Analysis
-
max time kernel
147s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2023, 13:18
Static task
static1
Behavioral task
behavioral1
Sample
4a8fe225b9fb9c9d724498394d4ac6f5d6a24b363bbb7a58a8bc47742d741175.exe
Resource
win10v2004-20230220-en
General
-
Target
4a8fe225b9fb9c9d724498394d4ac6f5d6a24b363bbb7a58a8bc47742d741175.exe
-
Size
480KB
-
MD5
5c9bf2fa28b2adf6f7351064f7863e1b
-
SHA1
bb68537cf8c023e53d73fb052ad285e44d3f9ca7
-
SHA256
4a8fe225b9fb9c9d724498394d4ac6f5d6a24b363bbb7a58a8bc47742d741175
-
SHA512
dc8e47f0ec607f6a3c3e99046789cb5481bbeb7a60b351fe68a4fd23be04dc68b3c551a00d77262fb6c8ec42e3bace2d9256cdc6d37327ce2414324fd16f7af9
-
SSDEEP
12288:cMrYy90qMGp6JIa5ANMqk/N6A9vMIntRlvW4mOme:UyDMGHGO4V6A9JntLYe
Malware Config
Extracted
redline
domor
217.196.96.101:4132
-
auth_value
39471bda00546bb0435bc7adfd6881dc
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k3292991.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k3292991.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k3292991.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k3292991.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k3292991.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k3292991.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation m6561426.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 5 IoCs
pid Process 3312 y1806117.exe 2124 k3292991.exe 2916 l6830974.exe 4084 m6561426.exe 4972 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k3292991.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k3292991.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4a8fe225b9fb9c9d724498394d4ac6f5d6a24b363bbb7a58a8bc47742d741175.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4a8fe225b9fb9c9d724498394d4ac6f5d6a24b363bbb7a58a8bc47742d741175.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y1806117.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y1806117.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1584 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2124 k3292991.exe 2124 k3292991.exe 2916 l6830974.exe 2916 l6830974.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2124 k3292991.exe Token: SeDebugPrivilege 2916 l6830974.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4084 m6561426.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1556 wrote to memory of 3312 1556 4a8fe225b9fb9c9d724498394d4ac6f5d6a24b363bbb7a58a8bc47742d741175.exe 82 PID 1556 wrote to memory of 3312 1556 4a8fe225b9fb9c9d724498394d4ac6f5d6a24b363bbb7a58a8bc47742d741175.exe 82 PID 1556 wrote to memory of 3312 1556 4a8fe225b9fb9c9d724498394d4ac6f5d6a24b363bbb7a58a8bc47742d741175.exe 82 PID 3312 wrote to memory of 2124 3312 y1806117.exe 83 PID 3312 wrote to memory of 2124 3312 y1806117.exe 83 PID 3312 wrote to memory of 2124 3312 y1806117.exe 83 PID 3312 wrote to memory of 2916 3312 y1806117.exe 88 PID 3312 wrote to memory of 2916 3312 y1806117.exe 88 PID 3312 wrote to memory of 2916 3312 y1806117.exe 88 PID 1556 wrote to memory of 4084 1556 4a8fe225b9fb9c9d724498394d4ac6f5d6a24b363bbb7a58a8bc47742d741175.exe 