Analysis
-
max time kernel
128s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2023, 06:11
Static task
static1
Behavioral task
behavioral1
Sample
1baeb24fef83cecc8f0d475d96006ede.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1baeb24fef83cecc8f0d475d96006ede.exe
Resource
win10v2004-20230220-en
General
-
Target
1baeb24fef83cecc8f0d475d96006ede.exe
-
Size
479KB
-
MD5
1baeb24fef83cecc8f0d475d96006ede
-
SHA1
1347b3fe22d3e5a5843af3a700948660fcecdebd
-
SHA256
f984811ca20f0022a21840ccd29a68b8a39d44569b4ecdb9634405e4f404af57
-
SHA512
d90d324deca75dc3b7b4af281992db9305e9dc92c3091a7766be31ef64bcf7c7a4d841f5a8f3996fcab62213dc6bdf92da0a91392a433efe382cace229d482dc
-
SSDEEP
12288:xMriy90mr5H8fcI2TKjvaAJRplmiKYhuma8+ep:PyDr5H8UI2T6THmiFhhp
Malware Config
Extracted
redline
divan
217.196.96.102:4132
-
auth_value
b414986bebd7f5a3ec9aee0341b8e769
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k9342017.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k9342017.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k9342017.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k9342017.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k9342017.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k9342017.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation m4055537.exe Key value queried \REGISTRY\USER\S-1-5-21-4238149048-355649189-894321705-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 6 IoCs
pid Process 4224 y3036201.exe 2852 k9342017.exe 4092 l9633662.exe 4424 m4055537.exe 1268 oneetx.exe 868 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4400 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k9342017.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k9342017.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y3036201.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y3036201.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1baeb24fef83cecc8f0d475d96006ede.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1baeb24fef83cecc8f0d475d96006ede.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4084 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2852 k9342017.exe 2852 k9342017.exe 4092 l9633662.exe 4092 l9633662.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2852 k9342017.exe Token: SeDebugPrivilege 4092 l9633662.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4424 m4055537.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2272 wrote to memory of 4224 2272 1baeb24fef83cecc8f0d475d96006ede.exe 83 PID 2272 wrote to memory of 4224 2272 1baeb24fef83cecc8f0d475d96006ede.exe 83 PID 2272 wrote to memory of 4224 2272 1baeb24fef83cecc8f0d475d96006ede.exe 83 PID 4224 wrote to memory of 2852 4224 y3036201.exe 84 PID 4224 wrote to memory of 2852 4224 y3036201.exe 84 PID 4224 wrote to memory of 2852 4224 y3036201.exe 84 PID 4224 wrote to memory of 4092 4224 y3036201.exe 89 PID 4224 wrote to memory of 4092 4224 y3036201.exe 89 PID 4224 wrote to memory of 4092 4224 y3036201.exe 89 PID 2272 wrote to memory of 4424 2272 1baeb24fef83cecc8f0d475d96006ede.exe 94 PID 2272 wrote to memory of 4424 2272 1baeb24fef83cecc8f0d475d96006ede.exe 94 PID 2272 wrote to memory of 4424 2272 1baeb24fef83cecc8f0d475d96006ede.exe 94 PID 4424 wrote to memory