Analysis

  • max time kernel
    143s
  • max time network
    144s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10/05/2023, 14:06

General

  • Target

    e8231fce9398c0de54b9dbc4995f59b7646174ca3bad3c63c680953cf333d861.exe

  • Size

    487KB

  • MD5

    239b79e5146725f4ddb571f4ffd3da3a

  • SHA1

    98c09bc8e15ca0e99293da6152f52a548a57e91f

  • SHA256

    e8231fce9398c0de54b9dbc4995f59b7646174ca3bad3c63c680953cf333d861

  • SHA512

    0054a3f5ccb6aa9225e8e89911359da11daabbbf93f78333ccb3aec4e70413e7de6219307f196fb82f0bbf96093ab76585f35b720ff11f42affd650e294c04c5

  • SSDEEP

    6144:K+y+bnr+fp0yN90QEUu1xA4hR0dJRF3D2w6jG0NTdzgqzYpP3qRwI+o9MTzYlmVC:WMrTy90uupR0T/63N5EzEz6AlmVOLAa

Malware Config

Extracted

Family

redline

Botnet

mauga

C2

217.196.96.102:4132

Attributes
  • auth_value

    36f5411cf117f54076fbbb9ea0631fee

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8231fce9398c0de54b9dbc4995f59b7646174ca3bad3c63c680953cf333d861.exe
    "C:\Users\Admin\AppData\Local\Temp\e8231fce9398c0de54b9dbc4995f59b7646174ca3bad3c63c680953cf333d861.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0244749.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0244749.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3276
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4858989.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4858989.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3748
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b7788513.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b7788513.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1764
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2054472.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2054472.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2260
      • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4660
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4948
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4536
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:4620
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:N"
              5⤵
                PID:4544
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                5⤵
                  PID:4560
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:1756
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\c3912af058" /P "Admin:N"
                    5⤵
                      PID:2944
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\c3912af058" /P "Admin:R" /E
                      5⤵
                        PID:3688
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:3888
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:3884
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:5028

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2054472.exe

                Filesize

                213KB

                MD5

                ffd9a4f63abb00cf8e5a89b74907f064

                SHA1

                09027c1c101603a2c1419f6e766f8bdb7fe0e5d4

                SHA256

                9fafc5946cb7be1d3634ad63d3599e579d68b5f35eb1129b4e25a9e25a80376a

                SHA512

                be7c833689b8ce29a4135e655964dd595d652a0a5f3f71246880004b93d8e1d0d1bf10f3374bd8b47874d58b569861832052ebacfe3ed568ff8636ff66b2818f

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2054472.exe

                Filesize

                213KB

                MD5

                ffd9a4f63abb00cf8e5a89b74907f064

                SHA1

                09027c1c101603a2c1419f6e766f8bdb7fe0e5d4

                SHA256

                9fafc5946cb7be1d3634ad63d3599e579d68b5f35eb1129b4e25a9e25a80376a

                SHA512

                be7c833689b8ce29a4135e655964dd595d652a0a5f3f71246880004b93d8e1d0d1bf10f3374bd8b47874d58b569861832052ebacfe3ed568ff8636ff66b2818f

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0244749.exe

                Filesize

                316KB

                MD5

                bfe689a8a8acd2d5992b93f93f9b1995

                SHA1

                bc18ceb4105202c3fd103291f5662a33a9da92c6

                SHA256

                9ad4f7d94723e3c7f90b8baed8d229376a11ab9973530fe556f5f65311bc4a9a

                SHA512

                60672d72ebae72b88c6c63c078ad5b50e34e220adc0498a5044d9f131266b4989c1a40f9d22d4e90823862f35250dba16065ce9eef81a0a7f3d2db7f58aa007b

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0244749.exe

                Filesize

                316KB

                MD5

                bfe689a8a8acd2d5992b93f93f9b1995

                SHA1

                bc18ceb4105202c3fd103291f5662a33a9da92c6

                SHA256

                9ad4f7d94723e3c7f90b8baed8d229376a11ab9973530fe556f5f65311bc4a9a

                SHA512

                60672d72ebae72b88c6c63c078ad5b50e34e220adc0498a5044d9f131266b4989c1a40f9d22d4e90823862f35250dba16065ce9eef81a0a7f3d2db7f58aa007b

