Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2023 20:45
Static task
static1
Behavioral task
behavioral1
Sample
e36a1a93a191a534e336359d38e8a70d7ab7c0d0c4d8e91643190225b9b018d7.exe
Resource
win10v2004-20230220-en
General
-
Target
e36a1a93a191a534e336359d38e8a70d7ab7c0d0c4d8e91643190225b9b018d7.exe
-
Size
481KB
-
MD5
1b3e98141b2f598acabf19c0a59c68dd
-
SHA1
6e1daf22b19e7ab6d858dfc41ce3b92753b3909d
-
SHA256
e36a1a93a191a534e336359d38e8a70d7ab7c0d0c4d8e91643190225b9b018d7
-
SHA512
6d725b700a0f9b374c350f1cfaf95290c0913dcea51cf1a1d2b60bbff81d62eebf5cbebdcd43ce4d06ff08cec39f205fdf117c30e6c5618d25473261a26bf6a3
-
SSDEEP
12288:6MrBy9099+rtIHm55c1u311TbOIRqlT5c+mkOuHAv2:Tym9+Z0QXzTVRydc+m9P2
Malware Config
Extracted
redline
mihan
217.196.96.101:4132
-
auth_value
9a6a8fdae02ed7caa0a49a6ddc6d4520
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a1838892.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a1838892.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a1838892.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a1838892.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a1838892.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a1838892.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation d3201468.exe -
Executes dropped EXE 7 IoCs
pid Process 4588 v4043840.exe 4240 a1838892.exe 2872 b4880265.exe 5064 d3201468.exe 4388 oneetx.exe 2200 oneetx.exe 4548 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2088 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a1838892.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a1838892.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e36a1a93a191a534e336359d38e8a70d7ab7c0d0c4d8e91643190225b9b018d7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e36a1a93a191a534e336359d38e8a70d7ab7c0d0c4d8e91643190225b9b018d7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4043840.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v4043840.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2608 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4240 a1838892.exe 4240 a1838892.exe 2872 b4880265.exe 2872 b4880265.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4240 a1838892.exe Token: SeDebugPrivilege 2872 b4880265.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5064 d3201468.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4128 wrote to memory of 4588 4128 e36a1a93a191a534e336359d38e8a70d7ab7c0d0c4d8e91643190225b9b018d7.exe 89 PID 4128 wrote to memory of 4588 4128 e36a1a93a191a534e336359d38e8a70d7ab7c0d0c4d8e91643190225b9b018d7.exe 89 PID 4128 wrote to memory of 4588 4128 e36a1a93a191a534e336359d38e8a70d7ab7c0d0c4d8e91643190225b9b018d7.exe 89 PID 4588 wrote to memory of 4240 4588 v4043840.exe 90 PID 4588 wrote to memory of 4240 4588 v4043840.exe 90 PID 4588 wrote to memory of 4240 4588 v4043840.exe 90 PID 4588 wrote to memory of 2872 4588 v4043840.exe 94 PID 4588 wrote to memory of 2872 4588 v4043840.exe 94 PID 4588 wrote to memory of 2872 4588 v4043840.exe 94 PID 4128 wrote to memory of 5064 4128 e36a1a93a191a534e336359d38e8a70d7ab7c0d0c4d8e91643190225b9b018d7.exe 95 PID 4128 wrote to memory of 5064 4128 e36a1a93a191a534e336359d38e8a70d7ab7c0d0c4d8e91643190225b9b018d7.exe 95 PID 4128 wrote to memory of 5064 4128 e36a1a93a191a534e336359d38e8a70d7ab7c0d0c4d8e91643190225b9b018d7.exe 95 PID 5064 wrote to memory of 4388 5064 d3201468.exe 96 PID 5064 wrote to memory of 4388 5064 