Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
10/05/2023, 07:59
Static task
static1
Behavioral task
behavioral1
Sample
3c7259b8a81b7ec34de612db0dc83b9dc78620826b1425468ae069b31086c08c.exe
Resource
win10-20230220-en
General
-
Target
3c7259b8a81b7ec34de612db0dc83b9dc78620826b1425468ae069b31086c08c.exe
-
Size
479KB
-
MD5
09d101ee3575e1ba4cd05bd6ab377bb5
-
SHA1
0aba71c390b51c9c277f85248f8796f588006dda
-
SHA256
3c7259b8a81b7ec34de612db0dc83b9dc78620826b1425468ae069b31086c08c
-
SHA512
bbe5e4009c6cfdebd64b80003231666f24690181aeaf65df0e307074412fd07b60abbee172abf344aee6cfe605e0a3cbeda39551de831a42ada4c02587cc816d
-
SSDEEP
12288:mMrcy90/vYzno7D8FuTp39KzZiU/c5aqi:GyCAToiCpUB8aqi
Malware Config
Extracted
redline
divan
217.196.96.102:4132
-
auth_value
b414986bebd7f5a3ec9aee0341b8e769
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h1014105.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h1014105.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h1014105.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h1014105.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h1014105.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 3384 x9695840.exe 4168 g0604379.exe 3104 h1014105.exe 3792 i0694903.exe 4840 oneetx.exe 4400 oneetx.exe 5068 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2196 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h1014105.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h1014105.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3c7259b8a81b7ec34de612db0dc83b9dc78620826b1425468ae069b31086c08c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3c7259b8a81b7ec34de612db0dc83b9dc78620826b1425468ae069b31086c08c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x9695840.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x9695840.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3052 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4168 g0604379.exe 4168 g0604379.exe 3104 h1014105.exe 3104 h1014105.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4168 g0604379.exe Token: SeDebugPrivilege 3104 h1014105.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3792 i0694903.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2896 wrote to memory of 3384 2896 3c7259b8a81b7ec34de612db0dc83b9dc78620826b1425468ae069b31086c08c.exe 66 PID 2896 wrote to memory of 3384 2896 3c7259b8a81b7ec34de612db0dc83b9dc78620826b1425468ae069b31086c08c.exe 66 PID 2896 wrote to memory of 3384 2896 3c7259b8a81b7ec34de612db0dc83b9dc78620826b1425468ae069b31086c08c.exe 66 PID 3384 wrote to memory of 4168 3384 x9695840.exe 67 PID 3384 wrote to memory of 4168 3384 x9695840.exe 67 PID 3384 wrote to memory of 4168 3384 x9695840.exe 67 PID 3384 wrote to memory of 3104 3384 x9695840.exe 69 PID 3384 wrote to memory of 3104 3384 x9695840.exe 69 PID 3384 wrote to memory of 3104 3384 x9695840.exe 69 PID 2896 wrote to memory of 3792 2896 3c7259b8a81b7ec34de612db0dc83b9dc78620826b1425468ae069b31086c08c.exe 70 PID 2896 wrote to memory of 3792 2896 3c7259b8a81b7ec34de612db0dc83b9dc78620826b1425468ae069b31086c08c.exe 70 PID 2896 wrote to memory of 3792 2896 3c7259b8a81b7ec34de612db0dc83b9dc78620826b1425468ae069b31086c08c.exe 70 PID 3792 wrote to memory of 4840 3792 i0694903.exe 71 PID 3792 wrote to memory of 4840 3792 i0694903.exe 71 PID 3792 wrote to memory of 4840 3792 i0694903.exe 71 PID 4840 wrote to memory of 