Analysis
-
max time kernel
119s -
max time network
145s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
09/05/2023, 04:57
Static task
static1
Behavioral task
behavioral1
Sample
84136092d15fce810e01cf5607a152a44eac49ebd0df1f3d754fac67fcb20551.exe
Resource
win10-20230220-en
General
-
Target
84136092d15fce810e01cf5607a152a44eac49ebd0df1f3d754fac67fcb20551.exe
-
Size
480KB
-
MD5
5f2a73bf000134f15915178e10c479d0
-
SHA1
f90f987c7924cd9fc8c94a1f6c6cb779ff263e71
-
SHA256
84136092d15fce810e01cf5607a152a44eac49ebd0df1f3d754fac67fcb20551
-
SHA512
3cb322898e5e2ed3b926517cce92f9bb3a6b8b646a39c8aea33ac11e823a94adc89265644741c6459c846e16778f0b70df2e73ef2388130976c3db00d108408e
-
SSDEEP
12288:TMrzy90A9WeP/yq27G58u5JG0qnWcSMQ:4yD9BXybg8UYn7SMQ
Malware Config
Extracted
redline
mihan
217.196.96.101:4132
-
auth_value
9a6a8fdae02ed7caa0a49a6ddc6d4520
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a1016669.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a1016669.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a1016669.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a1016669.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a1016669.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2500 v7033303.exe 2984 a1016669.exe 3540 b6841110.exe 3596 d7476705.exe 4788 oneetx.exe 4680 oneetx.exe 4396 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4356 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a1016669.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a1016669.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 84136092d15fce810e01cf5607a152a44eac49ebd0df1f3d754fac67fcb20551.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 84136092d15fce810e01cf5607a152a44eac49ebd0df1f3d754fac67fcb20551.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7033303.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7033303.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4896 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2984 a1016669.exe 2984 a1016669.exe 3540 b6841110.exe 3540 b6841110.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2984 a1016669.exe Token: SeDebugPrivilege 3540 b6841110.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3596 d7476705.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2500 2468 84136092d15fce810e01cf5607a152a44eac49ebd0df1f3d754fac67fcb20551.exe 66 PID 2468 wrote to memory of 2500 2468 84136092d15fce810e01cf5607a152a44eac49ebd0df1f3d754fac67fcb20551.exe 66 PID 2468 wrote to memory of 2500 2468 84136092d15fce810e01cf5607a152a44eac49ebd0df1f3d754fac67fcb20551.exe 66 PID 2500 wrote to memory of 2984 2500 v7033303.exe 67 PID 2500 wrote to memory of 2984 2500 v7033303.exe 67 PID 2500 wrote to memory of 2984 2500 v7033303.exe 67 PID 2500 wrote to memory of 3540 2500 v7033303.exe 68 PID 2500 wrote to memory of 3540 2500 v7033303.exe 68 PID 2500 wrote to memory of 3540 2500 v7033303.exe 68 PID 2468 wrote to memory of 3596 2468 84136092d15fce810e01cf5607a152a44eac49ebd0df1f3d754fac67fcb20551.exe 70 PID 2468 wrote to memory of 3596 2468 84136092d15fce810e01cf5607a152a44eac49ebd0df1f3d754fac67fcb20551.exe 70 PID 2468 wrote to memory of 3596 2468 84136092d15fce810e01cf5607a152a44eac49ebd0df1f3d754fac67fcb20551.exe 70 PID 3596 wrote to memory of 4788 3596 d7476705.exe 71 PID 3596 wrote to memory of 4788 3596 d7476705.exe 71 PID 3596 wrote to memory of 4788 3596 d7476705.exe 71 PID 