Analysis
-
max time kernel
135s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2023 21:34
Static task
static1
Behavioral task
behavioral1
Sample
d49dc55850538fbf76233c80a51ce9e44e176a0ce7ea9ed67f12a1c45c6fd674.exe
Resource
win10v2004-20230220-en
General
-
Target
d49dc55850538fbf76233c80a51ce9e44e176a0ce7ea9ed67f12a1c45c6fd674.exe
-
Size
480KB
-
MD5
eb3d07d148dcbc7e695a427e404069b8
-
SHA1
103401c8bf642777828f3c1272e71f202c0569c4
-
SHA256
d49dc55850538fbf76233c80a51ce9e44e176a0ce7ea9ed67f12a1c45c6fd674
-
SHA512
fb7aaf36992317742fb136ce5ede51604d0d35db9fc94e60205cfdc365d6ce4ab84104b5bc5ff1a2d6fc607c811de2910071a1a0cfce5f0e19acd928752af407
-
SSDEEP
12288:CMrsy9053xgrgQUGb9XkpxuAxkAq26BJeFiVV:yyC3xsgDA0LuGq24JeF2V
Malware Config
Extracted
redline
dease
217.196.96.101:4132
-
auth_value
82e4d5f9abc21848e0345118814a4e6c
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k8975153.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k8975153.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k8975153.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k8975153.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k8975153.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k8975153.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation m0045056.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 808 y9687081.exe 2084 k8975153.exe 2356 l7111506.exe 1972 m0045056.exe 3580 oneetx.exe 1536 oneetx.exe 3816 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 980 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k8975153.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k8975153.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d49dc55850538fbf76233c80a51ce9e44e176a0ce7ea9ed67f12a1c45c6fd674.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d49dc55850538fbf76233c80a51ce9e44e176a0ce7ea9ed67f12a1c45c6fd674.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y9687081.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y9687081.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 460 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2084 k8975153.exe 2084 k8975153.exe 2356 l7111506.exe 2356 l7111506.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2084 k8975153.exe Token: SeDebugPrivilege 2356 l7111506.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1972 m0045056.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1716 wrote to memory of 808 1716 d49dc55850538fbf76233c80a51ce9e44e176a0ce7ea9ed67f12a1c45c6fd674.exe 84 PID 1716 wrote to memory of 808 1716 d49dc55850538fbf76233c80a51ce9e44e176a0ce7ea9ed67f12a1c45c6fd674.exe 84 PID 1716 wrote to memory of 808 1716 d49dc55850538fbf76233c80a51ce9e44e176a0ce7ea9ed67f12a1c45c6fd674.exe 84 PID 808 wrote to memory of 2084 808 y9687081.exe 85 PID 808 wrote to memory of 2084 808 y9687081.exe 85 PID 808 wrote to memory of 2084 808 y9687081.exe 85 PID 808 wrote to memory of 2356 808 y9687081.exe 91 PID 808 wrote to memory of 2356 808 y9687081.exe 91 PID 808 wrote to memory of 2356 808 y9687081.exe 91 PID 1716 wrote to memory of 1972 1716 d49dc55850538fbf76233c80a51ce9e44e176a0ce7ea9ed67f12a1c45c6fd674.exe 94 PID 1716 wrote to memory of 1972 1716 d49dc55850538fbf76233c80a51ce9e44e176a0ce7ea9ed67f12a1c45c6fd674.exe 94 PID 1716 wrote to memory of 1972 1716 d49dc55850538fbf76233c80a51ce9e44e176a0ce7ea9ed67f12a1c45c6fd674.exe 94 PID 1972 wrote to memory of 3580 1972 m0045056.exe 95 PID 1972 wrote to