Analysis
-
max time kernel
144s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2023, 19:55
Static task
static1
Behavioral task
behavioral1
Sample
14fe1248f7cb77e9e29e7cc068d469aab7391c9507ad7173fc43a3bed79e3c90.exe
Resource
win10v2004-20230220-en
General
-
Target
14fe1248f7cb77e9e29e7cc068d469aab7391c9507ad7173fc43a3bed79e3c90.exe
-
Size
481KB
-
MD5
390df5b84c193b62b63d1fe3b5c42532
-
SHA1
ab7eab0c4378a4d9f9383b44397e6e13ba96635a
-
SHA256
14fe1248f7cb77e9e29e7cc068d469aab7391c9507ad7173fc43a3bed79e3c90
-
SHA512
61fb45d82d912eb149576d549037653081393c4326f25c9ef49b02851eef6c0a7000e2254dbf0bc6ce8aaa63d0ac8fe496f9f239ede9c7b7b98cc249d7ce0324
-
SSDEEP
12288:MMrhy90Bg+4zuQ3pE5Qbmeo/+BBWMrvhe:tyR3y5QnHYMrvhe
Malware Config
Extracted
redline
misar
217.196.96.101:4132
-
auth_value
069dd9eeee8cff502b661416888f692a
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a0134562.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a0134562.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a0134562.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a0134562.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a0134562.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a0134562.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation d3933034.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 6 IoCs
pid Process 1356 v9099830.exe 5020 a0134562.exe 4684 b5568254.exe 3900 d3933034.exe 1440 oneetx.exe 4656 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a0134562.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a0134562.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 14fe1248f7cb77e9e29e7cc068d469aab7391c9507ad7173fc43a3bed79e3c90.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 14fe1248f7cb77e9e29e7cc068d469aab7391c9507ad7173fc43a3bed79e3c90.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v9099830.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v9099830.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 368 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5020 a0134562.exe 5020 a0134562.exe 4684 b5568254.exe 4684 b5568254.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5020 a0134562.exe Token: SeDebugPrivilege 4684 b5568254.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3900 d3933034.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 3424 wrote to memory of 1356 3424 14fe1248f7cb77e9e29e7cc068d469aab7391c9507ad7173fc43a3bed79e3c90.exe 82 PID 3424 wrote to memory of 1356 3424 14fe1248f7cb77e9e29e7cc068d469aab7391c9507ad7173fc43a3bed79e3c90.exe 82 PID 3424 wrote to memory of 1356 3424 14fe1248f7cb77e9e29e7cc068d469aab7391c9507ad7173fc43a3bed79e3c90.exe 82 PID 1356 wrote to memory of 5020 1356 v9099830.exe 83 PID 1356 wrote to memory of 5020 1356 v9099830.exe 83 PID 1356 wrote to memory of 5020 1356 v9099830.exe 83 PID 1356 wrote to memory of 4684 1356 v9099830.exe 84 PID 1356 wrote to memory of 4684 1356 v9099830.exe 84 PID 1356 wrote to memory of 4684 1356 v9099830.exe 84 PID 3424 wrote to memory of 3900 3424 14fe1248f7cb77e9e29e7cc068d469aab7391c9507ad7173fc43a3bed79e3c90.exe 85 PID 3424 wrote to memory of 3900 3424 14fe1248f7cb77e9e29e7cc068d469aab7391c9507ad7173fc43a3bed79e3c90.exe 85 PID 3424 wrote