Analysis
-
max time kernel
135s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
08-05-2023 14:28
Static task
static1
Behavioral task
behavioral1
Sample
14047d176f59ac37cb5b17949f11c84940f32bcf41ad2c95b22e8821bfb6fde0.exe
Resource
win10-20230220-en
General
-
Target
14047d176f59ac37cb5b17949f11c84940f32bcf41ad2c95b22e8821bfb6fde0.exe
-
Size
479KB
-
MD5
ddb2fa5da1b2b6554636d6c6ebf24ed2
-
SHA1
79cc8c380fd0cdccc7bce7712410079fd89de95f
-
SHA256
14047d176f59ac37cb5b17949f11c84940f32bcf41ad2c95b22e8821bfb6fde0
-
SHA512
916371cc78a9bcd127b14fb6992d216f2a3d9409ee31492d466e6d855015abd1ab18290db940286f5baa37a04eb59858d0113f6e5a158a06d2dc6b0cefa2df63
-
SSDEEP
12288:ZMrMy90FRTJp+vGlbqfpuynr+7I1tti4i:Ryu8KaHnT1t0/
Malware Config
Extracted
redline
dona
217.196.96.101:4132
-
auth_value
9fbb198992bbc83a84ab1f21384813e3
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k3753639.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k3753639.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k3753639.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k3753639.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k3753639.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2780 y3526722.exe 3232 k3753639.exe 3024 l7355329.exe 3748 m2822348.exe 3884 oneetx.exe 764 oneetx.exe 4408 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4428 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k3753639.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k3753639.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y3526722.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 14047d176f59ac37cb5b17949f11c84940f32bcf41ad2c95b22e8821bfb6fde0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 14047d176f59ac37cb5b17949f11c84940f32bcf41ad2c95b22e8821bfb6fde0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y3526722.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4112 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3232 k3753639.exe 3232 k3753639.exe 3024 l7355329.exe 3024 l7355329.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3232 k3753639.exe Token: SeDebugPrivilege 3024 l7355329.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3748 m2822348.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2780 2472 14047d176f59ac37cb5b17949f11c84940f32bcf41ad2c95b22e8821bfb6fde0.exe 66 PID 2472 wrote to memory of 2780 2472 14047d176f59ac37cb5b17949f11c84940f32bcf41ad2c95b22e8821bfb6fde0.exe 66 PID 2472 wrote to memory of 2780 2472 14047d176f59ac37cb5b17949f11c84940f32bcf41ad2c95b22e8821bfb6fde0.exe 66 PID 2780 wrote to memory of 3232 2780 y3526722.exe 67 PID 2780 wrote to memory of 3232 2780 y3526722.exe 67 PID 2780 wrote to memory of 3232 2780 y3526722.exe 67 PID 2780 wrote to memory of 3024 2780 y3526722.exe 68 PID 2780 wrote to memory of 3024 2780 y3526722.exe 68 PID 2780 wrote to memory of 3024 2780 y3526722.exe 68 PID 2472 wrote to memory of 3748 2472 14047d176f59ac37cb5b17949f11c84940f32bcf41ad2c95b22e8821bfb6fde0.exe 70 PID 2472 wrote to memory of 3748 2472 14047d176f59ac37cb5b17949f11c84940f32bcf41ad2c95b22e8821bfb6fde0.exe 70 PID 2472 wrote to memory of 3748 2472 14047d176f59ac37cb5b17949f11c84940f32bcf41ad2c95b22e8821bfb6fde0.exe 70 PID 3748 wrote to memory of 3884 3748 m2822348.exe 71 PID 3748 wrote to memory of 3884 3748 m2822348.exe 71 PID 3748 wrote to memory of 3884 3748 m2822348.exe 71 PID 