Analysis
-
max time kernel
135s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2023, 12:51
Static task
static1
Behavioral task
behavioral1
Sample
49f711eeb6070226c394988d921185d9e053ed4955d031aee9b521aba30eee34.exe
Resource
win10v2004-20230221-en
General
-
Target
49f711eeb6070226c394988d921185d9e053ed4955d031aee9b521aba30eee34.exe
-
Size
479KB
-
MD5
8f480b94a0f2cb17cb8e00900f5c6c34
-
SHA1
040862589c713c4e44659a8abf3518f65baf0a67
-
SHA256
49f711eeb6070226c394988d921185d9e053ed4955d031aee9b521aba30eee34
-
SHA512
4c22e7e64011ae2ed486ea8112e803d214b57eb153f797b15ea922c799a0d7b7e12262e63cd4c27f0f41ce85aece21341928da31bb676366dbfdb1a6cc345b67
-
SSDEEP
6144:KLy+bnr+Bp0yN90QEdSe1KkW8nZNzncreZPsaBXYI13QeghbnteayF55S9YJTH50:pMrJy90fSpgXYI13QeKoaylS2H5fKMk
Malware Config
Extracted
redline
maher
217.196.96.101:4132
-
auth_value
c57763165f68aabcf4874e661a1ffbac
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a6314380.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a6314380.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a6314380.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a6314380.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a6314380.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a6314380.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation d2577487.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 5116 v8825179.exe 4920 a6314380.exe 1736 b6197580.exe 4276 d2577487.exe 1276 oneetx.exe 1056 oneetx.exe 4912 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3776 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a6314380.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a6314380.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 49f711eeb6070226c394988d921185d9e053ed4955d031aee9b521aba30eee34.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 49f711eeb6070226c394988d921185d9e053ed4955d031aee9b521aba30eee34.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8825179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v8825179.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4196 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4920 a6314380.exe 4920 a6314380.exe 1736 b6197580.exe 1736 b6197580.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4920 a6314380.exe Token: SeDebugPrivilege 1736 b6197580.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4276 d2577487.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4536 wrote to memory of 5116 4536 49f711eeb6070226c394988d921185d9e053ed4955d031aee9b521aba30eee34.exe 82 PID 4536 wrote to memory of 5116 4536 49f711eeb6070226c394988d921185d9e053ed4955d031aee9b521aba30eee34.exe 82 PID 4536 wrote to memory of 5116 4536 49f711eeb6070226c394988d921185d9e053ed4955d031aee9b521aba30eee34.exe 82 PID 5116 wrote to memory of 4920 5116 v8825179.exe 83 PID 5116 wrote to memory of 4920 5116 v8825179.exe 83 PID 5116 wrote to memory of 4920 5116 v8825179.exe 83 PID 5116 wrote to memory of 1736 5116 v8825179.exe 88 PID 5116 wrote to memory of 1736 5116 v8825179.exe 88 PID 5116 wrote to memory of 1736 5116 v8825179.exe 88 PID 4536 wrote to memory of 4276 4536 49f711eeb6070226c394988d921185d9e053ed4955d031aee9b521aba30eee34.exe 92 PID 4536 wrote to memory of 4276 4536 49f711eeb6070226c394988d921185d9e053ed4955d031aee9b521aba30eee34.exe 92 PID 4536 wrote to memory of 4276 4536 49f711eeb6070226c394988d921185d9e053ed4955d031aee9b521aba30eee34.exe 92 PID 4276 wrote to memory of 1276 4276 d2577487.exe 93 PID 