3052 4840 oneetx.exe 72 PID 4840 wrote to memory of 3052 4840 oneetx.exe 72 PID 4840 wrote to memory of 3052 4840 oneetx.exe 72 PID 4840 wrote to memory of 2148 4840 oneetx.exe 74 PID 4840 wrote to memory of 2148 4840 oneetx.exe 74 PID 4840 wrote to memory of 2148 4840 oneetx.exe 74 PID 2148 wrote to memory of 776 2148 cmd.exe 76 PID 2148 wrote to memory of 776 2148 cmd.exe 76 PID 2148 wrote to memory of 776 2148 cmd.exe 76 PID 2148 wrote to memory of 4816 2148 cmd.exe 77 PID 2148 wrote to memory of 4816 2148 cmd.exe 77 PID 2148 wrote to memory of 4816 2148 cmd.exe 77 PID 2148 wrote to memory of 4780 2148 cmd.exe 78 PID 2148 wrote to memory of 4780 2148 cmd.exe 78 PID 2148 wrote to memory of 4780 2148 cmd.exe 78 PID 2148 wrote to memory of 3432 2148 cmd.exe 79 PID 2148 wrote to memory of 3432 2148 cmd.exe 79 PID 2148 wrote to memory of 3432 2148 cmd.exe 79 PID 2148 wrote to memory of 3436 2148 cmd.exe 80 PID 2148 wrote to memory of 3436 2148 cmd.exe 80 PID 2148 wrote to memory of 3436 2148 cmd.exe 80 PID 2148 wrote to memory of 3208 2148 cmd.exe 81 PID 2148 wrote to memory of 3208 2148 cmd.exe 81 PID 2148 wrote to memory of 3208 2148 cmd.exe 81 PID 4840 wrote to memory of 2196 4840 oneetx.exe 82 PID 4840 wrote to memory of 2196 4840 oneetx.exe 82 PID 4840 wrote to memory of 2196 4840 oneetx.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c7259b8a81b7ec34de612db0dc83b9dc78620826b1425468ae069b31086c08c.exe"C:\Users\Admin\AppData\Local\Temp\3c7259b8a81b7ec34de612db0dc83b9dc78620826b1425468ae069b31086c08c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9695840.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9695840.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g0604379.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g0604379.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4168
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1014105.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1014105.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3104
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0694903.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0694903.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3052
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:776
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4816
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:4780
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3432
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:3436
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:3208
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2196
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4400
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:5068
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD5fb58f8285c906c444eeabc39a77cfa6f
SHA16bfd247f539d3b058b22caa06f90df82e64c32ff
SHA256c5023df7e90514899758a1c4132b6f839ce2b41645917fa770c5799815717408
SHA512d88120acd7f2b8d8d23d905f60cf462d405c60c3e8cb78bb4149399d3723b51b78af925d2a125358940baa2cace673e058721ecac53396edfcd649df702034c5
-
Filesize
212KB
MD5fb58f8285c906c444eeabc39a77cfa6f
SHA16bfd247f539d3b058b22caa06f90df82e64c32ff
SHA256c5023df7e90514899758a1c4132b6f839ce2b41645917fa770c5799815717408
SHA512d88120acd7f2b8d8d23d905f60cf462d405c60c3e8cb78bb4149399d3723b51b78af925d2a125358940baa2cace673e058721ecac53396edfcd649df702034c5
-
Filesize
307KB
