Analysis
-
max time kernel
143s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2023 15:16
Static task
static1
Behavioral task
behavioral1
Sample
c45b98e84f02df576a16e37a5fdde92d8b4a7a860e8ab937f3c5a03cea190d31.exe
Resource
win10v2004-20230221-en
General
-
Target
c45b98e84f02df576a16e37a5fdde92d8b4a7a860e8ab937f3c5a03cea190d31.exe
-
Size
478KB
-
MD5
047437cfc1a2a45ca6c46a259a451b33
-
SHA1
f88f1860131ff6a51b86ff67a44d515ca158dc26
-
SHA256
c45b98e84f02df576a16e37a5fdde92d8b4a7a860e8ab937f3c5a03cea190d31
-
SHA512
9b77fdee428269214e9c4d23bd6c7718474323546fc5d817397793709cc1098062dccba08c8ef9dd4f4661e2112f111786ce65c5369cb06a52d203035c891271
-
SSDEEP
12288:3MrSy90sVtZGRFTv7Lm9R5c1u316Trb0ppC3L0UurW1OPtDH:dyLsRBE/XsTfoACsyDH
Malware Config
Extracted
redline
maher
217.196.96.101:4132
-
auth_value
c57763165f68aabcf4874e661a1ffbac
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a5785972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5785972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5785972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5785972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5785972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5785972.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation d1815938.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 4668 v3226745.exe 1572 a5785972.exe 3116 b5355999.exe 4920 d1815938.exe 4228 oneetx.exe 2000 oneetx.exe 4408 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1088 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a5785972.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a5785972.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c45b98e84f02df576a16e37a5fdde92d8b4a7a860e8ab937f3c5a03cea190d31.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3226745.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3226745.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c45b98e84f02df576a16e37a5fdde92d8b4a7a860e8ab937f3c5a03cea190d31.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4120 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1284 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1572 a5785972.exe 1572 a5785972.exe 3116 b5355999.exe 3116 b5355999.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1572 a5785972.exe Token: SeDebugPrivilege 3116 b5355999.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4920 d1815938.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2916 wrote to memory of 4668 2916 c45b98e84f02df576a16e37a5fdde92d8b4a7a860e8ab937f3c5a03cea190d31.exe 76 PID 2916 wrote to memory of 4668 2916 c45b98e84f02df576a16e37a5fdde92d8b4a7a860e8ab937f3c5a03cea190d31.exe 76 PID 2916 wrote to memory of 4668 2916 c45b98e84f02df576a16e37a5fdde92d8b4a7a860e8ab937f3c5a03cea190d31.exe 76 PID 4668 wrote to memory of 1572 4668 v3226745.exe 77 PID 4668 wrote to memory of 1572 4668 v3226745.exe 77 PID 4668 wrote to memory of 1572 4668 v3226745.exe 77 PID 4668 wrote to memory of 3116 4668 v3226745.exe 83 PID 4668 wrote to memory of 3116 4668 v3226745.exe 83 PID 4668 wrote to memory of 3116 4668 v3226745.exe 83 PID 2916 wrote to memory of 4920 2916 c45b98e84f02df576a16e37a5fdde92d8b4a7a860e8ab937f3c5a03cea190d31.exe 84 PID 2916 wrote to memory of 4920 2916 c45b98e84f02df576a16e37a5fdde92d8b4a7a860e8ab937f3c5a03cea190d31.exe 84 PID 2916 wrote to memory of 4920 2916 c45b98e84f02df576a16e37a5fdde92d8b4a7a860e8ab937f3c5a03cea190d31.exe 84 PID 4920 wrote to memory of 4228 4920 