Analysis
-
max time kernel
128s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2023 18:39
Static task
static1
Behavioral task
behavioral1
Sample
c0c82a35602a33b72613294585822ede97aadcb537251444169bdf9c5872c568.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c0c82a35602a33b72613294585822ede97aadcb537251444169bdf9c5872c568.exe
Resource
win10v2004-20230220-en
General
-
Target
c0c82a35602a33b72613294585822ede97aadcb537251444169bdf9c5872c568.exe
-
Size
884KB
-
MD5
fd9f544cf663acf149ccee3f1700216a
-
SHA1
575eba6bd4069c6f516b536df84e219a0264cc96
-
SHA256
c0c82a35602a33b72613294585822ede97aadcb537251444169bdf9c5872c568
-
SHA512
8a28bbb2e9d98f87a3b6ad8fe1012caac5bb86c93d036bbbc884391439d991f7707cb75b8b590d9a544c07bfc45108dfdbccd2ed5afce07100b53716d320c3bc
-
SSDEEP
12288:2Mray90fzUk+G1mBmKskoAMbspeNrDzUQ/KfcQQbJ5P/5s97ZjimdyLMKBv:IyMzU1G14f/MaeN/zBKVMDU6MKBv
Malware Config
Extracted
redline
mixa
185.161.248.75:4132
-
auth_value
9d14534b25ac495ab25b59800acf3bb2
Extracted
redline
gogen
185.161.248.75:4132
-
auth_value
dfb27ce11afd52277523c8e405853d53
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a9715275.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a9715275.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a9715275.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a9715275.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a9715275.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a9715275.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation c5448546.exe Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 8 IoCs
pid Process 1332 v1641827.exe 4204 v3812574.exe 1812 a9715275.exe 1892 b9032791.exe 4460 c5448546.exe 3332 oneetx.exe 3784 d3712324.exe 2672 d3712324.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a9715275.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a9715275.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1641827.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v1641827.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3812574.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v3812574.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c0c82a35602a33b72613294585822ede97aadcb537251444169bdf9c5872c568.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c0c82a35602a33b72613294585822ede97aadcb537251444169bdf9c5872c568.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3784 set thread context of 2672 3784 d3712324.exe 99 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3308 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1812 a9715275.exe 1812 a9715275.exe 1892 b9032791.exe 1892 b9032791.exe 2672 d3712324.exe 2672 d3712324.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1812 a9715275.exe Token: SeDebugPrivilege 1892 b9032791.exe Token: SeDebugPrivilege 3784 d3712324.exe Token: SeDebugPrivilege 2672 d3712324.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4460 c5448546.exe -
Suspicious use of WriteProcessMemory 53 IoCs
