Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2023, 02:58
Static task
static1
Behavioral task
behavioral1
Sample
96d82dae4c7262c955341cc4da136253df03785feb9d3135c55a8f78420d25e0.exe
Resource
win10v2004-20230220-en
General
-
Target
96d82dae4c7262c955341cc4da136253df03785feb9d3135c55a8f78420d25e0.exe
-
Size
479KB
-
MD5
35c6f323cc5a858d0a75d8003e92f292
-
SHA1
77e95401d6061489c5fa0ccd4371058d6a3a05e5
-
SHA256
96d82dae4c7262c955341cc4da136253df03785feb9d3135c55a8f78420d25e0
-
SHA512
752ce06f2ff440c17d4a0182ca465e46683f9e047fac54bd2b3b14d722525c27bb1916fa4e3c3df1b82e43237feebf57a963d35f993150d6caeb3707b6e02f15
-
SSDEEP
12288:zMrSy90qO4876w079HDccEg6y6OGeYnLyQ7E7M:ByD84xDP6y6OGUcN
Malware Config
Extracted
redline
ditro
217.196.96.101:4132
-
auth_value
8f24ed370a9b24aa28d3d634ea57912e
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k9828850.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k9828850.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k9828850.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k9828850.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k9828850.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k9828850.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation m9290151.exe -
Executes dropped EXE 7 IoCs
pid Process 548 y2322577.exe 2120 k9828850.exe 4816 l5748985.exe 4192 m9290151.exe 3836 oneetx.exe 3336 oneetx.exe 4960 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 864 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k9828850.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k9828850.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y2322577.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 96d82dae4c7262c955341cc4da136253df03785feb9d3135c55a8f78420d25e0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 96d82dae4c7262c955341cc4da136253df03785feb9d3135c55a8f78420d25e0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y2322577.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3556 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2120 k9828850.exe 2120 k9828850.exe 4816 l5748985.exe 4816 l5748985.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2120 k9828850.exe Token: SeDebugPrivilege 4816 l5748985.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4192 m9290151.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1760 wrote to memory of 548 1760 96d82dae4c7262c955341cc4da136253df03785feb9d3135c55a8f78420d25e0.exe 84 PID 1760 wrote to memory of 548 1760 96d82dae4c7262c955341cc4da136253df03785feb9d3135c55a8f78420d25e0.exe 84 PID 1760 wrote to memory of 548 1760 96d82dae4c7262c955341cc4da136253df03785feb9d3135c55a8f78420d25e0.exe 84 PID 548 wrote to memory of 2120 548 y2322577.exe 85 PID 548 wrote to memory of 2120 548 y2322577.exe 85 PID 548 wrote to memory of 2120 548 y2322577.exe 85 PID 548 wrote to memory of 4816 548 y2322577.exe 90 PID 548 wrote to memory of 4816 548 y2322577.exe 90 PID 548 wrote to memory of 4816 548 y2322577.exe 90 PID 1760 wrote to memory of 4192 1760 96d82dae4c7262c955341cc4da136253df03785feb9d3135c55a8f78420d25e0.exe 94 PID 1760 wrote to memory of 4192 1760 96d82dae4c7262c955341cc4da136253df03785feb9d3135c55a8f78420d25e0.exe 94 PID 1760 wrote to memory of 4192 1760 96d82dae4c7262c955341cc4da136253df03785feb9d3135c55a8f78420d25e0.exe 94 PID 4192 wrote to memory of 3836 4192 m9290151.exe 95 PID 4192 wrote to memory of 3836 4192 m9290151.exe 95 PID 4192 wrote