d3201468.exe 96 PID 5064 wrote to memory of 4388 5064 d3201468.exe 96 PID 4388 wrote to memory of 2608 4388 oneetx.exe 97 PID 4388 wrote to memory of 2608 4388 oneetx.exe 97 PID 4388 wrote to memory of 2608 4388 oneetx.exe 97 PID 4388 wrote to memory of 1472 4388 oneetx.exe 99 PID 4388 wrote to memory of 1472 4388 oneetx.exe 99 PID 4388 wrote to memory of 1472 4388 oneetx.exe 99 PID 1472 wrote to memory of 4992 1472 cmd.exe 101 PID 1472 wrote to memory of 4992 1472 cmd.exe 101 PID 1472 wrote to memory of 4992 1472 cmd.exe 101 PID 1472 wrote to memory of 3484 1472 cmd.exe 102 PID 1472 wrote to memory of 3484 1472 cmd.exe 102 PID 1472 wrote to memory of 3484 1472 cmd.exe 102 PID 1472 wrote to memory of 1916 1472 cmd.exe 103 PID 1472 wrote to memory of 1916 1472 cmd.exe 103 PID 1472 wrote to memory of 1916 1472 cmd.exe 103 PID 1472 wrote to memory of 2320 1472 cmd.exe 104 PID 1472 wrote to memory of 2320 1472 cmd.exe 104 PID 1472 wrote to memory of 2320 1472 cmd.exe 104 PID 1472 wrote to memory of 3940 1472 cmd.exe 105 PID 1472 wrote to memory of 3940 1472 cmd.exe 105 PID 1472 wrote to memory of 3940 1472 cmd.exe 105 PID 1472 wrote to memory of 1188 1472 cmd.exe 106 PID 1472 wrote to memory of 1188 1472 cmd.exe 106 PID 1472 wrote to memory of 1188 1472 cmd.exe 106 PID 4388 wrote to memory of 2088 4388 oneetx.exe 112 PID 4388 wrote to memory of 2088 4388 oneetx.exe 112 PID 4388 wrote to memory of 2088 4388 oneetx.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\e36a1a93a191a534e336359d38e8a70d7ab7c0d0c4d8e91643190225b9b018d7.exe"C:\Users\Admin\AppData\Local\Temp\e36a1a93a191a534e336359d38e8a70d7ab7c0d0c4d8e91643190225b9b018d7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4043840.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4043840.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a1838892.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a1838892.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4240
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b4880265.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b4880265.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3201468.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3201468.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2608
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4992
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:3484
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:1916
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2320
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:3940
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:1188
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2088
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2200
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4548
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD547b24d4d9d59a60928432a1a3387789b
SHA17fafcb31920f807f6bd8cbeaa23050e5a14a84bd
SHA2565a07305ba7f132c46f95f8022d08a50c10e22c858e81973afc41390ac2ddb2a1
SHA512d79a791d7e7e06697e8b0f5ef5655233788aaec672411c00c4e65a50ea68206823cfdaddbef778a382738ae6b5b8fe18ed932e8041dfc2d906024620448e1e8d
-
Filesize
210KB
MD547b24d4d9d59a60928432a1a3387789b
SHA17fafcb31920f807f6bd8cbeaa23050e5a14a84bd
SHA2565a07305ba7f132c46f95f8022d08a50c10e22c858e81973afc41390ac2ddb2a1
SHA512d79a791d7e7e06697e8b0f5ef5655233788aaec672411c00c4e65a50ea68206823cfdaddbef778a382738ae6b5b8fe18ed932e8041dfc2d906024620448e1e8d
