Analysis
-
max time kernel
168s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2023 21:13
Static task
static1
Behavioral task
behavioral1
Sample
93ea4438c63a8cc64da993d441b3dcd6eee7d2073eec0ed24702db61a03dbd2d.exe
Resource
win10v2004-20230220-en
General
-
Target
93ea4438c63a8cc64da993d441b3dcd6eee7d2073eec0ed24702db61a03dbd2d.exe
-
Size
479KB
-
MD5
8d0c4fc436236e0f5a17b12ce107ad7a
-
SHA1
78841389d51eccc9d875c305a2bb7edfd4ebe0d4
-
SHA256
93ea4438c63a8cc64da993d441b3dcd6eee7d2073eec0ed24702db61a03dbd2d
-
SHA512
663e056e00dfa9834bc96f9d75488226644316ba526b24e2ace540cf1aa3615aee059dd5261b3a2ebf169734811761b66223a4ef4ab8d1fd1fecdc268e7a0ee3
-
SSDEEP
12288:TMrCy90Y9qREsDh5VsWB28+tuFuCMAaLWP9XX34BD:FyWFNsfrMMtWHoBD
Malware Config
Extracted
redline
dion
217.196.96.101:4132
-
auth_value
6e0b6a3255923968b15f61a2c040c5c9
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k2238601.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k2238601.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k2238601.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k2238601.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k2238601.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k2238601.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation m0148533.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 5 IoCs
pid Process 4016 y8402240.exe 3828 k2238601.exe 2104 l1207004.exe 1908 m0148533.exe 4876 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k2238601.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k2238601.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 93ea4438c63a8cc64da993d441b3dcd6eee7d2073eec0ed24702db61a03dbd2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 93ea4438c63a8cc64da993d441b3dcd6eee7d2073eec0ed24702db61a03dbd2d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y8402240.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y8402240.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2208 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3828 k2238601.exe 3828 k2238601.exe 2104 l1207004.exe 2104 l1207004.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3828 k2238601.exe Token: SeDebugPrivilege 2104 l1207004.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1908 m0148533.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1312 wrote to memory of 4016 1312 93ea4438c63a8cc64da993d441b3dcd6eee7d2073eec0ed24702db61a03dbd2d.exe 82 PID 1312 wrote to memory of 4016 1312 93ea4438c63a8cc64da993d441b3dcd6eee7d2073eec0ed24702db61a03dbd2d.exe 82 PID 1312 wrote to memory of 4016 1312 93ea4438c63a8cc64da993d441b3dcd6eee7d2073eec0ed24702db61a03dbd2d.exe 82 PID 4016 wrote to memory of 3828 4016 y8402240.exe 83 PID 4016 wrote to memory of 3828 4016 y8402240.exe 83 PID 4016 wrote to memory of 3828 4016 y8402240.exe 83 PID 4016 wrote to memory of 2104 4016 y8402240.exe 84 PID 4016 wrote to memory of 2104 4016 y8402240.exe 84 PID 4016 wrote to memory of 2104 4016 y8402240.exe 84 PID 1312 wrote to memory of 1908 1312 93ea4438c63a8cc64da993d441b3dcd6eee7d2073eec0ed24702db61a03dbd2d.exe 86 PID 1312 wrote to memory of 1908 1312 93ea4438c63a8cc64da993d441b3dcd6eee7d2073eec0ed24702db61a03dbd2d.exe 86 PID 1312 wrote to memory of 1908 1312 93ea4438c63a8cc64da993d441b3dcd6eee7d2073eec0ed24702db61a03dbd2d.exe 86 PID 1908 wrote to memory of 4876 1908 m0148533.exe 87 PID 1908 wrote to memory of 4876 1908 m0148533.exe 87 PID 1908 wrote to memory of 4876 1908 m0148533.exe 87 PID 4876 wrote to memory of 2208 4876 oneetx.exe 88 PID 4876 wrote to memory of 2208 4876 oneetx.exe 88 PID 4876 wrote to memory of 2208 4876 oneetx.exe 88 PID 4876 wrote to memory of 2168 4876 oneetx.exe 90 PID 4876 wrote to memory of 2168 4876 oneetx.exe 90 PID 4876 wrote to memory of 2168 4876 oneetx.exe 90 PID 2168 wrote to memory of 4332 2168 cmd.exe 92 PID 2168 wrote to memory of 4332 2168 cmd.exe 92 PID 2168 wrote to memory of 4332 2168 cmd.exe 92 PID 2168 wrote to memory of 4464 2168 cmd.exe 93 PID 2168 wrote to memory of 4464 2168 cmd.exe 93 PID 2168 wrote to memory of 4464 2168 cmd.exe 93 PID 2168 wrote to memory of 2644 2168 cmd.exe 94 PID 2168 wrote to memory of 2644 2168 cmd.exe 94 PID 2168 wrote to memory of 2644 2168 cmd.exe 94 PID 2168 wrote to memory of 4364 2168 cmd.exe 95 PID 2168 wrote to memory of 4364 2168 cmd.exe 95 PID 2168 wrote to memory of 4364 2168 cmd.exe 95 PID 2168 wrote to memory of 1352 2168 cmd.exe 96 PID 2168 wrote to memory of 1352 2168 cmd.exe 96 PID 2168 wrote to memory of 1352 2168 cmd.exe 96 PID 2168 wrote to memory of 3396 2168 cmd.exe 97 PID 2168 wrote to memory of 3396 2168 cmd.exe 97 PID 2168 wrote to memory of 3396 2168 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\93ea4438c63a8cc64da993d441b3dcd6eee7d2073eec0ed24702db61a03dbd2d.exe"C:\Users\Admin\AppData\Local\Temp\93ea4438c63a8cc64da993d441b3dcd6eee7d2073eec0ed24702db61a03dbd2d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8402240.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8402240.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2238601.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2238601.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3828
