Analysis

  • max time kernel
    149s
  • max time network
    145s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    08-05-2023 09:35

General

  • Target

    0e7e440bb11d161ebc92ae405652b89262835c8bec059633751f5c5d60c32f7b.exe

  • Size

    479KB

  • MD5

    6560e500e53b2c2cc901a4e7f9e4742a

  • SHA1

    d43f58e23b043121eccd5e4eec0c3a4ae0f24876

  • SHA256

    0e7e440bb11d161ebc92ae405652b89262835c8bec059633751f5c5d60c32f7b

  • SHA512

    16a7f1fd8421544db95e7130039de81b06d75e660620087af7746b15b6f5a57e562a2d0841e0673ae9d773f5d5ea71e1aa106304096904c710d48525728ef8a5

  • SSDEEP

    6144:KWy+bnr+Jp0yN90QExRoxFHp9NepZYVXf5dL+oZJSw+QUjoIBgrUeDH1N3pIQwnS:mMrBy90uxBp9hVvnL+XjQsoygr7HWzS

Malware Config

Extracted

Family

redline

Botnet

maher

C2

217.196.96.101:4132

Attributes
  • auth_value

    c57763165f68aabcf4874e661a1ffbac

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e7e440bb11d161ebc92ae405652b89262835c8bec059633751f5c5d60c32f7b.exe
    "C:\Users\Admin\AppData\Local\Temp\0e7e440bb11d161ebc92ae405652b89262835c8bec059633751f5c5d60c32f7b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1852
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7363843.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7363843.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4496
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7757301.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7757301.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4252
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b8709795.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b8709795.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2968
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d4392366.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d4392366.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4532
      • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4368
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4708
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1984
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:4328
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:N"
              5⤵
                PID:3464
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                5⤵
                  PID:3680
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4808
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\c3912af058" /P "Admin:N"
                    5⤵
                      PID:2864
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\c3912af058" /P "Admin:R" /E
                      5⤵
                        PID:4676
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:3880
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:4724
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:4924
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:3952

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d4392366.exe

                Filesize

                210KB

                MD5

                346b8c61c6ca1055731b06b483296d46

                SHA1

                70658499a22142e87664c0d8e9bafa19ec1733d7

                SHA256

                0332c104a82e73a14b32ddc583aa389b38e8d72cf8c810fb2d682e59170a4bb2

                SHA512

                aed054d175ef120898a5bc7e5e9a8255fc5e890df123442a42e91be4b38b83292d398d9b761f698e0ec91ce357beba8c79ab92cf4e960e1aaf5873380d9e2e23

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d4392366.exe

                Filesize

                210KB

                MD5

                346b8c61c6ca1055731b06b483296d46

                SHA1

                70658499a22142e87664c0d8e9bafa19ec1733d7

                SHA256

                0332c104a82e73a14b32ddc583aa389b38e8d72cf8c810fb2d682e59170a4bb2

                SHA512

                aed054d175ef120898a5bc7e5e9a8255fc5e890df123442a42e91be4b38b83292d398d9b761f698e0ec91ce357beba8c79ab92cf4e960e1aaf5873380d9e2e23

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7363843.exe

                Filesize

                307KB

                MD5

                3361d5afad0d5134bc50537418e90981

                SHA1

                5c3b22fd39c136c6eda29438927a23d774a7dcdf

                SHA256

                69440e2ee06e93a70c2284b298bebf7ea55f376a82758538727328fd2729f19f

                SHA512

                0efe58f651336e6186047d6c2846e669c2190dbd7d1eca213f4dcf1493f4099536321d6c89aeaee9c3d390a467a323ef10c374942b226c9fc65e48de2df2b4bf

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7363843.exe

                Filesize

                307KB

                MD5

                3361d5afad0d5134bc50537418e90981

                SHA1

                5c3b22fd39c136c6eda29438927a23d774a7dcdf

                SHA256

                69440e2ee06e93a70c2284b298bebf7ea55f376a82758538727328fd2729f19f

                SHA512

                0efe58f651336e6186047d6c2846e669c2190dbd7d1eca213f4dcf1493f4099536321d6c89aeaee9c3d390a467a323ef10c374942b226c9fc65e48de2df2b4bf

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7757301.exe

                Filesize

                179KB

                MD5

                2997e6b81f9392b0a4ed05f55e64062c

                SHA1

                0744a91cb4288781f0d0f709b113b948dbf0253a

                SHA256

                9f910e4b484334576d91b02744584d68abde34853e4b7414bee3410abecce854

                SHA512

                159e8cf3c2f701e4ba6150ff3cafea21cf4b6055423b24cfe9a2ed61e3194b49ba5a29dc17df6741c2b8b5f6d9eecc2ef6b63794a9b1fc2bbd471c359095b5d7

