Analysis
-
max time kernel
131s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
07-05-2023 14:21
Static task
static1
Behavioral task
behavioral1
Sample
ef62f527e6e06b518b384db105fe879e45d85da54e405a3468c8d35d15a08cdd.exe
Resource
win10-20230220-en
General
-
Target
ef62f527e6e06b518b384db105fe879e45d85da54e405a3468c8d35d15a08cdd.exe
-
Size
480KB
-
MD5
8f092d674ac8186e6728965cf0bf26b9
-
SHA1
776ed2a14609f1c90988a0194d601b2d56a3ad61
-
SHA256
ef62f527e6e06b518b384db105fe879e45d85da54e405a3468c8d35d15a08cdd
-
SHA512
bb8edf5f4ded68274637197e7fb6e313ca23fb69610d5df48aa2375730eef589bf0901c5514832824b6204e18084ed93d8803287eca4be9dc10bbf49d2cf76ae
-
SSDEEP
6144:KVy+bnr+1p0yN90QE4h32N9r+vQkoQ3Ny8nV05FiHSIIXNXI+Tgza7ChITkQd/L:vMrFy90mh32fSLj9vV0gzYN7cWuRaT
Malware Config
Extracted
redline
misfa
217.196.96.101:4132
-
auth_value
be2e6d9f1a5e54a81340947b20e561c1
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8904415.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8904415.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8904415.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8904415.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8904415.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 3508 v7386207.exe 2900 a8904415.exe 2992 b2514810.exe 980 d3983850.exe 3204 oneetx.exe 3916 oneetx.exe 1268 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3444 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a8904415.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a8904415.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ef62f527e6e06b518b384db105fe879e45d85da54e405a3468c8d35d15a08cdd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ef62f527e6e06b518b384db105fe879e45d85da54e405a3468c8d35d15a08cdd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7386207.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7386207.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1956 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2900 a8904415.exe 2900 a8904415.exe 2992 b2514810.exe 2992 b2514810.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2900 a8904415.exe Token: SeDebugPrivilege 2992 b2514810.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 980 d3983850.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 404 wrote to memory of 3508 404 ef62f527e6e06b518b384db105fe879e45d85da54e405a3468c8d35d15a08cdd.exe 66 PID 404 wrote to memory of 3508 404 ef62f527e6e06b518b384db105fe879e45d85da54e405a3468c8d35d15a08cdd.exe 66 PID 404 wrote to memory of 3508 404 ef62f527e6e06b518b384db105fe879e45d85da54e405a3468c8d35d15a08cdd.exe 66 PID 3508 wrote to memory of 2900 3508 v7386207.exe 67 PID 3508 wrote to memory of 2900 3508 v7386207.exe 67 PID 3508 wrote to memory of 2900 3508 v7386207.exe 67 PID 3508 wrote to memory of 2992 3508 v7386207.exe 68 PID 3508 wrote to memory of 2992 3508 v7386207.exe 68 PID 3508 wrote to memory of 2992 3508 v7386207.exe 68 PID 404 wrote to memory of 980 404 ef62f527e6e06b518b384db105fe879e45d85da54e405a3468c8d35d15a08cdd.exe 70 PID 404 wrote to memory of 980 404 ef62f527e6e06b518b384db105fe879e45d85da54e405a3468c8d35d15a08cdd.exe 70 PID 404 wrote to memory of 980 404 ef62f527e6e06b518b384db105fe879e45d85da54e405a3468c8d35d15a08cdd.exe 70 PID 980 wrote to memory of 3204 980 d3983850.exe 71 PID 980 wrote to memory of 3204 980 d3983850.exe 71 PID 980 wrote to memory of 3204 980 d3983850.exe 