Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
09-05-2023 14:51
Static task
static1
Behavioral task
behavioral1
Sample
6ac67a3a0a23e78ee90f397c6279bca452ec6701023710e48584a299a23a4aa6.exe
Resource
win10-20230220-en
General
-
Target
6ac67a3a0a23e78ee90f397c6279bca452ec6701023710e48584a299a23a4aa6.exe
-
Size
479KB
-
MD5
e4c461388971cedbe27bb080ea80076f
-
SHA1
65f5c45f7ec973b7a8838f7648588ed16628e40f
-
SHA256
6ac67a3a0a23e78ee90f397c6279bca452ec6701023710e48584a299a23a4aa6
-
SHA512
565804afdd1d1e554a8f3c5e58d80be566ace77078dd11f6c9f7bbf5cd4fa7302b7626cf57f1ab4c38697ed6460b0917e8731daf08260f3aed6a89b31bf1ce4e
-
SSDEEP
6144:K8y+bnr+dp0yN90QECxnLeWEFhFZYpVFJCGEuWfnTe1mxMhRtib1K4SXRzB9etgG:cMrxy90ExnMakuWyiMIxbANPAMCdSu
Malware Config
Extracted
redline
douma
217.196.96.101:4132
-
auth_value
e7c0659b5f9d26f2f97df8d25fefbb44
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h0652979.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h0652979.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h0652979.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h0652979.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h0652979.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2144 x1211913.exe 2512 g9577367.exe 2616 h0652979.exe 4464 i7760973.exe 4788 oneetx.exe 3264 oneetx.exe 2696 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3256 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h0652979.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h0652979.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6ac67a3a0a23e78ee90f397c6279bca452ec6701023710e48584a299a23a4aa6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6ac67a3a0a23e78ee90f397c6279bca452ec6701023710e48584a299a23a4aa6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x1211913.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x1211913.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4676 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2512 g9577367.exe 2512 g9577367.exe 2616 h0652979.exe 2616 h0652979.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2512 g9577367.exe Token: SeDebugPrivilege 2616 h0652979.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4464 i7760973.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 5044 wrote to memory of 2144 5044 6ac67a3a0a23e78ee90f397c6279bca452ec6701023710e48584a299a23a4aa6.exe 66 PID 5044 wrote to memory of 2144 5044 6ac67a3a0a23e78ee90f397c6279bca452ec6701023710e48584a299a23a4aa6.exe 66 PID 5044 wrote to memory of 2144 5044 6ac67a3a0a23e78ee90f397c6279bca452ec6701023710e48584a299a23a4aa6.exe 66 PID 2144 wrote to memory of 2512 2144 x1211913.exe 67 PID 2144 wrote to memory of 2512 2144 x1211913.exe 67 PID 2144 wrote to memory of 2512 2144 x1211913.exe 67 PID 2144 wrote to memory of 2616 2144 x1211913.exe 69 PID 2144 wrote to memory of 2616 2144 x1211913.exe 69 PID 2144 wrote to memory of 2616 2144 x1211913.exe 69 PID 5044 wrote to memory of 4464 5044 6ac67a3a0a23e78ee90f397c6279bca452ec6701023710e48584a299a23a4aa6.exe 70 PID 5044 wrote to memory of 4464 5044 6ac67a3a0a23e78ee90f397c6279bca452ec6701023710e48584a299a23a4aa6.exe 70 PID 5044 wrote to memory of 4464 5044 6ac67a3a0a23e78ee90f397c6279bca452ec6701023710e48584a299a23a4aa6.exe 70 PID 4464 wrote to memory of 4788 4464 i7760973.exe 71 PID 4464 wrote to memory of 4788 4464 i7760973.exe 71 PID 4464 wrote to