Analysis

  • max time kernel
    142s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/05/2023, 04:47

General

  • Target

    7f773390a8f3e96fa13829d21cc9bef653da19873796eccf33c8fee622da65d3.exe

  • Size

    479KB

  • MD5

    be4a1d532708854d10e232f12c78f319

  • SHA1

    3e9bf7d2ba6c1ad824ee5b6b07342b3a2b428b21

  • SHA256

    7f773390a8f3e96fa13829d21cc9bef653da19873796eccf33c8fee622da65d3

  • SHA512

    3db8f4814e50d599ae868c63eebf3d3b12178ec9c307d5987c860a4e429c225314454e8a6840b16db5d7ceb0d441c8c427013e13d29927ecc58f76eb740f46a2

  • SSDEEP

    12288:RMrVy90bO3q9p7rkKA7NN+kiB29zDHCN:UyUDU/NauDiN

Malware Config

Extracted

Family

redline

Botnet

mufos

C2

217.196.96.102:4132

Attributes
  • auth_value

    136f202e6569ad5815c34377858a255c

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f773390a8f3e96fa13829d21cc9bef653da19873796eccf33c8fee622da65d3.exe
    "C:\Users\Admin\AppData\Local\Temp\7f773390a8f3e96fa13829d21cc9bef653da19873796eccf33c8fee622da65d3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4628
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9715456.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9715456.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4608
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a3056227.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a3056227.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4908
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b4804026.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b4804026.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3460
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8877147.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8877147.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4132
      • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3324
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:3248
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1888
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:2660
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:N"
              5⤵
                PID:2808
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                5⤵
                  PID:2724
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:4512
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\c3912af058" /P "Admin:N"
                    5⤵
                      PID:1476
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\c3912af058" /P "Admin:R" /E
                      5⤵
                        PID:4624
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:4400
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:392
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:1972
              • C:\Windows\system32\sc.exe
                C:\Windows\system32\sc.exe start wuauserv
                1⤵
                • Launches sc.exe
                PID:1660

              Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8877147.exe

                      Filesize

                      212KB

                      MD5

                      13e027aaf79e8009a61e00273dee4b88

                      SHA1

                      adb320d0613247ecdf78f49c97cdea9a0f35f669

                      SHA256

                      25407ab8a054a5a76bb07a3fbcf471d0e8ca2d98d775d5f73a148d6cd15aa67e

                      SHA512

                      dfa472094f4fb5904fcf1cd0460e5bbdd16897d2041a7cd4e65861d2b6082d952aa4541e956b65b474a3a730a873802815b0cd034832359f0aba95d1c919980e

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8877147.exe

                      Filesize

                      212KB

                      MD5

                      13e027aaf79e8009a61e00273dee4b88

                      SHA1

                      adb320d0613247ecdf78f49c97cdea9a0f35f669

                      SHA256

                      25407ab8a054a5a76bb07a3fbcf471d0e8ca2d98d775d5f73a148d6cd15aa67e

                      SHA512

                      dfa472094f4fb5904fcf1cd0460e5bbdd16897d2041a7cd4e65861d2b6082d952aa4541e956b65b474a3a730a873802815b0cd034832359f0aba95d1c919980e

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9715456.exe

                      Filesize

                      307KB

                      MD5

                      333067dc5b30957e0c307135d8a2476f

                      SHA1

                      4440bbc5578049e11d4dcfcab27607dba2ad76ce

                      SHA256

                      a4025993c76b3e7383fd3e3d94b375bc07c0a6912b5e6dcb103776940ff49d47

                      SHA512

                      eb4d939348efda0761aedd9883d7140ff53a0e1fcc0a93ab36121124ac3a73cff2d1a2a6930474cd041d9d66e429f98774efaf3e9a7dae7922408707cc1036b1

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9715456.exe

                      Filesize

                      307KB

                      MD5

                      333067dc5b30957e0c307135d8a2476f

                      SHA1

                      4440bbc5578049e11d4dcfcab27607dba2ad76ce

                      SHA256

                      a4025993c76b3e7383fd3e3d94b375bc07c0a6912b5e6dcb103776940ff49d47

                      SHA512

                      eb4d939348efda0761aedd9883d7140ff53a0e1fcc0a93ab36121124ac3a73cff2d1a2a6930474cd041d9d66e429f98774efaf3e9a7dae7922408707cc1036b1

