Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2023 01:54
Static task
static1
Behavioral task
behavioral1
Sample
e24e4983aed07aec59d081f0160d7a408a7c2f0d569d31d43ec2908036c247d8.exe
Resource
win10v2004-20230220-en
General
-
Target
e24e4983aed07aec59d081f0160d7a408a7c2f0d569d31d43ec2908036c247d8.exe
-
Size
478KB
-
MD5
68b47d00f5d16478518ca495b12bc4f6
-
SHA1
7f241f98ef58ff962a186ed032ce395a61449e1c
-
SHA256
e24e4983aed07aec59d081f0160d7a408a7c2f0d569d31d43ec2908036c247d8
-
SHA512
9ee6b65ca0f42ae133b09b04c8f4143f97c06d49e91c5f0478ab44693e2df5ed6bab21408f8328ed33103cfb99322e724e75f59d8cc4d00aa157813152ad5c67
-
SSDEEP
12288:+Mrdy90WJ60wY82AtwdFmheBgyCf3CnqkOSzreK:XynCP25Mwbg3oqkOaeK
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k2247921.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k2247921.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k2247921.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k2247921.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k2247921.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k2247921.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation m2433061.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 3192 y1930452.exe 3944 k2247921.exe 2116 l3681930.exe 3560 m2433061.exe 1672 oneetx.exe 4648 oneetx.exe 1952 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2788 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k2247921.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k2247921.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y1930452.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e24e4983aed07aec59d081f0160d7a408a7c2f0d569d31d43ec2908036c247d8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e24e4983aed07aec59d081f0160d7a408a7c2f0d569d31d43ec2908036c247d8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y1930452.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2604 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3944 k2247921.exe 3944 k2247921.exe 2116 l3681930.exe 2116 l3681930.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3944 k2247921.exe Token: SeDebugPrivilege 2116 l3681930.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3560 m2433061.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2640 wrote to memory of 3192 2640 e24e4983aed07aec59d081f0160d7a408a7c2f0d569d31d43ec2908036c247d8.exe 86 PID 2640 wrote to memory of 3192 2640 e24e4983aed07aec59d081f0160d7a408a7c2f0d569d31d43ec2908036c247d8.exe 86 PID 2640 wrote to memory of 3192 2640 e24e4983aed07aec59d081f0160d7a408a7c2f0d569d31d43ec2908036c247d8.exe 86 PID 3192 wrote to memory of 3944 3192 y1930452.exe 87 PID 3192 wrote to memory of 3944 3192 y1930452.exe 87 PID 3192 wrote to memory of 3944 3192 y1930452.exe 87 PID 3192 wrote to memory of 2116 3192 y1930452.exe 92 PID 3192 wrote to memory of 2116 3192 y1930452.exe 92 PID 3192 wrote to memory of 2116 3192 y1930452.exe 92 PID 2640 wrote to memory of 3560 2640 e24e4983aed07aec59d081f0160d7a408a7c2f0d569d31d43ec2908036c247d8.exe 96 PID 2640 wrote to memory of 3560 2640 e24e4983aed07aec59d081f0160d7a408a7c2f0d569d31d43ec2908036c247d8.exe 96 PID 2640 wrote to memory of 3560 2640 e24e4983aed07aec59d081f0160d7a408a7c2f0d569d31d43ec2908036c247d8.exe 96 PID 3560 wrote to memory of 1672 3560 m2433061.exe 97 PID 3560 wrote to memory of 1672 3560 m2433061.exe 97 PID 3560 wrote to memory of 1672 3560 