Analysis
-
max time kernel
106s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
08/05/2023, 05:27
Static task
static1
Behavioral task
behavioral1
Sample
e8ff7b619e81e251e940ad9e1e0452dca75cb33072b1e561121b3478ccc414c2.exe
Resource
win10-20230220-en
General
-
Target
e8ff7b619e81e251e940ad9e1e0452dca75cb33072b1e561121b3478ccc414c2.exe
-
Size
479KB
-
MD5
e8918528d7464a05d3287fd13375a39e
-
SHA1
1cf918ffc5a048c2be24589f5e0636402bad5e10
-
SHA256
e8ff7b619e81e251e940ad9e1e0452dca75cb33072b1e561121b3478ccc414c2
-
SHA512
5d3c2d556a39a5e0a60786c55d8ecdba9ac72f334bd681e4fc6a39a6d3161acdbd3dc733191a13d5885b8b60e9320b2e2e31debb309b92ed23f7ef42508d691c
-
SSDEEP
12288:SMrQy90eJ6XscNU5cmez/qeArjHz27ClLA49w:GyUXBNU5k2nvaWlLXy
Malware Config
Extracted
redline
ditro
217.196.96.101:4132
-
auth_value
8f24ed370a9b24aa28d3d634ea57912e
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h3985283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h3985283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h3985283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h3985283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h3985283.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 1468 x3572107.exe 1772 g9397430.exe 4304 h3985283.exe 1236 i8923759.exe 4768 oneetx.exe 760 oneetx.exe 3208 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4496 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h3985283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h3985283.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e8ff7b619e81e251e940ad9e1e0452dca75cb33072b1e561121b3478ccc414c2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e8ff7b619e81e251e940ad9e1e0452dca75cb33072b1e561121b3478ccc414c2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x3572107.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3572107.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3692 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1772 g9397430.exe 1772 g9397430.exe 4304 h3985283.exe 4304 h3985283.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1772 g9397430.exe Token: SeDebugPrivilege 4304 h3985283.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1236 i8923759.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4956 wrote to memory of 1468 4956 e8ff7b619e81e251e940ad9e1e0452dca75cb33072b1e561121b3478ccc414c2.exe 66 PID 4956 wrote to memory of 1468 4956 e8ff7b619e81e251e940ad9e1e0452dca75cb33072b1e561121b3478ccc414c2.exe 66 PID 4956 wrote to memory of 1468 4956 e8ff7b619e81e251e940ad9e1e0452dca75cb33072b1e561121b3478ccc414c2.exe 66 PID 1468 wrote to memory of 1772 1468 x3572107.exe 67 PID 1468 wrote to memory of 1772 1468 x3572107.exe 67 PID 1468 wrote to memory of 1772 1468 x3572107.exe 67 PID 1468 wrote to memory of 4304 1468 x3572107.exe 69 PID 1468 wrote to memory of 4304 1468 x3572107.exe 69 PID 1468 wrote to memory of 4304 1468 x3572107.exe 69 PID 4956 wrote to memory of 1236 4956 e8ff7b619e81e251e940ad9e1e0452dca75cb33072b1e561121b3478ccc414c2.exe 70 PID 4956 wrote to memory of 1236 4956 e8ff7b619e81e251e940ad9e1e0452dca75cb33072b1e561121b3478ccc414c2.exe 70 PID 4956 wrote to memory of 1236 4956 e8ff7b619e81e251e940ad9e1e0452dca75cb33072b1e561121b3478ccc414c2.exe 70 PID 1236 wrote to memory of 4768 1236 i8923759.exe 71 PID 1236 wrote to memory of 4768 1236 i8923759.exe 71 PID 1236 wrote to memory of 4768 1236 