Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2023, 18:37
Static task
static1
Behavioral task
behavioral1
Sample
8c245ed53d9af40d5133ef6f7d9d1b0f4266b8014fbf98b9d271aa6cd45f922a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
8c245ed53d9af40d5133ef6f7d9d1b0f4266b8014fbf98b9d271aa6cd45f922a.exe
Resource
win10v2004-20230220-en
General
-
Target
8c245ed53d9af40d5133ef6f7d9d1b0f4266b8014fbf98b9d271aa6cd45f922a.exe
-
Size
781KB
-
MD5
d2a5330e9ae53f081ff2d4a8a47466ac
-
SHA1
68c84a75ab9c12092cd39fefc99d83c29590a69e
-
SHA256
8c245ed53d9af40d5133ef6f7d9d1b0f4266b8014fbf98b9d271aa6cd45f922a
-
SHA512
147dcc1abb8547d0ce6768a956ce8dda05c2b362d2b90bb9e5c4f3098e98e440e3bdae9f7eccdd952033656431540b3ace02566ef791a4042e5cbeb6d5ba78df
-
SSDEEP
12288:vMrRy909e9Xh8QBoV0T11GoQ0d/dFS6YSnQ1zI6qEkKj32JNbXfcSKJ/0Qta:my6eR+ViU0FLS6YT8o3sNbESKJ/0QU
Malware Config
Extracted
redline
lessa
185.161.248.75:4132
-
auth_value
29d77029685f0783eb0ec17c1b173cb2
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o3793869.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o3793869.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o3793869.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o3793869.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o3793869.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o3793869.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 19 IoCs
resource yara_rule behavioral2/memory/1900-210-0x0000000004F70000-0x0000000004FB2000-memory.dmp family_redline behavioral2/memory/1900-211-0x0000000004F70000-0x0000000004FB2000-memory.dmp family_redline behavioral2/memory/1900-213-0x0000000004F70000-0x0000000004FB2000-memory.dmp family_redline behavioral2/memory/1900-215-0x0000000004F70000-0x0000000004FB2000-memory.dmp family_redline behavioral2/memory/1900-217-0x0000000004F70000-0x0000000004FB2000-memory.dmp family_redline behavioral2/memory/1900-219-0x0000000004F70000-0x0000000004FB2000-memory.dmp family_redline behavioral2/memory/1900-221-0x0000000004F70000-0x0000000004FB2000-memory.dmp family_redline behavioral2/memory/1900-223-0x0000000004F70000-0x0000000004FB2000-memory.dmp family_redline behavioral2/memory/1900-225-0x0000000004F70000-0x0000000004FB2000-memory.dmp family_redline behavioral2/memory/1900-227-0x0000000004F70000-0x0000000004FB2000-memory.dmp family_redline behavioral2/memory/1900-229-0x0000000004F70000-0x0000000004FB2000-memory.dmp family_redline behavioral2/memory/1900-233-0x0000000004F70000-0x0000000004FB2000-memory.dmp family_redline behavioral2/memory/1900-231-0x0000000004F70000-0x0000000004FB2000-memory.dmp family_redline behavioral2/memory/1900-235-0x0000000004F70000-0x0000000004FB2000-memory.dmp family_redline behavioral2/memory/1900-237-0x0000000004F70000-0x0000000004FB2000-memory.dmp family_redline behavioral2/memory/1900-239-0x0000000004F70000-0x0000000004FB2000-memory.dmp family_redline behavioral2/memory/1900-241-0x0000000004F70000-0x0000000004FB2000-memory.dmp family_redline behavioral2/memory/1900-243-0x0000000004F70000-0x0000000004FB2000-memory.dmp family_redline behavioral2/memory/1900-245-0x0000000004F70000-0x0000000004FB2000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation s1905516.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 8 IoCs
