Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/05/2023, 22:05

General

  • Target

    dc926720078fc30a9468e3e0ccd893556e49e8671f2db32b58f07b738435aec5.exe

  • Size

    479KB

  • MD5

    67e99eb3e641e0e54df748de9289eeac

  • SHA1

    7605d81f54a46f9d79509a8e20369a8222491da2

  • SHA256

    dc926720078fc30a9468e3e0ccd893556e49e8671f2db32b58f07b738435aec5

  • SHA512

    7b14dd239b3569289a2ad49fcb64611a67d721f5ccfd77c1d38c55b66fd8ec7a6f062d57ec583c32103c5526b49b03fc561c76f85d295bb82a1cfe5231446963

  • SSDEEP

    12288:nMryy90kOhxY+D6uMCCrgPNxEcUSaPF0P/7O:Vy9OhWxCCgNxEcx6F66

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dc926720078fc30a9468e3e0ccd893556e49e8671f2db32b58f07b738435aec5.exe
    "C:\Users\Admin\AppData\Local\Temp\dc926720078fc30a9468e3e0ccd893556e49e8671f2db32b58f07b738435aec5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3387746.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3387746.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4916
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9545624.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9545624.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3804
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4274044.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4274044.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4984
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5041463.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5041463.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2208
      • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3952
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:368
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:376
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:2524
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:N"
              5⤵
                PID:2040
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                5⤵
                  PID:4140
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:3008
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\c3912af058" /P "Admin:N"
                    5⤵
                      PID:2296
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\c3912af058" /P "Admin:R" /E
                      5⤵
                        PID:5040
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:2320
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:1792
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:656

              Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5041463.exe

                      Filesize

                      210KB

                      MD5

                      17a1ac9f6a5412cc6c00af58d76157f7

                      SHA1

                      c31c25d4548b7925824f17c14dc4981f19a63c52

                      SHA256

                      a694650415c7b2b978856bdf543bf643033cc0ae6fedbf4a4514b184bfd3c457

                      SHA512

                      32c27ef3ba1f020869fee45ff58143934d2e55381d008a45bd956dbb249a724400e083a1e8f7f51332f841212286830a85011825280eb43b301d20c05457505e

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5041463.exe

                      Filesize

                      210KB

                      MD5

                      17a1ac9f6a5412cc6c00af58d76157f7

                      SHA1

                      c31c25d4548b7925824f17c14dc4981f19a63c52

                      SHA256

                      a694650415c7b2b978856bdf543bf643033cc0ae6fedbf4a4514b184bfd3c457

                      SHA512

                      32c27ef3ba1f020869fee45ff58143934d2e55381d008a45bd956dbb249a724400e083a1e8f7f51332f841212286830a85011825280eb43b301d20c05457505e

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3387746.exe

                      Filesize

                      307KB

                      MD5

                      9eec5e28a3facd3778a0c1b92ed40cd6

                      SHA1

                      4e02f80d17ce2428685c54d027b0e8b05acab10a

                      SHA256

                      4a9b1f98cfefe131f93c98250e4dcb9f17145d711b8991e6796f177ff4ffb02a

                      SHA512

                      5eeee36e26b0dd08ecfe90ae5422966164207deb020497706703399fa3f9d347650854bbef6359b314a4fc6f7ad81e5c230da2988e7ba2a4e411b70339d90ac2

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3387746.exe

                      Filesize

                      307KB

                      MD5

                      9eec5e28a3facd3778a0c1b92ed40cd6

                      SHA1

                      4e02f80d17ce2428685c54d027b0e8b05acab10a

                      SHA256

                      4a9b1f98cfefe131f93c98250e4dcb9f17145d711b8991e6796f177ff4ffb02a

                      SHA512

                      5eeee36e26b0dd08ecfe90ae5422966164207deb020497706703399fa3f9d347650854bbef6359b314a4fc6f7ad81e5c230da2988e7ba2a4e411b70339d90ac2

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9545624.exe

                      Filesize

                      168KB

                      MD5

                      bebc2486599621aa348aca975a753c59

                      SHA1

                      a658d71a8048616af30ed2d939c51a35622c202b

                      SHA256

                      e0311ddd7a1b74f6f86a32bd793802765c5efbdbd12fa32bbe7ac364f6c096f1

                      SHA512

                      0ceb9583836d9a4edc03428ef9562d807ce408e9ad9aa977f6c659da68ab777f539d60ed5ddf3cb81088f0f93a63f8e9380c8a2c4c49a9d873aa62b00b4272d3