4276 wrote to memory of 1276 4276 d2577487.exe 93 PID 4276 wrote to memory of 1276 4276 d2577487.exe 93 PID 1276 wrote to memory of 4196 1276 oneetx.exe 94 PID 1276 wrote to memory of 4196 1276 oneetx.exe 94 PID 1276 wrote to memory of 4196 1276 oneetx.exe 94 PID 1276 wrote to memory of 5056 1276 oneetx.exe 96 PID 1276 wrote to memory of 5056 1276 oneetx.exe 96 PID 1276 wrote to memory of 5056 1276 oneetx.exe 96 PID 5056 wrote to memory of 1272 5056 cmd.exe 98 PID 5056 wrote to memory of 1272 5056 cmd.exe 98 PID 5056 wrote to memory of 1272 5056 cmd.exe 98 PID 5056 wrote to memory of 5020 5056 cmd.exe 99 PID 5056 wrote to memory of 5020 5056 cmd.exe 99 PID 5056 wrote to memory of 5020 5056 cmd.exe 99 PID 5056 wrote to memory of 3188 5056 cmd.exe 100 PID 5056 wrote to memory of 3188 5056 cmd.exe 100 PID 5056 wrote to memory of 3188 5056 cmd.exe 100 PID 5056 wrote to memory of 2052 5056 cmd.exe 101 PID 5056 wrote to memory of 2052 5056 cmd.exe 101 PID 5056 wrote to memory of 2052 5056 cmd.exe 101 PID 5056 wrote to memory of 3736 5056 cmd.exe 102 PID 5056 wrote to memory of 3736 5056 cmd.exe 102 PID 5056 wrote to memory of 3736 5056 cmd.exe 102 PID 5056 wrote to memory of 4748 5056 cmd.exe 103 PID 5056 wrote to memory of 4748 5056 cmd.exe 103 PID 5056 wrote to memory of 4748 5056 cmd.exe 103 PID 1276 wrote to memory of 3776 1276 oneetx.exe 106 PID 1276 wrote to memory of 3776 1276 oneetx.exe 106 PID 1276 wrote to memory of 3776 1276 oneetx.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\49f711eeb6070226c394988d921185d9e053ed4955d031aee9b521aba30eee34.exe"C:\Users\Admin\AppData\Local\Temp\49f711eeb6070226c394988d921185d9e053ed4955d031aee9b521aba30eee34.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8825179.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8825179.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a6314380.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a6314380.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4920
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6197580.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6197580.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1736
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2577487.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2577487.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4196
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1272
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:5020
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3188
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2052
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:3736
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:4748
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3776
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1056
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4912
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD5e426a319081235a12b336a7f8187fa43
SHA187d787e5c831bc23dff5ba5dd9fc0e9730fb509f
SHA256e06db96979783e7f4e3a982cff880bf3e5045ae694b533ae71dd9b3ae61807bc
SHA512026a87a60b47009095655e5a387eda09e6782c225fddac5051e3db1cbae63b5f713963922392f57a0839c35acb3f59f73a85745929a1b57fa8fdfad63f70d8d6
-
Filesize
210KB
MD5e426a319081235a12b336a7f8187fa43
SHA187d787e5c831bc23dff5ba5dd9fc0e9730fb509f
SHA256e06db96979783e7f4e3a982cff880bf3e5045ae694b533ae71dd9b3ae61807bc
SHA512026a87a60b47009095655e5a387eda09e6782c225fddac5051e3db1cbae63b5f713963922392f57a0839c35acb3f59f73a85745929a1b57fa8fdfad63f70d8d6
