote to memory of 3488 1172 cmd.exe 96 PID 1172 wrote to memory of 3488 1172 cmd.exe 96 PID 1172 wrote to memory of 3488 1172 cmd.exe 96 PID 1172 wrote to memory of 3956 1172 cmd.exe 97 PID 1172 wrote to memory of 3956 1172 cmd.exe 97 PID 1172 wrote to memory of 3956 1172 cmd.exe 97 PID 1172 wrote to memory of 648 1172 cmd.exe 98 PID 1172 wrote to memory of 648 1172 cmd.exe 98 PID 1172 wrote to memory of 648 1172 cmd.exe 98 PID 2060 wrote to memory of 4216 2060 oneetx.exe 100 PID 2060 wrote to memory of 4216 2060 oneetx.exe 100 PID 2060 wrote to memory of 4216 2060 oneetx.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\13e6c0df9ee6b9e5e713cd8d7e7011ab5e441e31bc0814f3d704c74bbc810118.exe"C:\Users\Admin\AppData\Local\Temp\13e6c0df9ee6b9e5e713cd8d7e7011ab5e441e31bc0814f3d704c74bbc810118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3682443.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3682443.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a9952226.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a9952226.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1760
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b7338405.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b7338405.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8251489.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8251489.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3548
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3276
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:2152
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:936
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3488
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:3956
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:648
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4216
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1016
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3304
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208KB
MD553f1923bfd323b5f696432daa39420b9
SHA1bd87fc7b048d46fbec9263ebb4f0636d7f076f05
SHA256b2db1885da54c34eb77f921dcc76f4d8a833ab92aef652e5c7672f117857b280
SHA512170a8dd09e315108bd8dcb26de513c2f480835011a8212134c9b6480ae086ff36d48cd2e0e79885aded5a08a78e6a5f8e8cba53a623cf8a9bce938fbbe989db3
-
Filesize
208KB
MD553f1923bfd323b5f696432daa39420b9
SHA1bd87fc7b048d46fbec9263ebb4f0636d7f076f05
SHA256b2db1885da54c34eb77f921dcc76f4d8a833ab92aef652e5c7672f117857b280
SHA512170a8dd09e315108bd8dcb26de513c2f480835011a8212134c9b6480ae086ff36d48cd2e0e79885aded5a08a78e6a5f8e8cba53a623cf8a9bce938fbbe989db3
-
Filesize
307KB
MD5c084b872116bcfb80cf24f8201e2e7af
SHA1f1a7e58e92f4aa0030c590d858117409a881d98a
SHA25647f8cf7784d1f10c7ee1d6fbdbef8485179e1faf31734d1886b18ab05e65d45c
SHA5128615451c339d648d4d9bb323b00212d61887df60d0a15cc175ce93de47c954fe434314dbfa8daf2890a759eb29a50a87031559916598fa5ea966200e688d697f
-
Filesize
307KB
MD5c084b872116bcfb80cf24f8201e2e7af
SHA1f1a7e58e92f4aa0030c590d858117409a881d98a
