Analysis
-
max time kernel
135s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2023, 17:40
Static task
static1
Behavioral task
behavioral1
Sample
41a11b259675a719925908109c63dccf36801253e2d86259ad8f3390ebbf87a5.exe
Resource
win10v2004-20230220-en
General
-
Target
41a11b259675a719925908109c63dccf36801253e2d86259ad8f3390ebbf87a5.exe
-
Size
480KB
-
MD5
992c91e809ea2953994ac005425b8a22
-
SHA1
43c64ecebac523c982a162f5adf80b99d360f73e
-
SHA256
41a11b259675a719925908109c63dccf36801253e2d86259ad8f3390ebbf87a5
-
SHA512
c2d160c0d0da26fdb5d6ab6bf73929f85861f3e749a8a8c23d29ac7a64281f63500643072d09e64db2a621f5b4a0f7b6457372400f4e9744a3002f28d07e704e
-
SSDEEP
12288:cMrfy90O9dyaATZVv0zRkhrN/5UvsUVD7c:byZgTjhr7UZB7c
Malware Config
Extracted
redline
misar
217.196.96.101:4132
-
auth_value
069dd9eeee8cff502b661416888f692a
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a2983423.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a2983423.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a2983423.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a2983423.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a2983423.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a2983423.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation d3038876.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 3744 v1738923.exe 2948 a2983423.exe 3660 b6060574.exe 3732 d3038876.exe 2396 oneetx.exe 3696 oneetx.exe 4328 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4396 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a2983423.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a2983423.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 41a11b259675a719925908109c63dccf36801253e2d86259ad8f3390ebbf87a5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 41a11b259675a719925908109c63dccf36801253e2d86259ad8f3390ebbf87a5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1738923.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v1738923.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 400 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2948 a2983423.exe 2948 a2983423.exe 3660 b6060574.exe 3660 b6060574.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2948 a2983423.exe Token: SeDebugPrivilege 3660 b6060574.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3732 d3038876.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 540 wrote to memory of 3744 540 41a11b259675a719925908109c63dccf36801253e2d86259ad8f3390ebbf87a5.exe 84 PID 540 wrote to memory of 3744 540 41a11b259675a719925908109c63dccf36801253e2d86259ad8f3390ebbf87a5.exe 84 PID 540 wrote to memory of 3744 540 41a11b259675a719925908109c63dccf36801253e2d86259ad8f3390ebbf87a5.exe 84 PID 3744 wrote to memory of 2948 3744 v1738923.exe 85 PID 3744 wrote to memory of 2948 3744 v1738923.exe 85 PID 3744 wrote to memory of 2948 3744 v1738923.exe 85 PID 3744 wrote to memory of 3660 3744 v1738923.exe 90 PID 3744 wrote to memory of 3660 3744 v1738923.exe 90 PID 3744 wrote to memory of 3660 3744 v1738923.exe 90 PID 540 wrote to memory of 3732 540 41a11b259675a719925908109c63dccf36801253e2d86259ad8f3390ebbf87a5.exe 94 PID 540 wrote to memory of 3732 540 41a11b259675a719925908109c63dccf36801253e2d86259ad8f3390ebbf87a5.exe 94 PID 540 wrote to memory of 3732 540 41a11b259675a719925908109c63dccf36801253e2d86259ad8f3390ebbf87a5.exe 94 PID 3732 wrote to memory of 2396 3732 d3038876.exe 96 PID 3732 wrote to memory