Analysis
-
max time kernel
130s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2023 18:42
Static task
static1
Behavioral task
behavioral1
Sample
65d5a5c0ba8628ff970366a870ad718cba52418b2037f10c4b4dceaacb7fdd74.exe
Resource
win10v2004-20230220-en
General
-
Target
65d5a5c0ba8628ff970366a870ad718cba52418b2037f10c4b4dceaacb7fdd74.exe
-
Size
479KB
-
MD5
fa2e6676c59225443fc6d79ad4b969fb
-
SHA1
b962ab9bbda4774d8224529ca97a68c7f70de01b
-
SHA256
65d5a5c0ba8628ff970366a870ad718cba52418b2037f10c4b4dceaacb7fdd74
-
SHA512
33543133997d00669a4a60e4b82be2fc2fc041fd935d26371572e8f2d4a8ecf4f79fb35a7a6a958c4c6a22dbc4c231ac4f24b98fbcc4127139dc0bd210552ca8
-
SSDEEP
12288:mMrJy90HgbRL1p4ZWGCdpKpCItuCfgRrPR:HysgbRL1rMhBfePR
Malware Config
Extracted
redline
maher
217.196.96.101:4132
-
auth_value
c57763165f68aabcf4874e661a1ffbac
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a2607091.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a2607091.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a2607091.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a2607091.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a2607091.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a2607091.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation d1605362.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 2828 v3580223.exe 2500 a2607091.exe 1116 b0406495.exe 3056 d1605362.exe 1036 oneetx.exe 3948 oneetx.exe 4548 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2668 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a2607091.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a2607091.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3580223.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3580223.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 65d5a5c0ba8628ff970366a870ad718cba52418b2037f10c4b4dceaacb7fdd74.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 65d5a5c0ba8628ff970366a870ad718cba52418b2037f10c4b4dceaacb7fdd74.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4664 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2500 a2607091.exe 2500 a2607091.exe 1116 b0406495.exe 1116 b0406495.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2500 a2607091.exe Token: SeDebugPrivilege 1116 b0406495.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3056 d1605362.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 536 wrote to memory of 2828 536 65d5a5c0ba8628ff970366a870ad718cba52418b2037f10c4b4dceaacb7fdd74.exe 88 PID 536 wrote to memory of 2828 536 65d5a5c0ba8628ff970366a870ad718cba52418b2037f10c4b4dceaacb7fdd74.exe 88 PID 536 wrote to memory of 2828 536 65d5a5c0ba8628ff970366a870ad718cba52418b2037f10c4b4dceaacb7fdd74.exe 88 PID 2828 wrote to memory of 2500 2828 v3580223.exe 89 PID 2828 wrote to memory of 2500 2828 v3580223.exe 89 PID 2828 wrote to memory of 2500 2828 v3580223.exe 89 PID 2828 wrote to memory of 1116 2828 v3580223.exe 94 PID 2828 wrote to memory of 1116 2828 v3580223.exe 94 PID 2828 wrote to memory of 1116 2828 v3580223.exe 94 PID 536 wrote to memory of 3056 536 65d5a5c0ba8628ff970366a870ad718cba52418b2037f10c4b4dceaacb7fdd74.exe 98 PID 536 wrote to memory of 3056 536 65d5a5c0ba8628ff970366a870ad718cba52418b2037f10c4b4dceaacb7fdd74.exe 98 PID 536 wrote to memory of 3056 536 65d5a5c0ba8628ff970366a870ad718cba52418b2037f10c4b4dceaacb7fdd74.exe 98 PID 3056 wrote to memory of 1036 3056 d1605362.exe 99 PID 3056 wrote to memory of 1036 3056 