Analysis
-
max time kernel
97s -
max time network
144s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
09/05/2023, 02:38
Static task
static1
Behavioral task
behavioral1
Sample
42a74cef669bb3702b036b75b481d414c00021342a46dfa860e760216c219d51.exe
Resource
win10-20230220-en
General
-
Target
42a74cef669bb3702b036b75b481d414c00021342a46dfa860e760216c219d51.exe
-
Size
479KB
-
MD5
b536d92ba33757935e9aaef8ca8a8d6e
-
SHA1
bd53d1fd8f1dfb32763650ac15d3f022da70fbec
-
SHA256
42a74cef669bb3702b036b75b481d414c00021342a46dfa860e760216c219d51
-
SHA512
87d6612f569bca188cfe740349291fe949b174f38a5fe80afa7104ae1adb33259d0cd2fa87518c4fdb1758de3317c612911612b0f7b63aca4a5e80a9a4de0a66
-
SSDEEP
12288:kMriy90gTyjqfrUj8Z2pjCWwC1v7tRCn6gXS+:+yTTqqDGpeYbCn6gv
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k2707600.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k2707600.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k2707600.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k2707600.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k2707600.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 1160 y8312866.exe 1340 k2707600.exe 2328 l0074087.exe 3540 m1549320.exe 3752 oneetx.exe 4836 oneetx.exe 3360 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4804 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k2707600.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k2707600.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 42a74cef669bb3702b036b75b481d414c00021342a46dfa860e760216c219d51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 42a74cef669bb3702b036b75b481d414c00021342a46dfa860e760216c219d51.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y8312866.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y8312866.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4904 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1340 k2707600.exe 1340 k2707600.exe 2328 l0074087.exe 2328 l0074087.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1340 k2707600.exe Token: SeDebugPrivilege 2328 l0074087.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3540 m1549320.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 708 wrote to memory of 1160 708 42a74cef669bb3702b036b75b481d414c00021342a46dfa860e760216c219d51.exe 66 PID 708 wrote to memory of 1160 708 42a74cef669bb3702b036b75b481d414c00021342a46dfa860e760216c219d51.exe 66 PID 708 wrote to memory of 1160 708 42a74cef669bb3702b036b75b481d414c00021342a46dfa860e760216c219d51.exe 66 PID 1160 wrote to memory of 1340 1160 y8312866.exe 67 PID 1160 wrote to memory of 1340 1160 y8312866.exe 67 PID 1160 wrote to memory of 1340 1160 y8312866.exe 67 PID 1160 wrote to memory of 2328 1160 y8312866.exe 68 PID 1160 wrote to memory of 2328 1160 y8312866.exe 68 PID 1160 wrote to memory of 2328 1160 y8312866.exe 68 PID 708 wrote to memory of 3540 708 42a74cef669bb3702b036b75b481d414c00021342a46dfa860e760216c219d51.exe 70 PID 708 wrote to memory of 3540 708 42a74cef669bb3702b036b75b481d414c00021342a46dfa860e760216c219d51.exe 70 PID 708 wrote to memory of 3540 708 42a74cef669bb3702b036b75b481d414c00021342a46dfa860e760216c219d51.exe 70 PID 3540 wrote to memory of 3752 3540 m1549320.exe 71 PID 3540 wrote to memory of 3752 3540 m1549320.exe 71 PID 3540 wrote to memory of 3752 3540 m1549320.exe 71 PID 3752 wrote to memory of 4904 3752 