Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2023, 04:47
Static task
static1
Behavioral task
behavioral1
Sample
7f773390a8f3e96fa13829d21cc9bef653da19873796eccf33c8fee622da65d3.exe
Resource
win10v2004-20230220-en
General
-
Target
7f773390a8f3e96fa13829d21cc9bef653da19873796eccf33c8fee622da65d3.exe
-
Size
479KB
-
MD5
be4a1d532708854d10e232f12c78f319
-
SHA1
3e9bf7d2ba6c1ad824ee5b6b07342b3a2b428b21
-
SHA256
7f773390a8f3e96fa13829d21cc9bef653da19873796eccf33c8fee622da65d3
-
SHA512
3db8f4814e50d599ae868c63eebf3d3b12178ec9c307d5987c860a4e429c225314454e8a6840b16db5d7ceb0d441c8c427013e13d29927ecc58f76eb740f46a2
-
SSDEEP
12288:RMrVy90bO3q9p7rkKA7NN+kiB29zDHCN:UyUDU/NauDiN
Malware Config
Extracted
redline
mufos
217.196.96.102:4132
-
auth_value
136f202e6569ad5815c34377858a255c
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a3056227.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a3056227.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a3056227.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a3056227.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a3056227.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a3056227.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation d8877147.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 4608 v9715456.exe 4908 a3056227.exe 3460 b4804026.exe 4132 d8877147.exe 3324 oneetx.exe 392 oneetx.exe 1972 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4400 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a3056227.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a3056227.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 7f773390a8f3e96fa13829d21cc9bef653da19873796eccf33c8fee622da65d3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7f773390a8f3e96fa13829d21cc9bef653da19873796eccf33c8fee622da65d3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v9715456.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v9715456.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1660 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3248 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4908 a3056227.exe 4908 a3056227.exe 3460 b4804026.exe 3460 b4804026.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4908 a3056227.exe Token: SeDebugPrivilege 3460 b4804026.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4132 d8877147.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4628 wrote to memory of 4608 4628 7f773390a8f3e96fa13829d21cc9bef653da19873796eccf33c8fee622da65d3.exe 84 PID 4628 wrote to memory of 4608 4628 7f773390a8f3e96fa13829d21cc9bef653da19873796eccf33c8fee622da65d3.exe 84 PID 4628 wrote to memory of 4608 4628 7f773390a8f3e96fa13829d21cc9bef653da19873796eccf33c8fee622da65d3.exe 84 PID 4608 wrote to memory of 4908 4608 v9715456.exe 85 PID 4608 wrote to memory of 4908 4608 v9715456.exe 85 PID 4608 wrote to memory of 4908 4608 v9715456.exe 85 PID 4608 wrote to memory of 3460 4608 v9715456.exe 89 PID 4608 wrote to memory of 3460 4608 v9715456.exe 89 PID 4608 wrote to memory of 3460 4608 v9715456.exe 89 PID 4628 wrote to memory of 4132 4628 7f773390a8f3e96fa13829d21cc9bef653da19873796eccf33c8fee622da65d3.exe 91 PID 4628 wrote to memory of 4132 4628 7f773390a8f3e96fa13829d21cc9bef653da19873796eccf33c8fee622da65d3.exe 91 PID 4628 wrote to memory of 4132 4628 7f773390a8f3e96fa13829d21cc9bef653da19873796eccf33c8fee622da65d3.exe 91 PID 4132 wrote to memory of 3324 4132 d8877147.exe 92 PID 4132 wrote to memory of 3324 4132 