3884 wrote to memory of 4112 3884 oneetx.exe 72 PID 3884 wrote to memory of 4112 3884 oneetx.exe 72 PID 3884 wrote to memory of 4112 3884 oneetx.exe 72 PID 3884 wrote to memory of 4824 3884 oneetx.exe 74 PID 3884 wrote to memory of 4824 3884 oneetx.exe 74 PID 3884 wrote to memory of 4824 3884 oneetx.exe 74 PID 4824 wrote to memory of 3504 4824 cmd.exe 76 PID 4824 wrote to memory of 3504 4824 cmd.exe 76 PID 4824 wrote to memory of 3504 4824 cmd.exe 76 PID 4824 wrote to memory of 2144 4824 cmd.exe 77 PID 4824 wrote to memory of 2144 4824 cmd.exe 77 PID 4824 wrote to memory of 2144 4824 cmd.exe 77 PID 4824 wrote to memory of 4856 4824 cmd.exe 78 PID 4824 wrote to memory of 4856 4824 cmd.exe 78 PID 4824 wrote to memory of 4856 4824 cmd.exe 78 PID 4824 wrote to memory of 4864 4824 cmd.exe 79 PID 4824 wrote to memory of 4864 4824 cmd.exe 79 PID 4824 wrote to memory of 4864 4824 cmd.exe 79 PID 4824 wrote to memory of 436 4824 cmd.exe 80 PID 4824 wrote to memory of 436 4824 cmd.exe 80 PID 4824 wrote to memory of 436 4824 cmd.exe 80 PID 4824 wrote to memory of 4800 4824 cmd.exe 81 PID 4824 wrote to memory of 4800 4824 cmd.exe 81 PID 4824 wrote to memory of 4800 4824 cmd.exe 81 PID 3884 wrote to memory of 4428 3884 oneetx.exe 83 PID 3884 wrote to memory of 4428 3884 oneetx.exe 83 PID 3884 wrote to memory of 4428 3884 oneetx.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\14047d176f59ac37cb5b17949f11c84940f32bcf41ad2c95b22e8821bfb6fde0.exe"C:\Users\Admin\AppData\Local\Temp\14047d176f59ac37cb5b17949f11c84940f32bcf41ad2c95b22e8821bfb6fde0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3526722.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3526722.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3753639.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3753639.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3232
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7355329.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7355329.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m2822348.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m2822348.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4112
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3504
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:2144
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4856
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4864
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:436
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:4800
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4428
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:764
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4408
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD564aa928ea7d92a6c1d8441f26173762c
SHA1ef1a12fa2afeb07f8b0ec4038a5d3aa4dc2de253
SHA256935443b4b867f69e0559ba3720c9aa6fb35d93f09e8857aaf8e09eae384f1142
SHA5125d9b0578f714dc64bcae4ba091a511a0713e6344e6ad7bf2c8bc644f4be02b8efb1282aab673fec95649f3be0ef71292cecb216a3173ade23fa55d221152a029
-
Filesize
210KB
MD564aa928ea7d92a6c1d8441f26173762c
SHA1ef1a12fa2afeb07f8b0ec4038a5d3aa4dc2de253
SHA256935443b4b867f69e0559ba3720c9aa6fb35d93f09e8857aaf8e09eae384f1142
SHA5125d9b0578f714dc64bcae4ba091a511a0713e6344e6ad7bf2c8bc644f4be02b8efb1282aab673fec95649f3be0ef71292cecb216a3173ade23fa55d221152a029
-
Filesize
307KB
MD59fa1f2e6500db2a097ea6c40f99b3a78