d1815938.exe 85 PID 4920 wrote to memory of 4228 4920 d1815938.exe 85 PID 4920 wrote to memory of 4228 4920 d1815938.exe 85 PID 4228 wrote to memory of 1284 4228 oneetx.exe 86 PID 4228 wrote to memory of 1284 4228 oneetx.exe 86 PID 4228 wrote to memory of 1284 4228 oneetx.exe 86 PID 4228 wrote to memory of 3504 4228 oneetx.exe 88 PID 4228 wrote to memory of 3504 4228 oneetx.exe 88 PID 4228 wrote to memory of 3504 4228 oneetx.exe 88 PID 3504 wrote to memory of 2044 3504 cmd.exe 90 PID 3504 wrote to memory of 2044 3504 cmd.exe 90 PID 3504 wrote to memory of 2044 3504 cmd.exe 90 PID 3504 wrote to memory of 1364 3504 cmd.exe 91 PID 3504 wrote to memory of 1364 3504 cmd.exe 91 PID 3504 wrote to memory of 1364 3504 cmd.exe 91 PID 3504 wrote to memory of 652 3504 cmd.exe 92 PID 3504 wrote to memory of 652 3504 cmd.exe 92 PID 3504 wrote to memory of 652 3504 cmd.exe 92 PID 3504 wrote to memory of 1832 3504 cmd.exe 93 PID 3504 wrote to memory of 1832 3504 cmd.exe 93 PID 3504 wrote to memory of 1832 3504 cmd.exe 93 PID 3504 wrote to memory of 1860 3504 cmd.exe 94 PID 3504 wrote to memory of 1860 3504 cmd.exe 94 PID 3504 wrote to memory of 1860 3504 cmd.exe 94 PID 3504 wrote to memory of 3000 3504 cmd.exe 95 PID 3504 wrote to memory of 3000 3504 cmd.exe 95 PID 3504 wrote to memory of 3000 3504 cmd.exe 95 PID 4228 wrote to memory of 1088 4228 oneetx.exe 101 PID 4228 wrote to memory of 1088 4228 oneetx.exe 101 PID 4228 wrote to memory of 1088 4228 oneetx.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\c45b98e84f02df576a16e37a5fdde92d8b4a7a860e8ab937f3c5a03cea190d31.exe"C:\Users\Admin\AppData\Local\Temp\c45b98e84f02df576a16e37a5fdde92d8b4a7a860e8ab937f3c5a03cea190d31.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3226745.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3226745.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a5785972.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a5785972.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5355999.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5355999.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3116
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1815938.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1815938.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1284
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2044
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1364
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:652
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1832
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:1860
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:3000
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1088
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2000
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4120
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4408
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD5138982f2c0f33f442151602e5c5f32d1
SHA1d28343206d76166bc3d3a8512d23a075519ca93c
SHA256118a1ac8d3415fc54bd77769221e3b9bf7fc94bf433b7de6944790f83573fe3c
SHA51226113a20a3d8fa046faf8ade49a37cf85c10a544b2c1d0725d2a33b60ad561a29f87400b74bd64b129f9bfa1303003fc47ddab7821536c0191b2bf8d4c9af941
-
Filesize
210KB
MD5138982f2c0f33f442151602e5c5f32d1
SHA1d28343206d76166bc3d3a8512d23a075519ca93c
SHA256118a1ac8d3415fc54bd77769221e3b9bf7fc94bf433b7de6944790f83573fe3c
SHA51226113a20a3d8fa046faf8ade49a37cf85c10a544b2c1d0725d2a33b60ad561a29f87400b74bd64b129f9bfa1303003fc47ddab7821536c0191b2bf8d4c9af941
