Analysis
-
max time kernel
146s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2023 12:37
Static task
static1
Behavioral task
behavioral1
Sample
1525bc7644ae3ff83d7cafb75dffaf18d847e0f3652cf1ec1636df4bc49e449c.exe
Resource
win10v2004-20230221-en
General
-
Target
1525bc7644ae3ff83d7cafb75dffaf18d847e0f3652cf1ec1636df4bc49e449c.exe
-
Size
479KB
-
MD5
7d92ac0444146dcdffe198e1f15c99a9
-
SHA1
aeb5b436c272aa3440a1f9a80ffeb96bd4b484d7
-
SHA256
1525bc7644ae3ff83d7cafb75dffaf18d847e0f3652cf1ec1636df4bc49e449c
-
SHA512
2c5c7ee1bc1032fe833cad613bfe88821dff55cc9d93dfa9f6d7cc024471a954e104f6d354990c0b96413c606e67cfd04109a98cb3fcfb4633403a7cb8e0a93d
-
SSDEEP
12288:JMrWy90lNlWVZqaITX5cC1Pr4mlZr8lej:PyXqaIT9z8lej
Malware Config
Extracted
redline
douma
217.196.96.101:4132
-
auth_value
e7c0659b5f9d26f2f97df8d25fefbb44
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h7499197.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h7499197.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h7499197.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h7499197.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h7499197.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h7499197.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation i7032085.exe -
Executes dropped EXE 7 IoCs
pid Process 4632 x9868550.exe 4308 g6842033.exe 2644 h7499197.exe 4668 i7032085.exe 4820 oneetx.exe 2724 oneetx.exe 2116 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1980 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h7499197.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h7499197.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x9868550.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x9868550.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1525bc7644ae3ff83d7cafb75dffaf18d847e0f3652cf1ec1636df4bc49e449c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1525bc7644ae3ff83d7cafb75dffaf18d847e0f3652cf1ec1636df4bc49e449c.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 624 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4308 g6842033.exe 4308 g6842033.exe 2644 h7499197.exe 2644 h7499197.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4308 g6842033.exe Token: SeDebugPrivilege 2644 h7499197.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4668 i7032085.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2704 wrote to memory of 4632 2704 1525bc7644ae3ff83d7cafb75dffaf18d847e0f3652cf1ec1636df4bc49e449c.exe 82 PID 2704 wrote to memory of 4632 2704 1525bc7644ae3ff83d7cafb75dffaf18d847e0f3652cf1ec1636df4bc49e449c.exe 82 PID 2704 wrote to memory of 4632 2704 1525bc7644ae3ff83d7cafb75dffaf18d847e0f3652cf1ec1636df4bc49e449c.exe 82 PID 4632 wrote to memory of 4308 4632 x9868550.exe 83 PID 4632 wrote to memory of 4308 4632 x9868550.exe 83 PID 4632 wrote to memory of 4308 4632 x9868550.exe 83 PID 4632 wrote to memory of 2644 4632 x9868550.exe 90 PID 4632 wrote to memory of 2644 4632 x9868550.exe 90 PID 4632 wrote to memory of 2644 4632 x9868550.exe 90 PID 2704 wrote to memory of 4668 2704 1525bc7644ae3ff83d7cafb75dffaf18d847e0f3652cf1ec1636df4bc49e449c.exe 91 PID 2704 wrote to memory of 4668 2704 1525bc7644ae3ff83d7cafb75dffaf18d847e0f3652cf1ec1636df4bc49e449c.exe 91 PID 2704 wrote to memory of 4668 2704 1525bc7644ae3ff83d7cafb75dffaf18d847e0f3652cf1ec1636df4bc49e449c.exe 91 PID 4668 wrote to memory of 4820 4668 i7032085.exe 92 PID 4668 wrote to