Analysis
-
max time kernel
136s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2023, 06:43
Static task
static1
Behavioral task
behavioral1
Sample
8e82a47fae77ac77e5261e0e0a5a88dd5d37de7f9eeea15c5994bb03da2040d5.exe
Resource
win10v2004-20230220-en
General
-
Target
8e82a47fae77ac77e5261e0e0a5a88dd5d37de7f9eeea15c5994bb03da2040d5.exe
-
Size
481KB
-
MD5
b28c4b9ad8fa1826991189b8ab27a6da
-
SHA1
e441d2522c3eccc986bd172b655e6bcdeb29f216
-
SHA256
8e82a47fae77ac77e5261e0e0a5a88dd5d37de7f9eeea15c5994bb03da2040d5
-
SHA512
bf41a9e95a1d5306b2212fb0acaca6fdbcda0a92730c3d93adce60d78b3c18f74868b9521e40442738df52d2e840d10a98e05d854d97a59acc485a154a468da2
-
SSDEEP
12288:BMr1y90CgXjVqECtTYSUVSj50eSZkZatacR+OU:UyeXjbaTdNCYgRdU
Malware Config
Extracted
redline
mihan
217.196.96.101:4132
-
auth_value
9a6a8fdae02ed7caa0a49a6ddc6d4520
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a3367409.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a3367409.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a3367409.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a3367409.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a3367409.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a3367409.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation d6308817.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 632 v2151220.exe 2252 a3367409.exe 3056 b9353799.exe 4496 d6308817.exe 1064 oneetx.exe 2340 oneetx.exe 4828 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 5092 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a3367409.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a3367409.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8e82a47fae77ac77e5261e0e0a5a88dd5d37de7f9eeea15c5994bb03da2040d5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8e82a47fae77ac77e5261e0e0a5a88dd5d37de7f9eeea15c5994bb03da2040d5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2151220.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2151220.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 528 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2252 a3367409.exe 2252 a3367409.exe 3056 b9353799.exe 3056 b9353799.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2252 a3367409.exe Token: SeDebugPrivilege 3056 b9353799.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4496 d6308817.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4784 wrote to memory of 632 4784 8e82a47fae77ac77e5261e0e0a5a88dd5d37de7f9eeea15c5994bb03da2040d5.exe 86 PID 4784 wrote to memory of 632 4784 8e82a47fae77ac77e5261e0e0a5a88dd5d37de7f9eeea15c5994bb03da2040d5.exe 86 PID 4784 wrote to memory of 632 4784 8e82a47fae77ac77e5261e0e0a5a88dd5d37de7f9eeea15c5994bb03da2040d5.exe 86 PID 632 wrote to memory of 2252 632 v2151220.exe 87 PID 632 wrote to memory of 2252 632 v2151220.exe 87 PID 632 wrote to memory of 2252 632 v2151220.exe 87 PID 632 wrote to memory of 3056 632 v2151220.exe 91 PID 632 wrote to memory of 3056 632 v2151220.exe 91 PID 632 wrote to memory of 3056 632 v2151220.exe 91 PID 4784 wrote to memory of 4496 4784 8e82a47fae77ac77e5261e0e0a5a88dd5d37de7f9eeea15c5994bb03da2040d5.exe 92 PID 4784 wrote to memory of 4496 4784 8e82a47fae77ac77e5261e0e0a5a88dd5d37de7f9eeea15c5994bb03da2040d5.exe 92 PID 4784 wrote to memory of 4496 4784 8e82a47fae77ac77e5261e0e0a5a88dd5d37de7f9eeea15c5994bb03da2040d5.exe 92 PID 4496 wrote to memory of 1064 4496 d6308817.exe 93 PID 4496 wrote to memory of 1064 4496 