Analysis
-
max time kernel
135s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2023, 00:50
Static task
static1
Behavioral task
behavioral1
Sample
33232f657301f06deca16f7e078f6a7e082a0bd1837ed92fefec89b1b6eab906.exe
Resource
win10v2004-20230220-en
General
-
Target
33232f657301f06deca16f7e078f6a7e082a0bd1837ed92fefec89b1b6eab906.exe
-
Size
479KB
-
MD5
06cc922bbf2a4da7d68c682c7111ea00
-
SHA1
01c61c8bd76b8a2e939b4f24d40674d5692a0634
-
SHA256
33232f657301f06deca16f7e078f6a7e082a0bd1837ed92fefec89b1b6eab906
-
SHA512
c0cd35bc30ee1171d60a74444a0cb12db66a2e1c5034f4c6565eaaf0619931053a1afa74a37cdadbd39c995f36b258849c486a6983896eb678daab046dcb9622
-
SSDEEP
6144:K5y+bnr+Vp0yN90QEBVXjr+vQkofbHDUShI811MPZPP9jKONDhFHwjqekrkGL:HMrRy90lzSLEHDFIQ1iP95DXgqbrky
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k5433425.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k5433425.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k5433425.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k5433425.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k5433425.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k5433425.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation m5872118.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 3976 y9477257.exe 1960 k5433425.exe 5016 l6495021.exe 1708 m5872118.exe 4076 oneetx.exe 1076 oneetx.exe 2520 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4676 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k5433425.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k5433425.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y9477257.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 33232f657301f06deca16f7e078f6a7e082a0bd1837ed92fefec89b1b6eab906.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 33232f657301f06deca16f7e078f6a7e082a0bd1837ed92fefec89b1b6eab906.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y9477257.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4888 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1960 k5433425.exe 1960 k5433425.exe 5016 l6495021.exe 5016 l6495021.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1960 k5433425.exe Token: SeDebugPrivilege 5016 l6495021.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1708 m5872118.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 5028 wrote to memory of 3976 5028 33232f657301f06deca16f7e078f6a7e082a0bd1837ed92fefec89b1b6eab906.exe 85 PID 5028 wrote to memory of 3976 5028 33232f657301f06deca16f7e078f6a7e082a0bd1837ed92fefec89b1b6eab906.exe 85 PID 5028 wrote to memory of 3976 5028 33232f657301f06deca16f7e078f6a7e082a0bd1837ed92fefec89b1b6eab906.exe 85 PID 3976 wrote to memory of 1960 3976 y9477257.exe 86 PID 3976 wrote to memory of 1960 3976 y9477257.exe 86 PID 3976 wrote to memory of 1960 3976 y9477257.exe 86 PID 3976 wrote to memory of 5016 3976 y9477257.exe 91 PID 3976 wrote to memory of 5016 3976 y9477257.exe 91 PID 3976 wrote to memory of 5016 3976 y9477257.exe 91 PID 5028 wrote to memory of 1708 5028 33232f657301f06deca16f7e078f6a7e082a0bd1837ed92fefec89b1b6eab906.exe 95 PID 5028 wrote to memory of 1708 5028 33232f657301f06deca16f7e078f6a7e082a0bd1837ed92fefec89b1b6eab906.exe 95 PID 5028 wrote to memory of 1708 5028 33232f657301f06deca16f7e078f6a7e082a0bd1837ed92fefec89b1b6eab906.exe 95 PID 1708 wrote to memory of 4076 1708 m5872118.exe 96 PID 1708 wrote to memory of 4076 1708 m5872118.exe 96 PID 1708 wrote to memory