Analysis

  • max time kernel
    135s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/05/2023, 02:58

General

  • Target

    96d82dae4c7262c955341cc4da136253df03785feb9d3135c55a8f78420d25e0.exe

  • Size

    479KB

  • MD5

    35c6f323cc5a858d0a75d8003e92f292

  • SHA1

    77e95401d6061489c5fa0ccd4371058d6a3a05e5

  • SHA256

    96d82dae4c7262c955341cc4da136253df03785feb9d3135c55a8f78420d25e0

  • SHA512

    752ce06f2ff440c17d4a0182ca465e46683f9e047fac54bd2b3b14d722525c27bb1916fa4e3c3df1b82e43237feebf57a963d35f993150d6caeb3707b6e02f15

  • SSDEEP

    12288:zMrSy90qO4876w079HDccEg6y6OGeYnLyQ7E7M:ByD84xDP6y6OGUcN

Malware Config

Extracted

Family

redline

Botnet

ditro

C2

217.196.96.101:4132

Attributes
  • auth_value

    8f24ed370a9b24aa28d3d634ea57912e

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\96d82dae4c7262c955341cc4da136253df03785feb9d3135c55a8f78420d25e0.exe
    "C:\Users\Admin\AppData\Local\Temp\96d82dae4c7262c955341cc4da136253df03785feb9d3135c55a8f78420d25e0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2322577.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2322577.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:548
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9828850.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9828850.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2120
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l5748985.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l5748985.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4816
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m9290151.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m9290151.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4192
      • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3836
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:3556
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:5104
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:3740
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:N"
              5⤵
                PID:4376
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                5⤵
                  PID:3232
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4292
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\c3912af058" /P "Admin:N"
                    5⤵
                      PID:2036
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\c3912af058" /P "Admin:R" /E
                      5⤵
                        PID:3168
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:864
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:3336
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:4960

              Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m9290151.exe

                      Filesize

                      209KB

                      MD5

                      3fe47b5793e4d96b7758580f42d4c8cf

                      SHA1

                      65b3647d2f7cdd28c51737bceef1409689c28908

                      SHA256

                      55fc2721d58b4ef91ae95a488ca0667dd397f39e4e13dbf073cf2d3a39867ef7

                      SHA512

                      e2369c8e8a1dbeaf36cd2f74540a24024daca5dff00032489b8ea60b12bf35874c36ba763c449c96de1645060fe91acfe86a71de2d6d513eb01100f3256a9b43

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m9290151.exe

                      Filesize

                      209KB

                      MD5

                      3fe47b5793e4d96b7758580f42d4c8cf

                      SHA1

                      65b3647d2f7cdd28c51737bceef1409689c28908

                      SHA256

                      55fc2721d58b4ef91ae95a488ca0667dd397f39e4e13dbf073cf2d3a39867ef7

                      SHA512

                      e2369c8e8a1dbeaf36cd2f74540a24024daca5dff00032489b8ea60b12bf35874c36ba763c449c96de1645060fe91acfe86a71de2d6d513eb01100f3256a9b43

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2322577.exe

                      Filesize

                      307KB

                      MD5

                      e7dc69293148c0826fd6b06c226b944b

                      SHA1

                      35d939bbd4e19090667434ef6576f55d0f222a26

                      SHA256

                      d18724e7a24e08d8974a9325b7a84360452cec3f5c8af7d873faf4a43df30772

                      SHA512

                      840a8baf8ca11f43a8332705359f07847aa553247a21b3afacc39ba1cef456d44609d08f7508ac7f4a4fda345244e4cf8098f0ba408e9046e7a8670021db5290

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2322577.exe

                      Filesize

                      307KB

                      MD5

                      e7dc69293148c0826fd6b06c226b944b

                      SHA1

                      35d939bbd4e19090667434ef6576f55d0f222a26

                      SHA256

                      d18724e7a24e08d8974a9325b7a84360452cec3f5c8af7d873faf4a43df30772

                      SHA512

                      840a8baf8ca11f43a8332705359f07847aa553247a21b3afacc39ba1cef456d44609d08f7508ac7f4a4fda345244e4cf8098f0ba408e9046e7a8670021db5290

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9828850.exe

                      Filesize

                      178KB

                      MD5

                      7eb36b32b24b8c51e03894a08918994b

                      SHA1

                      c3e8442aea02cc006baed75d89acc30a82502c9d

                      SHA256

                      509953593955f5163f2aa555995ee43fb43931405cd73395b7bd8c4a664b2aa3

                      SHA512

                      b2df6f914f0ffa30f18ce3058542cd2d0f90c60052d7844ad988f5e3b5a5895d2c77a4758ebd1d8e18996c8546091a5666c81a76d73a2ec453c9ccb7b725f7ba