92 PID 1556 wrote to memory of 4084 1556 4a8fe225b9fb9c9d724498394d4ac6f5d6a24b363bbb7a58a8bc47742d741175.exe 92 PID 1556 wrote to memory of 4084 1556 4a8fe225b9fb9c9d724498394d4ac6f5d6a24b363bbb7a58a8bc47742d741175.exe 92 PID 4084 wrote to memory of 4972 4084 m6561426.exe 93 PID 4084 wrote to memory of 4972 4084 m6561426.exe 93 PID 4084 wrote to memory of 4972 4084 m6561426.exe 93 PID 4972 wrote to memory of 1584 4972 oneetx.exe 94 PID 4972 wrote to memory of 1584 4972 oneetx.exe 94 PID 4972 wrote to memory of 1584 4972 oneetx.exe 94 PID 4972 wrote to memory of 3448 4972 oneetx.exe 96 PID 4972 wrote to memory of 3448 4972 oneetx.exe 96 PID 4972 wrote to memory of 3448 4972 oneetx.exe 96 PID 3448 wrote to memory of 4712 3448 cmd.exe 98 PID 3448 wrote to memory of 4712 3448 cmd.exe 98 PID 3448 wrote to memory of 4712 3448 cmd.exe 98 PID 3448 wrote to memory of 2664 3448 cmd.exe 99 PID 3448 wrote to memory of 2664 3448 cmd.exe 99 PID 3448 wrote to memory of 2664 3448 cmd.exe 99 PID 3448 wrote to memory of 3980 3448 cmd.exe 100 PID 3448 wrote to memory of 3980 3448 cmd.exe 100 PID 3448 wrote to memory of 3980 3448 cmd.exe 100 PID 3448 wrote to memory of 3768 3448 cmd.exe 101 PID 3448 wrote to memory of 3768 3448 cmd.exe 101 PID 3448 wrote to memory of 3768 3448 cmd.exe 101 PID 3448 wrote to memory of 4488 3448 cmd.exe 102 PID 3448 wrote to memory of 4488 3448 cmd.exe 102 PID 3448 wrote to memory of 4488 3448 cmd.exe 102 PID 3448 wrote to memory of 764 3448 cmd.exe 103 PID 3448 wrote to memory of 764 3448 cmd.exe 103 PID 3448 wrote to memory of 764 3448 cmd.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a8fe225b9fb9c9d724498394d4ac6f5d6a24b363bbb7a58a8bc47742d741175.exe"C:\Users\Admin\AppData\Local\Temp\4a8fe225b9fb9c9d724498394d4ac6f5d6a24b363bbb7a58a8bc47742d741175.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1806117.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1806117.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3292991.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3292991.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6830974.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6830974.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6561426.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6561426.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1584
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4712
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:2664
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3980
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3768
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4488
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:764
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD5684f2c66a6f3a00edcd261c717f60f14
SHA1465f93aab5fe1719114722b6f70cb58d4d542fc5
SHA25644ba5e333a6c521135a83f229ad50994beaf2921a5b743702483441867efd9ac
SHA51268aeefb50702dc4008b061d5495ef2a22e6632337ba23bf039ab8b64ab82ddbab21589fc221bf5b98225ff9f0b0f75cfdfefefba9a48ec8ce95b4613d5da6083