of 2396 3732 d3038876.exe 96 PID 3732 wrote to memory of 2396 3732 d3038876.exe 96 PID 2396 wrote to memory of 400 2396 oneetx.exe 97 PID 2396 wrote to memory of 400 2396 oneetx.exe 97 PID 2396 wrote to memory of 400 2396 oneetx.exe 97 PID 2396 wrote to memory of 2992 2396 oneetx.exe 99 PID 2396 wrote to memory of 2992 2396 oneetx.exe 99 PID 2396 wrote to memory of 2992 2396 oneetx.exe 99 PID 2992 wrote to memory of 1600 2992 cmd.exe 101 PID 2992 wrote to memory of 1600 2992 cmd.exe 101 PID 2992 wrote to memory of 1600 2992 cmd.exe 101 PID 2992 wrote to memory of 1628 2992 cmd.exe 102 PID 2992 wrote to memory of 1628 2992 cmd.exe 102 PID 2992 wrote to memory of 1628 2992 cmd.exe 102 PID 2992 wrote to memory of 2668 2992 cmd.exe 103 PID 2992 wrote to memory of 2668 2992 cmd.exe 103 PID 2992 wrote to memory of 2668 2992 cmd.exe 103 PID 2992 wrote to memory of 3896 2992 cmd.exe 104 PID 2992 wrote to memory of 3896 2992 cmd.exe 104 PID 2992 wrote to memory of 3896 2992 cmd.exe 104 PID 2992 wrote to memory of 1452 2992 cmd.exe 105 PID 2992 wrote to memory of 1452 2992 cmd.exe 105 PID 2992 wrote to memory of 1452 2992 cmd.exe 105 PID 2992 wrote to memory of 2656 2992 cmd.exe 106 PID 2992 wrote to memory of 2656 2992 cmd.exe 106 PID 2992 wrote to memory of 2656 2992 cmd.exe 106 PID 2396 wrote to memory of 4396 2396 oneetx.exe 108 PID 2396 wrote to memory of 4396 2396 oneetx.exe 108 PID 2396 wrote to memory of 4396 2396 oneetx.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\41a11b259675a719925908109c63dccf36801253e2d86259ad8f3390ebbf87a5.exe"C:\Users\Admin\AppData\Local\Temp\41a11b259675a719925908109c63dccf36801253e2d86259ad8f3390ebbf87a5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1738923.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1738923.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a2983423.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a2983423.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6060574.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6060574.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3660
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3038876.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3038876.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:400
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1600
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1628
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:2668
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3896
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:1452
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:2656
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4396
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3696
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4328
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD59899999ce7ec178036d7a602fcc82872
SHA1cd76a288aae2a015db19a4631e68727a55496c9d
SHA256065e516f29408c157bbac98734a046b9805ffbdb293986ae9593191b64047b0f
SHA512c9f448f7e5e818559f6e9bc421ee50567d0430ddf56676c4fa15524b64a58a2af1f69143fdd5b4ca65907a1e9e8f9a031b00e058396ba18c57fd414a5403c250
-
Filesize
209KB
MD59899999ce7ec178036d7a602fcc82872
SHA1cd76a288aae2a015db19a4631e68727a55496c9d
SHA256065e516f29408c157bbac98734a046b9805ffbdb293986ae9593191b64047b0f
SHA512c9f448f7e5e818559f6e9bc421ee50567d0430ddf56676c4fa15524b64a58a2af1f69143fdd5b4ca65907a1e9e8f9a031b00e058396ba18c57fd414a5403c250
