Analysis
-
max time kernel
112s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
10/05/2023, 02:27
Static task
static1
Behavioral task
behavioral1
Sample
f9f9889bd28f563ced185dba2abc92d8583e7bd0e4b00c56a925d031b98e9b93.exe
Resource
win10-20230220-en
General
-
Target
f9f9889bd28f563ced185dba2abc92d8583e7bd0e4b00c56a925d031b98e9b93.exe
-
Size
479KB
-
MD5
18f76f30d68b54567508463f06c873a5
-
SHA1
c1b200bf7a40800ea476078dac085db27d894abe
-
SHA256
f9f9889bd28f563ced185dba2abc92d8583e7bd0e4b00c56a925d031b98e9b93
-
SHA512
17e20913dea5904ab70b1cf1e780ebc3cd8a1cc612480ec109b9e41706f7baff8385cb06bf1d240b2ef4aa03f3f0bd7bc37af700c53e9c4b83c9cfed86305c52
-
SSDEEP
12288:sMrey90OJk81ycCGaMQEEG8H+pG16Dd8ScNNAQr:yyN28IcCGang8eEOCr
Malware Config
Extracted
redline
divan
217.196.96.102:4132
-
auth_value
b414986bebd7f5a3ec9aee0341b8e769
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h4020052.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h4020052.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h4020052.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h4020052.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h4020052.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 3364 x0101107.exe 4236 g5029896.exe 2212 h4020052.exe 3828 i5625333.exe 3904 oneetx.exe 304 oneetx.exe 5044 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4532 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h4020052.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h4020052.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f9f9889bd28f563ced185dba2abc92d8583e7bd0e4b00c56a925d031b98e9b93.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f9f9889bd28f563ced185dba2abc92d8583e7bd0e4b00c56a925d031b98e9b93.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x0101107.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x0101107.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4932 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4236 g5029896.exe 4236 g5029896.exe 2212 h4020052.exe 2212 h4020052.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4236 g5029896.exe Token: SeDebugPrivilege 2212 h4020052.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3828 i5625333.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4044 wrote to memory of 3364 4044 f9f9889bd28f563ced185dba2abc92d8583e7bd0e4b00c56a925d031b98e9b93.exe 66 PID 4044 wrote to memory of 3364 4044 f9f9889bd28f563ced185dba2abc92d8583e7bd0e4b00c56a925d031b98e9b93.exe 66 PID 4044 wrote to memory of 3364 4044 f9f9889bd28f563ced185dba2abc92d8583e7bd0e4b00c56a925d031b98e9b93.exe 66 PID 3364 wrote to memory of 4236 3364 x0101107.exe 67 PID 3364 wrote to memory of 4236 3364 x0101107.exe 67 PID 3364 wrote to memory of 4236 3364 x0101107.exe 67 PID 3364 wrote to memory of 2212 3364 x0101107.exe 69 PID 3364 wrote to memory of 2212 3364 x0101107.exe 69 PID 3364 wrote to memory of 2212 3364 x0101107.exe 69 PID 4044 wrote to memory of 3828 4044 f9f9889bd28f563ced185dba2abc92d8583e7bd0e4b00c56a925d031b98e9b93.exe 70 PID 4044 wrote to memory of 3828 4044 f9f9889bd28f563ced185dba2abc92d8583e7bd0e4b00c56a925d031b98e9b93.exe 70 PID 4044 wrote to memory of 3828 4044 f9f9889bd28f563ced185dba2abc92d8583e7bd0e4b00c56a925d031b98e9b93.exe 70 PID 3828 wrote to memory of 3904 3828 i5625333.exe 71 PID 3828 wrote to memory of 3904 3828 i5625333.exe 71 PID 3828 wrote to memory of 3904 3828 i5625333.exe 71 