Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 20:40
Static task
static1
Behavioral task
behavioral1
Sample
ab70633bbf0c043a0665397a165ab627053011eb40df705334061c2995317daf.exe
Resource
win10v2004-20230220-en
General
-
Target
ab70633bbf0c043a0665397a165ab627053011eb40df705334061c2995317daf.exe
-
Size
479KB
-
MD5
24a912e0ad81e51126c8efe7a5275202
-
SHA1
61b246077e929a77f3e095c98c7d52d40b4f4e76
-
SHA256
ab70633bbf0c043a0665397a165ab627053011eb40df705334061c2995317daf
-
SHA512
d5a44915806eb6362d7d8e02a72ee32d7bdf3e3936758db5224f3bb500328b520ad883d21de774f1102d8256723038ea7105b70e9e9cc9e9e9b0e076f3708ab7
-
SSDEEP
12288:OMrsy90lVGY6aEhR806TJRnlSJPoqHLs4IOo:uyAGaT0QzqY4In
Malware Config
Extracted
redline
dariy
217.196.96.101:4132
-
auth_value
2f34aa0d1cb1023a826825b68ebedcc8
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h7158366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h7158366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h7158366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h7158366.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h7158366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h7158366.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation i0405754.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 680 x6438348.exe 3872 g9150024.exe 4936 h7158366.exe 4020 i0405754.exe 1508 oneetx.exe 4600 oneetx.exe 3156 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1680 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h7158366.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h7158366.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ab70633bbf0c043a0665397a165ab627053011eb40df705334061c2995317daf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ab70633bbf0c043a0665397a165ab627053011eb40df705334061c2995317daf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x6438348.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6438348.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 464 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3872 g9150024.exe 3872 g9150024.exe 4936 h7158366.exe 4936 h7158366.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3872 g9150024.exe Token: SeDebugPrivilege 4936 h7158366.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4020 i0405754.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2400 wrote to memory of 680 2400 ab70633bbf0c043a0665397a165ab627053011eb40df705334061c2995317daf.exe 87 PID 2400 wrote to memory of 680 2400 ab70633bbf0c043a0665397a165ab627053011eb40df705334061c2995317daf.exe 87 PID 2400 wrote to memory of 680 2400 ab70633bbf0c043a0665397a165ab627053011eb40df705334061c2995317daf.exe 87 PID 680 wrote to memory of 3872 680 x6438348.exe 88 PID 680 wrote to memory of 3872 680 x6438348.exe 88 PID 680 wrote to memory of 3872 680 x6438348.exe 88 PID 680 wrote to memory of 4936 680 x6438348.exe 95 PID 680 wrote to memory of 4936 680 x6438348.exe 95 PID 680 wrote to memory of 4936 680 x6438348.exe 95 PID 2400 wrote to memory of 4020 2400 ab70633bbf0c043a0665397a165ab627053011eb40df705334061c2995317daf.exe 96 PID 2400 wrote to memory of 4020 2400 ab70633bbf0c043a0665397a165ab627053011eb40df705334061c2995317daf.exe 96 PID 2400 wrote to memory of 4020 2400 ab70633bbf0c043a0665397a165ab627053011eb40df705334061c2995317daf.exe 96 PID 4020 wrote to memory of 1508 4020 i0405754.exe 98 PID 4020 wrote to memory of 1508 4020 i0405754.exe 98 PID 4020 wrote to