Analysis
-
max time kernel
110s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2023 16:40
Static task
static1
Behavioral task
behavioral1
Sample
9b80b1bbbc5b112eedae5bcc2a1b34b3954af50d6236372731d2794b18bb100e.exe
Resource
win10v2004-20230220-en
General
-
Target
9b80b1bbbc5b112eedae5bcc2a1b34b3954af50d6236372731d2794b18bb100e.exe
-
Size
489KB
-
MD5
1c78ce0a99d26f0d7a8c308c2129f3ff
-
SHA1
a0b43c95c861491c6a0c37545109c842e5a02dc9
-
SHA256
9b80b1bbbc5b112eedae5bcc2a1b34b3954af50d6236372731d2794b18bb100e
-
SHA512
528e993d5ea1b907838095413f7794c0a55a6b103aa4d22b60728e45322e2ad5549db2f4ff77489869c1e3b719f6edf116b92005b08783cffe3f8b7bd0026a8e
-
SSDEEP
12288:NMrmy90gNpkOWe7yEy0f6sJIjWTV3y09l3Y9wYtNM:vyF+OH716skUZeM
Malware Config
Extracted
redline
dubur
217.196.96.102:4132
-
auth_value
32d04179aa1e8d655d2d80c21f99de41
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h9956347.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h9956347.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h9956347.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h9956347.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h9956347.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h9956347.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation i7901989.exe Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 7 IoCs
pid Process 1860 x4929997.exe 2560 g6298083.exe 4184 h9956347.exe 416 i7901989.exe 4512 oneetx.exe 3860 oneetx.exe 1100 oneetx.exe -
Loads dropped DLL 1 IoCs
pid Process 4496 rundll32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h9956347.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h9956347.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x4929997.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x4929997.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9b80b1bbbc5b112eedae5bcc2a1b34b3954af50d6236372731d2794b18bb100e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9b80b1bbbc5b112eedae5bcc2a1b34b3954af50d6236372731d2794b18bb100e.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3820 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2560 g6298083.exe 2560 g6298083.exe 4184 h9956347.exe 4184 h9956347.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2560 g6298083.exe Token: SeDebugPrivilege 4184 h9956347.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 416 i7901989.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 3704 wrote to memory of 1860 3704 9b80b1bbbc5b112eedae5bcc2a1b34b3954af50d6236372731d2794b18bb100e.exe 83 PID 3704 wrote to memory of 1860 3704 9b80b1bbbc5b112eedae5bcc2a1b34b3954af50d6236372731d2794b18bb100e.exe 83 PID 3704 wrote to memory of 1860 3704 9b80b1bbbc5b112eedae5bcc2a1b34b3954af50d6236372731d2794b18bb100e.exe 83 PID 1860 wrote to memory of 2560 1860 x4929997.exe 84 PID 1860 wrote to memory of 2560 1860 x4929997.exe 84 PID 1860 wrote to memory of 2560 1860 x4929997.exe 84 PID 1860 wrote to memory of 4184 1860 x4929997.exe 91 PID 1860 wrote to memory of 4184 1860 x4929997.exe 91 PID 1860 wrote to memory of 4184 1860 x4929997.exe 91 PID 3704 wrote to memory of 416 3704 9b80b1bbbc5b112eedae5bcc2a1b34b3954af50d6236372731d2794b18bb100e.exe 92 PID 3704 wrote to memory of 416 3704 9b80b1bbbc5b112eedae5bcc2a1b34b3954af50d6236372731d2794b18bb100e.exe 92 PID 3704 wrote to memory of 416 3704 9b80b1bbbc5b112eedae5bcc2a1b34b3954af50d6236372731d2794b18bb100e.exe 92 PID 416 wrote to memory of 4512 416 i7901989.exe 93 PID 416 wrote to memory of 4512 416 i7901989.exe 93 PID 416 wrote to memory of 4512 416 i7901989.exe 93 PID 4512 wrote to memory of 3820 4512 oneetx.exe 94 PID 4512 wrote to memory of 3820 4512 oneetx.exe 94 PID 4512 wrote to memory of 