PID 3904 wrote to memory of 4932 3904 oneetx.exe 72 PID 3904 wrote to memory of 4932 3904 oneetx.exe 72 PID 3904 wrote to memory of 4932 3904 oneetx.exe 72 PID 3904 wrote to memory of 3192 3904 oneetx.exe 74 PID 3904 wrote to memory of 3192 3904 oneetx.exe 74 PID 3904 wrote to memory of 3192 3904 oneetx.exe 74 PID 3192 wrote to memory of 4892 3192 cmd.exe 76 PID 3192 wrote to memory of 4892 3192 cmd.exe 76 PID 3192 wrote to memory of 4892 3192 cmd.exe 76 PID 3192 wrote to memory of 4880 3192 cmd.exe 77 PID 3192 wrote to memory of 4880 3192 cmd.exe 77 PID 3192 wrote to memory of 4880 3192 cmd.exe 77 PID 3192 wrote to memory of 2156 3192 cmd.exe 78 PID 3192 wrote to memory of 2156 3192 cmd.exe 78 PID 3192 wrote to memory of 2156 3192 cmd.exe 78 PID 3192 wrote to memory of 3432 3192 cmd.exe 79 PID 3192 wrote to memory of 3432 3192 cmd.exe 79 PID 3192 wrote to memory of 3432 3192 cmd.exe 79 PID 3192 wrote to memory of 2120 3192 cmd.exe 80 PID 3192 wrote to memory of 2120 3192 cmd.exe 80 PID 3192 wrote to memory of 2120 3192 cmd.exe 80 PID 3192 wrote to memory of 3628 3192 cmd.exe 81 PID 3192 wrote to memory of 3628 3192 cmd.exe 81 PID 3192 wrote to memory of 3628 3192 cmd.exe 81 PID 3904 wrote to memory of 4532 3904 oneetx.exe 83 PID 3904 wrote to memory of 4532 3904 oneetx.exe 83 PID 3904 wrote to memory of 4532 3904 oneetx.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9f9889bd28f563ced185dba2abc92d8583e7bd0e4b00c56a925d031b98e9b93.exe"C:\Users\Admin\AppData\Local\Temp\f9f9889bd28f563ced185dba2abc92d8583e7bd0e4b00c56a925d031b98e9b93.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0101107.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0101107.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g5029896.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g5029896.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4236
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4020052.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4020052.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2212
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5625333.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5625333.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4932
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4892
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4880
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:2156
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3432
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:2120
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:3628
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4532
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:304
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:5044
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD5346e93f24226747e70a3c08881d6095c
SHA166a86f7112251e4699f048d944254321d6559dde
SHA2568d96331e33110189ceac0f4eacf102bde9977773ac197b2ad4c5db26bfa94ec7
SHA512a5b0d83fc730be40f84e8470c7f07ab152f59c07b15c4e690101f47577d7970173f33ffb69a2185473a39ed9079834b37f305e51fd768bf0b17d7015930b9cd4
-
Filesize
212KB
MD5346e93f24226747e70a3c08881d6095c
SHA166a86f7112251e4699f048d944254321d6559dde
SHA2568d96331e33110189ceac0f4eacf102bde9977773ac197b2ad4c5db26bfa94ec7
SHA512a5b0d83fc730be40f84e8470c7f07ab152f59c07b15c4e690101f47577d7970173f33ffb69a2185473a39ed9079834b37f305e51fd768bf0b17d7015930b9cd4
-