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a3056227.exe

                      Filesize

                      182KB

                      MD5

                      9bc526f2c51fa798a886be1b924cf44c

                      SHA1

                      8f782f37a0f9bb2bc954d46cd2bbc6ec6da2b9c6

                      SHA256

                      af26c3f47a620d762d1298b34d80bc8d4b1ab2059dbf5d412557e747e8ae137a

                      SHA512

                      b7abe18e6808d2ec987e4a2031a422d8006dbf040be7f7de22ca91b1b5aa4c531e7cc961382cfa5d95cc6018ed6d6f7c02e70944576ab8cb0a8dcc7c14b3ed54

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a3056227.exe

                      Filesize

                      182KB

                      MD5

                      9bc526f2c51fa798a886be1b924cf44c

                      SHA1

                      8f782f37a0f9bb2bc954d46cd2bbc6ec6da2b9c6

                      SHA256

                      af26c3f47a620d762d1298b34d80bc8d4b1ab2059dbf5d412557e747e8ae137a

                      SHA512

                      b7abe18e6808d2ec987e4a2031a422d8006dbf040be7f7de22ca91b1b5aa4c531e7cc961382cfa5d95cc6018ed6d6f7c02e70944576ab8cb0a8dcc7c14b3ed54

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b4804026.exe

                      Filesize

                      168KB

                      MD5

                      1105c07ec106ade4dd16a7206ca8c68c

                      SHA1

                      83e9d9ff2bd76a064a41b5c337c49cde0a458a39

                      SHA256

                      eec22791c6d73b0d2dc6842012af05bca22cb69b6b27b72d6bc31bc2b9ab9efa

                      SHA512

                      2fdd3128084e20d943ef569f6e9afe474b7dd262752d00410d51cac95ae1e24ef6397cd35b94bfc1d2128239132a6a3dcc92a5a370014f89eb1e413e2d69475a

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b4804026.exe

                      Filesize

                      168KB

                      MD5

                      1105c07ec106ade4dd16a7206ca8c68c

                      SHA1

                      83e9d9ff2bd76a064a41b5c337c49cde0a458a39

                      SHA256

                      eec22791c6d73b0d2dc6842012af05bca22cb69b6b27b72d6bc31bc2b9ab9efa

                      SHA512

                      2fdd3128084e20d943ef569f6e9afe474b7dd262752d00410d51cac95ae1e24ef6397cd35b94bfc1d2128239132a6a3dcc92a5a370014f89eb1e413e2d69475a

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      212KB

                      MD5

                      13e027aaf79e8009a61e00273dee4b88

                      SHA1

                      adb320d0613247ecdf78f49c97cdea9a0f35f669

                      SHA256

                      25407ab8a054a5a76bb07a3fbcf471d0e8ca2d98d775d5f73a148d6cd15aa67e

                      SHA512

                      dfa472094f4fb5904fcf1cd0460e5bbdd16897d2041a7cd4e65861d2b6082d952aa4541e956b65b474a3a730a873802815b0cd034832359f0aba95d1c919980e

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      212KB

                      MD5

                      13e027aaf79e8009a61e00273dee4b88

                      SHA1

                      adb320d0613247ecdf78f49c97cdea9a0f35f669

                      SHA256

                      25407ab8a054a5a76bb07a3fbcf471d0e8ca2d98d775d5f73a148d6cd15aa67e

                      SHA512

                      dfa472094f4fb5904fcf1cd0460e5bbdd16897d2041a7cd4e65861d2b6082d952aa4541e956b65b474a3a730a873802815b0cd034832359f0aba95d1c919980e

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      212KB

                      MD5

                      13e027aaf79e8009a61e00273dee4b88

                      SHA1

                      adb320d0613247ecdf78f49c97cdea9a0f35f669

                      SHA256

                      25407ab8a054a5a76bb07a3fbcf471d0e8ca2d98d775d5f73a148d6cd15aa67e

                      SHA512

                      dfa472094f4fb5904fcf1cd0460e5bbdd16897d2041a7cd4e65861d2b6082d952aa4541e956b65b474a3a730a873802815b0cd034832359f0aba95d1c919980e

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      212KB

                      MD5

                      13e027aaf79e8009a61e00273dee4b88

                      SHA1

                      adb320d0613247ecdf78f49c97cdea9a0f35f669

                      SHA256

                      25407ab8a054a5a76bb07a3fbcf471d0e8ca2d98d775d5f73a148d6cd15aa67e

                      SHA512

                      dfa472094f4fb5904fcf1cd0460e5bbdd16897d2041a7cd4e65861d2b6082d952aa4541e956b65b474a3a730a873802815b0cd034832359f0aba95d1c919980e

