Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2023 05:38
Static task
static1
Behavioral task
behavioral1
Sample
87dd25b7f1b131d81b0a04566ceba880cc4cb7389fb00b87af42df2ba0dfbdfc.exe
Resource
win10v2004-20230220-en
General
-
Target
87dd25b7f1b131d81b0a04566ceba880cc4cb7389fb00b87af42df2ba0dfbdfc.exe
-
Size
479KB
-
MD5
422433c34a25e8d84f2be2821858b15e
-
SHA1
07d9acbff086971f9b3c6181ef5ed1d121edec8a
-
SHA256
87dd25b7f1b131d81b0a04566ceba880cc4cb7389fb00b87af42df2ba0dfbdfc
-
SHA512
2c5c079143c594a58a49e1ee09859793d0f7fb7049f38f7bfe4e292683dc3b4f6202b6dc3e0e91973d1c1b85728fcbac445cc7bc312c3a564678ecbc3c2f59dc
-
SSDEEP
12288:8MrFy90gixKKEZV4qu++7FSvkUCMaiSCZa819CYrXV+vp:ByziB5BEvAriSW/COgvp
Malware Config
Extracted
redline
mufos
217.196.96.102:4132
-
auth_value
136f202e6569ad5815c34377858a255c
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8636461.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8636461.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a8636461.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8636461.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8636461.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8636461.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation oneetx.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation d2760303.exe -
Executes dropped EXE 7 IoCs
pid Process 1728 v4577142.exe 1428 a8636461.exe 3528 b9574691.exe 116 d2760303.exe 4156 oneetx.exe 3952 oneetx.exe 4332 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4372 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a8636461.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a8636461.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 87dd25b7f1b131d81b0a04566ceba880cc4cb7389fb00b87af42df2ba0dfbdfc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 87dd25b7f1b131d81b0a04566ceba880cc4cb7389fb00b87af42df2ba0dfbdfc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4577142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v4577142.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3972 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1428 a8636461.exe 1428 a8636461.exe 3528 b9574691.exe 3528 b9574691.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1428 a8636461.exe Token: SeDebugPrivilege 3528 b9574691.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 116 d2760303.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1820 wrote to memory of 1728 1820 87dd25b7f1b131d81b0a04566ceba880cc4cb7389fb00b87af42df2ba0dfbdfc.exe 85 PID 1820 wrote to memory of 1728 1820 87dd25b7f1b131d81b0a04566ceba880cc4cb7389fb00b87af42df2ba0dfbdfc.exe 85 PID 1820 wrote to memory of 1728 1820 87dd25b7f1b131d81b0a04566ceba880cc4cb7389fb00b87af42df2ba0dfbdfc.exe 85 PID 1728 wrote to memory of 1428 1728 v4577142.exe 86 PID 1728 wrote to memory of 1428 1728 v4577142.exe 86 PID 1728 wrote to memory of 1428 1728 v4577142.exe 86 PID 1728 wrote to memory of 3528 1728 v4577142.exe 87 PID 1728 wrote to memory of 3528 1728 v4577142.exe 87 PID 1728 wrote to memory of 3528 1728 v4577142.exe 87 PID 1820 wrote to memory of 116 1820 87dd25b7f1b131d81b0a04566ceba880cc4cb7389fb00b87af42df2ba0dfbdfc.exe 88 PID 1820 wrote to memory of 116 1820 87dd25b7f1b131d81b0a04566ceba880cc4cb7389fb00b87af42df2ba0dfbdfc.exe 88 PID 1820 wrote to memory of 116 1820 87dd25b7f1b131d81b0a04566ceba880cc4cb7389fb00b87af42df2ba0dfbdfc.exe 88 PID 116 wrote to memory of 4156 116 d2760303.exe 89 PID 116 