m2433061.exe 97 PID 1672 wrote to memory of 2604 1672 oneetx.exe 98 PID 1672 wrote to memory of 2604 1672 oneetx.exe 98 PID 1672 wrote to memory of 2604 1672 oneetx.exe 98 PID 1672 wrote to memory of 756 1672 oneetx.exe 100 PID 1672 wrote to memory of 756 1672 oneetx.exe 100 PID 1672 wrote to memory of 756 1672 oneetx.exe 100 PID 756 wrote to memory of 4780 756 cmd.exe 102 PID 756 wrote to memory of 4780 756 cmd.exe 102 PID 756 wrote to memory of 4780 756 cmd.exe 102 PID 756 wrote to memory of 2948 756 cmd.exe 103 PID 756 wrote to memory of 2948 756 cmd.exe 103 PID 756 wrote to memory of 2948 756 cmd.exe 103 PID 756 wrote to memory of 5040 756 cmd.exe 104 PID 756 wrote to memory of 5040 756 cmd.exe 104 PID 756 wrote to memory of 5040 756 cmd.exe 104 PID 756 wrote to memory of 3924 756 cmd.exe 105 PID 756 wrote to memory of 3924 756 cmd.exe 105 PID 756 wrote to memory of 3924 756 cmd.exe 105 PID 756 wrote to memory of 4388 756 cmd.exe 106 PID 756 wrote to memory of 4388 756 cmd.exe 106 PID 756 wrote to memory of 4388 756 cmd.exe 106 PID 756 wrote to memory of 1540 756 cmd.exe 107 PID 756 wrote to memory of 1540 756 cmd.exe 107 PID 756 wrote to memory of 1540 756 cmd.exe 107 PID 1672 wrote to memory of 2788 1672 oneetx.exe 110 PID 1672 wrote to memory of 2788 1672 oneetx.exe 110 PID 1672 wrote to memory of 2788 1672 oneetx.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\e24e4983aed07aec59d081f0160d7a408a7c2f0d569d31d43ec2908036c247d8.exe"C:\Users\Admin\AppData\Local\Temp\e24e4983aed07aec59d081f0160d7a408a7c2f0d569d31d43ec2908036c247d8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1930452.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1930452.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2247921.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2247921.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3944
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l3681930.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l3681930.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m2433061.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m2433061.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:2604
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4780
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:2948
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:5040
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3924
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4388
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:1540
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2788
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4648
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1952
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD508f7343c39dc76f78350e9d841a796a8
SHA1407abc51262ae0979005f7dc25def3d7505902be
SHA256cc829b1a57c56a8da36d0474abe47f3a3018051a1e283cc1120fba873ca1ef3e
SHA512f8d3b589f0c51580b4a52a09c679e66cb94049b2fdf2c00df97cf7fa461e711f5d2b14ccbd19836cd8bc2662201cae29426b63fe02e1ffaae4dd4557ac217799
-
Filesize
211KB
MD508f7343c39dc76f78350e9d841a796a8
SHA1407abc51262ae0979005f7dc25def3d7505902be
SHA256cc829b1a57c56a8da36d0474abe47f3a3018051a1e283cc1120fba873ca1ef3e
SHA512f8d3b589f0c51580b4a52a09c679e66cb94049b2fdf2c00df97cf7fa461e711f5d2b14ccbd19836cd8bc2662201cae29426b63fe02e1ffaae4dd4557ac217799
-
Filesize
307KB