-
Filesize
209KB
MD5684f2c66a6f3a00edcd261c717f60f14
SHA1465f93aab5fe1719114722b6f70cb58d4d542fc5
SHA25644ba5e333a6c521135a83f229ad50994beaf2921a5b743702483441867efd9ac
SHA51268aeefb50702dc4008b061d5495ef2a22e6632337ba23bf039ab8b64ab82ddbab21589fc221bf5b98225ff9f0b0f75cfdfefefba9a48ec8ce95b4613d5da6083
-
Filesize
309KB
MD5094be31ba54e84facccee7947a26a1fa
SHA1e3a9436ce9a43b21c81c42b7abc4069ce7052472
SHA256122db80e1cc248c16975d7422205911104004b71d68b19ce8d1dcd4c725e2715
SHA512b8b7a9a70f8fbb17fdfba144324382a0d8bf0cfac1eee0d10d91e77bf84d128cab6337cd5bc307cca069f13c5973609be70c3aa6ef6d704ca522c0678ffc0cf2
-
Filesize
309KB
MD5094be31ba54e84facccee7947a26a1fa
SHA1e3a9436ce9a43b21c81c42b7abc4069ce7052472
SHA256122db80e1cc248c16975d7422205911104004b71d68b19ce8d1dcd4c725e2715
SHA512b8b7a9a70f8fbb17fdfba144324382a0d8bf0cfac1eee0d10d91e77bf84d128cab6337cd5bc307cca069f13c5973609be70c3aa6ef6d704ca522c0678ffc0cf2
-
Filesize
177KB
MD5bda4e6f411a6e3d49f3d10ab46ad52a2
SHA1322b73d38faea0ed05f8dc73d2ca0973ba54e22d
SHA256c31b1041b4c42d37ca54e6f8f91ec748a6093373c65f0895dd39f4e0bc58c2ed
SHA5127100d617a0aa7419f1a884cc3a421c6d2c00421647d540a21f455c026dc1a77463d42b33002653ce4b98f061d37f42368d9958ac66b348c05cbbd48602e3703d
-
Filesize
177KB
MD5bda4e6f411a6e3d49f3d10ab46ad52a2
SHA1322b73d38faea0ed05f8dc73d2ca0973ba54e22d
SHA256c31b1041b4c42d37ca54e6f8f91ec748a6093373c65f0895dd39f4e0bc58c2ed
SHA5127100d617a0aa7419f1a884cc3a421c6d2c00421647d540a21f455c026dc1a77463d42b33002653ce4b98f061d37f42368d9958ac66b348c05cbbd48602e3703d
-
Filesize
168KB
MD55444e3ba1e47e6747aa70bf437c83b49
SHA10fa591c2044355e28c98fa5baab3f1faae21fcdf
SHA256322ae8d90c0d0bd37b8b1b74177f61f520857c5e059a4aad5017aae58f8bd7fa
SHA51292b982d0078e7f49f08f19ee22bad9c957be87486a5555ac9019d5846e830373495b9129c19d890fcfd2b72f66059a47a0fb0b02149f0f9878da961bd076f466
-
Filesize
168KB
MD55444e3ba1e47e6747aa70bf437c83b49
SHA10fa591c2044355e28c98fa5baab3f1faae21fcdf
SHA256322ae8d90c0d0bd37b8b1b74177f61f520857c5e059a4aad5017aae58f8bd7fa
SHA51292b982d0078e7f49f08f19ee22bad9c957be87486a5555ac9019d5846e830373495b9129c19d890fcfd2b72f66059a47a0fb0b02149f0f9878da961bd076f466
-
Filesize
209KB
MD5684f2c66a6f3a00edcd261c717f60f14
SHA1465f93aab5fe1719114722b6f70cb58d4d542fc5
SHA25644ba5e333a6c521135a83f229ad50994beaf2921a5b743702483441867efd9ac
SHA51268aeefb50702dc4008b061d5495ef2a22e6632337ba23bf039ab8b64ab82ddbab21589fc221bf5b98225ff9f0b0f75cfdfefefba9a48ec8ce95b4613d5da6083
-
Filesize
209KB
MD5684f2c66a6f3a00edcd261c717f60f14
SHA1465f93aab5fe1719114722b6f70cb58d4d542fc5
SHA25644ba5e333a6c521135a83f229ad50994beaf2921a5b743702483441867efd9ac
SHA51268aeefb50702dc4008b061d5495ef2a22e6632337ba23bf039ab8b64ab82ddbab21589fc221bf5b98225ff9f0b0f75cfdfefefba9a48ec8ce95b4613d5da6083
-
Filesize
209KB
MD5684f2c66a6f3a00edcd261c717f60f14
SHA1465f93aab5fe1719114722b6f70cb58d4d542fc5
SHA25644ba5e333a6c521135a83f229ad50994beaf2921a5b743702483441867efd9ac
SHA51268aeefb50702dc4008b061d5495ef2a22e6632337ba23bf039ab8b64ab82ddbab21589fc221bf5b98225ff9f0b0f75cfdfefefba9a48ec8ce95b4613d5da6083