d1605362.exe 99 PID 3056 wrote to memory of 1036 3056 d1605362.exe 99 PID 1036 wrote to memory of 4664 1036 oneetx.exe 100 PID 1036 wrote to memory of 4664 1036 oneetx.exe 100 PID 1036 wrote to memory of 4664 1036 oneetx.exe 100 PID 1036 wrote to memory of 2976 1036 oneetx.exe 102 PID 1036 wrote to memory of 2976 1036 oneetx.exe 102 PID 1036 wrote to memory of 2976 1036 oneetx.exe 102 PID 2976 wrote to memory of 2544 2976 cmd.exe 104 PID 2976 wrote to memory of 2544 2976 cmd.exe 104 PID 2976 wrote to memory of 2544 2976 cmd.exe 104 PID 2976 wrote to memory of 3644 2976 cmd.exe 105 PID 2976 wrote to memory of 3644 2976 cmd.exe 105 PID 2976 wrote to memory of 3644 2976 cmd.exe 105 PID 2976 wrote to memory of 4788 2976 cmd.exe 106 PID 2976 wrote to memory of 4788 2976 cmd.exe 106 PID 2976 wrote to memory of 4788 2976 cmd.exe 106 PID 2976 wrote to memory of 812 2976 cmd.exe 107 PID 2976 wrote to memory of 812 2976 cmd.exe 107 PID 2976 wrote to memory of 812 2976 cmd.exe 107 PID 2976 wrote to memory of 1304 2976 cmd.exe 108 PID 2976 wrote to memory of 1304 2976 cmd.exe 108 PID 2976 wrote to memory of 1304 2976 cmd.exe 108 PID 2976 wrote to memory of 3440 2976 cmd.exe 109 PID 2976 wrote to memory of 3440 2976 cmd.exe 109 PID 2976 wrote to memory of 3440 2976 cmd.exe 109 PID 1036 wrote to memory of 2668 1036 oneetx.exe 112 PID 1036 wrote to memory of 2668 1036 oneetx.exe 112 PID 1036 wrote to memory of 2668 1036 oneetx.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\65d5a5c0ba8628ff970366a870ad718cba52418b2037f10c4b4dceaacb7fdd74.exe"C:\Users\Admin\AppData\Local\Temp\65d5a5c0ba8628ff970366a870ad718cba52418b2037f10c4b4dceaacb7fdd74.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3580223.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3580223.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a2607091.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a2607091.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2500
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0406495.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0406495.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1116
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1605362.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1605362.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4664
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2544
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:3644
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4788
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:812
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:1304
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:3440
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2668
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3948
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4548
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD56a41c27389280a1abe2f3a92529de4ae
SHA112a453a2e8932cdcc118c4e6b5125c1ce7a50d64
SHA256476cb2ec92e2d2c3c6e31d90d39839da664eb73e7cb10ba8ddd7d131074f6d4d
SHA5123155f45c4256adbce3e27335e9ecfc6f4e91d9ad213df423923948ef4068ce6d1ef6af701da677dd2edacca2c0431f2d0b56c78cbf6ac5dfe3163ecb65d96435
-
Filesize
210KB
MD56a41c27389280a1abe2f3a92529de4ae
SHA112a453a2e8932cdcc118c4e6b5125c1ce7a50d64
SHA256476cb2ec92e2d2c3c6e31d90d39839da664eb73e7cb10ba8ddd7d131074f6d4d
SHA5123155f45c4256adbce3e27335e9ecfc6f4e91d9ad213df423923948ef4068ce6d1ef6af701da677dd2edacca2c0431f2d0b56c78cbf6ac5dfe3163ecb65d96435
