Analysis
-
max time kernel
135s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2023, 12:44
Static task
static1
Behavioral task
behavioral1
Sample
e4ad7cf55e35f91f420c5c7ca8755fe0aaef072cf12c12a78168ff32a059e009.exe
Resource
win10v2004-20230220-en
General
-
Target
e4ad7cf55e35f91f420c5c7ca8755fe0aaef072cf12c12a78168ff32a059e009.exe
-
Size
478KB
-
MD5
126eb5cf1ac66140f9fed8c03b6aa762
-
SHA1
6a97f74c2738b9626c63b76a00e1b9a3319ffab1
-
SHA256
e4ad7cf55e35f91f420c5c7ca8755fe0aaef072cf12c12a78168ff32a059e009
-
SHA512
15fcaf2453e218e8f8e2af3c8f93852f9fd98f5bea30a166c10f259ed3612bc5ff96401d752f91fd1b810657e4a7a923377319ff21535e7efc689c074fe866fc
-
SSDEEP
12288:+Mr2y90YsvVyVe19sbAh2bOg4SGwrV11aZO3OMoI:Uy9FVhA4OpSGIVXUBI
Malware Config
Extracted
redline
dippo
217.196.96.102:4132
-
auth_value
79490ff628fd6af3b29170c3c163874b
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k1820951.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k1820951.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k1820951.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k1820951.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k1820951.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k1820951.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation m2751663.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 2068 y5194858.exe 4464 k1820951.exe 4252 l0406470.exe 1636 m2751663.exe 1176 oneetx.exe 1964 oneetx.exe 4216 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 3712 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k1820951.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k1820951.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y5194858.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y5194858.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e4ad7cf55e35f91f420c5c7ca8755fe0aaef072cf12c12a78168ff32a059e009.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e4ad7cf55e35f91f420c5c7ca8755fe0aaef072cf12c12a78168ff32a059e009.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3004 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4464 k1820951.exe 4464 k1820951.exe 4252 l0406470.exe 4252 l0406470.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4464 k1820951.exe Token: SeDebugPrivilege 4252 l0406470.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1636 m2751663.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4908 wrote to memory of 2068 4908 e4ad7cf55e35f91f420c5c7ca8755fe0aaef072cf12c12a78168ff32a059e009.exe 85 PID 4908 wrote to memory of 2068 4908 e4ad7cf55e35f91f420c5c7ca8755fe0aaef072cf12c12a78168ff32a059e009.exe 85 PID 4908 wrote to memory of 2068 4908 e4ad7cf55e35f91f420c5c7ca8755fe0aaef072cf12c12a78168ff32a059e009.exe 85 PID 2068 wrote to memory of 4464 2068 y5194858.exe 86 PID 2068 wrote to memory of 4464 2068 y5194858.exe 86 PID 2068 wrote to memory of 4464 2068 y5194858.exe 86 PID 2068 wrote to memory of 4252 2068 y5194858.exe 90 PID 2068 wrote to memory of 4252 2068 y5194858.exe 90 PID 2068 wrote to memory of 4252 2068 y5194858.exe 90 PID 4908 wrote to memory of 1636 4908 e4ad7cf55e35f91f420c5c7ca8755fe0aaef072cf12c12a78168ff32a059e009.exe 91 PID 4908 wrote to memory of 1636 4908 e4ad7cf55e35f91f420c5c7ca8755fe0aaef072cf12c12a78168ff32a059e009.exe 91 PID 4908 wrote to memory of 1636 4908 e4ad7cf55e35f91f420c5c7ca8755fe0aaef072cf12c12a78168ff32a059e009.exe 91 PID 1636 wrote to memory of 1176 1636 m2751663.exe 92 PID 1636 wrote to memory of 