Analysis
-
max time kernel
135s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2023, 01:42
Static task
static1
Behavioral task
behavioral1
Sample
ff1968afbd96f0d20af9c43a40c602d16421e31909d6663868a0343d1cbab503.exe
Resource
win10v2004-20230220-en
General
-
Target
ff1968afbd96f0d20af9c43a40c602d16421e31909d6663868a0343d1cbab503.exe
-
Size
1.1MB
-
MD5
1a2f1a34749948fdf4b7ce3eefb2163b
-
SHA1
ccb5fc2f056c3f68a52e1aafa754c90ef133019b
-
SHA256
ff1968afbd96f0d20af9c43a40c602d16421e31909d6663868a0343d1cbab503
-
SHA512
98e2d26e00a2591b2ca4d72bbd3a0240ae4d5016bcd91459fef5b5a251c9f58d3068f284b9b2ddf80a3a74da3bb79400e1dfe8fa740c3134a393701b0c69f9f3
-
SSDEEP
24576:hyNlFgzo1sEqBkk2Cj4vUas3Zt6b4/Sly2Md1r/:UNlFr1WBkwcs13P2yBH
Malware Config
Extracted
redline
difoz
185.161.248.75:4132
-
auth_value
ee98afda432cdf29ea1dd0464fdc94e6
Extracted
redline
horor
185.161.248.75:4132
-
auth_value
b8d506fe48db15c38fb031d07f42d529
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k0590983.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k0590983.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k0590983.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k0590983.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k0590983.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k0590983.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation m6528092.exe -
Executes dropped EXE 10 IoCs
pid Process 1068 y4524024.exe 4336 y6470070.exe 2536 k0590983.exe 3688 l9599056.exe 3116 m6528092.exe 992 m6528092.exe 384 n8264504.exe 4932 oneetx.exe 3768 n8264504.exe 848 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k0590983.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k0590983.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y4524024.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y4524024.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y6470070.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y6470070.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ff1968afbd96f0d20af9c43a40c602d16421e31909d6663868a0343d1cbab503.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ff1968afbd96f0d20af9c43a40c602d16421e31909d6663868a0343d1cbab503.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3116 set thread context of 992 3116 m6528092.exe 91 PID 384 set thread context of 3768 384 n8264504.exe 94 PID 4932 set thread context of 848 4932 oneetx.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4812 848 WerFault.exe 96 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2536 k0590983.exe 2536 k0590983.exe 3688 l9599056.exe 3688 l9599056.exe 3768 n8264504.exe 3768 n8264504.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2536 k0590983.exe Token: SeDebugPrivilege 3688 l9599056.exe Token: SeDebugPrivilege 3116 m6528092.exe Token: SeDebugPrivilege 384 n8264504.exe Token: SeDebugPrivilege 4932 oneetx.exe Token: SeDebugPrivilege 3768 n8264504.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 992 m6528092.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 848 oneetx.