Analysis
-
max time kernel
136s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2023 17:46
Static task
static1
Behavioral task
behavioral1
Sample
a8c108019954e2bc6797cc0e23e71b04b8a7fbe24f9fb6fb9367b0794504fc5a.exe
Resource
win10v2004-20230220-en
General
-
Target
a8c108019954e2bc6797cc0e23e71b04b8a7fbe24f9fb6fb9367b0794504fc5a.exe
-
Size
479KB
-
MD5
e716b9327fa3ea74c494b77cca82bebc
-
SHA1
a0206dc4c83baa35cedd382440e49de55bcc9494
-
SHA256
a8c108019954e2bc6797cc0e23e71b04b8a7fbe24f9fb6fb9367b0794504fc5a
-
SHA512
15426353c70d61a0a709a4dc5814df37634bd9613f60120f245ab63952d66c2a22e9070d048852c649c261777d1972ae5aa86fd1d2e07a6081c4bbb9aa7653de
-
SSDEEP
12288:IMrYy909rG0CGqxo5HY9MsTXvjOoDBXp:wycrG0CGsDTXvjOMBXp
Malware Config
Extracted
redline
dona
217.196.96.101:4132
-
auth_value
9fbb198992bbc83a84ab1f21384813e3
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h3426149.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h3426149.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h3426149.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h3426149.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h3426149.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h3426149.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation i2347995.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 4904 x5403041.exe 4276 g8132424.exe 4700 h3426149.exe 3252 i2347995.exe 3924 oneetx.exe 3568 oneetx.exe 4044 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1404 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h3426149.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h3426149.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x5403041.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5403041.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a8c108019954e2bc6797cc0e23e71b04b8a7fbe24f9fb6fb9367b0794504fc5a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a8c108019954e2bc6797cc0e23e71b04b8a7fbe24f9fb6fb9367b0794504fc5a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2528 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4276 g8132424.exe 4276 g8132424.exe 4700 h3426149.exe 4700 h3426149.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4276 g8132424.exe Token: SeDebugPrivilege 4700 h3426149.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3252 i2347995.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 5044 wrote to memory of 4904 5044 a8c108019954e2bc6797cc0e23e71b04b8a7fbe24f9fb6fb9367b0794504fc5a.exe 83 PID 5044 wrote to memory of 4904 5044 a8c108019954e2bc6797cc0e23e71b04b8a7fbe24f9fb6fb9367b0794504fc5a.exe 83 PID 5044 wrote to memory of 4904 5044 a8c108019954e2bc6797cc0e23e71b04b8a7fbe24f9fb6fb9367b0794504fc5a.exe 83 PID 4904 wrote to memory of 4276 4904 x5403041.exe 84 PID 4904 wrote to memory of 4276 4904 x5403041.exe 84 PID 4904 wrote to memory of 4276 4904 x5403041.exe 84 PID 4904 wrote to memory of 4700 4904 x5403041.exe 91 PID 4904 wrote to memory of 4700 4904 x5403041.exe 91 PID 4904 wrote to memory of 4700 4904 x5403041.exe 91 PID 5044 wrote to memory of 3252 5044 a8c108019954e2bc6797cc0e23e71b04b8a7fbe24f9fb6fb9367b0794504fc5a.exe 92 PID 5044 wrote to memory of 3252 5044 a8c108019954e2bc6797cc0e23e71b04b8a7fbe24f9fb6fb9367b0794504fc5a.exe 92 PID 5044 wrote to memory of 3252 5044 a8c108019954e2bc6797cc0e23e71b04b8a7fbe24f9fb6fb9367b0794504fc5a.exe 92 PID 3252 wrote to memory of 3924 3252 i2347995.exe 93 PID 3252 wrote to memory of 3924 