Analysis

  • max time kernel
    147s
  • max time network
    184s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/05/2023, 13:18

General

  • Target

    4a8fe225b9fb9c9d724498394d4ac6f5d6a24b363bbb7a58a8bc47742d741175.exe

  • Size

    480KB

  • MD5

    5c9bf2fa28b2adf6f7351064f7863e1b

  • SHA1

    bb68537cf8c023e53d73fb052ad285e44d3f9ca7

  • SHA256

    4a8fe225b9fb9c9d724498394d4ac6f5d6a24b363bbb7a58a8bc47742d741175

  • SHA512

    dc8e47f0ec607f6a3c3e99046789cb5481bbeb7a60b351fe68a4fd23be04dc68b3c551a00d77262fb6c8ec42e3bace2d9256cdc6d37327ce2414324fd16f7af9

  • SSDEEP

    12288:cMrYy90qMGp6JIa5ANMqk/N6A9vMIntRlvW4mOme:UyDMGHGO4V6A9JntLYe

Malware Config

Extracted

Family

redline

Botnet

domor

C2

217.196.96.101:4132

Attributes
  • auth_value

    39471bda00546bb0435bc7adfd6881dc

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a8fe225b9fb9c9d724498394d4ac6f5d6a24b363bbb7a58a8bc47742d741175.exe
    "C:\Users\Admin\AppData\Local\Temp\4a8fe225b9fb9c9d724498394d4ac6f5d6a24b363bbb7a58a8bc47742d741175.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1556
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1806117.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1806117.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3312
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3292991.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3292991.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2124
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6830974.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6830974.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2916
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6561426.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6561426.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4084
      • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4972
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:1584
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3448
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:4712
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:N"
              5⤵
                PID:2664
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                5⤵
                  PID:3980
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:3768
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\c3912af058" /P "Admin:N"
                    5⤵
                      PID:4488
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\c3912af058" /P "Admin:R" /E
                      5⤵
                        PID:764

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6561426.exe

                Filesize

                209KB

                MD5

                684f2c66a6f3a00edcd261c717f60f14

                SHA1

                465f93aab5fe1719114722b6f70cb58d4d542fc5

                SHA256

                44ba5e333a6c521135a83f229ad50994beaf2921a5b743702483441867efd9ac

                SHA512

                68aeefb50702dc4008b061d5495ef2a22e6632337ba23bf039ab8b64ab82ddbab21589fc221bf5b98225ff9f0b0f75cfdfefefba9a48ec8ce95b4613d5da6083

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m6561426.exe

                Filesize

                209KB

                MD5

                684f2c66a6f3a00edcd261c717f60f14

                SHA1

                465f93aab5fe1719114722b6f70cb58d4d542fc5

                SHA256

                44ba5e333a6c521135a83f229ad50994beaf2921a5b743702483441867efd9ac

                SHA512

                68aeefb50702dc4008b061d5495ef2a22e6632337ba23bf039ab8b64ab82ddbab21589fc221bf5b98225ff9f0b0f75cfdfefefba9a48ec8ce95b4613d5da6083

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1806117.exe

                Filesize

                309KB

                MD5

                094be31ba54e84facccee7947a26a1fa

                SHA1

                e3a9436ce9a43b21c81c42b7abc4069ce7052472

                SHA256

                122db80e1cc248c16975d7422205911104004b71d68b19ce8d1dcd4c725e2715

                SHA512

                b8b7a9a70f8fbb17fdfba144324382a0d8bf0cfac1eee0d10d91e77bf84d128cab6337cd5bc307cca069f13c5973609be70c3aa6ef6d704ca522c0678ffc0cf2

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1806117.exe

                Filesize

                309KB

                MD5

                094be31ba54e84facccee7947a26a1fa

                SHA1

                e3a9436ce9a43b21c81c42b7abc4069ce7052472

                SHA256

                122db80e1cc248c16975d7422205911104004b71d68b19ce8d1dcd4c725e2715

                SHA512

                b8b7a9a70f8fbb17fdfba144324382a0d8bf0cfac1eee0d10d91e77bf84d128cab6337cd5bc307cca069f13c5973609be70c3aa6ef6d704ca522c0678ffc0cf2

