Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
08-05-2023 06:33
Static task
static1
Behavioral task
behavioral1
Sample
0c9fbf72ee3e72d2a546ea7b70d1c47fc82a0f9c543632d2212fe4595aaac455.exe
Resource
win10-20230220-en
General
-
Target
0c9fbf72ee3e72d2a546ea7b70d1c47fc82a0f9c543632d2212fe4595aaac455.exe
-
Size
479KB
-
MD5
8f10a97b0432fd2353b852767da5c24e
-
SHA1
1d800862be017f8d3d02f68e327d4703959f2054
-
SHA256
0c9fbf72ee3e72d2a546ea7b70d1c47fc82a0f9c543632d2212fe4595aaac455
-
SHA512
620776a693aabdfcb73ce21e3fee8b6995768fcddf0f76b76d2ffa3e0fef090680c2545885409632673b50f99a9006d6a951a47ec447beb5baae91f978f3a1cf
-
SSDEEP
12288:JMrXy90T7u4ZE7oTirBRQaGkQdaIXepH4DckbNDdDD:+y4Xe7oTidgkQd5fckpJDD
Malware Config
Extracted
redline
morty
217.196.96.101:4132
-
auth_value
fe1a24c211cc8e5bf9ff11c737ce0e97
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a9622563.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a9622563.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a9622563.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a9622563.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a9622563.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 8 IoCs
pid Process 2508 v1027289.exe 2552 a9622563.exe 4744 b0187132.exe 4012 d7147009.exe 4960 oneetx.exe 4364 oneetx.exe 3564 oneetx.exe 5012 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 5096 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a9622563.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a9622563.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0c9fbf72ee3e72d2a546ea7b70d1c47fc82a0f9c543632d2212fe4595aaac455.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0c9fbf72ee3e72d2a546ea7b70d1c47fc82a0f9c543632d2212fe4595aaac455.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1027289.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v1027289.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4520 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2552 a9622563.exe 2552 a9622563.exe 4744 b0187132.exe 4744 b0187132.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2552 a9622563.exe Token: SeDebugPrivilege 4744 b0187132.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4012 d7147009.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2508 2156 0c9fbf72ee3e72d2a546ea7b70d1c47fc82a0f9c543632d2212fe4595aaac455.exe 66 PID 2156 wrote to memory of 2508 2156 0c9fbf72ee3e72d2a546ea7b70d1c47fc82a0f9c543632d2212fe4595aaac455.exe 66 PID 2156 wrote to memory of 2508 2156 0c9fbf72ee3e72d2a546ea7b70d1c47fc82a0f9c543632d2212fe4595aaac455.exe 66 PID 2508 wrote to memory of 2552 2508 v1027289.exe 67 PID 2508 wrote to memory of 2552 2508 v1027289.exe 67 PID 2508 wrote to memory of 2552 2508 v1027289.exe 67 PID 2508 wrote to memory of 4744 2508 v1027289.exe 68 PID 2508 wrote to memory of 4744 2508 v1027289.exe 68 PID 2508 wrote to memory of 4744 2508 v1027289.exe 68 PID 2156 wrote to memory of 4012 2156 0c9fbf72ee3e72d2a546ea7b70d1c47fc82a0f9c543632d2212fe4595aaac455.exe 70 PID 2156 wrote to memory of 4012 2156 0c9fbf72ee3e72d2a546ea7b70d1c47fc82a0f9c543632d2212fe4595aaac455.exe 70 PID 2156 wrote to memory of 4012 2156 0c9fbf72ee3e72d2a546ea7b70d1c47fc82a0f9c543632d2212fe4595aaac455.exe 70 PID 4012 wrote to memory of 4960 4012 d7147009.exe 71 PID 4012 wrote to memory of 4960 4012 d7147009.exe 71 PID 4012 wrote to memory of 4960 4012 d7147009.exe 71 PID 4960 wrote to memory of 4520 4960 oneetx.exe 72 PID 4960 wrote to memory of 4520 4960 oneetx.exe 