-
Filesize
307KB
MD5ae352e3a32079bcfcf63b7facacbceec
SHA1d909def09455c5ac627d82b6d28a0e02666b6efa
SHA2560ef6dc50ece92cdb43885ef2da05a3d0e83ddf697e968c3af9fe6d99147216be
SHA512eeb7820833ff637b712006edb31edf42b5a766d4cd040dde06a20ebb685e197121e056b54d3d45c0447ac38b50437007c71a7d0974763229d9fdfff25222dad0
-
Filesize
307KB
MD5ae352e3a32079bcfcf63b7facacbceec
SHA1d909def09455c5ac627d82b6d28a0e02666b6efa
SHA2560ef6dc50ece92cdb43885ef2da05a3d0e83ddf697e968c3af9fe6d99147216be
SHA512eeb7820833ff637b712006edb31edf42b5a766d4cd040dde06a20ebb685e197121e056b54d3d45c0447ac38b50437007c71a7d0974763229d9fdfff25222dad0
-
Filesize
179KB
MD5f54fd68d6745b7e8f303ce74e0bad01a
SHA1a0134dc9ab1a6c18d9942c4795410a1484d53d80
SHA256910e58a61490bffff685a4e68c338cbc87e55fe1ae5aef9d79cfd607f2f3548d
SHA51257b4ffdd49dde28ad47b02b0742a4daf2b233501e3717b6b86ce887f072aac9445dc1f443e843409cdcdf034a11d5a58e47475a4d5f0c705f24bc2d5dc8b9353
-
Filesize
179KB
MD5f54fd68d6745b7e8f303ce74e0bad01a
SHA1a0134dc9ab1a6c18d9942c4795410a1484d53d80
SHA256910e58a61490bffff685a4e68c338cbc87e55fe1ae5aef9d79cfd607f2f3548d
SHA51257b4ffdd49dde28ad47b02b0742a4daf2b233501e3717b6b86ce887f072aac9445dc1f443e843409cdcdf034a11d5a58e47475a4d5f0c705f24bc2d5dc8b9353
-
Filesize
168KB
MD5acce4d7577317fd0789f3d21b55135ff
SHA1a9e7eec76b11218f94eace82765d0eb431fd14ec
SHA2567ddf4dcdf729ed8b7fe168d0a140c7f7b1842f373c4f5d87d870d7de49da9d8f
SHA512df9cd51a34e4692e6a1e189dbde151c3ca592b1104857f4c00490bc94654cca3e02f146559d8b2fa3b0cc75565d085263ac297e851123d3e51bff2106a19e92d
-
Filesize
168KB
MD5acce4d7577317fd0789f3d21b55135ff
SHA1a9e7eec76b11218f94eace82765d0eb431fd14ec
SHA2567ddf4dcdf729ed8b7fe168d0a140c7f7b1842f373c4f5d87d870d7de49da9d8f
SHA512df9cd51a34e4692e6a1e189dbde151c3ca592b1104857f4c00490bc94654cca3e02f146559d8b2fa3b0cc75565d085263ac297e851123d3e51bff2106a19e92d
-
Filesize
210KB
MD5e426a319081235a12b336a7f8187fa43
SHA187d787e5c831bc23dff5ba5dd9fc0e9730fb509f
SHA256e06db96979783e7f4e3a982cff880bf3e5045ae694b533ae71dd9b3ae61807bc
SHA512026a87a60b47009095655e5a387eda09e6782c225fddac5051e3db1cbae63b5f713963922392f57a0839c35acb3f59f73a85745929a1b57fa8fdfad63f70d8d6
-
Filesize
210KB
MD5e426a319081235a12b336a7f8187fa43
SHA187d787e5c831bc23dff5ba5dd9fc0e9730fb509f
SHA256e06db96979783e7f4e3a982cff880bf3e5045ae694b533ae71dd9b3ae61807bc
SHA512026a87a60b47009095655e5a387eda09e6782c225fddac5051e3db1cbae63b5f713963922392f57a0839c35acb3f59f73a85745929a1b57fa8fdfad63f70d8d6
-
Filesize
210KB
MD5e426a319081235a12b336a7f8187fa43
SHA187d787e5c831bc23dff5ba5dd9fc0e9730fb509f
SHA256e06db96979783e7f4e3a982cff880bf3e5045ae694b533ae71dd9b3ae61807bc
SHA512026a87a60b47009095655e5a387eda09e6782c225fddac5051e3db1cbae63b5f713963922392f57a0839c35acb3f59f73a85745929a1b57fa8fdfad63f70d8d6
-
Filesize
210KB
MD5e426a319081235a12b336a7f8187fa43
SHA187d787e5c831bc23dff5ba5dd9fc0e9730fb509f
SHA256e06db96979783e7f4e3a982cff880bf3e5045ae694b533ae71dd9b3ae61807bc
SHA512026a87a60b47009095655e5a387eda09e6782c225fddac5051e3db1cbae63b5f713963922392f57a0839c35acb3f59f73a85745929a1b57fa8fdfad63f70d8d6
-
Filesize
210KB
MD5e426a319081235a12b336a7f8187fa43
SHA187d787e5c831bc23dff5ba5dd9fc0e9730fb509f
SHA256e06db96979783e7f4e3a982cff880bf3e5045ae694b533ae71dd9b3ae61807bc
SHA512026a87a60b47009095655e5a387eda09e6782c225fddac5051e3db1cbae63b5f713963922392f57a0839c35acb3f59f73a85745929a1b57fa8fdfad63f70d8d6
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5