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9545624.exe

                      Filesize

                      168KB

                      MD5

                      bebc2486599621aa348aca975a753c59

                      SHA1

                      a658d71a8048616af30ed2d939c51a35622c202b

                      SHA256

                      e0311ddd7a1b74f6f86a32bd793802765c5efbdbd12fa32bbe7ac364f6c096f1

                      SHA512

                      0ceb9583836d9a4edc03428ef9562d807ce408e9ad9aa977f6c659da68ab777f539d60ed5ddf3cb81088f0f93a63f8e9380c8a2c4c49a9d873aa62b00b4272d3

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4274044.exe

                      Filesize

                      180KB

                      MD5

                      4105dd921cd11412a229f598dea04381

                      SHA1

                      b7a6b2977f69b022da3a06ab9ce22e4b0af8ce11

                      SHA256

                      68afad710d056e16e0cca099b6ccd12b20332944cc2579599a51885b7c5cca67

                      SHA512

                      c02ebb78e62970aa336b4ee82f7ee3265e1c02d7cc432c55e7c0c60caf00b25dc9d015829cda727129007ff596965551a1441d02e1488a3ec94df258fa93431d

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4274044.exe

                      Filesize

                      180KB

                      MD5

                      4105dd921cd11412a229f598dea04381

                      SHA1

                      b7a6b2977f69b022da3a06ab9ce22e4b0af8ce11

                      SHA256

                      68afad710d056e16e0cca099b6ccd12b20332944cc2579599a51885b7c5cca67

                      SHA512

                      c02ebb78e62970aa336b4ee82f7ee3265e1c02d7cc432c55e7c0c60caf00b25dc9d015829cda727129007ff596965551a1441d02e1488a3ec94df258fa93431d

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      210KB

                      MD5

                      17a1ac9f6a5412cc6c00af58d76157f7

                      SHA1

                      c31c25d4548b7925824f17c14dc4981f19a63c52

                      SHA256

                      a694650415c7b2b978856bdf543bf643033cc0ae6fedbf4a4514b184bfd3c457

                      SHA512

                      32c27ef3ba1f020869fee45ff58143934d2e55381d008a45bd956dbb249a724400e083a1e8f7f51332f841212286830a85011825280eb43b301d20c05457505e

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      210KB

                      MD5

                      17a1ac9f6a5412cc6c00af58d76157f7

                      SHA1

                      c31c25d4548b7925824f17c14dc4981f19a63c52

                      SHA256

                      a694650415c7b2b978856bdf543bf643033cc0ae6fedbf4a4514b184bfd3c457

                      SHA512

                      32c27ef3ba1f020869fee45ff58143934d2e55381d008a45bd956dbb249a724400e083a1e8f7f51332f841212286830a85011825280eb43b301d20c05457505e

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      210KB

                      MD5

                      17a1ac9f6a5412cc6c00af58d76157f7

                      SHA1

                      c31c25d4548b7925824f17c14dc4981f19a63c52

                      SHA256

                      a694650415c7b2b978856bdf543bf643033cc0ae6fedbf4a4514b184bfd3c457

                      SHA512

                      32c27ef3ba1f020869fee45ff58143934d2e55381d008a45bd956dbb249a724400e083a1e8f7f51332f841212286830a85011825280eb43b301d20c05457505e

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      210KB

                      MD5

                      17a1ac9f6a5412cc6c00af58d76157f7

                      SHA1

                      c31c25d4548b7925824f17c14dc4981f19a63c52

                      SHA256

                      a694650415c7b2b978856bdf543bf643033cc0ae6fedbf4a4514b184bfd3c457

                      SHA512

                      32c27ef3ba1f020869fee45ff58143934d2e55381d008a45bd956dbb249a724400e083a1e8f7f51332f841212286830a85011825280eb43b301d20c05457505e

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      210KB

                      MD5

                      17a1ac9f6a5412cc6c00af58d76157f7

                      SHA1

                      c31c25d4548b7925824f17c14dc4981f19a63c52

                      SHA256

                      a694650415c7b2b978856bdf543bf643033cc0ae6fedbf4a4514b184bfd3c457

                      SHA512

                      32c27ef3ba1f020869fee45ff58143934d2e55381d008a45bd956dbb249a724400e083a1e8f7f51332f841212286830a85011825280eb43b301d20c05457505e

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      8451a2c5daa42b25333b1b2089c5ea39

                      SHA1

                      700cc99ec8d3113435e657070d2d6bde0a833adc

                      SHA256

                      b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                      SHA512