MD52ea8df5f7915a18dc52de2650f7f2e8f
SHA19aa9d861ddd342d47b8539a65218a9fc6907e0f5
SHA2562866f4e1489857c0d3d9849c0133b750854f780be4ab50e1a21cb9bf6db55d49
SHA512e44ac990f498b847c9ffd779ef153f720fdb327adc97515391b99911192a7f0e2fd73ee6395ba75ccc398a79fbf3bb3b7c227f0fc22a20cbdb218d62fee7be87
-
Filesize
307KB
MD52ea8df5f7915a18dc52de2650f7f2e8f
SHA19aa9d861ddd342d47b8539a65218a9fc6907e0f5
SHA2562866f4e1489857c0d3d9849c0133b750854f780be4ab50e1a21cb9bf6db55d49
SHA512e44ac990f498b847c9ffd779ef153f720fdb327adc97515391b99911192a7f0e2fd73ee6395ba75ccc398a79fbf3bb3b7c227f0fc22a20cbdb218d62fee7be87
-
Filesize
168KB
MD5bbe7447f74479776d0adb3e923e505f6
SHA194669b5363d98db6c3e0b18be72f05e985730666
SHA2568a2e8885bfa1b9d47c074aa7321d49e715f860e05b51d1163b3850ff3ef2d329
SHA51233fc6f38a1ec19fbcddc9656aab8c0c0826de080b98293a0cf95df8be56dd2305896fc61c783585f8bfe3ad27e19b755f0f122c427e747b4dee4b92378ab0411
-
Filesize
168KB
MD5bbe7447f74479776d0adb3e923e505f6
SHA194669b5363d98db6c3e0b18be72f05e985730666
SHA2568a2e8885bfa1b9d47c074aa7321d49e715f860e05b51d1163b3850ff3ef2d329
SHA51233fc6f38a1ec19fbcddc9656aab8c0c0826de080b98293a0cf95df8be56dd2305896fc61c783585f8bfe3ad27e19b755f0f122c427e747b4dee4b92378ab0411
-
Filesize
182KB
MD5220d7caf620b2c1cd537f10cb830633b
SHA11b020f507ed5471a0007fa001e96a61a9489a6e1
SHA256d147ecf6dcc8a22bf19d812ee4de5458ab6cbab3a24ca9ca3ce2c3d513ba15c0
SHA51250e02339a120805cb61dcab931b7ac639929cf100a1edf5d0eca7764a53c431c7c2c3cec890a5c568b4516058973cbbc3b3c49e6ac7e7561f9f06eb125089346
-
Filesize
182KB
MD5220d7caf620b2c1cd537f10cb830633b
SHA11b020f507ed5471a0007fa001e96a61a9489a6e1
SHA256d147ecf6dcc8a22bf19d812ee4de5458ab6cbab3a24ca9ca3ce2c3d513ba15c0
SHA51250e02339a120805cb61dcab931b7ac639929cf100a1edf5d0eca7764a53c431c7c2c3cec890a5c568b4516058973cbbc3b3c49e6ac7e7561f9f06eb125089346
-
Filesize
212KB
MD5fb58f8285c906c444eeabc39a77cfa6f
SHA16bfd247f539d3b058b22caa06f90df82e64c32ff
SHA256c5023df7e90514899758a1c4132b6f839ce2b41645917fa770c5799815717408
SHA512d88120acd7f2b8d8d23d905f60cf462d405c60c3e8cb78bb4149399d3723b51b78af925d2a125358940baa2cace673e058721ecac53396edfcd649df702034c5
-
Filesize
212KB
MD5fb58f8285c906c444eeabc39a77cfa6f
SHA16bfd247f539d3b058b22caa06f90df82e64c32ff
SHA256c5023df7e90514899758a1c4132b6f839ce2b41645917fa770c5799815717408
SHA512d88120acd7f2b8d8d23d905f60cf462d405c60c3e8cb78bb4149399d3723b51b78af925d2a125358940baa2cace673e058721ecac53396edfcd649df702034c5
-
Filesize
212KB
MD5fb58f8285c906c444eeabc39a77cfa6f
SHA16bfd247f539d3b058b22caa06f90df82e64c32ff
SHA256c5023df7e90514899758a1c4132b6f839ce2b41645917fa770c5799815717408
SHA512d88120acd7f2b8d8d23d905f60cf462d405c60c3e8cb78bb4149399d3723b51b78af925d2a125358940baa2cace673e058721ecac53396edfcd649df702034c5
-
Filesize
212KB
MD5fb58f8285c906c444eeabc39a77cfa6f
SHA16bfd247f539d3b058b22caa06f90df82e64c32ff
SHA256c5023df7e90514899758a1c4132b6f839ce2b41645917fa770c5799815717408
SHA512d88120acd7f2b8d8d23d905f60cf462d405c60c3e8cb78bb4149399d3723b51b78af925d2a125358940baa2cace673e058721ecac53396edfcd649df702034c5
-
Filesize
212KB
MD5fb58f8285c906c444eeabc39a77cfa6f
SHA16bfd247f539d3b058b22caa06f90df82e64c32ff
SHA256c5023df7e90514899758a1c4132b6f839ce2b41645917fa770c5799815717408
SHA512d88120acd7f2b8d8d23d905f60cf462d405c60c3e8cb78bb4149399d3723b51b78af925d2a125358940baa2cace673e058721ecac53396edfcd649df702034c5
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53