Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2023 01:43
Static task
static1
Behavioral task
behavioral1
Sample
81d8ef1b07bc1def0365bf08c9f03ea57ce2ef07899d98132ed90df175ace27c.exe
Resource
win10v2004-20230221-en
General
-
Target
81d8ef1b07bc1def0365bf08c9f03ea57ce2ef07899d98132ed90df175ace27c.exe
-
Size
479KB
-
MD5
2a17bc7e7e048666985bda61faac7a45
-
SHA1
77eb959ebab3192c896fb5d4a7972fe237c185b8
-
SHA256
81d8ef1b07bc1def0365bf08c9f03ea57ce2ef07899d98132ed90df175ace27c
-
SHA512
18ab0fe3d280222b0b1f6c178e7b47291bac1cbf18bc3c4fcef0f6dcff0a89fec3edc7cd0e111a9d49d07ca5a3ee8b68779310b2b25e7c477504ca7120edc70f
-
SSDEEP
12288:+MrZy90r5nodXLueFV3ViDBJM3MZFaknBLFF:HyenotFS4QndFF
Malware Config
Extracted
redline
morty
217.196.96.101:4132
-
auth_value
fe1a24c211cc8e5bf9ff11c737ce0e97
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5473101.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5473101.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5473101.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5473101.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5473101.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a5473101.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation d1325243.exe -
Executes dropped EXE 7 IoCs
pid Process 4084 v9804413.exe 3744 a5473101.exe 4976 b5574783.exe 2896 d1325243.exe 864 oneetx.exe 3284 oneetx.exe 2260 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3368 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a5473101.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a5473101.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 81d8ef1b07bc1def0365bf08c9f03ea57ce2ef07899d98132ed90df175ace27c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 81d8ef1b07bc1def0365bf08c9f03ea57ce2ef07899d98132ed90df175ace27c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v9804413.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v9804413.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1056 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3744 a5473101.exe 3744 a5473101.exe 4976 b5574783.exe 4976 b5574783.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3744 a5473101.exe Token: SeDebugPrivilege 4976 b5574783.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2896 d1325243.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1768 wrote to memory of 4084 1768 81d8ef1b07bc1def0365bf08c9f03ea57ce2ef07899d98132ed90df175ace27c.exe 84 PID 1768 wrote to memory of 4084 1768 81d8ef1b07bc1def0365bf08c9f03ea57ce2ef07899d98132ed90df175ace27c.exe 84 PID 1768 wrote to memory of 4084 1768 81d8ef1b07bc1def0365bf08c9f03ea57ce2ef07899d98132ed90df175ace27c.exe 84 PID 4084 wrote to memory of 3744 4084 v9804413.exe 85 PID 4084 wrote to memory of 3744 4084 v9804413.exe 85 PID 4084 wrote to memory of 3744 4084 v9804413.exe 85 PID 4084 wrote to memory of 4976 4084 v9804413.exe 89 PID 4084 wrote to memory of 4976 4084 v9804413.exe 89 PID 4084 wrote to memory of 4976 4084 v9804413.exe 89 PID 1768 wrote to memory of 2896 1768 81d8ef1b07bc1def0365bf08c9f03ea57ce2ef07899d98132ed90df175ace27c.exe 90 PID 1768 wrote to memory of 2896 1768 81d8ef1b07bc1def0365bf08c9f03ea57ce2ef07899d98132ed90df175ace27c.exe 90 PID 1768 wrote to memory of 2896 1768 81d8ef1b07bc1def0365bf08c9f03ea57ce2ef07899d98132ed90df175ace27c.exe 90 PID 2896 wrote to memory of 864 2896 d1325243.exe 91 PID 2896 wrote to memory of 864 2896 d1325243.exe 91 