3252 i2347995.exe 93 PID 3252 wrote to memory of 3924 3252 i2347995.exe 93 PID 3924 wrote to memory of 2528 3924 oneetx.exe 94 PID 3924 wrote to memory of 2528 3924 oneetx.exe 94 PID 3924 wrote to memory of 2528 3924 oneetx.exe 94 PID 3924 wrote to memory of 5008 3924 oneetx.exe 96 PID 3924 wrote to memory of 5008 3924 oneetx.exe 96 PID 3924 wrote to memory of 5008 3924 oneetx.exe 96 PID 5008 wrote to memory of 4896 5008 cmd.exe 98 PID 5008 wrote to memory of 4896 5008 cmd.exe 98 PID 5008 wrote to memory of 4896 5008 cmd.exe 98 PID 5008 wrote to memory of 4888 5008 cmd.exe 99 PID 5008 wrote to memory of 4888 5008 cmd.exe 99 PID 5008 wrote to memory of 4888 5008 cmd.exe 99 PID 5008 wrote to memory of 4688 5008 cmd.exe 100 PID 5008 wrote to memory of 4688 5008 cmd.exe 100 PID 5008 wrote to memory of 4688 5008 cmd.exe 100 PID 5008 wrote to memory of 924 5008 cmd.exe 101 PID 5008 wrote to memory of 924 5008 cmd.exe 101 PID 5008 wrote to memory of 924 5008 cmd.exe 101 PID 5008 wrote to memory of 4572 5008 cmd.exe 102 PID 5008 wrote to memory of 4572 5008 cmd.exe 102 PID 5008 wrote to memory of 4572 5008 cmd.exe 102 PID 5008 wrote to memory of 3884 5008 cmd.exe 103 PID 5008 wrote to memory of 3884 5008 cmd.exe 103 PID 5008 wrote to memory of 3884 5008 cmd.exe 103 PID 3924 wrote to memory of 1404 3924 oneetx.exe 106 PID 3924 wrote to memory of 1404 3924 oneetx.exe 106 PID 3924 wrote to memory of 1404 3924 oneetx.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8c108019954e2bc6797cc0e23e71b04b8a7fbe24f9fb6fb9367b0794504fc5a.exe"C:\Users\Admin\AppData\Local\Temp\a8c108019954e2bc6797cc0e23e71b04b8a7fbe24f9fb6fb9367b0794504fc5a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5403041.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5403041.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8132424.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g8132424.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4276
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3426149.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3426149.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4700
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2347995.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2347995.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2528
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4896
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4888
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4688
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:924
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4572
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:3884
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1404
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3568
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4044
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD510e87472173b428e6fdfce97e0697c49
SHA1f2cab70e7fa7f50f70d9cef72c2fa59c74afe12d
SHA2565c493f89f51c2a5f47ff71e762441f577d4962c3c00d460f8c07de311e91e28f
SHA51256284a7b6ab7c95dac2f7acd0d6e590a84285ac7839d42689cbbb09f78e0e0ff2f5d55471a3642f51d9e55362c79e46f89cedfd3a333d3fe2c4fd6f131ee38c9
-
Filesize
210KB
MD510e87472173b428e6fdfce97e0697c49
SHA1f2cab70e7fa7f50f70d9cef72c2fa59c74afe12d
SHA2565c493f89f51c2a5f47ff71e762441f577d4962c3c00d460f8c07de311e91e28f
SHA51256284a7b6ab7c95dac2f7acd0d6e590a84285ac7839d42689cbbb09f78e0e0ff2f5d55471a3642f51d9e55362c79e46f89cedfd3a333d3fe2c4fd6f131ee38c9