to memory of 3836 4192 m9290151.exe 95 PID 3836 wrote to memory of 3556 3836 oneetx.exe 96 PID 3836 wrote to memory of 3556 3836 oneetx.exe 96 PID 3836 wrote to memory of 3556 3836 oneetx.exe 96 PID 3836 wrote to memory of 5104 3836 oneetx.exe 98 PID 3836 wrote to memory of 5104 3836 oneetx.exe 98 PID 3836 wrote to memory of 5104 3836 oneetx.exe 98 PID 5104 wrote to memory of 3740 5104 cmd.exe 100 PID 5104 wrote to memory of 3740 5104 cmd.exe 100 PID 5104 wrote to memory of 3740 5104 cmd.exe 100 PID 5104 wrote to memory of 4376 5104 cmd.exe 101 PID 5104 wrote to memory of 4376 5104 cmd.exe 101 PID 5104 wrote to memory of 4376 5104 cmd.exe 101 PID 5104 wrote to memory of 3232 5104 cmd.exe 102 PID 5104 wrote to memory of 3232 5104 cmd.exe 102 PID 5104 wrote to memory of 3232 5104 cmd.exe 102 PID 5104 wrote to memory of 4292 5104 cmd.exe 103 PID 5104 wrote to memory of 4292 5104 cmd.exe 103 PID 5104 wrote to memory of 4292 5104 cmd.exe 103 PID 5104 wrote to memory of 2036 5104 cmd.exe 104 PID 5104 wrote to memory of 2036 5104 cmd.exe 104 PID 5104 wrote to memory of 2036 5104 cmd.exe 104 PID 5104 wrote to memory of 3168 5104 cmd.exe 105 PID 5104 wrote to memory of 3168 5104 cmd.exe 105 PID 5104 wrote to memory of 3168 5104 cmd.exe 105 PID 3836 wrote to memory of 864 3836 oneetx.exe 108 PID 3836 wrote to memory of 864 3836 oneetx.exe 108 PID 3836 wrote to memory of 864 3836 oneetx.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\96d82dae4c7262c955341cc4da136253df03785feb9d3135c55a8f78420d25e0.exe"C:\Users\Admin\AppData\Local\Temp\96d82dae4c7262c955341cc4da136253df03785feb9d3135c55a8f78420d25e0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2322577.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2322577.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9828850.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9828850.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2120
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l5748985.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l5748985.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4816
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m9290151.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m9290151.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3556
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3740
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4376
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3232
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4292
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:2036
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:3168
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:864
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3336
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4960
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD53fe47b5793e4d96b7758580f42d4c8cf
SHA165b3647d2f7cdd28c51737bceef1409689c28908
SHA25655fc2721d58b4ef91ae95a488ca0667dd397f39e4e13dbf073cf2d3a39867ef7
SHA512e2369c8e8a1dbeaf36cd2f74540a24024daca5dff00032489b8ea60b12bf35874c36ba763c449c96de1645060fe91acfe86a71de2d6d513eb01100f3256a9b43
-
Filesize
209KB
MD53fe47b5793e4d96b7758580f42d4c8cf
SHA165b3647d2f7cdd28c51737bceef1409689c28908
SHA25655fc2721d58b4ef91ae95a488ca0667dd397f39e4e13dbf073cf2d3a39867ef7
SHA512e2369c8e8a1dbeaf36cd2f74540a24024daca5dff00032489b8ea60b12bf35874c36ba763c449c96de1645060fe91acfe86a71de2d6d513eb01100f3256a9b43