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3292991.exe

                Filesize

                177KB

                MD5

                bda4e6f411a6e3d49f3d10ab46ad52a2

                SHA1

                322b73d38faea0ed05f8dc73d2ca0973ba54e22d

                SHA256

                c31b1041b4c42d37ca54e6f8f91ec748a6093373c65f0895dd39f4e0bc58c2ed

                SHA512

                7100d617a0aa7419f1a884cc3a421c6d2c00421647d540a21f455c026dc1a77463d42b33002653ce4b98f061d37f42368d9958ac66b348c05cbbd48602e3703d

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3292991.exe

                Filesize

                177KB

                MD5

                bda4e6f411a6e3d49f3d10ab46ad52a2

                SHA1

                322b73d38faea0ed05f8dc73d2ca0973ba54e22d

                SHA256

                c31b1041b4c42d37ca54e6f8f91ec748a6093373c65f0895dd39f4e0bc58c2ed

                SHA512

                7100d617a0aa7419f1a884cc3a421c6d2c00421647d540a21f455c026dc1a77463d42b33002653ce4b98f061d37f42368d9958ac66b348c05cbbd48602e3703d

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6830974.exe

                Filesize

                168KB

                MD5

                5444e3ba1e47e6747aa70bf437c83b49

                SHA1

                0fa591c2044355e28c98fa5baab3f1faae21fcdf

                SHA256

                322ae8d90c0d0bd37b8b1b74177f61f520857c5e059a4aad5017aae58f8bd7fa

                SHA512

                92b982d0078e7f49f08f19ee22bad9c957be87486a5555ac9019d5846e830373495b9129c19d890fcfd2b72f66059a47a0fb0b02149f0f9878da961bd076f466

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6830974.exe

                Filesize

                168KB

                MD5

                5444e3ba1e47e6747aa70bf437c83b49

                SHA1

                0fa591c2044355e28c98fa5baab3f1faae21fcdf

                SHA256

                322ae8d90c0d0bd37b8b1b74177f61f520857c5e059a4aad5017aae58f8bd7fa

                SHA512

                92b982d0078e7f49f08f19ee22bad9c957be87486a5555ac9019d5846e830373495b9129c19d890fcfd2b72f66059a47a0fb0b02149f0f9878da961bd076f466

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                209KB

                MD5

                684f2c66a6f3a00edcd261c717f60f14

                SHA1

                465f93aab5fe1719114722b6f70cb58d4d542fc5

                SHA256

                44ba5e333a6c521135a83f229ad50994beaf2921a5b743702483441867efd9ac

                SHA512

                68aeefb50702dc4008b061d5495ef2a22e6632337ba23bf039ab8b64ab82ddbab21589fc221bf5b98225ff9f0b0f75cfdfefefba9a48ec8ce95b4613d5da6083

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                209KB

                MD5

                684f2c66a6f3a00edcd261c717f60f14

                SHA1

                465f93aab5fe1719114722b6f70cb58d4d542fc5

                SHA256

                44ba5e333a6c521135a83f229ad50994beaf2921a5b743702483441867efd9ac

                SHA512

                68aeefb50702dc4008b061d5495ef2a22e6632337ba23bf039ab8b64ab82ddbab21589fc221bf5b98225ff9f0b0f75cfdfefefba9a48ec8ce95b4613d5da6083

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                209KB

                MD5

                684f2c66a6f3a00edcd261c717f60f14

                SHA1

                465f93aab5fe1719114722b6f70cb58d4d542fc5

                SHA256

                44ba5e333a6c521135a83f229ad50994beaf2921a5b743702483441867efd9ac

                SHA512

                68aeefb50702dc4008b061d5495ef2a22e6632337ba23bf039ab8b64ab82ddbab21589fc221bf5b98225ff9f0b0f75cfdfefefba9a48ec8ce95b4613d5da6083