72 PID 4960 wrote to memory of 4520 4960 oneetx.exe 72 PID 4960 wrote to memory of 512 4960 oneetx.exe 73 PID 4960 wrote to memory of 512 4960 oneetx.exe 73 PID 4960 wrote to memory of 512 4960 oneetx.exe 73 PID 512 wrote to memory of 1820 512 cmd.exe 76 PID 512 wrote to memory of 1820 512 cmd.exe 76 PID 512 wrote to memory of 1820 512 cmd.exe 76 PID 512 wrote to memory of 4716 512 cmd.exe 77 PID 512 wrote to memory of 4716 512 cmd.exe 77 PID 512 wrote to memory of 4716 512 cmd.exe 77 PID 512 wrote to memory of 4664 512 cmd.exe 78 PID 512 wrote to memory of 4664 512 cmd.exe 78 PID 512 wrote to memory of 4664 512 cmd.exe 78 PID 512 wrote to memory of 4392 512 cmd.exe 79 PID 512 wrote to memory of 4392 512 cmd.exe 79 PID 512 wrote to memory of 4392 512 cmd.exe 79 PID 512 wrote to memory of 4724 512 cmd.exe 80 PID 512 wrote to memory of 4724 512 cmd.exe 80 PID 512 wrote to memory of 4724 512 cmd.exe 80 PID 512 wrote to memory of 4804 512 cmd.exe 81 PID 512 wrote to memory of 4804 512 cmd.exe 81 PID 512 wrote to memory of 4804 512 cmd.exe 81 PID 4960 wrote to memory of 5096 4960 oneetx.exe 83 PID 4960 wrote to memory of 5096 4960 oneetx.exe 83 PID 4960 wrote to memory of 5096 4960 oneetx.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c9fbf72ee3e72d2a546ea7b70d1c47fc82a0f9c543632d2212fe4595aaac455.exe"C:\Users\Admin\AppData\Local\Temp\0c9fbf72ee3e72d2a546ea7b70d1c47fc82a0f9c543632d2212fe4595aaac455.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1027289.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1027289.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a9622563.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a9622563.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0187132.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0187132.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4744
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7147009.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7147009.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4520
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1820
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4716
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4664
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4392
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4724
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:4804
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:5096
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4364
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3564
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:5012
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD5b782bd89ae663944537eb70f5a89d5d4
SHA17853380ce36fb3673a5e201d6d796e11828f6f63
SHA256f6e91dfa0f5659cf9d656247526622936915b691e6d266df8d16b0495b04daf8
SHA5120f51312ead57932add49aba5698401f25d7fff00dca9b9ad61fc856d4fdf733bcb67a02f52b2f36b17d7bcc160450d0f76e8089b3501f9b52ac3e51557a94641
-
Filesize
210KB
MD5b782bd89ae663944537eb70f5a89d5d4
SHA17853380ce36fb3673a5e201d6d796e11828f6f63
SHA256f6e91dfa0f5659cf9d656247526622936915b691e6d266df8d16b0495b04daf8
SHA5120f51312ead57932add49aba5698401f25d7fff00dca9b9ad61fc856d4fdf733bcb67a02f52b2f36b17d7bcc160450d0f76e8089b3501f9b52ac3e51557a94641
-
Filesize
307KB
MD52fb5e38ad73d8b58f0229b7c28d501c3
SHA1a863276543339dc456919934612b34edb31acf3c
SHA256697b9b860346c7b05a01a9fb17c095bb5049b5d89ccf18a6ad91b4993eec0a0e
