Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2023, 19:08
Static task
static1
Behavioral task
behavioral1
Sample
03e145596a82f7a224c217768fa6dab43266ec809702047876a138355a218cc0.exe
Resource
win10v2004-20230220-en
General
-
Target
03e145596a82f7a224c217768fa6dab43266ec809702047876a138355a218cc0.exe
-
Size
481KB
-
MD5
9d6ed16abd6f62e6ee5a99316090f853
-
SHA1
98a68d052282fcafd4dc44e3b832330bc9669f32
-
SHA256
03e145596a82f7a224c217768fa6dab43266ec809702047876a138355a218cc0
-
SHA512
dc5d192ef835ba8cf397dd4a79072176f17dba1c9e4c029d65226586b70e44bce87567fe1f9ba13543a063f72b0ad1f00849946f8886c6f03c0a65e1abd6eb50
-
SSDEEP
12288:oMrZy900pUtIErgpU/JHWu6LlHilD0Ssxxlra:xyytIEroU/NGlAYl7a
Malware Config
Extracted
redline
misar
217.196.96.101:4132
-
auth_value
069dd9eeee8cff502b661416888f692a
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a2962054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a2962054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a2962054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a2962054.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a2962054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a2962054.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation d2518067.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 432 v3626810.exe 1248 a2962054.exe 1972 b3089025.exe 4244 d2518067.exe 2484 oneetx.exe 1608 oneetx.exe 2476 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3356 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a2962054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a2962054.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3626810.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3626810.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 03e145596a82f7a224c217768fa6dab43266ec809702047876a138355a218cc0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 03e145596a82f7a224c217768fa6dab43266ec809702047876a138355a218cc0.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4040 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1248 a2962054.exe 1248 a2962054.exe 1972 b3089025.exe 1972 b3089025.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1248 a2962054.exe Token: SeDebugPrivilege 1972 b3089025.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4244 d2518067.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4748 wrote to memory of 432 4748 03e145596a82f7a224c217768fa6dab43266ec809702047876a138355a218cc0.exe 86 PID 4748 wrote to memory of 432 4748 03e145596a82f7a224c217768fa6dab43266ec809702047876a138355a218cc0.exe 86 PID 4748 wrote to memory of 432 4748 03e145596a82f7a224c217768fa6dab43266ec809702047876a138355a218cc0.exe 86 PID 432 wrote to memory of 1248 432 v3626810.exe 87 PID 432 wrote to memory of 1248 432 v3626810.exe 87 PID 432 wrote to memory of 1248 432 v3626810.exe 87 PID 432 wrote to memory of 1972 432 v3626810.exe 88 PID 432 wrote to memory of 1972 432 v3626810.exe 88 PID 432 wrote to memory of 1972 432 v3626810.exe 88 PID 4748 wrote to memory of 4244 4748 03e145596a82f7a224c217768fa6dab43266ec809702047876a138355a218cc0.exe 90 PID 4748 wrote to memory of 4244 4748 03e145596a82f7a224c217768fa6dab43266ec809702047876a138355a218cc0.exe 90 PID 4748 wrote to memory of 4244 4748 03e145596a82f7a224c217768fa6dab43266ec809702047876a138355a218cc0.exe 90 PID 4244 wrote to memory of 2484 4244 d2518067.exe 91 PID 4244 wrote to memory of 2484 4244 