Analysis

  • max time kernel
    142s
  • max time network
    149s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    09-05-2023 12:22

General

  • Target

    41217b065e3394cf4224c09273c21d8d90ff3aecece9c023af7667132abef997.exe

  • Size

    480KB

  • MD5

    dbb5448883031ab746619aaa433403e4

  • SHA1

    dba8387c9d7a748c27a262b6f3436d3e5cdf2355

  • SHA256

    41217b065e3394cf4224c09273c21d8d90ff3aecece9c023af7667132abef997

  • SHA512

    0400b02b3e2b3c299e8111234cddea47c07f242bfcbb240ff7bec5ae70f4d3caba371c7148a5cad7c0ad391ec2dbc8fd7131f61110342c49105f82734fde295b

  • SSDEEP

    12288:WMr4y908evApCNf2zMe1yJbj0qJG83U8QGmKB2t94L9J+Y:Oyhev3zX0qJG8PXB2sZ

Malware Config

Extracted

Family

redline

Botnet

mofun

C2

217.196.96.101:4132

Attributes
  • auth_value

    da5d4987d25c2de43d34fcc99b29fff3

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41217b065e3394cf4224c09273c21d8d90ff3aecece9c023af7667132abef997.exe
    "C:\Users\Admin\AppData\Local\Temp\41217b065e3394cf4224c09273c21d8d90ff3aecece9c023af7667132abef997.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3588
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8204923.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8204923.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3524
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a2703072.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a2703072.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4280
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0752446.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0752446.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4124
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3174622.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3174622.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4608
      • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3544
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4652
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3748
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:2544
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:N"
              5⤵
                PID:3752
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                5⤵
                  PID:1660
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4320
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\c3912af058" /P "Admin:N"
                    5⤵
                      PID:2736
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\c3912af058" /P "Admin:R" /E
                      5⤵
                        PID:3068
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:4328
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:4764
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:4976

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3174622.exe

                Filesize

                211KB

                MD5

                f90da9ba93bb28e13f11cbf75fd4fc02

                SHA1

                3c2cc516ea7d922b965c83c41e6b52c462bf46f0

                SHA256

                275743f651333f27944f55e68e5578ae71a6f088a21ef03cacf96532048bbf7c

                SHA512

                3fbbd69960b89e969e0641cd01ac5a97a6da21d097849eba6cdbee41e3831d9add1ba28c95b81713f5a53e63a29cc16a93758ea6385f6adec29998416a020a12

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3174622.exe

                Filesize

                211KB

                MD5

                f90da9ba93bb28e13f11cbf75fd4fc02

                SHA1

                3c2cc516ea7d922b965c83c41e6b52c462bf46f0

                SHA256

                275743f651333f27944f55e68e5578ae71a6f088a21ef03cacf96532048bbf7c

                SHA512

                3fbbd69960b89e969e0641cd01ac5a97a6da21d097849eba6cdbee41e3831d9add1ba28c95b81713f5a53e63a29cc16a93758ea6385f6adec29998416a020a12

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8204923.exe

                Filesize

                309KB

                MD5

                8b21a3521f3ed1f33058e47683344dcd

                SHA1

                cad84829b493ef65b93abb66f030ccfcc804c50c

                SHA256

                201410a7479b8c79a2a2f467ffdb77e21c00cbc7e31354b2b59d463bfeb00b14

                SHA512

                e07625cbd82196bb8335c9cd12e88d44ab365ebc542b5b2e6fcd57bb7e1364e6d2a2a8f56f7c0f334bdb0f8f41e07aeb93826e416dbe8114af9fdb23f320b7b4

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8204923.exe

                Filesize

                309KB

                MD5

                8b21a3521f3ed1f33058e47683344dcd

                SHA1

                cad84829b493ef65b93abb66f030ccfcc804c50c

                SHA256

                201410a7479b8c79a2a2f467ffdb77e21c00cbc7e31354b2b59d463bfeb00b14

                SHA512

                e07625cbd82196bb8335c9cd12e88d44ab365ebc542b5b2e6fcd57bb7e1364e6d2a2a8f56f7c0f334bdb0f8f41e07aeb93826e416dbe8114af9fdb23f320b7b4