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1207004.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1207004.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2104
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m0148533.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m0148533.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2208
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4332
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4464
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:2644
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4364
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:1352
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:3396
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD57148743ad11f521f3bbd626ec5f23a37
SHA120d63019f30d6104115c26892ab2e71a180071d4
SHA2567107b3f53501994efcd2f1c493d91911dd3c947abc20cd387f2c6986d4053cba
SHA5124103473fb3c4a1520a5891c1e12056ab4f773449e10cdd3cd65cc18481c57c7c5d96de68ffbd45bad09712b3d6fe6e08a459c5b347dc34b13cf851229b4b3863
-
Filesize
209KB
MD57148743ad11f521f3bbd626ec5f23a37
SHA120d63019f30d6104115c26892ab2e71a180071d4
SHA2567107b3f53501994efcd2f1c493d91911dd3c947abc20cd387f2c6986d4053cba
SHA5124103473fb3c4a1520a5891c1e12056ab4f773449e10cdd3cd65cc18481c57c7c5d96de68ffbd45bad09712b3d6fe6e08a459c5b347dc34b13cf851229b4b3863
-
Filesize
307KB
MD5e38dc49005f008ff5e0bed03d09da573
SHA11896f506d0bdb73b043c379f3de9417a02702add
SHA2569339b0b31c1a474269891550005d99f925b6fdcbf1185cd1a2c833431317de15
SHA51257eac59795902e29edd06d63ef4a017167fee6abafc804fecac2dc625ef27ee291fb8ce8fb80c498fa3db8b38035d1efcafd5affc4f8e25392d3065a6603f0c5
-
Filesize
307KB
MD5e38dc49005f008ff5e0bed03d09da573
SHA11896f506d0bdb73b043c379f3de9417a02702add
SHA2569339b0b31c1a474269891550005d99f925b6fdcbf1185cd1a2c833431317de15
SHA51257eac59795902e29edd06d63ef4a017167fee6abafc804fecac2dc625ef27ee291fb8ce8fb80c498fa3db8b38035d1efcafd5affc4f8e25392d3065a6603f0c5
-
Filesize
178KB
MD52cf4759bca404dca7592348b8508fd29
SHA1dc02a065d172fab2e3cb9f0855bcc770dcdfdf5d
SHA2560b28efedb6d77e8600e677c7ddc2dff9b735b9286fcf91126e3103f92793ba3c
SHA512b46972f56fbd32ec34dc3d1b60ad11f67c8260a7de75ce2aaf9d24ef79766304d227269863c581b1ec9e0b582e543ebdfcc6cedd6d8dcba67fef76b398d0008c
-
Filesize
178KB
MD52cf4759bca404dca7592348b8508fd29
SHA1dc02a065d172fab2e3cb9f0855bcc770dcdfdf5d
SHA2560b28efedb6d77e8600e677c7ddc2dff9b735b9286fcf91126e3103f92793ba3c
SHA512b46972f56fbd32ec34dc3d1b60ad11f67c8260a7de75ce2aaf9d24ef79766304d227269863c581b1ec9e0b582e543ebdfcc6cedd6d8dcba67fef76b398d0008c
-
Filesize
168KB
MD541b0201f3e149745b5b29dfc115631ff
SHA1470a45782828f72690afa1beb7270979aa68a158
SHA2568505804d78eb843455c0197b929b8c0f8f8d0c502ec136ca73ac139fa79af72e
SHA5128bff973b484d656468971936a3ac8ef06beca3ebd27fd5705ada4d816ab593a03dc61a73a7757cb75cbce3092a2cc2659d620f6dbf09a58b8b5c9a82e1af63e5
-
Filesize
168KB
MD541b0201f3e149745b5b29dfc115631ff
SHA1470a45782828f72690afa1beb7270979aa68a158
SHA2568505804d78eb843455c0197b929b8c0f8f8d0c502ec136ca73ac139fa79af72e
SHA5128bff973b484d656468971936a3ac8ef06beca3ebd27fd5705ada4d816ab593a03dc61a73a7757cb75cbce3092a2cc2659d620f6dbf09a58b8b5c9a82e1af63e5
-
Filesize
209KB
MD57148743ad11f521f3bbd626ec5f23a37
SHA120d63019f30d6104115c26892ab2e71a180071d4
SHA2567107b3f53501994efcd2f1c493d91911dd3c947abc20cd387f2c6986d4053cba
SHA5124103473fb3c4a1520a5891c1e12056ab4f773449e10cdd3cd65cc18481c57c7c5d96de68ffbd45bad09712b3d6fe6e08a459c5b347dc34b13cf851229b4b3863
-
Filesize
209KB
MD57148743ad11f521f3bbd626ec5f23a37
SHA120d63019f30d6104115c26892ab2e71a180071d4
SHA2567107b3f53501994efcd2f1c493d91911dd3c947abc20cd387f2c6986d4053cba
SHA5124103473fb3c4a1520a5891c1e12056ab4f773449e10cdd3cd65cc18481c57c7c5d96de68ffbd45bad09712b3d6fe6e08a459c5b347dc34b13cf851229b4b3863
-
Filesize
209KB
MD57148743ad11f521f3bbd626ec5f23a37
SHA120d63019f30d6104115c26892ab2e71a180071d4
SHA2567107b3f53501994efcd2f1c493d91911dd3c947abc20cd387f2c6986d4053cba
SHA5124103473fb3c4a1520a5891c1e12056ab4f773449e10cdd3cd65cc18481c57c7c5d96de68ffbd45bad09712b3d6fe6e08a459c5b347dc34b13cf851229b4b3863