Analysis
-
max time kernel
127s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2023, 23:25
Static task
static1
Behavioral task
behavioral1
Sample
561bab21f3ee176a9301906adef8bc0bb983239ff3945b9b14982f173072da72.exe
Resource
win10v2004-20230220-en
General
-
Target
561bab21f3ee176a9301906adef8bc0bb983239ff3945b9b14982f173072da72.exe
-
Size
478KB
-
MD5
d84c851ab0ef24c5e10764f876ce0a22
-
SHA1
35b355acf81c86edf0094ba5f93ae02d37c88365
-
SHA256
561bab21f3ee176a9301906adef8bc0bb983239ff3945b9b14982f173072da72
-
SHA512
54c224b4a2e639f648222e1f523948db9c36bcce394ac6f949f9cc8f328a0af7c562cde64d95ce1a9f2138793b6846036045d6c3c22d1ea4482d11a0359a3a96
-
SSDEEP
12288:YMr4y90wB9Nn5c1u311TcTKUqTEZF+rWy2Vn:wyHXTXPTXHTnc9
Malware Config
Extracted
redline
ditro
217.196.96.101:4132
-
auth_value
8f24ed370a9b24aa28d3d634ea57912e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k4319839.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k4319839.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k4319839.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k4319839.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k4319839.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k4319839.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation m3652717.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 4672 y7177040.exe 688 k4319839.exe 3188 l8453959.exe 5100 m3652717.exe 2792 oneetx.exe 4980 oneetx.exe 768 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1764 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k4319839.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k4319839.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 561bab21f3ee176a9301906adef8bc0bb983239ff3945b9b14982f173072da72.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 561bab21f3ee176a9301906adef8bc0bb983239ff3945b9b14982f173072da72.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y7177040.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y7177040.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1932 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3664 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 688 k4319839.exe 688 k4319839.exe 3188 l8453959.exe 3188 l8453959.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 688 k4319839.exe Token: SeDebugPrivilege 3188 l8453959.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5100 m3652717.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 3736 wrote to memory of 4672 3736 561bab21f3ee176a9301906adef8bc0bb983239ff3945b9b14982f173072da72.exe 84 PID 3736 wrote to memory of 4672 3736 561bab21f3ee176a9301906adef8bc0bb983239ff3945b9b14982f173072da72.exe 84 PID 3736 wrote to memory of 4672 3736 561bab21f3ee176a9301906adef8bc0bb983239ff3945b9b14982f173072da72.exe 84 PID 4672 wrote to memory of 688 4672 y7177040.exe 85 PID 4672 wrote to memory of 688 4672 y7177040.exe 85 PID 4672 wrote to memory of 688 4672 y7177040.exe 85 PID 4672 wrote to memory of 3188 4672 y7177040.exe 89 PID 4672 wrote to memory of 3188 4672 y7177040.exe 89 PID 4672 wrote to memory of 3188 4672 y7177040.exe 89 PID 3736 wrote to memory of 5100 3736 561bab21f3ee176a9301906adef8bc0bb983239ff3945b9b14982f173072da72.exe 90 PID 3736 wrote to memory of 5100 3736 561bab21f3ee176a9301906adef8bc0bb983239ff3945b9b14982f173072da72.exe 90 PID 3736 wrote to memory of 5100 3736 561bab21f3ee176a9301906adef8bc0bb983239ff3945b9b14982f173072da72.exe 90 PID 5100 wrote to memory of 2792 5100 m3652717.exe 91 PID 5100 wrote