Analysis
-
max time kernel
135s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
10/05/2023, 14:56
Static task
static1
Behavioral task
behavioral1
Sample
2db49b4f3b41ab0a0abf99106aabd2559480e339b0123be037da883c6e102eb4.exe
Resource
win10-20230220-en
General
-
Target
2db49b4f3b41ab0a0abf99106aabd2559480e339b0123be037da883c6e102eb4.exe
-
Size
488KB
-
MD5
411da3816eadb198b71bf96fbe6a3c17
-
SHA1
b6d6b073ce0a1f8ad501fd81900db9a10b80a37f
-
SHA256
2db49b4f3b41ab0a0abf99106aabd2559480e339b0123be037da883c6e102eb4
-
SHA512
408b4dd861fe908dbde3063677e9d9def90fb72ed927303eb7f69c1596f066931218be74ef33764540a18446299fdb49005e90621b113dc1121e00d8dd9846cd
-
SSDEEP
12288:lMr3y90P9IaC77LH2shahhCBpir5KJtQKV8qSAZk23po/:myUMXM0A52Sd63po/
Malware Config
Extracted
redline
mauga
217.196.96.102:4132
-
auth_value
36f5411cf117f54076fbbb9ea0631fee
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a6131780.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a6131780.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a6131780.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a6131780.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a6131780.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 7 IoCs
pid Process 3608 v9101501.exe 3268 a6131780.exe 2188 b2161793.exe 3812 d6400137.exe 2908 oneetx.exe 3388 oneetx.exe 3192 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 1300 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a6131780.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a6131780.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2db49b4f3b41ab0a0abf99106aabd2559480e339b0123be037da883c6e102eb4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2db49b4f3b41ab0a0abf99106aabd2559480e339b0123be037da883c6e102eb4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v9101501.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v9101501.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 464 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3268 a6131780.exe 3268 a6131780.exe 2188 b2161793.exe 2188 b2161793.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3268 a6131780.exe Token: SeDebugPrivilege 2188 b2161793.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3812 d6400137.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 3304 wrote to memory of 3608 3304 2db49b4f3b41ab0a0abf99106aabd2559480e339b0123be037da883c6e102eb4.exe 66 PID 3304 wrote to memory of 3608 3304 2db49b4f3b41ab0a0abf99106aabd2559480e339b0123be037da883c6e102eb4.exe 66 PID 3304 wrote to memory of 3608 3304 2db49b4f3b41ab0a0abf99106aabd2559480e339b0123be037da883c6e102eb4.exe 66 PID 3608 wrote to memory of 3268 3608 v9101501.exe 67 PID 3608 wrote to memory of 3268 3608 v9101501.exe 67 PID 3608 wrote to memory of 3268 3608 v9101501.exe 67 PID 3608 wrote to memory of 2188 3608 v9101501.exe 68 PID 3608 wrote to memory of 2188 3608 v9101501.exe 68 PID 3608 wrote to memory of 2188 3608 v9101501.exe 68 PID 3304 wrote to memory of 3812 3304 2db49b4f3b41ab0a0abf99106aabd2559480e339b0123be037da883c6e102eb4.exe 70 PID 3304 wrote to memory of 3812 3304 2db49b4f3b41ab0a0abf99106aabd2559480e339b0123be037da883c6e102eb4.exe 70 PID 3304 wrote to memory of 3812 3304 2db49b4f3b41ab0a0abf99106aabd2559480e339b0123be037da883c6e102eb4.exe 70 PID 3812 wrote to memory of 2908 3812 d6400137.exe 71 PID 3812 wrote to memory of 2908 3812 d6400137.exe 71 PID 3812 wrote to memory of 2908 