pid Process 1284 z1666343.exe 4828 z6714324.exe 2020 o3793869.exe 212 p3000874.exe 1900 r8299572.exe 3896 s1905516.exe 4612 oneetx.exe 1504 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o3793869.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o3793869.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8c245ed53d9af40d5133ef6f7d9d1b0f4266b8014fbf98b9d271aa6cd45f922a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z1666343.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z1666343.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z6714324.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z6714324.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 8c245ed53d9af40d5133ef6f7d9d1b0f4266b8014fbf98b9d271aa6cd45f922a.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1708 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2020 o3793869.exe 2020 o3793869.exe 212 p3000874.exe 212 p3000874.exe 1900 r8299572.exe 1900 r8299572.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2020 o3793869.exe Token: SeDebugPrivilege 212 p3000874.exe Token: SeDebugPrivilege 1900 r8299572.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3896 s1905516.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4348 wrote to memory of 1284 4348 8c245ed53d9af40d5133ef6f7d9d1b0f4266b8014fbf98b9d271aa6cd45f922a.exe 84 PID 4348 wrote to memory of 1284 4348 8c245ed53d9af40d5133ef6f7d9d1b0f4266b8014fbf98b9d271aa6cd45f922a.exe 84 PID 4348 wrote to memory of 1284 4348 8c245ed53d9af40d5133ef6f7d9d1b0f4266b8014fbf98b9d271aa6cd45f922a.exe 84 PID 1284 wrote to memory of 4828 1284 z1666343.exe 85 PID 1284 wrote to memory of 4828 1284 z1666343.exe 85 PID 1284 wrote to memory of 4828 1284 z1666343.exe 85 PID 4828 wrote to memory of 2020 4828 z6714324.exe 86 PID 4828 wrote to memory of 2020 4828 z6714324.exe 86 PID 4828 wrote to memory of 2020 4828 z6714324.exe 86 PID 4828 wrote to memory of 212 4828 z6714324.exe 87 PID 4828 wrote to memory of 212 4828 z6714324.exe 87 PID 4828 wrote to memory of 212 4828 z6714324.exe 87 PID 1284 wrote to memory of 1900 1284 z1666343.exe 91 PID 1284 wrote to memory of 1900 1284 z1666343.exe 91 PID 1284 wrote to memory of 1900 1284 z1666343.exe 91 PID 4348 wrote to memory of 3896 4348 8c245ed53d9af40d5133ef6f7d9d1b0f4266b8014fbf98b9d271aa6cd45f922a.exe 92 PID 4348 wrote to memory of 3896 4348 8c245ed53d9af40d5133ef6f7d9d1b0f4266b8014fbf98b9d271aa6cd45f922a.exe 92 PID 4348 wrote to memory of 3896 4348 8c245ed53d9af40d5133ef6f7d9d1b0f4266b8014fbf98b9d271aa6cd45f922a.exe 92 PID 3896 wrote to memory of 4612 3896 s1905516.exe 93 PID 3896 wrote to memory of 4612 3896 s1905516.exe 93 PID 3896 wrote to memory of 4612 3896 s1905516.exe 93 PID 4612 wrote to memory of 1708 4612 oneetx.exe 94 PID 4612 wrote to memory of 1708 4612 oneetx.exe 94 PID 4612 wrote to memory of 1708 4612 oneetx.