4788 wrote to memory of 4896 4788 oneetx.exe 72 PID 4788 wrote to memory of 4896 4788 oneetx.exe 72 PID 4788 wrote to memory of 4896 4788 oneetx.exe 72 PID 4788 wrote to memory of 3852 4788 oneetx.exe 74 PID 4788 wrote to memory of 3852 4788 oneetx.exe 74 PID 4788 wrote to memory of 3852 4788 oneetx.exe 74 PID 3852 wrote to memory of 2992 3852 cmd.exe 76 PID 3852 wrote to memory of 2992 3852 cmd.exe 76 PID 3852 wrote to memory of 2992 3852 cmd.exe 76 PID 3852 wrote to memory of 424 3852 cmd.exe 77 PID 3852 wrote to memory of 424 3852 cmd.exe 77 PID 3852 wrote to memory of 424 3852 cmd.exe 77 PID 3852 wrote to memory of 516 3852 cmd.exe 78 PID 3852 wrote to memory of 516 3852 cmd.exe 78 PID 3852 wrote to memory of 516 3852 cmd.exe 78 PID 3852 wrote to memory of 1740 3852 cmd.exe 79 PID 3852 wrote to memory of 1740 3852 cmd.exe 79 PID 3852 wrote to memory of 1740 3852 cmd.exe 79 PID 3852 wrote to memory of 4496 3852 cmd.exe 80 PID 3852 wrote to memory of 4496 3852 cmd.exe 80 PID 3852 wrote to memory of 4496 3852 cmd.exe 80 PID 3852 wrote to memory of 748 3852 cmd.exe 81 PID 3852 wrote to memory of 748 3852 cmd.exe 81 PID 3852 wrote to memory of 748 3852 cmd.exe 81 PID 4788 wrote to memory of 4356 4788 oneetx.exe 83 PID 4788 wrote to memory of 4356 4788 oneetx.exe 83 PID 4788 wrote to memory of 4356 4788 oneetx.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\84136092d15fce810e01cf5607a152a44eac49ebd0df1f3d754fac67fcb20551.exe"C:\Users\Admin\AppData\Local\Temp\84136092d15fce810e01cf5607a152a44eac49ebd0df1f3d754fac67fcb20551.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7033303.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7033303.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a1016669.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a1016669.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2984
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6841110.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b6841110.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3540
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7476705.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7476705.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4896
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2992
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:424
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:516
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1740
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4496
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:748
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4356
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4680
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4396
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5c67b5620840e275b396e24056e3880f3
SHA1f1f225f89eed4e7809de502bc8b7d32bcd84a724
SHA256f8a65cd14a60ddc216fbe642499b1bfe9c0321764882db20c253f45e13ff5020
SHA512fbc344391ca1866ab9135346ee1b3728762148735f55ab28fc98f33d9f3ddb855f672a1147d0fc1b98e29b1b737d2f4233af07e8d9bc99e00ba63b05caec3f1a
-
Filesize
211KB
MD5c67b5620840e275b396e24056e3880f3
SHA1f1f225f89eed4e7809de502bc8b7d32bcd84a724
SHA256f8a65cd14a60ddc216fbe642499b1bfe9c0321764882db20c253f45e13ff5020
SHA512fbc344391ca1866ab9135346ee1b3728762148735f55ab28fc98f33d9f3ddb855f672a1147d0fc1b98e29b1b737d2f4233af07e8d9bc99e00ba63b05caec3f1a
-
Filesize