3812 d6400137.exe 71 PID 2908 wrote to memory of 464 2908 oneetx.exe 72 PID 2908 wrote to memory of 464 2908 oneetx.exe 72 PID 2908 wrote to memory of 464 2908 oneetx.exe 72 PID 2908 wrote to memory of 2196 2908 oneetx.exe 74 PID 2908 wrote to memory of 2196 2908 oneetx.exe 74 PID 2908 wrote to memory of 2196 2908 oneetx.exe 74 PID 2196 wrote to memory of 340 2196 cmd.exe 76 PID 2196 wrote to memory of 340 2196 cmd.exe 76 PID 2196 wrote to memory of 340 2196 cmd.exe 76 PID 2196 wrote to memory of 256 2196 cmd.exe 77 PID 2196 wrote to memory of 256 2196 cmd.exe 77 PID 2196 wrote to memory of 256 2196 cmd.exe 77 PID 2196 wrote to memory of 228 2196 cmd.exe 78 PID 2196 wrote to memory of 228 2196 cmd.exe 78 PID 2196 wrote to memory of 228 2196 cmd.exe 78 PID 2196 wrote to memory of 216 2196 cmd.exe 79 PID 2196 wrote to memory of 216 2196 cmd.exe 79 PID 2196 wrote to memory of 216 2196 cmd.exe 79 PID 2196 wrote to memory of 208 2196 cmd.exe 80 PID 2196 wrote to memory of 208 2196 cmd.exe 80 PID 2196 wrote to memory of 208 2196 cmd.exe 80 PID 2196 wrote to memory of 1356 2196 cmd.exe 81 PID 2196 wrote to memory of 1356 2196 cmd.exe 81 PID 2196 wrote to memory of 1356 2196 cmd.exe 81 PID 2908 wrote to memory of 1300 2908 oneetx.exe 83 PID 2908 wrote to memory of 1300 2908 oneetx.exe 83 PID 2908 wrote to memory of 1300 2908 oneetx.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\2db49b4f3b41ab0a0abf99106aabd2559480e339b0123be037da883c6e102eb4.exe"C:\Users\Admin\AppData\Local\Temp\2db49b4f3b41ab0a0abf99106aabd2559480e339b0123be037da883c6e102eb4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9101501.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v9101501.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a6131780.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a6131780.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3268
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b2161793.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b2161793.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2188
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6400137.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6400137.exe2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:464
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:340
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:256
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:228
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:216
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:208
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:1356
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:1300
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3388
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3192
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD508b0016a2d378c0a18b6c28fcafdcbb7
SHA1107cc06136beb22cac3a034c7cb1fac9a09bf610
SHA256a705bfbedf758e449fd7fbb166e5773b59192eed9784b4e70659b1202c4ad67a
SHA51242ff1b850ba78f75fc08e0795a2e76f33659ee9d22d275b39abe5de0647b146d81800f3472bfbfdb4123f75fb0cae92f462d59db1955ee2f341ecc04ecde4824
-
Filesize
213KB
MD508b0016a2d378c0a18b6c28fcafdcbb7
SHA1107cc06136beb22cac3a034c7cb1fac9a09bf610
SHA256a705bfbedf758e449fd7fbb166e5773b59192eed9784b4e70659b1202c4ad67a
SHA51242ff1b850ba78f75fc08e0795a2e76f33659ee9d22d275b39abe5de0647b146d81800f3472bfbfdb4123f75fb0cae92f462d59db1955ee2f341ecc04ecde4824