-
Filesize
307KB
MD541130735507067b14423311d297e905b
SHA1fd0bbf1c969a8d5cb787985c1758d68ca11a83c8
SHA256e1a8f99f95e94fb3bc15ae684c736a5b42043fee5c76f8a41e383a3e07c56f2a
SHA51292aed89154f3f67799af0d091a69161e864c375b60bcbbc08af44cf871cd51b57c1f8a4da368d149a4746662399c3bdb9d09a338a88c170d83787842f3577331
-
Filesize
307KB
MD541130735507067b14423311d297e905b
SHA1fd0bbf1c969a8d5cb787985c1758d68ca11a83c8
SHA256e1a8f99f95e94fb3bc15ae684c736a5b42043fee5c76f8a41e383a3e07c56f2a
SHA51292aed89154f3f67799af0d091a69161e864c375b60bcbbc08af44cf871cd51b57c1f8a4da368d149a4746662399c3bdb9d09a338a88c170d83787842f3577331
-
Filesize
179KB
MD53691c4e0eea32792e3c3ae90ed00ed62
SHA185a12998eb26faf29249888a20dff1644d99a325
SHA2562f528cf44413f1a34562d1fd151aad5a4fc9da6dc27dfd6b8a8e300eff2d4246
SHA5127ac44b20757f7ccb70e099845fe39e74380c284755b86f88705753f67e3545e56c2e62d78f499093873e22ced56c974e0fcc6295e9c8b25c17f5dbfc0a759ce9
-
Filesize
179KB
MD53691c4e0eea32792e3c3ae90ed00ed62
SHA185a12998eb26faf29249888a20dff1644d99a325
SHA2562f528cf44413f1a34562d1fd151aad5a4fc9da6dc27dfd6b8a8e300eff2d4246
SHA5127ac44b20757f7ccb70e099845fe39e74380c284755b86f88705753f67e3545e56c2e62d78f499093873e22ced56c974e0fcc6295e9c8b25c17f5dbfc0a759ce9
-
Filesize
168KB
MD579ac225753785e2c4215fcb47a3e4e18
SHA17a9b8c3a2ec74458d1d854d471f1b3512f648fad
SHA256ad58303767a047c1d666ad0ff359460ff82c7378b0d66cdca258f60c335a9fe4
SHA512702847b96f279bbf07edb510d0bbdcaaa3d696c5f9f427c9f0d7c1b4943b5599698ac436bddc03871af50853b7e3f344b03d757e6cdbc215be7905b224a27a77
-
Filesize
168KB
MD579ac225753785e2c4215fcb47a3e4e18
SHA17a9b8c3a2ec74458d1d854d471f1b3512f648fad
SHA256ad58303767a047c1d666ad0ff359460ff82c7378b0d66cdca258f60c335a9fe4
SHA512702847b96f279bbf07edb510d0bbdcaaa3d696c5f9f427c9f0d7c1b4943b5599698ac436bddc03871af50853b7e3f344b03d757e6cdbc215be7905b224a27a77
-
Filesize
210KB
MD56a41c27389280a1abe2f3a92529de4ae
SHA112a453a2e8932cdcc118c4e6b5125c1ce7a50d64
SHA256476cb2ec92e2d2c3c6e31d90d39839da664eb73e7cb10ba8ddd7d131074f6d4d
SHA5123155f45c4256adbce3e27335e9ecfc6f4e91d9ad213df423923948ef4068ce6d1ef6af701da677dd2edacca2c0431f2d0b56c78cbf6ac5dfe3163ecb65d96435
-
Filesize
210KB
MD56a41c27389280a1abe2f3a92529de4ae
SHA112a453a2e8932cdcc118c4e6b5125c1ce7a50d64
SHA256476cb2ec92e2d2c3c6e31d90d39839da664eb73e7cb10ba8ddd7d131074f6d4d
SHA5123155f45c4256adbce3e27335e9ecfc6f4e91d9ad213df423923948ef4068ce6d1ef6af701da677dd2edacca2c0431f2d0b56c78cbf6ac5dfe3163ecb65d96435
-
Filesize
210KB
MD56a41c27389280a1abe2f3a92529de4ae
SHA112a453a2e8932cdcc118c4e6b5125c1ce7a50d64
SHA256476cb2ec92e2d2c3c6e31d90d39839da664eb73e7cb10ba8ddd7d131074f6d4d
SHA5123155f45c4256adbce3e27335e9ecfc6f4e91d9ad213df423923948ef4068ce6d1ef6af701da677dd2edacca2c0431f2d0b56c78cbf6ac5dfe3163ecb65d96435
-
Filesize
210KB
MD56a41c27389280a1abe2f3a92529de4ae
SHA112a453a2e8932cdcc118c4e6b5125c1ce7a50d64
SHA256476cb2ec92e2d2c3c6e31d90d39839da664eb73e7cb10ba8ddd7d131074f6d4d
SHA5123155f45c4256adbce3e27335e9ecfc6f4e91d9ad213df423923948ef4068ce6d1ef6af701da677dd2edacca2c0431f2d0b56c78cbf6ac5dfe3163ecb65d96435
-
Filesize
210KB
MD56a41c27389280a1abe2f3a92529de4ae
SHA112a453a2e8932cdcc118c4e6b5125c1ce7a50d64
SHA256476cb2ec92e2d2c3c6e31d90d39839da664eb73e7cb10ba8ddd7d131074f6d4d
SHA5123155f45c4256adbce3e27335e9ecfc6f4e91d9ad213df423923948ef4068ce6d1ef6af701da677dd2edacca2c0431f2d0b56c78cbf6ac5dfe3163ecb65d96435
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5