Analysis
-
max time kernel
116s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2023, 14:35
Static task
static1
Behavioral task
behavioral1
Sample
d722f400016a58fd1d6874f5b43deeb85076c43007618eb51dae16ae20f0f74c.exe
Resource
win10v2004-20230220-en
General
-
Target
d722f400016a58fd1d6874f5b43deeb85076c43007618eb51dae16ae20f0f74c.exe
-
Size
480KB
-
MD5
475511e481cc6e1d8d20f06469a75698
-
SHA1
4764faf4ee6ce6ce67284ebcd0c968d4d8ab58ac
-
SHA256
d722f400016a58fd1d6874f5b43deeb85076c43007618eb51dae16ae20f0f74c
-
SHA512
e3b07ee06ddc75ec1565e8287faed7b7d86d5bb3562a5a1d66c8bf4716f2b8a61d1a8edae8fad9c563d777ddeefaad3ffef7822822c4ca74dac706908898b816
-
SSDEEP
12288:rMrJey90LBuUp7U65c1u316TPN5gtaYe:UeysBuUp7nXsTie
Malware Config
Extracted
redline
misfa
217.196.96.101:4132
-
auth_value
be2e6d9f1a5e54a81340947b20e561c1
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8107531.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8107531.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a8107531.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8107531.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8107531.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8107531.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation d7459601.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 6 IoCs
pid Process 4152 v8350199.exe 4664 a8107531.exe 4468 b5494818.exe 2156 d7459601.exe 3904 oneetx.exe 3656 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2372 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a8107531.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a8107531.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8350199.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v8350199.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d722f400016a58fd1d6874f5b43deeb85076c43007618eb51dae16ae20f0f74c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d722f400016a58fd1d6874f5b43deeb85076c43007618eb51dae16ae20f0f74c.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2944 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4664 a8107531.exe 4664 a8107531.exe 4468 b5494818.exe 4468 b5494818.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4664 a8107531.exe Token: SeDebugPrivilege 4468 b5494818.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2156 d7459601.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2820 wrote to memory of 4152 2820 d722f400016a58fd1d6874f5b43deeb85076c43007618eb51dae16ae20f0f74c.exe 82 PID 2820 wrote to memory of 4152 2820 d722f400016a58fd1d6874f5b43deeb85076c43007618eb51dae16ae20f0f74c.exe 82 PID 2820 wrote to memory of 4152 2820 d722f400016a58fd1d6874f5b43deeb85076c43007618eb51dae16ae20f0f74c.exe 82 PID 4152 wrote to memory of 4664 4152 v8350199.exe 83 PID 4152 wrote to memory of 4664 4152 v8350199.exe 83 PID 4152 wrote to memory of 4664 4152 v8350199.exe 83 PID 4152 wrote to memory of 4468 4152 v8350199.exe 85 PID 4152 wrote to memory of 4468 4152 v8350199.exe 85 PID 4152 wrote to memory of 4468 4152 v8350199.exe 85 PID 2820 wrote to memory of 2156 2820 d722f400016a58fd1d6874f5b43deeb85076c43007618eb51dae16ae20f0f74c.exe 86 PID 2820 wrote to memory of 2156 2820 d722f400016a58fd1d6874f5b43deeb85076c43007618eb51dae16ae20f0f74c.exe 86 PID 2820 wrote to memory of 2156 2820 