Analysis
-
max time kernel
112s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
09/05/2023, 23:09
Static task
static1
Behavioral task
behavioral1
Sample
a210707895812ca34d49ecab5051713fc9e3fa4d0daf8fc734c1321b5fb812c2.exe
Resource
win10-20230220-en
General
-
Target
a210707895812ca34d49ecab5051713fc9e3fa4d0daf8fc734c1321b5fb812c2.exe
-
Size
479KB
-
MD5
20ae1cd7f0ca16a89d0080a86a5ffc88
-
SHA1
c8c42621983416e18e8626060c636d77b60e352a
-
SHA256
a210707895812ca34d49ecab5051713fc9e3fa4d0daf8fc734c1321b5fb812c2
-
SHA512
3219544a0cda701354fe77744c41b0fe7818abfda6bf7913efb058fa3be6db0e0f015caf699295987ed67b4e2939e67e2b51a1f5874a13cf3f182bc27096294b
-
SSDEEP
12288:EMrey90LNOeT4kaKTIWRqlLPxGRlHjI3f:ayXhKJqxPxG/HjG
Malware Config
Extracted
redline
dease
217.196.96.101:4132
-
auth_value
82e4d5f9abc21848e0345118814a4e6c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h4328491.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h4328491.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h4328491.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h4328491.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h4328491.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 3448 x9432583.exe 3960 g2512235.exe 3020 h4328491.exe 1132 i2280855.exe 2508 oneetx.exe 2628 oneetx.exe 3508 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3344 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h4328491.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h4328491.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x9432583.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a210707895812ca34d49ecab5051713fc9e3fa4d0daf8fc734c1321b5fb812c2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a210707895812ca34d49ecab5051713fc9e3fa4d0daf8fc734c1321b5fb812c2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x9432583.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2104 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3960 g2512235.exe 3960 g2512235.exe 3020 h4328491.exe 3020 h4328491.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3960 g2512235.exe Token: SeDebugPrivilege 3020 h4328491.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1132 i2280855.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2652 wrote to memory of 3448 2652 a210707895812ca34d49ecab5051713fc9e3fa4d0daf8fc734c1321b5fb812c2.exe 66 PID 2652 wrote to memory of 3448 2652 a210707895812ca34d49ecab5051713fc9e3fa4d0daf8fc734c1321b5fb812c2.exe 66 PID 2652 wrote to memory of 3448 2652 a210707895812ca34d49ecab5051713fc9e3fa4d0daf8fc734c1321b5fb812c2.exe 66 PID 3448 wrote to memory of 3960 3448 x9432583.exe 67 PID 3448 wrote to memory of 3960 3448 x9432583.exe 67 PID 3448 wrote to memory of 3960 3448 x9432583.exe 67 PID 3448 wrote to memory of 3020 3448 x9432583.exe 69 PID 3448 wrote to memory of 3020 3448 x9432583.exe 69 PID 3448 wrote to memory of 3020 3448 x9432583.exe 69 PID 2652 wrote to memory of 1132 2652 a210707895812ca34d49ecab5051713fc9e3fa4d0daf8fc734c1321b5fb812c2.exe 70 PID 2652 wrote to memory of 1132 2652 a210707895812ca34d49ecab5051713fc9e3fa4d0daf8fc734c1321b5fb812c2.exe 70 PID 2652 wrote to memory of 1132 2652 a210707895812ca34d49ecab5051713fc9e3fa4d0daf8fc734c1321b5fb812c2.exe 70 PID 1132 wrote to memory of 2508 1132 i2280855.exe 71 PID 1132 wrote to memory of 2508 1132 i2280855.exe 71 PID 1132 wrote to memory of 2508 1132 i2280855.exe 71 PID 2508 