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c245ed53d9af40d5133ef6f7d9d1b0f4266b8014fbf98b9d271aa6cd45f922a.exe"C:\Users\Admin\AppData\Local\Temp\8c245ed53d9af40d5133ef6f7d9d1b0f4266b8014fbf98b9d271aa6cd45f922a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1666343.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1666343.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6714324.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6714324.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o3793869.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o3793869.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3000874.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p3000874.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:212
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8299572.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8299572.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1900
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1905516.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1905516.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F4⤵
- Creates scheduled task(s)
PID:1708
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:1504
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD50ae98964889cb7e892426e8e8d154a58
SHA1ca7429fbe1801fe143da39f58004d40e4ea15363
SHA2568c81ef77eccae1050bf8f63d996b5e93f1499628cc9953f62e843e7937f7bcd5
SHA5121cc3f27f83b91d57ac39415dd7c3a9472b3a39d27989274b3be1781e3a16f33321215826b06a3e7994a63c06da71133d94207aa4a0007ac2c62bbe5ff19d6178
-
Filesize
232KB
MD50ae98964889cb7e892426e8e8d154a58
SHA1ca7429fbe1801fe143da39f58004d40e4ea15363
SHA2568c81ef77eccae1050bf8f63d996b5e93f1499628cc9953f62e843e7937f7bcd5
SHA5121cc3f27f83b91d57ac39415dd7c3a9472b3a39d27989274b3be1781e3a16f33321215826b06a3e7994a63c06da71133d94207aa4a0007ac2c62bbe5ff19d6178
-
Filesize
232KB
MD50ae98964889cb7e892426e8e8d154a58
SHA1ca7429fbe1801fe143da39f58004d40e4ea15363
SHA2568c81ef77eccae1050bf8f63d996b5e93f1499628cc9953f62e843e7937f7bcd5
SHA5121cc3f27f83b91d57ac39415dd7c3a9472b3a39d27989274b3be1781e3a16f33321215826b06a3e7994a63c06da71133d94207aa4a0007ac2c62bbe5ff19d6178
-
Filesize
232KB
MD50ae98964889cb7e892426e8e8d154a58
SHA1ca7429fbe1801fe143da39f58004d40e4ea15363
SHA2568c81ef77eccae1050bf8f63d996b5e93f1499628cc9953f62e843e7937f7bcd5
SHA5121cc3f27f83b91d57ac39415dd7c3a9472b3a39d27989274b3be1781e3a16f33321215826b06a3e7994a63c06da71133d94207aa4a0007ac2c62bbe5ff19d6178
-
Filesize
232KB
MD50ae98964889cb7e892426e8e8d154a58
SHA1ca7429fbe1801fe143da39f58004d40e4ea15363
SHA2568c81ef77eccae1050bf8f63d996b5e93f1499628cc9953f62e843e7937f7bcd5
SHA5121cc3f27f83b91d57ac39415dd7c3a9472b3a39d27989274b3be1781e3a16f33321215826b06a3e7994a63c06da71133d94207aa4a0007ac2c62bbe5ff19d6178
-
Filesize
232KB
MD50ae98964889cb7e892426e8e8d154a58
SHA1ca7429fbe1801fe143da39f58004d40e4ea15363
SHA2568c81ef77eccae1050bf8f63d996b5e93f1499628cc9953f62e843e7937f7bcd5
SHA5121cc3f27f83b91d57ac39415dd7c3a9472b3a39d27989274b3be1781e3a16f33321215826b06a3e7994a63c06da71133d94207aa4a0007ac2c62bbe5ff19d6178
