Analysis
-
max time kernel
122s -
max time network
145s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
10/05/2023, 07:02
Static task
static1
Behavioral task
behavioral1
Sample
87365865ac9820f1b7ac4b96ad10f6e27e949a8919dcbffaead49a965361c106.exe
Resource
win10-20230220-en
General
-
Target
87365865ac9820f1b7ac4b96ad10f6e27e949a8919dcbffaead49a965361c106.exe
-
Size
478KB
-
MD5
512c20f4b5219be6f48a9ddfc8c2f9d2
-
SHA1
2268e12830c94a0216160d10015badd0df5b3150
-
SHA256
87365865ac9820f1b7ac4b96ad10f6e27e949a8919dcbffaead49a965361c106
-
SHA512
aeedbd47077459a983edef8e4f67b0cbbc6ed7092d766154be951daed5ea787bd9c70c0b0eb0c8f418b9b3fbd6470bfa349501d003b36c9bb14f76de5b8dfaa5
-
SSDEEP
12288:XMrEy90AT8ZSaClWp9EEG8HhbXAHE3Vfp5ip:fyV8ZOmg8ZAHElfp5ip
Malware Config
Extracted
redline
divan
217.196.96.102:4132
-
auth_value
b414986bebd7f5a3ec9aee0341b8e769
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h5982157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h5982157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h5982157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h5982157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h5982157.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 4188 x4944982.exe 2188 g9329131.exe 3144 h5982157.exe 4500 i3893289.exe 4488 oneetx.exe 3600 oneetx.exe 5104 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4908 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h5982157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h5982157.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 87365865ac9820f1b7ac4b96ad10f6e27e949a8919dcbffaead49a965361c106.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 87365865ac9820f1b7ac4b96ad10f6e27e949a8919dcbffaead49a965361c106.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x4944982.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x4944982.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4624 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2188 g9329131.exe 2188 g9329131.exe 3144 h5982157.exe 3144 h5982157.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2188 g9329131.exe Token: SeDebugPrivilege 3144 h5982157.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4500 i3893289.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4048 wrote to memory of 4188 4048 87365865ac9820f1b7ac4b96ad10f6e27e949a8919dcbffaead49a965361c106.exe 66 PID 4048 wrote to memory of 4188 4048 87365865ac9820f1b7ac4b96ad10f6e27e949a8919dcbffaead49a965361c106.exe 66 PID 4048 wrote to memory of 4188 4048 87365865ac9820f1b7ac4b96ad10f6e27e949a8919dcbffaead49a965361c106.exe 66 PID 4188 wrote to memory of 2188 4188 x4944982.exe 67 PID 4188 wrote to memory of 2188 4188 x4944982.exe 67 PID 4188 wrote to memory of 2188 4188 x4944982.exe 67 PID 4188 wrote to memory of 3144 4188 x4944982.exe 69 PID 4188 wrote to memory of 3144 4188 x4944982.exe 69 PID 4188 wrote to memory of 3144 4188 x4944982.exe 69 PID 4048 wrote to memory of 4500 4048 87365865ac9820f1b7ac4b96ad10f6e27e949a8919dcbffaead49a965361c106.exe 70 PID 4048 wrote to memory of 4500 4048 87365865ac9820f1b7ac4b96ad10f6e27e949a8919dcbffaead49a965361c106.exe 70 PID 4048 wrote to memory of 4500 4048 87365865ac9820f1b7ac4b96ad10f6e27e949a8919dcbffaead49a965361c106.exe 70 PID 4500 wrote to memory of 4488 4500 i3893289.exe 71 PID 4500 wrote to memory of 4488 4500 i3893289.exe 71 PID 4500 wrote to memory of 4488 4500 