309KB
MD52612e2fd234c6613d9f3cad2355b68a6
SHA16035c2b07fea2f53a38faf1946fce5191bf6ed94
SHA2560d53406cfa6b2f8f59ad00333300db24e491343faac675c22b474c457244ef7c
SHA512bb58d61b7dd7a785b5c7037373c24d41203fcaad6a511601ebd8bb036fa9867b9fb9506ebe728a4bd6e6c8daeef3c8e3872fc04074d479754bb18b2572da1834
-
Filesize
309KB
MD52612e2fd234c6613d9f3cad2355b68a6
SHA16035c2b07fea2f53a38faf1946fce5191bf6ed94
SHA2560d53406cfa6b2f8f59ad00333300db24e491343faac675c22b474c457244ef7c
SHA512bb58d61b7dd7a785b5c7037373c24d41203fcaad6a511601ebd8bb036fa9867b9fb9506ebe728a4bd6e6c8daeef3c8e3872fc04074d479754bb18b2572da1834
-
Filesize
180KB
MD53b1a3732f8999c434f4aef4a3e5b30b7
SHA1c6c27656266b4a0f16b47fffd051e7065e1a294c
SHA256c4d9fc24009dd3be2bb2e74a089eb3044618d397bb103c728b0f3eeb4515627d
SHA512092cac0375a91f6672e5178bfa7d4ccd00e9ec5dd15262ccf6fc60b4afb6d1ce0e2f18c58c48f0f2825cebf97232243b7d49807b0cfa93b0072d328c96a4f517
-
Filesize
180KB
MD53b1a3732f8999c434f4aef4a3e5b30b7
SHA1c6c27656266b4a0f16b47fffd051e7065e1a294c
SHA256c4d9fc24009dd3be2bb2e74a089eb3044618d397bb103c728b0f3eeb4515627d
SHA512092cac0375a91f6672e5178bfa7d4ccd00e9ec5dd15262ccf6fc60b4afb6d1ce0e2f18c58c48f0f2825cebf97232243b7d49807b0cfa93b0072d328c96a4f517
-
Filesize
168KB
MD5d86ada23fee55ed0133099794894e8be
SHA1af71b6aadbf4f33b2aa25901a8c3e5a93e70cae0
SHA2566e34ea7bbb1bbf66eb6c7a3c0ad9c0e928266c215a575ef3a6ecb1d3db5e3da5
SHA512eb03e5c8226192d39adf17db59f241bf5047c544acb4f05d748a1dc0715670cfc3136be60b7328c8935758cbc4eb1f7803e8d608b9c88a3f188d482d2679b078
-
Filesize
168KB
MD5d86ada23fee55ed0133099794894e8be
SHA1af71b6aadbf4f33b2aa25901a8c3e5a93e70cae0
SHA2566e34ea7bbb1bbf66eb6c7a3c0ad9c0e928266c215a575ef3a6ecb1d3db5e3da5
SHA512eb03e5c8226192d39adf17db59f241bf5047c544acb4f05d748a1dc0715670cfc3136be60b7328c8935758cbc4eb1f7803e8d608b9c88a3f188d482d2679b078
-
Filesize
211KB
MD5c67b5620840e275b396e24056e3880f3
SHA1f1f225f89eed4e7809de502bc8b7d32bcd84a724
SHA256f8a65cd14a60ddc216fbe642499b1bfe9c0321764882db20c253f45e13ff5020
SHA512fbc344391ca1866ab9135346ee1b3728762148735f55ab28fc98f33d9f3ddb855f672a1147d0fc1b98e29b1b737d2f4233af07e8d9bc99e00ba63b05caec3f1a
-
Filesize
211KB
MD5c67b5620840e275b396e24056e3880f3
SHA1f1f225f89eed4e7809de502bc8b7d32bcd84a724
SHA256f8a65cd14a60ddc216fbe642499b1bfe9c0321764882db20c253f45e13ff5020
SHA512fbc344391ca1866ab9135346ee1b3728762148735f55ab28fc98f33d9f3ddb855f672a1147d0fc1b98e29b1b737d2f4233af07e8d9bc99e00ba63b05caec3f1a
-
Filesize
211KB
MD5c67b5620840e275b396e24056e3880f3
SHA1f1f225f89eed4e7809de502bc8b7d32bcd84a724
SHA256f8a65cd14a60ddc216fbe642499b1bfe9c0321764882db20c253f45e13ff5020
SHA512fbc344391ca1866ab9135346ee1b3728762148735f55ab28fc98f33d9f3ddb855f672a1147d0fc1b98e29b1b737d2f4233af07e8d9bc99e00ba63b05caec3f1a
-
Filesize
211KB
MD5c67b5620840e275b396e24056e3880f3
SHA1f1f225f89eed4e7809de502bc8b7d32bcd84a724
SHA256f8a65cd14a60ddc216fbe642499b1bfe9c0321764882db20c253f45e13ff5020
SHA512fbc344391ca1866ab9135346ee1b3728762148735f55ab28fc98f33d9f3ddb855f672a1147d0fc1b98e29b1b737d2f4233af07e8d9bc99e00ba63b05caec3f1a
-
Filesize
211KB
MD5c67b5620840e275b396e24056e3880f3
SHA1f1f225f89eed4e7809de502bc8b7d32bcd84a724
SHA256f8a65cd14a60ddc216fbe642499b1bfe9c0321764882db20c253f45e13ff5020
SHA512fbc344391ca1866ab9135346ee1b3728762148735f55ab28fc98f33d9f3ddb855f672a1147d0fc1b98e29b1b737d2f4233af07e8d9bc99e00ba63b05caec3f1a
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53