Analysis

  • max time kernel
    135s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-05-2023 15:26

General

  • Target

    c6060cc442fc777c92b6965682ff0da232efcd7a74e01056ae8dcf8a3ae150b6.exe

  • Size

    488KB

  • MD5

    46e33e1b96bdcf12361704c7130fb490

  • SHA1

    6acf1fd751782bc02b80d6aa74127af42d756e20

  • SHA256

    c6060cc442fc777c92b6965682ff0da232efcd7a74e01056ae8dcf8a3ae150b6

  • SHA512

    06d65416497207198af7b6f0f584182d4893446f0921b30c85f0c0d9fd8729dde8e4bb40408d6171b2bd65748dc9ea612ea3603c4dc210938f063dca47fbdc48

  • SSDEEP

    6144:KLy+bnr+4p0yN90QEJrh4RQX72RALD76cQFTkoYovlWKwuuc5qsfYe8mI5F7B:BMrYy90jhwQrFLacQ51YAFwtVepI5FF

Malware Config

Extracted

Family

redline

Botnet

dippo

C2

217.196.96.102:4132

Attributes
  • auth_value

    79490ff628fd6af3b29170c3c163874b

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6060cc442fc777c92b6965682ff0da232efcd7a74e01056ae8dcf8a3ae150b6.exe
    "C:\Users\Admin\AppData\Local\Temp\c6060cc442fc777c92b6965682ff0da232efcd7a74e01056ae8dcf8a3ae150b6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4696
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3830495.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3830495.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4360
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g1227649.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g1227649.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4544
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5823923.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5823923.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3920
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0223717.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0223717.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1516
      • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3524
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F
          4⤵
          • Creates scheduled task(s)
          PID:4296
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2756
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
            5⤵
              PID:3740
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "oneetx.exe" /P "Admin:N"
              5⤵
                PID:3576
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "oneetx.exe" /P "Admin:R" /E
                5⤵
                  PID:3824
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                  5⤵
                    PID:1532
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\c3912af058" /P "Admin:N"
                    5⤵
                      PID:4188
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\c3912af058" /P "Admin:R" /E
                      5⤵
                        PID:4452
                    • C:\Windows\SysWOW64\rundll32.exe
                      "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                      4⤵
                      • Loads dropped DLL
                      PID:2760
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:2072
              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:4828

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0223717.exe

                Filesize

                213KB

                MD5

                d124433b63784637ff4721349513aff2

                SHA1

                f6a6ebb4e23c78c74f41cb95a89bc788cf1f3cc2

                SHA256

                e1f644e90859d561ef0be373d475e5365e22a4e1855ae30a784fff63c026efaa

                SHA512

                4e0d73beff12dc5237cc6bff5be7eb4b010fdd884a0b8cb1519205854fa71afb3f3252d12deacd930ac521ab870baa77b0622214bb3f9c5542f708e1196b78a6

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0223717.exe

                Filesize

                213KB

                MD5

                d124433b63784637ff4721349513aff2

                SHA1

                f6a6ebb4e23c78c74f41cb95a89bc788cf1f3cc2

                SHA256

                e1f644e90859d561ef0be373d475e5365e22a4e1855ae30a784fff63c026efaa

                SHA512

                4e0d73beff12dc5237cc6bff5be7eb4b010fdd884a0b8cb1519205854fa71afb3f3252d12deacd930ac521ab870baa77b0622214bb3f9c5542f708e1196b78a6

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3830495.exe

                Filesize

                316KB

                MD5

                8265b83bb00e67866b03de13471e6207

                SHA1

                75f50d6d39e80647dd05e698eca2e53f1fe293c2

                SHA256

                70f84ecd3135a1b5eff690811b64ca2bbf82789156895fa2785da8d6cf3e63b3

                SHA512

                75547693a193ba27e840735a94b67d9a59db6352417a807a939c4c5e613c932711182aae2d525910105cf74c7a3fed7c89b790c2a7058ae175730dfb22e15873

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3830495.exe

                Filesize

                316KB

                MD5

                8265b83bb00e67866b03de13471e6207

                SHA1

                75f50d6d39e80647dd05e698eca2e53f1fe293c2

                SHA256

                70f84ecd3135a1b5eff690811b64ca2bbf82789156895fa2785da8d6cf3e63b3

                SHA512

                75547693a193ba27e840735a94b67d9a59db6352417a807a939c4c5e613c932711182aae2d525910105cf74c7a3fed7c89b790c2a7058ae175730dfb22e15873