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4858989.exe

                Filesize

                184KB

                MD5

                afa93973662f088a58c92d4998fb0b27

                SHA1

                d6d1e28699499f8fba17acc592bd0dda7913de27

                SHA256

                fe666bb22a3581c2d789288d04d1d608fd703b811a22a02bbc71fdd675bcc2bc

                SHA512

                20e2060833374434bd9a9de350f99cc8513da1008fd2fe73da1ce31aeb752c7b1c6be14ad9183398274636805817ec4803ae9d34efcfae59b701c86079ec80bd

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4858989.exe

                Filesize

                184KB

                MD5

                afa93973662f088a58c92d4998fb0b27

                SHA1

                d6d1e28699499f8fba17acc592bd0dda7913de27

                SHA256

                fe666bb22a3581c2d789288d04d1d608fd703b811a22a02bbc71fdd675bcc2bc

                SHA512

                20e2060833374434bd9a9de350f99cc8513da1008fd2fe73da1ce31aeb752c7b1c6be14ad9183398274636805817ec4803ae9d34efcfae59b701c86079ec80bd

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b7788513.exe

                Filesize

                168KB

                MD5

                fc1a50517ced7375cf5a798a36d31e33

                SHA1

                9ccb653577e65de41c5a084459023dcf0c2e9685

                SHA256

                355bde4f13e8ff4ac6f4e862bbd675e74b088d18737b4ef340ba49bb310f6562

                SHA512

                666fcdf5e4a7737d4d04dac03fdcbf7ad3666bc0b4e1dd80da0095b91674db4e3a3cc698953c406bd40cb2243e01bd16e8f8f48ea5e0f4e011aca3ec91443ef8

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b7788513.exe

                Filesize

                168KB

                MD5

                fc1a50517ced7375cf5a798a36d31e33

                SHA1

                9ccb653577e65de41c5a084459023dcf0c2e9685

                SHA256

                355bde4f13e8ff4ac6f4e862bbd675e74b088d18737b4ef340ba49bb310f6562

                SHA512

                666fcdf5e4a7737d4d04dac03fdcbf7ad3666bc0b4e1dd80da0095b91674db4e3a3cc698953c406bd40cb2243e01bd16e8f8f48ea5e0f4e011aca3ec91443ef8

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                213KB

                MD5

                ffd9a4f63abb00cf8e5a89b74907f064

                SHA1

                09027c1c101603a2c1419f6e766f8bdb7fe0e5d4

                SHA256

                9fafc5946cb7be1d3634ad63d3599e579d68b5f35eb1129b4e25a9e25a80376a

                SHA512

                be7c833689b8ce29a4135e655964dd595d652a0a5f3f71246880004b93d8e1d0d1bf10f3374bd8b47874d58b569861832052ebacfe3ed568ff8636ff66b2818f

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                213KB

                MD5

                ffd9a4f63abb00cf8e5a89b74907f064

                SHA1

                09027c1c101603a2c1419f6e766f8bdb7fe0e5d4

                SHA256

                9fafc5946cb7be1d3634ad63d3599e579d68b5f35eb1129b4e25a9e25a80376a

                SHA512

                be7c833689b8ce29a4135e655964dd595d652a0a5f3f71246880004b93d8e1d0d1bf10f3374bd8b47874d58b569861832052ebacfe3ed568ff8636ff66b2818f

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                213KB

                MD5

                ffd9a4f63abb00cf8e5a89b74907f064

                SHA1

                09027c1c101603a2c1419f6e766f8bdb7fe0e5d4

                SHA256

                9fafc5946cb7be1d3634ad63d3599e579d68b5f35eb1129b4e25a9e25a80376a

                SHA512

                be7c833689b8ce29a4135e655964dd595d652a0a5f3f71246880004b93d8e1d0d1bf10f3374bd8b47874d58b569861832052ebacfe3ed568ff8636ff66b2818f

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                213KB

                MD5

                ffd9a4f63abb00cf8e5a89b74907f064

                SHA1

                09027c1c101603a2c1419f6e766f8bdb7fe0e5d4

                SHA256

                9fafc5946cb7be1d3634ad63d3599e579d68b5f35eb1129b4e25a9e25a80376a

                SHA512

                be7c833689b8ce29a4135e655964dd595d652a0a5f3f71246880004b93d8e1d0d1bf10f3374bd8b47874d58b569861832052ebacfe3ed568ff8636ff66b2818f