oneetx.exe 72 PID 3752 wrote to memory of 4904 3752 oneetx.exe 72 PID 3752 wrote to memory of 4904 3752 oneetx.exe 72 PID 3752 wrote to memory of 3064 3752 oneetx.exe 74 PID 3752 wrote to memory of 3064 3752 oneetx.exe 74 PID 3752 wrote to memory of 3064 3752 oneetx.exe 74 PID 3064 wrote to memory of 4756 3064 cmd.exe 76 PID 3064 wrote to memory of 4756 3064 cmd.exe 76 PID 3064 wrote to memory of 4756 3064 cmd.exe 76 PID 3064 wrote to memory of 4732 3064 cmd.exe 77 PID 3064 wrote to memory of 4732 3064 cmd.exe 77 PID 3064 wrote to memory of 4732 3064 cmd.exe 77 PID 3064 wrote to memory of 524 3064 cmd.exe 78 PID 3064 wrote to memory of 524 3064 cmd.exe 78 PID 3064 wrote to memory of 524 3064 cmd.exe 78 PID 3064 wrote to memory of 3936 3064 cmd.exe 79 PID 3064 wrote to memory of 3936 3064 cmd.exe 79 PID 3064 wrote to memory of 3936 3064 cmd.exe 79 PID 3064 wrote to memory of 4020 3064 cmd.exe 80 PID 3064 wrote to memory of 4020 3064 cmd.exe 80 PID 3064 wrote to memory of 4020 3064 cmd.exe 80 PID 3064 wrote to memory of 752 3064 cmd.exe 81 PID 3064 wrote to memory of 752 3064 cmd.exe 81 PID 3064 wrote to memory of 752 3064 cmd.exe 81 PID 3752 wrote to memory of 4804 3752 oneetx.exe 83 PID 3752 wrote to memory of 4804 3752 oneetx.exe 83 PID 3752 wrote to memory of 4804 3752 oneetx.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\42a74cef669bb3702b036b75b481d414c00021342a46dfa860e760216c219d51.exe"C:\Users\Admin\AppData\Local\Temp\42a74cef669bb3702b036b75b481d414c00021342a46dfa860e760216c219d51.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8312866.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8312866.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2707600.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2707600.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1340
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l0074087.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l0074087.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m1549320.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m1549320.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4904
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4756
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4732
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:524
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3936
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4020
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:752
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4804
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4836
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3360
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD536b47524cfe911beb990383eabeeae83
SHA12dd37df9e1578496c24b88bafde0dbbfb52f2046
SHA2566876004eb6a7f782d3cc301439ec86ba52b1687945436d44393a422b3aae91df
SHA5129507a0b44660b9aaea8e9721b25d81a85f2bf5799543b4389424d85d56c8146f46e2e46a84d5f0baa79cdea300051a09bf3515d893780a46ef01ff61a1ea24b1
-
Filesize
211KB
MD536b47524cfe911beb990383eabeeae83
SHA12dd37df9e1578496c24b88bafde0dbbfb52f2046
SHA2566876004eb6a7f782d3cc301439ec86ba52b1687945436d44393a422b3aae91df
SHA5129507a0b44660b9aaea8e9721b25d81a85f2bf5799543b4389424d85d56c8146f46e2e46a84d5f0baa79cdea300051a09bf3515d893780a46ef01ff61a1ea24b1
-
Filesize
307KB
MD5a53a17baaaf182f34555b654dede28b9
