Analysis

  • max time kernel
    138s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/05/2023, 10:00

General

  • Target

    fe3707e8e4471e97a864cac702e53d2366882bd2d63059bab4b613c847d3c6e3.exe

  • Size

    478KB

  • MD5

    af0237eaa63b042ac68265862caa14ea

  • SHA1

    99d6ffc5b73b4cfbb9a70a9c120e92a677db2ce6

  • SHA256

    fe3707e8e4471e97a864cac702e53d2366882bd2d63059bab4b613c847d3c6e3

  • SHA512

    a3c28c9b37dcdd96155cf4937dd10e5fe0739fbd67db54666674329048028e22589fd264f5922614e78804560d3f94b55e291b011d23cd665b0e0788c5cb7942

  • SSDEEP

    12288:dMrzy90yKoOX5c1u31QTVauBAWr3KfIxFn48l:yyGX+Th32MlF

Malware Config

Extracted

Family

redline

Botnet

dippo

C2

217.196.96.102:4132

Attributes
  • auth_value

    79490ff628fd6af3b29170c3c163874b

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe3707e8e4471e97a864cac702e53d2366882bd2d63059bab4b613c847d3c6e3.exe
    "C:\Users\Admin\AppData\Local\Temp\fe3707e8e4471e97a864cac702e53d2366882bd2d63059bab4b613c847d3c6e3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3128
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7054446.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7054446.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4412
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0195029.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0195029.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1380
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4415963.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4415963.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4812
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m3392013.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m3392013.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4896
      • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2184
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:3504
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2156
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:5032
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:N"
              5⤵
                PID:2064
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                5⤵
                  PID:4932
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:1628
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\c3912af058" /P "Admin:N"
                    5⤵
                      PID:760
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\c3912af058" /P "Admin:R" /E
                      5⤵
                        PID:2552
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:3664
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:2160
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:4960

              Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m3392013.exe

                      Filesize

                      212KB

                      MD5

                      3812eaa2ed1c3e4dfcc225b3a2ee4aaf

                      SHA1

                      499c9f66cc3eed6b976bc3ed10cac6df29cc3559

                      SHA256

                      c4a2048b68b4e9f5c17233e52a12c6808fa2640d65e9d1b26c2a1938c51baeec

                      SHA512

                      da9272e25accfd4ab1c33c6a4fa9e8debf77703b21d3ac315c7587a59b2718013738872b0ab9efcd9f14ea20290a6ce62c60af73cb6c46acb7bea5b446dddad4

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m3392013.exe

                      Filesize

                      212KB

                      MD5

                      3812eaa2ed1c3e4dfcc225b3a2ee4aaf

                      SHA1

                      499c9f66cc3eed6b976bc3ed10cac6df29cc3559

                      SHA256

                      c4a2048b68b4e9f5c17233e52a12c6808fa2640d65e9d1b26c2a1938c51baeec

                      SHA512

                      da9272e25accfd4ab1c33c6a4fa9e8debf77703b21d3ac315c7587a59b2718013738872b0ab9efcd9f14ea20290a6ce62c60af73cb6c46acb7bea5b446dddad4

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7054446.exe

                      Filesize

                      307KB

                      MD5

                      e61204c21820c495c9080139bece0e66

                      SHA1

                      d525e198bb6210cdc3070295c956d8d6466e7c4c

                      SHA256

                      6c093de5d62a03e96302dc1921189975fbba7a842436b150dd34a8c72738246c

                      SHA512

                      166ecfa491ab7d3ec6127fd9fa1e652eb029d4a28fca9e2defcf4db78c8d8c7543df19371ba2960c7edc9e911972fe891f82c9a9f3d70022c09c11d81dd6aece

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7054446.exe

                      Filesize

                      307KB

                      MD5

                      e61204c21820c495c9080139bece0e66

                      SHA1

                      d525e198bb6210cdc3070295c956d8d6466e7c4c

                      SHA256

                      6c093de5d62a03e96302dc1921189975fbba7a842436b150dd34a8c72738246c

                      SHA512

                      166ecfa491ab7d3ec6127fd9fa1e652eb029d4a28fca9e2defcf4db78c8d8c7543df19371ba2960c7edc9e911972fe891f82c9a9f3d70022c09c11d81dd6aece

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0195029.exe

                      Filesize

                      182KB

                      MD5

                      3bfc055d6d9522e36d60d829014b139a

                      SHA1

                      f6ad6f7804a92e52f065a0ca91dc5d23c1d61807

                      SHA256

                      f782bbf32299ffdcd9eaec625da5944700d3294ab7936e9f96eebee78f0babb5

                      SHA512

                      829bf7e1fdf351702e753702110a901e35db89f4c34fc663e6ab0a054a1f52c7958f5feeb4dee5ea93762f1fd30e31dd2083841fb4b415017b3b061ac3091019