of 1268 4424 m4055537.exe 95 PID 4424 wrote to memory of 1268 4424 m4055537.exe 95 PID 4424 wrote to memory of 1268 4424 m4055537.exe 95 PID 1268 wrote to memory of 4084 1268 oneetx.exe 96 PID 1268 wrote to memory of 4084 1268 oneetx.exe 96 PID 1268 wrote to memory of 4084 1268 oneetx.exe 96 PID 1268 wrote to memory of 3396 1268 oneetx.exe 98 PID 1268 wrote to memory of 3396 1268 oneetx.exe 98 PID 1268 wrote to memory of 3396 1268 oneetx.exe 98 PID 3396 wrote to memory of 5064 3396 cmd.exe 100 PID 3396 wrote to memory of 5064 3396 cmd.exe 100 PID 3396 wrote to memory of 5064 3396 cmd.exe 100 PID 3396 wrote to memory of 4008 3396 cmd.exe 101 PID 3396 wrote to memory of 4008 3396 cmd.exe 101 PID 3396 wrote to memory of 4008 3396 cmd.exe 101 PID 3396 wrote to memory of 3912 3396 cmd.exe 102 PID 3396 wrote to memory of 3912 3396 cmd.exe 102 PID 3396 wrote to memory of 3912 3396 cmd.exe 102 PID 3396 wrote to memory of 1188 3396 cmd.exe 103 PID 3396 wrote to memory of 1188 3396 cmd.exe 103 PID 3396 wrote to memory of 1188 3396 cmd.exe 103 PID 3396 wrote to memory of 1168 3396 cmd.exe 104 PID 3396 wrote to memory of 1168 3396 cmd.exe 104 PID 3396 wrote to memory of 1168 3396 cmd.exe 104 PID 3396 wrote to memory of 1680 3396 cmd.exe 105 PID 3396 wrote to memory of 1680 3396 cmd.exe 105 PID 3396 wrote to memory of 1680 3396 cmd.exe 105 PID 1268 wrote to memory of 4400 1268 oneetx.exe 107 PID 1268 wrote to memory of 4400 1268 oneetx.exe 107 PID 1268 wrote to memory of 4400 1268 oneetx.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\1baeb24fef83cecc8f0d475d96006ede.exe"C:\Users\Admin\AppData\Local\Temp\1baeb24fef83cecc8f0d475d96006ede.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3036201.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3036201.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9342017.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9342017.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9633662.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l9633662.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4092
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m4055537.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m4055537.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4084
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:5064
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4008
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3912
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1188
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:1168
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:1680
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4400
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:868
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD56b7e9c712841ae8b5f78e8cbb63042df
SHA1cd9f715d9bdbc0059e460573425ab8db098a5061
SHA256093c6783b9a8ca57f0c07ca2dc8942a0d8994d43cc0d33b705a8db322f74c5dc
SHA512cceac8486292565dbaa12d887c9711860afa03dd831cc061c92c769e664159833db1ce72a7f51d91c8a75245dead437b0c904fca46ab1555b3716cbb7b9335d3
-
Filesize
212KB
MD56b7e9c712841ae8b5f78e8cbb63042df
SHA1cd9f715d9bdbc0059e460573425ab8db098a5061
SHA256093c6783b9a8ca57f0c07ca2dc8942a0d8994d43cc0d33b705a8db322f74c5dc
