Analysis
-
max time kernel
177s -
max time network
201s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2023 09:28
Static task
static1
Behavioral task
behavioral1
Sample
b783c47e3a116b5fd7a3f2a33067b547165a56b6dd18d2d51c0f9a97d7f929f1.exe
Resource
win10v2004-20230220-en
General
-
Target
b783c47e3a116b5fd7a3f2a33067b547165a56b6dd18d2d51c0f9a97d7f929f1.exe
-
Size
489KB
-
MD5
53b89290164ad961ce0355992c2f3d51
-
SHA1
0172b20cd0786579ad6b34e857deb757fafafe80
-
SHA256
b783c47e3a116b5fd7a3f2a33067b547165a56b6dd18d2d51c0f9a97d7f929f1
-
SHA512
1326b612177e95713133172916ece2ee69be5627ba86ec637972de725ba1c9c2ced99d4f7bbda0fc9398dcb71a17e2ec58d595f03253c9463c11064d96ef5255
-
SSDEEP
12288:qMrgy909bvFr78FuN5c1u31wTbCacWPgelQxb1l5sZAUvk:myqhPTX+TOeYRl5kc
Malware Config
Extracted
redline
lada
217.196.96.101:4132
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Signatures
-
Processes:
o0284482.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o0284482.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o0284482.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o0284482.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o0284482.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o0284482.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o0284482.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
s0318964.exeoneetx.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation s0318964.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 5 IoCs
Processes:
z7299060.exeo0284482.exer3945691.exes0318964.exeoneetx.exepid process 4372 z7299060.exe 740 o0284482.exe 4012 r3945691.exe 820 s0318964.exe 4420 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
o0284482.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o0284482.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o0284482.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
z7299060.exeb783c47e3a116b5fd7a3f2a33067b547165a56b6dd18d2d51c0f9a97d7f929f1.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z7299060.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z7299060.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b783c47e3a116b5fd7a3f2a33067b547165a56b6dd18d2d51c0f9a97d7f929f1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b783c47e3a116b5fd7a3f2a33067b547165a56b6dd18d2d51c0f9a97d7f929f1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
o0284482.exer3945691.exepid process 740 o0284482.exe 740 o0284482.exe 4012 r3945691.exe 4012 r3945691.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
o0284482.exer3945691.exedescription pid process Token: SeDebugPrivilege 740 o0284482.exe Token: SeDebugPrivilege 4012 r3945691.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
s0318964.exepid process 820 s0318964.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
b783c47e3a116b5fd7a3f2a33067b547165a56b6dd18d2d51c0f9a97d7f929f1.exez7299060.exes0318964.exeoneetx.exedescription pid process target process PID 1456 wrote to memory of 4372 1456 b783c47e3a116b5fd7a3f2a33067b547165a56b6dd18d2d51c0f9a97d7f929f1.exe z7299060.exe PID 1456 wrote to memory of 4372 1456 b783c47e3a116b5fd7a3f2a33067b547165a56b6dd18d2d51c0f9a97d7f929f1.exe z7299060.exe PID 1456 wrote to memory of 4372 1456 b783c47e3a116b5fd7a3f2a33067b547165a56b6dd18d2d51c0f9a97d7f929f1.exe z7299060.exe PID 4372 wrote to memory of 740 4372 z7299060.exe o0284482.exe PID 4372 wrote to memory of 740 4372 z7299060.exe o0284482.exe PID 4372 wrote to memory of 740 4372 z7299060.exe o0284482.exe PID 4372 wrote to memory of 4012 4372 z7299060.exe r3945691.exe PID 4372 wrote to memory of 4012 4372 z7299060.exe r3945691.exe PID 4372 wrote to memory of 4012 4372 z7299060.exe r3945691.exe PID 1456 wrote to memory of 820 1456 b783c47e3a116b5fd7a3f2a33067b547165a56b6dd18d2d51c0f9a97d7f929f1.exe s0318964.exe PID 1456 wrote to memory of 820 1456 b783c47e3a116b5fd7a3f2a33067b547165a56b6dd18d2d51c0f9a97d7f929f1.exe s0318964.exe PID 1456 wrote to memory of 820 1456 b783c47e3a116b5fd7a3f2a33067b547165a56b6dd18d2d51c0f9a97d7f929f1.exe s0318964.exe PID 820 wrote to memory of 4420 820 s0318964.exe oneetx.exe PID 820 wrote to memory of 4420 820 s0318964.exe oneetx.exe PID 820 wrote to memory of 4420 820 s0318964.exe oneetx.exe PID 4420 wrote to memory of 2716 4420 oneetx.exe schtasks.exe PID 4420 wrote to memory of 2716 4420 oneetx.exe schtasks.exe PID 4420 wrote to memory of 2716 4420 oneetx.