-
Filesize
597KB
MD57e473ca8e6bc447d7d82f882d989f6d8
SHA199af03fce2a488744cd66b3a1e704e271fec48b7
SHA2565eb0dc2d93d43077f116e3ea8ede538e5a99481c24a9edbc56d2d5f57a728520
SHA5122efb1ee465697065ede867eaf679b34c70cc3a39d2ddc7c45696465ede3743dc39427a77394d89e358efc4b7d669eadd72b5dfcb4d0d73e8de4827f22a335f89
-
Filesize
597KB
MD57e473ca8e6bc447d7d82f882d989f6d8
SHA199af03fce2a488744cd66b3a1e704e271fec48b7
SHA2565eb0dc2d93d43077f116e3ea8ede538e5a99481c24a9edbc56d2d5f57a728520
SHA5122efb1ee465697065ede867eaf679b34c70cc3a39d2ddc7c45696465ede3743dc39427a77394d89e358efc4b7d669eadd72b5dfcb4d0d73e8de4827f22a335f89
-
Filesize
286KB
MD5f44cbe20478245d86a4a9e23c14e89e5
SHA1c58837b039ce6701e21fa24cc19ded303fbbcd5f
SHA256390de8e58489858130953f052105a9656e250e594def4c32672fcf97ad91f520
SHA51206312de20e5ceaae6ce6be0c8c289fafcf97ffe30360c45329d1b050027ea5d891d3e4031d76addfc229f1115a6739a434d1326ccc506eb553638f04f8939e70
-
Filesize
286KB
MD5f44cbe20478245d86a4a9e23c14e89e5
SHA1c58837b039ce6701e21fa24cc19ded303fbbcd5f
SHA256390de8e58489858130953f052105a9656e250e594def4c32672fcf97ad91f520
SHA51206312de20e5ceaae6ce6be0c8c289fafcf97ffe30360c45329d1b050027ea5d891d3e4031d76addfc229f1115a6739a434d1326ccc506eb553638f04f8939e70
-
Filesize
316KB
MD5b350c864bf0bac299ee2aeb043e1c12b
SHA1ba3c8d3f9d871dd2abb79d682266fae046c0b8bf
SHA2563a50b8f9b2669d82ed1079f9a0ea16850c6d0d0d78040dbde50352dc2f9f758b
SHA512d1da597d60aa29d4d851770cb088c840a476e7779026c267225bd9c349318754aa858ace11bb203630a0674f252bfd54349a956a2c80e43903996f0fa8ebdd91
-
Filesize
316KB
MD5b350c864bf0bac299ee2aeb043e1c12b
SHA1ba3c8d3f9d871dd2abb79d682266fae046c0b8bf
SHA2563a50b8f9b2669d82ed1079f9a0ea16850c6d0d0d78040dbde50352dc2f9f758b
SHA512d1da597d60aa29d4d851770cb088c840a476e7779026c267225bd9c349318754aa858ace11bb203630a0674f252bfd54349a956a2c80e43903996f0fa8ebdd91
-
Filesize
184KB
MD5d4c640fb500618ad6c9fc5fe7d3e784d
SHA1850df0880e1685ce709b44afbbb365cab4f0fec4
SHA256a511ae2083565f7f66afa9902f2d6aaa5bdf56c8a148609bfe949880a74ff44b
SHA512a28a51e937a11c9d72f7450b86469609d972a1e65c176bf92a47922eaf9cf72d3a49f0d40702f6f22bfd3f2c9f9e36edfefecdd263e1d49f3546f44d4817cecd
-
Filesize
184KB
MD5d4c640fb500618ad6c9fc5fe7d3e784d
SHA1850df0880e1685ce709b44afbbb365cab4f0fec4
SHA256a511ae2083565f7f66afa9902f2d6aaa5bdf56c8a148609bfe949880a74ff44b
SHA512a28a51e937a11c9d72f7450b86469609d972a1e65c176bf92a47922eaf9cf72d3a49f0d40702f6f22bfd3f2c9f9e36edfefecdd263e1d49f3546f44d4817cecd
-
Filesize
168KB
MD5dae2d13c3b49cad507cc02037b5d892f
SHA140cc6d0887b0f33221eb7a1ba40d47f95a3c7d15
SHA256ff2c4ad7ea0c8da0343d9225392c1b9b2cf03bf83c5c24b01db4971dcc7cfa2d
SHA5120cbfa624eb955fa12b662d8366609c08b60df02f40333965992ee701e08a3327c544de29571b3d0c1b815ac538b6b008fc49593372cdd4b10a459a2bc3654a4b
-
Filesize
168KB
MD5dae2d13c3b49cad507cc02037b5d892f
SHA140cc6d0887b0f33221eb7a1ba40d47f95a3c7d15
SHA256ff2c4ad7ea0c8da0343d9225392c1b9b2cf03bf83c5c24b01db4971dcc7cfa2d
SHA5120cbfa624eb955fa12b662d8366609c08b60df02f40333965992ee701e08a3327c544de29571b3d0c1b815ac538b6b008fc49593372cdd4b10a459a2bc3654a4b