Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2023 23:20
Static task
static1
Behavioral task
behavioral1
Sample
ab8d63bded5df52b21fa8da72af7c6b1e2bd467db41007f5783efa9a28a543a6.exe
Resource
win10v2004-20230221-en
General
-
Target
ab8d63bded5df52b21fa8da72af7c6b1e2bd467db41007f5783efa9a28a543a6.exe
-
Size
479KB
-
MD5
d02c89b40759c620b7c0cfa220e1eeb4
-
SHA1
6f60d321eb8ebde6a2770bf71347dd3c57702960
-
SHA256
ab8d63bded5df52b21fa8da72af7c6b1e2bd467db41007f5783efa9a28a543a6
-
SHA512
d4d0df4fef022bb5151f2ec7914431e20fa657d488ae97ce9507eee6507139616d32b7f3057f591015953a818cb299a69c179ccfe21d287c9676ae580b41d742
-
SSDEEP
12288:QMrOy90hsujYVZ/ThZ/nUmqHHApZtO3Rjc2:OyxvlZ/nFv9C
Malware Config
Extracted
redline
ditro
217.196.96.101:4132
-
auth_value
8f24ed370a9b24aa28d3d634ea57912e
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k9065250.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k9065250.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k9065250.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k9065250.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k9065250.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k9065250.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation m1462923.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 4940 y8686877.exe 1588 k9065250.exe 3948 l6290952.exe 4148 m1462923.exe 5004 oneetx.exe 4432 oneetx.exe 3148 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2488 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k9065250.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k9065250.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y8686877.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ab8d63bded5df52b21fa8da72af7c6b1e2bd467db41007f5783efa9a28a543a6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ab8d63bded5df52b21fa8da72af7c6b1e2bd467db41007f5783efa9a28a543a6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y8686877.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2124 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1588 k9065250.exe 1588 k9065250.exe 3948 l6290952.exe 3948 l6290952.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1588 k9065250.exe Token: SeDebugPrivilege 3948 l6290952.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4148 m1462923.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2364 wrote to memory of 4940 2364 ab8d63bded5df52b21fa8da72af7c6b1e2bd467db41007f5783efa9a28a543a6.exe 81 PID 2364 wrote to memory of 4940 2364 ab8d63bded5df52b21fa8da72af7c6b1e2bd467db41007f5783efa9a28a543a6.exe 81 PID 2364 wrote to memory of 4940 2364 ab8d63bded5df52b21fa8da72af7c6b1e2bd467db41007f5783efa9a28a543a6.exe 81 PID 4940 wrote to memory of 1588 4940 y8686877.exe 82 PID 4940 wrote to memory of 1588 4940 y8686877.exe 82 PID 4940 wrote to memory of 1588 4940 y8686877.exe 82 PID 4940 wrote to memory of 3948 4940 y8686877.exe 87 PID 4940 wrote to memory of 3948 4940 y8686877.exe 87 PID 4940 wrote to memory of 3948 4940 y8686877.exe 87 PID 2364 wrote to memory of 4148 2364 ab8d63bded5df52b21fa8da72af7c6b1e2bd467db41007f5783efa9a28a543a6.exe 91 PID 2364 wrote to memory of 4148 2364 ab8d63bded5df52b21fa8da72af7c6b1e2bd467db41007f5783efa9a28a543a6.exe 91 PID 2364 wrote to memory of 4148 2364 ab8d63bded5df52b21fa8da72af7c6b1e2bd467db41007f5783efa9a28a543a6.exe 91 PID 4148 wrote to memory of 5004 4148 m1462923.exe 92 PID 4148 wrote to memory of 5004 4148 m1462923.exe 92 