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9828850.exe

                      Filesize

                      178KB

                      MD5

                      7eb36b32b24b8c51e03894a08918994b

                      SHA1

                      c3e8442aea02cc006baed75d89acc30a82502c9d

                      SHA256

                      509953593955f5163f2aa555995ee43fb43931405cd73395b7bd8c4a664b2aa3

                      SHA512

                      b2df6f914f0ffa30f18ce3058542cd2d0f90c60052d7844ad988f5e3b5a5895d2c77a4758ebd1d8e18996c8546091a5666c81a76d73a2ec453c9ccb7b725f7ba

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l5748985.exe

                      Filesize

                      168KB

                      MD5

                      15c486aac95bfecadb11c3c64bc8f62c

                      SHA1

                      b6e5fa409537f9f726d09eaf8bba4738792b591c

                      SHA256

                      8b945785b2ac3ef46ee90b4d20f2b4db99b23ca00426046461ef08fd78486a86

                      SHA512

                      c7ac8e54a6008368bf7c4c0d5e6a7ce1430973d9debff35d5f342469833b1cf01a378cb49d995c63409824331af34d94464c9a0cc5c16e43337c55b861dc23e5

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l5748985.exe

                      Filesize

                      168KB

                      MD5

                      15c486aac95bfecadb11c3c64bc8f62c

                      SHA1

                      b6e5fa409537f9f726d09eaf8bba4738792b591c

                      SHA256

                      8b945785b2ac3ef46ee90b4d20f2b4db99b23ca00426046461ef08fd78486a86

                      SHA512

                      c7ac8e54a6008368bf7c4c0d5e6a7ce1430973d9debff35d5f342469833b1cf01a378cb49d995c63409824331af34d94464c9a0cc5c16e43337c55b861dc23e5

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      209KB

                      MD5

                      3fe47b5793e4d96b7758580f42d4c8cf

                      SHA1

                      65b3647d2f7cdd28c51737bceef1409689c28908

                      SHA256

                      55fc2721d58b4ef91ae95a488ca0667dd397f39e4e13dbf073cf2d3a39867ef7

                      SHA512

                      e2369c8e8a1dbeaf36cd2f74540a24024daca5dff00032489b8ea60b12bf35874c36ba763c449c96de1645060fe91acfe86a71de2d6d513eb01100f3256a9b43

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      209KB

                      MD5

                      3fe47b5793e4d96b7758580f42d4c8cf

                      SHA1

                      65b3647d2f7cdd28c51737bceef1409689c28908

                      SHA256

                      55fc2721d58b4ef91ae95a488ca0667dd397f39e4e13dbf073cf2d3a39867ef7

                      SHA512

                      e2369c8e8a1dbeaf36cd2f74540a24024daca5dff00032489b8ea60b12bf35874c36ba763c449c96de1645060fe91acfe86a71de2d6d513eb01100f3256a9b43

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      209KB

                      MD5

                      3fe47b5793e4d96b7758580f42d4c8cf

                      SHA1

                      65b3647d2f7cdd28c51737bceef1409689c28908

                      SHA256

                      55fc2721d58b4ef91ae95a488ca0667dd397f39e4e13dbf073cf2d3a39867ef7

                      SHA512

                      e2369c8e8a1dbeaf36cd2f74540a24024daca5dff00032489b8ea60b12bf35874c36ba763c449c96de1645060fe91acfe86a71de2d6d513eb01100f3256a9b43

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      209KB

                      MD5

                      3fe47b5793e4d96b7758580f42d4c8cf

                      SHA1

                      65b3647d2f7cdd28c51737bceef1409689c28908

                      SHA256

                      55fc2721d58b4ef91ae95a488ca0667dd397f39e4e13dbf073cf2d3a39867ef7

                      SHA512

                      e2369c8e8a1dbeaf36cd2f74540a24024daca5dff00032489b8ea60b12bf35874c36ba763c449c96de1645060fe91acfe86a71de2d6d513eb01100f3256a9b43

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      209KB

                      MD5

                      3fe47b5793e4d96b7758580f42d4c8cf

                      SHA1

                      65b3647d2f7cdd28c51737bceef1409689c28908

                      SHA256

                      55fc2721d58b4ef91ae95a488ca0667dd397f39e4e13dbf073cf2d3a39867ef7

                      SHA512

                      e2369c8e8a1dbeaf36cd2f74540a24024daca5dff00032489b8ea60b12bf35874c36ba763c449c96de1645060fe91acfe86a71de2d6d513eb01100f3256a9b43

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      8451a2c5daa42b25333b1b2089c5ea39

