Analysis
-
max time kernel
125s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2023, 05:56
Static task
static1
Behavioral task
behavioral1
Sample
819c85533c695fc59e18dbe6cd810b1c1e9e651513fcabc5d51521bda16cfaa2.exe
Resource
win10v2004-20230220-en
General
-
Target
819c85533c695fc59e18dbe6cd810b1c1e9e651513fcabc5d51521bda16cfaa2.exe
-
Size
479KB
-
MD5
64713b6bd8af6c11169c13d165ebec3e
-
SHA1
0fc9e8a1cbd83b898313e9ed7512fc85ebb74c50
-
SHA256
819c85533c695fc59e18dbe6cd810b1c1e9e651513fcabc5d51521bda16cfaa2
-
SHA512
8de3657a60d2bd8c1d08afd24a15af8ff1d612a6c673bc4ac5c20a55764fe895e0480d5218206b380d15b7924e743a6a1985b58c92ae785ed62ac76f38dca5b6
-
SSDEEP
12288:9MrHy904aFSLRvI/GzBNrP/whnFjoSbD0eya:ey7q8nrP/w7ECDVya
Malware Config
Extracted
redline
dumud
217.196.96.101:4132
-
auth_value
3e18d4b90418aa3e78d8822e87c62f5c
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h4027347.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h4027347.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h4027347.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h4027347.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h4027347.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h4027347.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation i7071400.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 1540 x0134906.exe 3936 g4678504.exe 3108 h4027347.exe 972 i7071400.exe 4284 oneetx.exe 4432 oneetx.exe 3544 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4956 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h4027347.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h4027347.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x0134906.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x0134906.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 819c85533c695fc59e18dbe6cd810b1c1e9e651513fcabc5d51521bda16cfaa2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 819c85533c695fc59e18dbe6cd810b1c1e9e651513fcabc5d51521bda16cfaa2.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 556 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3936 g4678504.exe 3936 g4678504.exe 3108 h4027347.exe 3108 h4027347.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3936 g4678504.exe Token: SeDebugPrivilege 3108 h4027347.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 972 i7071400.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2932 wrote to memory of 1540 2932 819c85533c695fc59e18dbe6cd810b1c1e9e651513fcabc5d51521bda16cfaa2.exe 85 PID 2932 wrote to memory of 1540 2932 819c85533c695fc59e18dbe6cd810b1c1e9e651513fcabc5d51521bda16cfaa2.exe 85 PID 2932 wrote to memory of 1540 2932 819c85533c695fc59e18dbe6cd810b1c1e9e651513fcabc5d51521bda16cfaa2.exe 85 PID 1540 wrote to memory of 3936 1540 x0134906.exe 86 PID 1540 wrote to memory of 3936 1540 x0134906.exe 86 PID 1540 wrote to memory of 3936 1540 x0134906.exe 86 PID 1540 wrote to memory of 3108 1540 x0134906.exe 93 PID 1540 wrote to memory of 3108 1540 x0134906.exe 93 PID 1540 wrote to memory of 3108 1540 x0134906.exe 93 PID 2932 wrote to memory of 972 2932 819c85533c695fc59e18dbe6cd810b1c1e9e651513fcabc5d51521bda16cfaa2.exe 94 PID 2932 wrote to memory of 972 2932 819c85533c695fc59e18dbe6cd810b1c1e9e651513fcabc5d51521bda16cfaa2.exe 94 PID 2932 wrote to memory of 972 2932 819c85533c695fc59e18dbe6cd810b1c1e9e651513fcabc5d51521bda16cfaa2.exe 94 PID 972 wrote to memory of 4284 972 i7071400.exe 95 PID 972 wrote to memory of 4284 