description pid Process procid_target PID 1304 wrote to memory of 1332 1304 c0c82a35602a33b72613294585822ede97aadcb537251444169bdf9c5872c568.exe 84 PID 1304 wrote to memory of 1332 1304 c0c82a35602a33b72613294585822ede97aadcb537251444169bdf9c5872c568.exe 84 PID 1304 wrote to memory of 1332 1304 c0c82a35602a33b72613294585822ede97aadcb537251444169bdf9c5872c568.exe 84 PID 1332 wrote to memory of 4204 1332 v1641827.exe 85 PID 1332 wrote to memory of 4204 1332 v1641827.exe 85 PID 1332 wrote to memory of 4204 1332 v1641827.exe 85 PID 4204 wrote to memory of 1812 4204 v3812574.exe 86 PID 4204 wrote to memory of 1812 4204 v3812574.exe 86 PID 4204 wrote to memory of 1812 4204 v3812574.exe 86 PID 4204 wrote to memory of 1892 4204 v3812574.exe 87 PID 4204 wrote to memory of 1892 4204 v3812574.exe 87 PID 4204 wrote to memory of 1892 4204 v3812574.exe 87 PID 1332 wrote to memory of 4460 1332 v1641827.exe 90 PID 1332 wrote to memory of 4460 1332 v1641827.exe 90 PID 1332 wrote to memory of 4460 1332 v1641827.exe 90 PID 4460 wrote to memory of 3332 4460 c5448546.exe 91 PID 4460 wrote to memory of 3332 4460 c5448546.exe 91 PID 4460 wrote to memory of 3332 4460 c5448546.exe 91 PID 1304 wrote to memory of 3784 1304 c0c82a35602a33b72613294585822ede97aadcb537251444169bdf9c5872c568.exe 92 PID 1304 wrote to memory of 3784 1304 c0c82a35602a33b72613294585822ede97aadcb537251444169bdf9c5872c568.exe 92 PID 1304 wrote to memory of 3784 1304 c0c82a35602a33b72613294585822ede97aadcb537251444169bdf9c5872c568.exe 92 PID 3332 wrote to memory of 3308 3332 oneetx.exe 93 PID 3332 wrote to memory of 3308 3332 oneetx.exe 93 PID 3332 wrote to memory of 3308 3332 oneetx.exe 93 PID 3332 wrote to memory of 1288 3332 oneetx.exe 95 PID 3332 wrote to memory of 1288 3332 oneetx.exe 95 PID 3332 wrote to memory of 1288 3332 oneetx.exe 95 PID 1288 wrote to memory of 4944 1288 cmd.exe 97 PID 1288 wrote to memory of 4944 1288 cmd.exe 97 PID 1288 wrote to memory of 4944 1288 cmd.exe 97 PID 1288 wrote to memory of 4076 1288 cmd.exe 98 PID 1288 wrote to memory of 4076 1288 cmd.exe 98 PID 1288 wrote to memory of 4076 1288 cmd.exe 98 PID 3784 wrote to memory of 2672 3784 d3712324.exe 99 PID 3784 wrote to memory of 2672 3784 d3712324.exe 99 PID 3784 wrote to memory of 2672 3784 d3712324.exe 99 PID 1288 wrote to memory of 2324 1288 cmd.exe 100 PID 1288 wrote to memory of 2324 1288 cmd.exe 100 PID 1288 wrote to memory of 2324 1288 cmd.exe 100 PID 1288 wrote to memory of 2012 1288 cmd.exe 101 PID 1288 wrote to memory of 2012 1288 cmd.exe 101 PID 1288 wrote to memory of 2012 1288 cmd.exe 101 PID 1288 wrote to memory of 4740 1288 cmd.exe 102 PID 1288 wrote to memory of 4740 1288 cmd.exe 102 PID 1288 wrote to memory of 4740 1288 cmd.exe 102 PID 1288 wrote to memory of 2640 1288 cmd.exe 103 PID 1288 wrote to memory of 2640 1288 cmd.exe 103 PID 1288 wrote to memory of 2640 1288 cmd.exe 103 PID 3784 wrote to memory of 2672 3784 d3712324.exe 99 PID 3784 wrote to memory of 2672 3784 d3712324.exe 99 PID 3784 wrote to memory of 2672 3784 d3712324.exe 99 PID 3784 wrote to memory of 2672 3784 d3712324.exe 99 PID 3784 wrote to memory of 2672 3784 d3712324.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0c82a35602a33b72613294585822ede97aadcb537251444169bdf9c5872c568.exe"C:\Users\Admin\AppData\Local\Temp\c0c82a35602a33b72613294585822ede97aadcb537251444169bdf9c5872c568.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1641827.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1641827.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3812574.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3812574.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a9715275.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a9715275.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1812
