Analysis
-
max time kernel
131s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2023, 00:23
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
setup.exe
Resource
win10v2004-20230220-en
General
-
Target
setup.exe
-
Size
489KB
-
MD5
94f91220f3477efdbf5e041d5a99cdc6
-
SHA1
9933c231c1a84d6d38ce99586b4a3895eec74d32
-
SHA256
80517b66f5d28df06e141862e5ccb316cf616b82f8dc2bcfc506a7a65e0ce61c
-
SHA512
b47792a31ecf4ea44c4fd1a0bd048ad6bb4b5f827eb573719bf4da2c1fdd0ec50c72dbff237ce100ad4880ebf087e2d53730595cc8c8d62c3521764ade3998f0
-
SSDEEP
12288:SMrGy90Vf/l5c6USLAbbP5iBblD8hhGLCJEm3:AyKf/lFO5Y+hGLG
Malware Config
Extracted
redline
lurfa
217.196.96.102:4132
-
auth_value
f6c26c2a5c6c25ae5b2e9abf31f6341d
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o7083655.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o7083655.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o7083655.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o7083655.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o7083655.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o7083655.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation s1830867.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 4912 z4493530.exe 1296 o7083655.exe 1700 r1253772.exe 5088 s1830867.exe 3432 oneetx.exe 2140 oneetx.exe 936 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 5068 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o7083655.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o7083655.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" setup.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z4493530.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z4493530.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4104 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1296 o7083655.exe 1296 o7083655.exe 1700 r1253772.exe 1700 r1253772.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1296 o7083655.exe Token: SeDebugPrivilege 1700 r1253772.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5088 s1830867.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4824 wrote to memory of 4912 4824 setup.exe 84 PID 4824 wrote to memory of 4912 4824 setup.exe 84 PID 4824 wrote to memory of 4912 4824 setup.exe 84 PID 4912 wrote to memory of 1296 4912 z4493530.exe 85 PID 4912 wrote to memory of 1296 4912 z4493530.exe 85 PID 4912 wrote to memory of 1296 4912 z4493530.exe 85 PID 4912 wrote to memory of 1700 4912 z4493530.exe 90 PID 4912 wrote to memory of 1700 4912 z4493530.exe 90 PID 4912 wrote to memory of 1700 4912 z4493530.exe 90 PID 4824 wrote to memory of 5088 4824 setup.exe 94 PID 4824 wrote to memory of 5088 4824 setup.exe 94 PID 4824 wrote to memory of 5088 4824 setup.exe 94 PID 5088 wrote to memory of 3432 5088 s1830867.exe 95 PID 5088 wrote to memory of 3432 5088 s1830867.exe 95 PID 5088 wrote to memory of 3432 5088 s1830867.exe 95 PID 3432 wrote to memory of 4104 3432 oneetx.exe 96 PID 3432 wrote to memory of 4104 3432 oneetx.exe 96 PID 3432 wrote to memory of 4104 3432 oneetx.exe 96 PID 3432 wrote to memory of 5068 3432 oneetx.exe 101 PID 3432 wrote to memory of 5068 3432 oneetx.exe 101 PID 3432 wrote to memory of 5068 3432 oneetx.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4493530.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z4493530.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o7083655.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o7083655.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1296
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1253772.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1253772.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1830867.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1830867.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4104
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\a091ec0a6e2227\clip64.dll, Main4⤵
- Loads dropped DLL
PID:5068
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:2140
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:936
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD5a7ed758c33e58eda525a93ee7c73c577
SHA1b4eb92411e5c1a390b6938aa718d1d5fd1059aa6
SHA25663f4719c591a5de2681c94f6520f512a533890a08df44e59fb35afe194a8fced
