Analysis
-
max time kernel
135s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2023 18:16
Static task
static1
Behavioral task
behavioral1
Sample
e18e426cca794ae6fc8d14bb7a9ec599b4fb342b722494df7f649d2a9b620ef0.exe
Resource
win10v2004-20230220-en
General
-
Target
e18e426cca794ae6fc8d14bb7a9ec599b4fb342b722494df7f649d2a9b620ef0.exe
-
Size
480KB
-
MD5
4318880cc4f969c9f3d5b71c0cf15b37
-
SHA1
440eaca9c99211a794c7fe948834cea76425cb32
-
SHA256
e18e426cca794ae6fc8d14bb7a9ec599b4fb342b722494df7f649d2a9b620ef0
-
SHA512
26dd74ded7d4ed27379ce094871f4910aff2b152a4d11cf60682f3a3100b3641f8846b71c38616dbd264d65de2e41d69857f56233c5280d613ea4e88350ed9ef
-
SSDEEP
12288:RMruvy90yHUQkF1J9C1ZVjoUJQRsMYsp86r6DNbz:Zvy9hW1O1Zh/QosmBz
Malware Config
Extracted
redline
dease
217.196.96.101:4132
-
auth_value
82e4d5f9abc21848e0345118814a4e6c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k3564813.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k3564813.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k3564813.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k3564813.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k3564813.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k3564813.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation m5400085.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 1260 y7075781.exe 5084 k3564813.exe 3740 l7586268.exe 1708 m5400085.exe 1996 oneetx.exe 2272 oneetx.exe 2280 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 64 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k3564813.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k3564813.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e18e426cca794ae6fc8d14bb7a9ec599b4fb342b722494df7f649d2a9b620ef0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e18e426cca794ae6fc8d14bb7a9ec599b4fb342b722494df7f649d2a9b620ef0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y7075781.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y7075781.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4536 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5084 k3564813.exe 5084 k3564813.exe 3740 l7586268.exe 3740 l7586268.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5084 k3564813.exe Token: SeDebugPrivilege 3740 l7586268.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1708 m5400085.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 704 wrote to memory of 1260 704 e18e426cca794ae6fc8d14bb7a9ec599b4fb342b722494df7f649d2a9b620ef0.exe 85 PID 704 wrote to memory of 1260 704 e18e426cca794ae6fc8d14bb7a9ec599b4fb342b722494df7f649d2a9b620ef0.exe 85 PID 704 wrote to memory of 1260 704 e18e426cca794ae6fc8d14bb7a9ec599b4fb342b722494df7f649d2a9b620ef0.exe 85 PID 1260 wrote to memory of 5084 1260 y7075781.exe 86 PID 1260 wrote to memory of 5084 1260 y7075781.exe 86 PID 1260 wrote to memory of 5084 1260 y7075781.exe 86 PID 1260 wrote to memory of 3740 1260 y7075781.exe 90 PID 1260 wrote to memory of 3740 1260 y7075781.exe 90 PID 1260 wrote to memory of 3740 1260 y7075781.exe 90 PID 704 wrote to memory of 1708 704 e18e426cca794ae6fc8d14bb7a9ec599b4fb342b722494df7f649d2a9b620ef0.exe 91 PID 704 wrote to memory of 1708 704 e18e426cca794ae6fc8d14bb7a9ec599b4fb342b722494df7f649d2a9b620ef0.exe 91 PID 704 wrote to memory of 1708 704 e18e426cca794ae6fc8d14bb7a9ec599b4fb342b722494df7f649d2a9b620ef0.exe 91 PID 1708 wrote to memory of 1996 1708 m5400085.exe 92 PID 1708 wrote to memory of 1996 