of 4076 1708 m5872118.exe 96 PID 4076 wrote to memory of 4888 4076 oneetx.exe 97 PID 4076 wrote to memory of 4888 4076 oneetx.exe 97 PID 4076 wrote to memory of 4888 4076 oneetx.exe 97 PID 4076 wrote to memory of 4600 4076 oneetx.exe 99 PID 4076 wrote to memory of 4600 4076 oneetx.exe 99 PID 4076 wrote to memory of 4600 4076 oneetx.exe 99 PID 4600 wrote to memory of 2332 4600 cmd.exe 101 PID 4600 wrote to memory of 2332 4600 cmd.exe 101 PID 4600 wrote to memory of 2332 4600 cmd.exe 101 PID 4600 wrote to memory of 3876 4600 cmd.exe 102 PID 4600 wrote to memory of 3876 4600 cmd.exe 102 PID 4600 wrote to memory of 3876 4600 cmd.exe 102 PID 4600 wrote to memory of 3124 4600 cmd.exe 103 PID 4600 wrote to memory of 3124 4600 cmd.exe 103 PID 4600 wrote to memory of 3124 4600 cmd.exe 103 PID 4600 wrote to memory of 2956 4600 cmd.exe 104 PID 4600 wrote to memory of 2956 4600 cmd.exe 104 PID 4600 wrote to memory of 2956 4600 cmd.exe 104 PID 4600 wrote to memory of 3376 4600 cmd.exe 105 PID 4600 wrote to memory of 3376 4600 cmd.exe 105 PID 4600 wrote to memory of 3376 4600 cmd.exe 105 PID 4600 wrote to memory of 2152 4600 cmd.exe 106 PID 4600 wrote to memory of 2152 4600 cmd.exe 106 PID 4600 wrote to memory of 2152 4600 cmd.exe 106 PID 4076 wrote to memory of 4676 4076 oneetx.exe 109 PID 4076 wrote to memory of 4676 4076 oneetx.exe 109 PID 4076 wrote to memory of 4676 4076 oneetx.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\33232f657301f06deca16f7e078f6a7e082a0bd1837ed92fefec89b1b6eab906.exe"C:\Users\Admin\AppData\Local\Temp\33232f657301f06deca16f7e078f6a7e082a0bd1837ed92fefec89b1b6eab906.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9477257.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9477257.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5433425.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5433425.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1960
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6495021.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6495021.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5016
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m5872118.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m5872118.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4888
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2332
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:3876
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3124
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2956
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:3376
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:2152
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4676
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1076
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2520
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD51d59d6de974a8bbe9f4f4e6087c5f307
SHA1048cc18b4492f4a82272fc11faa8215e219ad532
SHA256d260719f8f824ee77aff695a19210a7bc782886a89cacb0c45102bb31d3528eb
SHA5124c306ca5122ca7027949f4a4556bfd01b556cbde37a78dfa8c6dbcf542be1e00923516494df0f169f3fb1f63b3c3637ac0655efb730f2e1ed5891482f997b3f0
-
Filesize
211KB
MD51d59d6de974a8bbe9f4f4e6087c5f307
SHA1048cc18b4492f4a82272fc11faa8215e219ad532
SHA256d260719f8f824ee77aff695a19210a7bc782886a89cacb0c45102bb31d3528eb
SHA5124c306ca5122ca7027949f4a4556bfd01b556cbde37a78dfa8c6dbcf542be1e00923516494df0f169f3fb1f63b3c3637ac0655efb730f2e1ed5891482f997b3f0
