Analysis

  • max time kernel
    135s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2023, 00:50

General

  • Target

    33232f657301f06deca16f7e078f6a7e082a0bd1837ed92fefec89b1b6eab906.exe

  • Size

    479KB

  • MD5

    06cc922bbf2a4da7d68c682c7111ea00

  • SHA1

    01c61c8bd76b8a2e939b4f24d40674d5692a0634

  • SHA256

    33232f657301f06deca16f7e078f6a7e082a0bd1837ed92fefec89b1b6eab906

  • SHA512

    c0cd35bc30ee1171d60a74444a0cb12db66a2e1c5034f4c6565eaaf0619931053a1afa74a37cdadbd39c995f36b258849c486a6983896eb678daab046dcb9622

  • SSDEEP

    6144:K5y+bnr+Vp0yN90QEBVXjr+vQkofbHDUShI811MPZPP9jKONDhFHwjqekrkGL:HMrRy90lzSLEHDFIQ1iP95DXgqbrky

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\33232f657301f06deca16f7e078f6a7e082a0bd1837ed92fefec89b1b6eab906.exe
    "C:\Users\Admin\AppData\Local\Temp\33232f657301f06deca16f7e078f6a7e082a0bd1837ed92fefec89b1b6eab906.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5028
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9477257.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9477257.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3976
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5433425.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5433425.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1960
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6495021.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6495021.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5016
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m5872118.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m5872118.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1708
      • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4076
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4888
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4600
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:2332
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:N"
              5⤵
                PID:3876
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                5⤵
                  PID:3124
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:2956
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\c3912af058" /P "Admin:N"
                    5⤵
                      PID:3376
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\c3912af058" /P "Admin:R" /E
                      5⤵
                        PID:2152
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:4676
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:1076
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:2520

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m5872118.exe

                Filesize

                211KB

                MD5

                1d59d6de974a8bbe9f4f4e6087c5f307

                SHA1

                048cc18b4492f4a82272fc11faa8215e219ad532

                SHA256

                d260719f8f824ee77aff695a19210a7bc782886a89cacb0c45102bb31d3528eb

                SHA512

                4c306ca5122ca7027949f4a4556bfd01b556cbde37a78dfa8c6dbcf542be1e00923516494df0f169f3fb1f63b3c3637ac0655efb730f2e1ed5891482f997b3f0

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m5872118.exe

                Filesize

                211KB

                MD5

                1d59d6de974a8bbe9f4f4e6087c5f307

                SHA1

                048cc18b4492f4a82272fc11faa8215e219ad532

                SHA256

                d260719f8f824ee77aff695a19210a7bc782886a89cacb0c45102bb31d3528eb

                SHA512

                4c306ca5122ca7027949f4a4556bfd01b556cbde37a78dfa8c6dbcf542be1e00923516494df0f169f3fb1f63b3c3637ac0655efb730f2e1ed5891482f997b3f0

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9477257.exe

                Filesize

                307KB

                MD5

                4dae8b133c57c27e1bf01757cb9d33ed

                SHA1

                0542ca27850cf2c12e83e0401d63e2e28cd42810

                SHA256

                d509d8a8b98727fb2c80240e14ceb2e2f1a84cca70810a8d52903a267ab0781c

                SHA512

                51cd17d53bdd97c2eb7e10819969f44a7943f373484ab59357f46ccc68e2bf128574056c7e00452db6b7720885e6cf8593eb109aebb7246ced0be569a8cfe19f

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9477257.exe

                Filesize

                307KB

                MD5

                4dae8b133c57c27e1bf01757cb9d33ed

                SHA1

                0542ca27850cf2c12e83e0401d63e2e28cd42810

                SHA256

                d509d8a8b98727fb2c80240e14ceb2e2f1a84cca70810a8d52903a267ab0781c

                SHA512

                51cd17d53bdd97c2eb7e10819969f44a7943f373484ab59357f46ccc68e2bf128574056c7e00452db6b7720885e6cf8593eb109aebb7246ced0be569a8cfe19f

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5433425.exe

                Filesize

                180KB

                MD5

                15811fa130faf6ade865ed3ff4cd99d6

                SHA1

                e75b07327f739516c95acfc38f10fa1f9eaa0bb1

                SHA256

                1c34d40d440b840b3520515b7f4fcbdcfbfe16beca8487210fa959379a3411e0

                SHA512

                2b8893132471ad4dfef677ada7dbea9f6bc6be46c65181c803f3a54660a5bd4b6781f05f1938104493f8dfcf38c08403e7cd96d7aa4b42ee4cf5522ef3bbf538