PID 2896 wrote to memory of 864 2896 d1325243.exe 91 PID 864 wrote to memory of 1056 864 oneetx.exe 92 PID 864 wrote to memory of 1056 864 oneetx.exe 92 PID 864 wrote to memory of 1056 864 oneetx.exe 92 PID 864 wrote to memory of 2344 864 oneetx.exe 94 PID 864 wrote to memory of 2344 864 oneetx.exe 94 PID 864 wrote to memory of 2344 864 oneetx.exe 94 PID 2344 wrote to memory of 3304 2344 cmd.exe 96 PID 2344 wrote to memory of 3304 2344 cmd.exe 96 PID 2344 wrote to memory of 3304 2344 cmd.exe 96 PID 2344 wrote to memory of 4704 2344 cmd.exe 97 PID 2344 wrote to memory of 4704 2344 cmd.exe 97 PID 2344 wrote to memory of 4704 2344 cmd.exe 97 PID 2344 wrote to memory of 4876 2344 cmd.exe 98 PID 2344 wrote to memory of 4876 2344 cmd.exe 98 PID 2344 wrote to memory of 4876 2344 cmd.exe 98 PID 2344 wrote to memory of 4624 2344 cmd.exe 99 PID 2344 wrote to memory of 4624 2344 cmd.exe 99 PID 2344 wrote to memory of 4624 2344 cmd.exe 99 PID 2344 wrote to memory of 4040 2344 cmd.exe 100 PID 2344 wrote to memory of 4040 2344 cmd.exe 100 PID 2344 wrote to memory of 4040 2344 cmd.exe 100 PID 2344 wrote to memory of 3152 2344 cmd.exe 101 PID 2344 wrote to memory of 3152 2344 cmd.exe 101 PID 2344 wrote to memory of 3152 2344 cmd.exe 101 PID 864 wrote to memory of 3368 864 oneetx.exe 107 PID 864 wrote to memory of 3368 864 oneetx.exe 107 PID 864 wrote to memory of 3368 864 oneetx.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\81d8ef1b07bc1def0365bf08c9f03ea57ce2ef07899d98132ed90df175ace27c.exe"C:\Users\Admin\AppData\Local\Temp\81d8ef1b07bc1def0365bf08c9f03ea57ce2ef07899d98132ed90df175ace27c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9804413.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9804413.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a5473101.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a5473101.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3744
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5574783.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5574783.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4976
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1325243.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1325243.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1056
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3304
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4704
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4876
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4624
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4040
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:3152
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3368
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3284
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2260
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD5f04ca69e81a89160c8ce38f23efcec2f
SHA1d5f87acc88e6010b8fc0f845eed00154eaaff983
SHA25683be7ea93b173eb40577fb857e2c9a1193f3de28137dbe48110b8a9eea69861e
SHA5125b4cd3dc760306afe02d30982680768dae43eff9c42bed55f895c0934dba5b7d14df4b2de87719dc688e12e2114ef1ace58bb150afcc09cc3ccc992835016bd6
-
Filesize
209KB
MD5f04ca69e81a89160c8ce38f23efcec2f
SHA1d5f87acc88e6010b8fc0f845eed00154eaaff983
SHA25683be7ea93b173eb40577fb857e2c9a1193f3de28137dbe48110b8a9eea69861e
SHA5125b4cd3dc760306afe02d30982680768dae43eff9c42bed55f895c0934dba5b7d14df4b2de87719dc688e12e2114ef1ace58bb150afcc09cc3ccc992835016bd6