SHA5124ac701b80cabf25646f75a764c6c4169e3180ab0d6fafe40cb6b5c2e0f9ddcfed4686c3c08eee08cf86d20fd5a70be6d1df10d7f670859d34ce2fcf41ed39a15
-
Filesize
307KB
MD52fb5e38ad73d8b58f0229b7c28d501c3
SHA1a863276543339dc456919934612b34edb31acf3c
SHA256697b9b860346c7b05a01a9fb17c095bb5049b5d89ccf18a6ad91b4993eec0a0e
SHA5124ac701b80cabf25646f75a764c6c4169e3180ab0d6fafe40cb6b5c2e0f9ddcfed4686c3c08eee08cf86d20fd5a70be6d1df10d7f670859d34ce2fcf41ed39a15
-
Filesize
178KB
MD504cc1aa81f917e6f01cdde33a922d628
SHA1e97153efa62f4fb06517958f34a90c3fed6d1e22
SHA25657a95fc0fdca1a1a40c02248114ba6331c853930ec62458262ca1531940009e2
SHA512a7d7b03c8f8f6ff87333b8b93e3816b8a1bb8ec4b4d067cbc52ab27ce31d841e479e00494d99d4ed84a3c819ddef357c91d29f33815b6010c8c3494476910f6e
-
Filesize
178KB
MD504cc1aa81f917e6f01cdde33a922d628
SHA1e97153efa62f4fb06517958f34a90c3fed6d1e22
SHA25657a95fc0fdca1a1a40c02248114ba6331c853930ec62458262ca1531940009e2
SHA512a7d7b03c8f8f6ff87333b8b93e3816b8a1bb8ec4b4d067cbc52ab27ce31d841e479e00494d99d4ed84a3c819ddef357c91d29f33815b6010c8c3494476910f6e
-
Filesize
168KB
MD5aa2f2cacf528f05f1b19c670099ff86a
SHA1f9bc661b829d84b37f7940649996adb90c46d530
SHA256d436312ad41e19430cb4288eae86a430fc295030ff1b0d6aa33e7e34bcb07211
SHA512c51ad91c32918ccdcceea0a548cbe462488b7fb47e6fa5343e82d5fe8af563fee25e3bb505cedde05d8f6df9a14437d4c3b0b4f508eb4612d4bce666b1979e2c
-
Filesize
168KB
MD5aa2f2cacf528f05f1b19c670099ff86a
SHA1f9bc661b829d84b37f7940649996adb90c46d530
SHA256d436312ad41e19430cb4288eae86a430fc295030ff1b0d6aa33e7e34bcb07211
SHA512c51ad91c32918ccdcceea0a548cbe462488b7fb47e6fa5343e82d5fe8af563fee25e3bb505cedde05d8f6df9a14437d4c3b0b4f508eb4612d4bce666b1979e2c
-
Filesize
210KB
MD5b782bd89ae663944537eb70f5a89d5d4
SHA17853380ce36fb3673a5e201d6d796e11828f6f63
SHA256f6e91dfa0f5659cf9d656247526622936915b691e6d266df8d16b0495b04daf8
SHA5120f51312ead57932add49aba5698401f25d7fff00dca9b9ad61fc856d4fdf733bcb67a02f52b2f36b17d7bcc160450d0f76e8089b3501f9b52ac3e51557a94641
-
Filesize
210KB
MD5b782bd89ae663944537eb70f5a89d5d4
SHA17853380ce36fb3673a5e201d6d796e11828f6f63
SHA256f6e91dfa0f5659cf9d656247526622936915b691e6d266df8d16b0495b04daf8
SHA5120f51312ead57932add49aba5698401f25d7fff00dca9b9ad61fc856d4fdf733bcb67a02f52b2f36b17d7bcc160450d0f76e8089b3501f9b52ac3e51557a94641
-
Filesize
210KB
MD5b782bd89ae663944537eb70f5a89d5d4
SHA17853380ce36fb3673a5e201d6d796e11828f6f63
SHA256f6e91dfa0f5659cf9d656247526622936915b691e6d266df8d16b0495b04daf8
SHA5120f51312ead57932add49aba5698401f25d7fff00dca9b9ad61fc856d4fdf733bcb67a02f52b2f36b17d7bcc160450d0f76e8089b3501f9b52ac3e51557a94641
-
Filesize
210KB
MD5b782bd89ae663944537eb70f5a89d5d4
SHA17853380ce36fb3673a5e201d6d796e11828f6f63
SHA256f6e91dfa0f5659cf9d656247526622936915b691e6d266df8d16b0495b04daf8
SHA5120f51312ead57932add49aba5698401f25d7fff00dca9b9ad61fc856d4fdf733bcb67a02f52b2f36b17d7bcc160450d0f76e8089b3501f9b52ac3e51557a94641
-
Filesize
210KB
MD5b782bd89ae663944537eb70f5a89d5d4
SHA17853380ce36fb3673a5e201d6d796e11828f6f63
SHA256f6e91dfa0f5659cf9d656247526622936915b691e6d266df8d16b0495b04daf8
SHA5120f51312ead57932add49aba5698401f25d7fff00dca9b9ad61fc856d4fdf733bcb67a02f52b2f36b17d7bcc160450d0f76e8089b3501f9b52ac3e51557a94641
-
Filesize
210KB
MD5b782bd89ae663944537eb70f5a89d5d4
SHA17853380ce36fb3673a5e201d6d796e11828f6f63
SHA256f6e91dfa0f5659cf9d656247526622936915b691e6d266df8d16b0495b04daf8
SHA5120f51312ead57932add49aba5698401f25d7fff00dca9b9ad61fc856d4fdf733bcb67a02f52b2f36b17d7bcc160450d0f76e8089b3501f9b52ac3e51557a94641
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53