memory of 1508 4020 i0405754.exe 98 PID 1508 wrote to memory of 464 1508 oneetx.exe 99 PID 1508 wrote to memory of 464 1508 oneetx.exe 99 PID 1508 wrote to memory of 464 1508 oneetx.exe 99 PID 1508 wrote to memory of 2724 1508 oneetx.exe 101 PID 1508 wrote to memory of 2724 1508 oneetx.exe 101 PID 1508 wrote to memory of 2724 1508 oneetx.exe 101 PID 2724 wrote to memory of 3984 2724 cmd.exe 103 PID 2724 wrote to memory of 3984 2724 cmd.exe 103 PID 2724 wrote to memory of 3984 2724 cmd.exe 103 PID 2724 wrote to memory of 4624 2724 cmd.exe 104 PID 2724 wrote to memory of 4624 2724 cmd.exe 104 PID 2724 wrote to memory of 4624 2724 cmd.exe 104 PID 2724 wrote to memory of 3840 2724 cmd.exe 105 PID 2724 wrote to memory of 3840 2724 cmd.exe 105 PID 2724 wrote to memory of 3840 2724 cmd.exe 105 PID 2724 wrote to memory of 1628 2724 cmd.exe 106 PID 2724 wrote to memory of 1628 2724 cmd.exe 106 PID 2724 wrote to memory of 1628 2724 cmd.exe 106 PID 2724 wrote to memory of 4644 2724 cmd.exe 107 PID 2724 wrote to memory of 4644 2724 cmd.exe 107 PID 2724 wrote to memory of 4644 2724 cmd.exe 107 PID 2724 wrote to memory of 3480 2724 cmd.exe 108 PID 2724 wrote to memory of 3480 2724 cmd.exe 108 PID 2724 wrote to memory of 3480 2724 cmd.exe 108 PID 1508 wrote to memory of 1680 1508 oneetx.exe 109 PID 1508 wrote to memory of 1680 1508 oneetx.exe 109 PID 1508 wrote to memory of 1680 1508 oneetx.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab70633bbf0c043a0665397a165ab627053011eb40df705334061c2995317daf.exe"C:\Users\Admin\AppData\Local\Temp\ab70633bbf0c043a0665397a165ab627053011eb40df705334061c2995317daf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6438348.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6438348.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9150024.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9150024.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3872
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7158366.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7158366.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4936
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0405754.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0405754.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:464
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3984
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4624
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3840
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1628
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4644
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:3480
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1680
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4600
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3156
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208KB
MD54fd1c490373cac9d20cf113b8495e25a
SHA1fcc83e731f983e57039a7a7e10d77fe25bc44a34
SHA2560ed8336379e37365ffc9c4c59ae43c11f2d98ab69b2c42a9ac1f09260daabe65
SHA5127a42afb3e796c071ded4a0e4e1fad8feff84a850a530745064e35ccf3150191028da84a52886d6e4437f7137783e465ad56e10768084e7dcba5b430718ceaaf8
-
Filesize
208KB
MD54fd1c490373cac9d20cf113b8495e25a
SHA1fcc83e731f983e57039a7a7e10d77fe25bc44a34
SHA2560ed8336379e37365ffc9c4c59ae43c11f2d98ab69b2c42a9ac1f09260daabe65
SHA5127a42afb3e796c071ded4a0e4e1fad8feff84a850a530745064e35ccf3150191028da84a52886d6e4437f7137783e465ad56e10768084e7dcba5b430718ceaaf8