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 2196 wrote to memory of 1068 2196 ff1968afbd96f0d20af9c43a40c602d16421e31909d6663868a0343d1cbab503.exe 83 PID 2196 wrote to memory of 1068 2196 ff1968afbd96f0d20af9c43a40c602d16421e31909d6663868a0343d1cbab503.exe 83 PID 2196 wrote to memory of 1068 2196 ff1968afbd96f0d20af9c43a40c602d16421e31909d6663868a0343d1cbab503.exe 83 PID 1068 wrote to memory of 4336 1068 y4524024.exe 84 PID 1068 wrote to memory of 4336 1068 y4524024.exe 84 PID 1068 wrote to memory of 4336 1068 y4524024.exe 84 PID 4336 wrote to memory of 2536 4336 y6470070.exe 85 PID 4336 wrote to memory of 2536 4336 y6470070.exe 85 PID 4336 wrote to memory of 2536 4336 y6470070.exe 85 PID 4336 wrote to memory of 3688 4336 y6470070.exe 89 PID 4336 wrote to memory of 3688 4336 y6470070.exe 89 PID 4336 wrote to memory of 3688 4336 y6470070.exe 89 PID 1068 wrote to memory of 3116 1068 y4524024.exe 90 PID 1068 wrote to memory of 3116 1068 y4524024.exe 90 PID 1068 wrote to memory of 3116 1068 y4524024.exe 90 PID 3116 wrote to memory of 992 3116 m6528092.exe 91 PID 3116 wrote to memory of 992 3116 m6528092.exe 91 PID 3116 wrote to memory of 992 3116 m6528092.exe 91 PID 3116 wrote to memory of 992 3116 m6528092.exe 91 PID 3116 wrote to memory of 992 3116 m6528092.exe 91 PID 3116 wrote to memory of 992 3116 m6528092.exe 91 PID 3116 wrote to memory of 992 3116 m6528092.exe 91 PID 3116 wrote to memory of 992 3116 m6528092.exe 91 PID 3116 wrote to memory of 992 3116 m6528092.exe 91 PID 3116 wrote to memory of 992 3116 m6528092.exe 91 PID 2196 wrote to memory of 384 2196 ff1968afbd96f0d20af9c43a40c602d16421e31909d6663868a0343d1cbab503.exe 93 PID 2196 wrote to memory of 384 2196 ff1968afbd96f0d20af9c43a40c602d16421e31909d6663868a0343d1cbab503.exe 93 PID 2196 wrote to memory of 384 2196 ff1968afbd96f0d20af9c43a40c602d16421e31909d6663868a0343d1cbab503.exe 93 PID 384 wrote to memory of 3768 384 n8264504.exe 94 PID 384 wrote to memory of 3768 384 n8264504.exe 94 PID 384 wrote to memory of 3768 384 n8264504.exe 94 PID 992 wrote to memory of 4932 992 m6528092.exe 95 PID 992 wrote to memory of 4932 992 m6528092.exe 95 PID 992 wrote to memory of 4932 992 m6528092.exe 95 PID 4932 wrote to memory of 848 4932 oneetx.exe 96 PID 4932 wrote to memory of 848 4932 oneetx.exe 96 PID 4932 wrote to memory of 848 4932 oneetx.exe 96 PID 384 wrote to memory of 3768 384 n8264504.exe 94 PID 384 wrote to memory of 3768 384 n8264504.exe 94 PID 384 wrote to memory of 3768 384 n8264504.exe 94 PID 384 wrote to memory of 3768 384 n8264504.exe 94 PID 384 wrote to memory of 3768 384 n8264504.exe 94 PID 4932 wrote to memory of 848 4932 oneetx.exe 96 PID 4932 wrote to memory of 848 4932 oneetx.exe 96 PID 4932 wrote to memory of 848 4932 oneetx.exe 96 PID 4932 wrote to memory of 848 4932 oneetx.exe 96 PID 4932 wrote to memory of 848 4932 oneetx.exe 96 PID 4932 wrote to memory of 848 4932 oneetx.exe 96 PID 4932 wrote to memory of 848 4932 oneetx.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff1968afbd96f0d20af9c43a40c602d16421e31909d6663868a0343d1cbab503.exe"C:\Users\Admin\AppData\Local\Temp\ff1968afbd96f0d20af9c43a40c602d16421e31909d6663868a0343d1cbab503.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4524024.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4524024.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6470070.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6470070.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k0590983.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k0590983.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2536