972 i7071400.exe 95 PID 972 wrote to memory of 4284 972 i7071400.exe 95 PID 4284 wrote to memory of 556 4284 oneetx.exe 96 PID 4284 wrote to memory of 556 4284 oneetx.exe 96 PID 4284 wrote to memory of 556 4284 oneetx.exe 96 PID 4284 wrote to memory of 1892 4284 oneetx.exe 98 PID 4284 wrote to memory of 1892 4284 oneetx.exe 98 PID 4284 wrote to memory of 1892 4284 oneetx.exe 98 PID 1892 wrote to memory of 3796 1892 cmd.exe 100 PID 1892 wrote to memory of 3796 1892 cmd.exe 100 PID 1892 wrote to memory of 3796 1892 cmd.exe 100 PID 1892 wrote to memory of 4768 1892 cmd.exe 101 PID 1892 wrote to memory of 4768 1892 cmd.exe 101 PID 1892 wrote to memory of 4768 1892 cmd.exe 101 PID 1892 wrote to memory of 3800 1892 cmd.exe 102 PID 1892 wrote to memory of 3800 1892 cmd.exe 102 PID 1892 wrote to memory of 3800 1892 cmd.exe 102 PID 1892 wrote to memory of 4856 1892 cmd.exe 103 PID 1892 wrote to memory of 4856 1892 cmd.exe 103 PID 1892 wrote to memory of 4856 1892 cmd.exe 103 PID 1892 wrote to memory of 4628 1892 cmd.exe 104 PID 1892 wrote to memory of 4628 1892 cmd.exe 104 PID 1892 wrote to memory of 4628 1892 cmd.exe 104 PID 1892 wrote to memory of 4852 1892 cmd.exe 105 PID 1892 wrote to memory of 4852 1892 cmd.exe 105 PID 1892 wrote to memory of 4852 1892 cmd.exe 105 PID 4284 wrote to memory of 4956 4284 oneetx.exe 108 PID 4284 wrote to memory of 4956 4284 oneetx.exe 108 PID 4284 wrote to memory of 4956 4284 oneetx.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\819c85533c695fc59e18dbe6cd810b1c1e9e651513fcabc5d51521bda16cfaa2.exe"C:\Users\Admin\AppData\Local\Temp\819c85533c695fc59e18dbe6cd810b1c1e9e651513fcabc5d51521bda16cfaa2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0134906.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0134906.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g4678504.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g4678504.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3936
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4027347.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4027347.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3108
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7071400.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7071400.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:556
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3796
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4768
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3800
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4856
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4628
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:4852
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4956
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4432
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3544
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD52c5fbbd449d7263c63efe9eb5f7b17fb
SHA15098185366bf2ff4855bb6e73c9245413fb120a1
SHA25633b50efd10334862eb2939ba64735c39a2ba4c9854d72b0fce3a3b6a7e47cf6e
SHA51241305aaa472b30dadd26e26a180d4da915d949ffe585d87379819f850aa98f6453fe2c468ec3250d1fa493a11b69f34c89592a6c2f165acbef11e360e5a86528
-
Filesize
211KB
MD52c5fbbd449d7263c63efe9eb5f7b17fb
SHA15098185366bf2ff4855bb6e73c9245413fb120a1
SHA25633b50efd10334862eb2939ba64735c39a2ba4c9854d72b0fce3a3b6a7e47cf6e
SHA51241305aaa472b30dadd26e26a180d4da915d949ffe585d87379819f850aa98f6453fe2c468ec3250d1fa493a11b69f34c89592a6c2f165acbef11e360e5a86528
