Analysis
-
max time kernel
132s -
max time network
124s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
10/05/2023, 02:33
Static task
static1
Behavioral task
behavioral1
Sample
f4451f5a2814c1329a5feca69f6c258aef049ba6b9ec8989eead8410dc8ecb79.exe
Resource
win10-20230220-en
General
-
Target
f4451f5a2814c1329a5feca69f6c258aef049ba6b9ec8989eead8410dc8ecb79.exe
-
Size
479KB
-
MD5
7c3ec13a4cc2d0a02fd3bf943b51f8fe
-
SHA1
4ca7ba269fe80280d77cff5dbeabca2307deec15
-
SHA256
f4451f5a2814c1329a5feca69f6c258aef049ba6b9ec8989eead8410dc8ecb79
-
SHA512
e90bf04bbb65b568db92c9ccbc5d89dff3420c346e9a73e386de0ed01022deacf34d69c2bebe57393b215887154cbc5e8f6e2cab0c4a6901c0c28131391abfc3
-
SSDEEP
12288:8Mray90aiGU75c1u31BTQNzjzplUp1QXN3yWzG9TN:uyDiXXPTezHUp1aNxGVN
Malware Config
Extracted
redline
divan
217.196.96.102:4132
-
auth_value
b414986bebd7f5a3ec9aee0341b8e769
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k8660614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k8660614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k8660614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k8660614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k8660614.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 2196 y5483402.exe 2444 k8660614.exe 4124 l2161191.exe 4580 m1116973.exe 2540 oneetx.exe 3816 oneetx.exe 4672 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4692 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k8660614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k8660614.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y5483402.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f4451f5a2814c1329a5feca69f6c258aef049ba6b9ec8989eead8410dc8ecb79.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f4451f5a2814c1329a5feca69f6c258aef049ba6b9ec8989eead8410dc8ecb79.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y5483402.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4736 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2444 k8660614.exe 2444 k8660614.exe 4124 l2161191.exe 4124 l2161191.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2444 k8660614.exe Token: SeDebugPrivilege 4124 l2161191.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4580 m1116973.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2196 1976 f4451f5a2814c1329a5feca69f6c258aef049ba6b9ec8989eead8410dc8ecb79.exe 66 PID 1976 wrote to memory of 2196 1976 f4451f5a2814c1329a5feca69f6c258aef049ba6b9ec8989eead8410dc8ecb79.exe 66 PID 1976 wrote to memory of 2196 1976 f4451f5a2814c1329a5feca69f6c258aef049ba6b9ec8989eead8410dc8ecb79.exe 66 PID 2196 wrote to memory of 2444 2196 y5483402.exe 67 PID 2196 wrote to memory of 2444 2196 y5483402.exe 67 PID 2196 wrote to memory of 2444 2196 y5483402.exe 67 PID 2196 wrote to memory of 4124 2196 y5483402.exe 68 PID 2196 wrote to memory of 4124 2196 y5483402.exe 68 PID 2196 wrote to memory of 4124 2196 y5483402.exe 68 PID 1976 wrote to memory of 4580 1976 f4451f5a2814c1329a5feca69f6c258aef049ba6b9ec8989eead8410dc8ecb79.exe 70 PID 1976 wrote to memory of 4580 1976 f4451f5a2814c1329a5feca69f6c258aef049ba6b9ec8989eead8410dc8ecb79.exe 70 PID 1976 wrote to memory of 4580 1976 f4451f5a2814c1329a5feca69f6c258aef049ba6b9ec8989eead8410dc8ecb79.exe 70 PID 4580 wrote to memory of 2540 4580 m1116973.exe 71 PID 4580 wrote to memory of 2540 4580 m1116973.exe 71 PID 4580 wrote to memory of 2540 4580 