Analysis

  • max time kernel
    168s
  • max time network
    186s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-05-2023 21:13

General

  • Target

    93ea4438c63a8cc64da993d441b3dcd6eee7d2073eec0ed24702db61a03dbd2d.exe

  • Size

    479KB

  • MD5

    8d0c4fc436236e0f5a17b12ce107ad7a

  • SHA1

    78841389d51eccc9d875c305a2bb7edfd4ebe0d4

  • SHA256

    93ea4438c63a8cc64da993d441b3dcd6eee7d2073eec0ed24702db61a03dbd2d

  • SHA512

    663e056e00dfa9834bc96f9d75488226644316ba526b24e2ace540cf1aa3615aee059dd5261b3a2ebf169734811761b66223a4ef4ab8d1fd1fecdc268e7a0ee3

  • SSDEEP

    12288:TMrCy90Y9qREsDh5VsWB28+tuFuCMAaLWP9XX34BD:FyWFNsfrMMtWHoBD

Malware Config

Extracted

Family

redline

Botnet

dion

C2

217.196.96.101:4132

Attributes
  • auth_value

    6e0b6a3255923968b15f61a2c040c5c9

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\93ea4438c63a8cc64da993d441b3dcd6eee7d2073eec0ed24702db61a03dbd2d.exe
    "C:\Users\Admin\AppData\Local\Temp\93ea4438c63a8cc64da993d441b3dcd6eee7d2073eec0ed24702db61a03dbd2d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8402240.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8402240.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4016
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2238601.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2238601.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3828
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1207004.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1207004.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2104
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m0148533.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m0148533.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1908
      • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4876
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:2208
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2168
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:4332
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:N"
              5⤵
                PID:4464
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                5⤵
                  PID:2644
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4364
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\c3912af058" /P "Admin:N"
                    5⤵
                      PID:1352
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\c3912af058" /P "Admin:R" /E
                      5⤵
                        PID:3396

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m0148533.exe

                Filesize

                209KB

                MD5

                7148743ad11f521f3bbd626ec5f23a37

                SHA1

                20d63019f30d6104115c26892ab2e71a180071d4

                SHA256

                7107b3f53501994efcd2f1c493d91911dd3c947abc20cd387f2c6986d4053cba

                SHA512

                4103473fb3c4a1520a5891c1e12056ab4f773449e10cdd3cd65cc18481c57c7c5d96de68ffbd45bad09712b3d6fe6e08a459c5b347dc34b13cf851229b4b3863

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m0148533.exe

                Filesize

                209KB

                MD5

                7148743ad11f521f3bbd626ec5f23a37

                SHA1

                20d63019f30d6104115c26892ab2e71a180071d4

                SHA256

                7107b3f53501994efcd2f1c493d91911dd3c947abc20cd387f2c6986d4053cba

                SHA512

                4103473fb3c4a1520a5891c1e12056ab4f773449e10cdd3cd65cc18481c57c7c5d96de68ffbd45bad09712b3d6fe6e08a459c5b347dc34b13cf851229b4b3863

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8402240.exe

                Filesize

                307KB

                MD5

                e38dc49005f008ff5e0bed03d09da573

                SHA1

                1896f506d0bdb73b043c379f3de9417a02702add

                SHA256

                9339b0b31c1a474269891550005d99f925b6fdcbf1185cd1a2c833431317de15

                SHA512

                57eac59795902e29edd06d63ef4a017167fee6abafc804fecac2dc625ef27ee291fb8ce8fb80c498fa3db8b38035d1efcafd5affc4f8e25392d3065a6603f0c5

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8402240.exe

                Filesize

                307KB

                MD5

                e38dc49005f008ff5e0bed03d09da573

                SHA1

                1896f506d0bdb73b043c379f3de9417a02702add

                SHA256

                9339b0b31c1a474269891550005d99f925b6fdcbf1185cd1a2c833431317de15

                SHA512

                57eac59795902e29edd06d63ef4a017167fee6abafc804fecac2dc625ef27ee291fb8ce8fb80c498fa3db8b38035d1efcafd5affc4f8e25392d3065a6603f0c5