MD5cbd9e870eba6e185681bc6b6c94661c2
SHA11fec3d27225797d1888f20aed93e62a605db9b02
SHA25607862363eef86d62c1772ecb7f2e7d085ab7c7afc87473dbd9c397d2e7c25cf5
SHA51275731019f8d1eb10b99fb16afb472a8c8379b698937a8281c111302641fd9a917c769441af301a1a0a8dd68395a0a59a7ca367386f201f2345976bf5522edcd1
-
Filesize
307KB
MD5cbd9e870eba6e185681bc6b6c94661c2
SHA11fec3d27225797d1888f20aed93e62a605db9b02
SHA25607862363eef86d62c1772ecb7f2e7d085ab7c7afc87473dbd9c397d2e7c25cf5
SHA51275731019f8d1eb10b99fb16afb472a8c8379b698937a8281c111302641fd9a917c769441af301a1a0a8dd68395a0a59a7ca367386f201f2345976bf5522edcd1
-
Filesize
180KB
MD5794546aa380d1e1cc3772fca6defdd81
SHA1de15ad3a0276739ecdee72fee123b3f91ae1f399
SHA256fd2eab1a5369970a076dd72649693962d94b5bff8a6de6d2bd921e4c60d36b40
SHA5124c8379f57f374fdb44f625e746eee2fe494b15985505c47367f0d9a642b5d6db594799af63e80540b3b6ee88647ad7e40812fbcbc6c975695fce78aab0b85a46
-
Filesize
180KB
MD5794546aa380d1e1cc3772fca6defdd81
SHA1de15ad3a0276739ecdee72fee123b3f91ae1f399
SHA256fd2eab1a5369970a076dd72649693962d94b5bff8a6de6d2bd921e4c60d36b40
SHA5124c8379f57f374fdb44f625e746eee2fe494b15985505c47367f0d9a642b5d6db594799af63e80540b3b6ee88647ad7e40812fbcbc6c975695fce78aab0b85a46
-
Filesize
168KB
MD5a7ba9021a66f69fa2c6bb42790796e7b
SHA1e9a21fb20711a25e8086eaf5340a2a7da8cd5e03
SHA256523dac2e3155575d008845051d14af13bde6a8c5bcbad2b9e38d27483a76b457
SHA512b8866dec2f57f49b33c489b0c25c775f410168f2e6bb421f0636d58dcc4af1f07e454bc2440415dee7e9e12952c577733e4a44eb7ce3b858fb61149af3fe6ec7
-
Filesize
168KB
MD5a7ba9021a66f69fa2c6bb42790796e7b
SHA1e9a21fb20711a25e8086eaf5340a2a7da8cd5e03
SHA256523dac2e3155575d008845051d14af13bde6a8c5bcbad2b9e38d27483a76b457
SHA512b8866dec2f57f49b33c489b0c25c775f410168f2e6bb421f0636d58dcc4af1f07e454bc2440415dee7e9e12952c577733e4a44eb7ce3b858fb61149af3fe6ec7
-
Filesize
211KB
MD508f7343c39dc76f78350e9d841a796a8
SHA1407abc51262ae0979005f7dc25def3d7505902be
SHA256cc829b1a57c56a8da36d0474abe47f3a3018051a1e283cc1120fba873ca1ef3e
SHA512f8d3b589f0c51580b4a52a09c679e66cb94049b2fdf2c00df97cf7fa461e711f5d2b14ccbd19836cd8bc2662201cae29426b63fe02e1ffaae4dd4557ac217799
-
Filesize
211KB
MD508f7343c39dc76f78350e9d841a796a8
SHA1407abc51262ae0979005f7dc25def3d7505902be
SHA256cc829b1a57c56a8da36d0474abe47f3a3018051a1e283cc1120fba873ca1ef3e
SHA512f8d3b589f0c51580b4a52a09c679e66cb94049b2fdf2c00df97cf7fa461e711f5d2b14ccbd19836cd8bc2662201cae29426b63fe02e1ffaae4dd4557ac217799
-
Filesize
211KB
MD508f7343c39dc76f78350e9d841a796a8
SHA1407abc51262ae0979005f7dc25def3d7505902be
SHA256cc829b1a57c56a8da36d0474abe47f3a3018051a1e283cc1120fba873ca1ef3e
SHA512f8d3b589f0c51580b4a52a09c679e66cb94049b2fdf2c00df97cf7fa461e711f5d2b14ccbd19836cd8bc2662201cae29426b63fe02e1ffaae4dd4557ac217799
-
Filesize
211KB
MD508f7343c39dc76f78350e9d841a796a8
SHA1407abc51262ae0979005f7dc25def3d7505902be
SHA256cc829b1a57c56a8da36d0474abe47f3a3018051a1e283cc1120fba873ca1ef3e
SHA512f8d3b589f0c51580b4a52a09c679e66cb94049b2fdf2c00df97cf7fa461e711f5d2b14ccbd19836cd8bc2662201cae29426b63fe02e1ffaae4dd4557ac217799
-
Filesize
211KB
MD508f7343c39dc76f78350e9d841a796a8
SHA1407abc51262ae0979005f7dc25def3d7505902be
SHA256cc829b1a57c56a8da36d0474abe47f3a3018051a1e283cc1120fba873ca1ef3e
SHA512f8d3b589f0c51580b4a52a09c679e66cb94049b2fdf2c00df97cf7fa461e711f5d2b14ccbd19836cd8bc2662201cae29426b63fe02e1ffaae4dd4557ac217799
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5