d6308817.exe 93 PID 4496 wrote to memory of 1064 4496 d6308817.exe 93 PID 1064 wrote to memory of 528 1064 oneetx.exe 94 PID 1064 wrote to memory of 528 1064 oneetx.exe 94 PID 1064 wrote to memory of 528 1064 oneetx.exe 94 PID 1064 wrote to memory of 2628 1064 oneetx.exe 96 PID 1064 wrote to memory of 2628 1064 oneetx.exe 96 PID 1064 wrote to memory of 2628 1064 oneetx.exe 96 PID 2628 wrote to memory of 2592 2628 cmd.exe 98 PID 2628 wrote to memory of 2592 2628 cmd.exe 98 PID 2628 wrote to memory of 2592 2628 cmd.exe 98 PID 2628 wrote to memory of 1008 2628 cmd.exe 99 PID 2628 wrote to memory of 1008 2628 cmd.exe 99 PID 2628 wrote to memory of 1008 2628 cmd.exe 99 PID 2628 wrote to memory of 1344 2628 cmd.exe 100 PID 2628 wrote to memory of 1344 2628 cmd.exe 100 PID 2628 wrote to memory of 1344 2628 cmd.exe 100 PID 2628 wrote to memory of 1140 2628 cmd.exe 101 PID 2628 wrote to memory of 1140 2628 cmd.exe 101 PID 2628 wrote to memory of 1140 2628 cmd.exe 101 PID 2628 wrote to memory of 1444 2628 cmd.exe 102 PID 2628 wrote to memory of 1444 2628 cmd.exe 102 PID 2628 wrote to memory of 1444 2628 cmd.exe 102 PID 2628 wrote to memory of 3644 2628 cmd.exe 103 PID 2628 wrote to memory of 3644 2628 cmd.exe 103 PID 2628 wrote to memory of 3644 2628 cmd.exe 103 PID 1064 wrote to memory of 5092 1064 oneetx.exe 110 PID 1064 wrote to memory of 5092 1064 oneetx.exe 110 PID 1064 wrote to memory of 5092 1064 oneetx.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e82a47fae77ac77e5261e0e0a5a88dd5d37de7f9eeea15c5994bb03da2040d5.exe"C:\Users\Admin\AppData\Local\Temp\8e82a47fae77ac77e5261e0e0a5a88dd5d37de7f9eeea15c5994bb03da2040d5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2151220.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2151220.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a3367409.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a3367409.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2252
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b9353799.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b9353799.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3056
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6308817.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6308817.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:528
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2592
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1008
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:1344
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1140
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:1444
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:3644
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:5092
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2340
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4828
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD56c0812f78c8c578056124ff08a92b9ad
SHA1d35eff03df6d8329f94ad8a829a18524bacf1ca1
SHA256db31e73416e31741c8c2ff1cab5a0e73437a8152741e97456e6d599f1aa386d6
SHA51248524ff0fc543deaf6baa618835a816aa480ecef978239815ac02327e5b62e64ff5af738d353be5aa34f9b204f11c0a99e7af8911b874ad7c85d7af2dea80af7
-
Filesize
211KB
MD56c0812f78c8c578056124ff08a92b9ad
SHA1d35eff03df6d8329f94ad8a829a18524bacf1ca1
SHA256db31e73416e31741c8c2ff1cab5a0e73437a8152741e97456e6d599f1aa386d6
SHA51248524ff0fc543deaf6baa618835a816aa480ecef978239815ac02327e5b62e64ff5af738d353be5aa34f9b204f11c0a99e7af8911b874ad7c85d7af2dea80af7