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k0195029.exe

                      Filesize

                      182KB

                      MD5

                      3bfc055d6d9522e36d60d829014b139a

                      SHA1

                      f6ad6f7804a92e52f065a0ca91dc5d23c1d61807

                      SHA256

                      f782bbf32299ffdcd9eaec625da5944700d3294ab7936e9f96eebee78f0babb5

                      SHA512

                      829bf7e1fdf351702e753702110a901e35db89f4c34fc663e6ab0a054a1f52c7958f5feeb4dee5ea93762f1fd30e31dd2083841fb4b415017b3b061ac3091019

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4415963.exe

                      Filesize

                      168KB

                      MD5

                      9e4d21949a2870e4aa545fa3039d2cab

                      SHA1

                      9e28370e569b78b494dbb0ca2ad1a0de8d0e3467

                      SHA256

                      3b2350ac91f5405555471126d14355e3e5a3c2edd430b9dfa7200200391bfa54

                      SHA512

                      0a7ce7d04254169cf83e258be2b2146b2468c22060393904e63d4fb79f4e75068148ef0d7e80585aca3e074b1c98e01db19fa034e5c6c2a60b085c05c54ed37c

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l4415963.exe

                      Filesize

                      168KB

                      MD5

                      9e4d21949a2870e4aa545fa3039d2cab

                      SHA1

                      9e28370e569b78b494dbb0ca2ad1a0de8d0e3467

                      SHA256

                      3b2350ac91f5405555471126d14355e3e5a3c2edd430b9dfa7200200391bfa54

                      SHA512

                      0a7ce7d04254169cf83e258be2b2146b2468c22060393904e63d4fb79f4e75068148ef0d7e80585aca3e074b1c98e01db19fa034e5c6c2a60b085c05c54ed37c

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      212KB

                      MD5

                      3812eaa2ed1c3e4dfcc225b3a2ee4aaf

                      SHA1

                      499c9f66cc3eed6b976bc3ed10cac6df29cc3559

                      SHA256

                      c4a2048b68b4e9f5c17233e52a12c6808fa2640d65e9d1b26c2a1938c51baeec

                      SHA512

                      da9272e25accfd4ab1c33c6a4fa9e8debf77703b21d3ac315c7587a59b2718013738872b0ab9efcd9f14ea20290a6ce62c60af73cb6c46acb7bea5b446dddad4

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      212KB

                      MD5

                      3812eaa2ed1c3e4dfcc225b3a2ee4aaf

                      SHA1

                      499c9f66cc3eed6b976bc3ed10cac6df29cc3559

                      SHA256

                      c4a2048b68b4e9f5c17233e52a12c6808fa2640d65e9d1b26c2a1938c51baeec

                      SHA512

                      da9272e25accfd4ab1c33c6a4fa9e8debf77703b21d3ac315c7587a59b2718013738872b0ab9efcd9f14ea20290a6ce62c60af73cb6c46acb7bea5b446dddad4

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      212KB

                      MD5

                      3812eaa2ed1c3e4dfcc225b3a2ee4aaf

                      SHA1

                      499c9f66cc3eed6b976bc3ed10cac6df29cc3559

                      SHA256

                      c4a2048b68b4e9f5c17233e52a12c6808fa2640d65e9d1b26c2a1938c51baeec

                      SHA512

                      da9272e25accfd4ab1c33c6a4fa9e8debf77703b21d3ac315c7587a59b2718013738872b0ab9efcd9f14ea20290a6ce62c60af73cb6c46acb7bea5b446dddad4

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      212KB

                      MD5

                      3812eaa2ed1c3e4dfcc225b3a2ee4aaf

                      SHA1

                      499c9f66cc3eed6b976bc3ed10cac6df29cc3559

                      SHA256

                      c4a2048b68b4e9f5c17233e52a12c6808fa2640d65e9d1b26c2a1938c51baeec

                      SHA512

                      da9272e25accfd4ab1c33c6a4fa9e8debf77703b21d3ac315c7587a59b2718013738872b0ab9efcd9f14ea20290a6ce62c60af73cb6c46acb7bea5b446dddad4

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      212KB

                      MD5

                      3812eaa2ed1c3e4dfcc225b3a2ee4aaf

                      SHA1

                      499c9f66cc3eed6b976bc3ed10cac6df29cc3559

                      SHA256

                      c4a2048b68b4e9f5c17233e52a12c6808fa2640d65e9d1b26c2a1938c51baeec

                      SHA512

                      da9272e25accfd4ab1c33c6a4fa9e8debf77703b21d3ac315c7587a59b2718013738872b0ab9efcd9f14ea20290a6ce62c60af73cb6c46acb7bea5b446dddad4