d2518067.exe 91 PID 4244 wrote to memory of 2484 4244 d2518067.exe 91 PID 2484 wrote to memory of 4040 2484 oneetx.exe 92 PID 2484 wrote to memory of 4040 2484 oneetx.exe 92 PID 2484 wrote to memory of 4040 2484 oneetx.exe 92 PID 2484 wrote to memory of 3208 2484 oneetx.exe 94 PID 2484 wrote to memory of 3208 2484 oneetx.exe 94 PID 2484 wrote to memory of 3208 2484 oneetx.exe 94 PID 3208 wrote to memory of 4860 3208 cmd.exe 96 PID 3208 wrote to memory of 4860 3208 cmd.exe 96 PID 3208 wrote to memory of 4860 3208 cmd.exe 96 PID 3208 wrote to memory of 4888 3208 cmd.exe 97 PID 3208 wrote to memory of 4888 3208 cmd.exe 97 PID 3208 wrote to memory of 4888 3208 cmd.exe 97 PID 3208 wrote to memory of 2020 3208 cmd.exe 98 PID 3208 wrote to memory of 2020 3208 cmd.exe 98 PID 3208 wrote to memory of 2020 3208 cmd.exe 98 PID 3208 wrote to memory of 1392 3208 cmd.exe 99 PID 3208 wrote to memory of 1392 3208 cmd.exe 99 PID 3208 wrote to memory of 1392 3208 cmd.exe 99 PID 3208 wrote to memory of 2416 3208 cmd.exe 100 PID 3208 wrote to memory of 2416 3208 cmd.exe 100 PID 3208 wrote to memory of 2416 3208 cmd.exe 100 PID 3208 wrote to memory of 2352 3208 cmd.exe 101 PID 3208 wrote to memory of 2352 3208 cmd.exe 101 PID 3208 wrote to memory of 2352 3208 cmd.exe 101 PID 2484 wrote to memory of 3356 2484 oneetx.exe 105 PID 2484 wrote to memory of 3356 2484 oneetx.exe 105 PID 2484 wrote to memory of 3356 2484 oneetx.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\03e145596a82f7a224c217768fa6dab43266ec809702047876a138355a218cc0.exe"C:\Users\Admin\AppData\Local\Temp\03e145596a82f7a224c217768fa6dab43266ec809702047876a138355a218cc0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3626810.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3626810.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a2962054.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a2962054.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1248
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b3089025.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b3089025.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2518067.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2518067.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4040
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4860
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4888
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:2020
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1392
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:2416
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:2352
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3356
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1608
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2476
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD56b02fd856c8ed0288be9d09253684f6c
SHA18a22a638550cf1223b95cbda43333b951d58dc3d
SHA2563170ff6b900876cff5d410cf9e369448617798f6fcd8c7227f0f94cf03ac113d
SHA512be90f4a8cc6b4d09be4477741492914400fc278cdb9ea0c129b6f9b8a1d26e80945db79b0f77784b728ba16916b6aac6105508076cbf551f32e168d5ac7a238d
-
Filesize
209KB
MD56b02fd856c8ed0288be9d09253684f6c
SHA18a22a638550cf1223b95cbda43333b951d58dc3d
SHA2563170ff6b900876cff5d410cf9e369448617798f6fcd8c7227f0f94cf03ac113d
SHA512be90f4a8cc6b4d09be4477741492914400fc278cdb9ea0c129b6f9b8a1d26e80945db79b0f77784b728ba16916b6aac6105508076cbf551f32e168d5ac7a238d