-
Filesize
307KB
MD54dae8b133c57c27e1bf01757cb9d33ed
SHA10542ca27850cf2c12e83e0401d63e2e28cd42810
SHA256d509d8a8b98727fb2c80240e14ceb2e2f1a84cca70810a8d52903a267ab0781c
SHA51251cd17d53bdd97c2eb7e10819969f44a7943f373484ab59357f46ccc68e2bf128574056c7e00452db6b7720885e6cf8593eb109aebb7246ced0be569a8cfe19f
-
Filesize
307KB
MD54dae8b133c57c27e1bf01757cb9d33ed
SHA10542ca27850cf2c12e83e0401d63e2e28cd42810
SHA256d509d8a8b98727fb2c80240e14ceb2e2f1a84cca70810a8d52903a267ab0781c
SHA51251cd17d53bdd97c2eb7e10819969f44a7943f373484ab59357f46ccc68e2bf128574056c7e00452db6b7720885e6cf8593eb109aebb7246ced0be569a8cfe19f
-
Filesize
180KB
MD515811fa130faf6ade865ed3ff4cd99d6
SHA1e75b07327f739516c95acfc38f10fa1f9eaa0bb1
SHA2561c34d40d440b840b3520515b7f4fcbdcfbfe16beca8487210fa959379a3411e0
SHA5122b8893132471ad4dfef677ada7dbea9f6bc6be46c65181c803f3a54660a5bd4b6781f05f1938104493f8dfcf38c08403e7cd96d7aa4b42ee4cf5522ef3bbf538
-
Filesize
180KB
MD515811fa130faf6ade865ed3ff4cd99d6
SHA1e75b07327f739516c95acfc38f10fa1f9eaa0bb1
SHA2561c34d40d440b840b3520515b7f4fcbdcfbfe16beca8487210fa959379a3411e0
SHA5122b8893132471ad4dfef677ada7dbea9f6bc6be46c65181c803f3a54660a5bd4b6781f05f1938104493f8dfcf38c08403e7cd96d7aa4b42ee4cf5522ef3bbf538
-
Filesize
168KB
MD5bb7093762effc7c49c358b7047f7764d
SHA181a880b3e2e100008a1452a127d659571c4fa72a
SHA2563d56ab8fefb64130e148bac7e3add9bdd81efcbde224305b7f6abc6a3a047b08
SHA5127cd3db72985f1a34a01fc6e916607adca5d67186a99a0c7299f5cc16e33927c7ee37568999e2d7c4751b3f76d1bad60836827e225223c29838727165f2c78d1b
-
Filesize
168KB
MD5bb7093762effc7c49c358b7047f7764d
SHA181a880b3e2e100008a1452a127d659571c4fa72a
SHA2563d56ab8fefb64130e148bac7e3add9bdd81efcbde224305b7f6abc6a3a047b08
SHA5127cd3db72985f1a34a01fc6e916607adca5d67186a99a0c7299f5cc16e33927c7ee37568999e2d7c4751b3f76d1bad60836827e225223c29838727165f2c78d1b
-
Filesize
211KB
MD51d59d6de974a8bbe9f4f4e6087c5f307
SHA1048cc18b4492f4a82272fc11faa8215e219ad532
SHA256d260719f8f824ee77aff695a19210a7bc782886a89cacb0c45102bb31d3528eb
SHA5124c306ca5122ca7027949f4a4556bfd01b556cbde37a78dfa8c6dbcf542be1e00923516494df0f169f3fb1f63b3c3637ac0655efb730f2e1ed5891482f997b3f0
-
Filesize
211KB
MD51d59d6de974a8bbe9f4f4e6087c5f307
SHA1048cc18b4492f4a82272fc11faa8215e219ad532
SHA256d260719f8f824ee77aff695a19210a7bc782886a89cacb0c45102bb31d3528eb
SHA5124c306ca5122ca7027949f4a4556bfd01b556cbde37a78dfa8c6dbcf542be1e00923516494df0f169f3fb1f63b3c3637ac0655efb730f2e1ed5891482f997b3f0
-
Filesize
211KB
MD51d59d6de974a8bbe9f4f4e6087c5f307
SHA1048cc18b4492f4a82272fc11faa8215e219ad532
SHA256d260719f8f824ee77aff695a19210a7bc782886a89cacb0c45102bb31d3528eb
SHA5124c306ca5122ca7027949f4a4556bfd01b556cbde37a78dfa8c6dbcf542be1e00923516494df0f169f3fb1f63b3c3637ac0655efb730f2e1ed5891482f997b3f0
-
Filesize
211KB
MD51d59d6de974a8bbe9f4f4e6087c5f307
SHA1048cc18b4492f4a82272fc11faa8215e219ad532
SHA256d260719f8f824ee77aff695a19210a7bc782886a89cacb0c45102bb31d3528eb
SHA5124c306ca5122ca7027949f4a4556bfd01b556cbde37a78dfa8c6dbcf542be1e00923516494df0f169f3fb1f63b3c3637ac0655efb730f2e1ed5891482f997b3f0
-
Filesize
211KB
MD51d59d6de974a8bbe9f4f4e6087c5f307
SHA1048cc18b4492f4a82272fc11faa8215e219ad532
SHA256d260719f8f824ee77aff695a19210a7bc782886a89cacb0c45102bb31d3528eb
SHA5124c306ca5122ca7027949f4a4556bfd01b556cbde37a78dfa8c6dbcf542be1e00923516494df0f169f3fb1f63b3c3637ac0655efb730f2e1ed5891482f997b3f0
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5