Analysis
-
max time kernel
95s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2023 16:18
Static task
static1
Behavioral task
behavioral1
Sample
56e0df7d6679492d0a2bad86b9dfd5087cee8d3efbc2525274a29cc4c8e97bfa.exe
Resource
win10v2004-20230220-en
General
-
Target
56e0df7d6679492d0a2bad86b9dfd5087cee8d3efbc2525274a29cc4c8e97bfa.exe
-
Size
492KB
-
MD5
f2c62fcf8db9268338309a0b1daaccd0
-
SHA1
1d378d480d02de9797967b836b8ab56e1a56e195
-
SHA256
56e0df7d6679492d0a2bad86b9dfd5087cee8d3efbc2525274a29cc4c8e97bfa
-
SHA512
75ab4345f7c291f677a9a91a384304b1671ae09fcf8ae7a0c30590cc334a698e0fb43c10363017cd1378905f7a783825aaaf4b210b205323555ea24f12189c18
-
SSDEEP
12288:iMrCy90d6C1hxR7yGt5iQ5PERN0zwsKpr:cyO1hxR7ZQWEQEsKF
Malware Config
Extracted
redline
lagu
217.196.96.101:4132
-
auth_value
8c4969092a4e18461b2347c0aa54b6a5
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o5871371.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o5871371.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o5871371.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o5871371.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o5871371.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o5871371.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation s5585443.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 2712 z9744176.exe 3780 o5871371.exe 2504 r9357064.exe 3368 s5585443.exe 2676 oneetx.exe 2548 oneetx.exe 2364 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1252 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o5871371.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o5871371.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 56e0df7d6679492d0a2bad86b9dfd5087cee8d3efbc2525274a29cc4c8e97bfa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 56e0df7d6679492d0a2bad86b9dfd5087cee8d3efbc2525274a29cc4c8e97bfa.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z9744176.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z9744176.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3440 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3780 o5871371.exe 3780 o5871371.exe 2504 r9357064.exe 2504 r9357064.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3780 o5871371.exe Token: SeDebugPrivilege 2504 r9357064.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3368 s5585443.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4320 wrote to memory of 2712 4320 56e0df7d6679492d0a2bad86b9dfd5087cee8d3efbc2525274a29cc4c8e97bfa.exe 79 PID 4320 wrote to memory of 2712 4320 56e0df7d6679492d0a2bad86b9dfd5087cee8d3efbc2525274a29cc4c8e97bfa.exe 79 PID 4320 wrote to memory of 2712 4320 56e0df7d6679492d0a2bad86b9dfd5087cee8d3efbc2525274a29cc4c8e97bfa.exe 79 PID 2712 wrote to memory of 3780 2712 z9744176.exe 80 PID 2712 wrote to memory of 3780 2712 z9744176.exe 80 PID 2712 wrote to memory of 3780 2712 z9744176.exe 80 PID 2712 wrote to memory of 2504 2712 z9744176.exe 88 PID 2712 wrote to memory of 2504 2712 z9744176.exe 88 PID 2712 wrote to memory of 2504 2712 z9744176.exe 88 PID 4320 wrote to memory of 3368 4320 56e0df7d6679492d0a2bad86b9dfd5087cee8d3efbc2525274a29cc4c8e97bfa.exe 90 PID 4320 wrote to memory of 3368 4320 56e0df7d6679492d0a2bad86b9dfd5087cee8d3efbc2525274a29cc4c8e97bfa.exe 90 PID 4320 wrote to memory of 3368 4320 56e0df7d6679492d0a2bad86b9dfd5087cee8d3efbc2525274a29cc4c8e97bfa.exe 90 PID 3368 wrote to memory of 2676 3368 s5585443.exe 92 PID 3368 wrote to memory of 2676 3368 s5585443.exe 92 PID 3368 wrote to memory of 2676 3368 s5585443.exe 92 PID 2676 wrote to memory of 3440 2676 oneetx.exe 93 PID 2676 wrote to memory of 3440 2676 oneetx.exe 93 PID 2676 wrote to memory of 3440 2676 oneetx.exe 93 PID 2676 wrote to memory of 1252 2676 oneetx.exe 96 PID 2676 wrote to memory of 1252 2676 oneetx.exe 96 PID 2676 wrote to memory of 1252 2676 oneetx.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\56e0df7d6679492d0a2bad86b9dfd5087cee8d3efbc2525274a29cc4c8e97bfa.exe"C:\Users\Admin\AppData\Local\Temp\56e0df7d6679492d0a2bad86b9dfd5087cee8d3efbc2525274a29cc4c8e97bfa.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9744176.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9744176.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o5871371.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o5871371.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3780
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9357064.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9357064.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2504