-
Filesize
309KB
MD56d815466ea12b9d478b82096b2c1e84d
SHA1814c012afa18563ec596afcf1f41aeaa0fda6e09
SHA25602252f226361ff1063a3ebbdb49f6eb4f363365dd0a2057b661350ae6a58efaf
SHA5120f6846dfdcf690487ef5bfb4ae3053302ad8ef7343eeaea3e2df48fa55fa0efaa5ebc7ff732fa6f180f018bb47eaafed4953dbdada95592805cd16941cac1667
-
Filesize
309KB
MD56d815466ea12b9d478b82096b2c1e84d
SHA1814c012afa18563ec596afcf1f41aeaa0fda6e09
SHA25602252f226361ff1063a3ebbdb49f6eb4f363365dd0a2057b661350ae6a58efaf
SHA5120f6846dfdcf690487ef5bfb4ae3053302ad8ef7343eeaea3e2df48fa55fa0efaa5ebc7ff732fa6f180f018bb47eaafed4953dbdada95592805cd16941cac1667
-
Filesize
180KB
MD5b1c9dec6c84b5f1081f9b90007ef130e
SHA156eaf2fc715fa20d98867571ac1dfc28ccc93bc6
SHA25661713f0ca894d637b1d98006e39c28658170874c52c018c2dcdb03b0d918be21
SHA5126a873c361072b8a15288607b105cbb5fe631ebe554985f17b24723471426f5339b4b55ec306494260de966ce6d2b5107565557144f270539c6b0fb3b3ec89de0
-
Filesize
180KB
MD5b1c9dec6c84b5f1081f9b90007ef130e
SHA156eaf2fc715fa20d98867571ac1dfc28ccc93bc6
SHA25661713f0ca894d637b1d98006e39c28658170874c52c018c2dcdb03b0d918be21
SHA5126a873c361072b8a15288607b105cbb5fe631ebe554985f17b24723471426f5339b4b55ec306494260de966ce6d2b5107565557144f270539c6b0fb3b3ec89de0
-
Filesize
168KB
MD5eadaae3f92188e3602e48a15f93a9c5c
SHA14537fc693bfb6f49cd9c1545f87dfc79cbf8acc6
SHA256beb70e0cbe1564adccd72bedc5c516f3cb9b84a3eb23e7416e369c46cce42e73
SHA5121a9f424b3a21c1268459d061e032a7d781fc4243178c015ddfb8f782dab14498721f4d4037df6fddffede2d93492e85d27619e7a40bfa974fb59bb7ae08b90de
-
Filesize
168KB
MD5eadaae3f92188e3602e48a15f93a9c5c
SHA14537fc693bfb6f49cd9c1545f87dfc79cbf8acc6
SHA256beb70e0cbe1564adccd72bedc5c516f3cb9b84a3eb23e7416e369c46cce42e73
SHA5121a9f424b3a21c1268459d061e032a7d781fc4243178c015ddfb8f782dab14498721f4d4037df6fddffede2d93492e85d27619e7a40bfa974fb59bb7ae08b90de
-
Filesize
211KB
MD56c0812f78c8c578056124ff08a92b9ad
SHA1d35eff03df6d8329f94ad8a829a18524bacf1ca1
SHA256db31e73416e31741c8c2ff1cab5a0e73437a8152741e97456e6d599f1aa386d6
SHA51248524ff0fc543deaf6baa618835a816aa480ecef978239815ac02327e5b62e64ff5af738d353be5aa34f9b204f11c0a99e7af8911b874ad7c85d7af2dea80af7
-
Filesize
211KB
MD56c0812f78c8c578056124ff08a92b9ad
SHA1d35eff03df6d8329f94ad8a829a18524bacf1ca1
SHA256db31e73416e31741c8c2ff1cab5a0e73437a8152741e97456e6d599f1aa386d6
SHA51248524ff0fc543deaf6baa618835a816aa480ecef978239815ac02327e5b62e64ff5af738d353be5aa34f9b204f11c0a99e7af8911b874ad7c85d7af2dea80af7
-
Filesize
211KB
MD56c0812f78c8c578056124ff08a92b9ad
SHA1d35eff03df6d8329f94ad8a829a18524bacf1ca1
SHA256db31e73416e31741c8c2ff1cab5a0e73437a8152741e97456e6d599f1aa386d6
SHA51248524ff0fc543deaf6baa618835a816aa480ecef978239815ac02327e5b62e64ff5af738d353be5aa34f9b204f11c0a99e7af8911b874ad7c85d7af2dea80af7
-
Filesize
211KB
MD56c0812f78c8c578056124ff08a92b9ad
SHA1d35eff03df6d8329f94ad8a829a18524bacf1ca1
SHA256db31e73416e31741c8c2ff1cab5a0e73437a8152741e97456e6d599f1aa386d6
SHA51248524ff0fc543deaf6baa618835a816aa480ecef978239815ac02327e5b62e64ff5af738d353be5aa34f9b204f11c0a99e7af8911b874ad7c85d7af2dea80af7
-
Filesize
211KB
MD56c0812f78c8c578056124ff08a92b9ad
SHA1d35eff03df6d8329f94ad8a829a18524bacf1ca1
SHA256db31e73416e31741c8c2ff1cab5a0e73437a8152741e97456e6d599f1aa386d6
SHA51248524ff0fc543deaf6baa618835a816aa480ecef978239815ac02327e5b62e64ff5af738d353be5aa34f9b204f11c0a99e7af8911b874ad7c85d7af2dea80af7
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5