m1116973.exe 71 PID 2540 wrote to memory of 4736 2540 oneetx.exe 72 PID 2540 wrote to memory of 4736 2540 oneetx.exe 72 PID 2540 wrote to memory of 4736 2540 oneetx.exe 72 PID 2540 wrote to memory of 3600 2540 oneetx.exe 74 PID 2540 wrote to memory of 3600 2540 oneetx.exe 74 PID 2540 wrote to memory of 3600 2540 oneetx.exe 74 PID 3600 wrote to memory of 2972 3600 cmd.exe 76 PID 3600 wrote to memory of 2972 3600 cmd.exe 76 PID 3600 wrote to memory of 2972 3600 cmd.exe 76 PID 3600 wrote to memory of 4724 3600 cmd.exe 77 PID 3600 wrote to memory of 4724 3600 cmd.exe 77 PID 3600 wrote to memory of 4724 3600 cmd.exe 77 PID 3600 wrote to memory of 3804 3600 cmd.exe 78 PID 3600 wrote to memory of 3804 3600 cmd.exe 78 PID 3600 wrote to memory of 3804 3600 cmd.exe 78 PID 3600 wrote to memory of 3808 3600 cmd.exe 79 PID 3600 wrote to memory of 3808 3600 cmd.exe 79 PID 3600 wrote to memory of 3808 3600 cmd.exe 79 PID 3600 wrote to memory of 2124 3600 cmd.exe 80 PID 3600 wrote to memory of 2124 3600 cmd.exe 80 PID 3600 wrote to memory of 2124 3600 cmd.exe 80 PID 3600 wrote to memory of 4280 3600 cmd.exe 81 PID 3600 wrote to memory of 4280 3600 cmd.exe 81 PID 3600 wrote to memory of 4280 3600 cmd.exe 81 PID 2540 wrote to memory of 4692 2540 oneetx.exe 83 PID 2540 wrote to memory of 4692 2540 oneetx.exe 83 PID 2540 wrote to memory of 4692 2540 oneetx.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4451f5a2814c1329a5feca69f6c258aef049ba6b9ec8989eead8410dc8ecb79.exe"C:\Users\Admin\AppData\Local\Temp\f4451f5a2814c1329a5feca69f6c258aef049ba6b9ec8989eead8410dc8ecb79.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5483402.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5483402.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8660614.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k8660614.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2161191.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2161191.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4124
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m1116973.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m1116973.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4736
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2972
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4724
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3804
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3808
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:2124
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:4280
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4692
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3816
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4672
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD5c0d351d73c82da5a2dc0cc7a161246a1
SHA1b3136bbe614e0f6f64d2c3266d7c09da2b69a7cd
SHA2560663d5ab680021c2fc43041bc7cb76159ffd9384ac1164d27b72f60997343659
SHA512ffc2bdd585f4dbf6127a7e4f8e300980d0938408f46c4f7d26f8b7c6d1c0439c393f8f7492c06331b05e4370a98627ce8a81ed02bc04d496415405d8fba1adde
-
Filesize
212KB
MD5c0d351d73c82da5a2dc0cc7a161246a1
SHA1b3136bbe614e0f6f64d2c3266d7c09da2b69a7cd
SHA2560663d5ab680021c2fc43041bc7cb76159ffd9384ac1164d27b72f60997343659
SHA512ffc2bdd585f4dbf6127a7e4f8e300980d0938408f46c4f7d26f8b7c6d1c0439c393f8f7492c06331b05e4370a98627ce8a81ed02bc04d496415405d8fba1adde
-
Filesize
307KB