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a2703072.exe

                Filesize

                181KB

                MD5

                039140b0339ff7c3e68190ae730bf3e2

                SHA1

                d80e3617b0ceeb258ac92336928b06667d3917e1

                SHA256

                13ea83fc5d8483dcc4672c84b5302bbbe091fc79f253e53c0993932e84362806

                SHA512

                4a4a45f95e3ad958020ef3b6ee810bf206a2ae764c7c4f1f2349125d342bd4382466c94222eebe368fe64d0592822a6ba323ad5a954a00136ff3d9f1a1c36370

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a2703072.exe

                Filesize

                181KB

                MD5

                039140b0339ff7c3e68190ae730bf3e2

                SHA1

                d80e3617b0ceeb258ac92336928b06667d3917e1

                SHA256

                13ea83fc5d8483dcc4672c84b5302bbbe091fc79f253e53c0993932e84362806

                SHA512

                4a4a45f95e3ad958020ef3b6ee810bf206a2ae764c7c4f1f2349125d342bd4382466c94222eebe368fe64d0592822a6ba323ad5a954a00136ff3d9f1a1c36370

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0752446.exe

                Filesize

                168KB

                MD5

                8072394ee95cfc7ecc0c4c9960682bd3

                SHA1

                b1de6e5532585343f7ac1b17aeea9010cd4efb1b

                SHA256

                9f10f3b7c3a8cab43fefb77a96c2bb7ec7a5eb16a63b32355ff48a83cfd38f18

                SHA512

                530b11b9444906516ed64f84a77ed645262a87d34dbae41c38229c8a47c74da8968bf7250fb3e3aba4516379d95b79c7c15cb129f26e11cd2bfc050ce20cf226

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0752446.exe

                Filesize

                168KB

                MD5

                8072394ee95cfc7ecc0c4c9960682bd3

                SHA1

                b1de6e5532585343f7ac1b17aeea9010cd4efb1b

                SHA256

                9f10f3b7c3a8cab43fefb77a96c2bb7ec7a5eb16a63b32355ff48a83cfd38f18

                SHA512

                530b11b9444906516ed64f84a77ed645262a87d34dbae41c38229c8a47c74da8968bf7250fb3e3aba4516379d95b79c7c15cb129f26e11cd2bfc050ce20cf226

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                211KB

                MD5

                f90da9ba93bb28e13f11cbf75fd4fc02

                SHA1

                3c2cc516ea7d922b965c83c41e6b52c462bf46f0

                SHA256

                275743f651333f27944f55e68e5578ae71a6f088a21ef03cacf96532048bbf7c

                SHA512

                3fbbd69960b89e969e0641cd01ac5a97a6da21d097849eba6cdbee41e3831d9add1ba28c95b81713f5a53e63a29cc16a93758ea6385f6adec29998416a020a12

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                211KB

                MD5

                f90da9ba93bb28e13f11cbf75fd4fc02

                SHA1

                3c2cc516ea7d922b965c83c41e6b52c462bf46f0

                SHA256

                275743f651333f27944f55e68e5578ae71a6f088a21ef03cacf96532048bbf7c

                SHA512

                3fbbd69960b89e969e0641cd01ac5a97a6da21d097849eba6cdbee41e3831d9add1ba28c95b81713f5a53e63a29cc16a93758ea6385f6adec29998416a020a12

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                211KB

                MD5

                f90da9ba93bb28e13f11cbf75fd4fc02

                SHA1

                3c2cc516ea7d922b965c83c41e6b52c462bf46f0

                SHA256

                275743f651333f27944f55e68e5578ae71a6f088a21ef03cacf96532048bbf7c

                SHA512

                3fbbd69960b89e969e0641cd01ac5a97a6da21d097849eba6cdbee41e3831d9add1ba28c95b81713f5a53e63a29cc16a93758ea6385f6adec29998416a020a12

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                211KB

                MD5

                f90da9ba93bb28e13f11cbf75fd4fc02

                SHA1

                3c2cc516ea7d922b965c83c41e6b52c462bf46f0

                SHA256

                275743f651333f27944f55e68e5578ae71a6f088a21ef03cacf96532048bbf7c

                SHA512

                3fbbd69960b89e969e0641cd01ac5a97a6da21d097849eba6cdbee41e3831d9add1ba28c95b81713f5a53e63a29cc16a93758ea6385f6adec29998416a020a12