to memory of 3900 3424 14fe1248f7cb77e9e29e7cc068d469aab7391c9507ad7173fc43a3bed79e3c90.exe 85 PID 3900 wrote to memory of 1440 3900 d3933034.exe 86 PID 3900 wrote to memory of 1440 3900 d3933034.exe 86 PID 3900 wrote to memory of 1440 3900 d3933034.exe 86 PID 1440 wrote to memory of 368 1440 oneetx.exe 87 PID 1440 wrote to memory of 368 1440 oneetx.exe 87 PID 1440 wrote to memory of 368 1440 oneetx.exe 87 PID 1440 wrote to memory of 4708 1440 oneetx.exe 89 PID 1440 wrote to memory of 4708 1440 oneetx.exe 89 PID 1440 wrote to memory of 4708 1440 oneetx.exe 89 PID 4708 wrote to memory of 676 4708 cmd.exe 91 PID 4708 wrote to memory of 676 4708 cmd.exe 91 PID 4708 wrote to memory of 676 4708 cmd.exe 91 PID 4708 wrote to memory of 3212 4708 cmd.exe 92 PID 4708 wrote to memory of 3212 4708 cmd.exe 92 PID 4708 wrote to memory of 3212 4708 cmd.exe 92 PID 4708 wrote to memory of 4192 4708 cmd.exe 93 PID 4708 wrote to memory of 4192 4708 cmd.exe 93 PID 4708 wrote to memory of 4192 4708 cmd.exe 93 PID 4708 wrote to memory of 1400 4708 cmd.exe 94 PID 4708 wrote to memory of 1400 4708 cmd.exe 94 PID 4708 wrote to memory of 1400 4708 cmd.exe 94 PID 4708 wrote to memory of 2836 4708 cmd.exe 95 PID 4708 wrote to memory of 2836 4708 cmd.exe 95 PID 4708 wrote to memory of 2836 4708 cmd.exe 95 PID 4708 wrote to memory of 3352 4708 cmd.exe 96 PID 4708 wrote to memory of 3352 4708 cmd.exe 96 PID 4708 wrote to memory of 3352 4708 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\14fe1248f7cb77e9e29e7cc068d469aab7391c9507ad7173fc43a3bed79e3c90.exe"C:\Users\Admin\AppData\Local\Temp\14fe1248f7cb77e9e29e7cc068d469aab7391c9507ad7173fc43a3bed79e3c90.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9099830.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9099830.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a0134562.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a0134562.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5020
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5568254.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5568254.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4684
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3933034.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3933034.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:368
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:676
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:3212
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4192
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1400
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:2836
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:3352
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4656
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD5e750fef85227c2b0a976e5ffe903a193
SHA1a0cfe946525dcd14ece8883b077cbed6a5b11aa7
SHA2563aebf7b9bfa08e0b17caa406f49c0979de5acf88693fafdfd2ca4555ef599e83
SHA5120b7ff18b648c7df717be6bcf5524bfa71b174bc63cf15b784324e8a3d24dcb8f0705e1545cd2df35f76c6d3ebae73160ff5a030f6099fa194dcd8606e4ec0dcd
-
Filesize
209KB
MD5e750fef85227c2b0a976e5ffe903a193
SHA1a0cfe946525dcd14ece8883b077cbed6a5b11aa7
SHA2563aebf7b9bfa08e0b17caa406f49c0979de5acf88693fafdfd2ca4555ef599e83