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      8451a2c5daa42b25333b1b2089c5ea39

                      SHA1

                      700cc99ec8d3113435e657070d2d6bde0a833adc

                      SHA256

                      b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                      SHA512

                      6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      8451a2c5daa42b25333b1b2089c5ea39

                      SHA1

                      700cc99ec8d3113435e657070d2d6bde0a833adc

                      SHA256

                      b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                      SHA512

                      6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      8451a2c5daa42b25333b1b2089c5ea39

                      SHA1

                      700cc99ec8d3113435e657070d2d6bde0a833adc

                      SHA256

                      b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                      SHA512

                      6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                      Filesize

                      162B

                      MD5

                      1b7c22a214949975556626d7217e9a39

                      SHA1

                      d01c97e2944166ed23e47e4a62ff471ab8fa031f

                      SHA256

                      340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                      SHA512

                      ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                    • memory/1380-179-0x0000000004A40000-0x0000000004A50000-memory.dmp

                      Filesize

                      64KB

                    • memory/1380-159-0x0000000002500000-0x0000000002512000-memory.dmp

                      Filesize

                      72KB

                    • memory/1380-173-0x0000000002500000-0x0000000002512000-memory.dmp

                      Filesize

                      72KB

                    • memory/1380-175-0x0000000002500000-0x0000000002512000-memory.dmp

                      Filesize

                      72KB

                    • memory/1380-177-0x0000000002500000-0x0000000002512000-memory.dmp

                      Filesize

                      72KB

                    • memory/1380-178-0x0000000004A40000-0x0000000004A50000-memory.dmp

                      Filesize

                      64KB

                    • memory/1380-169-0x0000000002500000-0x0000000002512000-memory.dmp

                      Filesize

                      72KB

                    • memory/1380-180-0x0000000004A40000-0x0000000004A50000-memory.dmp

                      Filesize

                      64KB

                    • memory/1380-167-0x0000000002500000-0x0000000002512000-memory.dmp

                      Filesize

                      72KB

                    • memory/1380-165-0x0000000002500000-0x0000000002512000-memory.dmp

                      Filesize

                      72KB

                    • memory/1380-147-0x0000000004A50000-0x0000000004FF4000-memory.dmp

                      Filesize

                      5.6MB

                    • memory/1380-148-0x0000000004A40000-0x0000000004A50000-memory.dmp

                      Filesize

                      64KB

                    • memory/1380-149-0x0000000004A40000-0x0000000004A50000-memory.dmp

                      Filesize

                      64KB

                    • memory/1380-151-0x0000000002500000-0x0000000002512000-memory.dmp

                      Filesize

                      72KB

                    • memory/1380-150-0x0000000002500000-0x0000000002512000-memory.dmp

                      Filesize

                      72KB

                    • memory/1380-153-0x0000000002500000-0x0000000002512000-memory.dmp

                      Filesize

                      72KB

                    • memory/1380-155-0x0000000002500000-0x0000000002512000-memory.dmp

                      Filesize

                      72KB

                    • memory/1380-171-0x0000000002500000-0x0000000002512000-memory.dmp

                      Filesize

                      72KB

                    • memory/1380-157-0x0000000002500000-0x0000000002512000-memory.dmp

                      Filesize

                      72KB

                    • memory/1380-161-0x0000000002500000-0x0000000002512000-memory.dmp

                      Filesize

                      72KB

                    • memory/1380-163-0x0000000002500000-0x0000000002512000-memory.dmp

                      Filesize

                      72KB

                    • memory/4812-196-0x00000000069F0000-0x0000000006A40000-memory.dmp

                      Filesize

                      320KB

                    • memory/4812-195-0x0000000008CD0000-0x00000000091FC000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/4812-194-0x00000000070B0000-0x0000000007272000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/4812-193-0x0000000005AC0000-0x0000000005B26000-memory.dmp

                      Filesize

                      408KB

                    • memory/4812-192-0x0000000005A20000-0x0000000005AB2000-memory.dmp

                      Filesize

                      584KB

                    • memory/4812-191-0x0000000005900000-0x0000000005976000-memory.dmp

                      Filesize

                      472KB

                    • memory/4812-190-0x00000000052D0000-0x00000000052E0000-memory.dmp

                      Filesize

                      64KB

                    • memory/4812-189-0x00000000055F0000-0x000000000562C000-memory.dmp

                      Filesize

                      240KB

                    • memory/4812-188-0x0000000005590000-0x00000000055A2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4812-187-0x0000000005660000-0x000000000576A000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/4812-186-0x0000000005B40000-0x0000000006158000-memory.dmp

                      Filesize

                      6.1MB

                    • memory/4812-185-0x0000000000B00000-0x0000000000B2E000-memory.dmp

                      Filesize

                      184KB