Analysis
-
max time kernel
135s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2023, 03:26
Static task
static1
Behavioral task
behavioral1
Sample
0e210eb269d012343ad722696dd898b3f81e5b4cf7e9685f48a0084316157736.exe
Resource
win10v2004-20230220-en
General
-
Target
0e210eb269d012343ad722696dd898b3f81e5b4cf7e9685f48a0084316157736.exe
-
Size
478KB
-
MD5
c20d2b604c19ebe4ddaa994b6b14a278
-
SHA1
3e50a9eb6ec56d00afb375f1db4d31224992e0fe
-
SHA256
0e210eb269d012343ad722696dd898b3f81e5b4cf7e9685f48a0084316157736
-
SHA512
0a242b62fe5cad88f4ee35720a6573c96b136b735ad36de9df9188eaddd15ad92c501598d794f00ddfc94f90b0ffb3645dd3460007cb52c349c91f10e72ea990
-
SSDEEP
12288:+Mrry90lIoEP9Zgv5c1u31xTGnqE1p18zDQ5G:Ry+IoM9ZghXjTCF8zs8
Malware Config
Extracted
redline
ditro
217.196.96.101:4132
-
auth_value
8f24ed370a9b24aa28d3d634ea57912e
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k1903197.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k1903197.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k1903197.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k1903197.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k1903197.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k1903197.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation m9762719.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 4984 y1639605.exe 4408 k1903197.exe 1404 l2634624.exe 1644 m9762719.exe 2580 oneetx.exe 2908 oneetx.exe 1040 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4488 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k1903197.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k1903197.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0e210eb269d012343ad722696dd898b3f81e5b4cf7e9685f48a0084316157736.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y1639605.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y1639605.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0e210eb269d012343ad722696dd898b3f81e5b4cf7e9685f48a0084316157736.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4912 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4408 k1903197.exe 4408 k1903197.exe 1404 l2634624.exe 1404 l2634624.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4408 k1903197.exe Token: SeDebugPrivilege 1404 l2634624.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1644 m9762719.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 5084 wrote to memory of 4984 5084 0e210eb269d012343ad722696dd898b3f81e5b4cf7e9685f48a0084316157736.exe 81 PID 5084 wrote to memory of 4984 5084 0e210eb269d012343ad722696dd898b3f81e5b4cf7e9685f48a0084316157736.exe 81 PID 5084 wrote to memory of 4984 5084 0e210eb269d012343ad722696dd898b3f81e5b4cf7e9685f48a0084316157736.exe 81 PID 4984 wrote to memory of 4408 4984 y1639605.exe 82 PID 4984 wrote to memory of 4408 4984 y1639605.exe 82 PID 4984 wrote to memory of 4408 4984 y1639605.exe 82 PID 4984 wrote to memory of 1404 4984 y1639605.exe 87 PID 4984 wrote to memory of 1404 4984 y1639605.exe 87 PID 4984 wrote to memory of 1404 4984 y1639605.exe 87 PID 5084 wrote to memory of 1644 5084 0e210eb269d012343ad722696dd898b3f81e5b4cf7e9685f48a0084316157736.exe 92 PID 5084 wrote to memory of 1644 5084 0e210eb269d012343ad722696dd898b3f81e5b4cf7e9685f48a0084316157736.exe 92 PID 5084 wrote to memory of 1644 5084 0e210eb269d012343ad722696dd898b3f81e5b4cf7e9685f48a0084316157736.exe 92 PID 1644 wrote to memory of 2580 1644 m9762719.exe 93 PID 1644 wrote to memory of 