d8877147.exe 92 PID 4132 wrote to memory of 3324 4132 d8877147.exe 92 PID 3324 wrote to memory of 3248 3324 oneetx.exe 93 PID 3324 wrote to memory of 3248 3324 oneetx.exe 93 PID 3324 wrote to memory of 3248 3324 oneetx.exe 93 PID 3324 wrote to memory of 1888 3324 oneetx.exe 95 PID 3324 wrote to memory of 1888 3324 oneetx.exe 95 PID 3324 wrote to memory of 1888 3324 oneetx.exe 95 PID 1888 wrote to memory of 2660 1888 cmd.exe 97 PID 1888 wrote to memory of 2660 1888 cmd.exe 97 PID 1888 wrote to memory of 2660 1888 cmd.exe 97 PID 1888 wrote to memory of 2808 1888 cmd.exe 98 PID 1888 wrote to memory of 2808 1888 cmd.exe 98 PID 1888 wrote to memory of 2808 1888 cmd.exe 98 PID 1888 wrote to memory of 2724 1888 cmd.exe 99 PID 1888 wrote to memory of 2724 1888 cmd.exe 99 PID 1888 wrote to memory of 2724 1888 cmd.exe 99 PID 1888 wrote to memory of 4512 1888 cmd.exe 100 PID 1888 wrote to memory of 4512 1888 cmd.exe 100 PID 1888 wrote to memory of 4512 1888 cmd.exe 100 PID 1888 wrote to memory of 1476 1888 cmd.exe 101 PID 1888 wrote to memory of 1476 1888 cmd.exe 101 PID 1888 wrote to memory of 1476 1888 cmd.exe 101 PID 1888 wrote to memory of 4624 1888 cmd.exe 102 PID 1888 wrote to memory of 4624 1888 cmd.exe 102 PID 1888 wrote to memory of 4624 1888 cmd.exe 102 PID 3324 wrote to memory of 4400 3324 oneetx.exe 108 PID 3324 wrote to memory of 4400 3324 oneetx.exe 108 PID 3324 wrote to memory of 4400 3324 oneetx.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f773390a8f3e96fa13829d21cc9bef653da19873796eccf33c8fee622da65d3.exe"C:\Users\Admin\AppData\Local\Temp\7f773390a8f3e96fa13829d21cc9bef653da19873796eccf33c8fee622da65d3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9715456.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9715456.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a3056227.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a3056227.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4908
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b4804026.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b4804026.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3460
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8877147.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8877147.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3248
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2660
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:2808
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:2724
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4512
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:1476
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:4624
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4400
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:392
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1972
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1660
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD513e027aaf79e8009a61e00273dee4b88
SHA1adb320d0613247ecdf78f49c97cdea9a0f35f669
SHA25625407ab8a054a5a76bb07a3fbcf471d0e8ca2d98d775d5f73a148d6cd15aa67e
SHA512dfa472094f4fb5904fcf1cd0460e5bbdd16897d2041a7cd4e65861d2b6082d952aa4541e956b65b474a3a730a873802815b0cd034832359f0aba95d1c919980e
-
Filesize
212KB
MD513e027aaf79e8009a61e00273dee4b88
SHA1adb320d0613247ecdf78f49c97cdea9a0f35f669
SHA25625407ab8a054a5a76bb07a3fbcf471d0e8ca2d98d775d5f73a148d6cd15aa67e