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5433425.exe

                Filesize

                180KB

                MD5

                15811fa130faf6ade865ed3ff4cd99d6

                SHA1

                e75b07327f739516c95acfc38f10fa1f9eaa0bb1

                SHA256

                1c34d40d440b840b3520515b7f4fcbdcfbfe16beca8487210fa959379a3411e0

                SHA512

                2b8893132471ad4dfef677ada7dbea9f6bc6be46c65181c803f3a54660a5bd4b6781f05f1938104493f8dfcf38c08403e7cd96d7aa4b42ee4cf5522ef3bbf538

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6495021.exe

                Filesize

                168KB

                MD5

                bb7093762effc7c49c358b7047f7764d

                SHA1

                81a880b3e2e100008a1452a127d659571c4fa72a

                SHA256

                3d56ab8fefb64130e148bac7e3add9bdd81efcbde224305b7f6abc6a3a047b08

                SHA512

                7cd3db72985f1a34a01fc6e916607adca5d67186a99a0c7299f5cc16e33927c7ee37568999e2d7c4751b3f76d1bad60836827e225223c29838727165f2c78d1b

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6495021.exe

                Filesize

                168KB

                MD5

                bb7093762effc7c49c358b7047f7764d

                SHA1

                81a880b3e2e100008a1452a127d659571c4fa72a

                SHA256

                3d56ab8fefb64130e148bac7e3add9bdd81efcbde224305b7f6abc6a3a047b08

                SHA512

                7cd3db72985f1a34a01fc6e916607adca5d67186a99a0c7299f5cc16e33927c7ee37568999e2d7c4751b3f76d1bad60836827e225223c29838727165f2c78d1b

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                211KB

                MD5

                1d59d6de974a8bbe9f4f4e6087c5f307

                SHA1

                048cc18b4492f4a82272fc11faa8215e219ad532

                SHA256

                d260719f8f824ee77aff695a19210a7bc782886a89cacb0c45102bb31d3528eb

                SHA512

                4c306ca5122ca7027949f4a4556bfd01b556cbde37a78dfa8c6dbcf542be1e00923516494df0f169f3fb1f63b3c3637ac0655efb730f2e1ed5891482f997b3f0

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                211KB

                MD5

                1d59d6de974a8bbe9f4f4e6087c5f307

                SHA1

                048cc18b4492f4a82272fc11faa8215e219ad532

                SHA256

                d260719f8f824ee77aff695a19210a7bc782886a89cacb0c45102bb31d3528eb

                SHA512

                4c306ca5122ca7027949f4a4556bfd01b556cbde37a78dfa8c6dbcf542be1e00923516494df0f169f3fb1f63b3c3637ac0655efb730f2e1ed5891482f997b3f0

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                211KB

                MD5

                1d59d6de974a8bbe9f4f4e6087c5f307

                SHA1

                048cc18b4492f4a82272fc11faa8215e219ad532

                SHA256

                d260719f8f824ee77aff695a19210a7bc782886a89cacb0c45102bb31d3528eb

                SHA512

                4c306ca5122ca7027949f4a4556bfd01b556cbde37a78dfa8c6dbcf542be1e00923516494df0f169f3fb1f63b3c3637ac0655efb730f2e1ed5891482f997b3f0

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                211KB

                MD5

                1d59d6de974a8bbe9f4f4e6087c5f307

                SHA1

                048cc18b4492f4a82272fc11faa8215e219ad532

                SHA256

                d260719f8f824ee77aff695a19210a7bc782886a89cacb0c45102bb31d3528eb

                SHA512

                4c306ca5122ca7027949f4a4556bfd01b556cbde37a78dfa8c6dbcf542be1e00923516494df0f169f3fb1f63b3c3637ac0655efb730f2e1ed5891482f997b3f0

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                211KB

                MD5

                1d59d6de974a8bbe9f4f4e6087c5f307

                SHA1

                048cc18b4492f4a82272fc11faa8215e219ad532

                SHA256

                d260719f8f824ee77aff695a19210a7bc782886a89cacb0c45102bb31d3528eb

                SHA512

                4c306ca5122ca7027949f4a4556bfd01b556cbde37a78dfa8c6dbcf542be1e00923516494df0f169f3fb1f63b3c3637ac0655efb730f2e1ed5891482f997b3f0