wrote to memory of 4156 116 d2760303.exe 89 PID 116 wrote to memory of 4156 116 d2760303.exe 89 PID 4156 wrote to memory of 3972 4156 oneetx.exe 90 PID 4156 wrote to memory of 3972 4156 oneetx.exe 90 PID 4156 wrote to memory of 3972 4156 oneetx.exe 90 PID 4156 wrote to memory of 2660 4156 oneetx.exe 92 PID 4156 wrote to memory of 2660 4156 oneetx.exe 92 PID 4156 wrote to memory of 2660 4156 oneetx.exe 92 PID 2660 wrote to memory of 2972 2660 cmd.exe 94 PID 2660 wrote to memory of 2972 2660 cmd.exe 94 PID 2660 wrote to memory of 2972 2660 cmd.exe 94 PID 2660 wrote to memory of 2784 2660 cmd.exe 95 PID 2660 wrote to memory of 2784 2660 cmd.exe 95 PID 2660 wrote to memory of 2784 2660 cmd.exe 95 PID 2660 wrote to memory of 1560 2660 cmd.exe 96 PID 2660 wrote to memory of 1560 2660 cmd.exe 96 PID 2660 wrote to memory of 1560 2660 cmd.exe 96 PID 2660 wrote to memory of 3144 2660 cmd.exe 97 PID 2660 wrote to memory of 3144 2660 cmd.exe 97 PID 2660 wrote to memory of 3144 2660 cmd.exe 97 PID 2660 wrote to memory of 2296 2660 cmd.exe 98 PID 2660 wrote to memory of 2296 2660 cmd.exe 98 PID 2660 wrote to memory of 2296 2660 cmd.exe 98 PID 2660 wrote to memory of 1736 2660 cmd.exe 99 PID 2660 wrote to memory of 1736 2660 cmd.exe 99 PID 2660 wrote to memory of 1736 2660 cmd.exe 99 PID 4156 wrote to memory of 4372 4156 oneetx.exe 101 PID 4156 wrote to memory of 4372 4156 oneetx.exe 101 PID 4156 wrote to memory of 4372 4156 oneetx.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\87dd25b7f1b131d81b0a04566ceba880cc4cb7389fb00b87af42df2ba0dfbdfc.exe"C:\Users\Admin\AppData\Local\Temp\87dd25b7f1b131d81b0a04566ceba880cc4cb7389fb00b87af42df2ba0dfbdfc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4577142.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4577142.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a8636461.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a8636461.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1428
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b9574691.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b9574691.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3528
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2760303.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2760303.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3972
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2972
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:2784
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:1560
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3144
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:2296
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:1736
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4372
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3952
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4332
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD5d032543e81d05e446638cd8054bdf033
SHA19e1ad2fa32a8b65013bf9cacef6b562bfbfdc4c1
SHA2560c7ba85f2df25c9028c3e352d7a191ee29e6c911db21e60ec4962558195abc97
SHA512abb2c77af436861697fc12fa3008ed537f3844ee2c94b02e9b8f19b27aca50f6cb05cbc8b82a13d16b0f099eb9d2e260f59b56ca98ccaf0d260c7d15988aa3a8
-
Filesize
212KB
MD5d032543e81d05e446638cd8054bdf033
SHA19e1ad2fa32a8b65013bf9cacef6b562bfbfdc4c1
SHA2560c7ba85f2df25c9028c3e352d7a191ee29e6c911db21e60ec4962558195abc97
SHA512abb2c77af436861697fc12fa3008ed537f3844ee2c94b02e9b8f19b27aca50f6cb05cbc8b82a13d16b0f099eb9d2e260f59b56ca98ccaf0d260c7d15988aa3a8
