Analysis
-
max time kernel
104s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2023 02:01
Static task
static1
Behavioral task
behavioral1
Sample
256c427df1257cc7c0a47d2e93fbf019f3c091eff8538769eb27f71bd365c5e4.exe
Resource
win10v2004-20230220-en
General
-
Target
256c427df1257cc7c0a47d2e93fbf019f3c091eff8538769eb27f71bd365c5e4.exe
-
Size
478KB
-
MD5
fae815d402524f21497c2079cfdea8b4
-
SHA1
f10af5446e85710d662d6dee04c8584e8fbda480
-
SHA256
256c427df1257cc7c0a47d2e93fbf019f3c091eff8538769eb27f71bd365c5e4
-
SHA512
505ee972c65119ab79fcfa58f6b264c16c688f96d8c92497b1983da8545658bb6c70b23d20207305be3252bd5971da0531cfc20bbe612ae5f301bbbca015ff20
-
SSDEEP
12288:VMrmy90QCC8Fhdf85c1u319TFUIwc/VINBwAtCIv84RVi:/yNTkf8XXTaMtINCAlvq
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k3065699.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k3065699.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k3065699.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k3065699.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k3065699.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k3065699.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation m7701830.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 4720 y9072077.exe 1628 k3065699.exe 4224 l3120853.exe 2168 m7701830.exe 2188 oneetx.exe 1340 oneetx.exe 3260 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3864 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k3065699.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k3065699.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 256c427df1257cc7c0a47d2e93fbf019f3c091eff8538769eb27f71bd365c5e4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y9072077.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y9072077.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 256c427df1257cc7c0a47d2e93fbf019f3c091eff8538769eb27f71bd365c5e4.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4772 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1628 k3065699.exe 1628 k3065699.exe 4224 l3120853.exe 4224 l3120853.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1628 k3065699.exe Token: SeDebugPrivilege 4224 l3120853.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2168 m7701830.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4980 wrote to memory of 4720 4980 256c427df1257cc7c0a47d2e93fbf019f3c091eff8538769eb27f71bd365c5e4.exe 84 PID 4980 wrote to memory of 4720 4980 256c427df1257cc7c0a47d2e93fbf019f3c091eff8538769eb27f71bd365c5e4.exe 84 PID 4980 wrote to memory of 4720 4980 256c427df1257cc7c0a47d2e93fbf019f3c091eff8538769eb27f71bd365c5e4.exe 84 PID 4720 wrote to memory of 1628 4720 y9072077.exe 85 PID 4720 wrote to memory of 1628 4720 y9072077.exe 85 PID 4720 wrote to memory of 1628 4720 y9072077.exe 85 PID 4720 wrote to memory of 4224 4720 y9072077.exe 92 PID 4720 wrote to memory of 4224 4720 y9072077.exe 92 PID 4720 wrote to memory of 4224 4720 y9072077.exe 92 PID 4980 wrote to memory of 2168 4980 256c427df1257cc7c0a47d2e93fbf019f3c091eff8538769eb27f71bd365c5e4.exe 94 PID 4980 wrote to memory of 2168 4980 256c427df1257cc7c0a47d2e93fbf019f3c091eff8538769eb27f71bd365c5e4.exe 94 PID 4980 wrote to memory of 2168 4980 256c427df1257cc7c0a47d2e93fbf019f3c091eff8538769eb27f71bd365c5e4.exe 94 PID 2168 wrote to memory of 2188 2168 m7701830.exe 95 PID 2168 wrote to memory of 2188 2168 m7701830.exe 95 PID 2168 wrote to memory of 2188 2168 