Analysis
-
max time kernel
151s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2023 14:08
Static task
static1
Behavioral task
behavioral1
Sample
879665e04cc9b2f5ceba6345b90b425dd0e78de71bddfcac1eb057c070d891e3.exe
Resource
win10v2004-20230220-en
General
-
Target
879665e04cc9b2f5ceba6345b90b425dd0e78de71bddfcac1eb057c070d891e3.exe
-
Size
480KB
-
MD5
89fed320eb617aaf624e01be7d816373
-
SHA1
a6e5c4990b14661460af467ba6b06091e34bd5c2
-
SHA256
879665e04cc9b2f5ceba6345b90b425dd0e78de71bddfcac1eb057c070d891e3
-
SHA512
a9bd0a2b120d707106ceb7a034706160aa88b6fc323afec7217e11603cd0f801bbd9296d6312b831e172c38404f00585d19f5915a9bc0c77710333e5f3666fdb
-
SSDEEP
12288:UMrhy90SkJvkNGfQYDPEqp7cJZ/9ArO+:9y5lN476JZ/r+
Malware Config
Extracted
redline
misfa
217.196.96.101:4132
-
auth_value
be2e6d9f1a5e54a81340947b20e561c1
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a0908993.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a0908993.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a0908993.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a0908993.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a0908993.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a0908993.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation d4459432.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 1508 v0044093.exe 1496 a0908993.exe 4904 b6859132.exe 2680 d4459432.exe 3984 oneetx.exe 5008 oneetx.exe 2796 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2068 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a0908993.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a0908993.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 879665e04cc9b2f5ceba6345b90b425dd0e78de71bddfcac1eb057c070d891e3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0044093.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v0044093.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 879665e04cc9b2f5ceba6345b90b425dd0e78de71bddfcac1eb057c070d891e3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3188 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1496 a0908993.exe 1496 a0908993.exe 4904 b6859132.exe 4904 b6859132.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1496 a0908993.exe Token: SeDebugPrivilege 4904 b6859132.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2680 d4459432.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2772 wrote to memory of 1508 2772 879665e04cc9b2f5ceba6345b90b425dd0e78de71bddfcac1eb057c070d891e3.exe 84 PID 2772 wrote to memory of 1508 2772 879665e04cc9b2f5ceba6345b90b425dd0e78de71bddfcac1eb057c070d891e3.exe 84 PID 2772 wrote to memory of 1508 2772 879665e04cc9b2f5ceba6345b90b425dd0e78de71bddfcac1eb057c070d891e3.exe 84 PID 1508 wrote to memory of 1496 1508 v0044093.exe 85 PID 1508 wrote to memory of 1496 1508 v0044093.exe 85 PID 1508 wrote to memory of 1496 1508 v0044093.exe 85 PID 1508 wrote to memory of 4904 1508 v0044093.exe 92 PID 1508 wrote to memory of 4904 1508 v0044093.exe 92 PID 1508 wrote to memory of 4904 1508 v0044093.exe 92 PID 2772 wrote to memory of 2680 2772 879665e04cc9b2f5ceba6345b90b425dd0e78de71bddfcac1eb057c070d891e3.exe 95 PID 2772 wrote to memory of 2680 2772 879665e04cc9b2f5ceba6345b90b425dd0e78de71bddfcac1eb057c070d891e3.exe 95 PID 2772 wrote to memory of 2680 2772 879665e04cc9b2f5ceba6345b90b425dd0e78de71bddfcac1eb057c070d891e3.exe 95 PID 2680 wrote to memory of 3984 2680 d4459432.exe 96 PID 2680 wrote to