MD518d4f20eb58111fc1f4e53c139977174
SHA162a5ca041c2aa122996c14309cf03f004c9c0dff
SHA2562873cefdfbe7563b5dd94e3b847d31533685e71b4dfa95738eb60e3b89daa748
SHA5122965fa6a33837195599370b3e7ed8c260d8b5298435000fa241d00cd9e9c491b36a4041bd309d815d064cd2d117ea2736a25b0b81f241f5f92684d65f5b86e26
-
Filesize
307KB
MD518d4f20eb58111fc1f4e53c139977174
SHA162a5ca041c2aa122996c14309cf03f004c9c0dff
SHA2562873cefdfbe7563b5dd94e3b847d31533685e71b4dfa95738eb60e3b89daa748
SHA5122965fa6a33837195599370b3e7ed8c260d8b5298435000fa241d00cd9e9c491b36a4041bd309d815d064cd2d117ea2736a25b0b81f241f5f92684d65f5b86e26
-
Filesize
182KB
MD5536781fe9a3ea82956e8e7b43d5f7404
SHA16f22f22e614269a672d8bc1518c87e0db0e3036d
SHA2561881b7ce7737f771de3ca034f68abef88f926cc6ba1003053534f6adba004395
SHA5129288f8df42e864c69520972ddd05d8e5bd9945e7da7a2c84f933acb5be5cc3e3121441ebd0aa61053384c8c98d76a4c2cc175f4bd6b62cc8074b20daf2fd0ebb
-
Filesize
182KB
MD5536781fe9a3ea82956e8e7b43d5f7404
SHA16f22f22e614269a672d8bc1518c87e0db0e3036d
SHA2561881b7ce7737f771de3ca034f68abef88f926cc6ba1003053534f6adba004395
SHA5129288f8df42e864c69520972ddd05d8e5bd9945e7da7a2c84f933acb5be5cc3e3121441ebd0aa61053384c8c98d76a4c2cc175f4bd6b62cc8074b20daf2fd0ebb
-
Filesize
168KB
MD586a7968dbb695fe4aab835013fa54759
SHA101475728ced86e3505cf0c75f86f3612a9d86967
SHA256f0271560f0eb48d4844ca207678d24d33f7f896a3611d11880e636e3f99b310d
SHA512c06803dc8729c3bdbfe2d7add7d3c8b1c059a9038c2f5c48b78fa88091a3a4bf2a5d47fb583cb80b3c4f4b5f833d0e6ddcaaea3f02cacd13578146f2e3f5e1a6
-
Filesize
168KB
MD586a7968dbb695fe4aab835013fa54759
SHA101475728ced86e3505cf0c75f86f3612a9d86967
SHA256f0271560f0eb48d4844ca207678d24d33f7f896a3611d11880e636e3f99b310d
SHA512c06803dc8729c3bdbfe2d7add7d3c8b1c059a9038c2f5c48b78fa88091a3a4bf2a5d47fb583cb80b3c4f4b5f833d0e6ddcaaea3f02cacd13578146f2e3f5e1a6
-
Filesize
212KB
MD5c0d351d73c82da5a2dc0cc7a161246a1
SHA1b3136bbe614e0f6f64d2c3266d7c09da2b69a7cd
SHA2560663d5ab680021c2fc43041bc7cb76159ffd9384ac1164d27b72f60997343659
SHA512ffc2bdd585f4dbf6127a7e4f8e300980d0938408f46c4f7d26f8b7c6d1c0439c393f8f7492c06331b05e4370a98627ce8a81ed02bc04d496415405d8fba1adde
-
Filesize
212KB
MD5c0d351d73c82da5a2dc0cc7a161246a1
SHA1b3136bbe614e0f6f64d2c3266d7c09da2b69a7cd
SHA2560663d5ab680021c2fc43041bc7cb76159ffd9384ac1164d27b72f60997343659
SHA512ffc2bdd585f4dbf6127a7e4f8e300980d0938408f46c4f7d26f8b7c6d1c0439c393f8f7492c06331b05e4370a98627ce8a81ed02bc04d496415405d8fba1adde
-
Filesize
212KB
MD5c0d351d73c82da5a2dc0cc7a161246a1
SHA1b3136bbe614e0f6f64d2c3266d7c09da2b69a7cd
SHA2560663d5ab680021c2fc43041bc7cb76159ffd9384ac1164d27b72f60997343659
SHA512ffc2bdd585f4dbf6127a7e4f8e300980d0938408f46c4f7d26f8b7c6d1c0439c393f8f7492c06331b05e4370a98627ce8a81ed02bc04d496415405d8fba1adde
-
Filesize
212KB
MD5c0d351d73c82da5a2dc0cc7a161246a1
SHA1b3136bbe614e0f6f64d2c3266d7c09da2b69a7cd
SHA2560663d5ab680021c2fc43041bc7cb76159ffd9384ac1164d27b72f60997343659
SHA512ffc2bdd585f4dbf6127a7e4f8e300980d0938408f46c4f7d26f8b7c6d1c0439c393f8f7492c06331b05e4370a98627ce8a81ed02bc04d496415405d8fba1adde
-
Filesize
212KB
MD5c0d351d73c82da5a2dc0cc7a161246a1
SHA1b3136bbe614e0f6f64d2c3266d7c09da2b69a7cd
SHA2560663d5ab680021c2fc43041bc7cb76159ffd9384ac1164d27b72f60997343659
SHA512ffc2bdd585f4dbf6127a7e4f8e300980d0938408f46c4f7d26f8b7c6d1c0439c393f8f7492c06331b05e4370a98627ce8a81ed02bc04d496415405d8fba1adde
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53