SHA25647f8cf7784d1f10c7ee1d6fbdbef8485179e1faf31734d1886b18ab05e65d45c
SHA5128615451c339d648d4d9bb323b00212d61887df60d0a15cc175ce93de47c954fe434314dbfa8daf2890a759eb29a50a87031559916598fa5ea966200e688d697f
-
Filesize
176KB
MD5072d29c836cffdce7d8ef737984f91e0
SHA11f9f02d34bc1eec60afd8af5f0203e91edc0a568
SHA25673e922281ec125efbcc528e55e19283aea47e5928345ddaddb1e880e2a8d0fbb
SHA5126a5074e3559bbe4bde8c821c570296b286930b58096f2b177d083162ed97d1dbc6f8f18cc5d93bbc879818b88d42313627dde90fa1c7bcfad540a26c4efe3cdd
-
Filesize
176KB
MD5072d29c836cffdce7d8ef737984f91e0
SHA11f9f02d34bc1eec60afd8af5f0203e91edc0a568
SHA25673e922281ec125efbcc528e55e19283aea47e5928345ddaddb1e880e2a8d0fbb
SHA5126a5074e3559bbe4bde8c821c570296b286930b58096f2b177d083162ed97d1dbc6f8f18cc5d93bbc879818b88d42313627dde90fa1c7bcfad540a26c4efe3cdd
-
Filesize
168KB
MD5793b345d54f15bc2c7b0cd89716c50aa
SHA187f38c2f432a3cf6c4193d8e5bc4faf4798fd549
SHA256ec60f7d87e4c31bfeef71d5fa6c1f128e9715ec8584d2a4bc30029c509e8895d
SHA5128f8e685dea094894d219872434427342b9f55e4bd38bb871de867fc7023a06c3ba302665cbcbd1506e05ac8b52a40aded3ce2e4a023f298a9cd8593c2733b59f
-
Filesize
168KB
MD5793b345d54f15bc2c7b0cd89716c50aa
SHA187f38c2f432a3cf6c4193d8e5bc4faf4798fd549
SHA256ec60f7d87e4c31bfeef71d5fa6c1f128e9715ec8584d2a4bc30029c509e8895d
SHA5128f8e685dea094894d219872434427342b9f55e4bd38bb871de867fc7023a06c3ba302665cbcbd1506e05ac8b52a40aded3ce2e4a023f298a9cd8593c2733b59f
-
Filesize
208KB
MD553f1923bfd323b5f696432daa39420b9
SHA1bd87fc7b048d46fbec9263ebb4f0636d7f076f05
SHA256b2db1885da54c34eb77f921dcc76f4d8a833ab92aef652e5c7672f117857b280
SHA512170a8dd09e315108bd8dcb26de513c2f480835011a8212134c9b6480ae086ff36d48cd2e0e79885aded5a08a78e6a5f8e8cba53a623cf8a9bce938fbbe989db3
-
Filesize
208KB
MD553f1923bfd323b5f696432daa39420b9
SHA1bd87fc7b048d46fbec9263ebb4f0636d7f076f05
SHA256b2db1885da54c34eb77f921dcc76f4d8a833ab92aef652e5c7672f117857b280
SHA512170a8dd09e315108bd8dcb26de513c2f480835011a8212134c9b6480ae086ff36d48cd2e0e79885aded5a08a78e6a5f8e8cba53a623cf8a9bce938fbbe989db3
-
Filesize
208KB
MD553f1923bfd323b5f696432daa39420b9
SHA1bd87fc7b048d46fbec9263ebb4f0636d7f076f05
SHA256b2db1885da54c34eb77f921dcc76f4d8a833ab92aef652e5c7672f117857b280
SHA512170a8dd09e315108bd8dcb26de513c2f480835011a8212134c9b6480ae086ff36d48cd2e0e79885aded5a08a78e6a5f8e8cba53a623cf8a9bce938fbbe989db3
-
Filesize
208KB
MD553f1923bfd323b5f696432daa39420b9
SHA1bd87fc7b048d46fbec9263ebb4f0636d7f076f05
SHA256b2db1885da54c34eb77f921dcc76f4d8a833ab92aef652e5c7672f117857b280
SHA512170a8dd09e315108bd8dcb26de513c2f480835011a8212134c9b6480ae086ff36d48cd2e0e79885aded5a08a78e6a5f8e8cba53a623cf8a9bce938fbbe989db3
-
Filesize
208KB
MD553f1923bfd323b5f696432daa39420b9
SHA1bd87fc7b048d46fbec9263ebb4f0636d7f076f05
SHA256b2db1885da54c34eb77f921dcc76f4d8a833ab92aef652e5c7672f117857b280
SHA512170a8dd09e315108bd8dcb26de513c2f480835011a8212134c9b6480ae086ff36d48cd2e0e79885aded5a08a78e6a5f8e8cba53a623cf8a9bce938fbbe989db3
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5