-
Filesize
307KB
MD55282cc9d29821e8f94cf2d6585754d7c
SHA1775b390235da3cb042dcd0c85289bba6a7980979
SHA2562f33b1488bd3248bf20bffb8eb299d5b963e5ac1018e02dd7e7c1794bcbf1022
SHA51287a2859917b482784e837a3b457d2a841fcbbdb80a0bb42b2cb0279b2905d70dc4ddbcee5e0f12e30658be545d08b88034cf2409a743dddbabd345a55bdecf8e
-
Filesize
307KB
MD55282cc9d29821e8f94cf2d6585754d7c
SHA1775b390235da3cb042dcd0c85289bba6a7980979
SHA2562f33b1488bd3248bf20bffb8eb299d5b963e5ac1018e02dd7e7c1794bcbf1022
SHA51287a2859917b482784e837a3b457d2a841fcbbdb80a0bb42b2cb0279b2905d70dc4ddbcee5e0f12e30658be545d08b88034cf2409a743dddbabd345a55bdecf8e
-
Filesize
182KB
MD5392d280d67d96de774f4e233518bf560
SHA13afab91e0579c62428a9f6c6e328c4407cb6860f
SHA25620357f4438e5356023ffa6a7aa14d7d545d94b81f64b333e19b3b22743a04e85
SHA512658ea57f6322d6939c13679c57faa273436fc173f031a89f73b5db7f40b3d9350f2e3f61c2f9809ff461407299844661824554fa47153e6815d39046188c71aa
-
Filesize
182KB
MD5392d280d67d96de774f4e233518bf560
SHA13afab91e0579c62428a9f6c6e328c4407cb6860f
SHA25620357f4438e5356023ffa6a7aa14d7d545d94b81f64b333e19b3b22743a04e85
SHA512658ea57f6322d6939c13679c57faa273436fc173f031a89f73b5db7f40b3d9350f2e3f61c2f9809ff461407299844661824554fa47153e6815d39046188c71aa
-
Filesize
168KB
MD52a8c37d3ad96b3568839978e0d89d899
SHA1dc30e47a661170b98a9b2c882d6479c8058e8921
SHA25681fd8706a03ffdfe1aae4c9a59e27ba31ccfcd5ac3452c721711f9997903e708
SHA51270dce79a873f28655010ac2f9c5e2b47d8153138f512c8be0ef9ba10165af94e59e3d7fb4cac36d6ee4b761954cf012b81fa62a9d6294d825d9098aa9a85fdf9
-
Filesize
168KB
MD52a8c37d3ad96b3568839978e0d89d899
SHA1dc30e47a661170b98a9b2c882d6479c8058e8921
SHA25681fd8706a03ffdfe1aae4c9a59e27ba31ccfcd5ac3452c721711f9997903e708
SHA51270dce79a873f28655010ac2f9c5e2b47d8153138f512c8be0ef9ba10165af94e59e3d7fb4cac36d6ee4b761954cf012b81fa62a9d6294d825d9098aa9a85fdf9
-
Filesize
212KB
MD5d032543e81d05e446638cd8054bdf033
SHA19e1ad2fa32a8b65013bf9cacef6b562bfbfdc4c1
SHA2560c7ba85f2df25c9028c3e352d7a191ee29e6c911db21e60ec4962558195abc97
SHA512abb2c77af436861697fc12fa3008ed537f3844ee2c94b02e9b8f19b27aca50f6cb05cbc8b82a13d16b0f099eb9d2e260f59b56ca98ccaf0d260c7d15988aa3a8
-
Filesize
212KB
MD5d032543e81d05e446638cd8054bdf033
SHA19e1ad2fa32a8b65013bf9cacef6b562bfbfdc4c1
SHA2560c7ba85f2df25c9028c3e352d7a191ee29e6c911db21e60ec4962558195abc97
SHA512abb2c77af436861697fc12fa3008ed537f3844ee2c94b02e9b8f19b27aca50f6cb05cbc8b82a13d16b0f099eb9d2e260f59b56ca98ccaf0d260c7d15988aa3a8
-
Filesize
212KB
MD5d032543e81d05e446638cd8054bdf033
SHA19e1ad2fa32a8b65013bf9cacef6b562bfbfdc4c1
SHA2560c7ba85f2df25c9028c3e352d7a191ee29e6c911db21e60ec4962558195abc97
SHA512abb2c77af436861697fc12fa3008ed537f3844ee2c94b02e9b8f19b27aca50f6cb05cbc8b82a13d16b0f099eb9d2e260f59b56ca98ccaf0d260c7d15988aa3a8
-
Filesize
212KB
MD5d032543e81d05e446638cd8054bdf033
SHA19e1ad2fa32a8b65013bf9cacef6b562bfbfdc4c1
SHA2560c7ba85f2df25c9028c3e352d7a191ee29e6c911db21e60ec4962558195abc97
SHA512abb2c77af436861697fc12fa3008ed537f3844ee2c94b02e9b8f19b27aca50f6cb05cbc8b82a13d16b0f099eb9d2e260f59b56ca98ccaf0d260c7d15988aa3a8
-
Filesize
212KB
MD5d032543e81d05e446638cd8054bdf033
SHA19e1ad2fa32a8b65013bf9cacef6b562bfbfdc4c1
SHA2560c7ba85f2df25c9028c3e352d7a191ee29e6c911db21e60ec4962558195abc97
SHA512abb2c77af436861697fc12fa3008ed537f3844ee2c94b02e9b8f19b27aca50f6cb05cbc8b82a13d16b0f099eb9d2e260f59b56ca98ccaf0d260c7d15988aa3a8
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5