m7701830.exe 95 PID 2188 wrote to memory of 4772 2188 oneetx.exe 96 PID 2188 wrote to memory of 4772 2188 oneetx.exe 96 PID 2188 wrote to memory of 4772 2188 oneetx.exe 96 PID 2188 wrote to memory of 4396 2188 oneetx.exe 98 PID 2188 wrote to memory of 4396 2188 oneetx.exe 98 PID 2188 wrote to memory of 4396 2188 oneetx.exe 98 PID 4396 wrote to memory of 5096 4396 cmd.exe 100 PID 4396 wrote to memory of 5096 4396 cmd.exe 100 PID 4396 wrote to memory of 5096 4396 cmd.exe 100 PID 4396 wrote to memory of 1244 4396 cmd.exe 101 PID 4396 wrote to memory of 1244 4396 cmd.exe 101 PID 4396 wrote to memory of 1244 4396 cmd.exe 101 PID 4396 wrote to memory of 1520 4396 cmd.exe 102 PID 4396 wrote to memory of 1520 4396 cmd.exe 102 PID 4396 wrote to memory of 1520 4396 cmd.exe 102 PID 4396 wrote to memory of 3876 4396 cmd.exe 103 PID 4396 wrote to memory of 3876 4396 cmd.exe 103 PID 4396 wrote to memory of 3876 4396 cmd.exe 103 PID 4396 wrote to memory of 4868 4396 cmd.exe 104 PID 4396 wrote to memory of 4868 4396 cmd.exe 104 PID 4396 wrote to memory of 4868 4396 cmd.exe 104 PID 4396 wrote to memory of 1068 4396 cmd.exe 105 PID 4396 wrote to memory of 1068 4396 cmd.exe 105 PID 4396 wrote to memory of 1068 4396 cmd.exe 105 PID 2188 wrote to memory of 3864 2188 oneetx.exe 108 PID 2188 wrote to memory of 3864 2188 oneetx.exe 108 PID 2188 wrote to memory of 3864 2188 oneetx.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\256c427df1257cc7c0a47d2e93fbf019f3c091eff8538769eb27f71bd365c5e4.exe"C:\Users\Admin\AppData\Local\Temp\256c427df1257cc7c0a47d2e93fbf019f3c091eff8538769eb27f71bd365c5e4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9072077.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9072077.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3065699.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3065699.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1628
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l3120853.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l3120853.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4224
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m7701830.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m7701830.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4772
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:5096
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1244
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:1520
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3876
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4868
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:1068
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3864
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1340
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3260
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5b0d1999e0e8a8fafc786d46438868253
SHA132936f73e19ecf7aaa77241b4f0128015caece71
SHA256ccbe010fc3b691d15c008ee148823dca012665a83808b659433ccf0c2417dea5
SHA51215c590f3c0c3b71fe34bfdd15913743dd788836516690be844a24e7bacfd62854dbca9dbdc932f18ec4d55f46ee5933e18117039d01389ee9d8a1b579e001acf
-
Filesize
211KB
MD5b0d1999e0e8a8fafc786d46438868253
SHA132936f73e19ecf7aaa77241b4f0128015caece71
SHA256ccbe010fc3b691d15c008ee148823dca012665a83808b659433ccf0c2417dea5
SHA51215c590f3c0c3b71fe34bfdd15913743dd788836516690be844a24e7bacfd62854dbca9dbdc932f18ec4d55f46ee5933e18117039d01389ee9d8a1b579e001acf