memory of 3984 2680 d4459432.exe 96 PID 2680 wrote to memory of 3984 2680 d4459432.exe 96 PID 3984 wrote to memory of 3188 3984 oneetx.exe 97 PID 3984 wrote to memory of 3188 3984 oneetx.exe 97 PID 3984 wrote to memory of 3188 3984 oneetx.exe 97 PID 3984 wrote to memory of 4556 3984 oneetx.exe 99 PID 3984 wrote to memory of 4556 3984 oneetx.exe 99 PID 3984 wrote to memory of 4556 3984 oneetx.exe 99 PID 4556 wrote to memory of 400 4556 cmd.exe 101 PID 4556 wrote to memory of 400 4556 cmd.exe 101 PID 4556 wrote to memory of 400 4556 cmd.exe 101 PID 4556 wrote to memory of 4868 4556 cmd.exe 102 PID 4556 wrote to memory of 4868 4556 cmd.exe 102 PID 4556 wrote to memory of 4868 4556 cmd.exe 102 PID 4556 wrote to memory of 3864 4556 cmd.exe 103 PID 4556 wrote to memory of 3864 4556 cmd.exe 103 PID 4556 wrote to memory of 3864 4556 cmd.exe 103 PID 4556 wrote to memory of 1072 4556 cmd.exe 104 PID 4556 wrote to memory of 1072 4556 cmd.exe 104 PID 4556 wrote to memory of 1072 4556 cmd.exe 104 PID 4556 wrote to memory of 1336 4556 cmd.exe 105 PID 4556 wrote to memory of 1336 4556 cmd.exe 105 PID 4556 wrote to memory of 1336 4556 cmd.exe 105 PID 4556 wrote to memory of 1812 4556 cmd.exe 106 PID 4556 wrote to memory of 1812 4556 cmd.exe 106 PID 4556 wrote to memory of 1812 4556 cmd.exe 106 PID 3984 wrote to memory of 2068 3984 oneetx.exe 108 PID 3984 wrote to memory of 2068 3984 oneetx.exe 108 PID 3984 wrote to memory of 2068 3984 oneetx.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\879665e04cc9b2f5ceba6345b90b425dd0e78de71bddfcac1eb057c070d891e3.exe"C:\Users\Admin\AppData\Local\Temp\879665e04cc9b2f5ceba6345b90b425dd0e78de71bddfcac1eb057c070d891e3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0044093.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0044093.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a0908993.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a0908993.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6859132.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6859132.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4904
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d4459432.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d4459432.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3188
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:400
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4868
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3864
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1072
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:1336
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:1812
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2068
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:5008
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2796
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD5e1a6dace3b94edbac4187c919436a3db
SHA1e9e6087877f86f7923ffa55679eadc7ddcc86e70
SHA256f81cbc4b715a64511c8b99db681eaa18303ade55d32140824c3e72e5ab1975ec
SHA51234ec19996df91a45ab6c451b8e6d05e8d87f197148bb9bb76760f3cf093be9c0120f90daf877ce9742017af2296527036e133d0142f906d51b308b5042e69eea
-
Filesize
209KB
MD5e1a6dace3b94edbac4187c919436a3db
SHA1e9e6087877f86f7923ffa55679eadc7ddcc86e70
SHA256f81cbc4b715a64511c8b99db681eaa18303ade55d32140824c3e72e5ab1975ec
SHA51234ec19996df91a45ab6c451b8e6d05e8d87f197148bb9bb76760f3cf093be9c0120f90daf877ce9742017af2296527036e133d0142f906d51b308b5042e69eea