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b783c47e3a116b5fd7a3f2a33067b547165a56b6dd18d2d51c0f9a97d7f929f1.exe"C:\Users\Admin\AppData\Local\Temp\b783c47e3a116b5fd7a3f2a33067b547165a56b6dd18d2d51c0f9a97d7f929f1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7299060.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7299060.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o0284482.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o0284482.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r3945691.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r3945691.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0318964.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0318964.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F4⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeFilesize
231KB
MD50f95718c5f137ab54432897893409803
SHA1bf59e36c5ebf730a4186f8c460adf0e4faaaf6c9
SHA256530c7665106c9a3951c12ca5fec2b78c51a9266cd4bd4962bf90c4a38c269b00
SHA51251989d9deffa98f581a9eb32b22cd94041ad73a3f8be48e090c06a0daff1216cf7d535efb6acb1544443b34230a6816e831cfe680db645dd290b6b1dd27b2f02
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeFilesize
231KB
MD50f95718c5f137ab54432897893409803
SHA1bf59e36c5ebf730a4186f8c460adf0e4faaaf6c9
SHA256530c7665106c9a3951c12ca5fec2b78c51a9266cd4bd4962bf90c4a38c269b00
SHA51251989d9deffa98f581a9eb32b22cd94041ad73a3f8be48e090c06a0daff1216cf7d535efb6acb1544443b34230a6816e831cfe680db645dd290b6b1dd27b2f02
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeFilesize
231KB
MD50f95718c5f137ab54432897893409803
SHA1bf59e36c5ebf730a4186f8c460adf0e4faaaf6c9
SHA256530c7665106c9a3951c12ca5fec2b78c51a9266cd4bd4962bf90c4a38c269b00
SHA51251989d9deffa98f581a9eb32b22cd94041ad73a3f8be48e090c06a0daff1216cf7d535efb6acb1544443b34230a6816e831cfe680db645dd290b6b1dd27b2f02
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0318964.exeFilesize
231KB
MD50f95718c5f137ab54432897893409803
SHA1bf59e36c5ebf730a4186f8c460adf0e4faaaf6c9
SHA256530c7665106c9a3951c12ca5fec2b78c51a9266cd4bd4962bf90c4a38c269b00
SHA51251989d9deffa98f581a9eb32b22cd94041ad73a3f8be48e090c06a0daff1216cf7d535efb6acb1544443b34230a6816e831cfe680db645dd290b6b1dd27b2f02
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s0318964.exeFilesize
231KB
MD50f95718c5f137ab54432897893409803
SHA1bf59e36c5ebf730a4186f8c460adf0e4faaaf6c9
SHA256530c7665106c9a3951c12ca5fec2b78c51a9266cd4bd4962bf90c4a38c269b00
SHA51251989d9deffa98f581a9eb32b22cd94041ad73a3f8be48e090c06a0daff1216cf7d535efb6acb1544443b34230a6816e831cfe680db645dd290b6b1dd27b2f02
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7299060.exeFilesize
307KB
MD5d9c8cff741e3be2ff7bd49253da61a7f
SHA1990e45017d5ed174cf1298ea8c7de60413c7e8a6
SHA25634845e6f702ecf2952f9b74a922c2e01144ba6df725632e0ba098565b657cf34
SHA512a812736a6c9325571e3c049bf007e550c0d777b565b5b5f33326b3e8347af1a70a45745f29d561cbe58fee13dbadc35a1aa61ffdb562c9098c20a59ee557bd93
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z7299060.exeFilesize
307KB
MD5d9c8cff741e3be2ff7bd49253da61a7f
SHA1990e45017d5ed174cf1298ea8c7de60413c7e8a6
SHA25634845e6f702ecf2952f9b74a922c2e01144ba6df725632e0ba098565b657cf34
SHA512a812736a6c9325571e3c049bf007e550c0d777b565b5b5f33326b3e8347af1a70a45745f29d561cbe58fee13dbadc35a1aa61ffdb562c9098c20a59ee557bd93
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o0284482.exeFilesize