-
Filesize
307KB
MD56a0b57a2a02528cbd1b16035f323f082
SHA100388a430a9adbc5e14a3d52734b20f7853af0e2
SHA256f496187182cdbd8abc0dc07d2d5f5381d9aebe4bcaaabd4a03c04ae4b78835d5
SHA512d308a9ac6e8fa5a9b3bdd25cf61bd228eae2e7ddf73365060850ef72619c9960a149f11ed547b857b4ff10fa518f05a6c91e7221d127b7a73b79cfe972adfae7
-
Filesize
307KB
MD56a0b57a2a02528cbd1b16035f323f082
SHA100388a430a9adbc5e14a3d52734b20f7853af0e2
SHA256f496187182cdbd8abc0dc07d2d5f5381d9aebe4bcaaabd4a03c04ae4b78835d5
SHA512d308a9ac6e8fa5a9b3bdd25cf61bd228eae2e7ddf73365060850ef72619c9960a149f11ed547b857b4ff10fa518f05a6c91e7221d127b7a73b79cfe972adfae7
-
Filesize
180KB
MD58e73d52252478fae5977f163dc72af5c
SHA15d1919397bde3594efbb981ca89cd0042f430a71
SHA2565e159af17d245d1a4b9bf286d95ec4803c5fa99424f075eb6c554a0412570aa7
SHA512031870b2ae64a06deba7c24c81ee9133b5f90980a1c2dd826c9c5c169a381c57e429d8a903663845992202f2558cf23c914d838e7aab4bd6dc8347ddfec4a2d2
-
Filesize
180KB
MD58e73d52252478fae5977f163dc72af5c
SHA15d1919397bde3594efbb981ca89cd0042f430a71
SHA2565e159af17d245d1a4b9bf286d95ec4803c5fa99424f075eb6c554a0412570aa7
SHA512031870b2ae64a06deba7c24c81ee9133b5f90980a1c2dd826c9c5c169a381c57e429d8a903663845992202f2558cf23c914d838e7aab4bd6dc8347ddfec4a2d2
-
Filesize
168KB
MD5c1d73b8c6cca6724abc688bb35a5bff3
SHA167edebfcbda9fbadea0a8a0515f4dc577978849f
SHA25640db70082595fb1b0f1a1874fc91e3eb1741bbea1e34de60992f16c11ac41845
SHA51292d5ad0dc98ffbb0c094a2044ff6fc45fac918600326e9352d5225dc2ad577f5223ff11ac1c7ba1b26b97f96d9b0e81f7bafee7dc4f9cf13c8ede3f9d667b121
-
Filesize
168KB
MD5c1d73b8c6cca6724abc688bb35a5bff3
SHA167edebfcbda9fbadea0a8a0515f4dc577978849f
SHA25640db70082595fb1b0f1a1874fc91e3eb1741bbea1e34de60992f16c11ac41845
SHA51292d5ad0dc98ffbb0c094a2044ff6fc45fac918600326e9352d5225dc2ad577f5223ff11ac1c7ba1b26b97f96d9b0e81f7bafee7dc4f9cf13c8ede3f9d667b121
-
Filesize
211KB
MD5b0d1999e0e8a8fafc786d46438868253
SHA132936f73e19ecf7aaa77241b4f0128015caece71
SHA256ccbe010fc3b691d15c008ee148823dca012665a83808b659433ccf0c2417dea5
SHA51215c590f3c0c3b71fe34bfdd15913743dd788836516690be844a24e7bacfd62854dbca9dbdc932f18ec4d55f46ee5933e18117039d01389ee9d8a1b579e001acf
-
Filesize
211KB
MD5b0d1999e0e8a8fafc786d46438868253
SHA132936f73e19ecf7aaa77241b4f0128015caece71
SHA256ccbe010fc3b691d15c008ee148823dca012665a83808b659433ccf0c2417dea5
SHA51215c590f3c0c3b71fe34bfdd15913743dd788836516690be844a24e7bacfd62854dbca9dbdc932f18ec4d55f46ee5933e18117039d01389ee9d8a1b579e001acf
-
Filesize
211KB
MD5b0d1999e0e8a8fafc786d46438868253
SHA132936f73e19ecf7aaa77241b4f0128015caece71
SHA256ccbe010fc3b691d15c008ee148823dca012665a83808b659433ccf0c2417dea5
SHA51215c590f3c0c3b71fe34bfdd15913743dd788836516690be844a24e7bacfd62854dbca9dbdc932f18ec4d55f46ee5933e18117039d01389ee9d8a1b579e001acf
-
Filesize
211KB
MD5b0d1999e0e8a8fafc786d46438868253
SHA132936f73e19ecf7aaa77241b4f0128015caece71
SHA256ccbe010fc3b691d15c008ee148823dca012665a83808b659433ccf0c2417dea5
SHA51215c590f3c0c3b71fe34bfdd15913743dd788836516690be844a24e7bacfd62854dbca9dbdc932f18ec4d55f46ee5933e18117039d01389ee9d8a1b579e001acf
-
Filesize
211KB
MD5b0d1999e0e8a8fafc786d46438868253
SHA132936f73e19ecf7aaa77241b4f0128015caece71
SHA256ccbe010fc3b691d15c008ee148823dca012665a83808b659433ccf0c2417dea5
SHA51215c590f3c0c3b71fe34bfdd15913743dd788836516690be844a24e7bacfd62854dbca9dbdc932f18ec4d55f46ee5933e18117039d01389ee9d8a1b579e001acf
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5