to memory of 2792 5100 m3652717.exe 91 PID 5100 wrote to memory of 2792 5100 m3652717.exe 91 PID 2792 wrote to memory of 3664 2792 oneetx.exe 92 PID 2792 wrote to memory of 3664 2792 oneetx.exe 92 PID 2792 wrote to memory of 3664 2792 oneetx.exe 92 PID 2792 wrote to memory of 4404 2792 oneetx.exe 94 PID 2792 wrote to memory of 4404 2792 oneetx.exe 94 PID 2792 wrote to memory of 4404 2792 oneetx.exe 94 PID 4404 wrote to memory of 3280 4404 cmd.exe 96 PID 4404 wrote to memory of 3280 4404 cmd.exe 96 PID 4404 wrote to memory of 3280 4404 cmd.exe 96 PID 4404 wrote to memory of 2632 4404 cmd.exe 97 PID 4404 wrote to memory of 2632 4404 cmd.exe 97 PID 4404 wrote to memory of 2632 4404 cmd.exe 97 PID 4404 wrote to memory of 3456 4404 cmd.exe 98 PID 4404 wrote to memory of 3456 4404 cmd.exe 98 PID 4404 wrote to memory of 3456 4404 cmd.exe 98 PID 4404 wrote to memory of 3368 4404 cmd.exe 99 PID 4404 wrote to memory of 3368 4404 cmd.exe 99 PID 4404 wrote to memory of 3368 4404 cmd.exe 99 PID 4404 wrote to memory of 2900 4404 cmd.exe 100 PID 4404 wrote to memory of 2900 4404 cmd.exe 100 PID 4404 wrote to memory of 2900 4404 cmd.exe 100 PID 4404 wrote to memory of 3820 4404 cmd.exe 101 PID 4404 wrote to memory of 3820 4404 cmd.exe 101 PID 4404 wrote to memory of 3820 4404 cmd.exe 101 PID 2792 wrote to memory of 1764 2792 oneetx.exe 108 PID 2792 wrote to memory of 1764 2792 oneetx.exe 108 PID 2792 wrote to memory of 1764 2792 oneetx.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\561bab21f3ee176a9301906adef8bc0bb983239ff3945b9b14982f173072da72.exe"C:\Users\Admin\AppData\Local\Temp\561bab21f3ee176a9301906adef8bc0bb983239ff3945b9b14982f173072da72.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7177040.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7177040.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k4319839.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k4319839.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:688
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l8453959.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l8453959.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3188
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m3652717.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m3652717.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3664
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3280
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:2632
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3456
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3368
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:2900
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:3820
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1764
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4980
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:768
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1932
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD5d1b04912018a64a98fd7e3eb5795a6c5
SHA1b51e76011783da8c0eb0e7bab9ec9dfa35ab6658
SHA256ccd0e01aa5e8098039386aefcd170d2cf08f51956cf19be22a1df1b1f227062b
SHA5125c927ed112e7096fd8c3f8fc1cb64a526a137865a263d3e79064eac78dc6ddf0748413f004619185db47d00c511c8c184c6f8fc85ee39448358f2445ab52003d
-
Filesize
209KB
MD5d1b04912018a64a98fd7e3eb5795a6c5
SHA1b51e76011783da8c0eb0e7bab9ec9dfa35ab6658
SHA256ccd0e01aa5e8098039386aefcd170d2cf08f51956cf19be22a1df1b1f227062b