i8923759.exe 71 PID 4768 wrote to memory of 3692 4768 oneetx.exe 72 PID 4768 wrote to memory of 3692 4768 oneetx.exe 72 PID 4768 wrote to memory of 3692 4768 oneetx.exe 72 PID 4768 wrote to memory of 2252 4768 oneetx.exe 74 PID 4768 wrote to memory of 2252 4768 oneetx.exe 74 PID 4768 wrote to memory of 2252 4768 oneetx.exe 74 PID 2252 wrote to memory of 3964 2252 cmd.exe 76 PID 2252 wrote to memory of 3964 2252 cmd.exe 76 PID 2252 wrote to memory of 3964 2252 cmd.exe 76 PID 2252 wrote to memory of 4444 2252 cmd.exe 77 PID 2252 wrote to memory of 4444 2252 cmd.exe 77 PID 2252 wrote to memory of 4444 2252 cmd.exe 77 PID 2252 wrote to memory of 4904 2252 cmd.exe 78 PID 2252 wrote to memory of 4904 2252 cmd.exe 78 PID 2252 wrote to memory of 4904 2252 cmd.exe 78 PID 2252 wrote to memory of 4828 2252 cmd.exe 79 PID 2252 wrote to memory of 4828 2252 cmd.exe 79 PID 2252 wrote to memory of 4828 2252 cmd.exe 79 PID 2252 wrote to memory of 4816 2252 cmd.exe 80 PID 2252 wrote to memory of 4816 2252 cmd.exe 80 PID 2252 wrote to memory of 4816 2252 cmd.exe 80 PID 2252 wrote to memory of 4832 2252 cmd.exe 81 PID 2252 wrote to memory of 4832 2252 cmd.exe 81 PID 2252 wrote to memory of 4832 2252 cmd.exe 81 PID 4768 wrote to memory of 4496 4768 oneetx.exe 83 PID 4768 wrote to memory of 4496 4768 oneetx.exe 83 PID 4768 wrote to memory of 4496 4768 oneetx.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8ff7b619e81e251e940ad9e1e0452dca75cb33072b1e561121b3478ccc414c2.exe"C:\Users\Admin\AppData\Local\Temp\e8ff7b619e81e251e940ad9e1e0452dca75cb33072b1e561121b3478ccc414c2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3572107.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3572107.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9397430.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9397430.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3985283.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3985283.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4304
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8923759.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8923759.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3692
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3964
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4444
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4904
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4828
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4816
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:4832
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4496
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:760
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3208
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD59b9153517c3249284184c49a1353b2b1
SHA1b0a7806886388063edc34d120c6f04e1f810613a
SHA256009e25d46639d4fa2181e2923b309eb93b87272443150f181da0c6ff17b895c9
SHA51281534a75c83ea0e7913372e0dd0b087b69cda7ae4f28e70be186774ecf65ef6975a8d42e2ca4fcd198600d1df6417534b93cc802b64e87f1825a430e8bb2d03e
-
Filesize
210KB
MD59b9153517c3249284184c49a1353b2b1
SHA1b0a7806886388063edc34d120c6f04e1f810613a
SHA256009e25d46639d4fa2181e2923b309eb93b87272443150f181da0c6ff17b895c9
SHA51281534a75c83ea0e7913372e0dd0b087b69cda7ae4f28e70be186774ecf65ef6975a8d42e2ca4fcd198600d1df6417534b93cc802b64e87f1825a430e8bb2d03e
-
Filesize
307KB