wrote to memory of 2104 2508 oneetx.exe 72 PID 2508 wrote to memory of 2104 2508 oneetx.exe 72 PID 2508 wrote to memory of 2104 2508 oneetx.exe 72 PID 2508 wrote to memory of 3684 2508 oneetx.exe 74 PID 2508 wrote to memory of 3684 2508 oneetx.exe 74 PID 2508 wrote to memory of 3684 2508 oneetx.exe 74 PID 3684 wrote to memory of 220 3684 cmd.exe 76 PID 3684 wrote to memory of 220 3684 cmd.exe 76 PID 3684 wrote to memory of 220 3684 cmd.exe 76 PID 3684 wrote to memory of 204 3684 cmd.exe 77 PID 3684 wrote to memory of 204 3684 cmd.exe 77 PID 3684 wrote to memory of 204 3684 cmd.exe 77 PID 3684 wrote to memory of 1256 3684 cmd.exe 78 PID 3684 wrote to memory of 1256 3684 cmd.exe 78 PID 3684 wrote to memory of 1256 3684 cmd.exe 78 PID 3684 wrote to memory of 3360 3684 cmd.exe 79 PID 3684 wrote to memory of 3360 3684 cmd.exe 79 PID 3684 wrote to memory of 3360 3684 cmd.exe 79 PID 3684 wrote to memory of 2100 3684 cmd.exe 80 PID 3684 wrote to memory of 2100 3684 cmd.exe 80 PID 3684 wrote to memory of 2100 3684 cmd.exe 80 PID 3684 wrote to memory of 1700 3684 cmd.exe 81 PID 3684 wrote to memory of 1700 3684 cmd.exe 81 PID 3684 wrote to memory of 1700 3684 cmd.exe 81 PID 2508 wrote to memory of 3344 2508 oneetx.exe 83 PID 2508 wrote to memory of 3344 2508 oneetx.exe 83 PID 2508 wrote to memory of 3344 2508 oneetx.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\a210707895812ca34d49ecab5051713fc9e3fa4d0daf8fc734c1321b5fb812c2.exe"C:\Users\Admin\AppData\Local\Temp\a210707895812ca34d49ecab5051713fc9e3fa4d0daf8fc734c1321b5fb812c2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9432583.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9432583.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g2512235.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g2512235.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3960
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4328491.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4328491.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3020
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2280855.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2280855.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2104
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:220
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:204
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:1256
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3360
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:2100
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:1700
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3344
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2628
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3508
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD52663b2c707cee4605eb59d6cba3dcc64
SHA188a96b3986f26868300866f73a56703f51ef317b
SHA256992ec27dbd2d06d51cbf2c0a0666dd5596ad7be777011833c7f544cc1e8aa230
SHA512d6297d0fbfb68c8488fb8a47d3328448d5c8ace2f826569e49163f6329f7441f9f3ea3880414d8cf8c62c1900512ab5b1652800e4ac01ba1c1a834ced79d359d
-
Filesize
212KB
MD52663b2c707cee4605eb59d6cba3dcc64
SHA188a96b3986f26868300866f73a56703f51ef317b
SHA256992ec27dbd2d06d51cbf2c0a0666dd5596ad7be777011833c7f544cc1e8aa230
SHA512d6297d0fbfb68c8488fb8a47d3328448d5c8ace2f826569e49163f6329f7441f9f3ea3880414d8cf8c62c1900512ab5b1652800e4ac01ba1c1a834ced79d359d
-
Filesize