1708 m5400085.exe 92 PID 1708 wrote to memory of 1996 1708 m5400085.exe 92 PID 1996 wrote to memory of 4536 1996 oneetx.exe 93 PID 1996 wrote to memory of 4536 1996 oneetx.exe 93 PID 1996 wrote to memory of 4536 1996 oneetx.exe 93 PID 1996 wrote to memory of 4252 1996 oneetx.exe 95 PID 1996 wrote to memory of 4252 1996 oneetx.exe 95 PID 1996 wrote to memory of 4252 1996 oneetx.exe 95 PID 4252 wrote to memory of 3884 4252 cmd.exe 97 PID 4252 wrote to memory of 3884 4252 cmd.exe 97 PID 4252 wrote to memory of 3884 4252 cmd.exe 97 PID 4252 wrote to memory of 4460 4252 cmd.exe 98 PID 4252 wrote to memory of 4460 4252 cmd.exe 98 PID 4252 wrote to memory of 4460 4252 cmd.exe 98 PID 4252 wrote to memory of 5032 4252 cmd.exe 99 PID 4252 wrote to memory of 5032 4252 cmd.exe 99 PID 4252 wrote to memory of 5032 4252 cmd.exe 99 PID 4252 wrote to memory of 3796 4252 cmd.exe 100 PID 4252 wrote to memory of 3796 4252 cmd.exe 100 PID 4252 wrote to memory of 3796 4252 cmd.exe 100 PID 4252 wrote to memory of 2088 4252 cmd.exe 101 PID 4252 wrote to memory of 2088 4252 cmd.exe 101 PID 4252 wrote to memory of 2088 4252 cmd.exe 101 PID 4252 wrote to memory of 4988 4252 cmd.exe 102 PID 4252 wrote to memory of 4988 4252 cmd.exe 102 PID 4252 wrote to memory of 4988 4252 cmd.exe 102 PID 1996 wrote to memory of 64 1996 oneetx.exe 109 PID 1996 wrote to memory of 64 1996 oneetx.exe 109 PID 1996 wrote to memory of 64 1996 oneetx.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\e18e426cca794ae6fc8d14bb7a9ec599b4fb342b722494df7f649d2a9b620ef0.exe"C:\Users\Admin\AppData\Local\Temp\e18e426cca794ae6fc8d14bb7a9ec599b4fb342b722494df7f649d2a9b620ef0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7075781.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7075781.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3564813.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k3564813.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5084
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7586268.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l7586268.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3740
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m5400085.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m5400085.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4536
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3884
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4460
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:5032
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3796
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:2088
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:4988
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:64
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2272
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2280
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD5e6b16ef68101e0de51ebb756d28fdbe6
SHA11ee1dd34c8302d6f6b4eb4c1c3c6ce9d2f24c949
SHA2567de771943466d7ae39a35321bd879707266ef14b1621de49d620825261a13b41
SHA5124a862514cda603032620d7f42f6f22fa72792337dfdd6a7d3af629c8659c149f6e40dfc5c1db949e66deec7063e86e336aa00f9fcd043ff0c9a4db7c6f416c1e
-
Filesize
211KB
MD5e6b16ef68101e0de51ebb756d28fdbe6
SHA11ee1dd34c8302d6f6b4eb4c1c3c6ce9d2f24c949
SHA2567de771943466d7ae39a35321bd879707266ef14b1621de49d620825261a13b41
SHA5124a862514cda603032620d7f42f6f22fa72792337dfdd6a7d3af629c8659c149f6e40dfc5c1db949e66deec7063e86e336aa00f9fcd043ff0c9a4db7c6f416c1e
