Analysis
-
max time kernel
135s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2023, 02:21
Static task
static1
Behavioral task
behavioral1
Sample
6ff429177c5efc11f3689885247d7a949e03bfe7a5cd8c598d339a83b90d745e.exe
Resource
win10v2004-20230221-en
General
-
Target
6ff429177c5efc11f3689885247d7a949e03bfe7a5cd8c598d339a83b90d745e.exe
-
Size
490KB
-
MD5
6610310cc1dfe00f589b6bc886180379
-
SHA1
63c68d7cb247a30b748c0a7d2e61b964e31b7cd4
-
SHA256
6ff429177c5efc11f3689885247d7a949e03bfe7a5cd8c598d339a83b90d745e
-
SHA512
a71aae4caa4ba1ae9951fcac457f33b9bcd5144c805f38a712bee861e2041782f89a1beed03e877496f23c5d7a3f3ecab18efdab38d82a7240e74bcbebb7ca8f
-
SSDEEP
12288:TMr+y90M9crC372sIs/jHJ2ANKTeD3h4ypR:hyVcBajNKrypR
Malware Config
Extracted
redline
lamp
217.196.96.101:4132
-
auth_value
8a3e8bc22f2496c7c5339eb332073902
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o3582326.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o3582326.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o3582326.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o3582326.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o3582326.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o3582326.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation s6276893.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 1764 z6602298.exe 4504 o3582326.exe 1864 r9022050.exe 3056 s6276893.exe 4148 oneetx.exe 1264 oneetx.exe 2644 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1788 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o3582326.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o3582326.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6ff429177c5efc11f3689885247d7a949e03bfe7a5cd8c598d339a83b90d745e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z6602298.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z6602298.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6ff429177c5efc11f3689885247d7a949e03bfe7a5cd8c598d339a83b90d745e.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1848 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4504 o3582326.exe 4504 o3582326.exe 1864 r9022050.exe 1864 r9022050.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4504 o3582326.exe Token: SeDebugPrivilege 1864 r9022050.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3056 s6276893.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2640 wrote to memory of 1764 2640 6ff429177c5efc11f3689885247d7a949e03bfe7a5cd8c598d339a83b90d745e.exe 83 PID 2640 wrote to memory of 1764 2640 6ff429177c5efc11f3689885247d7a949e03bfe7a5cd8c598d339a83b90d745e.exe 83 PID 2640 wrote to memory of 1764 2640 6ff429177c5efc11f3689885247d7a949e03bfe7a5cd8c598d339a83b90d745e.exe 83 PID 1764 wrote to memory of 4504 1764 z6602298.exe 84 PID 1764 wrote to memory of 4504 1764 z6602298.exe 84 PID 1764 wrote to memory of 4504 1764 z6602298.exe 84 PID 1764 wrote to memory of 1864 1764 z6602298.exe 88 PID 1764 wrote to memory of 1864 1764 z6602298.exe 88 PID 1764 wrote to memory of 1864 1764 z6602298.exe 88 PID 2640 wrote to memory of 3056 2640 6ff429177c5efc11f3689885247d7a949e03bfe7a5cd8c598d339a83b90d745e.exe 89 PID 2640 wrote to memory of 3056 2640 6ff429177c5efc11f3689885247d7a949e03bfe7a5cd8c598d339a83b90d745e.exe 89 PID 2640 wrote to memory of 3056 2640 6ff429177c5efc11f3689885247d7a949e03bfe7a5cd8c598d339a83b90d745e.exe 89 PID 3056 wrote to memory of 4148 3056 s6276893.exe 90 PID 3056 wrote to memory of 4148 3056 s6276893.exe 90 PID 3056 wrote to memory of 4148 3056 s6276893.exe 90 PID 4148 wrote to memory of 1848 4148 oneetx.exe 91 PID 4148 wrote to memory of 1848 4148 oneetx.exe 91 PID 4148 wrote to memory of 1848 4148 oneetx.exe 91 PID 4148 wrote to memory of 1788 4148 oneetx.exe 99 PID 4148 wrote to memory of 1788 4148 oneetx.exe 99 PID 4148 wrote to memory of 1788 4148 oneetx.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ff429177c5efc11f3689885247d7a949e03bfe7a5cd8c598d339a83b90d745e.exe"C:\Users\Admin\AppData\Local\Temp\6ff429177c5efc11f3689885247d7a949e03bfe7a5cd8c598d339a83b90d745e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6602298.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6602298.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o3582326.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o3582326.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9022050.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9022050.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1864
