Analysis

  • max time kernel
    135s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/05/2023, 12:55

General

  • Target

    c686c2af2c145c841522d7571e088b725019b18470dd137f5c06597913bd81c3.exe

  • Size

    478KB

  • MD5

    3279b261a2b559e7ce151b0e4e964779

  • SHA1

    175dea90f5c20ecd55a610e5afc40eadc92427fa

  • SHA256

    c686c2af2c145c841522d7571e088b725019b18470dd137f5c06597913bd81c3

  • SHA512

    34407066392b8dfe9b16c8e98cdc36735a4757eacc3fe4f919b1e8de7b2c9d04a007866a549b3a1140e1370b04c449b49560405bfdceca2fd5eaa1af28aa754f

  • SSDEEP

    12288:tMrpy90M495JP97CSX9/HPMNo7oStA0zA034O:Uy9oC64OlIO

Malware Config

Extracted

Family

redline

Botnet

mauga

C2

217.196.96.102:4132

Attributes
  • auth_value

    36f5411cf117f54076fbbb9ea0631fee

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c686c2af2c145c841522d7571e088b725019b18470dd137f5c06597913bd81c3.exe
    "C:\Users\Admin\AppData\Local\Temp\c686c2af2c145c841522d7571e088b725019b18470dd137f5c06597913bd81c3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1816
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9095889.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9095889.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2692
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a3361032.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a3361032.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1636
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5544048.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5544048.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4248
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d4655559.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d4655559.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3108
      • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2492
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4224
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2764
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:1360
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:N"
              5⤵
                PID:932
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                5⤵
                  PID:4112
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:2668
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\c3912af058" /P "Admin:N"
                    5⤵
                      PID:1732
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\c3912af058" /P "Admin:R" /E
                      5⤵
                        PID:4548
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:3196
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:3280
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:4996

              Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d4655559.exe

                      Filesize

                      213KB

                      MD5

                      ea6790621172690d515c11ccf2d24de0

                      SHA1

                      952f112d5c45fceb82a052cab04ef76ac28d1f8a

                      SHA256

                      0010bb1cb19e5df7e59f1907d3e16b4d563507b39d465e31d84ab8d4c837f776

                      SHA512

                      1167d0931567a87cabaa84c49ec3783ce9705f9172c1cf1ba93b044bb5b7e7a41e661677814bdcab4174f30913a9bb0e88c6d830deab3ffc8a4540c9493c46ed

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d4655559.exe

                      Filesize

                      213KB

                      MD5

                      ea6790621172690d515c11ccf2d24de0

                      SHA1

                      952f112d5c45fceb82a052cab04ef76ac28d1f8a

                      SHA256

                      0010bb1cb19e5df7e59f1907d3e16b4d563507b39d465e31d84ab8d4c837f776

                      SHA512

                      1167d0931567a87cabaa84c49ec3783ce9705f9172c1cf1ba93b044bb5b7e7a41e661677814bdcab4174f30913a9bb0e88c6d830deab3ffc8a4540c9493c46ed

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9095889.exe

                      Filesize

                      307KB

                      MD5

                      d4ed914ca2a155a32f2a7d180faae40c

                      SHA1

                      bc6d23f6aa01fc43dfafdf4acb162ae9512d7a62

                      SHA256

                      04d138468d0f32eee7ad9101af1a958313066f8c795497133b66d6963af1f517

                      SHA512

                      77a9c1c4062f3152f7ba67e49fb68d0ad53efd6043bcbb1cc7c7e386a13657626ae19c98fcdeda6a22715ca0d2795850e187e2e56c7b66670bb3dba4bfa071fd

                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9095889.exe

                      Filesize

                      307KB

                      MD5

                      d4ed914ca2a155a32f2a7d180faae40c

                      SHA1

                      bc6d23f6aa01fc43dfafdf4acb162ae9512d7a62

                      SHA256

                      04d138468d0f32eee7ad9101af1a958313066f8c795497133b66d6963af1f517

                      SHA512

                      77a9c1c4062f3152f7ba67e49fb68d0ad53efd6043bcbb1cc7c7e386a13657626ae19c98fcdeda6a22715ca0d2795850e187e2e56c7b66670bb3dba4bfa071fd

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a3361032.exe

                      Filesize

                      182KB

                      MD5

                      7e20637ad2a1b386b34bfd496cbf3f31

                      SHA1

                      4b03e7a6dc8c43aadd61d728d38a35679dfb8e76

                      SHA256

                      84691eb48d7617c648907f5cdc742395d30065b751098b90940aa182c3374782

                      SHA512

                      0747e93fa2d36a45f59510685fe5939a524434b7f1bd1455cd84f23763b19d499d9e394df5c0312814b89f5c80e11863e09b111d910f87a98e4bbf5c41cd50e2