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9599056.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9599056.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3688
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m6528092.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m6528092.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m6528092.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m6528092.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe6⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 848 -s 127⤵
- Program crash
PID:4812
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n8264504.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n8264504.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n8264504.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n8264504.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3768
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 848 -ip 8481⤵PID:4664
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD54eaca4566b22b01cd3bc115b9b0b2196
SHA1e743e0792c19f71740416e7b3c061d9f1336bf94
SHA25634ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb
SHA512bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1
-
Filesize
904KB
MD51fac4fb201ae0b904a5593dc9e33146a
SHA113a16b7892664eafef49e3d61dd3e8fa6755e56a
SHA25608ffc44501e5d7596f6625bb3d5db2af1132aa2e6e3b957a400e4d43c1b79266
SHA5129a8a295d4559a10a4b842289d04898dbd32e4ad27bd7e652d2ce651d6ff5eacb9899585cc332ba22e0037ff823f6d538f74b28a475d2eae41466371ebdeec119
-
Filesize
904KB
MD51fac4fb201ae0b904a5593dc9e33146a
SHA113a16b7892664eafef49e3d61dd3e8fa6755e56a
SHA25608ffc44501e5d7596f6625bb3d5db2af1132aa2e6e3b957a400e4d43c1b79266
SHA5129a8a295d4559a10a4b842289d04898dbd32e4ad27bd7e652d2ce651d6ff5eacb9899585cc332ba22e0037ff823f6d538f74b28a475d2eae41466371ebdeec119
-
Filesize
904KB
MD51fac4fb201ae0b904a5593dc9e33146a
SHA113a16b7892664eafef49e3d61dd3e8fa6755e56a
SHA25608ffc44501e5d7596f6625bb3d5db2af1132aa2e6e3b957a400e4d43c1b79266
SHA5129a8a295d4559a10a4b842289d04898dbd32e4ad27bd7e652d2ce651d6ff5eacb9899585cc332ba22e0037ff823f6d538f74b28a475d2eae41466371ebdeec119
-
Filesize
751KB
MD5a104262f6f9c5420ad55ec098edec664
SHA1bf6c3718dec034fc4e4895ed4a6092b7033d7a49
SHA256fdfc84c5ed5ad9ad831827212595c13b8361cac314b289769c1ce5ccfb6fbcf1
SHA512d771d1496b9209f5892daf2e6c7e6069a7d00ae719edfeb352dacc9b4e0a2189a92c5b90957659366e86efa13091fb3b47ae01f115d92c6ce397103285c54b93
-
Filesize
751KB
MD5a104262f6f9c5420ad55ec098edec664
SHA1bf6c3718dec034fc4e4895ed4a6092b7033d7a49
SHA256fdfc84c5ed5ad9ad831827212595c13b8361cac314b289769c1ce5ccfb6fbcf1
SHA512d771d1496b9209f5892daf2e6c7e6069a7d00ae719edfeb352dacc9b4e0a2189a92c5b90957659366e86efa13091fb3b47ae01f115d92c6ce397103285c54b93
-
Filesize
963KB
MD59e1614489ff9a56be195701a91a726c6
SHA19526f44e65d1b9a1d83f287621fa34c1040162e3
SHA25619fd98efed9dbb8c63cedc192d3dd860dd6be50f226b60fc304823895500ac63
SHA51205bb94117723cc97a2426ece1785f5036173e73fc661f1fe961180f58f9e776fa0f6abd0070289d3f56de822ad126c16d94e588b0314201359eec83f80b73ced
-
Filesize
963KB
MD59e1614489ff9a56be195701a91a726c6
SHA19526f44e65d1b9a1d83f287621fa34c1040162e3
SHA25619fd98efed9dbb8c63cedc192d3dd860dd6be50f226b60fc304823895500ac63
SHA51205bb94117723cc97a2426ece1785f5036173e73fc661f1fe961180f58f9e776fa0f6abd0070289d3f56de822ad126c16d94e588b0314201359eec83f80b73ced
-
Filesize