-
Filesize
307KB
MD5701c5d1bfdcfbe9fd79a0bedf5168ad4
SHA1c596c87e65d6f0e95afa3e0e80a445e08656ef5f
SHA256c0bf96862829ddffcde1a185d08c64eba66fae72018cc1570e431ca5dc13750f
SHA51202c1190c4e04010fa916044a2d4068a677c64835bb504c27f3d936fe0c5c879f75ed50fa3220c586c569ffb93be03c8e8ec7ecf2a09d801b3d3ca167520ef0ee
-
Filesize
307KB
MD5701c5d1bfdcfbe9fd79a0bedf5168ad4
SHA1c596c87e65d6f0e95afa3e0e80a445e08656ef5f
SHA256c0bf96862829ddffcde1a185d08c64eba66fae72018cc1570e431ca5dc13750f
SHA51202c1190c4e04010fa916044a2d4068a677c64835bb504c27f3d936fe0c5c879f75ed50fa3220c586c569ffb93be03c8e8ec7ecf2a09d801b3d3ca167520ef0ee
-
Filesize
178KB
MD50bdcee21b72c28e52d80827eea27e50b
SHA1061ad2784175ea05a44059136a8b5b151ccdf4e0
SHA2567d2234403a5efc88187a09147be1464d7a04236c7683cd339119d84bb8c6479b
SHA512742053bc21c748b23f0b1299a5336df94c42bdf5c8d9b4fb311ccb66166a638875095477f7be9aa2ddf2506d4b3b4e77e1ac0af1ba5084f96e8d60a5bf616b35
-
Filesize
178KB
MD50bdcee21b72c28e52d80827eea27e50b
SHA1061ad2784175ea05a44059136a8b5b151ccdf4e0
SHA2567d2234403a5efc88187a09147be1464d7a04236c7683cd339119d84bb8c6479b
SHA512742053bc21c748b23f0b1299a5336df94c42bdf5c8d9b4fb311ccb66166a638875095477f7be9aa2ddf2506d4b3b4e77e1ac0af1ba5084f96e8d60a5bf616b35
-
Filesize
168KB
MD5501e2c1c19e75129fb61fb4a3980ec4e
SHA15a3b443507e20aebfbabe26d8feed1976de62a9f
SHA2568b91861089fa065161e3717543f9fe2eab7ec0bbf77e7f158220a04665cbe7ee
SHA51279afa90370e9425369d16e0d9806161fa2c5dfeb94465ee194f2cd0914ab7120e8a35671a06fa0bcbe2961f3b1e1788fc7d1949e3777a0799e9864bfad908191
-
Filesize
168KB
MD5501e2c1c19e75129fb61fb4a3980ec4e
SHA15a3b443507e20aebfbabe26d8feed1976de62a9f
SHA2568b91861089fa065161e3717543f9fe2eab7ec0bbf77e7f158220a04665cbe7ee
SHA51279afa90370e9425369d16e0d9806161fa2c5dfeb94465ee194f2cd0914ab7120e8a35671a06fa0bcbe2961f3b1e1788fc7d1949e3777a0799e9864bfad908191
-
Filesize
209KB
MD5f04ca69e81a89160c8ce38f23efcec2f
SHA1d5f87acc88e6010b8fc0f845eed00154eaaff983
SHA25683be7ea93b173eb40577fb857e2c9a1193f3de28137dbe48110b8a9eea69861e
SHA5125b4cd3dc760306afe02d30982680768dae43eff9c42bed55f895c0934dba5b7d14df4b2de87719dc688e12e2114ef1ace58bb150afcc09cc3ccc992835016bd6
-
Filesize
209KB
MD5f04ca69e81a89160c8ce38f23efcec2f
SHA1d5f87acc88e6010b8fc0f845eed00154eaaff983
SHA25683be7ea93b173eb40577fb857e2c9a1193f3de28137dbe48110b8a9eea69861e
SHA5125b4cd3dc760306afe02d30982680768dae43eff9c42bed55f895c0934dba5b7d14df4b2de87719dc688e12e2114ef1ace58bb150afcc09cc3ccc992835016bd6
-
Filesize
209KB
MD5f04ca69e81a89160c8ce38f23efcec2f
SHA1d5f87acc88e6010b8fc0f845eed00154eaaff983
SHA25683be7ea93b173eb40577fb857e2c9a1193f3de28137dbe48110b8a9eea69861e
SHA5125b4cd3dc760306afe02d30982680768dae43eff9c42bed55f895c0934dba5b7d14df4b2de87719dc688e12e2114ef1ace58bb150afcc09cc3ccc992835016bd6
-
Filesize
209KB
MD5f04ca69e81a89160c8ce38f23efcec2f
SHA1d5f87acc88e6010b8fc0f845eed00154eaaff983
SHA25683be7ea93b173eb40577fb857e2c9a1193f3de28137dbe48110b8a9eea69861e
SHA5125b4cd3dc760306afe02d30982680768dae43eff9c42bed55f895c0934dba5b7d14df4b2de87719dc688e12e2114ef1ace58bb150afcc09cc3ccc992835016bd6
-
Filesize
209KB
MD5f04ca69e81a89160c8ce38f23efcec2f
SHA1d5f87acc88e6010b8fc0f845eed00154eaaff983
SHA25683be7ea93b173eb40577fb857e2c9a1193f3de28137dbe48110b8a9eea69861e
SHA5125b4cd3dc760306afe02d30982680768dae43eff9c42bed55f895c0934dba5b7d14df4b2de87719dc688e12e2114ef1ace58bb150afcc09cc3ccc992835016bd6
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5