-
Filesize
309KB
MD5d79809dd87553e7e5c75692cdc955068
SHA18e761ec10b3f03b865244e3b44940f54c64a8ee3
SHA2563bc3ec5a2b2736d2435159a3718530f970688b98d5098f37c80d2a1c296b5753
SHA512bc03cbc802e5fd1098d544f3e883b7c5e48e62e7197c0f43f70423fa2555a701a09252fe05d2e7d56f13dcd8bd769b6019cdc9032662c407e080d436fea965c2
-
Filesize
309KB
MD5d79809dd87553e7e5c75692cdc955068
SHA18e761ec10b3f03b865244e3b44940f54c64a8ee3
SHA2563bc3ec5a2b2736d2435159a3718530f970688b98d5098f37c80d2a1c296b5753
SHA512bc03cbc802e5fd1098d544f3e883b7c5e48e62e7197c0f43f70423fa2555a701a09252fe05d2e7d56f13dcd8bd769b6019cdc9032662c407e080d436fea965c2
-
Filesize
178KB
MD5bd56f8489486b88574f48b9cbf6e4f2c
SHA176b645c69bb339a017825e1f21d6e0c8a4910756
SHA2564b728da2c4b4645d09e5f30c73b8b99473e2045501c886312343ae1d1f020c57
SHA5122684499868019a2e6805d7f629ca205883ff78ec81d73419e2a85ccb366448270e4745bd1ad17ec760f15f1db8b231fffc9600284614c1e2d936a7e68e165d7e
-
Filesize
178KB
MD5bd56f8489486b88574f48b9cbf6e4f2c
SHA176b645c69bb339a017825e1f21d6e0c8a4910756
SHA2564b728da2c4b4645d09e5f30c73b8b99473e2045501c886312343ae1d1f020c57
SHA5122684499868019a2e6805d7f629ca205883ff78ec81d73419e2a85ccb366448270e4745bd1ad17ec760f15f1db8b231fffc9600284614c1e2d936a7e68e165d7e
-
Filesize
168KB
MD5bde063fba9190f27ed052a148c2a5a2b
SHA10dba07cea790db0b6fbffb3ccff97e581a8fab0f
SHA256352914f510969548bd29ff8fda574a64aca18f55cf351781af326fe72b3e5718
SHA512c6afe2e99a47cb7e1aca34baf6d75ba1f612c03b23646b26d48f0992bc5ef1dc5d69b32d02624433b743ca8b873faadd833487456cb442720cb930e45d297c7b
-
Filesize
168KB
MD5bde063fba9190f27ed052a148c2a5a2b
SHA10dba07cea790db0b6fbffb3ccff97e581a8fab0f
SHA256352914f510969548bd29ff8fda574a64aca18f55cf351781af326fe72b3e5718
SHA512c6afe2e99a47cb7e1aca34baf6d75ba1f612c03b23646b26d48f0992bc5ef1dc5d69b32d02624433b743ca8b873faadd833487456cb442720cb930e45d297c7b
-
Filesize
209KB
MD56b02fd856c8ed0288be9d09253684f6c
SHA18a22a638550cf1223b95cbda43333b951d58dc3d
SHA2563170ff6b900876cff5d410cf9e369448617798f6fcd8c7227f0f94cf03ac113d
SHA512be90f4a8cc6b4d09be4477741492914400fc278cdb9ea0c129b6f9b8a1d26e80945db79b0f77784b728ba16916b6aac6105508076cbf551f32e168d5ac7a238d
-
Filesize
209KB
MD56b02fd856c8ed0288be9d09253684f6c
SHA18a22a638550cf1223b95cbda43333b951d58dc3d
SHA2563170ff6b900876cff5d410cf9e369448617798f6fcd8c7227f0f94cf03ac113d
SHA512be90f4a8cc6b4d09be4477741492914400fc278cdb9ea0c129b6f9b8a1d26e80945db79b0f77784b728ba16916b6aac6105508076cbf551f32e168d5ac7a238d
-
Filesize
209KB
MD56b02fd856c8ed0288be9d09253684f6c
SHA18a22a638550cf1223b95cbda43333b951d58dc3d
SHA2563170ff6b900876cff5d410cf9e369448617798f6fcd8c7227f0f94cf03ac113d
SHA512be90f4a8cc6b4d09be4477741492914400fc278cdb9ea0c129b6f9b8a1d26e80945db79b0f77784b728ba16916b6aac6105508076cbf551f32e168d5ac7a238d
-
Filesize
209KB
MD56b02fd856c8ed0288be9d09253684f6c
SHA18a22a638550cf1223b95cbda43333b951d58dc3d
SHA2563170ff6b900876cff5d410cf9e369448617798f6fcd8c7227f0f94cf03ac113d
SHA512be90f4a8cc6b4d09be4477741492914400fc278cdb9ea0c129b6f9b8a1d26e80945db79b0f77784b728ba16916b6aac6105508076cbf551f32e168d5ac7a238d
-
Filesize
209KB
MD56b02fd856c8ed0288be9d09253684f6c
SHA18a22a638550cf1223b95cbda43333b951d58dc3d
SHA2563170ff6b900876cff5d410cf9e369448617798f6fcd8c7227f0f94cf03ac113d
SHA512be90f4a8cc6b4d09be4477741492914400fc278cdb9ea0c129b6f9b8a1d26e80945db79b0f77784b728ba16916b6aac6105508076cbf551f32e168d5ac7a238d
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5