-
Filesize
307KB
MD535b80fe9e5b2fa99e245b0c8e49d7dbf
SHA14c2c7bfc27c34edb1b1e0ac0ffdf6390a4c5e3d5
SHA256dd920d11a52eb15133e1e7539aacb2e1e842457b8e9516135c9e193461e4f714
SHA51217463943ffca9bb8411f6dbf46cedc9ade538e449d9649e42c22d0f7ef1618f1c87e62552a2dd17b2bcc75aa84598ab85113491eb77de32aa644c225d7eeecf0
-
Filesize
307KB
MD535b80fe9e5b2fa99e245b0c8e49d7dbf
SHA14c2c7bfc27c34edb1b1e0ac0ffdf6390a4c5e3d5
SHA256dd920d11a52eb15133e1e7539aacb2e1e842457b8e9516135c9e193461e4f714
SHA51217463943ffca9bb8411f6dbf46cedc9ade538e449d9649e42c22d0f7ef1618f1c87e62552a2dd17b2bcc75aa84598ab85113491eb77de32aa644c225d7eeecf0
-
Filesize
179KB
MD54dacaa84f1867500dfa3fbb87d208887
SHA1222c947d79a44c0d70055ec498017fae32834d94
SHA256c4abac5d776bc431d8cfda36d89de4eca7745b3885d46590408f1328555054df
SHA5124e3b87b7fb343bdd19c873874a736ac305c70cb0ba74e21d34a9053caad50d6a3247f81330bd3a7a8ad22cab264f04ce5883073f8faafa469489c2d6517f19ed
-
Filesize
179KB
MD54dacaa84f1867500dfa3fbb87d208887
SHA1222c947d79a44c0d70055ec498017fae32834d94
SHA256c4abac5d776bc431d8cfda36d89de4eca7745b3885d46590408f1328555054df
SHA5124e3b87b7fb343bdd19c873874a736ac305c70cb0ba74e21d34a9053caad50d6a3247f81330bd3a7a8ad22cab264f04ce5883073f8faafa469489c2d6517f19ed
-
Filesize
168KB
MD5c4485930390899e08ebc12896a160df7
SHA174f9e240853988625203bdb320f0eae0f46e7ebc
SHA25637affc1bff0e159d761d06c18e750e9269a189e9dd9da8d9cc6707acde598e20
SHA51226f3f141d4e61da3bfef5793c8ebb6af56eb31eb906671b273bb2a415a6e7bd5670eb33c9f320faa36f4bbbce1c4ffef8793dfe43ade9256d8990f73e8a29c69
-
Filesize
168KB
MD5c4485930390899e08ebc12896a160df7
SHA174f9e240853988625203bdb320f0eae0f46e7ebc
SHA25637affc1bff0e159d761d06c18e750e9269a189e9dd9da8d9cc6707acde598e20
SHA51226f3f141d4e61da3bfef5793c8ebb6af56eb31eb906671b273bb2a415a6e7bd5670eb33c9f320faa36f4bbbce1c4ffef8793dfe43ade9256d8990f73e8a29c69
-
Filesize
210KB
MD5138982f2c0f33f442151602e5c5f32d1
SHA1d28343206d76166bc3d3a8512d23a075519ca93c
SHA256118a1ac8d3415fc54bd77769221e3b9bf7fc94bf433b7de6944790f83573fe3c
SHA51226113a20a3d8fa046faf8ade49a37cf85c10a544b2c1d0725d2a33b60ad561a29f87400b74bd64b129f9bfa1303003fc47ddab7821536c0191b2bf8d4c9af941
-
Filesize
210KB
MD5138982f2c0f33f442151602e5c5f32d1
SHA1d28343206d76166bc3d3a8512d23a075519ca93c
SHA256118a1ac8d3415fc54bd77769221e3b9bf7fc94bf433b7de6944790f83573fe3c
SHA51226113a20a3d8fa046faf8ade49a37cf85c10a544b2c1d0725d2a33b60ad561a29f87400b74bd64b129f9bfa1303003fc47ddab7821536c0191b2bf8d4c9af941
-
Filesize
210KB
MD5138982f2c0f33f442151602e5c5f32d1
SHA1d28343206d76166bc3d3a8512d23a075519ca93c
SHA256118a1ac8d3415fc54bd77769221e3b9bf7fc94bf433b7de6944790f83573fe3c
SHA51226113a20a3d8fa046faf8ade49a37cf85c10a544b2c1d0725d2a33b60ad561a29f87400b74bd64b129f9bfa1303003fc47ddab7821536c0191b2bf8d4c9af941
-
Filesize
210KB
MD5138982f2c0f33f442151602e5c5f32d1
SHA1d28343206d76166bc3d3a8512d23a075519ca93c
SHA256118a1ac8d3415fc54bd77769221e3b9bf7fc94bf433b7de6944790f83573fe3c
SHA51226113a20a3d8fa046faf8ade49a37cf85c10a544b2c1d0725d2a33b60ad561a29f87400b74bd64b129f9bfa1303003fc47ddab7821536c0191b2bf8d4c9af941
-
Filesize
210KB
MD5138982f2c0f33f442151602e5c5f32d1
SHA1d28343206d76166bc3d3a8512d23a075519ca93c
SHA256118a1ac8d3415fc54bd77769221e3b9bf7fc94bf433b7de6944790f83573fe3c
SHA51226113a20a3d8fa046faf8ade49a37cf85c10a544b2c1d0725d2a33b60ad561a29f87400b74bd64b129f9bfa1303003fc47ddab7821536c0191b2bf8d4c9af941
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5