memory of 4788 4464 i7760973.exe 71 PID 4788 wrote to memory of 4676 4788 oneetx.exe 72 PID 4788 wrote to memory of 4676 4788 oneetx.exe 72 PID 4788 wrote to memory of 4676 4788 oneetx.exe 72 PID 4788 wrote to memory of 380 4788 oneetx.exe 73 PID 4788 wrote to memory of 380 4788 oneetx.exe 73 PID 4788 wrote to memory of 380 4788 oneetx.exe 73 PID 380 wrote to memory of 4396 380 cmd.exe 76 PID 380 wrote to memory of 4396 380 cmd.exe 76 PID 380 wrote to memory of 4396 380 cmd.exe 76 PID 380 wrote to memory of 4876 380 cmd.exe 77 PID 380 wrote to memory of 4876 380 cmd.exe 77 PID 380 wrote to memory of 4876 380 cmd.exe 77 PID 380 wrote to memory of 4896 380 cmd.exe 78 PID 380 wrote to memory of 4896 380 cmd.exe 78 PID 380 wrote to memory of 4896 380 cmd.exe 78 PID 380 wrote to memory of 4980 380 cmd.exe 79 PID 380 wrote to memory of 4980 380 cmd.exe 79 PID 380 wrote to memory of 4980 380 cmd.exe 79 PID 380 wrote to memory of 3464 380 cmd.exe 80 PID 380 wrote to memory of 3464 380 cmd.exe 80 PID 380 wrote to memory of 3464 380 cmd.exe 80 PID 380 wrote to memory of 3952 380 cmd.exe 81 PID 380 wrote to memory of 3952 380 cmd.exe 81 PID 380 wrote to memory of 3952 380 cmd.exe 81 PID 4788 wrote to memory of 3256 4788 oneetx.exe 83 PID 4788 wrote to memory of 3256 4788 oneetx.exe 83 PID 4788 wrote to memory of 3256 4788 oneetx.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ac67a3a0a23e78ee90f397c6279bca452ec6701023710e48584a299a23a4aa6.exe"C:\Users\Admin\AppData\Local\Temp\6ac67a3a0a23e78ee90f397c6279bca452ec6701023710e48584a299a23a4aa6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1211913.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1211913.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9577367.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9577367.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2512
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h0652979.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h0652979.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7760973.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7760973.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4676
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4396
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4876
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4896
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4980
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:3464
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:3952
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3256
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3264
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2696
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5da1287fcadff7a6d922ee112a8ab42af
SHA1c50f5a710a8fda4af2a96e6c2013aa34260cd85d
SHA2561fff449a5395101a616ff21cf287c8451569096ed3c9627e6a78d566301274a3
SHA5120e639c03a2dd12fb1e2c67ed4407fc614e4c16087b5c75bef7d45698303be2f22a5e044c32294d0877100af1fc08561a112cf6d513f408601c30c382cae9926d
-
Filesize
211KB
MD5da1287fcadff7a6d922ee112a8ab42af
SHA1c50f5a710a8fda4af2a96e6c2013aa34260cd85d
SHA2561fff449a5395101a616ff21cf287c8451569096ed3c9627e6a78d566301274a3
SHA5120e639c03a2dd12fb1e2c67ed4407fc614e4c16087b5c75bef7d45698303be2f22a5e044c32294d0877100af1fc08561a112cf6d513f408601c30c382cae9926d
-
Filesize
308KB