Filesize
307KB
MD51ced907c0027d8adab9bb744faf307d0
SHA1b8c5dfe7f8a0ba7de45beba43247f8fa41d1e918
SHA2565bd6ea1257e7154f42dfa1c9854e19ff91c29cc8b9ce7538bac6f5a73f318629
SHA51224769b9ccefc425bf04b08b6ce9544309f5cb5076091be438c36168e81b8822608e15b138b415cc2d93e2da9b609490212f36d03de109fffce058036358769e7
-
Filesize
307KB
MD51ced907c0027d8adab9bb744faf307d0
SHA1b8c5dfe7f8a0ba7de45beba43247f8fa41d1e918
SHA2565bd6ea1257e7154f42dfa1c9854e19ff91c29cc8b9ce7538bac6f5a73f318629
SHA51224769b9ccefc425bf04b08b6ce9544309f5cb5076091be438c36168e81b8822608e15b138b415cc2d93e2da9b609490212f36d03de109fffce058036358769e7
-
Filesize
168KB
MD5a298222ab869cb70ce7d4efa1c3d9262
SHA185f4ccbfcecf5b3dc401700d57fa49bed51b35b1
SHA25662be54958d89e5a112f88068fef0294b708a2685866c6609bd37e13fd8bc0496
SHA5123dc446d6e295cdba8dfb3474b19546278c7d802ee0335f1f4b677b80f5237c6e08bb19102c59d6844b53ae27ee93d4327e44883032d6c2e1750db23e2d0767b7
-
Filesize
168KB
MD5a298222ab869cb70ce7d4efa1c3d9262
SHA185f4ccbfcecf5b3dc401700d57fa49bed51b35b1
SHA25662be54958d89e5a112f88068fef0294b708a2685866c6609bd37e13fd8bc0496
SHA5123dc446d6e295cdba8dfb3474b19546278c7d802ee0335f1f4b677b80f5237c6e08bb19102c59d6844b53ae27ee93d4327e44883032d6c2e1750db23e2d0767b7
-
Filesize
182KB
MD577e7db2529a7b26cc4e8ab432f190374
SHA1660407faf0e152e2937b9e26bfab90c405853cc0
SHA256e62b7b0ad31fa5b064b730e1546ce753181ad9d07cd6a1f07773da2ce7ce7621
SHA51238dceff79082d6f208a1213133958a54a3b49f2028496cdf72381057bf6a7ba9ed56b39578044b8d411abb5f35c2e8d10e77ad20948aa9c7ff6d29dbd2a43e0c
-
Filesize
182KB
MD577e7db2529a7b26cc4e8ab432f190374
SHA1660407faf0e152e2937b9e26bfab90c405853cc0
SHA256e62b7b0ad31fa5b064b730e1546ce753181ad9d07cd6a1f07773da2ce7ce7621
SHA51238dceff79082d6f208a1213133958a54a3b49f2028496cdf72381057bf6a7ba9ed56b39578044b8d411abb5f35c2e8d10e77ad20948aa9c7ff6d29dbd2a43e0c
-
Filesize
212KB
MD5346e93f24226747e70a3c08881d6095c
SHA166a86f7112251e4699f048d944254321d6559dde
SHA2568d96331e33110189ceac0f4eacf102bde9977773ac197b2ad4c5db26bfa94ec7
SHA512a5b0d83fc730be40f84e8470c7f07ab152f59c07b15c4e690101f47577d7970173f33ffb69a2185473a39ed9079834b37f305e51fd768bf0b17d7015930b9cd4
-
Filesize
212KB
MD5346e93f24226747e70a3c08881d6095c
SHA166a86f7112251e4699f048d944254321d6559dde
SHA2568d96331e33110189ceac0f4eacf102bde9977773ac197b2ad4c5db26bfa94ec7
SHA512a5b0d83fc730be40f84e8470c7f07ab152f59c07b15c4e690101f47577d7970173f33ffb69a2185473a39ed9079834b37f305e51fd768bf0b17d7015930b9cd4
-
Filesize
212KB
MD5346e93f24226747e70a3c08881d6095c
SHA166a86f7112251e4699f048d944254321d6559dde
SHA2568d96331e33110189ceac0f4eacf102bde9977773ac197b2ad4c5db26bfa94ec7
SHA512a5b0d83fc730be40f84e8470c7f07ab152f59c07b15c4e690101f47577d7970173f33ffb69a2185473a39ed9079834b37f305e51fd768bf0b17d7015930b9cd4
-
Filesize
212KB
MD5346e93f24226747e70a3c08881d6095c
SHA166a86f7112251e4699f048d944254321d6559dde
SHA2568d96331e33110189ceac0f4eacf102bde9977773ac197b2ad4c5db26bfa94ec7
SHA512a5b0d83fc730be40f84e8470c7f07ab152f59c07b15c4e690101f47577d7970173f33ffb69a2185473a39ed9079834b37f305e51fd768bf0b17d7015930b9cd4
-
Filesize
212KB
MD5346e93f24226747e70a3c08881d6095c
SHA166a86f7112251e4699f048d944254321d6559dde
SHA2568d96331e33110189ceac0f4eacf102bde9977773ac197b2ad4c5db26bfa94ec7
SHA512a5b0d83fc730be40f84e8470c7f07ab152f59c07b15c4e690101f47577d7970173f33ffb69a2185473a39ed9079834b37f305e51fd768bf0b17d7015930b9cd4
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53