Analysis
-
max time kernel
139s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2023, 01:27
Static task
static1
Behavioral task
behavioral1
Sample
e21567f1cb0ca8d1bf6e98853cf0f9cffbec76b8e7e2f9fe2d6f806840cff1e9.exe
Resource
win10v2004-20230221-en
General
-
Target
e21567f1cb0ca8d1bf6e98853cf0f9cffbec76b8e7e2f9fe2d6f806840cff1e9.exe
-
Size
490KB
-
MD5
bc45f27fd63ce0e6bee779ff4eb02345
-
SHA1
5bddd4ac3f450d7d51fc9916bc577ffbacadc23e
-
SHA256
e21567f1cb0ca8d1bf6e98853cf0f9cffbec76b8e7e2f9fe2d6f806840cff1e9
-
SHA512
0529b7c16982fd43ffffe15bd12a085250aac646190c60bc8ed704e5f93df96015fd1fce08eaca2b251103129b67ddb10b59d4d3f2c6b6481f1227d51003903b
-
SSDEEP
12288:pMrqy90Oiqj2JiB67HtN2m+lks84AWjBPI3kaztEzh03g:DydB2JiBuHtuGZvvtEzhSg
Malware Config
Extracted
redline
lamp
217.196.96.101:4132
-
auth_value
8a3e8bc22f2496c7c5339eb332073902
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o7128879.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o7128879.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o7128879.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o7128879.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o7128879.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o7128879.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation s6324320.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 2052 z1906927.exe 2352 o7128879.exe 2528 r8285357.exe 492 s6324320.exe 3912 oneetx.exe 4512 oneetx.exe 2520 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2500 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o7128879.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o7128879.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e21567f1cb0ca8d1bf6e98853cf0f9cffbec76b8e7e2f9fe2d6f806840cff1e9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e21567f1cb0ca8d1bf6e98853cf0f9cffbec76b8e7e2f9fe2d6f806840cff1e9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z1906927.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z1906927.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2296 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2352 o7128879.exe 2352 o7128879.exe 2528 r8285357.exe 2528 r8285357.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2352 o7128879.exe Token: SeDebugPrivilege 2528 r8285357.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 492 s6324320.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4648 wrote to memory of 2052 4648 e21567f1cb0ca8d1bf6e98853cf0f9cffbec76b8e7e2f9fe2d6f806840cff1e9.exe 84 PID 4648 wrote to memory of 2052 4648 e21567f1cb0ca8d1bf6e98853cf0f9cffbec76b8e7e2f9fe2d6f806840cff1e9.exe 84 PID 4648 wrote to memory of 2052 4648 e21567f1cb0ca8d1bf6e98853cf0f9cffbec76b8e7e2f9fe2d6f806840cff1e9.exe 84 PID 2052 wrote to memory of 2352 2052 z1906927.exe 85 PID 2052 wrote to memory of 2352 2052 z1906927.exe 85 PID 2052 wrote to memory of 2352 2052 z1906927.exe 85 PID 2052 wrote to memory of 2528 2052 z1906927.exe 92 PID 2052 wrote to memory of 2528 2052 z1906927.exe 92 PID 2052 wrote to memory of 2528 2052 z1906927.exe 92 PID 4648 wrote to memory of 492 4648 e21567f1cb0ca8d1bf6e98853cf0f9cffbec76b8e7e2f9fe2d6f806840cff1e9.exe 94 PID 4648 wrote to memory of 492 4648 e21567f1cb0ca8d1bf6e98853cf0f9cffbec76b8e7e2f9fe2d6f806840cff1e9.exe 94 PID 4648 wrote to memory of 492 4648 e21567f1cb0ca8d1bf6e98853cf0f9cffbec76b8e7e2f9fe2d6f806840cff1e9.exe 94 PID 492 wrote to memory of 3912 492 s6324320.exe 95 PID 492 wrote to memory of 3912 492 s6324320.exe 95 PID 492 wrote to memory of 3912 492 s6324320.exe 95 PID 3912 wrote to memory of 2296 3912 oneetx.exe 96 PID 3912 wrote to memory of 2296 3912 oneetx.exe 96 PID 3912 wrote to memory of 2296 3912 oneetx.exe 96 PID 3912 wrote to memory of 2500 3912 oneetx.exe 99 PID 3912 wrote to memory of 2500 3912 oneetx.exe 99 PID 3912 wrote to memory of 2500 3912 oneetx.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\e21567f1cb0ca8d1bf6e98853cf0f9cffbec76b8e7e2f9fe2d6f806840cff1e9.exe"C:\Users\Admin\AppData\Local\Temp\e21567f1cb0ca8d1bf6e98853cf0f9cffbec76b8e7e2f9fe2d6f806840cff1e9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1906927.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1906927.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o7128879.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o7128879.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8285357.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8285357.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6324320.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6324320.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:492 -