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      212KB

                      MD5

                      13e027aaf79e8009a61e00273dee4b88

                      SHA1

                      adb320d0613247ecdf78f49c97cdea9a0f35f669

                      SHA256

                      25407ab8a054a5a76bb07a3fbcf471d0e8ca2d98d775d5f73a148d6cd15aa67e

                      SHA512

                      dfa472094f4fb5904fcf1cd0460e5bbdd16897d2041a7cd4e65861d2b6082d952aa4541e956b65b474a3a730a873802815b0cd034832359f0aba95d1c919980e

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      8451a2c5daa42b25333b1b2089c5ea39

                      SHA1

                      700cc99ec8d3113435e657070d2d6bde0a833adc

                      SHA256

                      b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                      SHA512

                      6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      8451a2c5daa42b25333b1b2089c5ea39

                      SHA1

                      700cc99ec8d3113435e657070d2d6bde0a833adc

                      SHA256

                      b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                      SHA512

                      6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      8451a2c5daa42b25333b1b2089c5ea39

                      SHA1

                      700cc99ec8d3113435e657070d2d6bde0a833adc

                      SHA256

                      b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                      SHA512

                      6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                      Filesize

                      162B

                      MD5

                      1b7c22a214949975556626d7217e9a39

                      SHA1

                      d01c97e2944166ed23e47e4a62ff471ab8fa031f

                      SHA256

                      340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                      SHA512

                      ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                    • memory/3460-197-0x000000000BD30000-0x000000000BEF2000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/3460-188-0x000000000A2F0000-0x000000000A3FA000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/3460-198-0x000000000C430000-0x000000000C95C000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/3460-196-0x000000000B410000-0x000000000B460000-memory.dmp

                      Filesize

                      320KB

                    • memory/3460-195-0x000000000AEC0000-0x000000000AF26000-memory.dmp

                      Filesize

                      408KB

                    • memory/3460-194-0x000000000AF60000-0x000000000AFF2000-memory.dmp

                      Filesize

                      584KB

                    • memory/3460-193-0x000000000AE40000-0x000000000AEB6000-memory.dmp

                      Filesize

                      472KB

                    • memory/3460-192-0x0000000004BF0000-0x0000000004C00000-memory.dmp

                      Filesize

                      64KB

                    • memory/3460-191-0x0000000004BF0000-0x0000000004C00000-memory.dmp

                      Filesize

                      64KB

                    • memory/3460-190-0x000000000A280000-0x000000000A2BC000-memory.dmp

                      Filesize

                      240KB

                    • memory/3460-189-0x000000000A220000-0x000000000A232000-memory.dmp

                      Filesize

                      72KB

                    • memory/3460-186-0x0000000000370000-0x000000000039E000-memory.dmp

                      Filesize

                      184KB

                    • memory/3460-187-0x000000000A7A0000-0x000000000ADB8000-memory.dmp

                      Filesize

                      6.1MB

                    • memory/4908-168-0x0000000004A90000-0x0000000004AA2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4908-162-0x0000000004A90000-0x0000000004AA2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4908-170-0x0000000004A90000-0x0000000004AA2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4908-181-0x0000000004C00000-0x0000000004C10000-memory.dmp

                      Filesize

                      64KB

                    • memory/4908-180-0x0000000004C00000-0x0000000004C10000-memory.dmp

                      Filesize

                      64KB

                    • memory/4908-179-0x0000000004C00000-0x0000000004C10000-memory.dmp

                      Filesize

                      64KB

                    • memory/4908-178-0x0000000004A90000-0x0000000004AA2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4908-176-0x0000000004A90000-0x0000000004AA2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4908-174-0x0000000004A90000-0x0000000004AA2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4908-164-0x0000000004A90000-0x0000000004AA2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4908-172-0x0000000004A90000-0x0000000004AA2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4908-166-0x0000000004A90000-0x0000000004AA2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4908-160-0x0000000004A90000-0x0000000004AA2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4908-158-0x0000000004A90000-0x0000000004AA2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4908-156-0x0000000004A90000-0x0000000004AA2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4908-154-0x0000000004A90000-0x0000000004AA2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4908-152-0x0000000004A90000-0x0000000004AA2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4908-151-0x0000000004A90000-0x0000000004AA2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4908-150-0x0000000004C00000-0x0000000004C10000-memory.dmp

                      Filesize

                      64KB

                    • memory/4908-149-0x0000000004C00000-0x0000000004C10000-memory.dmp

                      Filesize

                      64KB

                    • memory/4908-148-0x0000000004C00000-0x0000000004C10000-memory.dmp

                      Filesize

                      64KB

                    • memory/4908-147-0x0000000004C10000-0x00000000051B4000-memory.dmp

                      Filesize

                      5.6MB