d722f400016a58fd1d6874f5b43deeb85076c43007618eb51dae16ae20f0f74c.exe 86 PID 2156 wrote to memory of 3904 2156 d7459601.exe 87 PID 2156 wrote to memory of 3904 2156 d7459601.exe 87 PID 2156 wrote to memory of 3904 2156 d7459601.exe 87 PID 3904 wrote to memory of 2944 3904 oneetx.exe 88 PID 3904 wrote to memory of 2944 3904 oneetx.exe 88 PID 3904 wrote to memory of 2944 3904 oneetx.exe 88 PID 3904 wrote to memory of 2332 3904 oneetx.exe 89 PID 3904 wrote to memory of 2332 3904 oneetx.exe 89 PID 3904 wrote to memory of 2332 3904 oneetx.exe 89 PID 2332 wrote to memory of 5084 2332 cmd.exe 92 PID 2332 wrote to memory of 5084 2332 cmd.exe 92 PID 2332 wrote to memory of 5084 2332 cmd.exe 92 PID 2332 wrote to memory of 4376 2332 cmd.exe 93 PID 2332 wrote to memory of 4376 2332 cmd.exe 93 PID 2332 wrote to memory of 4376 2332 cmd.exe 93 PID 2332 wrote to memory of 3356 2332 cmd.exe 94 PID 2332 wrote to memory of 3356 2332 cmd.exe 94 PID 2332 wrote to memory of 3356 2332 cmd.exe 94 PID 2332 wrote to memory of 1600 2332 cmd.exe 95 PID 2332 wrote to memory of 1600 2332 cmd.exe 95 PID 2332 wrote to memory of 1600 2332 cmd.exe 95 PID 2332 wrote to memory of 4596 2332 cmd.exe 96 PID 2332 wrote to memory of 4596 2332 cmd.exe 96 PID 2332 wrote to memory of 4596 2332 cmd.exe 96 PID 2332 wrote to memory of 1348 2332 cmd.exe 97 PID 2332 wrote to memory of 1348 2332 cmd.exe 97 PID 2332 wrote to memory of 1348 2332 cmd.exe 97 PID 3904 wrote to memory of 2372 3904 oneetx.exe 99 PID 3904 wrote to memory of 2372 3904 oneetx.exe 99 PID 3904 wrote to memory of 2372 3904 oneetx.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\d722f400016a58fd1d6874f5b43deeb85076c43007618eb51dae16ae20f0f74c.exe"C:\Users\Admin\AppData\Local\Temp\d722f400016a58fd1d6874f5b43deeb85076c43007618eb51dae16ae20f0f74c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8350199.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8350199.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a8107531.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a8107531.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4664
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5494818.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5494818.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7459601.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7459601.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2944
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:5084
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4376
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3356
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1600
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4596
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:1348
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2372
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3656
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD531e0d0388accc68bec9dd2b31c0fb6d6
SHA1a4b8de2918700b4c0424fa410dae9d02da987adb
SHA256ca4f3947d00669f8ccf3b954c47feb425c1ab037133fc348d4e24ec4fa1ac642
SHA5128cc595202229a256f3acdceb2f639abab2caed09ffc730f45aeb2c0f56197e7243afe6694e2d1bff2a1016fcbec23fc262e5d8dd6ccbc1f983d9daa253626ee0
-
Filesize
209KB
MD531e0d0388accc68bec9dd2b31c0fb6d6
SHA1a4b8de2918700b4c0424fa410dae9d02da987adb