PID 4148 wrote to memory of 5004 4148 m1462923.exe 92 PID 5004 wrote to memory of 2124 5004 oneetx.exe 93 PID 5004 wrote to memory of 2124 5004 oneetx.exe 93 PID 5004 wrote to memory of 2124 5004 oneetx.exe 93 PID 5004 wrote to memory of 1352 5004 oneetx.exe 95 PID 5004 wrote to memory of 1352 5004 oneetx.exe 95 PID 5004 wrote to memory of 1352 5004 oneetx.exe 95 PID 1352 wrote to memory of 3748 1352 cmd.exe 97 PID 1352 wrote to memory of 3748 1352 cmd.exe 97 PID 1352 wrote to memory of 3748 1352 cmd.exe 97 PID 1352 wrote to memory of 1460 1352 cmd.exe 98 PID 1352 wrote to memory of 1460 1352 cmd.exe 98 PID 1352 wrote to memory of 1460 1352 cmd.exe 98 PID 1352 wrote to memory of 4372 1352 cmd.exe 99 PID 1352 wrote to memory of 4372 1352 cmd.exe 99 PID 1352 wrote to memory of 4372 1352 cmd.exe 99 PID 1352 wrote to memory of 4244 1352 cmd.exe 100 PID 1352 wrote to memory of 4244 1352 cmd.exe 100 PID 1352 wrote to memory of 4244 1352 cmd.exe 100 PID 1352 wrote to memory of 4180 1352 cmd.exe 101 PID 1352 wrote to memory of 4180 1352 cmd.exe 101 PID 1352 wrote to memory of 4180 1352 cmd.exe 101 PID 1352 wrote to memory of 4108 1352 cmd.exe 102 PID 1352 wrote to memory of 4108 1352 cmd.exe 102 PID 1352 wrote to memory of 4108 1352 cmd.exe 102 PID 5004 wrote to memory of 2488 5004 oneetx.exe 105 PID 5004 wrote to memory of 2488 5004 oneetx.exe 105 PID 5004 wrote to memory of 2488 5004 oneetx.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab8d63bded5df52b21fa8da72af7c6b1e2bd467db41007f5783efa9a28a543a6.exe"C:\Users\Admin\AppData\Local\Temp\ab8d63bded5df52b21fa8da72af7c6b1e2bd467db41007f5783efa9a28a543a6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8686877.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8686877.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9065250.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9065250.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1588
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6290952.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6290952.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3948
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m1462923.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m1462923.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2124
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3748
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1460
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4372
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4244
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4180
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:4108
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2488
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4432
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3148
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD53d23535d1476cc5e3d041772e069a8ed
SHA16d96d36acdbe3abb7211ab1144acc6d8e326c6ac
SHA256a9049b24e1229ab643eb7a9cc08d8151e3c2b7076706f633623efa914049c90e
SHA5125246fb0ab751f4792659f7a76556b9e3277dfe275a5e1f22b23e07d41900a283bc8cbd3e0eb498e8d3f7c8a7b8fe54abdf1fe4d9cc413146ef475ac84f94c890
-
Filesize
209KB
MD53d23535d1476cc5e3d041772e069a8ed
SHA16d96d36acdbe3abb7211ab1144acc6d8e326c6ac
SHA256a9049b24e1229ab643eb7a9cc08d8151e3c2b7076706f633623efa914049c90e
SHA5125246fb0ab751f4792659f7a76556b9e3277dfe275a5e1f22b23e07d41900a283bc8cbd3e0eb498e8d3f7c8a7b8fe54abdf1fe4d9cc413146ef475ac84f94c890