3820 4512 oneetx.exe 94 PID 4512 wrote to memory of 4888 4512 oneetx.exe 96 PID 4512 wrote to memory of 4888 4512 oneetx.exe 96 PID 4512 wrote to memory of 4888 4512 oneetx.exe 96 PID 4888 wrote to memory of 2160 4888 cmd.exe 98 PID 4888 wrote to memory of 2160 4888 cmd.exe 98 PID 4888 wrote to memory of 2160 4888 cmd.exe 98 PID 4888 wrote to memory of 4848 4888 cmd.exe 99 PID 4888 wrote to memory of 4848 4888 cmd.exe 99 PID 4888 wrote to memory of 4848 4888 cmd.exe 99 PID 4888 wrote to memory of 3104 4888 cmd.exe 100 PID 4888 wrote to memory of 3104 4888 cmd.exe 100 PID 4888 wrote to memory of 3104 4888 cmd.exe 100 PID 4888 wrote to memory of 2192 4888 cmd.exe 101 PID 4888 wrote to memory of 2192 4888 cmd.exe 101 PID 4888 wrote to memory of 2192 4888 cmd.exe 101 PID 4888 wrote to memory of 1064 4888 cmd.exe 102 PID 4888 wrote to memory of 1064 4888 cmd.exe 102 PID 4888 wrote to memory of 1064 4888 cmd.exe 102 PID 4888 wrote to memory of 2520 4888 cmd.exe 103 PID 4888 wrote to memory of 2520 4888 cmd.exe 103 PID 4888 wrote to memory of 2520 4888 cmd.exe 103 PID 4512 wrote to memory of 4496 4512 oneetx.exe 106 PID 4512 wrote to memory of 4496 4512 oneetx.exe 106 PID 4512 wrote to memory of 4496 4512 oneetx.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b80b1bbbc5b112eedae5bcc2a1b34b3954af50d6236372731d2794b18bb100e.exe"C:\Users\Admin\AppData\Local\Temp\9b80b1bbbc5b112eedae5bcc2a1b34b3954af50d6236372731d2794b18bb100e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4929997.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4929997.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g6298083.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g6298083.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9956347.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9956347.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4184
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7901989.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7901989.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:416 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:3820
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit4⤵
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2160
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"5⤵PID:4848
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E5⤵PID:3104
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"5⤵PID:2192
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"5⤵PID:1064
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E5⤵PID:2520
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main4⤵
- Loads dropped DLL
PID:4496
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:3860
-
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe1⤵
- Executes dropped EXE
PID:1100
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD54a796b40c0eb8d81b53e7ac8607dcd11
SHA1a74438449988da15d188afdcb6efe10469bffa37
SHA2568808d8fd30607034b5cab7461f47e25213c7f38c94cd15a7694560a0a0f531b2
SHA5123b4a7bff4a77d4bc648c2160d99e3476c91b948a657b8169f5f8306f6ee4fc3917ef1d72ded7068320bb6b7524a5171af08b860fed9fc4a8766e399bdf339c09
-
Filesize
213KB
MD54a796b40c0eb8d81b53e7ac8607dcd11
SHA1a74438449988da15d188afdcb6efe10469bffa37
SHA2568808d8fd30607034b5cab7461f47e25213c7f38c94cd15a7694560a0a0f531b2
SHA5123b4a7bff4a77d4bc648c2160d99e3476c91b948a657b8169f5f8306f6ee4fc3917ef1d72ded7068320bb6b7524a5171af08b860fed9fc4a8766e399bdf339c09
-
Filesize
317KB
MD54be7d350a737e8868c4a557d9f6ecf19
SHA10ab8f0402c431c29ba58d009f029a123d83b704b
SHA256601f4c792162092df4a16ad8033b9a065898183577f240f72a79eb0211c0ae6f
SHA512e8f56434740b221791b4ac4c6f16ac031b914ecfa0954da7f3a37df1621cb82dda4c27aef5a4d60a96d0208c97cd2da94cd1928eddac82c1b6528573ee527421