308KB
MD5bcbb2b8796efa33de2ac22b93d3f4e30
SHA11573222fd7041304c275b14a97d40e5dc02ffce5
SHA256b742e2513f47a71a69cec57d8d36c8c44c2a7fef67a80a9474c7d960089e2d86
SHA5124efab6051cab8c68caaa7a2f86eeb38b38e49c8416c4003093184afc083d764a3c036f3fd7b22aefb1e0066baaa7b27df8f586b4fbd8c1adb2f5e7d613077f50
-
Filesize
308KB
MD5bcbb2b8796efa33de2ac22b93d3f4e30
SHA11573222fd7041304c275b14a97d40e5dc02ffce5
SHA256b742e2513f47a71a69cec57d8d36c8c44c2a7fef67a80a9474c7d960089e2d86
SHA5124efab6051cab8c68caaa7a2f86eeb38b38e49c8416c4003093184afc083d764a3c036f3fd7b22aefb1e0066baaa7b27df8f586b4fbd8c1adb2f5e7d613077f50
-
Filesize
168KB
MD55dd6bd1061582b907451144f97d8c005
SHA1f49d07bc6badb9c674387e0e7751fc5fc12c7909
SHA2569832de1d29a65db6031a00634faad977a3da4587ba0146fe2759f5192e3e92e4
SHA5129e0b3ccf55a2c96232d5ff9450d7c98d31b21ff465728cd1e09be9e60a729d01ad873962669fc38b8ae5bcaf8be8eadc9e981a6decaaf7ebdb48515cace12daa
-
Filesize
168KB
MD55dd6bd1061582b907451144f97d8c005
SHA1f49d07bc6badb9c674387e0e7751fc5fc12c7909
SHA2569832de1d29a65db6031a00634faad977a3da4587ba0146fe2759f5192e3e92e4
SHA5129e0b3ccf55a2c96232d5ff9450d7c98d31b21ff465728cd1e09be9e60a729d01ad873962669fc38b8ae5bcaf8be8eadc9e981a6decaaf7ebdb48515cace12daa
-
Filesize
181KB
MD5ae233ff86769c2ec401a2d29e427dc6b
SHA13d039177f452fec827c22e0c55b36f882b71cf0a
SHA256ef264ea01f9e70b13841f63832dad161ba93d0575c04598210f0765ea6f6d468
SHA512798710b664b2b092efce7b3a390339fbfcacde70245737d26f5652da5823562e14316d7f5ae6dcfea8300344703f773b9ee052af87857b218261c38eec316695
-
Filesize
181KB
MD5ae233ff86769c2ec401a2d29e427dc6b
SHA13d039177f452fec827c22e0c55b36f882b71cf0a
SHA256ef264ea01f9e70b13841f63832dad161ba93d0575c04598210f0765ea6f6d468
SHA512798710b664b2b092efce7b3a390339fbfcacde70245737d26f5652da5823562e14316d7f5ae6dcfea8300344703f773b9ee052af87857b218261c38eec316695
-
Filesize
212KB
MD52663b2c707cee4605eb59d6cba3dcc64
SHA188a96b3986f26868300866f73a56703f51ef317b
SHA256992ec27dbd2d06d51cbf2c0a0666dd5596ad7be777011833c7f544cc1e8aa230
SHA512d6297d0fbfb68c8488fb8a47d3328448d5c8ace2f826569e49163f6329f7441f9f3ea3880414d8cf8c62c1900512ab5b1652800e4ac01ba1c1a834ced79d359d
-
Filesize
212KB
MD52663b2c707cee4605eb59d6cba3dcc64
SHA188a96b3986f26868300866f73a56703f51ef317b
SHA256992ec27dbd2d06d51cbf2c0a0666dd5596ad7be777011833c7f544cc1e8aa230
SHA512d6297d0fbfb68c8488fb8a47d3328448d5c8ace2f826569e49163f6329f7441f9f3ea3880414d8cf8c62c1900512ab5b1652800e4ac01ba1c1a834ced79d359d
-
Filesize
212KB
MD52663b2c707cee4605eb59d6cba3dcc64
SHA188a96b3986f26868300866f73a56703f51ef317b
SHA256992ec27dbd2d06d51cbf2c0a0666dd5596ad7be777011833c7f544cc1e8aa230
SHA512d6297d0fbfb68c8488fb8a47d3328448d5c8ace2f826569e49163f6329f7441f9f3ea3880414d8cf8c62c1900512ab5b1652800e4ac01ba1c1a834ced79d359d
-
Filesize
212KB
MD52663b2c707cee4605eb59d6cba3dcc64
SHA188a96b3986f26868300866f73a56703f51ef317b
SHA256992ec27dbd2d06d51cbf2c0a0666dd5596ad7be777011833c7f544cc1e8aa230
SHA512d6297d0fbfb68c8488fb8a47d3328448d5c8ace2f826569e49163f6329f7441f9f3ea3880414d8cf8c62c1900512ab5b1652800e4ac01ba1c1a834ced79d359d
-
Filesize
212KB
MD52663b2c707cee4605eb59d6cba3dcc64
SHA188a96b3986f26868300866f73a56703f51ef317b
SHA256992ec27dbd2d06d51cbf2c0a0666dd5596ad7be777011833c7f544cc1e8aa230
SHA512d6297d0fbfb68c8488fb8a47d3328448d5c8ace2f826569e49163f6329f7441f9f3ea3880414d8cf8c62c1900512ab5b1652800e4ac01ba1c1a834ced79d359d
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53