SHA512dfa472094f4fb5904fcf1cd0460e5bbdd16897d2041a7cd4e65861d2b6082d952aa4541e956b65b474a3a730a873802815b0cd034832359f0aba95d1c919980e
-
Filesize
307KB
MD5333067dc5b30957e0c307135d8a2476f
SHA14440bbc5578049e11d4dcfcab27607dba2ad76ce
SHA256a4025993c76b3e7383fd3e3d94b375bc07c0a6912b5e6dcb103776940ff49d47
SHA512eb4d939348efda0761aedd9883d7140ff53a0e1fcc0a93ab36121124ac3a73cff2d1a2a6930474cd041d9d66e429f98774efaf3e9a7dae7922408707cc1036b1
-
Filesize
307KB
MD5333067dc5b30957e0c307135d8a2476f
SHA14440bbc5578049e11d4dcfcab27607dba2ad76ce
SHA256a4025993c76b3e7383fd3e3d94b375bc07c0a6912b5e6dcb103776940ff49d47
SHA512eb4d939348efda0761aedd9883d7140ff53a0e1fcc0a93ab36121124ac3a73cff2d1a2a6930474cd041d9d66e429f98774efaf3e9a7dae7922408707cc1036b1
-
Filesize
182KB
MD59bc526f2c51fa798a886be1b924cf44c
SHA18f782f37a0f9bb2bc954d46cd2bbc6ec6da2b9c6
SHA256af26c3f47a620d762d1298b34d80bc8d4b1ab2059dbf5d412557e747e8ae137a
SHA512b7abe18e6808d2ec987e4a2031a422d8006dbf040be7f7de22ca91b1b5aa4c531e7cc961382cfa5d95cc6018ed6d6f7c02e70944576ab8cb0a8dcc7c14b3ed54
-
Filesize
182KB
MD59bc526f2c51fa798a886be1b924cf44c
SHA18f782f37a0f9bb2bc954d46cd2bbc6ec6da2b9c6
SHA256af26c3f47a620d762d1298b34d80bc8d4b1ab2059dbf5d412557e747e8ae137a
SHA512b7abe18e6808d2ec987e4a2031a422d8006dbf040be7f7de22ca91b1b5aa4c531e7cc961382cfa5d95cc6018ed6d6f7c02e70944576ab8cb0a8dcc7c14b3ed54
-
Filesize
168KB
MD51105c07ec106ade4dd16a7206ca8c68c
SHA183e9d9ff2bd76a064a41b5c337c49cde0a458a39
SHA256eec22791c6d73b0d2dc6842012af05bca22cb69b6b27b72d6bc31bc2b9ab9efa
SHA5122fdd3128084e20d943ef569f6e9afe474b7dd262752d00410d51cac95ae1e24ef6397cd35b94bfc1d2128239132a6a3dcc92a5a370014f89eb1e413e2d69475a
-
Filesize
168KB
MD51105c07ec106ade4dd16a7206ca8c68c
SHA183e9d9ff2bd76a064a41b5c337c49cde0a458a39
SHA256eec22791c6d73b0d2dc6842012af05bca22cb69b6b27b72d6bc31bc2b9ab9efa
SHA5122fdd3128084e20d943ef569f6e9afe474b7dd262752d00410d51cac95ae1e24ef6397cd35b94bfc1d2128239132a6a3dcc92a5a370014f89eb1e413e2d69475a
-
Filesize
212KB
MD513e027aaf79e8009a61e00273dee4b88
SHA1adb320d0613247ecdf78f49c97cdea9a0f35f669
SHA25625407ab8a054a5a76bb07a3fbcf471d0e8ca2d98d775d5f73a148d6cd15aa67e
SHA512dfa472094f4fb5904fcf1cd0460e5bbdd16897d2041a7cd4e65861d2b6082d952aa4541e956b65b474a3a730a873802815b0cd034832359f0aba95d1c919980e
-
Filesize
212KB
MD513e027aaf79e8009a61e00273dee4b88
SHA1adb320d0613247ecdf78f49c97cdea9a0f35f669
SHA25625407ab8a054a5a76bb07a3fbcf471d0e8ca2d98d775d5f73a148d6cd15aa67e
SHA512dfa472094f4fb5904fcf1cd0460e5bbdd16897d2041a7cd4e65861d2b6082d952aa4541e956b65b474a3a730a873802815b0cd034832359f0aba95d1c919980e
-
Filesize
212KB
MD513e027aaf79e8009a61e00273dee4b88
SHA1adb320d0613247ecdf78f49c97cdea9a0f35f669
SHA25625407ab8a054a5a76bb07a3fbcf471d0e8ca2d98d775d5f73a148d6cd15aa67e
SHA512dfa472094f4fb5904fcf1cd0460e5bbdd16897d2041a7cd4e65861d2b6082d952aa4541e956b65b474a3a730a873802815b0cd034832359f0aba95d1c919980e
-
Filesize
212KB
MD513e027aaf79e8009a61e00273dee4b88
SHA1adb320d0613247ecdf78f49c97cdea9a0f35f669
SHA25625407ab8a054a5a76bb07a3fbcf471d0e8ca2d98d775d5f73a148d6cd15aa67e
SHA512dfa472094f4fb5904fcf1cd0460e5bbdd16897d2041a7cd4e65861d2b6082d952aa4541e956b65b474a3a730a873802815b0cd034832359f0aba95d1c919980e
-
Filesize
212KB
MD513e027aaf79e8009a61e00273dee4b88
SHA1adb320d0613247ecdf78f49c97cdea9a0f35f669
SHA25625407ab8a054a5a76bb07a3fbcf471d0e8ca2d98d775d5f73a148d6cd15aa67e
SHA512dfa472094f4fb5904fcf1cd0460e5bbdd16897d2041a7cd4e65861d2b6082d952aa4541e956b65b474a3a730a873802815b0cd034832359f0aba95d1c919980e
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5