SHA512cceac8486292565dbaa12d887c9711860afa03dd831cc061c92c769e664159833db1ce72a7f51d91c8a75245dead437b0c904fca46ab1555b3716cbb7b9335d3
-
Filesize
307KB
MD5f6462ed4f0436a33c0324c38dd036288
SHA1eaaa5a5b2b1eef6b8f06b5b76e8873ca78af4c65
SHA256cb564203a88e5bda33e34a47a852727cccef67a5519331f4d940b86e73fce997
SHA51220eedc2d09c9c37f2fae27883acefce53e33280b2ee364b42f5cc1de417ec0a5013cdd6b00d4dda7edfb3079cd356bdfcab53a3f7c5b5d7b335ed5b9a058271a
-
Filesize
307KB
MD5f6462ed4f0436a33c0324c38dd036288
SHA1eaaa5a5b2b1eef6b8f06b5b76e8873ca78af4c65
SHA256cb564203a88e5bda33e34a47a852727cccef67a5519331f4d940b86e73fce997
SHA51220eedc2d09c9c37f2fae27883acefce53e33280b2ee364b42f5cc1de417ec0a5013cdd6b00d4dda7edfb3079cd356bdfcab53a3f7c5b5d7b335ed5b9a058271a
-
Filesize
181KB
MD5bcd64ef954f64cb84edad3bc6bc70556
SHA11db745dec7f088845e0f383c7e3222cdb078fb23
SHA256d9545c9fafb4852932f5c89e46aaf54298baea05b6ec3d8a5046024f3b1bb9b4
SHA5125a7771f17d505cb7263718b8eada17968b0238c4b5df1e2dc8094bf7620a6e29c70624b3c8faf8da90f8a935306cad291129ef5647eba41e51bcc81cb86a8510
-
Filesize
181KB
MD5bcd64ef954f64cb84edad3bc6bc70556
SHA11db745dec7f088845e0f383c7e3222cdb078fb23
SHA256d9545c9fafb4852932f5c89e46aaf54298baea05b6ec3d8a5046024f3b1bb9b4
SHA5125a7771f17d505cb7263718b8eada17968b0238c4b5df1e2dc8094bf7620a6e29c70624b3c8faf8da90f8a935306cad291129ef5647eba41e51bcc81cb86a8510
-
Filesize
168KB
MD5b150e74cbeb00af65919db3922f39e63
SHA1574fbc399cc119f8e3de2a24a85089ae105e5653
SHA2563733a550f90355e7746619938fc735e362ba6164f36979625209648e7e201039
SHA51284ecf73ba7442551bc627c6d705b68d70732e2e6e42d62547b57b10d418158c61969ca61f94193c0677b9f0558a53d68619be6cf23425f2513d3dc4c5b3ba906
-
Filesize
168KB
MD5b150e74cbeb00af65919db3922f39e63
SHA1574fbc399cc119f8e3de2a24a85089ae105e5653
SHA2563733a550f90355e7746619938fc735e362ba6164f36979625209648e7e201039
SHA51284ecf73ba7442551bc627c6d705b68d70732e2e6e42d62547b57b10d418158c61969ca61f94193c0677b9f0558a53d68619be6cf23425f2513d3dc4c5b3ba906
-
Filesize
212KB
MD56b7e9c712841ae8b5f78e8cbb63042df
SHA1cd9f715d9bdbc0059e460573425ab8db098a5061
SHA256093c6783b9a8ca57f0c07ca2dc8942a0d8994d43cc0d33b705a8db322f74c5dc
SHA512cceac8486292565dbaa12d887c9711860afa03dd831cc061c92c769e664159833db1ce72a7f51d91c8a75245dead437b0c904fca46ab1555b3716cbb7b9335d3
-
Filesize
212KB
MD56b7e9c712841ae8b5f78e8cbb63042df
SHA1cd9f715d9bdbc0059e460573425ab8db098a5061
SHA256093c6783b9a8ca57f0c07ca2dc8942a0d8994d43cc0d33b705a8db322f74c5dc
SHA512cceac8486292565dbaa12d887c9711860afa03dd831cc061c92c769e664159833db1ce72a7f51d91c8a75245dead437b0c904fca46ab1555b3716cbb7b9335d3
-
Filesize
212KB
MD56b7e9c712841ae8b5f78e8cbb63042df
SHA1cd9f715d9bdbc0059e460573425ab8db098a5061
SHA256093c6783b9a8ca57f0c07ca2dc8942a0d8994d43cc0d33b705a8db322f74c5dc
SHA512cceac8486292565dbaa12d887c9711860afa03dd831cc061c92c769e664159833db1ce72a7f51d91c8a75245dead437b0c904fca46ab1555b3716cbb7b9335d3
-
Filesize
212KB
MD56b7e9c712841ae8b5f78e8cbb63042df
SHA1cd9f715d9bdbc0059e460573425ab8db098a5061
SHA256093c6783b9a8ca57f0c07ca2dc8942a0d8994d43cc0d33b705a8db322f74c5dc
SHA512cceac8486292565dbaa12d887c9711860afa03dd831cc061c92c769e664159833db1ce72a7f51d91c8a75245dead437b0c904fca46ab1555b3716cbb7b9335d3
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5