963KB
MD59e1614489ff9a56be195701a91a726c6
SHA19526f44e65d1b9a1d83f287621fa34c1040162e3
SHA25619fd98efed9dbb8c63cedc192d3dd860dd6be50f226b60fc304823895500ac63
SHA51205bb94117723cc97a2426ece1785f5036173e73fc661f1fe961180f58f9e776fa0f6abd0070289d3f56de822ad126c16d94e588b0314201359eec83f80b73ced
-
Filesize
305KB
MD54ab989541e1f2eaa33a62d378efbe6f9
SHA1b1ead1be4254bab658bc1065fee41e62066f4e9f
SHA2564bf5062b977fec8e37fb7e6dde6a9debc7c8ecfde2adb9e221f6e9aba3c2303d
SHA512d417879f6e5b828ebe4105e5375eefd1ced1b310d3480e38421887285adbfefc756881f43c347b8f02ca388a8b55b1281c27c7274f984df8069462ff1b4fdcb1
-
Filesize
305KB
MD54ab989541e1f2eaa33a62d378efbe6f9
SHA1b1ead1be4254bab658bc1065fee41e62066f4e9f
SHA2564bf5062b977fec8e37fb7e6dde6a9debc7c8ecfde2adb9e221f6e9aba3c2303d
SHA512d417879f6e5b828ebe4105e5375eefd1ced1b310d3480e38421887285adbfefc756881f43c347b8f02ca388a8b55b1281c27c7274f984df8069462ff1b4fdcb1
-
Filesize
184KB
MD59c3b5573d27ee780f71c41f02e0a2f08
SHA1d768f49d36f069095e1c61841da88163bc8142c1
SHA256a4187a922c0824620877573b7fd2972e7b90c127d2ca8db20623dc44ff6703fd
SHA512e8b8af523c365463c769d617f854cb4c6b331648a2402494947eab72240bf1c0c743e298090cb0f49e48841d1fe655153254cda67477e2c45ab80b3fe3c93737
-
Filesize
184KB
MD59c3b5573d27ee780f71c41f02e0a2f08
SHA1d768f49d36f069095e1c61841da88163bc8142c1
SHA256a4187a922c0824620877573b7fd2972e7b90c127d2ca8db20623dc44ff6703fd
SHA512e8b8af523c365463c769d617f854cb4c6b331648a2402494947eab72240bf1c0c743e298090cb0f49e48841d1fe655153254cda67477e2c45ab80b3fe3c93737
-
Filesize
145KB
MD50b6ea061929a9fbd2ed1079277998132
SHA12dcf49c5734c47332e1b2d645e0898eff6b90614
SHA256c77d3d5624bf2f3614f6e7171903b25241a5e3adaea1faf69f13ce98e1adf737
SHA5129620ddc25edbaa1667d7bfb06dbdc725aa26e79702ccffa4377e9bfc65f2e097653c29096300dab6d582240a8f1b58606c303b645620a4a15d0ccab7a8ff84c6
-
Filesize
145KB
MD50b6ea061929a9fbd2ed1079277998132
SHA12dcf49c5734c47332e1b2d645e0898eff6b90614
SHA256c77d3d5624bf2f3614f6e7171903b25241a5e3adaea1faf69f13ce98e1adf737
SHA5129620ddc25edbaa1667d7bfb06dbdc725aa26e79702ccffa4377e9bfc65f2e097653c29096300dab6d582240a8f1b58606c303b645620a4a15d0ccab7a8ff84c6
-
Filesize
963KB
MD59e1614489ff9a56be195701a91a726c6
SHA19526f44e65d1b9a1d83f287621fa34c1040162e3
SHA25619fd98efed9dbb8c63cedc192d3dd860dd6be50f226b60fc304823895500ac63
SHA51205bb94117723cc97a2426ece1785f5036173e73fc661f1fe961180f58f9e776fa0f6abd0070289d3f56de822ad126c16d94e588b0314201359eec83f80b73ced
-
Filesize
963KB
MD59e1614489ff9a56be195701a91a726c6
SHA19526f44e65d1b9a1d83f287621fa34c1040162e3
SHA25619fd98efed9dbb8c63cedc192d3dd860dd6be50f226b60fc304823895500ac63
SHA51205bb94117723cc97a2426ece1785f5036173e73fc661f1fe961180f58f9e776fa0f6abd0070289d3f56de822ad126c16d94e588b0314201359eec83f80b73ced
-
Filesize
963KB
MD59e1614489ff9a56be195701a91a726c6
SHA19526f44e65d1b9a1d83f287621fa34c1040162e3
SHA25619fd98efed9dbb8c63cedc192d3dd860dd6be50f226b60fc304823895500ac63
SHA51205bb94117723cc97a2426ece1785f5036173e73fc661f1fe961180f58f9e776fa0f6abd0070289d3f56de822ad126c16d94e588b0314201359eec83f80b73ced
-
Filesize
963KB
MD59e1614489ff9a56be195701a91a726c6
SHA19526f44e65d1b9a1d83f287621fa34c1040162e3
SHA25619fd98efed9dbb8c63cedc192d3dd860dd6be50f226b60fc304823895500ac63
SHA51205bb94117723cc97a2426ece1785f5036173e73fc661f1fe961180f58f9e776fa0f6abd0070289d3f56de822ad126c16d94e588b0314201359eec83f80b73ced