Analysis
-
max time kernel
149s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 20:42
Static task
static1
Behavioral task
behavioral1
Sample
191dba2cf2f2d168ce09b434100e65aaa004049f4bc1b5e1251b9fb9d9218f94.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
191dba2cf2f2d168ce09b434100e65aaa004049f4bc1b5e1251b9fb9d9218f94.exe
Resource
win10v2004-20230220-en
General
-
Target
191dba2cf2f2d168ce09b434100e65aaa004049f4bc1b5e1251b9fb9d9218f94.exe
-
Size
1.1MB
-
MD5
7e390b2404ce2fbcb4f41acd87c065d2
-
SHA1
1e7a162c9db0215db81343ad72156ecb4200ab8e
-
SHA256
191dba2cf2f2d168ce09b434100e65aaa004049f4bc1b5e1251b9fb9d9218f94
-
SHA512
aaa216545c1c00af292250431575cca50db5a372b906a1de5fe2efd28bf85be6658e5ce19a70777f50e41153828db8483e6dc7236c05f5f64ade639f2786f897
-
SSDEEP
24576:7y5aK6IVQ2bRRHW2Uv2tRyoAFZC7UhPWLYEn4cvm8WnUDiFSI:uxjVNbRTtnmZC7CPWxnPCw4S
Malware Config
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4320-1050-0x00000000075D0000-0x0000000007BE8000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" u97835410.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 51343283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 51343283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" u97835410.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 51343283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" u97835410.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" u97835410.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" u97835410.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 51343283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 51343283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 51343283.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation w26PM03.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 2576 za346178.exe 2012 za947778.exe 5044 za625552.exe 3660 51343283.exe 1868 u97835410.exe 3380 w26PM03.exe 4460 oneetx.exe 4320 xmXxk31.exe 4500 oneetx.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 51343283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" u97835410.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 51343283.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 191dba2cf2f2d168ce09b434100e65aaa004049f4bc1b5e1251b9fb9d9218f94.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za346178.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" za346178.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za947778.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" za947778.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za625552.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" za625552.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 191dba2cf2f2d168ce09b434100e65aaa004049f4bc1b5e1251b9fb9d9218f94.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 648 1868 WerFault.exe 88 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3852 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3660 51343283.exe 3660 51343283.exe 1868 u97835410.exe 1868 u97835410.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3660 51343283.exe Token: SeDebugPrivilege 1868 u97835410.exe Token: SeDebugPrivilege 4320 xmXxk31.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3380 w26PM03.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 4728 wrote to memory of 2576 4728 191dba2cf2f2d168ce09b434100e65aaa004049f4bc1b5e1251b9fb9d9218f94.exe 82 PID 4728 wrote to memory of 2576 4728 191dba2cf2f2d168ce09b434100e65aaa004049f4bc1b5e1251b9fb9d9218f94.exe 82 PID 4728 wrote to memory of 2576 4728 191dba2cf2f2d168ce09b434100e65aaa004049f4bc1b5e1251b9fb9d9218f94.exe 82 PID 2576 wrote to memory of 2012 2576 za346178.exe 84 PID 2576 wrote to memory of 2012 2576 za346178.exe 84 PID 2576 wrote to memory of 2012 2576 za346178.exe 84 PID 2012 wrote to memory of 5044 2012 za947778.exe 86 PID 2012 wrote to memory of 5044 2012 za947778.exe 86 PID 2012 wrote to memory of 5044 2012 za947778.exe 86 PID 5044 wrote to memory of 3660 5044 za625552.exe 