2580 1644 m9762719.exe 93 PID 1644 wrote to memory of 2580 1644 m9762719.exe 93 PID 2580 wrote to memory of 4912 2580 oneetx.exe 94 PID 2580 wrote to memory of 4912 2580 oneetx.exe 94 PID 2580 wrote to memory of 4912 2580 oneetx.exe 94 PID 2580 wrote to memory of 4052 2580 oneetx.exe 96 PID 2580 wrote to memory of 4052 2580 oneetx.exe 96 PID 2580 wrote to memory of 4052 2580 oneetx.exe 96 PID 4052 wrote to memory of 1316 4052 cmd.exe 98 PID 4052 wrote to memory of 1316 4052 cmd.exe 98 PID 4052 wrote to memory of 1316 4052 cmd.exe 98 PID 4052 wrote to memory of 4356 4052 cmd.exe 99 PID 4052 wrote to memory of 4356 4052 cmd.exe 99 PID 4052 wrote to memory of 4356 4052 cmd.exe 99 PID 4052 wrote to memory of 5024 4052 cmd.exe 100 PID 4052 wrote to memory of 5024 4052 cmd.exe 100 PID 4052 wrote to memory of 5024 4052 cmd.exe 100 PID 4052 wrote to memory of 1896 4052 cmd.exe 101 PID 4052 wrote to memory of 1896 4052 cmd.exe 101 PID 4052 wrote to memory of 1896 4052 cmd.exe 101 PID 4052 wrote to memory of 3032 4052 cmd.exe 102 PID 4052 wrote to memory of 3032 4052 cmd.exe 102 PID 4052 wrote to memory of 3032 4052 cmd.exe 102 PID 4052 wrote to memory of 1888 4052 cmd.exe 103 PID 4052 wrote to memory of 1888 4052 cmd.exe 103 PID 4052 wrote to memory of 1888 4052 cmd.exe 103 PID 2580 wrote to memory of 4488 2580 oneetx.exe 105 PID 2580 wrote to memory of 4488 2580 oneetx.exe 105 PID 2580 wrote to memory of 4488 2580 oneetx.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e210eb269d012343ad722696dd898b3f81e5b4cf7e9685f48a0084316157736.exe"C:\Users\Admin\AppData\Local\Temp\0e210eb269d012343ad722696dd898b3f81e5b4cf7e9685f48a0084316157736.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1639605.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1639605.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k1903197.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k1903197.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4408
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2634624.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2634624.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1404
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m9762719.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m9762719.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4912
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1316
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4356
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:5024
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1896
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:3032
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:1888
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4488
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2908
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1040
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD5604202012de65a74620a84ef142297e8
SHA1d5ab8c1e611a488ee1e4ec0bf3a5cb9dcc493a1a
SHA2560c4f5cb4587da8efd3b6c6560deefe92100db99afd7cb770cbcbf2540dcfc219
SHA5122889ffe1b5648db97ee89fe4bbf8ea634c598cd4f1aeca40a1c1659a523e400baf63967cef7d4ac59a4da6106df3ef8ff74cf410e7c5e08a7e5531f56eb510d9
-
Filesize
209KB
MD5604202012de65a74620a84ef142297e8
SHA1d5ab8c1e611a488ee1e4ec0bf3a5cb9dcc493a1a
SHA2560c4f5cb4587da8efd3b6c6560deefe92100db99afd7cb770cbcbf2540dcfc219
SHA5122889ffe1b5648db97ee89fe4bbf8ea634c598cd4f1aeca40a1c1659a523e400baf63967cef7d4ac59a4da6106df3ef8ff74cf410e7c5e08a7e5531f56eb510d9
