Analysis
-
max time kernel
135s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2023 15:26
Static task
static1
Behavioral task
behavioral1
Sample
c6060cc442fc777c92b6965682ff0da232efcd7a74e01056ae8dcf8a3ae150b6.exe
Resource
win10v2004-20230220-en
General
-
Target
c6060cc442fc777c92b6965682ff0da232efcd7a74e01056ae8dcf8a3ae150b6.exe
-
Size
488KB
-
MD5
46e33e1b96bdcf12361704c7130fb490
-
SHA1
6acf1fd751782bc02b80d6aa74127af42d756e20
-
SHA256
c6060cc442fc777c92b6965682ff0da232efcd7a74e01056ae8dcf8a3ae150b6
-
SHA512
06d65416497207198af7b6f0f584182d4893446f0921b30c85f0c0d9fd8729dde8e4bb40408d6171b2bd65748dc9ea612ea3603c4dc210938f063dca47fbdc48
-
SSDEEP
6144:KLy+bnr+4p0yN90QEJrh4RQX72RALD76cQFTkoYovlWKwuuc5qsfYe8mI5F7B:BMrYy90jhwQrFLacQ51YAFwtVepI5FF
Malware Config
Extracted
redline
dippo
217.196.96.102:4132
-
auth_value
79490ff628fd6af3b29170c3c163874b
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h5823923.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h5823923.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h5823923.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h5823923.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h5823923.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h5823923.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation i0223717.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 4360 x3830495.exe 4544 g1227649.exe 3920 h5823923.exe 1516 i0223717.exe 3524 oneetx.exe 2072 oneetx.exe 4828 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 2760 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h5823923.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h5823923.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c6060cc442fc777c92b6965682ff0da232efcd7a74e01056ae8dcf8a3ae150b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c6060cc442fc777c92b6965682ff0da232efcd7a74e01056ae8dcf8a3ae150b6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x3830495.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3830495.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4296 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4544 g1227649.exe 4544 g1227649.exe 3920 h5823923.exe 3920 h5823923.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4544 g1227649.exe Token: SeDebugPrivilege 3920 h5823923.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1516 i0223717.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 4696 wrote to memory of 4360 4696 c6060cc442fc777c92b6965682ff0da232efcd7a74e01056ae8dcf8a3ae150b6.exe 82 PID 4696 wrote to memory of 4360 4696 c6060cc442fc777c92b6965682ff0da232efcd7a74e01056ae8dcf8a3ae150b6.exe 82 PID 4696 wrote to memory of 4360 4696 c6060cc442fc777c92b6965682ff0da232efcd7a74e01056ae8dcf8a3ae150b6.exe 82 PID 4360 wrote to memory of 4544 4360 x3830495.exe 83 PID 4360 wrote to memory of 4544 4360 x3830495.exe 83 PID 4360 wrote to memory of 4544 4360 x3830495.exe 83 PID 4360 wrote to memory of 3920 4360 x3830495.exe 90 PID 4360 wrote to memory of 3920 4360 x3830495.exe 90 PID 4360 wrote to memory of 3920 4360 x3830495.exe 90 PID 4696 wrote to memory of 1516 4696 c6060cc442fc777c92b6965682ff0da232efcd7a74e01056ae8dcf8a3ae150b6.exe 91 PID 4696 wrote to memory of 1516 4696 c6060cc442fc777c92b6965682ff0da232efcd7a74e01056ae8dcf8a3ae150b6.exe 91 PID 4696 wrote to memory of 1516 4696 c6060cc442fc777c92b6965682ff0da232efcd7a74e01056ae8dcf8a3ae150b6.exe 91 PID 1516 wrote to memory of 3524 1516 i0223717.exe 92 PID 1516 