Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10/05/2023, 07:59

General

  • Target

    3c7259b8a81b7ec34de612db0dc83b9dc78620826b1425468ae069b31086c08c.exe

  • Size

    479KB

  • MD5

    09d101ee3575e1ba4cd05bd6ab377bb5

  • SHA1

    0aba71c390b51c9c277f85248f8796f588006dda

  • SHA256

    3c7259b8a81b7ec34de612db0dc83b9dc78620826b1425468ae069b31086c08c

  • SHA512

    bbe5e4009c6cfdebd64b80003231666f24690181aeaf65df0e307074412fd07b60abbee172abf344aee6cfe605e0a3cbeda39551de831a42ada4c02587cc816d

  • SSDEEP

    12288:mMrcy90/vYzno7D8FuTp39KzZiU/c5aqi:GyCAToiCpUB8aqi

Malware Config

Extracted

Family

redline

Botnet

divan

C2

217.196.96.102:4132

Attributes
  • auth_value

    b414986bebd7f5a3ec9aee0341b8e769

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3c7259b8a81b7ec34de612db0dc83b9dc78620826b1425468ae069b31086c08c.exe
    "C:\Users\Admin\AppData\Local\Temp\3c7259b8a81b7ec34de612db0dc83b9dc78620826b1425468ae069b31086c08c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9695840.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9695840.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3384
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g0604379.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g0604379.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4168
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1014105.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1014105.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3104
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0694903.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0694903.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3792
      • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4840
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:3052
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2148
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:776
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:N"
              5⤵
                PID:4816
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                5⤵
                  PID:4780
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:3432
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\c3912af058" /P "Admin:N"
                    5⤵
                      PID:3436
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\c3912af058" /P "Admin:R" /E
                      5⤵
                        PID:3208
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:2196
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:4400
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:5068

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0694903.exe

                Filesize

                212KB

                MD5

                fb58f8285c906c444eeabc39a77cfa6f

                SHA1

                6bfd247f539d3b058b22caa06f90df82e64c32ff

                SHA256

                c5023df7e90514899758a1c4132b6f839ce2b41645917fa770c5799815717408

                SHA512

                d88120acd7f2b8d8d23d905f60cf462d405c60c3e8cb78bb4149399d3723b51b78af925d2a125358940baa2cace673e058721ecac53396edfcd649df702034c5

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0694903.exe

                Filesize

                212KB

                MD5

                fb58f8285c906c444eeabc39a77cfa6f

                SHA1

                6bfd247f539d3b058b22caa06f90df82e64c32ff

                SHA256

                c5023df7e90514899758a1c4132b6f839ce2b41645917fa770c5799815717408

                SHA512

                d88120acd7f2b8d8d23d905f60cf462d405c60c3e8cb78bb4149399d3723b51b78af925d2a125358940baa2cace673e058721ecac53396edfcd649df702034c5

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9695840.exe

                Filesize

                307KB

                MD5

                2ea8df5f7915a18dc52de2650f7f2e8f

                SHA1

                9aa9d861ddd342d47b8539a65218a9fc6907e0f5

                SHA256

                2866f4e1489857c0d3d9849c0133b750854f780be4ab50e1a21cb9bf6db55d49

                SHA512

                e44ac990f498b847c9ffd779ef153f720fdb327adc97515391b99911192a7f0e2fd73ee6395ba75ccc398a79fbf3bb3b7c227f0fc22a20cbdb218d62fee7be87

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9695840.exe

                Filesize

                307KB

                MD5

                2ea8df5f7915a18dc52de2650f7f2e8f

                SHA1

                9aa9d861ddd342d47b8539a65218a9fc6907e0f5

                SHA256

                2866f4e1489857c0d3d9849c0133b750854f780be4ab50e1a21cb9bf6db55d49

                SHA512

                e44ac990f498b847c9ffd779ef153f720fdb327adc97515391b99911192a7f0e2fd73ee6395ba75ccc398a79fbf3bb3b7c227f0fc22a20cbdb218d62fee7be87

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g0604379.exe

                Filesize

                168KB

                MD5

                bbe7447f74479776d0adb3e923e505f6

                SHA1

                94669b5363d98db6c3e0b18be72f05e985730666

                SHA256

                8a2e8885bfa1b9d47c074aa7321d49e715f860e05b51d1163b3850ff3ef2d329

                SHA512

                33fc6f38a1ec19fbcddc9656aab8c0c0826de080b98293a0cf95df8be56dd2305896fc61c783585f8bfe3ad27e19b755f0f122c427e747b4dee4b92378ab0411