                      SHA1

                      700cc99ec8d3113435e657070d2d6bde0a833adc

                      SHA256

                      b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                      SHA512

                      6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      8451a2c5daa42b25333b1b2089c5ea39

                      SHA1

                      700cc99ec8d3113435e657070d2d6bde0a833adc

                      SHA256

                      b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                      SHA512

                      6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      8451a2c5daa42b25333b1b2089c5ea39

                      SHA1

                      700cc99ec8d3113435e657070d2d6bde0a833adc

                      SHA256

                      b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                      SHA512

                      6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                      Filesize

                      162B

                      MD5

                      1b7c22a214949975556626d7217e9a39

                      SHA1

                      d01c97e2944166ed23e47e4a62ff471ab8fa031f

                      SHA256

                      340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                      SHA512

                      ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                    • memory/2120-179-0x0000000004B40000-0x0000000004B50000-memory.dmp

                      Filesize

                      64KB

                    • memory/2120-157-0x0000000004A90000-0x0000000004AA2000-memory.dmp

                      Filesize

                      72KB

                    • memory/2120-173-0x0000000004A90000-0x0000000004AA2000-memory.dmp

                      Filesize

                      72KB

                    • memory/2120-175-0x0000000004A90000-0x0000000004AA2000-memory.dmp

                      Filesize

                      72KB

                    • memory/2120-177-0x0000000004A90000-0x0000000004AA2000-memory.dmp

                      Filesize

                      72KB

                    • memory/2120-178-0x0000000004B40000-0x0000000004B50000-memory.dmp

                      Filesize

                      64KB

                    • memory/2120-169-0x0000000004A90000-0x0000000004AA2000-memory.dmp

                      Filesize

                      72KB

                    • memory/2120-180-0x0000000004B40000-0x0000000004B50000-memory.dmp

                      Filesize

                      64KB

                    • memory/2120-167-0x0000000004A90000-0x0000000004AA2000-memory.dmp

                      Filesize

                      72KB

                    • memory/2120-165-0x0000000004A90000-0x0000000004AA2000-memory.dmp

                      Filesize

                      72KB

                    • memory/2120-147-0x0000000004B50000-0x00000000050F4000-memory.dmp

                      Filesize

                      5.6MB

                    • memory/2120-148-0x0000000004B40000-0x0000000004B50000-memory.dmp

                      Filesize

                      64KB

                    • memory/2120-149-0x0000000004B40000-0x0000000004B50000-memory.dmp

                      Filesize

                      64KB

                    • memory/2120-150-0x0000000004A90000-0x0000000004AA2000-memory.dmp

                      Filesize

                      72KB

                    • memory/2120-151-0x0000000004A90000-0x0000000004AA2000-memory.dmp

                      Filesize

                      72KB

                    • memory/2120-155-0x0000000004A90000-0x0000000004AA2000-memory.dmp

                      Filesize

                      72KB

                    • memory/2120-153-0x0000000004A90000-0x0000000004AA2000-memory.dmp

                      Filesize

                      72KB

                    • memory/2120-171-0x0000000004A90000-0x0000000004AA2000-memory.dmp

                      Filesize

                      72KB

                    • memory/2120-159-0x0000000004A90000-0x0000000004AA2000-memory.dmp

                      Filesize

                      72KB

                    • memory/2120-161-0x0000000004A90000-0x0000000004AA2000-memory.dmp

                      Filesize

                      72KB

                    • memory/2120-163-0x0000000004A90000-0x0000000004AA2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4816-196-0x0000000005E20000-0x0000000005E70000-memory.dmp

                      Filesize

                      320KB

                    • memory/4816-195-0x0000000008250000-0x000000000877C000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/4816-194-0x0000000005EA0000-0x0000000006062000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/4816-193-0x0000000004EF0000-0x0000000004F56000-memory.dmp

                      Filesize

                      408KB

                    • memory/4816-192-0x0000000004E50000-0x0000000004EE2000-memory.dmp

                      Filesize

                      584KB

                    • memory/4816-191-0x0000000004D30000-0x0000000004DA6000-memory.dmp

                      Filesize

                      472KB

                    • memory/4816-190-0x0000000004990000-0x00000000049A0000-memory.dmp

                      Filesize

                      64KB

                    • memory/4816-189-0x0000000004A20000-0x0000000004A5C000-memory.dmp

                      Filesize

                      240KB

                    • memory/4816-188-0x00000000049C0000-0x00000000049D2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4816-187-0x0000000004AB0000-0x0000000004BBA000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/4816-186-0x0000000004FC0000-0x00000000055D8000-memory.dmp

                      Filesize

                      6.1MB

                    • memory/4816-185-0x0000000000070000-0x00000000000A0000-memory.dmp

                      Filesize

                      192KB