71 PID 3204 wrote to memory of 1956 3204 oneetx.exe 72 PID 3204 wrote to memory of 1956 3204 oneetx.exe 72 PID 3204 wrote to memory of 1956 3204 oneetx.exe 72 PID 3204 wrote to memory of 3872 3204 oneetx.exe 74 PID 3204 wrote to memory of 3872 3204 oneetx.exe 74 PID 3204 wrote to memory of 3872 3204 oneetx.exe 74 PID 3872 wrote to memory of 208 3872 cmd.exe 76 PID 3872 wrote to memory of 208 3872 cmd.exe 76 PID 3872 wrote to memory of 208 3872 cmd.exe 76 PID 3872 wrote to memory of 196 3872 cmd.exe 77 PID 3872 wrote to memory of 196 3872 cmd.exe 77 PID 3872 wrote to memory of 196 3872 cmd.exe 77 PID 3872 wrote to memory of 3616 3872 cmd.exe 78 PID 3872 wrote to memory of 3616 3872 cmd.exe 78 PID 3872 wrote to memory of 3616 3872 cmd.exe 78 PID 3872 wrote to memory of 2428 3872 cmd.exe 79 PID 3872 wrote to memory of 2428 3872 cmd.exe 79 PID 3872 wrote to memory of 2428 3872 cmd.exe 79 PID 3872 wrote to memory of 3176 3872 cmd.exe 80 PID 3872 wrote to memory of 3176 3872 cmd.exe 80 PID 3872 wrote to memory of 3176 3872 cmd.exe 80 PID 3872 wrote to memory of 3296 3872 cmd.exe 81 PID 3872 wrote to memory of 3296 3872 cmd.exe 81 PID 3872 wrote to memory of 3296 3872 cmd.exe 81 PID 3204 wrote to memory of 3444 3204 oneetx.exe 83 PID 3204 wrote to memory of 3444 3204 oneetx.exe 83 PID 3204 wrote to memory of 3444 3204 oneetx.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\ef62f527e6e06b518b384db105fe879e45d85da54e405a3468c8d35d15a08cdd.exe"C:\Users\Admin\AppData\Local\Temp\ef62f527e6e06b518b384db105fe879e45d85da54e405a3468c8d35d15a08cdd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7386207.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7386207.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a8904415.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a8904415.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2900
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b2514810.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b2514810.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2992
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3983850.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3983850.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1956
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:208
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:196
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3616
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2428
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:3176
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:3296
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3444
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3916
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1268
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD591316ae28baf3e92332ac470cb492b48
SHA146eccc52b8055fa63ed4bc0a56752fed6957c65f
SHA256b3985f2b9e0d4459f65ed791a890397e59a04d618514adb6fe9d3ee97338e6d8
SHA51227bca773311f0c046b397da017161cc823b8a06da83f23376dd8901041232a45318de74a391b50ea4e3efe288ac7cc8ea6d021de26793adc6b71b9662dc1e633
-
Filesize
209KB
MD591316ae28baf3e92332ac470cb492b48
SHA146eccc52b8055fa63ed4bc0a56752fed6957c65f
SHA256b3985f2b9e0d4459f65ed791a890397e59a04d618514adb6fe9d3ee97338e6d8
SHA51227bca773311f0c046b397da017161cc823b8a06da83f23376dd8901041232a45318de74a391b50ea4e3efe288ac7cc8ea6d021de26793adc6b71b9662dc1e633
-