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5585443.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5585443.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3440
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1252
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:2548
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:2364
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD517679900097a2aae1b2e159bceb4484c
SHA1783a260c35caa4040faebe2c015e650aebdf63fb
SHA256578a68bf28f746178e4944056718fd600709e7b1b94e046093c3b48710abd35f
SHA51242f3d84a5eb25e427ccda1aeac73262a5988515180e5d73c294385a74baa8d8b2ca990f3d1dd8e57ea87b704a7015ca9f3c3c9e0f1bc1463bee1a455fb1ffa08
-
Filesize
231KB
MD517679900097a2aae1b2e159bceb4484c
SHA1783a260c35caa4040faebe2c015e650aebdf63fb
SHA256578a68bf28f746178e4944056718fd600709e7b1b94e046093c3b48710abd35f
SHA51242f3d84a5eb25e427ccda1aeac73262a5988515180e5d73c294385a74baa8d8b2ca990f3d1dd8e57ea87b704a7015ca9f3c3c9e0f1bc1463bee1a455fb1ffa08
-
Filesize
231KB
MD517679900097a2aae1b2e159bceb4484c
SHA1783a260c35caa4040faebe2c015e650aebdf63fb
SHA256578a68bf28f746178e4944056718fd600709e7b1b94e046093c3b48710abd35f
SHA51242f3d84a5eb25e427ccda1aeac73262a5988515180e5d73c294385a74baa8d8b2ca990f3d1dd8e57ea87b704a7015ca9f3c3c9e0f1bc1463bee1a455fb1ffa08
-
Filesize
231KB
MD517679900097a2aae1b2e159bceb4484c
SHA1783a260c35caa4040faebe2c015e650aebdf63fb
SHA256578a68bf28f746178e4944056718fd600709e7b1b94e046093c3b48710abd35f
SHA51242f3d84a5eb25e427ccda1aeac73262a5988515180e5d73c294385a74baa8d8b2ca990f3d1dd8e57ea87b704a7015ca9f3c3c9e0f1bc1463bee1a455fb1ffa08
-
Filesize
231KB
MD517679900097a2aae1b2e159bceb4484c
SHA1783a260c35caa4040faebe2c015e650aebdf63fb
SHA256578a68bf28f746178e4944056718fd600709e7b1b94e046093c3b48710abd35f
SHA51242f3d84a5eb25e427ccda1aeac73262a5988515180e5d73c294385a74baa8d8b2ca990f3d1dd8e57ea87b704a7015ca9f3c3c9e0f1bc1463bee1a455fb1ffa08
-
Filesize
231KB
MD517679900097a2aae1b2e159bceb4484c
SHA1783a260c35caa4040faebe2c015e650aebdf63fb
SHA256578a68bf28f746178e4944056718fd600709e7b1b94e046093c3b48710abd35f
SHA51242f3d84a5eb25e427ccda1aeac73262a5988515180e5d73c294385a74baa8d8b2ca990f3d1dd8e57ea87b704a7015ca9f3c3c9e0f1bc1463bee1a455fb1ffa08
-
Filesize
231KB
MD517679900097a2aae1b2e159bceb4484c
SHA1783a260c35caa4040faebe2c015e650aebdf63fb
SHA256578a68bf28f746178e4944056718fd600709e7b1b94e046093c3b48710abd35f
SHA51242f3d84a5eb25e427ccda1aeac73262a5988515180e5d73c294385a74baa8d8b2ca990f3d1dd8e57ea87b704a7015ca9f3c3c9e0f1bc1463bee1a455fb1ffa08
-
Filesize
309KB
MD5ac5619ffeee92620e1b9017e50961783
SHA13670365f2865baa790b79b491ed509378b3d8b11
SHA256234f9150b895d008b5d3c6922fdc3e3e87f920f98460602bae0ec29ad66057b9
SHA51295f04f7ee43b83017e54df989b4e3f851b99f57abe5853189bf89057da97b13dc3983868728f6aa130b47833d6601e2bbca6fdf61b3868ca66bbbb5d7074afc6
-
Filesize
309KB
MD5ac5619ffeee92620e1b9017e50961783
SHA13670365f2865baa790b79b491ed509378b3d8b11
SHA256234f9150b895d008b5d3c6922fdc3e3e87f920f98460602bae0ec29ad66057b9
SHA51295f04f7ee43b83017e54df989b4e3f851b99f57abe5853189bf89057da97b13dc3983868728f6aa130b47833d6601e2bbca6fdf61b3868ca66bbbb5d7074afc6
-
Filesize
179KB
MD52ad36645f9102c27461550b6343da259
SHA191b2ab4dc35889427584a0efb14511c65eb0a4df
SHA2565d81f250dde452b9d69f7548542cd94741462d5940095b98fed79897c9b47611
SHA51283f5db27a282ae96e038558d5da6f5d1328f72df62558653cd04c966a89afd7195ea92a396ab25507efb82643355b5b2fd7d76ffdda66456adcec03014c70a57
-
Filesize
179KB
MD52ad36645f9102c27461550b6343da259
SHA191b2ab4dc35889427584a0efb14511c65eb0a4df
SHA2565d81f250dde452b9d69f7548542cd94741462d5940095b98fed79897c9b47611
SHA51283f5db27a282ae96e038558d5da6f5d1328f72df62558653cd04c966a89afd7195ea92a396ab25507efb82643355b5b2fd7d76ffdda66456adcec03014c70a57
-
Filesize
168KB
MD5d77b78d119b877af32ef16484b759cff
SHA16b536f83359723f61ff6552b072ddd5b369a7fb0
SHA25620bf94ebc5b0a6b58edcc560da4bd8cae382bfe60d10a774a4d84a6e84626eee
SHA51221c8661145605a706a9ee196b76f40957db9bda5790e69c4ccb6ff02b66516213e77c46a84765a8e7b2c480a6217d55626b4cb6493a56221b048c61d17493220
-
Filesize
168KB
MD5d77b78d119b877af32ef16484b759cff
SHA16b536f83359723f61ff6552b072ddd5b369a7fb0
SHA25620bf94ebc5b0a6b58edcc560da4bd8cae382bfe60d10a774a4d84a6e84626eee
SHA51221c8661145605a706a9ee196b76f40957db9bda5790e69c4ccb6ff02b66516213e77c46a84765a8e7b2c480a6217d55626b4cb6493a56221b048c61d17493220
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5