-
Filesize
309KB
MD56b586dac61c64731f5a875be07bff7e1
SHA178f473c559b21a2f06bd31c57e942666c566f020
SHA25643f6948e250f1410a1784143fbc2943ab84509855a343bea7963f124eba9593d
SHA5122fa4677ee94c1569dda003938a52353cc12eb5048fdd20ecedc4183be104b07bb4567b11cb7a89937cc935b744ae873d9c6aff6b4a78af9be2e532fd962f7a85
-
Filesize
309KB
MD56b586dac61c64731f5a875be07bff7e1
SHA178f473c559b21a2f06bd31c57e942666c566f020
SHA25643f6948e250f1410a1784143fbc2943ab84509855a343bea7963f124eba9593d
SHA5122fa4677ee94c1569dda003938a52353cc12eb5048fdd20ecedc4183be104b07bb4567b11cb7a89937cc935b744ae873d9c6aff6b4a78af9be2e532fd962f7a85
-
Filesize
181KB
MD5d8d4f39434d1422b27982f0e1abd4884
SHA112900e1c57947c4b3825c4751d3312f3cab93fad
SHA256c4e69e1b3959fff0d3b7aed0eb4e0dd7330cce462aa8de3269e6526c4e0a948b
SHA512759a87430d6c684ce8ba8ec3991861f69fed559b982228d0540bd673a95b60fe645a2bcb3779d1da5ce456f87f2a0fd8cd69db4e52e56337064a91271e5aa526
-
Filesize
181KB
MD5d8d4f39434d1422b27982f0e1abd4884
SHA112900e1c57947c4b3825c4751d3312f3cab93fad
SHA256c4e69e1b3959fff0d3b7aed0eb4e0dd7330cce462aa8de3269e6526c4e0a948b
SHA512759a87430d6c684ce8ba8ec3991861f69fed559b982228d0540bd673a95b60fe645a2bcb3779d1da5ce456f87f2a0fd8cd69db4e52e56337064a91271e5aa526
-
Filesize
168KB
MD5ed7945f901c87b562b0cb8b64f52f35e
SHA1dda7f85a8813196f950b8cf235cc5525fa6ad56a
SHA2565e7f951e1dcf687aa43b7ef1299c7acd276e42e7e6effa63f3d0f3a659ed8435
SHA512dceded45fcbf00d08ef4ab1cdd892374129aa9c2a7d74879772e7b1e4a98fb60767ff8827fca32629fd676632a13652c70e059d1a2303776dde892e5753632cb
-
Filesize
168KB
MD5ed7945f901c87b562b0cb8b64f52f35e
SHA1dda7f85a8813196f950b8cf235cc5525fa6ad56a
SHA2565e7f951e1dcf687aa43b7ef1299c7acd276e42e7e6effa63f3d0f3a659ed8435
SHA512dceded45fcbf00d08ef4ab1cdd892374129aa9c2a7d74879772e7b1e4a98fb60767ff8827fca32629fd676632a13652c70e059d1a2303776dde892e5753632cb
-
Filesize
211KB
MD5e6b16ef68101e0de51ebb756d28fdbe6
SHA11ee1dd34c8302d6f6b4eb4c1c3c6ce9d2f24c949
SHA2567de771943466d7ae39a35321bd879707266ef14b1621de49d620825261a13b41
SHA5124a862514cda603032620d7f42f6f22fa72792337dfdd6a7d3af629c8659c149f6e40dfc5c1db949e66deec7063e86e336aa00f9fcd043ff0c9a4db7c6f416c1e
-
Filesize
211KB
MD5e6b16ef68101e0de51ebb756d28fdbe6
SHA11ee1dd34c8302d6f6b4eb4c1c3c6ce9d2f24c949
SHA2567de771943466d7ae39a35321bd879707266ef14b1621de49d620825261a13b41
SHA5124a862514cda603032620d7f42f6f22fa72792337dfdd6a7d3af629c8659c149f6e40dfc5c1db949e66deec7063e86e336aa00f9fcd043ff0c9a4db7c6f416c1e
-
Filesize
211KB
MD5e6b16ef68101e0de51ebb756d28fdbe6
SHA11ee1dd34c8302d6f6b4eb4c1c3c6ce9d2f24c949
SHA2567de771943466d7ae39a35321bd879707266ef14b1621de49d620825261a13b41
SHA5124a862514cda603032620d7f42f6f22fa72792337dfdd6a7d3af629c8659c149f6e40dfc5c1db949e66deec7063e86e336aa00f9fcd043ff0c9a4db7c6f416c1e
-
Filesize
211KB
MD5e6b16ef68101e0de51ebb756d28fdbe6
SHA11ee1dd34c8302d6f6b4eb4c1c3c6ce9d2f24c949
SHA2567de771943466d7ae39a35321bd879707266ef14b1621de49d620825261a13b41
SHA5124a862514cda603032620d7f42f6f22fa72792337dfdd6a7d3af629c8659c149f6e40dfc5c1db949e66deec7063e86e336aa00f9fcd043ff0c9a4db7c6f416c1e
-
Filesize
211KB
MD5e6b16ef68101e0de51ebb756d28fdbe6
SHA11ee1dd34c8302d6f6b4eb4c1c3c6ce9d2f24c949
SHA2567de771943466d7ae39a35321bd879707266ef14b1621de49d620825261a13b41
SHA5124a862514cda603032620d7f42f6f22fa72792337dfdd6a7d3af629c8659c149f6e40dfc5c1db949e66deec7063e86e336aa00f9fcd043ff0c9a4db7c6f416c1e
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5