SHA51263ccb2551aad4db46318cdc25813139014ea67c8c62f56bbac9d35676d3e7f4e6b4fa62c52e208c40426de519c5213ed60e1987af160964d431b03a588cd86fc
-
Filesize
232KB
MD5a7ed758c33e58eda525a93ee7c73c577
SHA1b4eb92411e5c1a390b6938aa718d1d5fd1059aa6
SHA25663f4719c591a5de2681c94f6520f512a533890a08df44e59fb35afe194a8fced
SHA51263ccb2551aad4db46318cdc25813139014ea67c8c62f56bbac9d35676d3e7f4e6b4fa62c52e208c40426de519c5213ed60e1987af160964d431b03a588cd86fc
-
Filesize
232KB
MD5a7ed758c33e58eda525a93ee7c73c577
SHA1b4eb92411e5c1a390b6938aa718d1d5fd1059aa6
SHA25663f4719c591a5de2681c94f6520f512a533890a08df44e59fb35afe194a8fced
SHA51263ccb2551aad4db46318cdc25813139014ea67c8c62f56bbac9d35676d3e7f4e6b4fa62c52e208c40426de519c5213ed60e1987af160964d431b03a588cd86fc
-
Filesize
232KB
MD5a7ed758c33e58eda525a93ee7c73c577
SHA1b4eb92411e5c1a390b6938aa718d1d5fd1059aa6
SHA25663f4719c591a5de2681c94f6520f512a533890a08df44e59fb35afe194a8fced
SHA51263ccb2551aad4db46318cdc25813139014ea67c8c62f56bbac9d35676d3e7f4e6b4fa62c52e208c40426de519c5213ed60e1987af160964d431b03a588cd86fc
-
Filesize
232KB
MD5a7ed758c33e58eda525a93ee7c73c577
SHA1b4eb92411e5c1a390b6938aa718d1d5fd1059aa6
SHA25663f4719c591a5de2681c94f6520f512a533890a08df44e59fb35afe194a8fced
SHA51263ccb2551aad4db46318cdc25813139014ea67c8c62f56bbac9d35676d3e7f4e6b4fa62c52e208c40426de519c5213ed60e1987af160964d431b03a588cd86fc
-
Filesize
232KB
MD5a7ed758c33e58eda525a93ee7c73c577
SHA1b4eb92411e5c1a390b6938aa718d1d5fd1059aa6
SHA25663f4719c591a5de2681c94f6520f512a533890a08df44e59fb35afe194a8fced
SHA51263ccb2551aad4db46318cdc25813139014ea67c8c62f56bbac9d35676d3e7f4e6b4fa62c52e208c40426de519c5213ed60e1987af160964d431b03a588cd86fc
-
Filesize
232KB
MD5a7ed758c33e58eda525a93ee7c73c577
SHA1b4eb92411e5c1a390b6938aa718d1d5fd1059aa6
SHA25663f4719c591a5de2681c94f6520f512a533890a08df44e59fb35afe194a8fced
SHA51263ccb2551aad4db46318cdc25813139014ea67c8c62f56bbac9d35676d3e7f4e6b4fa62c52e208c40426de519c5213ed60e1987af160964d431b03a588cd86fc
-
Filesize
307KB
MD57d11413a01d50bc2d7a1bc435214c75f
SHA1e8d2d00c5e95bbeae2c944bdad9afcc054275120
SHA2567e6f0a7982944ef1096622976c5f88bd10a64d78e51c397029577187ef329be9
SHA5123f4a9a2a465d25d7da8ebf7994568308b794d3e36438e2f6d01cdb7e8412c415e138b9cfbef384d32e954787242309b52122de6470f1306c8f4ecda6b9511c91
-
Filesize
307KB
MD57d11413a01d50bc2d7a1bc435214c75f
SHA1e8d2d00c5e95bbeae2c944bdad9afcc054275120
SHA2567e6f0a7982944ef1096622976c5f88bd10a64d78e51c397029577187ef329be9
SHA5123f4a9a2a465d25d7da8ebf7994568308b794d3e36438e2f6d01cdb7e8412c415e138b9cfbef384d32e954787242309b52122de6470f1306c8f4ecda6b9511c91
-
Filesize
181KB
MD51b821ccf999979f5d31cb1cf4051d684
SHA163a0e9234b517a2bc6bd07f826b266ed5df7e2d7
SHA2565bb204d7d2093fb5b2986947a3c5675fd5d7d680bd43c5e2764eaa10cee252fb
SHA51298148f5cb58f40e739263399b8a6cdea9776a1de1e91aaf70c11b01a119cd48f9598fb53138ce3540180c325f77d702b0c4383a53b07cab76b9a19601179fdf4
-
Filesize
181KB
MD51b821ccf999979f5d31cb1cf4051d684
SHA163a0e9234b517a2bc6bd07f826b266ed5df7e2d7
SHA2565bb204d7d2093fb5b2986947a3c5675fd5d7d680bd43c5e2764eaa10cee252fb
SHA51298148f5cb58f40e739263399b8a6cdea9776a1de1e91aaf70c11b01a119cd48f9598fb53138ce3540180c325f77d702b0c4383a53b07cab76b9a19601179fdf4
-
Filesize
168KB
MD58596b0c03d567107135076c94720f396
SHA14bb1912d6b8e4555f7bee365f902bf53663311ba
SHA256cdaf368870dd8b55644ca87ef0adf73b597e765fab7121a8039cec2f733a28b1
SHA5126006b9ea687924d63332ce681b102d4017f78e8fb102319cbeb050814de7cdf70ab183bfa93ab2fb9e03471141d8c301e713934d3d5004edb4ed0d8ce199e647
-
Filesize
168KB
MD58596b0c03d567107135076c94720f396
SHA14bb1912d6b8e4555f7bee365f902bf53663311ba
SHA256cdaf368870dd8b55644ca87ef0adf73b597e765fab7121a8039cec2f733a28b1
SHA5126006b9ea687924d63332ce681b102d4017f78e8fb102319cbeb050814de7cdf70ab183bfa93ab2fb9e03471141d8c301e713934d3d5004edb4ed0d8ce199e647
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
89KB
MD573df88d68a4f5e066784d462788cf695
SHA1e4bfed336848d0b622fa464d40cf4bd9222aab3f
SHA256f336fa91d52edf1a977a5b8510c1a7b0b22dd6d51576765e10a1fc98fb38109f
SHA51264c7a2828b041fbc2792e8f4e39b9abea9a33356478d307681f1cba278293a0a22569bda5b7718993a5224f514c2af77fe989de14ab2a2ad219b0213fedf3817
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5