177KB
MD521e64f8d9cd0f64fa3392230f09d8cf1
SHA10b837d9cde278d9852b9d8d350d3ff933aa78230
SHA2561f216426a69fbe4a10dd2fdb78f26df0e986b85f3a6d54306d3eade64aab2291
SHA5125c04fdc3fa6dbb121419790a5c7c6484e0ed3711123aae61703e748ee1374951e8018152927b9dc43c17bfbf54d9e7eeeb2ec270a40295cf6e20a16bb56cb54e
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o0284482.exeFilesize
177KB
MD521e64f8d9cd0f64fa3392230f09d8cf1
SHA10b837d9cde278d9852b9d8d350d3ff933aa78230
SHA2561f216426a69fbe4a10dd2fdb78f26df0e986b85f3a6d54306d3eade64aab2291
SHA5125c04fdc3fa6dbb121419790a5c7c6484e0ed3711123aae61703e748ee1374951e8018152927b9dc43c17bfbf54d9e7eeeb2ec270a40295cf6e20a16bb56cb54e
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r3945691.exeFilesize
168KB
MD507cc0d25f7a85e0993cfc829fe792f0a
SHA15f954262b2eb1fa3fc1e24bb45d67901bad91600
SHA25640731becd7798c14f856f66ad1cd36cbdd0d057c362834bcc3268dcbc84c2a51
SHA5127d213147c5eb62f0395d8f26b44086de3c3a69be338d6a7e4a432eb1a3fc2c21a6446c041d5340f254f38b1eba1264c0697099552d3c4f4aab7118fb9ad629e9
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r3945691.exeFilesize
168KB
MD507cc0d25f7a85e0993cfc829fe792f0a
SHA15f954262b2eb1fa3fc1e24bb45d67901bad91600
SHA25640731becd7798c14f856f66ad1cd36cbdd0d057c362834bcc3268dcbc84c2a51
SHA5127d213147c5eb62f0395d8f26b44086de3c3a69be338d6a7e4a432eb1a3fc2c21a6446c041d5340f254f38b1eba1264c0697099552d3c4f4aab7118fb9ad629e9
-
memory/740-178-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/740-156-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/740-160-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/740-162-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/740-164-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/740-166-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/740-168-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/740-170-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/740-172-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/740-174-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/740-176-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/740-151-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/740-179-0x00000000049C0000-0x00000000049D0000-memory.dmpFilesize
64KB
-
memory/740-180-0x00000000049C0000-0x00000000049D0000-memory.dmpFilesize
64KB
-
memory/740-154-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/740-152-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/740-147-0x00000000049C0000-0x00000000049D0000-memory.dmpFilesize
64KB
-
memory/740-158-0x0000000004950000-0x0000000004962000-memory.dmpFilesize
72KB
-
memory/740-148-0x00000000049D0000-0x0000000004F74000-memory.dmpFilesize
5.6MB
-
memory/740-149-0x00000000049C0000-0x00000000049D0000-memory.dmpFilesize
64KB
-
memory/740-150-0x00000000049C0000-0x00000000049D0000-memory.dmpFilesize
64KB
-
memory/4012-186-0x000000000AF70000-0x000000000B588000-memory.dmpFilesize
6.1MB
-
memory/4012-191-0x00000000054D0000-0x000000000550C000-memory.dmpFilesize
240KB
-
memory/4012-192-0x000000000AE60000-0x000000000AED6000-memory.dmpFilesize
472KB
-
memory/4012-193-0x000000000B630000-0x000000000B6C2000-memory.dmpFilesize
584KB
-
memory/4012-194-0x000000000B7D0000-0x000000000B836000-memory.dmpFilesize
408KB
-
memory/4012-195-0x0000000002B00000-0x0000000002B50000-memory.dmpFilesize
320KB
-
memory/4012-196-0x000000000BA40000-0x000000000BC02000-memory.dmpFilesize
1.8MB
-
memory/4012-197-0x000000000C760000-0x000000000CC8C000-memory.dmpFilesize
5.2MB
-
memory/4012-190-0x00000000054C0000-0x00000000054D0000-memory.dmpFilesize
64KB
-
memory/4012-188-0x000000000A9B0000-0x000000000A9C2000-memory.dmpFilesize
72KB
-
memory/4012-189-0x00000000054C0000-0x00000000054D0000-memory.dmpFilesize
64KB
-
memory/4012-187-0x000000000AA80000-0x000000000AB8A000-memory.dmpFilesize
1.0MB
-
memory/4012-185-0x0000000000B00000-0x0000000000B30000-memory.dmpFilesize
192KB