-
Filesize
307KB
MD57e4c04e7306d61d3fa7625f7d31842da
SHA124cf3d90ab9cd98e6d9b7ab52ffbdc08e7a385a8
SHA256833e5438c2c62909da393e8836d7fff36afe13e75858481db43ac039266d6b08
SHA512893f4d3dc64b5d5e178926d24ad46f3bcbecfe2d63ec4a3827fc79206eadc4df588957b9436050a7b01afa3f88cc02bab585cc5aefafd529db12c41458881e6b
-
Filesize
307KB
MD57e4c04e7306d61d3fa7625f7d31842da
SHA124cf3d90ab9cd98e6d9b7ab52ffbdc08e7a385a8
SHA256833e5438c2c62909da393e8836d7fff36afe13e75858481db43ac039266d6b08
SHA512893f4d3dc64b5d5e178926d24ad46f3bcbecfe2d63ec4a3827fc79206eadc4df588957b9436050a7b01afa3f88cc02bab585cc5aefafd529db12c41458881e6b
-
Filesize
178KB
MD550a41d60ca0125c7ea79ade8bdbc49f7
SHA15403c09c637772c274169eccdbbce0d9e2ca1516
SHA25652cc22a36c97a4dd6bc7efe2d9f2e2d6e0e6f845c65d31847632988890383ce1
SHA51280f20c1b5c5b935d0a0d1e6def4433f1f95a11c74c13c999e049246216189c5338ead06dcd7519d2dde91fbe44cc54e926828056c319911fe175af92a32b2e36
-
Filesize
178KB
MD550a41d60ca0125c7ea79ade8bdbc49f7
SHA15403c09c637772c274169eccdbbce0d9e2ca1516
SHA25652cc22a36c97a4dd6bc7efe2d9f2e2d6e0e6f845c65d31847632988890383ce1
SHA51280f20c1b5c5b935d0a0d1e6def4433f1f95a11c74c13c999e049246216189c5338ead06dcd7519d2dde91fbe44cc54e926828056c319911fe175af92a32b2e36
-
Filesize
168KB
MD536d33b1502a27a9db2e62a70401d2102
SHA114632eae8066a74c6f097e8a95c04cdafb620545
SHA2561fb50958cefd0b4cc03dd400a2d6f460519f2b57ac155addd68acc4028e1509a
SHA5127162f6b7b15587118bfe655583596b6d0638a68c736561b7775b815f33439ae05c7b1f66587ebb1ca6e5ead4d85abd1b1aba1e2307c6b9e1a63e04040897e423
-
Filesize
168KB
MD536d33b1502a27a9db2e62a70401d2102
SHA114632eae8066a74c6f097e8a95c04cdafb620545
SHA2561fb50958cefd0b4cc03dd400a2d6f460519f2b57ac155addd68acc4028e1509a
SHA5127162f6b7b15587118bfe655583596b6d0638a68c736561b7775b815f33439ae05c7b1f66587ebb1ca6e5ead4d85abd1b1aba1e2307c6b9e1a63e04040897e423
-
Filesize
209KB
MD5604202012de65a74620a84ef142297e8
SHA1d5ab8c1e611a488ee1e4ec0bf3a5cb9dcc493a1a
SHA2560c4f5cb4587da8efd3b6c6560deefe92100db99afd7cb770cbcbf2540dcfc219
SHA5122889ffe1b5648db97ee89fe4bbf8ea634c598cd4f1aeca40a1c1659a523e400baf63967cef7d4ac59a4da6106df3ef8ff74cf410e7c5e08a7e5531f56eb510d9
-
Filesize
209KB
MD5604202012de65a74620a84ef142297e8
SHA1d5ab8c1e611a488ee1e4ec0bf3a5cb9dcc493a1a
SHA2560c4f5cb4587da8efd3b6c6560deefe92100db99afd7cb770cbcbf2540dcfc219
SHA5122889ffe1b5648db97ee89fe4bbf8ea634c598cd4f1aeca40a1c1659a523e400baf63967cef7d4ac59a4da6106df3ef8ff74cf410e7c5e08a7e5531f56eb510d9
-
Filesize
209KB
MD5604202012de65a74620a84ef142297e8
SHA1d5ab8c1e611a488ee1e4ec0bf3a5cb9dcc493a1a
SHA2560c4f5cb4587da8efd3b6c6560deefe92100db99afd7cb770cbcbf2540dcfc219
SHA5122889ffe1b5648db97ee89fe4bbf8ea634c598cd4f1aeca40a1c1659a523e400baf63967cef7d4ac59a4da6106df3ef8ff74cf410e7c5e08a7e5531f56eb510d9
-
Filesize
209KB
MD5604202012de65a74620a84ef142297e8
SHA1d5ab8c1e611a488ee1e4ec0bf3a5cb9dcc493a1a
SHA2560c4f5cb4587da8efd3b6c6560deefe92100db99afd7cb770cbcbf2540dcfc219
SHA5122889ffe1b5648db97ee89fe4bbf8ea634c598cd4f1aeca40a1c1659a523e400baf63967cef7d4ac59a4da6106df3ef8ff74cf410e7c5e08a7e5531f56eb510d9
-
Filesize
209KB
MD5604202012de65a74620a84ef142297e8
SHA1d5ab8c1e611a488ee1e4ec0bf3a5cb9dcc493a1a
SHA2560c4f5cb4587da8efd3b6c6560deefe92100db99afd7cb770cbcbf2540dcfc219
SHA5122889ffe1b5648db97ee89fe4bbf8ea634c598cd4f1aeca40a1c1659a523e400baf63967cef7d4ac59a4da6106df3ef8ff74cf410e7c5e08a7e5531f56eb510d9
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5