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2238601.exe

                Filesize

                178KB

                MD5

                2cf4759bca404dca7592348b8508fd29

                SHA1

                dc02a065d172fab2e3cb9f0855bcc770dcdfdf5d

                SHA256

                0b28efedb6d77e8600e677c7ddc2dff9b735b9286fcf91126e3103f92793ba3c

                SHA512

                b46972f56fbd32ec34dc3d1b60ad11f67c8260a7de75ce2aaf9d24ef79766304d227269863c581b1ec9e0b582e543ebdfcc6cedd6d8dcba67fef76b398d0008c

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2238601.exe

                Filesize

                178KB

                MD5

                2cf4759bca404dca7592348b8508fd29

                SHA1

                dc02a065d172fab2e3cb9f0855bcc770dcdfdf5d

                SHA256

                0b28efedb6d77e8600e677c7ddc2dff9b735b9286fcf91126e3103f92793ba3c

                SHA512

                b46972f56fbd32ec34dc3d1b60ad11f67c8260a7de75ce2aaf9d24ef79766304d227269863c581b1ec9e0b582e543ebdfcc6cedd6d8dcba67fef76b398d0008c

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1207004.exe

                Filesize

                168KB

                MD5

                41b0201f3e149745b5b29dfc115631ff

                SHA1

                470a45782828f72690afa1beb7270979aa68a158

                SHA256

                8505804d78eb843455c0197b929b8c0f8f8d0c502ec136ca73ac139fa79af72e

                SHA512

                8bff973b484d656468971936a3ac8ef06beca3ebd27fd5705ada4d816ab593a03dc61a73a7757cb75cbce3092a2cc2659d620f6dbf09a58b8b5c9a82e1af63e5

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1207004.exe

                Filesize

                168KB

                MD5

                41b0201f3e149745b5b29dfc115631ff

                SHA1

                470a45782828f72690afa1beb7270979aa68a158

                SHA256

                8505804d78eb843455c0197b929b8c0f8f8d0c502ec136ca73ac139fa79af72e

                SHA512

                8bff973b484d656468971936a3ac8ef06beca3ebd27fd5705ada4d816ab593a03dc61a73a7757cb75cbce3092a2cc2659d620f6dbf09a58b8b5c9a82e1af63e5

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                209KB

                MD5

                7148743ad11f521f3bbd626ec5f23a37

                SHA1

                20d63019f30d6104115c26892ab2e71a180071d4

                SHA256

                7107b3f53501994efcd2f1c493d91911dd3c947abc20cd387f2c6986d4053cba

                SHA512

                4103473fb3c4a1520a5891c1e12056ab4f773449e10cdd3cd65cc18481c57c7c5d96de68ffbd45bad09712b3d6fe6e08a459c5b347dc34b13cf851229b4b3863

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                209KB

                MD5

                7148743ad11f521f3bbd626ec5f23a37

                SHA1

                20d63019f30d6104115c26892ab2e71a180071d4

                SHA256

                7107b3f53501994efcd2f1c493d91911dd3c947abc20cd387f2c6986d4053cba

                SHA512

                4103473fb3c4a1520a5891c1e12056ab4f773449e10cdd3cd65cc18481c57c7c5d96de68ffbd45bad09712b3d6fe6e08a459c5b347dc34b13cf851229b4b3863

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                209KB

                MD5

                7148743ad11f521f3bbd626ec5f23a37

                SHA1

                20d63019f30d6104115c26892ab2e71a180071d4

                SHA256

                7107b3f53501994efcd2f1c493d91911dd3c947abc20cd387f2c6986d4053cba

                SHA512

                4103473fb3c4a1520a5891c1e12056ab4f773449e10cdd3cd65cc18481c57c7c5d96de68ffbd45bad09712b3d6fe6e08a459c5b347dc34b13cf851229b4b3863