memory of 4820 4668 i7032085.exe 92 PID 4668 wrote to memory of 4820 4668 i7032085.exe 92 PID 4820 wrote to memory of 624 4820 oneetx.exe 93 PID 4820 wrote to memory of 624 4820 oneetx.exe 93 PID 4820 wrote to memory of 624 4820 oneetx.exe 93 PID 4820 wrote to memory of 3680 4820 oneetx.exe 95 PID 4820 wrote to memory of 3680 4820 oneetx.exe 95 PID 4820 wrote to memory of 3680 4820 oneetx.exe 95 PID 3680 wrote to memory of 1628 3680 cmd.exe 97 PID 3680 wrote to memory of 1628 3680 cmd.exe 97 PID 3680 wrote to memory of 1628 3680 cmd.exe 97 PID 3680 wrote to memory of 1592 3680 cmd.exe 98 PID 3680 wrote to memory of 1592 3680 cmd.exe 98 PID 3680 wrote to memory of 1592 3680 cmd.exe 98 PID 3680 wrote to memory of 1488 3680 cmd.exe 99 PID 3680 wrote to memory of 1488 3680 cmd.exe 99 PID 3680 wrote to memory of 1488 3680 cmd.exe 99 PID 3680 wrote to memory of 392 3680 cmd.exe 100 PID 3680 wrote to memory of 392 3680 cmd.exe 100 PID 3680 wrote to memory of 392 3680 cmd.exe 100 PID 3680 wrote to memory of 5056 3680 cmd.exe 101 PID 3680 wrote to memory of 5056 3680 cmd.exe 101 PID 3680 wrote to memory of 5056 3680 cmd.exe 101 PID 3680 wrote to memory of 1896 3680 cmd.exe 102 PID 3680 wrote to memory of 1896 3680 cmd.exe 102 PID 3680 wrote to memory of 1896 3680 cmd.exe 102 PID 4820 wrote to memory of 1980 4820 oneetx.exe 104 PID 4820 wrote to memory of 1980 4820 oneetx.exe 104 PID 4820 wrote to memory of 1980 4820 oneetx.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\1525bc7644ae3ff83d7cafb75dffaf18d847e0f3652cf1ec1636df4bc49e449c.exe"C:\Users\Admin\AppData\Local\Temp\1525bc7644ae3ff83d7cafb75dffaf18d847e0f3652cf1ec1636df4bc49e449c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9868550.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9868550.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g6842033.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g6842033.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4308
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7499197.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7499197.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7032085.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7032085.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:624
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1628
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:1592
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:1488
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:392
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:5056
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:1896
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1980
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2724
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2116
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5fec36ba8312afbd15ef74a5c27519763
SHA1622bb317380f238e7d23b1b0bbcadf96ee70318e
SHA2569dd7ed0d58f8600fb013e2d2cb2c572e3a908ab78526ad455251a4974fec81be
SHA5128ba935c39abecb08121ccc5eb7af00f47f1354bbd9ac28cd13f61360f0e216f3896333e67301c7d03e6fce7c64dd5e3b94115251de606e15e11021371da55b16
-
Filesize
211KB
MD5fec36ba8312afbd15ef74a5c27519763
SHA1622bb317380f238e7d23b1b0bbcadf96ee70318e
SHA2569dd7ed0d58f8600fb013e2d2cb2c572e3a908ab78526ad455251a4974fec81be
SHA5128ba935c39abecb08121ccc5eb7af00f47f1354bbd9ac28cd13f61360f0e216f3896333e67301c7d03e6fce7c64dd5e3b94115251de606e15e11021371da55b16