Filesize
309KB
MD5fa210931a421976f7b1858396e916855
SHA1e8e81533101b82bf7fbfaea2ddbdc92d4a8baa28
SHA256ccc4bf256a0135fb10a3777cb3d142e8f5afe0e77f8aa25ee002fb9fe010c74a
SHA512593202174295b5028661aefa9048e768adaa469bf800a156fa492e6ac78265836fa58a60711bf3cb875757aaf54795f34331fd787d860a3ad25d61787a7a34ec
-
Filesize
309KB
MD5fa210931a421976f7b1858396e916855
SHA1e8e81533101b82bf7fbfaea2ddbdc92d4a8baa28
SHA256ccc4bf256a0135fb10a3777cb3d142e8f5afe0e77f8aa25ee002fb9fe010c74a
SHA512593202174295b5028661aefa9048e768adaa469bf800a156fa492e6ac78265836fa58a60711bf3cb875757aaf54795f34331fd787d860a3ad25d61787a7a34ec
-
Filesize
177KB
MD5d8973cbed1df2cc8d7bf562fb5fd31ab
SHA11909c9fc31f512fe8aa47cd18e68597585a8f9c7
SHA256c212d6c224b8b285456163c423099905e0512326fc5e0ce25860da990baeb252
SHA512ca6c1550663ec399c5bb58366d7698f7bd44bad62940b05a418139f66065a1d92c5d32871757c481fda0db73efb2f87234cf74f6dfb14e720f57c2cf0c354ffa
-
Filesize
177KB
MD5d8973cbed1df2cc8d7bf562fb5fd31ab
SHA11909c9fc31f512fe8aa47cd18e68597585a8f9c7
SHA256c212d6c224b8b285456163c423099905e0512326fc5e0ce25860da990baeb252
SHA512ca6c1550663ec399c5bb58366d7698f7bd44bad62940b05a418139f66065a1d92c5d32871757c481fda0db73efb2f87234cf74f6dfb14e720f57c2cf0c354ffa
-
Filesize
168KB
MD5c24e9674aea1db4a44482860e95e26da
SHA120f5380cbfa9966ef67c9bc9c4f499eba9e937f4
SHA2563130d747131fc3fcb1f312be30fd1ebf5ae8cd2326d25d28570ef072bffe0300
SHA512dd5c133807ab75436fd8b43a2ee7c0af27f83d20cdaaca65bb6a9aef2f25d191fbebbc017da6628a387a982eadbff88ab8ef918d94a8f5ec45a784cdf44e486a
-
Filesize
168KB
MD5c24e9674aea1db4a44482860e95e26da
SHA120f5380cbfa9966ef67c9bc9c4f499eba9e937f4
SHA2563130d747131fc3fcb1f312be30fd1ebf5ae8cd2326d25d28570ef072bffe0300
SHA512dd5c133807ab75436fd8b43a2ee7c0af27f83d20cdaaca65bb6a9aef2f25d191fbebbc017da6628a387a982eadbff88ab8ef918d94a8f5ec45a784cdf44e486a
-
Filesize
209KB
MD591316ae28baf3e92332ac470cb492b48
SHA146eccc52b8055fa63ed4bc0a56752fed6957c65f
SHA256b3985f2b9e0d4459f65ed791a890397e59a04d618514adb6fe9d3ee97338e6d8
SHA51227bca773311f0c046b397da017161cc823b8a06da83f23376dd8901041232a45318de74a391b50ea4e3efe288ac7cc8ea6d021de26793adc6b71b9662dc1e633
-
Filesize
209KB
MD591316ae28baf3e92332ac470cb492b48
SHA146eccc52b8055fa63ed4bc0a56752fed6957c65f
SHA256b3985f2b9e0d4459f65ed791a890397e59a04d618514adb6fe9d3ee97338e6d8
SHA51227bca773311f0c046b397da017161cc823b8a06da83f23376dd8901041232a45318de74a391b50ea4e3efe288ac7cc8ea6d021de26793adc6b71b9662dc1e633
-
Filesize
209KB
MD591316ae28baf3e92332ac470cb492b48
SHA146eccc52b8055fa63ed4bc0a56752fed6957c65f
SHA256b3985f2b9e0d4459f65ed791a890397e59a04d618514adb6fe9d3ee97338e6d8
SHA51227bca773311f0c046b397da017161cc823b8a06da83f23376dd8901041232a45318de74a391b50ea4e3efe288ac7cc8ea6d021de26793adc6b71b9662dc1e633
-
Filesize
209KB
MD591316ae28baf3e92332ac470cb492b48
SHA146eccc52b8055fa63ed4bc0a56752fed6957c65f
SHA256b3985f2b9e0d4459f65ed791a890397e59a04d618514adb6fe9d3ee97338e6d8
SHA51227bca773311f0c046b397da017161cc823b8a06da83f23376dd8901041232a45318de74a391b50ea4e3efe288ac7cc8ea6d021de26793adc6b71b9662dc1e633
-
Filesize
209KB
MD591316ae28baf3e92332ac470cb492b48
SHA146eccc52b8055fa63ed4bc0a56752fed6957c65f
SHA256b3985f2b9e0d4459f65ed791a890397e59a04d618514adb6fe9d3ee97338e6d8
SHA51227bca773311f0c046b397da017161cc823b8a06da83f23376dd8901041232a45318de74a391b50ea4e3efe288ac7cc8ea6d021de26793adc6b71b9662dc1e633
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53