i3893289.exe 71 PID 4488 wrote to memory of 4624 4488 oneetx.exe 72 PID 4488 wrote to memory of 4624 4488 oneetx.exe 72 PID 4488 wrote to memory of 4624 4488 oneetx.exe 72 PID 4488 wrote to memory of 3032 4488 oneetx.exe 74 PID 4488 wrote to memory of 3032 4488 oneetx.exe 74 PID 4488 wrote to memory of 3032 4488 oneetx.exe 74 PID 3032 wrote to memory of 4472 3032 cmd.exe 76 PID 3032 wrote to memory of 4472 3032 cmd.exe 76 PID 3032 wrote to memory of 4472 3032 cmd.exe 76 PID 3032 wrote to memory of 4516 3032 cmd.exe 77 PID 3032 wrote to memory of 4516 3032 cmd.exe 77 PID 3032 wrote to memory of 4516 3032 cmd.exe 77 PID 3032 wrote to memory of 3840 3032 cmd.exe 78 PID 3032 wrote to memory of 3840 3032 cmd.exe 78 PID 3032 wrote to memory of 3840 3032 cmd.exe 78 PID 3032 wrote to memory of 3272 3032 cmd.exe 79 PID 3032 wrote to memory of 3272 3032 cmd.exe 79 PID 3032 wrote to memory of 3272 3032 cmd.exe 79 PID 3032 wrote to memory of 3824 3032 cmd.exe 80 PID 3032 wrote to memory of 3824 3032 cmd.exe 80 PID 3032 wrote to memory of 3824 3032 cmd.exe 80 PID 3032 wrote to memory of 2156 3032 cmd.exe 81 PID 3032 wrote to memory of 2156 3032 cmd.exe 81 PID 3032 wrote to memory of 2156 3032 cmd.exe 81 PID 4488 wrote to memory of 4908 4488 oneetx.exe 83 PID 4488 wrote to memory of 4908 4488 oneetx.exe 83 PID 4488 wrote to memory of 4908 4488 oneetx.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\87365865ac9820f1b7ac4b96ad10f6e27e949a8919dcbffaead49a965361c106.exe"C:\Users\Admin\AppData\Local\Temp\87365865ac9820f1b7ac4b96ad10f6e27e949a8919dcbffaead49a965361c106.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4944982.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4944982.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9329131.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9329131.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2188
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5982157.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5982157.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3144
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i3893289.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i3893289.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4624
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4472
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4516
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3840
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3272
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:3824
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:2156
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4908
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3600
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:5104
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD50fa7d0d147ce8ade4685b4a67ef7fad1
SHA1e69d1a08232db59ca7786e0d44ab441fce560b91
SHA2565cc11c2207f5f423ae09d6a717c97481a6f9e334acd6a3eed8444c06e68ee4b1
SHA5122c9450aa58e41a4b985e3bf0c89be102390162d94a539296eb9b242010927745d3f97ccfb6b9a96f7730ff5c6742b86c002df1a7eed6a6fe2faad4a1e14a000f
-
Filesize
212KB
MD50fa7d0d147ce8ade4685b4a67ef7fad1
SHA1e69d1a08232db59ca7786e0d44ab441fce560b91
SHA2565cc11c2207f5f423ae09d6a717c97481a6f9e334acd6a3eed8444c06e68ee4b1
SHA5122c9450aa58e41a4b985e3bf0c89be102390162d94a539296eb9b242010927745d3f97ccfb6b9a96f7730ff5c6742b86c002df1a7eed6a6fe2faad4a1e14a000f