1176 1636 m2751663.exe 92 PID 1636 wrote to memory of 1176 1636 m2751663.exe 92 PID 1176 wrote to memory of 3004 1176 oneetx.exe 93 PID 1176 wrote to memory of 3004 1176 oneetx.exe 93 PID 1176 wrote to memory of 3004 1176 oneetx.exe 93 PID 1176 wrote to memory of 3632 1176 oneetx.exe 95 PID 1176 wrote to memory of 3632 1176 oneetx.exe 95 PID 1176 wrote to memory of 3632 1176 oneetx.exe 95 PID 3632 wrote to memory of 892 3632 cmd.exe 97 PID 3632 wrote to memory of 892 3632 cmd.exe 97 PID 3632 wrote to memory of 892 3632 cmd.exe 97 PID 3632 wrote to memory of 3396 3632 cmd.exe 98 PID 3632 wrote to memory of 3396 3632 cmd.exe 98 PID 3632 wrote to memory of 3396 3632 cmd.exe 98 PID 3632 wrote to memory of 1492 3632 cmd.exe 99 PID 3632 wrote to memory of 1492 3632 cmd.exe 99 PID 3632 wrote to memory of 1492 3632 cmd.exe 99 PID 3632 wrote to memory of 4516 3632 cmd.exe 100 PID 3632 wrote to memory of 4516 3632 cmd.exe 100 PID 3632 wrote to memory of 4516 3632 cmd.exe 100 PID 3632 wrote to memory of 4364 3632 cmd.exe 101 PID 3632 wrote to memory of 4364 3632 cmd.exe 101 PID 3632 wrote to memory of 4364 3632 cmd.exe 101 PID 3632 wrote to memory of 4044 3632 cmd.exe 102 PID 3632 wrote to memory of 4044 3632 cmd.exe 102 PID 3632 wrote to memory of 4044 3632 cmd.exe 102 PID 1176 wrote to memory of 3712 1176 oneetx.exe 109 PID 1176 wrote to memory of 3712 1176 oneetx.exe 109 PID 1176 wrote to memory of 3712 1176 oneetx.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4ad7cf55e35f91f420c5c7ca8755fe0aaef072cf12c12a78168ff32a059e009.exe"C:\Users\Admin\AppData\Local\Temp\e4ad7cf55e35f91f420c5c7ca8755fe0aaef072cf12c12a78168ff32a059e009.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5194858.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y5194858.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k1820951.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k1820951.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4464
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l0406470.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l0406470.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4252
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m2751663.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m2751663.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3004
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:892
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:3396
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:1492
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:4516
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4364
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:4044
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:3712
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1964
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4216
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD57df0ed85e017b94b3d2e0efaa1cfe6a5
SHA17a5a5e07d034d846ffaadf4a22f7da071a3abd14
SHA256851aaf4f7fdc275f81726cc91d12d98643bccf2c6ea71fa7de5c0b97a7f4920a
SHA512145292e09f8aed1ede82791dce9d712af9e197b337a48c35b8157e6f4e8d64be03e2196680835ceb3d21efbd36805e180cb275302c013e12bdb219f5aa833c87
-
Filesize
213KB
MD57df0ed85e017b94b3d2e0efaa1cfe6a5
SHA17a5a5e07d034d846ffaadf4a22f7da071a3abd14
SHA256851aaf4f7fdc275f81726cc91d12d98643bccf2c6ea71fa7de5c0b97a7f4920a
SHA512145292e09f8aed1ede82791dce9d712af9e197b337a48c35b8157e6f4e8d64be03e2196680835ceb3d21efbd36805e180cb275302c013e12bdb219f5aa833c87