                      6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      8451a2c5daa42b25333b1b2089c5ea39

                      SHA1

                      700cc99ec8d3113435e657070d2d6bde0a833adc

                      SHA256

                      b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                      SHA512

                      6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      8451a2c5daa42b25333b1b2089c5ea39

                      SHA1

                      700cc99ec8d3113435e657070d2d6bde0a833adc

                      SHA256

                      b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                      SHA512

                      6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                      Filesize

                      162B

                      MD5

                      1b7c22a214949975556626d7217e9a39

                      SHA1

                      d01c97e2944166ed23e47e4a62ff471ab8fa031f

                      SHA256

                      340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                      SHA512

                      ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                    • memory/3804-150-0x0000000009EE0000-0x0000000009EF2000-memory.dmp

                      Filesize

                      72KB

                    • memory/3804-160-0x0000000004920000-0x0000000004930000-memory.dmp

                      Filesize

                      64KB

                    • memory/3804-159-0x000000000B080000-0x000000000B0D0000-memory.dmp

                      Filesize

                      320KB

                    • memory/3804-158-0x000000000BF20000-0x000000000C44C000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/3804-157-0x000000000B140000-0x000000000B302000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/3804-156-0x000000000B440000-0x000000000B9E4000-memory.dmp

                      Filesize

                      5.6MB

                    • memory/3804-155-0x000000000A2D0000-0x000000000A336000-memory.dmp

                      Filesize

                      408KB

                    • memory/3804-154-0x000000000A370000-0x000000000A402000-memory.dmp

                      Filesize

                      584KB

                    • memory/3804-153-0x000000000A250000-0x000000000A2C6000-memory.dmp

                      Filesize

                      472KB

                    • memory/3804-152-0x0000000004920000-0x0000000004930000-memory.dmp

                      Filesize

                      64KB

                    • memory/3804-151-0x0000000009F40000-0x0000000009F7C000-memory.dmp

                      Filesize

                      240KB

                    • memory/3804-149-0x0000000009FB0000-0x000000000A0BA000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/3804-148-0x000000000A430000-0x000000000AA48000-memory.dmp

                      Filesize

                      6.1MB

                    • memory/3804-147-0x0000000000170000-0x00000000001A0000-memory.dmp

                      Filesize

                      192KB

                    • memory/4984-176-0x0000000004950000-0x0000000004962000-memory.dmp

                      Filesize

                      72KB

                    • memory/4984-188-0x0000000004950000-0x0000000004962000-memory.dmp

                      Filesize

                      72KB

                    • memory/4984-190-0x0000000004950000-0x0000000004962000-memory.dmp

                      Filesize

                      72KB

                    • memory/4984-192-0x0000000004950000-0x0000000004962000-memory.dmp

                      Filesize

                      72KB

                    • memory/4984-193-0x00000000049A0000-0x00000000049B0000-memory.dmp

                      Filesize

                      64KB

                    • memory/4984-194-0x00000000049A0000-0x00000000049B0000-memory.dmp

                      Filesize

                      64KB

                    • memory/4984-195-0x00000000049A0000-0x00000000049B0000-memory.dmp

                      Filesize

                      64KB

                    • memory/4984-186-0x0000000004950000-0x0000000004962000-memory.dmp

                      Filesize

                      72KB

                    • memory/4984-184-0x0000000004950000-0x0000000004962000-memory.dmp

                      Filesize

                      72KB

                    • memory/4984-182-0x0000000004950000-0x0000000004962000-memory.dmp

                      Filesize

                      72KB

                    • memory/4984-180-0x0000000004950000-0x0000000004962000-memory.dmp

                      Filesize

                      72KB

                    • memory/4984-178-0x0000000004950000-0x0000000004962000-memory.dmp

                      Filesize

                      72KB

                    • memory/4984-172-0x0000000004950000-0x0000000004962000-memory.dmp

                      Filesize

                      72KB

                    • memory/4984-174-0x0000000004950000-0x0000000004962000-memory.dmp

                      Filesize

                      72KB

                    • memory/4984-170-0x0000000004950000-0x0000000004962000-memory.dmp

                      Filesize

                      72KB

                    • memory/4984-168-0x0000000004950000-0x0000000004962000-memory.dmp

                      Filesize

                      72KB

                    • memory/4984-165-0x0000000004950000-0x0000000004962000-memory.dmp

                      Filesize

                      72KB

                    • memory/4984-166-0x0000000004950000-0x0000000004962000-memory.dmp

                      Filesize

                      72KB