-
Filesize
309KB
MD525ea8255bb0dd85a0faeeaeb7e9b07c8
SHA15b10228a811e6cf7ca499a80a50e1b2eb3c3bb75
SHA25674889c8979c532416d27936e95d826ece1dea5a4d9c2ee98d72f70d9509c601a
SHA512a93f1f9d8ea1ef2ea55b9ea8815dc5c39385f0c6d9d1dbebb52380ce2e0a91c7d112d3f290d558d84162671fb7c37c67198c8c455ae1748ee31ee8ddc1baed89
-
Filesize
309KB
MD525ea8255bb0dd85a0faeeaeb7e9b07c8
SHA15b10228a811e6cf7ca499a80a50e1b2eb3c3bb75
SHA25674889c8979c532416d27936e95d826ece1dea5a4d9c2ee98d72f70d9509c601a
SHA512a93f1f9d8ea1ef2ea55b9ea8815dc5c39385f0c6d9d1dbebb52380ce2e0a91c7d112d3f290d558d84162671fb7c37c67198c8c455ae1748ee31ee8ddc1baed89
-
Filesize
177KB
MD5fbf9bd5b71da6abdb4b9dcc409f8374f
SHA185a11231974d169af97192793075ca07fe2e396a
SHA256eae0c4c8ff9c7750979044890175f77da3b852afd3f5097a52664ab5dcd4adee
SHA512751bf57d3af6c21ad071b7757f2e1d3a02a5bdfc7af0ca4ca474f6b1f6a067c0b6f7b6d8f63c6c4dc24d2ba32e579fb2d7bf76269a84620b923525238f5333d9
-
Filesize
177KB
MD5fbf9bd5b71da6abdb4b9dcc409f8374f
SHA185a11231974d169af97192793075ca07fe2e396a
SHA256eae0c4c8ff9c7750979044890175f77da3b852afd3f5097a52664ab5dcd4adee
SHA512751bf57d3af6c21ad071b7757f2e1d3a02a5bdfc7af0ca4ca474f6b1f6a067c0b6f7b6d8f63c6c4dc24d2ba32e579fb2d7bf76269a84620b923525238f5333d9
-
Filesize
168KB
MD56ad6049f5e88157563b8ac0010126c49
SHA1a0ebd57665cd9ce968085e113de4732f53af0f54
SHA2569ebdc541bf0e2586431a86ea35a5161d0d4780ccc759db496a11c77222380622
SHA512cbbdb39aaaa288e203d4f8a0ba788e0ec5eb672a43f85c35e6dbe9e30e344e94f2a6740e40c9494df5c255be27d56e23dc7db1e61defac68afff473a1a248583
-
Filesize
168KB
MD56ad6049f5e88157563b8ac0010126c49
SHA1a0ebd57665cd9ce968085e113de4732f53af0f54
SHA2569ebdc541bf0e2586431a86ea35a5161d0d4780ccc759db496a11c77222380622
SHA512cbbdb39aaaa288e203d4f8a0ba788e0ec5eb672a43f85c35e6dbe9e30e344e94f2a6740e40c9494df5c255be27d56e23dc7db1e61defac68afff473a1a248583
-
Filesize
209KB
MD5e1a6dace3b94edbac4187c919436a3db
SHA1e9e6087877f86f7923ffa55679eadc7ddcc86e70
SHA256f81cbc4b715a64511c8b99db681eaa18303ade55d32140824c3e72e5ab1975ec
SHA51234ec19996df91a45ab6c451b8e6d05e8d87f197148bb9bb76760f3cf093be9c0120f90daf877ce9742017af2296527036e133d0142f906d51b308b5042e69eea
-
Filesize
209KB
MD5e1a6dace3b94edbac4187c919436a3db
SHA1e9e6087877f86f7923ffa55679eadc7ddcc86e70
SHA256f81cbc4b715a64511c8b99db681eaa18303ade55d32140824c3e72e5ab1975ec
SHA51234ec19996df91a45ab6c451b8e6d05e8d87f197148bb9bb76760f3cf093be9c0120f90daf877ce9742017af2296527036e133d0142f906d51b308b5042e69eea
-
Filesize
209KB
MD5e1a6dace3b94edbac4187c919436a3db
SHA1e9e6087877f86f7923ffa55679eadc7ddcc86e70
SHA256f81cbc4b715a64511c8b99db681eaa18303ade55d32140824c3e72e5ab1975ec
SHA51234ec19996df91a45ab6c451b8e6d05e8d87f197148bb9bb76760f3cf093be9c0120f90daf877ce9742017af2296527036e133d0142f906d51b308b5042e69eea
-
Filesize
209KB
MD5e1a6dace3b94edbac4187c919436a3db
SHA1e9e6087877f86f7923ffa55679eadc7ddcc86e70
SHA256f81cbc4b715a64511c8b99db681eaa18303ade55d32140824c3e72e5ab1975ec
SHA51234ec19996df91a45ab6c451b8e6d05e8d87f197148bb9bb76760f3cf093be9c0120f90daf877ce9742017af2296527036e133d0142f906d51b308b5042e69eea
-
Filesize
209KB
MD5e1a6dace3b94edbac4187c919436a3db
SHA1e9e6087877f86f7923ffa55679eadc7ddcc86e70
SHA256f81cbc4b715a64511c8b99db681eaa18303ade55d32140824c3e72e5ab1975ec
SHA51234ec19996df91a45ab6c451b8e6d05e8d87f197148bb9bb76760f3cf093be9c0120f90daf877ce9742017af2296527036e133d0142f906d51b308b5042e69eea
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5