Analysis
-
max time kernel
135s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2023, 22:16
Static task
static1
Behavioral task
behavioral1
Sample
82757f586d20ebc0bfa71231913bb9807250e9ee0013803229ce3b5aa8c1cc2a.exe
Resource
win10v2004-20230220-en
General
-
Target
82757f586d20ebc0bfa71231913bb9807250e9ee0013803229ce3b5aa8c1cc2a.exe
-
Size
479KB
-
MD5
dbc76e1a5906f5c9e80479e4c4dce64c
-
SHA1
e1f8373b30572a65e034ffc5dda8aad3559c961e
-
SHA256
82757f586d20ebc0bfa71231913bb9807250e9ee0013803229ce3b5aa8c1cc2a
-
SHA512
d27dc96eb7bb2dbb92eab252b4dbdfe8be5ec08264b2bae2beb2300120cf42c4330deb1059a7df24d5274ebe62d2857577b0c4cb959a8065868372fab27cb9d5
-
SSDEEP
6144:K7y+bnr+op0yN90QEGy3fH1w2o0n0aOkEUQJjnwDTKu21JeshfO+Xa47+TcWGI28:NMr4y90sW1wb0004eTK9UYK++Td/D
Malware Config
Extracted
redline
ditro
217.196.96.101:4132
-
auth_value
8f24ed370a9b24aa28d3d634ea57912e
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k3375886.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k3375886.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k3375886.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k3375886.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k3375886.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k3375886.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation m5895419.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 3396 y8279064.exe 1052 k3375886.exe 3640 l9939553.exe 4556 m5895419.exe 2760 oneetx.exe 1912 oneetx.exe 988 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3756 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k3375886.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k3375886.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 82757f586d20ebc0bfa71231913bb9807250e9ee0013803229ce3b5aa8c1cc2a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 82757f586d20ebc0bfa71231913bb9807250e9ee0013803229ce3b5aa8c1cc2a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y8279064.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y8279064.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 372 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1052 k3375886.exe 1052 k3375886.exe 3640 l9939553.exe 3640 l9939553.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1052 k3375886.exe Token: SeDebugPrivilege 3640 l9939553.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4556 m5895419.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4176 wrote to memory of 3396 4176 82757f586d20ebc0bfa71231913bb9807250e9ee0013803229ce3b5aa8c1cc2a.exe 84 PID 4176 wrote to memory of 3396 4176 82757f586d20ebc0bfa71231913bb9807250e9ee0013803229ce3b5aa8c1cc2a.exe 84 PID 4176 wrote to memory of 3396 4176 82757f586d20ebc0bfa71231913bb9807250e9ee0013803229ce3b5aa8c1cc2a.exe 84 PID 3396 wrote to memory of 1052 3396 y8279064.exe 85 PID 3396 wrote to memory of 1052 3396 y8279064.exe 85 PID 3396 wrote to memory of 1052 3396 y8279064.exe 85 PID 3396 wrote to memory of 3640 3396 y8279064.exe 89 PID 3396 wrote to memory of 3640 3396 y8279064.exe 89 PID 3396 wrote to memory of 3640 3396 y8279064.exe 89 PID 4176 wrote to memory of 4556 4176 82757f586d20ebc0bfa71231913bb9807250e9ee0013803229ce3b5aa8c1cc2a.exe 90 PID 4176 wrote to memory of 4556 4176 82757f586d20ebc0bfa71231913bb9807250e9ee0013803229ce3b5aa8c1cc2a.exe 90 PID 4176 wrote to memory of 4556 4176 82757f586d20ebc0bfa71231913bb9807250e9ee0013803229ce3b5aa8c1cc2a.exe 90 PID 4556 wrote to memory of 2760 4556 