87 PID 5044 wrote to memory of 3660 5044 za625552.exe 87 PID 5044 wrote to memory of 3660 5044 za625552.exe 87 PID 5044 wrote to memory of 1868 5044 za625552.exe 88 PID 5044 wrote to memory of 1868 5044 za625552.exe 88 PID 5044 wrote to memory of 1868 5044 za625552.exe 88 PID 2012 wrote to memory of 3380 2012 za947778.exe 92 PID 2012 wrote to memory of 3380 2012 za947778.exe 92 PID 2012 wrote to memory of 3380 2012 za947778.exe 92 PID 3380 wrote to memory of 4460 3380 w26PM03.exe 93 PID 3380 wrote to memory of 4460 3380 w26PM03.exe 93 PID 3380 wrote to memory of 4460 3380 w26PM03.exe 93 PID 2576 wrote to memory of 4320 2576 za346178.exe 94 PID 2576 wrote to memory of 4320 2576 za346178.exe 94 PID 2576 wrote to memory of 4320 2576 za346178.exe 94 PID 4460 wrote to memory of 3852 4460 oneetx.exe 95 PID 4460 wrote to memory of 3852 4460 oneetx.exe 95 PID 4460 wrote to memory of 3852 4460 oneetx.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\191dba2cf2f2d168ce09b434100e65aaa004049f4bc1b5e1251b9fb9d9218f94.exe"C:\Users\Admin\AppData\Local\Temp\191dba2cf2f2d168ce09b434100e65aaa004049f4bc1b5e1251b9fb9d9218f94.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za346178.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za346178.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za947778.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za947778.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za625552.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za625552.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\51343283.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\51343283.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3660
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u97835410.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u97835410.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1868 -s 10806⤵
- Program crash
PID:648
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w26PM03.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w26PM03.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F6⤵
- Creates scheduled task(s)
PID:3852
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xmXxk31.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xmXxk31.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4320
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1868 -ip 18681⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:4500
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229KB
MD59152b845d85d678602b380b7c8ccc36d
SHA15a453647332e0bbbfd13d28336fdf90eb1f68e69
SHA256815b6bac4b35765d26c2ec7dccc97b2e4b56bc8616616a5f2fdca7e481244c43
SHA512fb965770827299d62f4c19536b611923c57201ce3b9d6915851c6118549891146a3135aebfd4f577062fc44ae8fa07e2d71c06df7268a2ad69d8a8bf7dea6f81
-
Filesize
229KB
MD59152b845d85d678602b380b7c8ccc36d
SHA15a453647332e0bbbfd13d28336fdf90eb1f68e69
SHA256815b6bac4b35765d26c2ec7dccc97b2e4b56bc8616616a5f2fdca7e481244c43
SHA512fb965770827299d62f4c19536b611923c57201ce3b9d6915851c6118549891146a3135aebfd4f577062fc44ae8fa07e2d71c06df7268a2ad69d8a8bf7dea6f81
-
Filesize
229KB
MD59152b845d85d678602b380b7c8ccc36d
SHA15a453647332e0bbbfd13d28336fdf90eb1f68e69
SHA256815b6bac4b35765d26c2ec7dccc97b2e4b56bc8616616a5f2fdca7e481244c43
SHA512fb965770827299d62f4c19536b611923c57201ce3b9d6915851c6118549891146a3135aebfd4f577062fc44ae8fa07e2d71c06df7268a2ad69d8a8bf7dea6f81
-
Filesize
229KB
MD59152b845d85d678602b380b7c8ccc36d
SHA15a453647332e0bbbfd13d28336fdf90eb1f68e69
SHA256815b6bac4b35765d26c2ec7dccc97b2e4b56bc8616616a5f2fdca7e481244c43
SHA512fb965770827299d62f4c19536b611923c57201ce3b9d6915851c6118549891146a3135aebfd4f577062fc44ae8fa07e2d71c06df7268a2ad69d8a8bf7dea6f81
-
Filesize
1005KB
MD52c33cd5fa39082cb27dfb7649f11ac31
SHA1eb87a38f3bddd20fafb91fc3a6af92f577a61a69
SHA256f74ef6c80c02594276d7d01da0faf501082824317e1acf7af6825401d1c5991d
SHA512de50ccee4403df82a178a01f99e78d8bcb944cf0c75a819d981896ee0c0555d97c456724f713550616ed1682bf859faf4283051114de09286344ebb44b094a79