memory of 3580 1972 m0045056.exe 95 PID 1972 wrote to memory of 3580 1972 m0045056.exe 95 PID 3580 wrote to memory of 460 3580 oneetx.exe 96 PID 3580 wrote to memory of 460 3580 oneetx.exe 96 PID 3580 wrote to memory of 460 3580 oneetx.exe 96 PID 3580 wrote to memory of 1248 3580 oneetx.exe 98 PID 3580 wrote to memory of 1248 3580 oneetx.exe 98 PID 3580 wrote to memory of 1248 3580 oneetx.exe 98 PID 1248 wrote to memory of 4256 1248 cmd.exe 100 PID 1248 wrote to memory of 4256 1248 cmd.exe 100 PID 1248 wrote to memory of 4256 1248 cmd.exe 100 PID 1248 wrote to memory of 4240 1248 cmd.exe 101 PID 1248 wrote to memory of 4240 1248 cmd.exe 101 PID 1248 wrote to memory of 4240 1248 cmd.exe 101 PID 1248 wrote to memory of 4268 1248 cmd.exe 102 PID 1248 wrote to memory of 4268 1248 cmd.exe 102 PID 1248 wrote to memory of 4268 1248 cmd.exe 102 PID 1248 wrote to memory of 4032 1248 cmd.exe 103 PID 1248 wrote to memory of 4032 1248 cmd.exe 103 PID 1248 wrote to memory of 4032 1248 cmd.exe 103 PID 1248 wrote to memory of 1600 1248 cmd.exe 104 PID 1248 wrote to memory of 1600 1248 cmd.exe 104 PID 1248 wrote to memory of 1600 1248 cmd.exe 104 PID 1248 wrote to memory of 1908 1248 cmd.exe 105 PID 1248 wrote to memory of 1908 1248 cmd.exe 105 PID 1248 wrote to memory of 1908 1248 cmd.exe 105 PID 3580 wrote to memory of 980 3580 oneetx.exe 108 PID 3580 wrote to memory of 980 3580 oneetx.exe 108 PID 3580 wrote to memory of 980 3580 oneetx.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\d49dc55850538fbf76233c80a51ce9e44e176a0ce7ea9ed67f12a1c45c6fd674.exe"C:\Users\Admin\AppData\Local\Temp\d49dc55850538fbf76233c80a51ce9e44e176a0ce7ea9ed67f12a1c45c6fd674.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9687081.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9687081.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8975153.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8975153.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7111506.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7111506.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2356
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m0045056.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m0045056.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:460
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4256
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4240
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4268
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4032
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:1600
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:1908
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:980
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1536
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3816
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD5bda07829b35143e8bb8722b433d8d501
SHA1214eb33f0e9bc0b7d33fd1d514a54c37c238a4ad
SHA25633d2e6c7fbaef3e7d690e3993d0c04d36aab6ade6e70eb3ea0cff2514e72358a
SHA5127db731b505d52de92d03ff238d59036807843bebcaafaa180fb3583926eb712e91621f8d507812f156f2d903fdcd82771040bb3f93c66c836d8f472fc6cd4473
-
Filesize
212KB
MD5bda07829b35143e8bb8722b433d8d501
SHA1214eb33f0e9bc0b7d33fd1d514a54c37c238a4ad
SHA25633d2e6c7fbaef3e7d690e3993d0c04d36aab6ade6e70eb3ea0cff2514e72358a
SHA5127db731b505d52de92d03ff238d59036807843bebcaafaa180fb3583926eb712e91621f8d507812f156f2d903fdcd82771040bb3f93c66c836d8f472fc6cd4473