-
Filesize
308KB
MD5de299c034e66b20b7b36be1dc2313282
SHA15a33104628a05d8608d7f95a97cd475ff97b9cfd
SHA2565db3e88641bec444d463168f0f79da5f32cbc2b60f6cb7dcda0b229704ce61a5
SHA5129f8841ca0fc0bd7d366d0bb2347e550814a682d6d95d617757653416f49006494aeb7792b81da21924b4e20270051831ec0735a523811f9829cedfdb37b836bf
-
Filesize
308KB
MD5de299c034e66b20b7b36be1dc2313282
SHA15a33104628a05d8608d7f95a97cd475ff97b9cfd
SHA2565db3e88641bec444d463168f0f79da5f32cbc2b60f6cb7dcda0b229704ce61a5
SHA5129f8841ca0fc0bd7d366d0bb2347e550814a682d6d95d617757653416f49006494aeb7792b81da21924b4e20270051831ec0735a523811f9829cedfdb37b836bf
-
Filesize
168KB
MD58ec757b1097227c814e3b61124c9498f
SHA11ac48eef7a555c4a4dfcc660614d614d617d844d
SHA256860a4042625dd063bfda42a4256e642b16cc21a37026597b213cc8b04618bbf2
SHA512641edf480cdbee1c2b8b70f8e12ca1a411ba534f29e62699376ce6ff5fed2aa51122cdc399b0a8f3810f9609824760e62f1475d98ae4a14618f49ea7b3b478a3
-
Filesize
168KB
MD58ec757b1097227c814e3b61124c9498f
SHA11ac48eef7a555c4a4dfcc660614d614d617d844d
SHA256860a4042625dd063bfda42a4256e642b16cc21a37026597b213cc8b04618bbf2
SHA512641edf480cdbee1c2b8b70f8e12ca1a411ba534f29e62699376ce6ff5fed2aa51122cdc399b0a8f3810f9609824760e62f1475d98ae4a14618f49ea7b3b478a3
-
Filesize
181KB
MD55da65556b467f855578d90a1694352bd
SHA1ca763b0acf416677404c8b738586ee7ac3952aed
SHA256a520ca1bcbe81bcac9b199297a126c4fb8eafdc6a3d6a99128c9d81ad56c10cd
SHA512c61a8fb7546c7af123148c5da7c4415c550d5868d592cd5496836590dde922e9b389c161d539a8cd1a567aadac87cbe34dfd362e82521cf48ef3c9aebc9cc4f1
-
Filesize
181KB
MD55da65556b467f855578d90a1694352bd
SHA1ca763b0acf416677404c8b738586ee7ac3952aed
SHA256a520ca1bcbe81bcac9b199297a126c4fb8eafdc6a3d6a99128c9d81ad56c10cd
SHA512c61a8fb7546c7af123148c5da7c4415c550d5868d592cd5496836590dde922e9b389c161d539a8cd1a567aadac87cbe34dfd362e82521cf48ef3c9aebc9cc4f1
-
Filesize
211KB
MD5fec36ba8312afbd15ef74a5c27519763
SHA1622bb317380f238e7d23b1b0bbcadf96ee70318e
SHA2569dd7ed0d58f8600fb013e2d2cb2c572e3a908ab78526ad455251a4974fec81be
SHA5128ba935c39abecb08121ccc5eb7af00f47f1354bbd9ac28cd13f61360f0e216f3896333e67301c7d03e6fce7c64dd5e3b94115251de606e15e11021371da55b16
-
Filesize
211KB
MD5fec36ba8312afbd15ef74a5c27519763
SHA1622bb317380f238e7d23b1b0bbcadf96ee70318e
SHA2569dd7ed0d58f8600fb013e2d2cb2c572e3a908ab78526ad455251a4974fec81be
SHA5128ba935c39abecb08121ccc5eb7af00f47f1354bbd9ac28cd13f61360f0e216f3896333e67301c7d03e6fce7c64dd5e3b94115251de606e15e11021371da55b16
-
Filesize
211KB
MD5fec36ba8312afbd15ef74a5c27519763
SHA1622bb317380f238e7d23b1b0bbcadf96ee70318e
SHA2569dd7ed0d58f8600fb013e2d2cb2c572e3a908ab78526ad455251a4974fec81be
SHA5128ba935c39abecb08121ccc5eb7af00f47f1354bbd9ac28cd13f61360f0e216f3896333e67301c7d03e6fce7c64dd5e3b94115251de606e15e11021371da55b16
-
Filesize
211KB
MD5fec36ba8312afbd15ef74a5c27519763
SHA1622bb317380f238e7d23b1b0bbcadf96ee70318e
SHA2569dd7ed0d58f8600fb013e2d2cb2c572e3a908ab78526ad455251a4974fec81be
SHA5128ba935c39abecb08121ccc5eb7af00f47f1354bbd9ac28cd13f61360f0e216f3896333e67301c7d03e6fce7c64dd5e3b94115251de606e15e11021371da55b16
-
Filesize
211KB
MD5fec36ba8312afbd15ef74a5c27519763
SHA1622bb317380f238e7d23b1b0bbcadf96ee70318e
SHA2569dd7ed0d58f8600fb013e2d2cb2c572e3a908ab78526ad455251a4974fec81be
SHA5128ba935c39abecb08121ccc5eb7af00f47f1354bbd9ac28cd13f61360f0e216f3896333e67301c7d03e6fce7c64dd5e3b94115251de606e15e11021371da55b16
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5