-
Filesize
307KB
MD5a61228a85499953cc510ed34e619cfb5
SHA12ed285594bf2d5b62dbc111efffb9f592228690b
SHA256939938224825410b5c2bf99634188376ee6f4e36eb818c501fa4c441ee829f74
SHA51255f9d02a4a13143b733bd30576e00e24069260b1830a772463b9118eb4605f9e9acf2a51b12ac8c3c8b51141f66474f5a143ad4b55061d815b999d04b7d8a84b
-
Filesize
307KB
MD5a61228a85499953cc510ed34e619cfb5
SHA12ed285594bf2d5b62dbc111efffb9f592228690b
SHA256939938224825410b5c2bf99634188376ee6f4e36eb818c501fa4c441ee829f74
SHA51255f9d02a4a13143b733bd30576e00e24069260b1830a772463b9118eb4605f9e9acf2a51b12ac8c3c8b51141f66474f5a143ad4b55061d815b999d04b7d8a84b
-
Filesize
168KB
MD55665197c94685bd5d5dc33162fbe7e38
SHA138f3428b8d7c85b212483c95b4612ad7af489ac7
SHA256b65ea6e2bdb136754700b45d949af46cd3fd789f31ba8836ac2268f6cfd2f3a9
SHA51210158c5a85b2f13c705a1a5b0adac163d741045546c9c44076a9bf948e96e7547e084493aa9fe2e5da1ba6e4c0ef5e9e601d4e581faf2aa0278506c1249feac2
-
Filesize
168KB
MD55665197c94685bd5d5dc33162fbe7e38
SHA138f3428b8d7c85b212483c95b4612ad7af489ac7
SHA256b65ea6e2bdb136754700b45d949af46cd3fd789f31ba8836ac2268f6cfd2f3a9
SHA51210158c5a85b2f13c705a1a5b0adac163d741045546c9c44076a9bf948e96e7547e084493aa9fe2e5da1ba6e4c0ef5e9e601d4e581faf2aa0278506c1249feac2
-
Filesize
176KB
MD5bdace27eda18b0f73158fa5eba0778f6
SHA1397e74fa9d1e79e160622a0e4aef6a07d8c32651
SHA256b8511ddac09e06eee80a1e64b6b8254d973b298d8005384e1f648fbc8c92fc42
SHA512655c56a6c1f7b37a6d409197ff199f9c948425bce2fb21087dc6a6be0c8a68922939dda358ffcc5e0aa855cd91afc9989febd7cb2327272bd82e9a070c020d5a
-
Filesize
176KB
MD5bdace27eda18b0f73158fa5eba0778f6
SHA1397e74fa9d1e79e160622a0e4aef6a07d8c32651
SHA256b8511ddac09e06eee80a1e64b6b8254d973b298d8005384e1f648fbc8c92fc42
SHA512655c56a6c1f7b37a6d409197ff199f9c948425bce2fb21087dc6a6be0c8a68922939dda358ffcc5e0aa855cd91afc9989febd7cb2327272bd82e9a070c020d5a
-
Filesize
208KB
MD54fd1c490373cac9d20cf113b8495e25a
SHA1fcc83e731f983e57039a7a7e10d77fe25bc44a34
SHA2560ed8336379e37365ffc9c4c59ae43c11f2d98ab69b2c42a9ac1f09260daabe65
SHA5127a42afb3e796c071ded4a0e4e1fad8feff84a850a530745064e35ccf3150191028da84a52886d6e4437f7137783e465ad56e10768084e7dcba5b430718ceaaf8
-
Filesize
208KB
MD54fd1c490373cac9d20cf113b8495e25a
SHA1fcc83e731f983e57039a7a7e10d77fe25bc44a34
SHA2560ed8336379e37365ffc9c4c59ae43c11f2d98ab69b2c42a9ac1f09260daabe65
SHA5127a42afb3e796c071ded4a0e4e1fad8feff84a850a530745064e35ccf3150191028da84a52886d6e4437f7137783e465ad56e10768084e7dcba5b430718ceaaf8
-
Filesize
208KB
MD54fd1c490373cac9d20cf113b8495e25a
SHA1fcc83e731f983e57039a7a7e10d77fe25bc44a34
SHA2560ed8336379e37365ffc9c4c59ae43c11f2d98ab69b2c42a9ac1f09260daabe65
SHA5127a42afb3e796c071ded4a0e4e1fad8feff84a850a530745064e35ccf3150191028da84a52886d6e4437f7137783e465ad56e10768084e7dcba5b430718ceaaf8
-
Filesize
208KB
MD54fd1c490373cac9d20cf113b8495e25a
SHA1fcc83e731f983e57039a7a7e10d77fe25bc44a34
SHA2560ed8336379e37365ffc9c4c59ae43c11f2d98ab69b2c42a9ac1f09260daabe65
SHA5127a42afb3e796c071ded4a0e4e1fad8feff84a850a530745064e35ccf3150191028da84a52886d6e4437f7137783e465ad56e10768084e7dcba5b430718ceaaf8
-
Filesize
208KB
MD54fd1c490373cac9d20cf113b8495e25a
SHA1fcc83e731f983e57039a7a7e10d77fe25bc44a34
SHA2560ed8336379e37365ffc9c4c59ae43c11f2d98ab69b2c42a9ac1f09260daabe65
SHA5127a42afb3e796c071ded4a0e4e1fad8feff84a850a530745064e35ccf3150191028da84a52886d6e4437f7137783e465ad56e10768084e7dcba5b430718ceaaf8
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5