-
Filesize
309KB
MD572f01d374dcab30818080404055ce3c4
SHA1a6190a011c5d39023ec1303a72fc1513249de91e
SHA256980bd857dc9d1a8fe814e8db5ab91316bd4e4569a0b0d73098ef0064774c11e0
SHA512b8f7e4d3f70855da5512617264686eb337811a1fbbf9d22e1d9e1f46ad5e6827b6b8913ce7371d332da54b4bc39165e2917e85d8d76f0edb302103c5a2871221
-
Filesize
309KB
MD572f01d374dcab30818080404055ce3c4
SHA1a6190a011c5d39023ec1303a72fc1513249de91e
SHA256980bd857dc9d1a8fe814e8db5ab91316bd4e4569a0b0d73098ef0064774c11e0
SHA512b8f7e4d3f70855da5512617264686eb337811a1fbbf9d22e1d9e1f46ad5e6827b6b8913ce7371d332da54b4bc39165e2917e85d8d76f0edb302103c5a2871221
-
Filesize
178KB
MD5236e5838d83548a2653dc6044ff9bede
SHA1ecad934aca2b688118cdf05416ad12517acf1cad
SHA256cfbf21639da172eefad2a5d0a7f7eb45ccb7831123f6534c0b46145ce0c806cd
SHA5129400ffe90c9b5d306aa1e6ec9822ca91c4342e4fb6fb7fea5b95578682c2321b9c2b2c3749688e10cdfbcf972a0fdbc6af43105c0a0e2e89099589e4f0642f74
-
Filesize
178KB
MD5236e5838d83548a2653dc6044ff9bede
SHA1ecad934aca2b688118cdf05416ad12517acf1cad
SHA256cfbf21639da172eefad2a5d0a7f7eb45ccb7831123f6534c0b46145ce0c806cd
SHA5129400ffe90c9b5d306aa1e6ec9822ca91c4342e4fb6fb7fea5b95578682c2321b9c2b2c3749688e10cdfbcf972a0fdbc6af43105c0a0e2e89099589e4f0642f74
-
Filesize
168KB
MD579e68f5407d7d601f19651fc801813cf
SHA185e7d55cbe0fa8d4bc356c87ee68051849cb7560
SHA256ffdba2893804d597e81360ce28416aa8596cf9be23eec902d8947398347874b0
SHA512751aa3ce02b40e2f64dea8d6f5f3e8c49d49dba1b478eed3cf4109458f776b2cd33637a5f0423dccdbe3e4f28468929bac3542bca7388fc5cca04b9c4bea93ca
-
Filesize
168KB
MD579e68f5407d7d601f19651fc801813cf
SHA185e7d55cbe0fa8d4bc356c87ee68051849cb7560
SHA256ffdba2893804d597e81360ce28416aa8596cf9be23eec902d8947398347874b0
SHA512751aa3ce02b40e2f64dea8d6f5f3e8c49d49dba1b478eed3cf4109458f776b2cd33637a5f0423dccdbe3e4f28468929bac3542bca7388fc5cca04b9c4bea93ca
-
Filesize
209KB
MD59899999ce7ec178036d7a602fcc82872
SHA1cd76a288aae2a015db19a4631e68727a55496c9d
SHA256065e516f29408c157bbac98734a046b9805ffbdb293986ae9593191b64047b0f
SHA512c9f448f7e5e818559f6e9bc421ee50567d0430ddf56676c4fa15524b64a58a2af1f69143fdd5b4ca65907a1e9e8f9a031b00e058396ba18c57fd414a5403c250
-
Filesize
209KB
MD59899999ce7ec178036d7a602fcc82872
SHA1cd76a288aae2a015db19a4631e68727a55496c9d
SHA256065e516f29408c157bbac98734a046b9805ffbdb293986ae9593191b64047b0f
SHA512c9f448f7e5e818559f6e9bc421ee50567d0430ddf56676c4fa15524b64a58a2af1f69143fdd5b4ca65907a1e9e8f9a031b00e058396ba18c57fd414a5403c250
-
Filesize
209KB
MD59899999ce7ec178036d7a602fcc82872
SHA1cd76a288aae2a015db19a4631e68727a55496c9d
SHA256065e516f29408c157bbac98734a046b9805ffbdb293986ae9593191b64047b0f
SHA512c9f448f7e5e818559f6e9bc421ee50567d0430ddf56676c4fa15524b64a58a2af1f69143fdd5b4ca65907a1e9e8f9a031b00e058396ba18c57fd414a5403c250
-
Filesize
209KB
MD59899999ce7ec178036d7a602fcc82872
SHA1cd76a288aae2a015db19a4631e68727a55496c9d
SHA256065e516f29408c157bbac98734a046b9805ffbdb293986ae9593191b64047b0f
SHA512c9f448f7e5e818559f6e9bc421ee50567d0430ddf56676c4fa15524b64a58a2af1f69143fdd5b4ca65907a1e9e8f9a031b00e058396ba18c57fd414a5403c250
-
Filesize
209KB
MD59899999ce7ec178036d7a602fcc82872
SHA1cd76a288aae2a015db19a4631e68727a55496c9d
SHA256065e516f29408c157bbac98734a046b9805ffbdb293986ae9593191b64047b0f
SHA512c9f448f7e5e818559f6e9bc421ee50567d0430ddf56676c4fa15524b64a58a2af1f69143fdd5b4ca65907a1e9e8f9a031b00e058396ba18c57fd414a5403c250
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5