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a3361032.exe

                      Filesize

                      182KB

                      MD5

                      7e20637ad2a1b386b34bfd496cbf3f31

                      SHA1

                      4b03e7a6dc8c43aadd61d728d38a35679dfb8e76

                      SHA256

                      84691eb48d7617c648907f5cdc742395d30065b751098b90940aa182c3374782

                      SHA512

                      0747e93fa2d36a45f59510685fe5939a524434b7f1bd1455cd84f23763b19d499d9e394df5c0312814b89f5c80e11863e09b111d910f87a98e4bbf5c41cd50e2

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5544048.exe

                      Filesize

                      168KB

                      MD5

                      4b76bec0b5bc8194c21d0b2412ca4783

                      SHA1

                      146d2ecd2e68651231cc18e444469b131122a6e1

                      SHA256

                      414bf0bc1602edd8cb9f9841dba6d22b74dfa5973ad8f3b1869a4628c8d723e3

                      SHA512

                      754630003f4abaae1e99562872048cc8223fb8f975485fb58a59cfba87872988798a34a7cff8ad141aa5fbe5d0712cead89e6c6bf756f5376f6717f3a301fdf1

                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b5544048.exe

                      Filesize

                      168KB

                      MD5

                      4b76bec0b5bc8194c21d0b2412ca4783

                      SHA1

                      146d2ecd2e68651231cc18e444469b131122a6e1

                      SHA256

                      414bf0bc1602edd8cb9f9841dba6d22b74dfa5973ad8f3b1869a4628c8d723e3

                      SHA512

                      754630003f4abaae1e99562872048cc8223fb8f975485fb58a59cfba87872988798a34a7cff8ad141aa5fbe5d0712cead89e6c6bf756f5376f6717f3a301fdf1

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      213KB

                      MD5

                      ea6790621172690d515c11ccf2d24de0

                      SHA1

                      952f112d5c45fceb82a052cab04ef76ac28d1f8a

                      SHA256

                      0010bb1cb19e5df7e59f1907d3e16b4d563507b39d465e31d84ab8d4c837f776

                      SHA512

                      1167d0931567a87cabaa84c49ec3783ce9705f9172c1cf1ba93b044bb5b7e7a41e661677814bdcab4174f30913a9bb0e88c6d830deab3ffc8a4540c9493c46ed

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      213KB

                      MD5

                      ea6790621172690d515c11ccf2d24de0

                      SHA1

                      952f112d5c45fceb82a052cab04ef76ac28d1f8a

                      SHA256

                      0010bb1cb19e5df7e59f1907d3e16b4d563507b39d465e31d84ab8d4c837f776

                      SHA512

                      1167d0931567a87cabaa84c49ec3783ce9705f9172c1cf1ba93b044bb5b7e7a41e661677814bdcab4174f30913a9bb0e88c6d830deab3ffc8a4540c9493c46ed

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      213KB

                      MD5

                      ea6790621172690d515c11ccf2d24de0

                      SHA1

                      952f112d5c45fceb82a052cab04ef76ac28d1f8a

                      SHA256

                      0010bb1cb19e5df7e59f1907d3e16b4d563507b39d465e31d84ab8d4c837f776

                      SHA512

                      1167d0931567a87cabaa84c49ec3783ce9705f9172c1cf1ba93b044bb5b7e7a41e661677814bdcab4174f30913a9bb0e88c6d830deab3ffc8a4540c9493c46ed

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      213KB

                      MD5

                      ea6790621172690d515c11ccf2d24de0

                      SHA1

                      952f112d5c45fceb82a052cab04ef76ac28d1f8a

                      SHA256

                      0010bb1cb19e5df7e59f1907d3e16b4d563507b39d465e31d84ab8d4c837f776

                      SHA512

                      1167d0931567a87cabaa84c49ec3783ce9705f9172c1cf1ba93b044bb5b7e7a41e661677814bdcab4174f30913a9bb0e88c6d830deab3ffc8a4540c9493c46ed

                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                      Filesize

                      213KB

                      MD5

                      ea6790621172690d515c11ccf2d24de0

                      SHA1

                      952f112d5c45fceb82a052cab04ef76ac28d1f8a

                      SHA256

                      0010bb1cb19e5df7e59f1907d3e16b4d563507b39d465e31d84ab8d4c837f776

                      SHA512

                      1167d0931567a87cabaa84c49ec3783ce9705f9172c1cf1ba93b044bb5b7e7a41e661677814bdcab4174f30913a9bb0e88c6d830deab3ffc8a4540c9493c46ed

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      8451a2c5daa42b25333b1b2089c5ea39