m5895419.exe 91 PID 4556 wrote to memory of 2760 4556 m5895419.exe 91 PID 4556 wrote to memory of 2760 4556 m5895419.exe 91 PID 2760 wrote to memory of 372 2760 oneetx.exe 92 PID 2760 wrote to memory of 372 2760 oneetx.exe 92 PID 2760 wrote to memory of 372 2760 oneetx.exe 92 PID 2760 wrote to memory of 4968 2760 oneetx.exe 94 PID 2760 wrote to memory of 4968 2760 oneetx.exe 94 PID 2760 wrote to memory of 4968 2760 oneetx.exe 94 PID 4968 wrote to memory of 452 4968 cmd.exe 96 PID 4968 wrote to memory of 452 4968 cmd.exe 96 PID 4968 wrote to memory of 452 4968 cmd.exe 96 PID 4968 wrote to memory of 2932 4968 cmd.exe 97 PID 4968 wrote to memory of 2932 4968 cmd.exe 97 PID 4968 wrote to memory of 2932 4968 cmd.exe 97 PID 4968 wrote to memory of 3940 4968 cmd.exe 98 PID 4968 wrote to memory of 3940 4968 cmd.exe 98 PID 4968 wrote to memory of 3940 4968 cmd.exe 98 PID 4968 wrote to memory of 3780 4968 cmd.exe 99 PID 4968 wrote to memory of 3780 4968 cmd.exe 99 PID 4968 wrote to memory of 3780 4968 cmd.exe 99 PID 4968 wrote to memory of 3524 4968 cmd.exe 100 PID 4968 wrote to memory of 3524 4968 cmd.exe 100 PID 4968 wrote to memory of 3524 4968 cmd.exe 100 PID 4968 wrote to memory of 2640 4968 cmd.exe 101 PID 4968 wrote to memory of 2640 4968 cmd.exe 101 PID 4968 wrote to memory of 2640 4968 cmd.exe 101 PID 2760 wrote to memory of 3756 2760 oneetx.exe 108 PID 2760 wrote to memory of 3756 2760 oneetx.exe 108 PID 2760 wrote to memory of 3756 2760 oneetx.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\82757f586d20ebc0bfa71231913bb9807250e9ee0013803229ce3b5aa8c1cc2a.exe"C:\Users\Admin\AppData\Local\Temp\82757f586d20ebc0bfa71231913bb9807250e9ee0013803229ce3b5aa8c1cc2a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8279064.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8279064.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3375886.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3375886.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9939553.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9939553.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3640
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m5895419.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m5895419.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:372
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:452
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:2932
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3940
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3780
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:3524
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:2640
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3756
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1912
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:988
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD5fd5c15e1426c756f0cc6c3ad7319fe80
SHA190f4a3c7973e2257fe14026fcd968e396d864ad9
SHA25686169cad5beaac68defb68a824211e4f0a602fea88c353920acebe87083c6645
SHA512796cfab6a157585a06a8186d21062665d4882a187428c031ae274bdafec16763f92086f13ecc6b8fcacca99b66e8e6c175d658417214f5b45405ad2a42e150af
-
Filesize
209KB
MD5fd5c15e1426c756f0cc6c3ad7319fe80
SHA190f4a3c7973e2257fe14026fcd968e396d864ad9
SHA25686169cad5beaac68defb68a824211e4f0a602fea88c353920acebe87083c6645
SHA512796cfab6a157585a06a8186d21062665d4882a187428c031ae274bdafec16763f92086f13ecc6b8fcacca99b66e8e6c175d658417214f5b45405ad2a42e150af