-
Filesize
308KB
MD557632f1758ca01debd1062b3907c1d23
SHA1a6e925871a34957e163dbee9f1730d884bf46b39
SHA256c93d0a12ce0dc55b5c48f67ad431a19e6f5edf6860409c6e6f58f711bc6979c1
SHA5125dc2b94b0918b76d74c54ca390d005f6cabd6b1dcd813ffe087238a11607c7cd41cef0f8ee3621610d74b80bce0ccb97df6576667bba4c577c732db2dc32d876
-
Filesize
308KB
MD557632f1758ca01debd1062b3907c1d23
SHA1a6e925871a34957e163dbee9f1730d884bf46b39
SHA256c93d0a12ce0dc55b5c48f67ad431a19e6f5edf6860409c6e6f58f711bc6979c1
SHA5125dc2b94b0918b76d74c54ca390d005f6cabd6b1dcd813ffe087238a11607c7cd41cef0f8ee3621610d74b80bce0ccb97df6576667bba4c577c732db2dc32d876
-
Filesize
168KB
MD54ff05fba428435bc0b7f8242f92b62df
SHA18e04c6a92484596c94f7fac756154e6425a36ead
SHA25686ae5b05821c2c1904922bd4eaa2b59c12c26afb86177c06b01b4b9195ab140c
SHA512da2fbded8a22313bbd51d447a03b6faf488c0c6db7667dcd5d35e79ae6ef7a26054ad02408dbd3ac4eed301f239fc375ac09f1fc4413b1762e445a94a2a50d2c
-
Filesize
168KB
MD54ff05fba428435bc0b7f8242f92b62df
SHA18e04c6a92484596c94f7fac756154e6425a36ead
SHA25686ae5b05821c2c1904922bd4eaa2b59c12c26afb86177c06b01b4b9195ab140c
SHA512da2fbded8a22313bbd51d447a03b6faf488c0c6db7667dcd5d35e79ae6ef7a26054ad02408dbd3ac4eed301f239fc375ac09f1fc4413b1762e445a94a2a50d2c
-
Filesize
180KB
MD5a388e7347e0b35b06192ee9b587df240
SHA123bbd580d590bbc897f8a2eff14f0b867efbfe0e
SHA256b915ea48d3c6ff9315718d44b4da5d9cf06f7691218a43e4eae77c83daf91e97
SHA512d3f6e9c9a407f37febdc96d38cab0f8fbc8b1bcdd0e09f290bae43ca60db2205b8d341e93bb09e9fafafb92d0ed70980b5a4335f3ccbc11080f3a26eac4b3b95
-
Filesize
180KB
MD5a388e7347e0b35b06192ee9b587df240
SHA123bbd580d590bbc897f8a2eff14f0b867efbfe0e
SHA256b915ea48d3c6ff9315718d44b4da5d9cf06f7691218a43e4eae77c83daf91e97
SHA512d3f6e9c9a407f37febdc96d38cab0f8fbc8b1bcdd0e09f290bae43ca60db2205b8d341e93bb09e9fafafb92d0ed70980b5a4335f3ccbc11080f3a26eac4b3b95
-
Filesize
211KB
MD52c5fbbd449d7263c63efe9eb5f7b17fb
SHA15098185366bf2ff4855bb6e73c9245413fb120a1
SHA25633b50efd10334862eb2939ba64735c39a2ba4c9854d72b0fce3a3b6a7e47cf6e
SHA51241305aaa472b30dadd26e26a180d4da915d949ffe585d87379819f850aa98f6453fe2c468ec3250d1fa493a11b69f34c89592a6c2f165acbef11e360e5a86528
-
Filesize
211KB
MD52c5fbbd449d7263c63efe9eb5f7b17fb
SHA15098185366bf2ff4855bb6e73c9245413fb120a1
SHA25633b50efd10334862eb2939ba64735c39a2ba4c9854d72b0fce3a3b6a7e47cf6e
SHA51241305aaa472b30dadd26e26a180d4da915d949ffe585d87379819f850aa98f6453fe2c468ec3250d1fa493a11b69f34c89592a6c2f165acbef11e360e5a86528
-
Filesize
211KB
MD52c5fbbd449d7263c63efe9eb5f7b17fb
SHA15098185366bf2ff4855bb6e73c9245413fb120a1
SHA25633b50efd10334862eb2939ba64735c39a2ba4c9854d72b0fce3a3b6a7e47cf6e
SHA51241305aaa472b30dadd26e26a180d4da915d949ffe585d87379819f850aa98f6453fe2c468ec3250d1fa493a11b69f34c89592a6c2f165acbef11e360e5a86528
-
Filesize
211KB
MD52c5fbbd449d7263c63efe9eb5f7b17fb
SHA15098185366bf2ff4855bb6e73c9245413fb120a1
SHA25633b50efd10334862eb2939ba64735c39a2ba4c9854d72b0fce3a3b6a7e47cf6e
SHA51241305aaa472b30dadd26e26a180d4da915d949ffe585d87379819f850aa98f6453fe2c468ec3250d1fa493a11b69f34c89592a6c2f165acbef11e360e5a86528
-
Filesize
211KB
MD52c5fbbd449d7263c63efe9eb5f7b17fb
SHA15098185366bf2ff4855bb6e73c9245413fb120a1
SHA25633b50efd10334862eb2939ba64735c39a2ba4c9854d72b0fce3a3b6a7e47cf6e
SHA51241305aaa472b30dadd26e26a180d4da915d949ffe585d87379819f850aa98f6453fe2c468ec3250d1fa493a11b69f34c89592a6c2f165acbef11e360e5a86528
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5