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                211KB

                MD5

                f90da9ba93bb28e13f11cbf75fd4fc02

                SHA1

                3c2cc516ea7d922b965c83c41e6b52c462bf46f0

                SHA256

                275743f651333f27944f55e68e5578ae71a6f088a21ef03cacf96532048bbf7c

                SHA512

                3fbbd69960b89e969e0641cd01ac5a97a6da21d097849eba6cdbee41e3831d9add1ba28c95b81713f5a53e63a29cc16a93758ea6385f6adec29998416a020a12

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • memory/4124-180-0x0000000006DA0000-0x0000000006DF0000-memory.dmp

                Filesize

                320KB

              • memory/4124-178-0x00000000066B0000-0x0000000006742000-memory.dmp

                Filesize

                584KB

              • memory/4124-182-0x00000000091A0000-0x00000000096CC000-memory.dmp

                Filesize

                5.2MB

              • memory/4124-181-0x0000000007620000-0x00000000077E2000-memory.dmp

                Filesize

                1.8MB

              • memory/4124-179-0x0000000006610000-0x0000000006676000-memory.dmp

                Filesize

                408KB

              • memory/4124-177-0x0000000005F80000-0x0000000005FF6000-memory.dmp

                Filesize

                472KB

              • memory/4124-176-0x0000000005AB0000-0x0000000005AFB000-memory.dmp

                Filesize

                300KB

              • memory/4124-175-0x0000000005A70000-0x0000000005AAE000-memory.dmp

                Filesize

                248KB

              • memory/4124-169-0x0000000000FB0000-0x0000000000FE0000-memory.dmp

                Filesize

                192KB

              • memory/4124-170-0x00000000031F0000-0x00000000031F6000-memory.dmp

                Filesize

                24KB

              • memory/4124-171-0x0000000006000000-0x0000000006606000-memory.dmp

                Filesize

                6.0MB

              • memory/4124-172-0x0000000005B00000-0x0000000005C0A000-memory.dmp

                Filesize

                1.0MB

              • memory/4124-173-0x0000000005A10000-0x0000000005A22000-memory.dmp

                Filesize

                72KB

              • memory/4124-174-0x00000000058E0000-0x00000000058F0000-memory.dmp

                Filesize

                64KB

              • memory/4280-148-0x0000000004E30000-0x0000000004E42000-memory.dmp

                Filesize

                72KB

              • memory/4280-133-0x0000000002530000-0x000000000254A000-memory.dmp

                Filesize

                104KB

              • memory/4280-152-0x0000000004E30000-0x0000000004E42000-memory.dmp

                Filesize

                72KB

              • memory/4280-156-0x0000000004E30000-0x0000000004E42000-memory.dmp

                Filesize

                72KB

              • memory/4280-162-0x0000000004E30000-0x0000000004E42000-memory.dmp

                Filesize

                72KB

              • memory/4280-150-0x0000000004E30000-0x0000000004E42000-memory.dmp

                Filesize

                72KB

              • memory/4280-160-0x0000000004E30000-0x0000000004E42000-memory.dmp

                Filesize

                72KB

              • memory/4280-158-0x0000000004E30000-0x0000000004E42000-memory.dmp

                Filesize

                72KB

              • memory/4280-164-0x0000000004E30000-0x0000000004E42000-memory.dmp

                Filesize

                72KB

              • memory/4280-154-0x0000000004E30000-0x0000000004E42000-memory.dmp

                Filesize

                72KB

              • memory/4280-142-0x0000000004E30000-0x0000000004E42000-memory.dmp

                Filesize

                72KB

              • memory/4280-144-0x0000000004E30000-0x0000000004E42000-memory.dmp

                Filesize

                72KB

              • memory/4280-140-0x0000000004E30000-0x0000000004E42000-memory.dmp

                Filesize

                72KB

              • memory/4280-138-0x0000000004E30000-0x0000000004E42000-memory.dmp

                Filesize

                72KB

              • memory/4280-137-0x0000000004E30000-0x0000000004E42000-memory.dmp

                Filesize

                72KB

              • memory/4280-136-0x0000000004E30000-0x0000000004E48000-memory.dmp

                Filesize

                96KB

              • memory/4280-135-0x0000000004930000-0x0000000004E2E000-memory.dmp

                Filesize

                5.0MB

              • memory/4280-134-0x0000000002590000-0x00000000025A0000-memory.dmp

                Filesize

                64KB

              • memory/4280-146-0x0000000004E30000-0x0000000004E42000-memory.dmp

                Filesize

                72KB