-
Filesize
307KB
MD5e7dc69293148c0826fd6b06c226b944b
SHA135d939bbd4e19090667434ef6576f55d0f222a26
SHA256d18724e7a24e08d8974a9325b7a84360452cec3f5c8af7d873faf4a43df30772
SHA512840a8baf8ca11f43a8332705359f07847aa553247a21b3afacc39ba1cef456d44609d08f7508ac7f4a4fda345244e4cf8098f0ba408e9046e7a8670021db5290
-
Filesize
307KB
MD5e7dc69293148c0826fd6b06c226b944b
SHA135d939bbd4e19090667434ef6576f55d0f222a26
SHA256d18724e7a24e08d8974a9325b7a84360452cec3f5c8af7d873faf4a43df30772
SHA512840a8baf8ca11f43a8332705359f07847aa553247a21b3afacc39ba1cef456d44609d08f7508ac7f4a4fda345244e4cf8098f0ba408e9046e7a8670021db5290
-
Filesize
178KB
MD57eb36b32b24b8c51e03894a08918994b
SHA1c3e8442aea02cc006baed75d89acc30a82502c9d
SHA256509953593955f5163f2aa555995ee43fb43931405cd73395b7bd8c4a664b2aa3
SHA512b2df6f914f0ffa30f18ce3058542cd2d0f90c60052d7844ad988f5e3b5a5895d2c77a4758ebd1d8e18996c8546091a5666c81a76d73a2ec453c9ccb7b725f7ba
-
Filesize
178KB
MD57eb36b32b24b8c51e03894a08918994b
SHA1c3e8442aea02cc006baed75d89acc30a82502c9d
SHA256509953593955f5163f2aa555995ee43fb43931405cd73395b7bd8c4a664b2aa3
SHA512b2df6f914f0ffa30f18ce3058542cd2d0f90c60052d7844ad988f5e3b5a5895d2c77a4758ebd1d8e18996c8546091a5666c81a76d73a2ec453c9ccb7b725f7ba
-
Filesize
168KB
MD515c486aac95bfecadb11c3c64bc8f62c
SHA1b6e5fa409537f9f726d09eaf8bba4738792b591c
SHA2568b945785b2ac3ef46ee90b4d20f2b4db99b23ca00426046461ef08fd78486a86
SHA512c7ac8e54a6008368bf7c4c0d5e6a7ce1430973d9debff35d5f342469833b1cf01a378cb49d995c63409824331af34d94464c9a0cc5c16e43337c55b861dc23e5
-
Filesize
168KB
MD515c486aac95bfecadb11c3c64bc8f62c
SHA1b6e5fa409537f9f726d09eaf8bba4738792b591c
SHA2568b945785b2ac3ef46ee90b4d20f2b4db99b23ca00426046461ef08fd78486a86
SHA512c7ac8e54a6008368bf7c4c0d5e6a7ce1430973d9debff35d5f342469833b1cf01a378cb49d995c63409824331af34d94464c9a0cc5c16e43337c55b861dc23e5
-
Filesize
209KB
MD53fe47b5793e4d96b7758580f42d4c8cf
SHA165b3647d2f7cdd28c51737bceef1409689c28908
SHA25655fc2721d58b4ef91ae95a488ca0667dd397f39e4e13dbf073cf2d3a39867ef7
SHA512e2369c8e8a1dbeaf36cd2f74540a24024daca5dff00032489b8ea60b12bf35874c36ba763c449c96de1645060fe91acfe86a71de2d6d513eb01100f3256a9b43
-
Filesize
209KB
MD53fe47b5793e4d96b7758580f42d4c8cf
SHA165b3647d2f7cdd28c51737bceef1409689c28908
SHA25655fc2721d58b4ef91ae95a488ca0667dd397f39e4e13dbf073cf2d3a39867ef7
SHA512e2369c8e8a1dbeaf36cd2f74540a24024daca5dff00032489b8ea60b12bf35874c36ba763c449c96de1645060fe91acfe86a71de2d6d513eb01100f3256a9b43
-
Filesize
209KB
MD53fe47b5793e4d96b7758580f42d4c8cf
SHA165b3647d2f7cdd28c51737bceef1409689c28908
SHA25655fc2721d58b4ef91ae95a488ca0667dd397f39e4e13dbf073cf2d3a39867ef7
SHA512e2369c8e8a1dbeaf36cd2f74540a24024daca5dff00032489b8ea60b12bf35874c36ba763c449c96de1645060fe91acfe86a71de2d6d513eb01100f3256a9b43
-
Filesize
209KB
MD53fe47b5793e4d96b7758580f42d4c8cf
SHA165b3647d2f7cdd28c51737bceef1409689c28908
SHA25655fc2721d58b4ef91ae95a488ca0667dd397f39e4e13dbf073cf2d3a39867ef7
SHA512e2369c8e8a1dbeaf36cd2f74540a24024daca5dff00032489b8ea60b12bf35874c36ba763c449c96de1645060fe91acfe86a71de2d6d513eb01100f3256a9b43
-
Filesize
209KB
MD53fe47b5793e4d96b7758580f42d4c8cf
SHA165b3647d2f7cdd28c51737bceef1409689c28908
SHA25655fc2721d58b4ef91ae95a488ca0667dd397f39e4e13dbf073cf2d3a39867ef7
SHA512e2369c8e8a1dbeaf36cd2f74540a24024daca5dff00032489b8ea60b12bf35874c36ba763c449c96de1645060fe91acfe86a71de2d6d513eb01100f3256a9b43
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5