-
Filesize
307KB
MD5a7d08de923e2a29bb847b8a571817a38
SHA1b2a7ad47ca98450c20fe56b94ad60bff8dbc708d
SHA2560838a72e903151fcc6d8faee5b274c09cc7c17635b5d08ea04c08efca7488281
SHA5122f1168cdeb61aa915737c59d219c0f0d2d2c2462cae6bad22fbb8147a2e73b5cde0a767026783788e7af48bdf0bba340a4829f9cb60f328bdf46b0dcf568c437
-
Filesize
307KB
MD5a7d08de923e2a29bb847b8a571817a38
SHA1b2a7ad47ca98450c20fe56b94ad60bff8dbc708d
SHA2560838a72e903151fcc6d8faee5b274c09cc7c17635b5d08ea04c08efca7488281
SHA5122f1168cdeb61aa915737c59d219c0f0d2d2c2462cae6bad22fbb8147a2e73b5cde0a767026783788e7af48bdf0bba340a4829f9cb60f328bdf46b0dcf568c437
-
Filesize
178KB
MD5325f9486b70a51442bf6c3c28002b0ca
SHA152cc71da98f45baa8efcd6bdd7883ce86ce61512
SHA25647111a219bade4e38f5df6b3bd8b60681d25e2d54f3b112f18e86a9bde8a972d
SHA512b57f54de9895fe60379130c17a4bda454fd6abf2a31c133f2bb3b6e615d91bd95a3abcfde37fede9ba29a6313f083b4bf6cd8e154e0aa34d30007eb13a49c664
-
Filesize
178KB
MD5325f9486b70a51442bf6c3c28002b0ca
SHA152cc71da98f45baa8efcd6bdd7883ce86ce61512
SHA25647111a219bade4e38f5df6b3bd8b60681d25e2d54f3b112f18e86a9bde8a972d
SHA512b57f54de9895fe60379130c17a4bda454fd6abf2a31c133f2bb3b6e615d91bd95a3abcfde37fede9ba29a6313f083b4bf6cd8e154e0aa34d30007eb13a49c664
-
Filesize
168KB
MD59cbbdef63ba554721a5136a3f2ef2093
SHA1df216e0b10d00133582f3c8455a97cd7375ca53b
SHA256108a0176086f411b3e2fcd17bc9084cd09cabd71395b50921d3845397144d2a1
SHA5125c26bad9a07f7e33c36f9bbb97345c5c6c4f886a0f14f27d564a83563ecf7d357a7c71a5805a9ada15a072a9f24d66255709c401db1daeac8bbb04b7b79606e3
-
Filesize
168KB
MD59cbbdef63ba554721a5136a3f2ef2093
SHA1df216e0b10d00133582f3c8455a97cd7375ca53b
SHA256108a0176086f411b3e2fcd17bc9084cd09cabd71395b50921d3845397144d2a1
SHA5125c26bad9a07f7e33c36f9bbb97345c5c6c4f886a0f14f27d564a83563ecf7d357a7c71a5805a9ada15a072a9f24d66255709c401db1daeac8bbb04b7b79606e3
-
Filesize
209KB
MD5fd5c15e1426c756f0cc6c3ad7319fe80
SHA190f4a3c7973e2257fe14026fcd968e396d864ad9
SHA25686169cad5beaac68defb68a824211e4f0a602fea88c353920acebe87083c6645
SHA512796cfab6a157585a06a8186d21062665d4882a187428c031ae274bdafec16763f92086f13ecc6b8fcacca99b66e8e6c175d658417214f5b45405ad2a42e150af
-
Filesize
209KB
MD5fd5c15e1426c756f0cc6c3ad7319fe80
SHA190f4a3c7973e2257fe14026fcd968e396d864ad9
SHA25686169cad5beaac68defb68a824211e4f0a602fea88c353920acebe87083c6645
SHA512796cfab6a157585a06a8186d21062665d4882a187428c031ae274bdafec16763f92086f13ecc6b8fcacca99b66e8e6c175d658417214f5b45405ad2a42e150af
-
Filesize
209KB
MD5fd5c15e1426c756f0cc6c3ad7319fe80
SHA190f4a3c7973e2257fe14026fcd968e396d864ad9
SHA25686169cad5beaac68defb68a824211e4f0a602fea88c353920acebe87083c6645
SHA512796cfab6a157585a06a8186d21062665d4882a187428c031ae274bdafec16763f92086f13ecc6b8fcacca99b66e8e6c175d658417214f5b45405ad2a42e150af
-
Filesize
209KB
MD5fd5c15e1426c756f0cc6c3ad7319fe80
SHA190f4a3c7973e2257fe14026fcd968e396d864ad9
SHA25686169cad5beaac68defb68a824211e4f0a602fea88c353920acebe87083c6645
SHA512796cfab6a157585a06a8186d21062665d4882a187428c031ae274bdafec16763f92086f13ecc6b8fcacca99b66e8e6c175d658417214f5b45405ad2a42e150af
-
Filesize
209KB
MD5fd5c15e1426c756f0cc6c3ad7319fe80
SHA190f4a3c7973e2257fe14026fcd968e396d864ad9
SHA25686169cad5beaac68defb68a824211e4f0a602fea88c353920acebe87083c6645
SHA512796cfab6a157585a06a8186d21062665d4882a187428c031ae274bdafec16763f92086f13ecc6b8fcacca99b66e8e6c175d658417214f5b45405ad2a42e150af
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5