SHA159ac9f1f4b2f46586545841676a5c4e6eeb6655e
SHA2566c83e9427c0887200d24a080f309afdbeb2c0c906ca02b4f66b74e40c031ff34
SHA512b7a7bcf4e889d29f2150714e09116fdc3c65fa2afc422b27ad3d7d6e0b1ad6b460515709d24e101c62867c0cbad02139b5136fe5e2c684941baba60ca5cf4939
-
Filesize
307KB
MD59fa1f2e6500db2a097ea6c40f99b3a78
SHA159ac9f1f4b2f46586545841676a5c4e6eeb6655e
SHA2566c83e9427c0887200d24a080f309afdbeb2c0c906ca02b4f66b74e40c031ff34
SHA512b7a7bcf4e889d29f2150714e09116fdc3c65fa2afc422b27ad3d7d6e0b1ad6b460515709d24e101c62867c0cbad02139b5136fe5e2c684941baba60ca5cf4939
-
Filesize
179KB
MD5139f989158eb46f0f92ee57947d49088
SHA1b7086e945ada7a800dc43c215587417cdbf261cf
SHA2560a16042ba0e3402c35f18887b454b86eb1642d9d48c97cfcdc8e48d30bb6acc6
SHA512f1ce854f2270548c22346348496fbefd4f2099ea9bee20455555d25d87eb835091e1d1882273d9c6d5c66f7b76018733175598531309994aef3244f39fe3b98a
-
Filesize
179KB
MD5139f989158eb46f0f92ee57947d49088
SHA1b7086e945ada7a800dc43c215587417cdbf261cf
SHA2560a16042ba0e3402c35f18887b454b86eb1642d9d48c97cfcdc8e48d30bb6acc6
SHA512f1ce854f2270548c22346348496fbefd4f2099ea9bee20455555d25d87eb835091e1d1882273d9c6d5c66f7b76018733175598531309994aef3244f39fe3b98a
-
Filesize
168KB
MD58458e72613c2fbf08d17166dcc461825
SHA1c040009c44e6875772d1c72ccffd029151f387e2
SHA256db47967095b1ecf43845798be6c223564a4d1b31ed15152c3e601fb4ad1be792
SHA512db371c9a5c3728e54306874b001f49c5ab6ecf5618054a265a37916607c5fa330e7568475ce4bfe81caae8cd36625bfce927e434459877af3d10eb4015bdf996
-
Filesize
168KB
MD58458e72613c2fbf08d17166dcc461825
SHA1c040009c44e6875772d1c72ccffd029151f387e2
SHA256db47967095b1ecf43845798be6c223564a4d1b31ed15152c3e601fb4ad1be792
SHA512db371c9a5c3728e54306874b001f49c5ab6ecf5618054a265a37916607c5fa330e7568475ce4bfe81caae8cd36625bfce927e434459877af3d10eb4015bdf996
-
Filesize
210KB
MD564aa928ea7d92a6c1d8441f26173762c
SHA1ef1a12fa2afeb07f8b0ec4038a5d3aa4dc2de253
SHA256935443b4b867f69e0559ba3720c9aa6fb35d93f09e8857aaf8e09eae384f1142
SHA5125d9b0578f714dc64bcae4ba091a511a0713e6344e6ad7bf2c8bc644f4be02b8efb1282aab673fec95649f3be0ef71292cecb216a3173ade23fa55d221152a029
-
Filesize
210KB
MD564aa928ea7d92a6c1d8441f26173762c
SHA1ef1a12fa2afeb07f8b0ec4038a5d3aa4dc2de253
SHA256935443b4b867f69e0559ba3720c9aa6fb35d93f09e8857aaf8e09eae384f1142
SHA5125d9b0578f714dc64bcae4ba091a511a0713e6344e6ad7bf2c8bc644f4be02b8efb1282aab673fec95649f3be0ef71292cecb216a3173ade23fa55d221152a029
-
Filesize
210KB
MD564aa928ea7d92a6c1d8441f26173762c
SHA1ef1a12fa2afeb07f8b0ec4038a5d3aa4dc2de253
SHA256935443b4b867f69e0559ba3720c9aa6fb35d93f09e8857aaf8e09eae384f1142
SHA5125d9b0578f714dc64bcae4ba091a511a0713e6344e6ad7bf2c8bc644f4be02b8efb1282aab673fec95649f3be0ef71292cecb216a3173ade23fa55d221152a029
-
Filesize
210KB
MD564aa928ea7d92a6c1d8441f26173762c
SHA1ef1a12fa2afeb07f8b0ec4038a5d3aa4dc2de253
SHA256935443b4b867f69e0559ba3720c9aa6fb35d93f09e8857aaf8e09eae384f1142
SHA5125d9b0578f714dc64bcae4ba091a511a0713e6344e6ad7bf2c8bc644f4be02b8efb1282aab673fec95649f3be0ef71292cecb216a3173ade23fa55d221152a029
-
Filesize
210KB
MD564aa928ea7d92a6c1d8441f26173762c
SHA1ef1a12fa2afeb07f8b0ec4038a5d3aa4dc2de253
SHA256935443b4b867f69e0559ba3720c9aa6fb35d93f09e8857aaf8e09eae384f1142
SHA5125d9b0578f714dc64bcae4ba091a511a0713e6344e6ad7bf2c8bc644f4be02b8efb1282aab673fec95649f3be0ef71292cecb216a3173ade23fa55d221152a029
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53