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                213KB

                MD5

                ffd9a4f63abb00cf8e5a89b74907f064

                SHA1

                09027c1c101603a2c1419f6e766f8bdb7fe0e5d4

                SHA256

                9fafc5946cb7be1d3634ad63d3599e579d68b5f35eb1129b4e25a9e25a80376a

                SHA512

                be7c833689b8ce29a4135e655964dd595d652a0a5f3f71246880004b93d8e1d0d1bf10f3374bd8b47874d58b569861832052ebacfe3ed568ff8636ff66b2818f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • memory/1764-184-0x0000000006A80000-0x0000000006C42000-memory.dmp

                Filesize

                1.8MB

              • memory/1764-176-0x0000000004EE0000-0x0000000004EF2000-memory.dmp

                Filesize

                72KB

              • memory/1764-185-0x0000000008800000-0x0000000008D2C000-memory.dmp

                Filesize

                5.2MB

              • memory/1764-183-0x0000000005C70000-0x0000000005CC0000-memory.dmp

                Filesize

                320KB

              • memory/1764-182-0x0000000005420000-0x0000000005486000-memory.dmp

                Filesize

                408KB

              • memory/1764-181-0x0000000005380000-0x0000000005412000-memory.dmp

                Filesize

                584KB

              • memory/1764-180-0x0000000005260000-0x00000000052D6000-memory.dmp

                Filesize

                472KB

              • memory/1764-179-0x0000000004F40000-0x0000000004F50000-memory.dmp

                Filesize

                64KB

              • memory/1764-178-0x0000000004F90000-0x0000000004FDB000-memory.dmp

                Filesize

                300KB

              • memory/1764-177-0x0000000004F50000-0x0000000004F8E000-memory.dmp

                Filesize

                248KB

              • memory/1764-172-0x00000000005D0000-0x00000000005FE000-memory.dmp

                Filesize

                184KB

              • memory/1764-173-0x0000000000DD0000-0x0000000000DD6000-memory.dmp

                Filesize

                24KB

              • memory/1764-174-0x0000000005560000-0x0000000005B66000-memory.dmp

                Filesize

                6.0MB

              • memory/1764-175-0x0000000005060000-0x000000000516A000-memory.dmp

                Filesize

                1.0MB

              • memory/3748-153-0x0000000002610000-0x0000000002626000-memory.dmp

                Filesize

                88KB

              • memory/3748-147-0x0000000002610000-0x0000000002626000-memory.dmp

                Filesize

                88KB

              • memory/3748-155-0x0000000002610000-0x0000000002626000-memory.dmp

                Filesize

                88KB

              • memory/3748-167-0x0000000002660000-0x0000000002670000-memory.dmp

                Filesize

                64KB

              • memory/3748-166-0x0000000002660000-0x0000000002670000-memory.dmp

                Filesize

                64KB

              • memory/3748-165-0x0000000002610000-0x0000000002626000-memory.dmp

                Filesize

                88KB

              • memory/3748-163-0x0000000002610000-0x0000000002626000-memory.dmp

                Filesize

                88KB

              • memory/3748-161-0x0000000002610000-0x0000000002626000-memory.dmp

                Filesize

                88KB

              • memory/3748-151-0x0000000002610000-0x0000000002626000-memory.dmp

                Filesize

                88KB

              • memory/3748-159-0x0000000002610000-0x0000000002626000-memory.dmp

                Filesize

                88KB

              • memory/3748-149-0x0000000002610000-0x0000000002626000-memory.dmp

                Filesize

                88KB

              • memory/3748-157-0x0000000002610000-0x0000000002626000-memory.dmp

                Filesize

                88KB

              • memory/3748-145-0x0000000002610000-0x0000000002626000-memory.dmp

                Filesize

                88KB

              • memory/3748-143-0x0000000002610000-0x0000000002626000-memory.dmp

                Filesize

                88KB

              • memory/3748-141-0x0000000002610000-0x0000000002626000-memory.dmp

                Filesize

                88KB

              • memory/3748-139-0x0000000002610000-0x0000000002626000-memory.dmp

                Filesize

                88KB

              • memory/3748-138-0x0000000002610000-0x0000000002626000-memory.dmp

                Filesize

                88KB

              • memory/3748-137-0x0000000002610000-0x000000000262C000-memory.dmp

                Filesize

                112KB

              • memory/3748-136-0x0000000004B40000-0x000000000503E000-memory.dmp

                Filesize

                5.0MB

              • memory/3748-135-0x0000000002660000-0x0000000002670000-memory.dmp

                Filesize

                64KB

              • memory/3748-134-0x0000000002110000-0x000000000212E000-memory.dmp

                Filesize

                120KB