              • memory/2124-178-0x0000000002500000-0x0000000002512000-memory.dmp

                Filesize

                72KB

              • memory/2124-159-0x0000000002500000-0x0000000002512000-memory.dmp

                Filesize

                72KB

              • memory/2124-163-0x0000000002500000-0x0000000002512000-memory.dmp

                Filesize

                72KB

              • memory/2124-166-0x0000000004B50000-0x0000000004B60000-memory.dmp

                Filesize

                64KB

              • memory/2124-165-0x0000000002500000-0x0000000002512000-memory.dmp

                Filesize

                72KB

              • memory/2124-170-0x0000000004B50000-0x0000000004B60000-memory.dmp

                Filesize

                64KB

              • memory/2124-169-0x0000000002500000-0x0000000002512000-memory.dmp

                Filesize

                72KB

              • memory/2124-167-0x0000000004B50000-0x0000000004B60000-memory.dmp

                Filesize

                64KB

              • memory/2124-172-0x0000000002500000-0x0000000002512000-memory.dmp

                Filesize

                72KB

              • memory/2124-174-0x0000000002500000-0x0000000002512000-memory.dmp

                Filesize

                72KB

              • memory/2124-176-0x0000000002500000-0x0000000002512000-memory.dmp

                Filesize

                72KB

              • memory/2124-153-0x0000000002500000-0x0000000002512000-memory.dmp

                Filesize

                72KB

              • memory/2124-179-0x0000000004B50000-0x0000000004B60000-memory.dmp

                Filesize

                64KB

              • memory/2124-180-0x0000000004B50000-0x0000000004B60000-memory.dmp

                Filesize

                64KB

              • memory/2124-157-0x0000000002500000-0x0000000002512000-memory.dmp

                Filesize

                72KB

              • memory/2124-155-0x0000000002500000-0x0000000002512000-memory.dmp

                Filesize

                72KB

              • memory/2124-147-0x0000000004B60000-0x0000000005104000-memory.dmp

                Filesize

                5.6MB

              • memory/2124-161-0x0000000002500000-0x0000000002512000-memory.dmp

                Filesize

                72KB

              • memory/2124-148-0x0000000002500000-0x0000000002512000-memory.dmp

                Filesize

                72KB

              • memory/2124-149-0x0000000002500000-0x0000000002512000-memory.dmp

                Filesize

                72KB

              • memory/2124-151-0x0000000002500000-0x0000000002512000-memory.dmp

                Filesize

                72KB

              • memory/2916-186-0x00000000058E0000-0x0000000005EF8000-memory.dmp

                Filesize

                6.1MB

              • memory/2916-191-0x00000000051B0000-0x00000000051C0000-memory.dmp

                Filesize

                64KB

              • memory/2916-192-0x00000000055C0000-0x0000000005636000-memory.dmp

                Filesize

                472KB

              • memory/2916-193-0x00000000056E0000-0x0000000005772000-memory.dmp

                Filesize

                584KB

              • memory/2916-194-0x0000000005640000-0x00000000056A6000-memory.dmp

                Filesize

                408KB

              • memory/2916-195-0x00000000061A0000-0x00000000061F0000-memory.dmp

                Filesize

                320KB

              • memory/2916-196-0x00000000067C0000-0x0000000006982000-memory.dmp

                Filesize

                1.8MB

              • memory/2916-197-0x0000000008B70000-0x000000000909C000-memory.dmp

                Filesize

                5.2MB

              • memory/2916-190-0x00000000051B0000-0x00000000051C0000-memory.dmp

                Filesize

                64KB

              • memory/2916-189-0x00000000052C0000-0x00000000052FC000-memory.dmp

                Filesize

                240KB

              • memory/2916-188-0x0000000005140000-0x0000000005152000-memory.dmp

                Filesize

                72KB

              • memory/2916-187-0x00000000053D0000-0x00000000054DA000-memory.dmp

                Filesize

                1.0MB

              • memory/2916-185-0x0000000000900000-0x000000000092E000-memory.dmp

                Filesize

                184KB