-
Filesize
316KB
MD52904d652ad7490a647243f421a579645
SHA175dbfc4d9b2a00bd0c5f052b51af2e4c7b20e3d5
SHA256e12d5f24aa79f32a929dd214c6962c319bc4939921860063e6c5302663e6e1d5
SHA51207292f9edd7d12187b759a27bf52dee2af25b67824e53c6da927df4962ed4c1cb45353fc1ef3705d18e0b84dbff8fda68e8746ca9ce95d6722afa6b8f059ff03
-
Filesize
316KB
MD52904d652ad7490a647243f421a579645
SHA175dbfc4d9b2a00bd0c5f052b51af2e4c7b20e3d5
SHA256e12d5f24aa79f32a929dd214c6962c319bc4939921860063e6c5302663e6e1d5
SHA51207292f9edd7d12187b759a27bf52dee2af25b67824e53c6da927df4962ed4c1cb45353fc1ef3705d18e0b84dbff8fda68e8746ca9ce95d6722afa6b8f059ff03
-
Filesize
184KB
MD5dbcbe873775d53acb2f7e3e7e383fc16
SHA1587dd3c41dc57812a2f589475880d5722585c375
SHA2568f694dfef91cbdcb29d1922ebef65a897b8cb296209d90f4ac333871a29f8ee1
SHA512b14c6be2d6bc54cc923016901673023a6fa10cf1869c531598de3e2af0f36a79d4fd63dc73684e65eb8b420e57743ce4d8a48bffe25f6480eb2a64a414ca0218
-
Filesize
184KB
MD5dbcbe873775d53acb2f7e3e7e383fc16
SHA1587dd3c41dc57812a2f589475880d5722585c375
SHA2568f694dfef91cbdcb29d1922ebef65a897b8cb296209d90f4ac333871a29f8ee1
SHA512b14c6be2d6bc54cc923016901673023a6fa10cf1869c531598de3e2af0f36a79d4fd63dc73684e65eb8b420e57743ce4d8a48bffe25f6480eb2a64a414ca0218
-
Filesize
168KB
MD5cf018b2cd7bff57c12ee8a5027d452c7
SHA1bad979807ac9c32f77c2c3415442d906f456fe39
SHA256fdd62e8e6064c94bd0ff071ce54e235782d1804dcf606c50f0c76c4d4f73af8a
SHA512c8766da434a136d9363c775f0271ba10373b9772b9bd3ef4cb12021d59b1c28a1fc31fad65072a3d1cd75ed9fa40b321656aecf33944d0c5ef4d773f84114721
-
Filesize
168KB
MD5cf018b2cd7bff57c12ee8a5027d452c7
SHA1bad979807ac9c32f77c2c3415442d906f456fe39
SHA256fdd62e8e6064c94bd0ff071ce54e235782d1804dcf606c50f0c76c4d4f73af8a
SHA512c8766da434a136d9363c775f0271ba10373b9772b9bd3ef4cb12021d59b1c28a1fc31fad65072a3d1cd75ed9fa40b321656aecf33944d0c5ef4d773f84114721
-
Filesize
213KB
MD508b0016a2d378c0a18b6c28fcafdcbb7
SHA1107cc06136beb22cac3a034c7cb1fac9a09bf610
SHA256a705bfbedf758e449fd7fbb166e5773b59192eed9784b4e70659b1202c4ad67a
SHA51242ff1b850ba78f75fc08e0795a2e76f33659ee9d22d275b39abe5de0647b146d81800f3472bfbfdb4123f75fb0cae92f462d59db1955ee2f341ecc04ecde4824
-
Filesize
213KB
MD508b0016a2d378c0a18b6c28fcafdcbb7
SHA1107cc06136beb22cac3a034c7cb1fac9a09bf610
SHA256a705bfbedf758e449fd7fbb166e5773b59192eed9784b4e70659b1202c4ad67a
SHA51242ff1b850ba78f75fc08e0795a2e76f33659ee9d22d275b39abe5de0647b146d81800f3472bfbfdb4123f75fb0cae92f462d59db1955ee2f341ecc04ecde4824
-
Filesize
213KB
MD508b0016a2d378c0a18b6c28fcafdcbb7
SHA1107cc06136beb22cac3a034c7cb1fac9a09bf610
SHA256a705bfbedf758e449fd7fbb166e5773b59192eed9784b4e70659b1202c4ad67a
SHA51242ff1b850ba78f75fc08e0795a2e76f33659ee9d22d275b39abe5de0647b146d81800f3472bfbfdb4123f75fb0cae92f462d59db1955ee2f341ecc04ecde4824
-
Filesize
213KB
MD508b0016a2d378c0a18b6c28fcafdcbb7
SHA1107cc06136beb22cac3a034c7cb1fac9a09bf610
SHA256a705bfbedf758e449fd7fbb166e5773b59192eed9784b4e70659b1202c4ad67a
SHA51242ff1b850ba78f75fc08e0795a2e76f33659ee9d22d275b39abe5de0647b146d81800f3472bfbfdb4123f75fb0cae92f462d59db1955ee2f341ecc04ecde4824
-
Filesize
213KB
MD508b0016a2d378c0a18b6c28fcafdcbb7
SHA1107cc06136beb22cac3a034c7cb1fac9a09bf610
SHA256a705bfbedf758e449fd7fbb166e5773b59192eed9784b4e70659b1202c4ad67a
SHA51242ff1b850ba78f75fc08e0795a2e76f33659ee9d22d275b39abe5de0647b146d81800f3472bfbfdb4123f75fb0cae92f462d59db1955ee2f341ecc04ecde4824
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53