wrote to memory of 3524 1516 i0223717.exe 92 PID 1516 wrote to memory of 3524 1516 i0223717.exe 92 PID 3524 wrote to memory of 4296 3524 oneetx.exe 93 PID 3524 wrote to memory of 4296 3524 oneetx.exe 93 PID 3524 wrote to memory of 4296 3524 oneetx.exe 93 PID 3524 wrote to memory of 2756 3524 oneetx.exe 95 PID 3524 wrote to memory of 2756 3524 oneetx.exe 95 PID 3524 wrote to memory of 2756 3524 oneetx.exe 95 PID 2756 wrote to memory of 3740 2756 cmd.exe 97 PID 2756 wrote to memory of 3740 2756 cmd.exe 97 PID 2756 wrote to memory of 3740 2756 cmd.exe 97 PID 2756 wrote to memory of 3576 2756 cmd.exe 98 PID 2756 wrote to memory of 3576 2756 cmd.exe 98 PID 2756 wrote to memory of 3576 2756 cmd.exe 98 PID 2756 wrote to memory of 3824 2756 cmd.exe 99 PID 2756 wrote to memory of 3824 2756 cmd.exe 99 PID 2756 wrote to memory of 3824 2756 cmd.exe 99 PID 2756 wrote to memory of 1532 2756 cmd.exe 100 PID 2756 wrote to memory of 1532 2756 cmd.exe 100 PID 2756 wrote to memory of 1532 2756 cmd.exe 100 PID 2756 wrote to memory of 4188 2756 cmd.exe 101 PID 2756 wrote to memory of 4188 2756 cmd.exe 101 PID 2756 wrote to memory of 4188 2756 cmd.exe 101 PID 2756 wrote to memory of 4452 2756 cmd.exe 102 PID 2756 wrote to memory of 4452 2756 cmd.exe 102 PID 2756 wrote to memory of 4452 2756 cmd.exe 102 PID 3524 wrote to memory of 2760 3524 oneetx.exe 105 PID 3524 wrote to memory of 2760 3524 oneetx.exe 105 PID 3524 wrote to memory of 2760 3524 oneetx.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6060cc442fc777c92b6965682ff0da232efcd7a74e01056ae8dcf8a3ae150b6.exe"C:\Users\Admin\AppData\Local\Temp\c6060cc442fc777c92b6965682ff0da232efcd7a74e01056ae8dcf8a3ae150b6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3830495.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3830495.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g1227649.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g1227649.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4544
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5823923.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5823923.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3920
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0223717.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0223717.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:4296
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:3740
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:3576
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3824
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:1532
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:4188
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:4452
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:2760
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:2072
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:4828
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD5d124433b63784637ff4721349513aff2
SHA1f6a6ebb4e23c78c74f41cb95a89bc788cf1f3cc2
SHA256e1f644e90859d561ef0be373d475e5365e22a4e1855ae30a784fff63c026efaa
SHA5124e0d73beff12dc5237cc6bff5be7eb4b010fdd884a0b8cb1519205854fa71afb3f3252d12deacd930ac521ab870baa77b0622214bb3f9c5542f708e1196b78a6
-
Filesize
213KB
MD5d124433b63784637ff4721349513aff2
SHA1f6a6ebb4e23c78c74f41cb95a89bc788cf1f3cc2
SHA256e1f644e90859d561ef0be373d475e5365e22a4e1855ae30a784fff63c026efaa
SHA5124e0d73beff12dc5237cc6bff5be7eb4b010fdd884a0b8cb1519205854fa71afb3f3252d12deacd930ac521ab870baa77b0622214bb3f9c5542f708e1196b78a6