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g1227649.exe

                Filesize

                168KB

                MD5

                8825bf4d900e84589170fb58f180eef8

                SHA1

                cbedf01cfaf00c2d877b5f115c1b77bf2189a4f6

                SHA256

                2c103dfa7b464c8a3dc5dd118f9c3310091073055ff937c04697deb88af8febb

                SHA512

                28890e6ed7337554fa52a0c5c409a4e16907165514d8e2295717aa653d1378b5c3f84cec5c365708a4bd585f4f33ffe76a19744561482291897f5c7d1088137e

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g1227649.exe

                Filesize

                168KB

                MD5

                8825bf4d900e84589170fb58f180eef8

                SHA1

                cbedf01cfaf00c2d877b5f115c1b77bf2189a4f6

                SHA256

                2c103dfa7b464c8a3dc5dd118f9c3310091073055ff937c04697deb88af8febb

                SHA512

                28890e6ed7337554fa52a0c5c409a4e16907165514d8e2295717aa653d1378b5c3f84cec5c365708a4bd585f4f33ffe76a19744561482291897f5c7d1088137e

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5823923.exe

                Filesize

                184KB

                MD5

                101292fc22ecd21fbadebac6abc63434

                SHA1

                0afbae7b1266e01e6f0385dc692c7866d3441a15

                SHA256

                18076e596d6eaf848b5b3a962c5bbde0af5ae382d150b62adf97cd282859ff86

                SHA512

                39fc46d6afd133f4cbe51cf4d73310f9a3ae048b1e94095ef64572e03458c825f40eca4d348ecb6ccbf264645f503b5031ce6a1e2837c44e15968783f82fb667

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5823923.exe

                Filesize

                184KB

                MD5

                101292fc22ecd21fbadebac6abc63434

                SHA1

                0afbae7b1266e01e6f0385dc692c7866d3441a15

                SHA256

                18076e596d6eaf848b5b3a962c5bbde0af5ae382d150b62adf97cd282859ff86

                SHA512

                39fc46d6afd133f4cbe51cf4d73310f9a3ae048b1e94095ef64572e03458c825f40eca4d348ecb6ccbf264645f503b5031ce6a1e2837c44e15968783f82fb667

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                213KB

                MD5

                d124433b63784637ff4721349513aff2

                SHA1

                f6a6ebb4e23c78c74f41cb95a89bc788cf1f3cc2

                SHA256

                e1f644e90859d561ef0be373d475e5365e22a4e1855ae30a784fff63c026efaa

                SHA512

                4e0d73beff12dc5237cc6bff5be7eb4b010fdd884a0b8cb1519205854fa71afb3f3252d12deacd930ac521ab870baa77b0622214bb3f9c5542f708e1196b78a6

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                213KB

                MD5

                d124433b63784637ff4721349513aff2

                SHA1

                f6a6ebb4e23c78c74f41cb95a89bc788cf1f3cc2

                SHA256

                e1f644e90859d561ef0be373d475e5365e22a4e1855ae30a784fff63c026efaa

                SHA512

                4e0d73beff12dc5237cc6bff5be7eb4b010fdd884a0b8cb1519205854fa71afb3f3252d12deacd930ac521ab870baa77b0622214bb3f9c5542f708e1196b78a6

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                213KB

                MD5

                d124433b63784637ff4721349513aff2

                SHA1

                f6a6ebb4e23c78c74f41cb95a89bc788cf1f3cc2

                SHA256

                e1f644e90859d561ef0be373d475e5365e22a4e1855ae30a784fff63c026efaa

                SHA512

                4e0d73beff12dc5237cc6bff5be7eb4b010fdd884a0b8cb1519205854fa71afb3f3252d12deacd930ac521ab870baa77b0622214bb3f9c5542f708e1196b78a6

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                213KB

                MD5

                d124433b63784637ff4721349513aff2

                SHA1

                f6a6ebb4e23c78c74f41cb95a89bc788cf1f3cc2

                SHA256

                e1f644e90859d561ef0be373d475e5365e22a4e1855ae30a784fff63c026efaa

                SHA512

                4e0d73beff12dc5237cc6bff5be7eb4b010fdd884a0b8cb1519205854fa71afb3f3252d12deacd930ac521ab870baa77b0622214bb3f9c5542f708e1196b78a6

              • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                Filesize

                213KB

                MD5

                d124433b63784637ff4721349513aff2

                SHA1

                f6a6ebb4e23c78c74f41cb95a89bc788cf1f3cc2

                SHA256

                e1f644e90859d561ef0be373d475e5365e22a4e1855ae30a784fff63c026efaa

                SHA512

                4e0d73beff12dc5237cc6bff5be7eb4b010fdd884a0b8cb1519205854fa71afb3f3252d12deacd930ac521ab870baa77b0622214bb3f9c5542f708e1196b78a6

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                8451a2c5daa42b25333b1b2089c5ea39

                SHA1

                700cc99ec8d3113435e657070d2d6bde0a833adc

                SHA256

                b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0

                SHA512

                6d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • memory/3920-195-0x0000000002580000-0x0000000002590000-memory.dmp

                Filesize

                64KB

              • memory/3920-188-0x0000000002510000-0x0000000002526000-memory.dmp

                Filesize

                88KB

              • memory/3920-194-0x0000000002580000-0x0000000002590000-memory.dmp

                Filesize

                64KB

              • memory/3920-165-0x0000000002510000-0x0000000002526000-memory.dmp

                Filesize

                88KB

              • memory/3920-168-0x0000000002510000-0x0000000002526000-memory.dmp

                Filesize

                88KB

              • memory/3920-166-0x0000000002510000-0x0000000002526000-memory.dmp

                Filesize

                88KB

              • memory/3920-170-0x0000000002510000-0x0000000002526000-memory.dmp

                Filesize

                88KB

              • memory/3920-172-0x0000000002510000-0x0000000002526000-memory.dmp

                Filesize

                88KB

              • memory/3920-174-0x0000000002510000-0x0000000002526000-memory.dmp

                Filesize

                88KB

              • memory/3920-176-0x0000000002510000-0x0000000002526000-memory.dmp

                Filesize

                88KB

              • memory/3920-178-0x0000000002510000-0x0000000002526000-memory.dmp

                Filesize

                88KB

              • memory/3920-180-0x0000000002510000-0x0000000002526000-memory.dmp

                Filesize

                88KB

              • memory/3920-182-0x0000000002510000-0x0000000002526000-memory.dmp

                Filesize

                88KB

              • memory/3920-184-0x0000000002510000-0x0000000002526000-memory.dmp

                Filesize

                88KB

              • memory/3920-186-0x0000000002510000-0x0000000002526000-memory.dmp

                Filesize

                88KB

              • memory/3920-193-0x0000000002580000-0x0000000002590000-memory.dmp

                Filesize

                64KB

              • memory/3920-190-0x0000000002510000-0x0000000002526000-memory.dmp

                Filesize

                88KB

              • memory/3920-192-0x0000000002510000-0x0000000002526000-memory.dmp

                Filesize

                88KB

              • memory/4544-154-0x000000000AF70000-0x000000000B002000-memory.dmp

                Filesize

                584KB

              • memory/4544-160-0x000000000CB80000-0x000000000D0AC000-memory.dmp

                Filesize

                5.2MB

              • memory/4544-159-0x000000000C480000-0x000000000C642000-memory.dmp

                Filesize

                1.8MB

              • memory/4544-157-0x00000000054E0000-0x00000000054F0000-memory.dmp

                Filesize

                64KB

              • memory/4544-156-0x000000000B010000-0x000000000B076000-memory.dmp

                Filesize

                408KB

              • memory/4544-155-0x000000000BC60000-0x000000000C204000-memory.dmp

                Filesize

                5.6MB

              • memory/4544-158-0x000000000C260000-0x000000000C2B0000-memory.dmp

                Filesize

                320KB

              • memory/4544-153-0x000000000AE50000-0x000000000AEC6000-memory.dmp

                Filesize

                472KB

              • memory/4544-150-0x000000000AAE0000-0x000000000AAF2000-memory.dmp

                Filesize

                72KB

              • memory/4544-151-0x00000000054E0000-0x00000000054F0000-memory.dmp

                Filesize

                64KB

              • memory/4544-152-0x000000000AB40000-0x000000000AB7C000-memory.dmp

                Filesize

                240KB

              • memory/4544-149-0x000000000ABB0000-0x000000000ACBA000-memory.dmp

                Filesize

                1.0MB

              • memory/4544-148-0x000000000B090000-0x000000000B6A8000-memory.dmp

                Filesize

                6.1MB

              • memory/4544-147-0x0000000000C30000-0x0000000000C5E000-memory.dmp

                Filesize

                184KB