-
Filesize
307KB
MD527af3a0ccfc163014dce2b725b7ac7e6
SHA1cbbb457df133ec17593f88fad5e6a31b2dbef6cb
SHA2560dc169690e2f7b2fc19bac399f90a98517111502d8e12cd3b10a0f53f9440666
SHA512c69580ff163e4608ba5f0ecf9bd350ac2941fd386502bddb6de2446a6ee00acd7386417bb4351f6877699073a3a6a0e985d17b2c19c625fdf99bef382d7b640d
-
Filesize
307KB
MD527af3a0ccfc163014dce2b725b7ac7e6
SHA1cbbb457df133ec17593f88fad5e6a31b2dbef6cb
SHA2560dc169690e2f7b2fc19bac399f90a98517111502d8e12cd3b10a0f53f9440666
SHA512c69580ff163e4608ba5f0ecf9bd350ac2941fd386502bddb6de2446a6ee00acd7386417bb4351f6877699073a3a6a0e985d17b2c19c625fdf99bef382d7b640d
-
Filesize
168KB
MD5f3a0416b92ace4c58c23a55f18834203
SHA1148da03994bce0986174a5317bece3e34763864f
SHA25637127e4d8f509b9daeabd82a2b7c45825452a988dc56011dbedb97f56e2f9488
SHA512c88a8aa397d7fa71679ccc272b4fefea3397edf4114e961e694f17aaff57f233ced291460eadd9f0dd156f3d0b28781bd4e6c53a619c5a337c1ccdad9cb17ead
-
Filesize
168KB
MD5f3a0416b92ace4c58c23a55f18834203
SHA1148da03994bce0986174a5317bece3e34763864f
SHA25637127e4d8f509b9daeabd82a2b7c45825452a988dc56011dbedb97f56e2f9488
SHA512c88a8aa397d7fa71679ccc272b4fefea3397edf4114e961e694f17aaff57f233ced291460eadd9f0dd156f3d0b28781bd4e6c53a619c5a337c1ccdad9cb17ead
-
Filesize
179KB
MD50d5b98c865f0b6f465ea7567656632d8
SHA121be0aedb3280ac875a04b2489d8ab0e630096cc
SHA25640302026f11b8355611d78451f42c8b1b9f2a3a28e8682e52df4de43fa354f94
SHA512f3d3b5c005f6ceca485ec6925d82ddaa334c58fa072a792087206fafe1a9cc7e90698f4455abd0c3cd001a90b175940583ef0e1f4af004a0c1e8d04b36fe7ea2
-
Filesize
179KB
MD50d5b98c865f0b6f465ea7567656632d8
SHA121be0aedb3280ac875a04b2489d8ab0e630096cc
SHA25640302026f11b8355611d78451f42c8b1b9f2a3a28e8682e52df4de43fa354f94
SHA512f3d3b5c005f6ceca485ec6925d82ddaa334c58fa072a792087206fafe1a9cc7e90698f4455abd0c3cd001a90b175940583ef0e1f4af004a0c1e8d04b36fe7ea2
-
Filesize
210KB
MD510e87472173b428e6fdfce97e0697c49
SHA1f2cab70e7fa7f50f70d9cef72c2fa59c74afe12d
SHA2565c493f89f51c2a5f47ff71e762441f577d4962c3c00d460f8c07de311e91e28f
SHA51256284a7b6ab7c95dac2f7acd0d6e590a84285ac7839d42689cbbb09f78e0e0ff2f5d55471a3642f51d9e55362c79e46f89cedfd3a333d3fe2c4fd6f131ee38c9
-
Filesize
210KB
MD510e87472173b428e6fdfce97e0697c49
SHA1f2cab70e7fa7f50f70d9cef72c2fa59c74afe12d
SHA2565c493f89f51c2a5f47ff71e762441f577d4962c3c00d460f8c07de311e91e28f
SHA51256284a7b6ab7c95dac2f7acd0d6e590a84285ac7839d42689cbbb09f78e0e0ff2f5d55471a3642f51d9e55362c79e46f89cedfd3a333d3fe2c4fd6f131ee38c9
-
Filesize
210KB
MD510e87472173b428e6fdfce97e0697c49
SHA1f2cab70e7fa7f50f70d9cef72c2fa59c74afe12d
SHA2565c493f89f51c2a5f47ff71e762441f577d4962c3c00d460f8c07de311e91e28f
SHA51256284a7b6ab7c95dac2f7acd0d6e590a84285ac7839d42689cbbb09f78e0e0ff2f5d55471a3642f51d9e55362c79e46f89cedfd3a333d3fe2c4fd6f131ee38c9
-
Filesize
210KB
MD510e87472173b428e6fdfce97e0697c49
SHA1f2cab70e7fa7f50f70d9cef72c2fa59c74afe12d
SHA2565c493f89f51c2a5f47ff71e762441f577d4962c3c00d460f8c07de311e91e28f
SHA51256284a7b6ab7c95dac2f7acd0d6e590a84285ac7839d42689cbbb09f78e0e0ff2f5d55471a3642f51d9e55362c79e46f89cedfd3a333d3fe2c4fd6f131ee38c9
-
Filesize
210KB
MD510e87472173b428e6fdfce97e0697c49
SHA1f2cab70e7fa7f50f70d9cef72c2fa59c74afe12d
SHA2565c493f89f51c2a5f47ff71e762441f577d4962c3c00d460f8c07de311e91e28f
SHA51256284a7b6ab7c95dac2f7acd0d6e590a84285ac7839d42689cbbb09f78e0e0ff2f5d55471a3642f51d9e55362c79e46f89cedfd3a333d3fe2c4fd6f131ee38c9
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5