-
Filesize
316KB
MD58265b83bb00e67866b03de13471e6207
SHA175f50d6d39e80647dd05e698eca2e53f1fe293c2
SHA25670f84ecd3135a1b5eff690811b64ca2bbf82789156895fa2785da8d6cf3e63b3
SHA51275547693a193ba27e840735a94b67d9a59db6352417a807a939c4c5e613c932711182aae2d525910105cf74c7a3fed7c89b790c2a7058ae175730dfb22e15873
-
Filesize
316KB
MD58265b83bb00e67866b03de13471e6207
SHA175f50d6d39e80647dd05e698eca2e53f1fe293c2
SHA25670f84ecd3135a1b5eff690811b64ca2bbf82789156895fa2785da8d6cf3e63b3
SHA51275547693a193ba27e840735a94b67d9a59db6352417a807a939c4c5e613c932711182aae2d525910105cf74c7a3fed7c89b790c2a7058ae175730dfb22e15873
-
Filesize
168KB
MD58825bf4d900e84589170fb58f180eef8
SHA1cbedf01cfaf00c2d877b5f115c1b77bf2189a4f6
SHA2562c103dfa7b464c8a3dc5dd118f9c3310091073055ff937c04697deb88af8febb
SHA51228890e6ed7337554fa52a0c5c409a4e16907165514d8e2295717aa653d1378b5c3f84cec5c365708a4bd585f4f33ffe76a19744561482291897f5c7d1088137e
-
Filesize
168KB
MD58825bf4d900e84589170fb58f180eef8
SHA1cbedf01cfaf00c2d877b5f115c1b77bf2189a4f6
SHA2562c103dfa7b464c8a3dc5dd118f9c3310091073055ff937c04697deb88af8febb
SHA51228890e6ed7337554fa52a0c5c409a4e16907165514d8e2295717aa653d1378b5c3f84cec5c365708a4bd585f4f33ffe76a19744561482291897f5c7d1088137e
-
Filesize
184KB
MD5101292fc22ecd21fbadebac6abc63434
SHA10afbae7b1266e01e6f0385dc692c7866d3441a15
SHA25618076e596d6eaf848b5b3a962c5bbde0af5ae382d150b62adf97cd282859ff86
SHA51239fc46d6afd133f4cbe51cf4d73310f9a3ae048b1e94095ef64572e03458c825f40eca4d348ecb6ccbf264645f503b5031ce6a1e2837c44e15968783f82fb667
-
Filesize
184KB
MD5101292fc22ecd21fbadebac6abc63434
SHA10afbae7b1266e01e6f0385dc692c7866d3441a15
SHA25618076e596d6eaf848b5b3a962c5bbde0af5ae382d150b62adf97cd282859ff86
SHA51239fc46d6afd133f4cbe51cf4d73310f9a3ae048b1e94095ef64572e03458c825f40eca4d348ecb6ccbf264645f503b5031ce6a1e2837c44e15968783f82fb667
-
Filesize
213KB
MD5d124433b63784637ff4721349513aff2
SHA1f6a6ebb4e23c78c74f41cb95a89bc788cf1f3cc2
SHA256e1f644e90859d561ef0be373d475e5365e22a4e1855ae30a784fff63c026efaa
SHA5124e0d73beff12dc5237cc6bff5be7eb4b010fdd884a0b8cb1519205854fa71afb3f3252d12deacd930ac521ab870baa77b0622214bb3f9c5542f708e1196b78a6
-
Filesize
213KB
MD5d124433b63784637ff4721349513aff2
SHA1f6a6ebb4e23c78c74f41cb95a89bc788cf1f3cc2
SHA256e1f644e90859d561ef0be373d475e5365e22a4e1855ae30a784fff63c026efaa
SHA5124e0d73beff12dc5237cc6bff5be7eb4b010fdd884a0b8cb1519205854fa71afb3f3252d12deacd930ac521ab870baa77b0622214bb3f9c5542f708e1196b78a6
-
Filesize
213KB
MD5d124433b63784637ff4721349513aff2
SHA1f6a6ebb4e23c78c74f41cb95a89bc788cf1f3cc2
SHA256e1f644e90859d561ef0be373d475e5365e22a4e1855ae30a784fff63c026efaa
SHA5124e0d73beff12dc5237cc6bff5be7eb4b010fdd884a0b8cb1519205854fa71afb3f3252d12deacd930ac521ab870baa77b0622214bb3f9c5542f708e1196b78a6
-
Filesize
213KB
MD5d124433b63784637ff4721349513aff2
SHA1f6a6ebb4e23c78c74f41cb95a89bc788cf1f3cc2
SHA256e1f644e90859d561ef0be373d475e5365e22a4e1855ae30a784fff63c026efaa
SHA5124e0d73beff12dc5237cc6bff5be7eb4b010fdd884a0b8cb1519205854fa71afb3f3252d12deacd930ac521ab870baa77b0622214bb3f9c5542f708e1196b78a6
-
Filesize
213KB
MD5d124433b63784637ff4721349513aff2
SHA1f6a6ebb4e23c78c74f41cb95a89bc788cf1f3cc2
SHA256e1f644e90859d561ef0be373d475e5365e22a4e1855ae30a784fff63c026efaa
SHA5124e0d73beff12dc5237cc6bff5be7eb4b010fdd884a0b8cb1519205854fa71afb3f3252d12deacd930ac521ab870baa77b0622214bb3f9c5542f708e1196b78a6
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5