-
Filesize
309KB
MD59014b81bac04f6098c0d64f4c055e602
SHA17af1da639827dcfbad38de140a5fec48bbf30a6f
SHA256e3a2e63e6f4da9503d25ea0e3850e964d086e642535e7b7233f18af8758bd428
SHA512ee20b28f92cb000091d799bf1a230be9495546f75e22e24e0d3644dc34f298b6636997e355545bda7aff16418f8cbe6afd09a6710db94cd6edefb19b0d958ffc
-
Filesize
309KB
MD59014b81bac04f6098c0d64f4c055e602
SHA17af1da639827dcfbad38de140a5fec48bbf30a6f
SHA256e3a2e63e6f4da9503d25ea0e3850e964d086e642535e7b7233f18af8758bd428
SHA512ee20b28f92cb000091d799bf1a230be9495546f75e22e24e0d3644dc34f298b6636997e355545bda7aff16418f8cbe6afd09a6710db94cd6edefb19b0d958ffc
-
Filesize
181KB
MD524ee1fbe5e7c02b2b548b4e7d65a189c
SHA1a186a92b7be3cb3aedd431053c2b16fca30f0224
SHA25617b8ad5586dfb62db8dc0c542e40554c7e7801310e36d64116911dd287b080a1
SHA512704d3bd345f16dc1e4230bb3e95f97140635bba31037e8870388dc9053dd3153e844eacd7e8cf1853c6ab7d224d891aad8c2e53e43f53808cab1d642852d60f1
-
Filesize
181KB
MD524ee1fbe5e7c02b2b548b4e7d65a189c
SHA1a186a92b7be3cb3aedd431053c2b16fca30f0224
SHA25617b8ad5586dfb62db8dc0c542e40554c7e7801310e36d64116911dd287b080a1
SHA512704d3bd345f16dc1e4230bb3e95f97140635bba31037e8870388dc9053dd3153e844eacd7e8cf1853c6ab7d224d891aad8c2e53e43f53808cab1d642852d60f1
-
Filesize
168KB
MD589d025cfc57f7fc90df1ab6c688fafcc
SHA1d50825047b51b91a5c86546bc452c5de6ed98064
SHA256c9a2874d88be0edd904e269b85b98f72f87b13ce60caccdcc0353ea906ae6486
SHA512005e8d690ff5815a4be17b07aa0c9d3ee6d69a6ce891e2c07a2d30f8243e789376077664646f9bcfa67315494f923aef15d709f52c1b9648796edd3deb5ba046
-
Filesize
168KB
MD589d025cfc57f7fc90df1ab6c688fafcc
SHA1d50825047b51b91a5c86546bc452c5de6ed98064
SHA256c9a2874d88be0edd904e269b85b98f72f87b13ce60caccdcc0353ea906ae6486
SHA512005e8d690ff5815a4be17b07aa0c9d3ee6d69a6ce891e2c07a2d30f8243e789376077664646f9bcfa67315494f923aef15d709f52c1b9648796edd3deb5ba046
-
Filesize
212KB
MD5bda07829b35143e8bb8722b433d8d501
SHA1214eb33f0e9bc0b7d33fd1d514a54c37c238a4ad
SHA25633d2e6c7fbaef3e7d690e3993d0c04d36aab6ade6e70eb3ea0cff2514e72358a
SHA5127db731b505d52de92d03ff238d59036807843bebcaafaa180fb3583926eb712e91621f8d507812f156f2d903fdcd82771040bb3f93c66c836d8f472fc6cd4473
-
Filesize
212KB
MD5bda07829b35143e8bb8722b433d8d501
SHA1214eb33f0e9bc0b7d33fd1d514a54c37c238a4ad
SHA25633d2e6c7fbaef3e7d690e3993d0c04d36aab6ade6e70eb3ea0cff2514e72358a
SHA5127db731b505d52de92d03ff238d59036807843bebcaafaa180fb3583926eb712e91621f8d507812f156f2d903fdcd82771040bb3f93c66c836d8f472fc6cd4473
-
Filesize
212KB
MD5bda07829b35143e8bb8722b433d8d501
SHA1214eb33f0e9bc0b7d33fd1d514a54c37c238a4ad
SHA25633d2e6c7fbaef3e7d690e3993d0c04d36aab6ade6e70eb3ea0cff2514e72358a
SHA5127db731b505d52de92d03ff238d59036807843bebcaafaa180fb3583926eb712e91621f8d507812f156f2d903fdcd82771040bb3f93c66c836d8f472fc6cd4473
-
Filesize
212KB
MD5bda07829b35143e8bb8722b433d8d501
SHA1214eb33f0e9bc0b7d33fd1d514a54c37c238a4ad
SHA25633d2e6c7fbaef3e7d690e3993d0c04d36aab6ade6e70eb3ea0cff2514e72358a
SHA5127db731b505d52de92d03ff238d59036807843bebcaafaa180fb3583926eb712e91621f8d507812f156f2d903fdcd82771040bb3f93c66c836d8f472fc6cd4473
-
Filesize
212KB
MD5bda07829b35143e8bb8722b433d8d501
SHA1214eb33f0e9bc0b7d33fd1d514a54c37c238a4ad
SHA25633d2e6c7fbaef3e7d690e3993d0c04d36aab6ade6e70eb3ea0cff2514e72358a
SHA5127db731b505d52de92d03ff238d59036807843bebcaafaa180fb3583926eb712e91621f8d507812f156f2d903fdcd82771040bb3f93c66c836d8f472fc6cd4473
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5