SHA16c2bf1f15c270a945858db8fe5984e38a25529dd
SHA25624d85b871cec31613ac7c0c940beb468510efdb37eed580a27563859e7b90a63
SHA512209e6740a4e3e4e6ba31fdc6c3b6a90e6944e54e6c951bb8806a288baf920e4c3f08aff31efc2e513bea123e3e67711490fb4dd8a2224dadd33f234640778034
-
Filesize
307KB
MD5a53a17baaaf182f34555b654dede28b9
SHA16c2bf1f15c270a945858db8fe5984e38a25529dd
SHA25624d85b871cec31613ac7c0c940beb468510efdb37eed580a27563859e7b90a63
SHA512209e6740a4e3e4e6ba31fdc6c3b6a90e6944e54e6c951bb8806a288baf920e4c3f08aff31efc2e513bea123e3e67711490fb4dd8a2224dadd33f234640778034
-
Filesize
180KB
MD53713fedd18b675cf16c0c2fd2f6b6a18
SHA14b8b5809f2d5922c974b3835c8c9d80d79631e79
SHA2564039e284765815f8b0e97f5a90defb0e5aaf751ef2dad92da07baa8462f214d3
SHA5121a8d75d050332b108785c28ed10ca0d37fc0c32941f66e455c4bddf957ca31c0a381c82d9f4a28cadf7d0656e2d7197c100111727be32c11c4f84e7db4065f07
-
Filesize
180KB
MD53713fedd18b675cf16c0c2fd2f6b6a18
SHA14b8b5809f2d5922c974b3835c8c9d80d79631e79
SHA2564039e284765815f8b0e97f5a90defb0e5aaf751ef2dad92da07baa8462f214d3
SHA5121a8d75d050332b108785c28ed10ca0d37fc0c32941f66e455c4bddf957ca31c0a381c82d9f4a28cadf7d0656e2d7197c100111727be32c11c4f84e7db4065f07
-
Filesize
168KB
MD5a8f3d899db9f6b8a68ca28ba22b2a906
SHA1a2e52929c02c0a998234c2c91067584494ece402
SHA256a515f5930417044dabaca739f688aa7b76f5495465000e4a8f639f15787c929a
SHA512eadb35f5a4ca3b143058f0412f9167c89b9e12cb51575857876000d824b931193220a9b813d9581c7586935a04634af3e70640f503a6c206017b085aa433a36f
-
Filesize
168KB
MD5a8f3d899db9f6b8a68ca28ba22b2a906
SHA1a2e52929c02c0a998234c2c91067584494ece402
SHA256a515f5930417044dabaca739f688aa7b76f5495465000e4a8f639f15787c929a
SHA512eadb35f5a4ca3b143058f0412f9167c89b9e12cb51575857876000d824b931193220a9b813d9581c7586935a04634af3e70640f503a6c206017b085aa433a36f
-
Filesize
211KB
MD536b47524cfe911beb990383eabeeae83
SHA12dd37df9e1578496c24b88bafde0dbbfb52f2046
SHA2566876004eb6a7f782d3cc301439ec86ba52b1687945436d44393a422b3aae91df
SHA5129507a0b44660b9aaea8e9721b25d81a85f2bf5799543b4389424d85d56c8146f46e2e46a84d5f0baa79cdea300051a09bf3515d893780a46ef01ff61a1ea24b1
-
Filesize
211KB
MD536b47524cfe911beb990383eabeeae83
SHA12dd37df9e1578496c24b88bafde0dbbfb52f2046
SHA2566876004eb6a7f782d3cc301439ec86ba52b1687945436d44393a422b3aae91df
SHA5129507a0b44660b9aaea8e9721b25d81a85f2bf5799543b4389424d85d56c8146f46e2e46a84d5f0baa79cdea300051a09bf3515d893780a46ef01ff61a1ea24b1
-
Filesize
211KB
MD536b47524cfe911beb990383eabeeae83
SHA12dd37df9e1578496c24b88bafde0dbbfb52f2046
SHA2566876004eb6a7f782d3cc301439ec86ba52b1687945436d44393a422b3aae91df
SHA5129507a0b44660b9aaea8e9721b25d81a85f2bf5799543b4389424d85d56c8146f46e2e46a84d5f0baa79cdea300051a09bf3515d893780a46ef01ff61a1ea24b1
-
Filesize
211KB
MD536b47524cfe911beb990383eabeeae83
SHA12dd37df9e1578496c24b88bafde0dbbfb52f2046
SHA2566876004eb6a7f782d3cc301439ec86ba52b1687945436d44393a422b3aae91df
SHA5129507a0b44660b9aaea8e9721b25d81a85f2bf5799543b4389424d85d56c8146f46e2e46a84d5f0baa79cdea300051a09bf3515d893780a46ef01ff61a1ea24b1
-
Filesize
211KB
MD536b47524cfe911beb990383eabeeae83
SHA12dd37df9e1578496c24b88bafde0dbbfb52f2046
SHA2566876004eb6a7f782d3cc301439ec86ba52b1687945436d44393a422b3aae91df
SHA5129507a0b44660b9aaea8e9721b25d81a85f2bf5799543b4389424d85d56c8146f46e2e46a84d5f0baa79cdea300051a09bf3515d893780a46ef01ff61a1ea24b1
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53