MD5b0b9a540d0bb30d4b56e889c632a3a0c
SHA19fe15c0f3d6d7b41a0effa984781383ce1f3e5fe
SHA256eeaf23e938f780a7c040e0f38a50d83ddcd64f1dd90f64c93344b42c5ebe2cca
SHA512c6668e221c291f46eb3672cd1a64d0534c76430ff3fb1ed9a16266181ef7030d60ce1d7ace3a130c74fbed4a66f5435a340cbd5fab8d9e41ca6be9bbf208aeb3
-
Filesize
308KB
MD5b0b9a540d0bb30d4b56e889c632a3a0c
SHA19fe15c0f3d6d7b41a0effa984781383ce1f3e5fe
SHA256eeaf23e938f780a7c040e0f38a50d83ddcd64f1dd90f64c93344b42c5ebe2cca
SHA512c6668e221c291f46eb3672cd1a64d0534c76430ff3fb1ed9a16266181ef7030d60ce1d7ace3a130c74fbed4a66f5435a340cbd5fab8d9e41ca6be9bbf208aeb3
-
Filesize
168KB
MD528a538dfafc1b04d6ce17b6ff62e6b60
SHA17c043ad3ceef9f385798b3752e63422cfb85d8bd
SHA25612bb222975bd562f5eb9f77e04f95c950aafff06260d83bc99514e492644cb6c
SHA512f7c0ab98ec8d1cd8773b1b3eb3be8e9e7fae1d5fc506356f990f97b24230cfe7c26940b4af2b5ea0f28be3f47cc03cf8169668a1ad6480c7b3c9fd75583913bc
-
Filesize
168KB
MD528a538dfafc1b04d6ce17b6ff62e6b60
SHA17c043ad3ceef9f385798b3752e63422cfb85d8bd
SHA25612bb222975bd562f5eb9f77e04f95c950aafff06260d83bc99514e492644cb6c
SHA512f7c0ab98ec8d1cd8773b1b3eb3be8e9e7fae1d5fc506356f990f97b24230cfe7c26940b4af2b5ea0f28be3f47cc03cf8169668a1ad6480c7b3c9fd75583913bc
-
Filesize
181KB
MD5e60f5bc23c2d10a8ef42f22dcbd6cbc2
SHA169ea720a59d84a51872212bd69865bfaccf17da5
SHA2565ec5d0caa71f91ad414c1de16d2fa78552ab9c5bcc0e7d6ed557908da9a94ffb
SHA5127e7333dc8a45b6f2d1d3552ec576814d82c0a9ad3f08ba28eb9bd4e3e989e59d055c44041a8282390760fb0d9ce5cf0d7b795d8172cebf3d2f6f00ad0b09dd1b
-
Filesize
181KB
MD5e60f5bc23c2d10a8ef42f22dcbd6cbc2
SHA169ea720a59d84a51872212bd69865bfaccf17da5
SHA2565ec5d0caa71f91ad414c1de16d2fa78552ab9c5bcc0e7d6ed557908da9a94ffb
SHA5127e7333dc8a45b6f2d1d3552ec576814d82c0a9ad3f08ba28eb9bd4e3e989e59d055c44041a8282390760fb0d9ce5cf0d7b795d8172cebf3d2f6f00ad0b09dd1b
-
Filesize
211KB
MD5da1287fcadff7a6d922ee112a8ab42af
SHA1c50f5a710a8fda4af2a96e6c2013aa34260cd85d
SHA2561fff449a5395101a616ff21cf287c8451569096ed3c9627e6a78d566301274a3
SHA5120e639c03a2dd12fb1e2c67ed4407fc614e4c16087b5c75bef7d45698303be2f22a5e044c32294d0877100af1fc08561a112cf6d513f408601c30c382cae9926d
-
Filesize
211KB
MD5da1287fcadff7a6d922ee112a8ab42af
SHA1c50f5a710a8fda4af2a96e6c2013aa34260cd85d
SHA2561fff449a5395101a616ff21cf287c8451569096ed3c9627e6a78d566301274a3
SHA5120e639c03a2dd12fb1e2c67ed4407fc614e4c16087b5c75bef7d45698303be2f22a5e044c32294d0877100af1fc08561a112cf6d513f408601c30c382cae9926d
-
Filesize
211KB
MD5da1287fcadff7a6d922ee112a8ab42af
SHA1c50f5a710a8fda4af2a96e6c2013aa34260cd85d
SHA2561fff449a5395101a616ff21cf287c8451569096ed3c9627e6a78d566301274a3
SHA5120e639c03a2dd12fb1e2c67ed4407fc614e4c16087b5c75bef7d45698303be2f22a5e044c32294d0877100af1fc08561a112cf6d513f408601c30c382cae9926d
-
Filesize
211KB
MD5da1287fcadff7a6d922ee112a8ab42af
SHA1c50f5a710a8fda4af2a96e6c2013aa34260cd85d
SHA2561fff449a5395101a616ff21cf287c8451569096ed3c9627e6a78d566301274a3
SHA5120e639c03a2dd12fb1e2c67ed4407fc614e4c16087b5c75bef7d45698303be2f22a5e044c32294d0877100af1fc08561a112cf6d513f408601c30c382cae9926d
-
Filesize
211KB
MD5da1287fcadff7a6d922ee112a8ab42af
SHA1c50f5a710a8fda4af2a96e6c2013aa34260cd85d
SHA2561fff449a5395101a616ff21cf287c8451569096ed3c9627e6a78d566301274a3
SHA5120e639c03a2dd12fb1e2c67ed4407fc614e4c16087b5c75bef7d45698303be2f22a5e044c32294d0877100af1fc08561a112cf6d513f408601c30c382cae9926d
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53