              • memory/2104-196-0x000000000B260000-0x000000000B2B0000-memory.dmp

                Filesize

                320KB

              • memory/2104-197-0x000000000C610000-0x000000000C7D2000-memory.dmp

                Filesize

                1.8MB

              • memory/2104-195-0x00000000030B0000-0x0000000003116000-memory.dmp

                Filesize

                408KB

              • memory/2104-194-0x0000000003010000-0x00000000030A2000-memory.dmp

                Filesize

                584KB

              • memory/2104-193-0x0000000002EF0000-0x0000000002F66000-memory.dmp

                Filesize

                472KB

              • memory/2104-192-0x0000000005910000-0x0000000005920000-memory.dmp

                Filesize

                64KB

              • memory/2104-191-0x0000000005910000-0x0000000005920000-memory.dmp

                Filesize

                64KB

              • memory/2104-190-0x000000000ADC0000-0x000000000ADFC000-memory.dmp

                Filesize

                240KB

              • memory/2104-189-0x000000000AD60000-0x000000000AD72000-memory.dmp

                Filesize

                72KB

              • memory/2104-188-0x000000000AE30000-0x000000000AF3A000-memory.dmp

                Filesize

                1.0MB

              • memory/2104-187-0x000000000B2C0000-0x000000000B8D8000-memory.dmp

                Filesize

                6.1MB

              • memory/2104-186-0x0000000000EB0000-0x0000000000EE0000-memory.dmp

                Filesize

                192KB

              • memory/2104-198-0x000000000CD10000-0x000000000D23C000-memory.dmp

                Filesize

                5.2MB

              • memory/3828-159-0x0000000004960000-0x0000000004972000-memory.dmp

                Filesize

                72KB

              • memory/3828-181-0x0000000004B00000-0x0000000004B10000-memory.dmp

                Filesize

                64KB

              • memory/3828-180-0x0000000004B00000-0x0000000004B10000-memory.dmp

                Filesize

                64KB

              • memory/3828-179-0x0000000004B00000-0x0000000004B10000-memory.dmp

                Filesize

                64KB

              • memory/3828-178-0x0000000004960000-0x0000000004972000-memory.dmp

                Filesize

                72KB

              • memory/3828-176-0x0000000004960000-0x0000000004972000-memory.dmp

                Filesize

                72KB

              • memory/3828-174-0x0000000004960000-0x0000000004972000-memory.dmp

                Filesize

                72KB

              • memory/3828-172-0x0000000004960000-0x0000000004972000-memory.dmp

                Filesize

                72KB

              • memory/3828-170-0x0000000004B00000-0x0000000004B10000-memory.dmp

                Filesize

                64KB

              • memory/3828-171-0x0000000004B00000-0x0000000004B10000-memory.dmp

                Filesize

                64KB

              • memory/3828-167-0x0000000004960000-0x0000000004972000-memory.dmp

                Filesize

                72KB

              • memory/3828-168-0x0000000004B00000-0x0000000004B10000-memory.dmp

                Filesize

                64KB

              • memory/3828-165-0x0000000004960000-0x0000000004972000-memory.dmp

                Filesize

                72KB

              • memory/3828-163-0x0000000004960000-0x0000000004972000-memory.dmp

                Filesize

                72KB

              • memory/3828-161-0x0000000004960000-0x0000000004972000-memory.dmp

                Filesize

                72KB

              • memory/3828-157-0x0000000004960000-0x0000000004972000-memory.dmp

                Filesize

                72KB

              • memory/3828-155-0x0000000004960000-0x0000000004972000-memory.dmp

                Filesize

                72KB

              • memory/3828-153-0x0000000004960000-0x0000000004972000-memory.dmp

                Filesize

                72KB

              • memory/3828-151-0x0000000004960000-0x0000000004972000-memory.dmp

                Filesize

                72KB

              • memory/3828-148-0x0000000004960000-0x0000000004972000-memory.dmp

                Filesize

                72KB

              • memory/3828-149-0x0000000004960000-0x0000000004972000-memory.dmp

                Filesize

                72KB

              • memory/3828-147-0x0000000004B10000-0x00000000050B4000-memory.dmp

                Filesize

                5.6MB