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6276893.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6276893.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1848
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1788
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:1264
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:2644
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
231KB
MD50c2e82de923f9df3ad08c5942c0b6d1b
SHA15b988444a085aa360781fa8a57a86faa6fc79c16
SHA256ca95d327b7db51bba44a68af7dee625e78bcd6b020b1d353802052db321a303c
SHA512a14a2d626dd4957870b8e08433577ca6bb7dc3bf75cf55275397b83bce853aa98684d1e1e4ead0315a80618a4fa9777f735cdb9a0e5acaf4fc59d3f6e49ddaad
-
Filesize
231KB
MD50c2e82de923f9df3ad08c5942c0b6d1b
SHA15b988444a085aa360781fa8a57a86faa6fc79c16
SHA256ca95d327b7db51bba44a68af7dee625e78bcd6b020b1d353802052db321a303c
SHA512a14a2d626dd4957870b8e08433577ca6bb7dc3bf75cf55275397b83bce853aa98684d1e1e4ead0315a80618a4fa9777f735cdb9a0e5acaf4fc59d3f6e49ddaad
-
Filesize
231KB
MD50c2e82de923f9df3ad08c5942c0b6d1b
SHA15b988444a085aa360781fa8a57a86faa6fc79c16
SHA256ca95d327b7db51bba44a68af7dee625e78bcd6b020b1d353802052db321a303c
SHA512a14a2d626dd4957870b8e08433577ca6bb7dc3bf75cf55275397b83bce853aa98684d1e1e4ead0315a80618a4fa9777f735cdb9a0e5acaf4fc59d3f6e49ddaad
-
Filesize
231KB
MD50c2e82de923f9df3ad08c5942c0b6d1b
SHA15b988444a085aa360781fa8a57a86faa6fc79c16
SHA256ca95d327b7db51bba44a68af7dee625e78bcd6b020b1d353802052db321a303c
SHA512a14a2d626dd4957870b8e08433577ca6bb7dc3bf75cf55275397b83bce853aa98684d1e1e4ead0315a80618a4fa9777f735cdb9a0e5acaf4fc59d3f6e49ddaad
-
Filesize
231KB
MD50c2e82de923f9df3ad08c5942c0b6d1b
SHA15b988444a085aa360781fa8a57a86faa6fc79c16
SHA256ca95d327b7db51bba44a68af7dee625e78bcd6b020b1d353802052db321a303c
SHA512a14a2d626dd4957870b8e08433577ca6bb7dc3bf75cf55275397b83bce853aa98684d1e1e4ead0315a80618a4fa9777f735cdb9a0e5acaf4fc59d3f6e49ddaad
-
Filesize
231KB
MD50c2e82de923f9df3ad08c5942c0b6d1b
SHA15b988444a085aa360781fa8a57a86faa6fc79c16
SHA256ca95d327b7db51bba44a68af7dee625e78bcd6b020b1d353802052db321a303c
SHA512a14a2d626dd4957870b8e08433577ca6bb7dc3bf75cf55275397b83bce853aa98684d1e1e4ead0315a80618a4fa9777f735cdb9a0e5acaf4fc59d3f6e49ddaad
-
Filesize
231KB
MD50c2e82de923f9df3ad08c5942c0b6d1b
SHA15b988444a085aa360781fa8a57a86faa6fc79c16
SHA256ca95d327b7db51bba44a68af7dee625e78bcd6b020b1d353802052db321a303c
SHA512a14a2d626dd4957870b8e08433577ca6bb7dc3bf75cf55275397b83bce853aa98684d1e1e4ead0315a80618a4fa9777f735cdb9a0e5acaf4fc59d3f6e49ddaad
-
Filesize
307KB
MD52fb947a806e2fd88f9a50284db2cbec3
SHA1fdac6682ab0f0cac45cee3b3fa81b9d4d8697e42
SHA256dafb5b81d2a289293c884ee1d56c3f124fb4a89261f1d5225006a60bd61bf8cc
SHA5125468c1a217479afc4864e47196210111a79a70a2684a54018f6ef070ff5eea0ffad47a95187636e3b9f03703899624e41c6c786e5e41a1dd51c5f2d166419b9e
-
Filesize
307KB
MD52fb947a806e2fd88f9a50284db2cbec3
SHA1fdac6682ab0f0cac45cee3b3fa81b9d4d8697e42
SHA256dafb5b81d2a289293c884ee1d56c3f124fb4a89261f1d5225006a60bd61bf8cc
SHA5125468c1a217479afc4864e47196210111a79a70a2684a54018f6ef070ff5eea0ffad47a95187636e3b9f03703899624e41c6c786e5e41a1dd51c5f2d166419b9e
-
Filesize
180KB
MD5080e5ae6c7744c4c66f21311f8a4f88a
SHA16525b2f7f236f6b5d4be240b36e6c269d199efc8
SHA2564eb957d2896752c10c9706aa79a3ee9f9c9be6ad56a8e891835f37475b3e0f12
SHA512ebf1663ac551ebabfc2113f7f7048706b72102bae28700356986063c95eb047bc6e56473b1473d18c7914f19752d1d60449df9f1cc56eac68764f4ca87f9832c
-
Filesize
180KB
MD5080e5ae6c7744c4c66f21311f8a4f88a
SHA16525b2f7f236f6b5d4be240b36e6c269d199efc8
SHA2564eb957d2896752c10c9706aa79a3ee9f9c9be6ad56a8e891835f37475b3e0f12
SHA512ebf1663ac551ebabfc2113f7f7048706b72102bae28700356986063c95eb047bc6e56473b1473d18c7914f19752d1d60449df9f1cc56eac68764f4ca87f9832c
-
Filesize
168KB
MD549ab12f533be0319b73fb00899f7629a
SHA14407d6ca4086eded88369411bb4079cb643e8037
SHA25660ddd48a414351f6aac19f5e3cb794655edecd531d8670da03972230e19152a7
SHA51293c88f37217d7989da859b179011f2f2d0ededfa973dddd2d415eaebb656bc153d0317c7ca876a058dfcaa35a18c6ec27f8f0967017a35f7cf8e6a030f7e7b1b
-
Filesize
168KB
MD549ab12f533be0319b73fb00899f7629a
SHA14407d6ca4086eded88369411bb4079cb643e8037
SHA25660ddd48a414351f6aac19f5e3cb794655edecd531d8670da03972230e19152a7
SHA51293c88f37217d7989da859b179011f2f2d0ededfa973dddd2d415eaebb656bc153d0317c7ca876a058dfcaa35a18c6ec27f8f0967017a35f7cf8e6a030f7e7b1b
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5