-
Filesize
309KB
MD59caaf40ad2aa4d4e6dc02844b187f526
SHA14123d3e2315c42309ec2d69792365f05489053ef
SHA2567b6b97e06538e1561d60307faa4edc9e6e8cf02db07af4ba0ecaec1682ccecb2
SHA5127ea7bc4f1cc5e23e2de7af4d2a08440c7e9e5aa8e9e833492b3658698973575e757b7fdb071da922ff5ee5f390bd3f8ad0ff7879ed663e26d67964bbbd753544
-
Filesize
309KB
MD59caaf40ad2aa4d4e6dc02844b187f526
SHA14123d3e2315c42309ec2d69792365f05489053ef
SHA2567b6b97e06538e1561d60307faa4edc9e6e8cf02db07af4ba0ecaec1682ccecb2
SHA5127ea7bc4f1cc5e23e2de7af4d2a08440c7e9e5aa8e9e833492b3658698973575e757b7fdb071da922ff5ee5f390bd3f8ad0ff7879ed663e26d67964bbbd753544
-
Filesize
179KB
MD517da733d7a08359eb4398fdb2721ffa2
SHA137ebccdd1d1563ce6f3927a64922adabb7a4644c
SHA256f6a388c019d1a8ddbc17b9f8b01388c354d50aa625216ebc71333abdbd75ca90
SHA512720fd2307fbd59202aa19d014a95feb2d979ec3ff3c072a784060d85a1aafecc80d2d0b16d2e2120b27eea0b7b30e6eabda8ba6b405298472d43503736d52ab6
-
Filesize
179KB
MD517da733d7a08359eb4398fdb2721ffa2
SHA137ebccdd1d1563ce6f3927a64922adabb7a4644c
SHA256f6a388c019d1a8ddbc17b9f8b01388c354d50aa625216ebc71333abdbd75ca90
SHA512720fd2307fbd59202aa19d014a95feb2d979ec3ff3c072a784060d85a1aafecc80d2d0b16d2e2120b27eea0b7b30e6eabda8ba6b405298472d43503736d52ab6
-
Filesize
168KB
MD502c45cf4e4720ebe0629337977192b29
SHA16f77dbaba92e6fec46d252e87ce6f7bddba58c05
SHA256d7d495460bffa60fb4f0a74606716f6dd792edc6f3a3063fc090a6716bfc103a
SHA512553cd82cd8b8a3937827749188e1dc869d83e72f62f11376681edca65b0b906d8e13147a33cd2edffa788aae81a82f4cf61173abc1737a3789aae344a9a7d147
-
Filesize
168KB
MD502c45cf4e4720ebe0629337977192b29
SHA16f77dbaba92e6fec46d252e87ce6f7bddba58c05
SHA256d7d495460bffa60fb4f0a74606716f6dd792edc6f3a3063fc090a6716bfc103a
SHA512553cd82cd8b8a3937827749188e1dc869d83e72f62f11376681edca65b0b906d8e13147a33cd2edffa788aae81a82f4cf61173abc1737a3789aae344a9a7d147
-
Filesize
210KB
MD547b24d4d9d59a60928432a1a3387789b
SHA17fafcb31920f807f6bd8cbeaa23050e5a14a84bd
SHA2565a07305ba7f132c46f95f8022d08a50c10e22c858e81973afc41390ac2ddb2a1
SHA512d79a791d7e7e06697e8b0f5ef5655233788aaec672411c00c4e65a50ea68206823cfdaddbef778a382738ae6b5b8fe18ed932e8041dfc2d906024620448e1e8d
-
Filesize
210KB
MD547b24d4d9d59a60928432a1a3387789b
SHA17fafcb31920f807f6bd8cbeaa23050e5a14a84bd
SHA2565a07305ba7f132c46f95f8022d08a50c10e22c858e81973afc41390ac2ddb2a1
SHA512d79a791d7e7e06697e8b0f5ef5655233788aaec672411c00c4e65a50ea68206823cfdaddbef778a382738ae6b5b8fe18ed932e8041dfc2d906024620448e1e8d
-
Filesize
210KB
MD547b24d4d9d59a60928432a1a3387789b
SHA17fafcb31920f807f6bd8cbeaa23050e5a14a84bd
SHA2565a07305ba7f132c46f95f8022d08a50c10e22c858e81973afc41390ac2ddb2a1
SHA512d79a791d7e7e06697e8b0f5ef5655233788aaec672411c00c4e65a50ea68206823cfdaddbef778a382738ae6b5b8fe18ed932e8041dfc2d906024620448e1e8d
-
Filesize
210KB
MD547b24d4d9d59a60928432a1a3387789b
SHA17fafcb31920f807f6bd8cbeaa23050e5a14a84bd
SHA2565a07305ba7f132c46f95f8022d08a50c10e22c858e81973afc41390ac2ddb2a1
SHA512d79a791d7e7e06697e8b0f5ef5655233788aaec672411c00c4e65a50ea68206823cfdaddbef778a382738ae6b5b8fe18ed932e8041dfc2d906024620448e1e8d
-
Filesize
210KB
MD547b24d4d9d59a60928432a1a3387789b
SHA17fafcb31920f807f6bd8cbeaa23050e5a14a84bd
SHA2565a07305ba7f132c46f95f8022d08a50c10e22c858e81973afc41390ac2ddb2a1
SHA512d79a791d7e7e06697e8b0f5ef5655233788aaec672411c00c4e65a50ea68206823cfdaddbef778a382738ae6b5b8fe18ed932e8041dfc2d906024620448e1e8d
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5