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g0604379.exe

                Filesize

                168KB

                MD5

                bbe7447f74479776d0adb3e923e505f6

                SHA1

                94669b5363d98db6c3e0b18be72f05e985730666

                SHA256

                8a2e8885bfa1b9d47c074aa7321d49e715f860e05b51d1163b3850ff3ef2d329

                SHA512

                33fc6f38a1ec19fbcddc9656aab8c0c0826de080b98293a0cf95df8be56dd2305896fc61c783585f8bfe3ad27e19b755f0f122c427e747b4dee4b92378ab0411

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1014105.exe

                Filesize

                182KB

                MD5

                220d7caf620b2c1cd537f10cb830633b

                SHA1

                1b020f507ed5471a0007fa001e96a61a9489a6e1

                SHA256

                d147ecf6dcc8a22bf19d812ee4de5458ab6cbab3a24ca9ca3ce2c3d513ba15c0

                SHA512

                50e02339a120805cb61dcab931b7ac639929cf100a1edf5d0eca7764a53c431c7c2c3cec890a5c568b4516058973cbbc3b3c49e6ac7e7561f9f06eb125089346

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1014105.exe

                Filesize

                182KB

                MD5

                220d7caf620b2c1cd537f10cb830633b

                SHA1

                1b020f507ed5471a0007fa001e96a61a9489a6e1

                SHA256

                d147ecf6dcc8a22bf19d812ee4de5458ab6cbab3a24ca9ca3ce2c3d513ba15c0

                SHA512

                50e02339a120805cb61dcab931b7ac639929cf100a1edf5d0eca7764a53c431c7c2c3cec890a5c568b4516058973cbbc3b3c49e6ac7e7561f9f06eb125089346

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                212KB

                MD5

                fb58f8285c906c444eeabc39a77cfa6f

                SHA1

                6bfd247f539d3b058b22caa06f90df82e64c32ff

                SHA256

                c5023df7e90514899758a1c4132b6f839ce2b41645917fa770c5799815717408

                SHA512

                d88120acd7f2b8d8d23d905f60cf462d405c60c3e8cb78bb4149399d3723b51b78af925d2a125358940baa2cace673e058721ecac53396edfcd649df702034c5

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                212KB

                MD5

                fb58f8285c906c444eeabc39a77cfa6f

                SHA1

                6bfd247f539d3b058b22caa06f90df82e64c32ff

                SHA256

                c5023df7e90514899758a1c4132b6f839ce2b41645917fa770c5799815717408

                SHA512

                d88120acd7f2b8d8d23d905f60cf462d405c60c3e8cb78bb4149399d3723b51b78af925d2a125358940baa2cace673e058721ecac53396edfcd649df702034c5

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                212KB

                MD5

                fb58f8285c906c444eeabc39a77cfa6f

                SHA1

                6bfd247f539d3b058b22caa06f90df82e64c32ff

                SHA256

                c5023df7e90514899758a1c4132b6f839ce2b41645917fa770c5799815717408

                SHA512

                d88120acd7f2b8d8d23d905f60cf462d405c60c3e8cb78bb4149399d3723b51b78af925d2a125358940baa2cace673e058721ecac53396edfcd649df702034c5

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                212KB

                MD5

                fb58f8285c906c444eeabc39a77cfa6f

                SHA1

                6bfd247f539d3b058b22caa06f90df82e64c32ff

                SHA256

                c5023df7e90514899758a1c4132b6f839ce2b41645917fa770c5799815717408

                SHA512

                d88120acd7f2b8d8d23d905f60cf462d405c60c3e8cb78bb4149399d3723b51b78af925d2a125358940baa2cace673e058721ecac53396edfcd649df702034c5

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                212KB

                MD5

                fb58f8285c906c444eeabc39a77cfa6f

                SHA1

                6bfd247f539d3b058b22caa06f90df82e64c32ff

                SHA256

                c5023df7e90514899758a1c4132b6f839ce2b41645917fa770c5799815717408

                SHA512

                d88120acd7f2b8d8d23d905f60cf462d405c60c3e8cb78bb4149399d3723b51b78af925d2a125358940baa2cace673e058721ecac53396edfcd649df702034c5

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • memory/3104-183-0x00000000023B0000-0x00000000023C2000-memory.dmp