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7757301.exe

                Filesize

                179KB

                MD5

                2997e6b81f9392b0a4ed05f55e64062c

                SHA1

                0744a91cb4288781f0d0f709b113b948dbf0253a

                SHA256

                9f910e4b484334576d91b02744584d68abde34853e4b7414bee3410abecce854

                SHA512

                159e8cf3c2f701e4ba6150ff3cafea21cf4b6055423b24cfe9a2ed61e3194b49ba5a29dc17df6741c2b8b5f6d9eecc2ef6b63794a9b1fc2bbd471c359095b5d7

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b8709795.exe

                Filesize

                168KB

                MD5

                d39bc6862ec97b8484f02483bc6acedf

                SHA1

                ca890a10a95f7d762b2b0519329ea582d98cb8b2

                SHA256

                90df9f0bdfae9d1ce601a3a23d40978662e4c80f568e20c7c173dc52b5a9dc9f

                SHA512

                1d2a1ba3523951264635ff9375f72b699b189082fe950d4532c5c58ac308f5306f6f04fb2e94830773e8d0072cf26323ee237acaa2978a9dfdf82761e4913973

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b8709795.exe

                Filesize

                168KB

                MD5

                d39bc6862ec97b8484f02483bc6acedf

                SHA1

                ca890a10a95f7d762b2b0519329ea582d98cb8b2

                SHA256

                90df9f0bdfae9d1ce601a3a23d40978662e4c80f568e20c7c173dc52b5a9dc9f

                SHA512

                1d2a1ba3523951264635ff9375f72b699b189082fe950d4532c5c58ac308f5306f6f04fb2e94830773e8d0072cf26323ee237acaa2978a9dfdf82761e4913973

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                210KB

                MD5

                346b8c61c6ca1055731b06b483296d46

                SHA1

                70658499a22142e87664c0d8e9bafa19ec1733d7

                SHA256

                0332c104a82e73a14b32ddc583aa389b38e8d72cf8c810fb2d682e59170a4bb2

                SHA512

                aed054d175ef120898a5bc7e5e9a8255fc5e890df123442a42e91be4b38b83292d398d9b761f698e0ec91ce357beba8c79ab92cf4e960e1aaf5873380d9e2e23

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                210KB

                MD5

                346b8c61c6ca1055731b06b483296d46

                SHA1

                70658499a22142e87664c0d8e9bafa19ec1733d7

                SHA256

                0332c104a82e73a14b32ddc583aa389b38e8d72cf8c810fb2d682e59170a4bb2

                SHA512

                aed054d175ef120898a5bc7e5e9a8255fc5e890df123442a42e91be4b38b83292d398d9b761f698e0ec91ce357beba8c79ab92cf4e960e1aaf5873380d9e2e23

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                210KB

                MD5

                346b8c61c6ca1055731b06b483296d46

                SHA1

                70658499a22142e87664c0d8e9bafa19ec1733d7

                SHA256

                0332c104a82e73a14b32ddc583aa389b38e8d72cf8c810fb2d682e59170a4bb2

                SHA512

                aed054d175ef120898a5bc7e5e9a8255fc5e890df123442a42e91be4b38b83292d398d9b761f698e0ec91ce357beba8c79ab92cf4e960e1aaf5873380d9e2e23

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                210KB

                MD5

                346b8c61c6ca1055731b06b483296d46

                SHA1

                70658499a22142e87664c0d8e9bafa19ec1733d7

                SHA256

                0332c104a82e73a14b32ddc583aa389b38e8d72cf8c810fb2d682e59170a4bb2

                SHA512

                aed054d175ef120898a5bc7e5e9a8255fc5e890df123442a42e91be4b38b83292d398d9b761f698e0ec91ce357beba8c79ab92cf4e960e1aaf5873380d9e2e23

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                210KB

                MD5

                346b8c61c6ca1055731b06b483296d46

                SHA1

                70658499a22142e87664c0d8e9bafa19ec1733d7

                SHA256

                0332c104a82e73a14b32ddc583aa389b38e8d72cf8c810fb2d682e59170a4bb2

                SHA512

                aed054d175ef120898a5bc7e5e9a8255fc5e890df123442a42e91be4b38b83292d398d9b761f698e0ec91ce357beba8c79ab92cf4e960e1aaf5873380d9e2e23