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9032791.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9032791.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1892
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5448546.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5448546.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe" /F5⤵
- Creates scheduled task(s)
PID:3308
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\c3912af058" /P "Admin:N"&&CACLS "..\c3912af058" /P "Admin:R" /E&&Exit5⤵
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:4944
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:N"6⤵PID:4076
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "oneetx.exe" /P "Admin:R" /E6⤵PID:2324
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"6⤵PID:2012
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:N"6⤵PID:4740
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\c3912af058" /P "Admin:R" /E6⤵PID:2640
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3712324.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3712324.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3712324.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3712324.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
904KB
MD5da1392ce8a745ff84066b4b89891c820
SHA1da95517cc9fd2904df61fbada3268ba8b074c5f1
SHA25652b27910ae22c29f0bd38aee2637554d48a65862315628dd6a27ed621a216207
SHA512bca02f85a25239e1171847ab71bf1bcbe8e1d6b54892d56c4259117db2dbf31305f9e11b8dd9f5aff1ece96830534f33e92b01e6d80f0b03022f1972b8b66570
-
Filesize
904KB
MD5da1392ce8a745ff84066b4b89891c820
SHA1da95517cc9fd2904df61fbada3268ba8b074c5f1
SHA25652b27910ae22c29f0bd38aee2637554d48a65862315628dd6a27ed621a216207
SHA512bca02f85a25239e1171847ab71bf1bcbe8e1d6b54892d56c4259117db2dbf31305f9e11b8dd9f5aff1ece96830534f33e92b01e6d80f0b03022f1972b8b66570
-
Filesize
904KB
MD5da1392ce8a745ff84066b4b89891c820
SHA1da95517cc9fd2904df61fbada3268ba8b074c5f1
SHA25652b27910ae22c29f0bd38aee2637554d48a65862315628dd6a27ed621a216207
SHA512bca02f85a25239e1171847ab71bf1bcbe8e1d6b54892d56c4259117db2dbf31305f9e11b8dd9f5aff1ece96830534f33e92b01e6d80f0b03022f1972b8b66570
-
Filesize
488KB
MD50b14808f890bec2a23c2499f2d728849
SHA17f453089a34c11536a06778ac52443eda643a99f
SHA2566e8bbdbd699befdb73d35d79a55d394ed879ad85c5d4a83631f7136e18d167b9
SHA51234b05faf78e43c27e55b862cf67ba8c51f9a3d271788972bdb25dda2ceedee3a642d9bc4af1c37998b049b876337f1b8a9317041407561ca6f0b34244d7d9283
-
Filesize
488KB
MD50b14808f890bec2a23c2499f2d728849
SHA17f453089a34c11536a06778ac52443eda643a99f
SHA2566e8bbdbd699befdb73d35d79a55d394ed879ad85c5d4a83631f7136e18d167b9
SHA51234b05faf78e43c27e55b862cf67ba8c51f9a3d271788972bdb25dda2ceedee3a642d9bc4af1c37998b049b876337f1b8a9317041407561ca6f0b34244d7d9283
-
Filesize
214KB
MD5bb26ba5893e2e2a77902c3bdd5a7095b
SHA12d47cb14a49503dc03794f0caa24a63b21ebfa7c