SHA5125c927ed112e7096fd8c3f8fc1cb64a526a137865a263d3e79064eac78dc6ddf0748413f004619185db47d00c511c8c184c6f8fc85ee39448358f2445ab52003d
-
Filesize
307KB
MD578729f7a2f6d78961623e89f3c5229ef
SHA1adb4dc211ef6802b33c793129c9da6d6701f5e3e
SHA25617f5234d42bb382f01cb509881e9c81a35ca7c999e0cf70d4decbf1403f32c52
SHA51286ffd3d57c893581339785d6e164e9f42858f13cf27d8076af83824fc4d31a02e7153b4d0ed43513117630ac7bb6020c4f428937b073cb968887410a63a0b4da
-
Filesize
307KB
MD578729f7a2f6d78961623e89f3c5229ef
SHA1adb4dc211ef6802b33c793129c9da6d6701f5e3e
SHA25617f5234d42bb382f01cb509881e9c81a35ca7c999e0cf70d4decbf1403f32c52
SHA51286ffd3d57c893581339785d6e164e9f42858f13cf27d8076af83824fc4d31a02e7153b4d0ed43513117630ac7bb6020c4f428937b073cb968887410a63a0b4da
-
Filesize
178KB
MD5116705125f9e757465ed9ad500825ae6
SHA1728a0cdd3d02ef62c04b85ce6853a6110ba35077
SHA25629bcef4be9640adb871352956f09411c266a8e5b2d41567cf48a2cabf239cbd3
SHA5121f6ab4e1d24b9900fd6994fc5dade8585754a42df8d1b4e66e97be02011d61556a03a5ff86119515a185519045208f4cc8543cf9f6d998aef7ad6c42df161690
-
Filesize
178KB
MD5116705125f9e757465ed9ad500825ae6
SHA1728a0cdd3d02ef62c04b85ce6853a6110ba35077
SHA25629bcef4be9640adb871352956f09411c266a8e5b2d41567cf48a2cabf239cbd3
SHA5121f6ab4e1d24b9900fd6994fc5dade8585754a42df8d1b4e66e97be02011d61556a03a5ff86119515a185519045208f4cc8543cf9f6d998aef7ad6c42df161690
-
Filesize
168KB
MD519614f1c25b6ba09dcf2207827e5c61f
SHA18c3979387aac84a766a3436b57c57bc801727897
SHA256a2c626d4a1baa1194e4c382fa513578728610f6bb8bc7310e41a40383da99603
SHA512f061a83278f7ce8e0248a88bd3a83e214cbde253f93d25e8bdacbbafe37c1d4f598d1619d5ea0ce9a2d927c286701258ff43286784af8230f45e2ebe303b6397
-
Filesize
168KB
MD519614f1c25b6ba09dcf2207827e5c61f
SHA18c3979387aac84a766a3436b57c57bc801727897
SHA256a2c626d4a1baa1194e4c382fa513578728610f6bb8bc7310e41a40383da99603
SHA512f061a83278f7ce8e0248a88bd3a83e214cbde253f93d25e8bdacbbafe37c1d4f598d1619d5ea0ce9a2d927c286701258ff43286784af8230f45e2ebe303b6397
-
Filesize
209KB
MD5d1b04912018a64a98fd7e3eb5795a6c5
SHA1b51e76011783da8c0eb0e7bab9ec9dfa35ab6658
SHA256ccd0e01aa5e8098039386aefcd170d2cf08f51956cf19be22a1df1b1f227062b
SHA5125c927ed112e7096fd8c3f8fc1cb64a526a137865a263d3e79064eac78dc6ddf0748413f004619185db47d00c511c8c184c6f8fc85ee39448358f2445ab52003d
-
Filesize
209KB
MD5d1b04912018a64a98fd7e3eb5795a6c5
SHA1b51e76011783da8c0eb0e7bab9ec9dfa35ab6658
SHA256ccd0e01aa5e8098039386aefcd170d2cf08f51956cf19be22a1df1b1f227062b
SHA5125c927ed112e7096fd8c3f8fc1cb64a526a137865a263d3e79064eac78dc6ddf0748413f004619185db47d00c511c8c184c6f8fc85ee39448358f2445ab52003d
-
Filesize
209KB
MD5d1b04912018a64a98fd7e3eb5795a6c5
SHA1b51e76011783da8c0eb0e7bab9ec9dfa35ab6658
SHA256ccd0e01aa5e8098039386aefcd170d2cf08f51956cf19be22a1df1b1f227062b
SHA5125c927ed112e7096fd8c3f8fc1cb64a526a137865a263d3e79064eac78dc6ddf0748413f004619185db47d00c511c8c184c6f8fc85ee39448358f2445ab52003d
-
Filesize
209KB
MD5d1b04912018a64a98fd7e3eb5795a6c5
SHA1b51e76011783da8c0eb0e7bab9ec9dfa35ab6658
SHA256ccd0e01aa5e8098039386aefcd170d2cf08f51956cf19be22a1df1b1f227062b
SHA5125c927ed112e7096fd8c3f8fc1cb64a526a137865a263d3e79064eac78dc6ddf0748413f004619185db47d00c511c8c184c6f8fc85ee39448358f2445ab52003d
-
Filesize
209KB
MD5d1b04912018a64a98fd7e3eb5795a6c5
SHA1b51e76011783da8c0eb0e7bab9ec9dfa35ab6658
SHA256ccd0e01aa5e8098039386aefcd170d2cf08f51956cf19be22a1df1b1f227062b
SHA5125c927ed112e7096fd8c3f8fc1cb64a526a137865a263d3e79064eac78dc6ddf0748413f004619185db47d00c511c8c184c6f8fc85ee39448358f2445ab52003d
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5