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                210KB

                MD5

                346b8c61c6ca1055731b06b483296d46

                SHA1

                70658499a22142e87664c0d8e9bafa19ec1733d7

                SHA256

                0332c104a82e73a14b32ddc583aa389b38e8d72cf8c810fb2d682e59170a4bb2

                SHA512

                aed054d175ef120898a5bc7e5e9a8255fc5e890df123442a42e91be4b38b83292d398d9b761f698e0ec91ce357beba8c79ab92cf4e960e1aaf5873380d9e2e23

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • memory/2968-184-0x0000000006200000-0x0000000006250000-memory.dmp

                Filesize

                320KB

              • memory/2968-178-0x0000000004F70000-0x0000000004FAE000-memory.dmp

                Filesize

                248KB

              • memory/2968-183-0x0000000005660000-0x00000000056C6000-memory.dmp

                Filesize

                408KB

              • memory/2968-182-0x00000000054C0000-0x0000000005552000-memory.dmp

                Filesize

                584KB

              • memory/2968-181-0x00000000053A0000-0x0000000005416000-memory.dmp

                Filesize

                472KB

              • memory/2968-180-0x0000000004FC0000-0x0000000004FD0000-memory.dmp

                Filesize

                64KB

              • memory/2968-179-0x00000000050D0000-0x000000000511B000-memory.dmp

                Filesize

                300KB

              • memory/2968-185-0x0000000006B00000-0x0000000006CC2000-memory.dmp

                Filesize

                1.8MB

              • memory/2968-177-0x0000000004F10000-0x0000000004F22000-memory.dmp

                Filesize

                72KB

              • memory/2968-186-0x0000000008880000-0x0000000008DAC000-memory.dmp

                Filesize

                5.2MB

              • memory/2968-176-0x00000000051E0000-0x00000000052EA000-memory.dmp

                Filesize

                1.0MB

              • memory/2968-173-0x00000000005D0000-0x0000000000600000-memory.dmp

                Filesize

                192KB

              • memory/2968-174-0x0000000000CE0000-0x0000000000CE6000-memory.dmp

                Filesize

                24KB

              • memory/2968-175-0x00000000056E0000-0x0000000005CE6000-memory.dmp

                Filesize

                6.0MB

              • memory/4252-144-0x0000000004910000-0x0000000004922000-memory.dmp

                Filesize

                72KB

              • memory/4252-168-0x0000000004950000-0x0000000004960000-memory.dmp

                Filesize

                64KB

              • memory/4252-167-0x0000000004950000-0x0000000004960000-memory.dmp

                Filesize

                64KB

              • memory/4252-166-0x0000000004910000-0x0000000004922000-memory.dmp

                Filesize

                72KB

              • memory/4252-164-0x0000000004910000-0x0000000004922000-memory.dmp

                Filesize

                72KB

              • memory/4252-162-0x0000000004910000-0x0000000004922000-memory.dmp

                Filesize

                72KB

              • memory/4252-160-0x0000000004910000-0x0000000004922000-memory.dmp

                Filesize

                72KB

              • memory/4252-158-0x0000000004910000-0x0000000004922000-memory.dmp

                Filesize

                72KB

              • memory/4252-156-0x0000000004910000-0x0000000004922000-memory.dmp

                Filesize

                72KB

              • memory/4252-154-0x0000000004910000-0x0000000004922000-memory.dmp

                Filesize

                72KB

              • memory/4252-152-0x0000000004910000-0x0000000004922000-memory.dmp

                Filesize

                72KB

              • memory/4252-150-0x0000000004910000-0x0000000004922000-memory.dmp

                Filesize

                72KB

              • memory/4252-148-0x0000000004910000-0x0000000004922000-memory.dmp

                Filesize

                72KB

              • memory/4252-146-0x0000000004910000-0x0000000004922000-memory.dmp

                Filesize

                72KB

              • memory/4252-142-0x0000000004910000-0x0000000004922000-memory.dmp

                Filesize

                72KB

              • memory/4252-140-0x0000000004910000-0x0000000004922000-memory.dmp

                Filesize

                72KB

              • memory/4252-139-0x0000000004910000-0x0000000004922000-memory.dmp

                Filesize

                72KB

              • memory/4252-138-0x0000000004910000-0x0000000004928000-memory.dmp

                Filesize

                96KB

              • memory/4252-137-0x0000000004950000-0x0000000004960000-memory.dmp

                Filesize

                64KB

              • memory/4252-136-0x0000000004950000-0x0000000004960000-memory.dmp

                Filesize

                64KB

              • memory/4252-135-0x0000000004960000-0x0000000004E5E000-memory.dmp

                Filesize

                5.0MB

              • memory/4252-134-0x0000000004950000-0x0000000004960000-memory.dmp

                Filesize

                64KB

              • memory/4252-133-0x0000000001FE0000-0x0000000001FFA000-memory.dmp

                Filesize

                104KB