-
Filesize
307KB
MD577a84b0305b14b44c24c6e8933d22008
SHA114d80d55fba4f74f390f54c045265e88924c0baf
SHA2565f53b9df09fcfc19f805c937e4991ce5a74a4517313a40085466c073de1a72e0
SHA512568b2edf3e6f823f2fb61689a5ef970fcc69ff8927ab4d1c0473436b7caebf2383c46f741ca768845c41cd0047367fbc84a08845553068384248991af9280b88
-
Filesize
307KB
MD577a84b0305b14b44c24c6e8933d22008
SHA114d80d55fba4f74f390f54c045265e88924c0baf
SHA2565f53b9df09fcfc19f805c937e4991ce5a74a4517313a40085466c073de1a72e0
SHA512568b2edf3e6f823f2fb61689a5ef970fcc69ff8927ab4d1c0473436b7caebf2383c46f741ca768845c41cd0047367fbc84a08845553068384248991af9280b88
-
Filesize
168KB
MD50628c3eee00151fb35f26084b3d1f17a
SHA10a6b5944d45cac9f75933d898cd5df92b82e7b80
SHA2566a9eee31c18d700a3fd960223958a98fb48d6b96e84d9c66207b17ba7492b518
SHA512cbce36fedd06f12e0f32158f6b6833e0fc19947b539418dbf7e8a548c6ac2948e7a916e081c5b919266357789ea7012d70c99afac3c0caa93866490f2e4f47de
-
Filesize
168KB
MD50628c3eee00151fb35f26084b3d1f17a
SHA10a6b5944d45cac9f75933d898cd5df92b82e7b80
SHA2566a9eee31c18d700a3fd960223958a98fb48d6b96e84d9c66207b17ba7492b518
SHA512cbce36fedd06f12e0f32158f6b6833e0fc19947b539418dbf7e8a548c6ac2948e7a916e081c5b919266357789ea7012d70c99afac3c0caa93866490f2e4f47de
-
Filesize
182KB
MD5e263b61f350a54e80b132841ab8fb7d3
SHA193985c96a238c3703a237e44ff72788550443de2
SHA256b0c10a8cd9338a943aa7b741e3a8bc43599e7ccf6b42cc1a74f3279e8e259ac2
SHA512c22f7908976d450ba68b2ede67e1dc59e1a79d8f144f4d0f6765c02a43354ca024574ae877375e19aed21979d17ed04aa01d6bb1cfeddcad50911d0a44d25f68
-
Filesize
182KB
MD5e263b61f350a54e80b132841ab8fb7d3
SHA193985c96a238c3703a237e44ff72788550443de2
SHA256b0c10a8cd9338a943aa7b741e3a8bc43599e7ccf6b42cc1a74f3279e8e259ac2
SHA512c22f7908976d450ba68b2ede67e1dc59e1a79d8f144f4d0f6765c02a43354ca024574ae877375e19aed21979d17ed04aa01d6bb1cfeddcad50911d0a44d25f68
-
Filesize
212KB
MD50fa7d0d147ce8ade4685b4a67ef7fad1
SHA1e69d1a08232db59ca7786e0d44ab441fce560b91
SHA2565cc11c2207f5f423ae09d6a717c97481a6f9e334acd6a3eed8444c06e68ee4b1
SHA5122c9450aa58e41a4b985e3bf0c89be102390162d94a539296eb9b242010927745d3f97ccfb6b9a96f7730ff5c6742b86c002df1a7eed6a6fe2faad4a1e14a000f
-
Filesize
212KB
MD50fa7d0d147ce8ade4685b4a67ef7fad1
SHA1e69d1a08232db59ca7786e0d44ab441fce560b91
SHA2565cc11c2207f5f423ae09d6a717c97481a6f9e334acd6a3eed8444c06e68ee4b1
SHA5122c9450aa58e41a4b985e3bf0c89be102390162d94a539296eb9b242010927745d3f97ccfb6b9a96f7730ff5c6742b86c002df1a7eed6a6fe2faad4a1e14a000f
-
Filesize
212KB
MD50fa7d0d147ce8ade4685b4a67ef7fad1
SHA1e69d1a08232db59ca7786e0d44ab441fce560b91
SHA2565cc11c2207f5f423ae09d6a717c97481a6f9e334acd6a3eed8444c06e68ee4b1
SHA5122c9450aa58e41a4b985e3bf0c89be102390162d94a539296eb9b242010927745d3f97ccfb6b9a96f7730ff5c6742b86c002df1a7eed6a6fe2faad4a1e14a000f
-
Filesize
212KB
MD50fa7d0d147ce8ade4685b4a67ef7fad1
SHA1e69d1a08232db59ca7786e0d44ab441fce560b91
SHA2565cc11c2207f5f423ae09d6a717c97481a6f9e334acd6a3eed8444c06e68ee4b1
SHA5122c9450aa58e41a4b985e3bf0c89be102390162d94a539296eb9b242010927745d3f97ccfb6b9a96f7730ff5c6742b86c002df1a7eed6a6fe2faad4a1e14a000f
-
Filesize
212KB
MD50fa7d0d147ce8ade4685b4a67ef7fad1
SHA1e69d1a08232db59ca7786e0d44ab441fce560b91
SHA2565cc11c2207f5f423ae09d6a717c97481a6f9e334acd6a3eed8444c06e68ee4b1
SHA5122c9450aa58e41a4b985e3bf0c89be102390162d94a539296eb9b242010927745d3f97ccfb6b9a96f7730ff5c6742b86c002df1a7eed6a6fe2faad4a1e14a000f
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53