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • memory/1960-164-0x0000000004950000-0x0000000004962000-memory.dmp

                Filesize

                72KB

              • memory/1960-151-0x0000000004950000-0x0000000004962000-memory.dmp

                Filesize

                72KB

              • memory/1960-176-0x0000000004950000-0x0000000004962000-memory.dmp

                Filesize

                72KB

              • memory/1960-178-0x0000000004950000-0x0000000004962000-memory.dmp

                Filesize

                72KB

              • memory/1960-174-0x0000000004950000-0x0000000004962000-memory.dmp

                Filesize

                72KB

              • memory/1960-172-0x0000000004950000-0x0000000004962000-memory.dmp

                Filesize

                72KB

              • memory/1960-166-0x0000000004950000-0x0000000004962000-memory.dmp

                Filesize

                72KB

              • memory/1960-170-0x0000000004950000-0x0000000004962000-memory.dmp

                Filesize

                72KB

              • memory/1960-158-0x0000000004950000-0x0000000004962000-memory.dmp

                Filesize

                72KB

              • memory/1960-156-0x0000000004950000-0x0000000004962000-memory.dmp

                Filesize

                72KB

              • memory/1960-154-0x0000000004950000-0x0000000004962000-memory.dmp

                Filesize

                72KB

              • memory/1960-179-0x0000000004B00000-0x0000000004B10000-memory.dmp

                Filesize

                64KB

              • memory/1960-180-0x0000000004B00000-0x0000000004B10000-memory.dmp

                Filesize

                64KB

              • memory/1960-181-0x0000000004B00000-0x0000000004B10000-memory.dmp

                Filesize

                64KB

              • memory/1960-147-0x0000000004B00000-0x0000000004B10000-memory.dmp

                Filesize

                64KB

              • memory/1960-148-0x0000000004B00000-0x0000000004B10000-memory.dmp

                Filesize

                64KB

              • memory/1960-149-0x0000000004B00000-0x0000000004B10000-memory.dmp

                Filesize

                64KB

              • memory/1960-150-0x0000000004B10000-0x00000000050B4000-memory.dmp

                Filesize

                5.6MB

              • memory/1960-152-0x0000000004950000-0x0000000004962000-memory.dmp

                Filesize

                72KB

              • memory/1960-168-0x0000000004950000-0x0000000004962000-memory.dmp

                Filesize

                72KB

              • memory/1960-162-0x0000000004950000-0x0000000004962000-memory.dmp

                Filesize

                72KB

              • memory/1960-160-0x0000000004950000-0x0000000004962000-memory.dmp

                Filesize

                72KB

              • memory/5016-194-0x000000000AA50000-0x000000000AAB6000-memory.dmp

                Filesize

                408KB

              • memory/5016-193-0x000000000A360000-0x000000000A3F2000-memory.dmp

                Filesize

                584KB

              • memory/5016-192-0x000000000A240000-0x000000000A2B6000-memory.dmp

                Filesize

                472KB

              • memory/5016-191-0x0000000004980000-0x0000000004990000-memory.dmp

                Filesize

                64KB

              • memory/5016-190-0x0000000009F30000-0x0000000009F6C000-memory.dmp

                Filesize

                240KB

              • memory/5016-189-0x0000000009ED0000-0x0000000009EE2000-memory.dmp

                Filesize

                72KB

              • memory/5016-188-0x0000000009FA0000-0x000000000A0AA000-memory.dmp

                Filesize

                1.0MB

              • memory/5016-187-0x000000000A430000-0x000000000AA48000-memory.dmp

                Filesize

                6.1MB

              • memory/5016-186-0x0000000000020000-0x0000000000050000-memory.dmp

                Filesize

                192KB

              • memory/5016-195-0x000000000B880000-0x000000000BA42000-memory.dmp

                Filesize

                1.8MB

              • memory/5016-196-0x000000000BF80000-0x000000000C4AC000-memory.dmp

                Filesize

                5.2MB

              • memory/5016-197-0x000000000B750000-0x000000000B7A0000-memory.dmp

                Filesize

                320KB