-
Filesize
317KB
MD54be7d350a737e8868c4a557d9f6ecf19
SHA10ab8f0402c431c29ba58d009f029a123d83b704b
SHA256601f4c792162092df4a16ad8033b9a065898183577f240f72a79eb0211c0ae6f
SHA512e8f56434740b221791b4ac4c6f16ac031b914ecfa0954da7f3a37df1621cb82dda4c27aef5a4d60a96d0208c97cd2da94cd1928eddac82c1b6528573ee527421
-
Filesize
168KB
MD504d75d73c7502f29e990884586b67fb7
SHA1c79bfcf0b902ee3b36aa805115a0eda2beeee4a9
SHA256fbec9d5a88716e473cc604711a4d28a881fc786cfe30408a335f41a3976aa910
SHA512dbad845063507771c689acf913163964e6399d90598f60491fd5c5106db1da439f555e303a4b694ad0b8173d4812d3c2f30572ada96af4764583c1f944e30442
-
Filesize
168KB
MD504d75d73c7502f29e990884586b67fb7
SHA1c79bfcf0b902ee3b36aa805115a0eda2beeee4a9
SHA256fbec9d5a88716e473cc604711a4d28a881fc786cfe30408a335f41a3976aa910
SHA512dbad845063507771c689acf913163964e6399d90598f60491fd5c5106db1da439f555e303a4b694ad0b8173d4812d3c2f30572ada96af4764583c1f944e30442
-
Filesize
184KB
MD5f05f7883044cac5e5478b43ed2966bb1
SHA1a8fa64278ccd5fa1e60aef8b7b6f1c94e58967f8
SHA256b43a1286fc8748556798dcbfcd89fe0357ea979dbe65b988d36dfe77b0109451
SHA5129546c820d56d10e1b5427d47f146c2fb81baf2da875983c81664ddc26def4653f234b5db1d3ac31d96aef98056307ee7dd341135e65b025b9cff43bd49a3c8fd
-
Filesize
184KB
MD5f05f7883044cac5e5478b43ed2966bb1
SHA1a8fa64278ccd5fa1e60aef8b7b6f1c94e58967f8
SHA256b43a1286fc8748556798dcbfcd89fe0357ea979dbe65b988d36dfe77b0109451
SHA5129546c820d56d10e1b5427d47f146c2fb81baf2da875983c81664ddc26def4653f234b5db1d3ac31d96aef98056307ee7dd341135e65b025b9cff43bd49a3c8fd
-
Filesize
213KB
MD54a796b40c0eb8d81b53e7ac8607dcd11
SHA1a74438449988da15d188afdcb6efe10469bffa37
SHA2568808d8fd30607034b5cab7461f47e25213c7f38c94cd15a7694560a0a0f531b2
SHA5123b4a7bff4a77d4bc648c2160d99e3476c91b948a657b8169f5f8306f6ee4fc3917ef1d72ded7068320bb6b7524a5171af08b860fed9fc4a8766e399bdf339c09
-
Filesize
213KB
MD54a796b40c0eb8d81b53e7ac8607dcd11
SHA1a74438449988da15d188afdcb6efe10469bffa37
SHA2568808d8fd30607034b5cab7461f47e25213c7f38c94cd15a7694560a0a0f531b2
SHA5123b4a7bff4a77d4bc648c2160d99e3476c91b948a657b8169f5f8306f6ee4fc3917ef1d72ded7068320bb6b7524a5171af08b860fed9fc4a8766e399bdf339c09
-
Filesize
213KB
MD54a796b40c0eb8d81b53e7ac8607dcd11
SHA1a74438449988da15d188afdcb6efe10469bffa37
SHA2568808d8fd30607034b5cab7461f47e25213c7f38c94cd15a7694560a0a0f531b2
SHA5123b4a7bff4a77d4bc648c2160d99e3476c91b948a657b8169f5f8306f6ee4fc3917ef1d72ded7068320bb6b7524a5171af08b860fed9fc4a8766e399bdf339c09
-
Filesize
213KB
MD54a796b40c0eb8d81b53e7ac8607dcd11
SHA1a74438449988da15d188afdcb6efe10469bffa37
SHA2568808d8fd30607034b5cab7461f47e25213c7f38c94cd15a7694560a0a0f531b2
SHA5123b4a7bff4a77d4bc648c2160d99e3476c91b948a657b8169f5f8306f6ee4fc3917ef1d72ded7068320bb6b7524a5171af08b860fed9fc4a8766e399bdf339c09
-
Filesize
213KB
MD54a796b40c0eb8d81b53e7ac8607dcd11
SHA1a74438449988da15d188afdcb6efe10469bffa37
SHA2568808d8fd30607034b5cab7461f47e25213c7f38c94cd15a7694560a0a0f531b2
SHA5123b4a7bff4a77d4bc648c2160d99e3476c91b948a657b8169f5f8306f6ee4fc3917ef1d72ded7068320bb6b7524a5171af08b860fed9fc4a8766e399bdf339c09
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
89KB
MD58451a2c5daa42b25333b1b2089c5ea39
SHA1700cc99ec8d3113435e657070d2d6bde0a833adc
SHA256b8c8aedd84c363853db934a55087a3b730cf9dc758dea3dc3a98f54217f4c9d0
SHA5126d2bad0e6ec7852d7b6d1a70a10285db28c06c37252503e01c52458a463582d5211b7e183ae064a36b60f990971a5b14f8af3aaaacc4226be1c2e3e0bf38af53
-
Filesize
162B
MD51b7c22a214949975556626d7217e9a39
SHA1d01c97e2944166ed23e47e4a62ff471ab8fa031f
SHA256340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87
SHA512ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5