-
Filesize
1005KB
MD52c33cd5fa39082cb27dfb7649f11ac31
SHA1eb87a38f3bddd20fafb91fc3a6af92f577a61a69
SHA256f74ef6c80c02594276d7d01da0faf501082824317e1acf7af6825401d1c5991d
SHA512de50ccee4403df82a178a01f99e78d8bcb944cf0c75a819d981896ee0c0555d97c456724f713550616ed1682bf859faf4283051114de09286344ebb44b094a79
-
Filesize
415KB
MD52d979ce7f194301c36bc0206f825630e
SHA1aa54d6a386fcff4cb46e23efb7e10c8d1e2c9936
SHA25669ef8b0429c67cae17261d8f47e8b24b101ccb47056609aac58f28e16cbc8af9
SHA512f766f5cba04a8ce3a29b01045120f8aaea55af384689886fb98095a1642448ddf4fdad7fbb605452501963bd9aaed434eafc8a858061257a40dd225140a370f9
-
Filesize
415KB
MD52d979ce7f194301c36bc0206f825630e
SHA1aa54d6a386fcff4cb46e23efb7e10c8d1e2c9936
SHA25669ef8b0429c67cae17261d8f47e8b24b101ccb47056609aac58f28e16cbc8af9
SHA512f766f5cba04a8ce3a29b01045120f8aaea55af384689886fb98095a1642448ddf4fdad7fbb605452501963bd9aaed434eafc8a858061257a40dd225140a370f9
-
Filesize
621KB
MD5402c13ccb2e09269a4df63a8968867de
SHA1fc32df834a4156c6ed61163f6aee6bd42278590a
SHA256b03a901826a6af7443c5c67fd97599f41b267e83a24324546a7a043893ac66b4
SHA5122bd781ac4a23efced4d99b8658365dfa6ad827e3861f9c00fddc05fcfd5634d88894b919ddf809457146805ce1875faa14b63df4f359aef6463049d7adccea96
-
Filesize
621KB
MD5402c13ccb2e09269a4df63a8968867de
SHA1fc32df834a4156c6ed61163f6aee6bd42278590a
SHA256b03a901826a6af7443c5c67fd97599f41b267e83a24324546a7a043893ac66b4
SHA5122bd781ac4a23efced4d99b8658365dfa6ad827e3861f9c00fddc05fcfd5634d88894b919ddf809457146805ce1875faa14b63df4f359aef6463049d7adccea96
-
Filesize
229KB
MD59152b845d85d678602b380b7c8ccc36d
SHA15a453647332e0bbbfd13d28336fdf90eb1f68e69
SHA256815b6bac4b35765d26c2ec7dccc97b2e4b56bc8616616a5f2fdca7e481244c43
SHA512fb965770827299d62f4c19536b611923c57201ce3b9d6915851c6118549891146a3135aebfd4f577062fc44ae8fa07e2d71c06df7268a2ad69d8a8bf7dea6f81
-
Filesize
229KB
MD59152b845d85d678602b380b7c8ccc36d
SHA15a453647332e0bbbfd13d28336fdf90eb1f68e69
SHA256815b6bac4b35765d26c2ec7dccc97b2e4b56bc8616616a5f2fdca7e481244c43
SHA512fb965770827299d62f4c19536b611923c57201ce3b9d6915851c6118549891146a3135aebfd4f577062fc44ae8fa07e2d71c06df7268a2ad69d8a8bf7dea6f81
-
Filesize
438KB
MD53645ab8df7bda6f6132e984626662328
SHA1336d8ec4f5620acb12d8a313c763d9950e1db174
SHA2567f995f68df3cbae039b8b1be25d80c058e406ce7abd881a4999c9a2c2f2dd6b4
SHA5121d508d634388379aa39fe094a3dac9a7bb276801415a0e911046af65437dfceb4c13d525b5ebd0db075472299438b6cf595844ebe4266f9f31ff89e693bb5bb6
-
Filesize
438KB
MD53645ab8df7bda6f6132e984626662328
SHA1336d8ec4f5620acb12d8a313c763d9950e1db174
SHA2567f995f68df3cbae039b8b1be25d80c058e406ce7abd881a4999c9a2c2f2dd6b4
SHA5121d508d634388379aa39fe094a3dac9a7bb276801415a0e911046af65437dfceb4c13d525b5ebd0db075472299438b6cf595844ebe4266f9f31ff89e693bb5bb6
-
Filesize
176KB
MD5c08bf79020a02645f826ef0c451e0ea9
SHA110f9563bbf352dd63f255a18f8154b7d49c6107b
SHA2565debd65cfab610307c174eadeda74f1d7fa78aa1c185a94a905caec5cc5f3a57
SHA512d9b9844a817355fd17ae11db1445a32a36f15b01c2ac4bfe3981dee02b5f095b701156ee3a002ecccfad52bd161e650559d98bdaeb20d94be33f449a1568cad1
-
Filesize
176KB
MD5c08bf79020a02645f826ef0c451e0ea9
SHA110f9563bbf352dd63f255a18f8154b7d49c6107b
SHA2565debd65cfab610307c174eadeda74f1d7fa78aa1c185a94a905caec5cc5f3a57
SHA512d9b9844a817355fd17ae11db1445a32a36f15b01c2ac4bfe3981dee02b5f095b701156ee3a002ecccfad52bd161e650559d98bdaeb20d94be33f449a1568cad1
-
Filesize
333KB
MD5f07ff4d22ee8c9cfd5240e79ac305653
SHA1967e24806bd926a9275f8cd7e60c9dd35ce916dc
SHA25681983332688391af7c538494089cedc6756106de5643f51a39748bb1a539be8d
SHA5125564a9f28e742b13f8f21e5f9c261d1a13e0658269538d095032b2f6da6cb9d06a341ae96a55291eb2943ff113125d0d0f61d63231c2744dbae2a93c6d2adbfd
-
Filesize
333KB
MD5f07ff4d22ee8c9cfd5240e79ac305653
SHA1967e24806bd926a9275f8cd7e60c9dd35ce916dc
SHA25681983332688391af7c538494089cedc6756106de5643f51a39748bb1a539be8d
SHA5125564a9f28e742b13f8f21e5f9c261d1a13e0658269538d095032b2f6da6cb9d06a341ae96a55291eb2943ff113125d0d0f61d63231c2744dbae2a93c6d2adbfd