-
Filesize
307KB
MD5d71fec299a4023262b88b2329a9ed854
SHA1cc235f12fa7bc0fad38610a9ff91ada7efbdf0a7
SHA2565c0cc92bc18c4e24e94d44c37c7eb28a9c8f7a51a7b9fcb7b9b81b68eaa15fa6
SHA512b87cef0d6fcb2844ea69f1add79d430809f9a4fc7eca4ed4e7c2f03780cd6f8fed4b9af8629452781803b3ef24492d7783ac47439698abef4429602378973ef4
-
Filesize
307KB
MD5d71fec299a4023262b88b2329a9ed854
SHA1cc235f12fa7bc0fad38610a9ff91ada7efbdf0a7
SHA2565c0cc92bc18c4e24e94d44c37c7eb28a9c8f7a51a7b9fcb7b9b81b68eaa15fa6
SHA512b87cef0d6fcb2844ea69f1add79d430809f9a4fc7eca4ed4e7c2f03780cd6f8fed4b9af8629452781803b3ef24492d7783ac47439698abef4429602378973ef4
-
Filesize
182KB
MD59578fa220b531eea6dafda978cf8e4a4
SHA1e21bd66227d844460c36e9f294b59a6a79eed929
SHA256fef8ca4d60595b876e1f9d916fb9e2bcbfc7db86ce26b458dc3ef5539d768d3e
SHA51234f2605d105ef4b55d93c3880f4fa5d9315beeb5f4b1e4f5aae528fa44600c78776a6694530dd617891cabae55ad9a75aeb7e3227c4d3f367080e557b731fd6e
-
Filesize
182KB
MD59578fa220b531eea6dafda978cf8e4a4
SHA1e21bd66227d844460c36e9f294b59a6a79eed929
SHA256fef8ca4d60595b876e1f9d916fb9e2bcbfc7db86ce26b458dc3ef5539d768d3e
SHA51234f2605d105ef4b55d93c3880f4fa5d9315beeb5f4b1e4f5aae528fa44600c78776a6694530dd617891cabae55ad9a75aeb7e3227c4d3f367080e557b731fd6e
-
Filesize
168KB
MD5163360b438c242b42afe0eea4772b6b2
SHA1c346c85fa5551718714cbdb0c0fb909a311ea81d
SHA2561ef0f147024dc90a1cda4d6b83d582412d99e51efc2350b323c0088fe744e7d3
SHA512f0be703d457312668c70e3a2a3789117ec5d3b975e05e24eddffc726a522e9358ba0e3cfa028aa66d6a2f93f159b0a216e73c67025a5c024647fd032a4f9f85d
-
Filesize
168KB
MD5163360b438c242b42afe0eea4772b6b2
SHA1c346c85fa5551718714cbdb0c0fb909a311ea81d
SHA2561ef0f147024dc90a1cda4d6b83d582412d99e51efc2350b323c0088fe744e7d3
SHA512f0be703d457312668c70e3a2a3789117ec5d3b975e05e24eddffc726a522e9358ba0e3cfa028aa66d6a2f93f159b0a216e73c67025a5c024647fd032a4f9f85d
-
Filesize
213KB
MD57df0ed85e017b94b3d2e0efaa1cfe6a5
SHA17a5a5e07d034d846ffaadf4a22f7da071a3abd14
SHA256851aaf4f7fdc275f81726cc91d12d98643bccf2c6ea71fa7de5c0b97a7f4920a
SHA512145292e09f8aed1ede82791dce9d712af9e197b337a48c35b8157e6f4e8d64be03e2196680835ceb3d21efbd36805e180cb275302c013e12bdb219f5aa833c87
-
Filesize
213KB
MD57df0ed85e017b94b3d2e0efaa1cfe6a5
SHA17a5a5e07d034d846ffaadf4a22f7da071a3abd14
SHA256851aaf4f7fdc275f81726cc91d12d98643bccf2c6ea71fa7de5c0b97a7f4920a
SHA512145292e09f8aed1ede82791dce9d712af9e197b337a48c35b8157e6f4e8d64be03e2196680835ceb3d21efbd36805e180cb275302c013e12bdb219f5aa833c87
-
Filesize
213KB
MD57df0ed85e017b94b3d2e0efaa1cfe6a5
SHA17a5a5e07d034d846ffaadf4a22f7da071a3abd14
SHA256851aaf4f7fdc275f81726cc91d12d98643bccf2c6ea71fa7de5c0b97a7f4920a
SHA512145292e09f8aed1ede82791dce9d712af9e197b337a48c35b8157e6f4e8d64be03e2196680835ceb3d21efbd36805e180cb275302c013e12bdb219f5aa833c87
-
Filesize
213KB
MD57df0ed85e017b94b3d2e0efaa1cfe6a5
SHA17a5a5e07d034d846ffaadf4a22f7da071a3abd14
SHA256851aaf4f7fdc275f81726cc91d12d98643bccf2c6ea71fa7de5c0b97a7f4920a
SHA512145292e09f8aed1ede82791dce9d712af9e197b337a48c35b8157e6f4e8d64be03e2196680835ceb3d21efbd36805e180cb275302c013e12bdb219f5aa833c87
-
Filesize
213KB
MD57df0ed85e017b94b3d2e0efaa1cfe6a5
SHA17a5a5e07d034d846ffaadf4a22f7da071a3abd14
SHA256851aaf4f7fdc275f81726cc91d12d98643bccf2c6ea71fa7de5c0b97a7f4920a
SHA512145292e09f8aed1ede82791dce9d712af9e197b337a48c35b8157e6f4e8d64be03e2196680835ceb3d21efbd36805e180cb275302c013e12bdb219f5aa833c87
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5