SHA5120b7ff18b648c7df717be6bcf5524bfa71b174bc63cf15b784324e8a3d24dcb8f0705e1545cd2df35f76c6d3ebae73160ff5a030f6099fa194dcd8606e4ec0dcd
-
Filesize
309KB
MD51f238c44d3612e53a5bec8963a8118a1
SHA1ba926ff11e8538e283e54af03f24dfbc8461ef08
SHA25687f09df7d4fe1a0e9b7a776e27e13ec46f04eafad1528eeb81a4226cb3318f2a
SHA512ea3506574b3ed179644b188ed141f2411f753fb22d7e916df75d3d723242e6e0ea5a5c17efc2f83aa11340939b8055d8ba6ff345d1498f05cec39b05c3d4acdb
-
Filesize
309KB
MD51f238c44d3612e53a5bec8963a8118a1
SHA1ba926ff11e8538e283e54af03f24dfbc8461ef08
SHA25687f09df7d4fe1a0e9b7a776e27e13ec46f04eafad1528eeb81a4226cb3318f2a
SHA512ea3506574b3ed179644b188ed141f2411f753fb22d7e916df75d3d723242e6e0ea5a5c17efc2f83aa11340939b8055d8ba6ff345d1498f05cec39b05c3d4acdb
-
Filesize
178KB
MD515de23d4cb9eeee02594d02bf078b732
SHA15fe9c0604c79130562435b0e7fea352c06ba339d
SHA2562eea59cbf1b0af3c68e8f7a96e052182e3e1eb4a28ee0a6318288a5de473729d
SHA512e81c6bd26cacc24f18652ea3925ef18622c3cb39ccebd22bf1c8901afc58b659dfe9b942dc68b0860c9ed17044d74eca1ac660df2309877e1be834ffc2150c13
-
Filesize
178KB
MD515de23d4cb9eeee02594d02bf078b732
SHA15fe9c0604c79130562435b0e7fea352c06ba339d
SHA2562eea59cbf1b0af3c68e8f7a96e052182e3e1eb4a28ee0a6318288a5de473729d
SHA512e81c6bd26cacc24f18652ea3925ef18622c3cb39ccebd22bf1c8901afc58b659dfe9b942dc68b0860c9ed17044d74eca1ac660df2309877e1be834ffc2150c13
-
Filesize
168KB
MD567eb60a95fc333a0218c7dbcbd4931eb
SHA1df3e2229536740fe85cca94f116bb201efd2416c
SHA2560ebb5824bde856b74c1233467ff1277909681f3388b1ff0875f239db2f47ee12
SHA512ccc5c3de0f84ee00adcdb7c2bfd6e9ff1dc04aa5146841aa68ef1d7994e25996d32f43bf7875e61dcefd096e1546933320d5c637586399d0242f93ea05c758ad
-
Filesize
168KB
MD567eb60a95fc333a0218c7dbcbd4931eb
SHA1df3e2229536740fe85cca94f116bb201efd2416c
SHA2560ebb5824bde856b74c1233467ff1277909681f3388b1ff0875f239db2f47ee12
SHA512ccc5c3de0f84ee00adcdb7c2bfd6e9ff1dc04aa5146841aa68ef1d7994e25996d32f43bf7875e61dcefd096e1546933320d5c637586399d0242f93ea05c758ad
-
Filesize
209KB
MD5e750fef85227c2b0a976e5ffe903a193
SHA1a0cfe946525dcd14ece8883b077cbed6a5b11aa7
SHA2563aebf7b9bfa08e0b17caa406f49c0979de5acf88693fafdfd2ca4555ef599e83
SHA5120b7ff18b648c7df717be6bcf5524bfa71b174bc63cf15b784324e8a3d24dcb8f0705e1545cd2df35f76c6d3ebae73160ff5a030f6099fa194dcd8606e4ec0dcd
-
Filesize
209KB
MD5e750fef85227c2b0a976e5ffe903a193
SHA1a0cfe946525dcd14ece8883b077cbed6a5b11aa7
SHA2563aebf7b9bfa08e0b17caa406f49c0979de5acf88693fafdfd2ca4555ef599e83
SHA5120b7ff18b648c7df717be6bcf5524bfa71b174bc63cf15b784324e8a3d24dcb8f0705e1545cd2df35f76c6d3ebae73160ff5a030f6099fa194dcd8606e4ec0dcd
-
Filesize
209KB
MD5e750fef85227c2b0a976e5ffe903a193
SHA1a0cfe946525dcd14ece8883b077cbed6a5b11aa7
SHA2563aebf7b9bfa08e0b17caa406f49c0979de5acf88693fafdfd2ca4555ef599e83
SHA5120b7ff18b648c7df717be6bcf5524bfa71b174bc63cf15b784324e8a3d24dcb8f0705e1545cd2df35f76c6d3ebae73160ff5a030f6099fa194dcd8606e4ec0dcd
-
Filesize
209KB
MD5e750fef85227c2b0a976e5ffe903a193
SHA1a0cfe946525dcd14ece8883b077cbed6a5b11aa7
SHA2563aebf7b9bfa08e0b17caa406f49c0979de5acf88693fafdfd2ca4555ef599e83
SHA5120b7ff18b648c7df717be6bcf5524bfa71b174bc63cf15b784324e8a3d24dcb8f0705e1545cd2df35f76c6d3ebae73160ff5a030f6099fa194dcd8606e4ec0dcd