                      SHA1

                      700cc99ec8d3113435e657070d2d6bde0a833adc

                      SHA256

                      b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                      SHA512

                      6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      8451a2c5daa42b25333b1b2089c5ea39

                      SHA1

                      700cc99ec8d3113435e657070d2d6bde0a833adc

                      SHA256

                      b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                      SHA512

                      6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                      Filesize

                      89KB

                      MD5

                      8451a2c5daa42b25333b1b2089c5ea39

                      SHA1

                      700cc99ec8d3113435e657070d2d6bde0a833adc

                      SHA256

                      b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                      SHA512

                      6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

                    • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                      Filesize

                      162B

                      MD5

                      1b7c22a214949975556626d7217e9a39

                      SHA1

                      d01c97e2944166ed23e47e4a62ff471ab8fa031f

                      SHA256

                      340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                      SHA512

                      ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

                    • memory/1636-154-0x0000000002650000-0x0000000002662000-memory.dmp

                      Filesize

                      72KB

                    • memory/1636-162-0x0000000002650000-0x0000000002662000-memory.dmp

                      Filesize

                      72KB

                    • memory/1636-174-0x0000000002650000-0x0000000002662000-memory.dmp

                      Filesize

                      72KB

                    • memory/1636-176-0x0000000002650000-0x0000000002662000-memory.dmp

                      Filesize

                      72KB

                    • memory/1636-177-0x0000000004C80000-0x0000000004C90000-memory.dmp

                      Filesize

                      64KB

                    • memory/1636-170-0x0000000002650000-0x0000000002662000-memory.dmp

                      Filesize

                      72KB

                    • memory/1636-168-0x0000000002650000-0x0000000002662000-memory.dmp

                      Filesize

                      72KB

                    • memory/1636-166-0x0000000002650000-0x0000000002662000-memory.dmp

                      Filesize

                      72KB

                    • memory/1636-164-0x0000000002650000-0x0000000002662000-memory.dmp

                      Filesize

                      72KB

                    • memory/1636-172-0x0000000002650000-0x0000000002662000-memory.dmp

                      Filesize

                      72KB

                    • memory/1636-160-0x0000000002650000-0x0000000002662000-memory.dmp

                      Filesize

                      72KB

                    • memory/1636-158-0x0000000002650000-0x0000000002662000-memory.dmp

                      Filesize

                      72KB

                    • memory/1636-156-0x0000000002650000-0x0000000002662000-memory.dmp

                      Filesize

                      72KB

                    • memory/1636-152-0x0000000002650000-0x0000000002662000-memory.dmp

                      Filesize

                      72KB

                    • memory/1636-149-0x0000000002650000-0x0000000002662000-memory.dmp

                      Filesize

                      72KB

                    • memory/1636-150-0x0000000002650000-0x0000000002662000-memory.dmp

                      Filesize

                      72KB

                    • memory/1636-148-0x0000000004C90000-0x0000000005234000-memory.dmp

                      Filesize

                      5.6MB

                    • memory/1636-147-0x0000000004C80000-0x0000000004C90000-memory.dmp

                      Filesize

                      64KB

                    • memory/4248-182-0x0000000000260000-0x000000000028E000-memory.dmp

                      Filesize

                      184KB

                    • memory/4248-194-0x0000000004B30000-0x0000000004B40000-memory.dmp

                      Filesize

                      64KB

                    • memory/4248-193-0x0000000006920000-0x0000000006970000-memory.dmp

                      Filesize

                      320KB

                    • memory/4248-192-0x00000000084F0000-0x0000000008A1C000-memory.dmp

                      Filesize

                      5.2MB

                    • memory/4248-191-0x0000000006140000-0x0000000006302000-memory.dmp

                      Filesize

                      1.8MB

                    • memory/4248-190-0x0000000005980000-0x00000000059E6000-memory.dmp

                      Filesize

                      408KB

                    • memory/4248-189-0x0000000005180000-0x0000000005212000-memory.dmp

                      Filesize

                      584KB

                    • memory/4248-188-0x0000000005060000-0x00000000050D6000-memory.dmp

                      Filesize

                      472KB

                    • memory/4248-187-0x0000000004D80000-0x0000000004DBC000-memory.dmp

                      Filesize

                      240KB

                    • memory/4248-186-0x0000000004B30000-0x0000000004B40000-memory.dmp

                      Filesize

                      64KB

                    • memory/4248-185-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

                      Filesize

                      72KB

                    • memory/4248-184-0x0000000004E50000-0x0000000004F5A000-memory.dmp

                      Filesize

                      1.0MB

                    • memory/4248-183-0x0000000005360000-0x0000000005978000-memory.dmp

                      Filesize

                      6.1MB