SHA2567d15cd43ec024265de31949289659035518a9631de495df6eedaad5137308ca2
SHA51217e9d7e35a5b04e4211dcf9eff07c860e9a80bcd218b3d53b858c14a4c9e67369ed093fea6c99870982eb4d073051920ec5477539cbda6d23884bde6f274e699
-
Filesize
214KB
MD5bb26ba5893e2e2a77902c3bdd5a7095b
SHA12d47cb14a49503dc03794f0caa24a63b21ebfa7c
SHA2567d15cd43ec024265de31949289659035518a9631de495df6eedaad5137308ca2
SHA51217e9d7e35a5b04e4211dcf9eff07c860e9a80bcd218b3d53b858c14a4c9e67369ed093fea6c99870982eb4d073051920ec5477539cbda6d23884bde6f274e699
-
Filesize
316KB
MD538eede5faf0bef2dd66a4fcb9efac8ef
SHA11d438acd4308a6bbd747d12878c2abb7a39938ae
SHA2560f7bebadf4757b53ad5539d8600a5a0ddfe809fd99af8c789ac01f9bd36d0c26
SHA512455a1489cf4b165f019348fc3259b9a7f2fbe8a98489907c9607ead5a5f966ce002b4ce210e1d07203b8935b21d1e5106823c3a20813203e6ec210dbde3c35a5
-
Filesize
316KB
MD538eede5faf0bef2dd66a4fcb9efac8ef
SHA11d438acd4308a6bbd747d12878c2abb7a39938ae
SHA2560f7bebadf4757b53ad5539d8600a5a0ddfe809fd99af8c789ac01f9bd36d0c26
SHA512455a1489cf4b165f019348fc3259b9a7f2fbe8a98489907c9607ead5a5f966ce002b4ce210e1d07203b8935b21d1e5106823c3a20813203e6ec210dbde3c35a5
-
Filesize
184KB
MD5d4c640fb500618ad6c9fc5fe7d3e784d
SHA1850df0880e1685ce709b44afbbb365cab4f0fec4
SHA256a511ae2083565f7f66afa9902f2d6aaa5bdf56c8a148609bfe949880a74ff44b
SHA512a28a51e937a11c9d72f7450b86469609d972a1e65c176bf92a47922eaf9cf72d3a49f0d40702f6f22bfd3f2c9f9e36edfefecdd263e1d49f3546f44d4817cecd
-
Filesize
184KB
MD5d4c640fb500618ad6c9fc5fe7d3e784d
SHA1850df0880e1685ce709b44afbbb365cab4f0fec4
SHA256a511ae2083565f7f66afa9902f2d6aaa5bdf56c8a148609bfe949880a74ff44b
SHA512a28a51e937a11c9d72f7450b86469609d972a1e65c176bf92a47922eaf9cf72d3a49f0d40702f6f22bfd3f2c9f9e36edfefecdd263e1d49f3546f44d4817cecd
-
Filesize
168KB
MD504e2c8238569acefad10f5261d6cacb2
SHA10b45646563d103ec5e1b9e8393a25f1f3a2c321b
SHA2566671492c88f89228197db299e4d9d8bcc9d9219c991f6e5038fb2cbbaf9ff032
SHA5125db9bf610bba38b420c11044ee0c54e8c84faf4c0db38a8e3db497eb939bacae7be2254d32d33a936db51f05ff61279d438c017425b1b4607a3e61afcbb93a7d
-
Filesize
168KB
MD504e2c8238569acefad10f5261d6cacb2
SHA10b45646563d103ec5e1b9e8393a25f1f3a2c321b
SHA2566671492c88f89228197db299e4d9d8bcc9d9219c991f6e5038fb2cbbaf9ff032
SHA5125db9bf610bba38b420c11044ee0c54e8c84faf4c0db38a8e3db497eb939bacae7be2254d32d33a936db51f05ff61279d438c017425b1b4607a3e61afcbb93a7d
-
Filesize
214KB
MD5bb26ba5893e2e2a77902c3bdd5a7095b
SHA12d47cb14a49503dc03794f0caa24a63b21ebfa7c
SHA2567d15cd43ec024265de31949289659035518a9631de495df6eedaad5137308ca2
SHA51217e9d7e35a5b04e4211dcf9eff07c860e9a80bcd218b3d53b858c14a4c9e67369ed093fea6c99870982eb4d073051920ec5477539cbda6d23884bde6f274e699
-
Filesize
214KB
MD5bb26ba5893e2e2a77902c3bdd5a7095b
SHA12d47cb14a49503dc03794f0caa24a63b21ebfa7c
SHA2567d15cd43ec024265de31949289659035518a9631de495df6eedaad5137308ca2
SHA51217e9d7e35a5b04e4211dcf9eff07c860e9a80bcd218b3d53b858c14a4c9e67369ed093fea6c99870982eb4d073051920ec5477539cbda6d23884bde6f274e699
-
Filesize
214KB
MD5bb26ba5893e2e2a77902c3bdd5a7095b
SHA12d47cb14a49503dc03794f0caa24a63b21ebfa7c
SHA2567d15cd43ec024265de31949289659035518a9631de495df6eedaad5137308ca2
SHA51217e9d7e35a5b04e4211dcf9eff07c860e9a80bcd218b3d53b858c14a4c9e67369ed093fea6c99870982eb4d073051920ec5477539cbda6d23884bde6f274e699