SHA256ca4f3947d00669f8ccf3b954c47feb425c1ab037133fc348d4e24ec4fa1ac642
SHA5128cc595202229a256f3acdceb2f639abab2caed09ffc730f45aeb2c0f56197e7243afe6694e2d1bff2a1016fcbec23fc262e5d8dd6ccbc1f983d9daa253626ee0
-
Filesize
309KB
MD537ed2b72731a235a80bddeeaa3963be2
SHA13831c8000ff0b8da7f0603909e4c973f9f23d216
SHA25603d1fb7e91c4bbddf733e47d2817e5d22fa4fbdfddedc53c7a868cbadc2f05b9
SHA512f41c08b0684f9e98660e82fe27e379a9912d4167190cd6335dbe59842dac45b62a1672f641e9b046d96630d6da59c6a68cd1b526178f51cb1c93d3319e34a187
-
Filesize
309KB
MD537ed2b72731a235a80bddeeaa3963be2
SHA13831c8000ff0b8da7f0603909e4c973f9f23d216
SHA25603d1fb7e91c4bbddf733e47d2817e5d22fa4fbdfddedc53c7a868cbadc2f05b9
SHA512f41c08b0684f9e98660e82fe27e379a9912d4167190cd6335dbe59842dac45b62a1672f641e9b046d96630d6da59c6a68cd1b526178f51cb1c93d3319e34a187
-
Filesize
177KB
MD511d755a8089dc59c84ebd132a8580aa9
SHA1fa4099541a56a1d9ab3f04a6dcce38e0e97b5c31
SHA256a2f499dfa797d20920544ec27516a14d5a65b028153bb49059aa14f5503e7ba8
SHA51239d60d106de11b9c92e6553b40f4502f174ae32413de9ca93c75489b720258304a906c13c023bcf1dbb762df38c5bbbdae7a6e51c27ec40a46644492dd1c23e5
-
Filesize
177KB
MD511d755a8089dc59c84ebd132a8580aa9
SHA1fa4099541a56a1d9ab3f04a6dcce38e0e97b5c31
SHA256a2f499dfa797d20920544ec27516a14d5a65b028153bb49059aa14f5503e7ba8
SHA51239d60d106de11b9c92e6553b40f4502f174ae32413de9ca93c75489b720258304a906c13c023bcf1dbb762df38c5bbbdae7a6e51c27ec40a46644492dd1c23e5
-
Filesize
168KB
MD559d901cf964a0b632ef45f79eb57858a
SHA10c31eef0cbc0f7dda523da603d3ee01b0025fd1d
SHA25613549862164c71a9b0d8965960210fc3336bfcc801b6bcbe5c2a2a7d5c89623e
SHA5129ebb894058e654387c926b803c6b7d56526409d53fee7c417eb6ca3dea2ab7e14dd1c0d8f077b874499a7f6c76da8b1dd12fbd6f2cac87d77e24eb2533ec90c4
-
Filesize
168KB
MD559d901cf964a0b632ef45f79eb57858a
SHA10c31eef0cbc0f7dda523da603d3ee01b0025fd1d
SHA25613549862164c71a9b0d8965960210fc3336bfcc801b6bcbe5c2a2a7d5c89623e
SHA5129ebb894058e654387c926b803c6b7d56526409d53fee7c417eb6ca3dea2ab7e14dd1c0d8f077b874499a7f6c76da8b1dd12fbd6f2cac87d77e24eb2533ec90c4
-
Filesize
209KB
MD531e0d0388accc68bec9dd2b31c0fb6d6
SHA1a4b8de2918700b4c0424fa410dae9d02da987adb
SHA256ca4f3947d00669f8ccf3b954c47feb425c1ab037133fc348d4e24ec4fa1ac642
SHA5128cc595202229a256f3acdceb2f639abab2caed09ffc730f45aeb2c0f56197e7243afe6694e2d1bff2a1016fcbec23fc262e5d8dd6ccbc1f983d9daa253626ee0
-
Filesize
209KB
MD531e0d0388accc68bec9dd2b31c0fb6d6
SHA1a4b8de2918700b4c0424fa410dae9d02da987adb
SHA256ca4f3947d00669f8ccf3b954c47feb425c1ab037133fc348d4e24ec4fa1ac642
SHA5128cc595202229a256f3acdceb2f639abab2caed09ffc730f45aeb2c0f56197e7243afe6694e2d1bff2a1016fcbec23fc262e5d8dd6ccbc1f983d9daa253626ee0
-
Filesize
209KB
MD531e0d0388accc68bec9dd2b31c0fb6d6
SHA1a4b8de2918700b4c0424fa410dae9d02da987adb
SHA256ca4f3947d00669f8ccf3b954c47feb425c1ab037133fc348d4e24ec4fa1ac642
SHA5128cc595202229a256f3acdceb2f639abab2caed09ffc730f45aeb2c0f56197e7243afe6694e2d1bff2a1016fcbec23fc262e5d8dd6ccbc1f983d9daa253626ee0
-
Filesize
209KB
MD531e0d0388accc68bec9dd2b31c0fb6d6
SHA1a4b8de2918700b4c0424fa410dae9d02da987adb
SHA256ca4f3947d00669f8ccf3b954c47feb425c1ab037133fc348d4e24ec4fa1ac642
SHA5128cc595202229a256f3acdceb2f639abab2caed09ffc730f45aeb2c0f56197e7243afe6694e2d1bff2a1016fcbec23fc262e5d8dd6ccbc1f983d9daa253626ee0
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5