                Filesize

                72KB

              • memory/3104-177-0x00000000023B0000-0x00000000023C2000-memory.dmp

                Filesize

                72KB

              • memory/3104-189-0x0000000004A70000-0x0000000004A80000-memory.dmp

                Filesize

                64KB

              • memory/3104-188-0x0000000004A70000-0x0000000004A80000-memory.dmp

                Filesize

                64KB

              • memory/3104-187-0x00000000023B0000-0x00000000023C2000-memory.dmp

                Filesize

                72KB

              • memory/3104-155-0x0000000000630000-0x000000000064A000-memory.dmp

                Filesize

                104KB

              • memory/3104-156-0x0000000004A70000-0x0000000004A80000-memory.dmp

                Filesize

                64KB

              • memory/3104-159-0x0000000004A70000-0x0000000004A80000-memory.dmp

                Filesize

                64KB

              • memory/3104-158-0x00000000023B0000-0x00000000023C8000-memory.dmp

                Filesize

                96KB

              • memory/3104-157-0x0000000004A70000-0x0000000004A80000-memory.dmp

                Filesize

                64KB

              • memory/3104-160-0x00000000023B0000-0x00000000023C2000-memory.dmp

                Filesize

                72KB

              • memory/3104-161-0x00000000023B0000-0x00000000023C2000-memory.dmp

                Filesize

                72KB

              • memory/3104-163-0x00000000023B0000-0x00000000023C2000-memory.dmp

                Filesize

                72KB

              • memory/3104-165-0x00000000023B0000-0x00000000023C2000-memory.dmp

                Filesize

                72KB

              • memory/3104-167-0x00000000023B0000-0x00000000023C2000-memory.dmp

                Filesize

                72KB

              • memory/3104-169-0x00000000023B0000-0x00000000023C2000-memory.dmp

                Filesize

                72KB

              • memory/3104-171-0x00000000023B0000-0x00000000023C2000-memory.dmp

                Filesize

                72KB

              • memory/3104-173-0x00000000023B0000-0x00000000023C2000-memory.dmp

                Filesize

                72KB

              • memory/3104-175-0x00000000023B0000-0x00000000023C2000-memory.dmp

                Filesize

                72KB

              • memory/3104-185-0x00000000023B0000-0x00000000023C2000-memory.dmp

                Filesize

                72KB

              • memory/3104-179-0x00000000023B0000-0x00000000023C2000-memory.dmp

                Filesize

                72KB

              • memory/3104-181-0x00000000023B0000-0x00000000023C2000-memory.dmp

                Filesize

                72KB

              • memory/4168-142-0x00000000051E0000-0x00000000051F0000-memory.dmp

                Filesize

                64KB

              • memory/4168-141-0x0000000005270000-0x00000000052BB000-memory.dmp

                Filesize

                300KB

              • memory/4168-147-0x0000000006D20000-0x0000000006EE2000-memory.dmp

                Filesize

                1.8MB

              • memory/4168-148-0x0000000008AA0000-0x0000000008FCC000-memory.dmp

                Filesize

                5.2MB

              • memory/4168-150-0x0000000006600000-0x0000000006650000-memory.dmp

                Filesize

                320KB

              • memory/4168-145-0x00000000055B0000-0x0000000005616000-memory.dmp

                Filesize

                408KB

              • memory/4168-149-0x00000000051E0000-0x00000000051F0000-memory.dmp

                Filesize

                64KB

              • memory/4168-144-0x0000000005650000-0x00000000056E2000-memory.dmp

                Filesize

                584KB

              • memory/4168-146-0x0000000006820000-0x0000000006D1E000-memory.dmp

                Filesize

                5.0MB

              • memory/4168-143-0x0000000005530000-0x00000000055A6000-memory.dmp

                Filesize

                472KB

              • memory/4168-140-0x0000000005230000-0x000000000526E000-memory.dmp

                Filesize

                248KB

              • memory/4168-139-0x00000000051A0000-0x00000000051B2000-memory.dmp

                Filesize

                72KB

              • memory/4168-138-0x0000000005300000-0x000000000540A000-memory.dmp

                Filesize

                1.0MB

              • memory/4168-137-0x0000000005800000-0x0000000005E06000-memory.dmp

                Filesize

                6.0MB

              • memory/4168-136-0x0000000005150000-0x0000000005156000-memory.dmp

                Filesize

                24KB

              • memory/4168-135-0x00000000008A0000-0x00000000008CE000-memory.dmp

                Filesize

                184KB