-
Filesize
307KB
MD5a1bc031a8cbaff63247692ba2d89cbfc
SHA13b81cacdb6009b3bdbc515e0c0b557474ba9a669
SHA256f06311ab062dce905e12f6fa0986c6d2f3aa8ccf4808e26b7b0aa5eec14e5d88
SHA512feae08d7673b1ce3c4255d51f31688a30da7c984d9310ca8fe111e94391591aff23edb799fc1e91566b55ac7b9872d208ab1711a19d9c7935e4f9e42cefcee48
-
Filesize
307KB
MD5a1bc031a8cbaff63247692ba2d89cbfc
SHA13b81cacdb6009b3bdbc515e0c0b557474ba9a669
SHA256f06311ab062dce905e12f6fa0986c6d2f3aa8ccf4808e26b7b0aa5eec14e5d88
SHA512feae08d7673b1ce3c4255d51f31688a30da7c984d9310ca8fe111e94391591aff23edb799fc1e91566b55ac7b9872d208ab1711a19d9c7935e4f9e42cefcee48
-
Filesize
178KB
MD549a8af2ef360e7409670f6d4ca403b6e
SHA1c0fd96cff2cb02cd58110521354d85a5187fe2f9
SHA256c0e1440500597a2029d6eefde13fbdecafbccc90c28b4a982f9d98aaeedd866b
SHA512909a1181f9abc8c7db5d15a8c5d0f5a21f14e4a8ac92ef83e0db482c9bbe4d6cb3db03dc8986093487517f7a31307781db88a7404a0a47005b0a7984745ce567
-
Filesize
178KB
MD549a8af2ef360e7409670f6d4ca403b6e
SHA1c0fd96cff2cb02cd58110521354d85a5187fe2f9
SHA256c0e1440500597a2029d6eefde13fbdecafbccc90c28b4a982f9d98aaeedd866b
SHA512909a1181f9abc8c7db5d15a8c5d0f5a21f14e4a8ac92ef83e0db482c9bbe4d6cb3db03dc8986093487517f7a31307781db88a7404a0a47005b0a7984745ce567
-
Filesize
168KB
MD5b63d78191044db94376db681c83747af
SHA1ffcbcd36def8b94b6325b2f3853251eb016f7fe2
SHA2563c0105650defcdff367991a588897f674920da14d43a288c993f1e991f3f2bc5
SHA5128c4556453bd4cb1a37aab88aa6ee759bfba325a4af61d9eca2e57f932a1356c473e301f5c2dbb0218817e8198998fc3b5f6cfdd25efb12f0c69380a5d46366cc
-
Filesize
168KB
MD5b63d78191044db94376db681c83747af
SHA1ffcbcd36def8b94b6325b2f3853251eb016f7fe2
SHA2563c0105650defcdff367991a588897f674920da14d43a288c993f1e991f3f2bc5
SHA5128c4556453bd4cb1a37aab88aa6ee759bfba325a4af61d9eca2e57f932a1356c473e301f5c2dbb0218817e8198998fc3b5f6cfdd25efb12f0c69380a5d46366cc
-
Filesize
209KB
MD53d23535d1476cc5e3d041772e069a8ed
SHA16d96d36acdbe3abb7211ab1144acc6d8e326c6ac
SHA256a9049b24e1229ab643eb7a9cc08d8151e3c2b7076706f633623efa914049c90e
SHA5125246fb0ab751f4792659f7a76556b9e3277dfe275a5e1f22b23e07d41900a283bc8cbd3e0eb498e8d3f7c8a7b8fe54abdf1fe4d9cc413146ef475ac84f94c890
-
Filesize
209KB
MD53d23535d1476cc5e3d041772e069a8ed
SHA16d96d36acdbe3abb7211ab1144acc6d8e326c6ac
SHA256a9049b24e1229ab643eb7a9cc08d8151e3c2b7076706f633623efa914049c90e
SHA5125246fb0ab751f4792659f7a76556b9e3277dfe275a5e1f22b23e07d41900a283bc8cbd3e0eb498e8d3f7c8a7b8fe54abdf1fe4d9cc413146ef475ac84f94c890
-
Filesize
209KB
MD53d23535d1476cc5e3d041772e069a8ed
SHA16d96d36acdbe3abb7211ab1144acc6d8e326c6ac
SHA256a9049b24e1229ab643eb7a9cc08d8151e3c2b7076706f633623efa914049c90e
SHA5125246fb0ab751f4792659f7a76556b9e3277dfe275a5e1f22b23e07d41900a283bc8cbd3e0eb498e8d3f7c8a7b8fe54abdf1fe4d9cc413146ef475ac84f94c890
-
Filesize
209KB
MD53d23535d1476cc5e3d041772e069a8ed
SHA16d96d36acdbe3abb7211ab1144acc6d8e326c6ac
SHA256a9049b24e1229ab643eb7a9cc08d8151e3c2b7076706f633623efa914049c90e
SHA5125246fb0ab751f4792659f7a76556b9e3277dfe275a5e1f22b23e07d41900a283bc8cbd3e0eb498e8d3f7c8a7b8fe54abdf1fe4d9cc413146ef475ac84f94c890
-
Filesize
209KB
MD53d23535d1476cc5e3d041772e069a8ed
SHA16d96d36acdbe3abb7211ab1144acc6d8e326c6ac
SHA256a9049b24e1229ab643eb7a9cc08d8151e3c2b7076706f633623efa914049c90e
SHA5125246fb0ab751f4792659f7a76556b9e3277dfe275a5e1f22b23e07d41900a283bc8cbd3e0eb498e8d3f7c8a7b8fe54abdf1fe4d9cc413146ef475ac84f94c890
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5