MD5110b7905695bcd1f7b090f7a703c0549
SHA1c1d3b4ff82102fc4a72d0ee32d948648528b8688
SHA25651141c294854899de333bb0483c693cdc2a0a3179bf9edf444e82a566117aaf8
SHA512667a46910ec547cbe4cb7cc7cc515e940d993a84dee817b2618a91c0f79b1cc371cc1e15c42893ae8fa5e459fbf14f3bc2a133a96b4acf40971827f3214ebcdd
-
Filesize
307KB
MD5110b7905695bcd1f7b090f7a703c0549
SHA1c1d3b4ff82102fc4a72d0ee32d948648528b8688
SHA25651141c294854899de333bb0483c693cdc2a0a3179bf9edf444e82a566117aaf8
SHA512667a46910ec547cbe4cb7cc7cc515e940d993a84dee817b2618a91c0f79b1cc371cc1e15c42893ae8fa5e459fbf14f3bc2a133a96b4acf40971827f3214ebcdd
-
Filesize
168KB
MD5bdf8db3ea86521aab6bf2d220b4a5ced
SHA17eb69c2acc9b5077eef9c4eaf21a803231474a1b
SHA2563eb6f5b4b1cdc1d45264202d90965fd475b574053a4f0a325895d2d68ca5b0ce
SHA512dbbba90334dfc9e218abefc0ceccc48b0f18aad9db7a2b15f5a950c169534a3756968468112553215cf322bdb4fd6be43b32edc75356e4535c180fbab4c726fd
-
Filesize
168KB
MD5bdf8db3ea86521aab6bf2d220b4a5ced
SHA17eb69c2acc9b5077eef9c4eaf21a803231474a1b
SHA2563eb6f5b4b1cdc1d45264202d90965fd475b574053a4f0a325895d2d68ca5b0ce
SHA512dbbba90334dfc9e218abefc0ceccc48b0f18aad9db7a2b15f5a950c169534a3756968468112553215cf322bdb4fd6be43b32edc75356e4535c180fbab4c726fd
-
Filesize
178KB
MD5f527f810b01b220321d30e72466915d4
SHA195e5a93709ab794d923424d757fafa40046993d0
SHA256e9afbb1edd4f282717493ebd5626174dd0e242014ac2c1a8e5ce7c487d4b97ce
SHA5125cf939f163bc26def89331bfa28e9b15a09c23f022bf2288e61fd422387a6d6fa7f1b5d910d84a604087c1708d9890fbdceb884489a64e13922bb6fd912dc2dc
-
Filesize
178KB
MD5f527f810b01b220321d30e72466915d4
SHA195e5a93709ab794d923424d757fafa40046993d0
SHA256e9afbb1edd4f282717493ebd5626174dd0e242014ac2c1a8e5ce7c487d4b97ce
SHA5125cf939f163bc26def89331bfa28e9b15a09c23f022bf2288e61fd422387a6d6fa7f1b5d910d84a604087c1708d9890fbdceb884489a64e13922bb6fd912dc2dc
-
Filesize
210KB
MD59b9153517c3249284184c49a1353b2b1
SHA1b0a7806886388063edc34d120c6f04e1f810613a
SHA256009e25d46639d4fa2181e2923b309eb93b87272443150f181da0c6ff17b895c9
SHA51281534a75c83ea0e7913372e0dd0b087b69cda7ae4f28e70be186774ecf65ef6975a8d42e2ca4fcd198600d1df6417534b93cc802b64e87f1825a430e8bb2d03e
-
Filesize
210KB
MD59b9153517c3249284184c49a1353b2b1
SHA1b0a7806886388063edc34d120c6f04e1f810613a
SHA256009e25d46639d4fa2181e2923b309eb93b87272443150f181da0c6ff17b895c9
SHA51281534a75c83ea0e7913372e0dd0b087b69cda7ae4f28e70be186774ecf65ef6975a8d42e2ca4fcd198600d1df6417534b93cc802b64e87f1825a430e8bb2d03e
-
Filesize
210KB
MD59b9153517c3249284184c49a1353b2b1
SHA1b0a7806886388063edc34d120c6f04e1f810613a
SHA256009e25d46639d4fa2181e2923b309eb93b87272443150f181da0c6ff17b895c9
SHA51281534a75c83ea0e7913372e0dd0b087b69cda7ae4f28e70be186774ecf65ef6975a8d42e2ca4fcd198600d1df6417534b93cc802b64e87f1825a430e8bb2d03e
-
Filesize
210KB
MD59b9153517c3249284184c49a1353b2b1
SHA1b0a7806886388063edc34d120c6f04e1f810613a
SHA256009e25d46639d4fa2181e2923b309eb93b87272443150f181da0c6ff17b895c9
SHA51281534a75c83ea0e7913372e0dd0b087b69cda7ae4f28e70be186774ecf65ef6975a8d42e2ca4fcd198600d1df6417534b93cc802b64e87f1825a430e8bb2d03e
-
Filesize
210KB
MD59b9153517c3249284184c49a1353b2b1
SHA1b0a7806886388063edc34d120c6f04e1f810613a
SHA256009e25d46639d4fa2181e2923b309eb93b87272443150f181da0c6ff17b895c9
SHA51281534a75c83ea0e7913372e0dd0b087b69cda7ae4f28e70be186774ecf65ef6975a8d42e2ca4fcd198600d1df6417534b93cc802b64e87f1825a430e8bb2d03e
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53