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2296
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2500
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:4512
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:2520
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD52d43599b7ca72272c14d11a71b348154
SHA1695e6228a6e67cc14fa93f717a204a406275fde3
SHA256eef0a23b328a253b3834e30061ae2e19adfce816b6d76bda2e5de7d16858f6f1
SHA512e9b1d820302b61f816ae784098361db9746ee99d62ebadf5c8da14e6a13df757f37f82cad3b9131d2244116d1e6f5da4d1ce2bd0182c3cb45dfba06ec6199855
-
Filesize
231KB
MD52d43599b7ca72272c14d11a71b348154
SHA1695e6228a6e67cc14fa93f717a204a406275fde3
SHA256eef0a23b328a253b3834e30061ae2e19adfce816b6d76bda2e5de7d16858f6f1
SHA512e9b1d820302b61f816ae784098361db9746ee99d62ebadf5c8da14e6a13df757f37f82cad3b9131d2244116d1e6f5da4d1ce2bd0182c3cb45dfba06ec6199855
-
Filesize
231KB
MD52d43599b7ca72272c14d11a71b348154
SHA1695e6228a6e67cc14fa93f717a204a406275fde3
SHA256eef0a23b328a253b3834e30061ae2e19adfce816b6d76bda2e5de7d16858f6f1
SHA512e9b1d820302b61f816ae784098361db9746ee99d62ebadf5c8da14e6a13df757f37f82cad3b9131d2244116d1e6f5da4d1ce2bd0182c3cb45dfba06ec6199855
-
Filesize
231KB
MD52d43599b7ca72272c14d11a71b348154
SHA1695e6228a6e67cc14fa93f717a204a406275fde3
SHA256eef0a23b328a253b3834e30061ae2e19adfce816b6d76bda2e5de7d16858f6f1
SHA512e9b1d820302b61f816ae784098361db9746ee99d62ebadf5c8da14e6a13df757f37f82cad3b9131d2244116d1e6f5da4d1ce2bd0182c3cb45dfba06ec6199855
-
Filesize
231KB
MD52d43599b7ca72272c14d11a71b348154
SHA1695e6228a6e67cc14fa93f717a204a406275fde3
SHA256eef0a23b328a253b3834e30061ae2e19adfce816b6d76bda2e5de7d16858f6f1
SHA512e9b1d820302b61f816ae784098361db9746ee99d62ebadf5c8da14e6a13df757f37f82cad3b9131d2244116d1e6f5da4d1ce2bd0182c3cb45dfba06ec6199855
-
Filesize
231KB
MD52d43599b7ca72272c14d11a71b348154
SHA1695e6228a6e67cc14fa93f717a204a406275fde3
SHA256eef0a23b328a253b3834e30061ae2e19adfce816b6d76bda2e5de7d16858f6f1
SHA512e9b1d820302b61f816ae784098361db9746ee99d62ebadf5c8da14e6a13df757f37f82cad3b9131d2244116d1e6f5da4d1ce2bd0182c3cb45dfba06ec6199855
-
Filesize
231KB
MD52d43599b7ca72272c14d11a71b348154
SHA1695e6228a6e67cc14fa93f717a204a406275fde3
SHA256eef0a23b328a253b3834e30061ae2e19adfce816b6d76bda2e5de7d16858f6f1
SHA512e9b1d820302b61f816ae784098361db9746ee99d62ebadf5c8da14e6a13df757f37f82cad3b9131d2244116d1e6f5da4d1ce2bd0182c3cb45dfba06ec6199855
-
Filesize
307KB
MD50a764347eccbe786513ed2609ffb3dfa
SHA17f89b1a4feef5d0107e436f205d467f528983c51
SHA256a3be23870c850335bf42eeae534a8603aa09d74a483d1bc3e62b1b26594bbaf6
SHA5129dca0b7d9cdf6c17615c5b9b6d537e84990ff68f4726f52d74744c3b70226eb4da68662658f53f33b5c253b142f7421ebe02b830ed95781cef321d0259df96b7
-
Filesize
307KB
MD50a764347eccbe786513ed2609ffb3dfa
SHA17f89b1a4feef5d0107e436f205d467f528983c51
SHA256a3be23870c850335bf42eeae534a8603aa09d74a483d1bc3e62b1b26594bbaf6
SHA5129dca0b7d9cdf6c17615c5b9b6d537e84990ff68f4726f52d74744c3b70226eb4da68662658f53f33b5c253b142f7421ebe02b830ed95781cef321d0259df96b7
-
Filesize
180KB
MD52e51ddc00c1c3da3ae3819afaaaab67b
SHA1be9f420a7ae3bc382334ee03f7358afe11d1e8b2
SHA25624186f98007787fa303af7c15ca7e853a3a1c65f7556a743e3842ed8422563df
SHA5121d7f0585fe8db44749c59da5808622d189e823f224945617a87a4e0d0cf20e1350a3309fcc964bac5962741090cf41cb77101ac876c73abf9137ae42a435ca29
-
Filesize
180KB
MD52e51ddc00c1c3da3ae3819afaaaab67b
SHA1be9f420a7ae3bc382334ee03f7358afe11d1e8b2
SHA25624186f98007787fa303af7c15ca7e853a3a1c65f7556a743e3842ed8422563df
SHA5121d7f0585fe8db44749c59da5808622d189e823f224945617a87a4e0d0cf20e1350a3309fcc964bac5962741090cf41cb77101ac876c73abf9137ae42a435ca29
-
Filesize
168KB
MD50d73e38069094f6a461b2cad08fe8f95
SHA123cad53af4795ddc8875fd619ac96d4d928bd69e
SHA2567d09a017139b8a219591c7755f3cbb7bc03f92af57e0ade11611ffe10058eaa1
SHA512c78c9042d675396d4726c6de32ae6f3868f63f928dc35b1545f23d1187eef7d393b2ff02b4545ca461f5f7edc97497b44f2e6010b3d9ed809f2075d21fdf7f9e
-
Filesize
168KB
MD50d73e38069094f6a461b2cad08fe8f95
SHA123cad53af4795ddc8875fd619ac96d4d928bd69e
SHA2567d09a017139b8a219591c7755f3cbb7bc03f92af57e0ade11611ffe10058eaa1
SHA512c78c9042d675396d4726c6de32ae6f3868f63f928dc35b1545f23d1187eef7d393b2ff02b4545ca461f5f7edc97497b44f2e6010b3d9ed809f2075d21fdf7f9e
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5