Analysis
-
max time kernel
56s -
max time network
58s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
16-05-2023 11:54
Static task
static1
Behavioral task
behavioral1
Sample
3fa105e9f452d1b9905b07d00d8b22d246677f2b6cd4db5e3829bdb06c298543.exe
Resource
win10-20230220-en
General
-
Target
3fa105e9f452d1b9905b07d00d8b22d246677f2b6cd4db5e3829bdb06c298543.exe
-
Size
1.1MB
-
MD5
364cdf2ba04d9f0a6f609027cc66b012
-
SHA1
ca7b3f3c3bc94bac1e4fddfdc020b974592ea526
-
SHA256
3fa105e9f452d1b9905b07d00d8b22d246677f2b6cd4db5e3829bdb06c298543
-
SHA512
39e8ef93f3b169e82098904bf8e32ef763968460f94532aa7a9170f27403c50e2c64085b41eebbc375dcd61a61a8885cfd2ee24e8ca5dae228a1a3cd2f247c99
-
SSDEEP
24576:DypMqAcPuVoSw8y4PXJuwcehXXGIPWFjXO1ATDVDFKMfk7zOZj9lvN6:WpMZCuVoSwJAhceMI+FpVDFKMM78Bp
Malware Config
Extracted
redline
dopon
185.161.248.75:4132
-
auth_value
8b75ad7ee23fb4d414b2c7174486600e
Extracted
redline
srala
185.161.248.75:4132
-
auth_value
c90de493c232a904fb467fa366785cb6
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k9690482.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k9690482.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k9690482.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k9690482.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k9690482.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 10 IoCs
pid Process 4128 y9289031.exe 3408 y6703058.exe 4952 k9690482.exe 3600 l5156483.exe 3924 m4364750.exe 3608 m4364750.exe 2624 n5911491.exe 4156 oneetx.exe 3180 n5911491.exe 3364 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k9690482.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k9690482.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3fa105e9f452d1b9905b07d00d8b22d246677f2b6cd4db5e3829bdb06c298543.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3fa105e9f452d1b9905b07d00d8b22d246677f2b6cd4db5e3829bdb06c298543.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y9289031.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y9289031.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y6703058.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y6703058.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3924 set thread context of 3608 3924 m4364750.exe 72 PID 2624 set thread context of 3180 2624 n5911491.exe 74 PID 4156 set thread context of 3364 4156 oneetx.exe 76 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3384 3364 WerFault.exe 76 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4952 k9690482.exe 4952 k9690482.exe 3600 l5156483.exe 3600 l5156483.exe 3180 n5911491.exe 3180 n5911491.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4952 k9690482.exe Token: SeDebugPrivilege 3600 l5156483.exe Token: SeDebugPrivilege 3924 m4364750.exe Token: SeDebugPrivilege 2624 n5911491.exe Token: SeDebugPrivilege 4156 oneetx.exe Token: SeDebugPrivilege 3180 n5911491.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3608 m4364750.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 3796 wrote to memory of 4128 3796 3fa105e9f452d1b9905b07d00d8b22d246677f2b6cd4db5e3829bdb06c298543.exe 66 PID 3796 wrote to memory of 4128 3796 3fa105e9f452d1b9905b07d00d8b22d246677f2b6cd4db5e3829bdb06c298543.exe 66 PID 3796 wrote to memory of 4128 3796 3fa105e9f452d1b9905b07d00d8b22d246677f2b6cd4db5e3829bdb06c298543.exe 66 PID 4128 wrote to memory of 3408 4128 y9289031.exe 67 PID 4128 wrote to memory of 3408 4128 y9289031.exe 67 PID 4128 wrote to memory of 3408 4128 y9289031.exe 67 PID 3408 wrote to memory of 4952 3408 y6703058.exe 68 PID 3408 wrote to memory of 4952 3408 y6703058.exe 68 PID 3408 wrote to memory of 4952 3408 y6703058.exe 68 PID 3408 wrote to memory of 3600 3408 y6703058.exe 69 PID 3408 wrote to memory of 3600 3408 y6703058.exe 69 PID 3408 wrote to memory of 3600 3408 y6703058.exe 69 PID 4128 wrote to memory of 3924 4128 y9289031.exe 71 PID 4128 wrote to memory of 3924 4128 y9289031.exe 71 PID 4128 wrote to memory of 3924 4128 y9289031.exe 71 PID 3924 wrote to memory of 3608 3924 m4364750.exe 72 PID 3924 wrote to memory of 3608 3924 m4364750.exe 72 PID 3924 wrote to memory of 3608 3924 m4364750.exe 72 PID 3924 wrote to memory of 3608 3924 m4364750.exe 72 PID 3924 wrote to memory of 3608 3924 m4364750.exe 72 PID 3924 wrote to memory of 3608 3924 m4364750.exe 72 PID 3924 wrote to memory of 3608 3924 m4364750.exe 72 PID 3924 wrote to memory of 3608 3924 m4364750.exe 72 PID 3924 wrote to memory of 3608 3924 m4364750.exe 72 PID 3924 wrote to memory of 3608 3924 m4364750.exe 72 PID 3796 wrote to memory of 2624 3796 3fa105e9f452d1b9905b07d00d8b22d246677f2b6cd4db5e3829bdb06c298543.exe 73 PID 3796 wrote to memory of 2624 3796 3fa105e9f452d1b9905b07d00d8b22d246677f2b6cd4db5e3829bdb06c298543.exe 73 PID 3796 wrote to memory of 2624 3796 3fa105e9f452d1b9905b07d00d8b22d246677f2b6cd4db5e3829bdb06c298543.exe 73 PID 2624 wrote to memory of 3180 2624 n5911491.exe 74 PID 2624 wrote to memory of 3180 2624 n5911491.exe 74 PID 2624 wrote to memory of 3180 2624 n5911491.exe 74 PID 3608 wrote to memory of 4156 3608 m4364750.exe 75 PID 3608 wrote to memory of 4156 3608 m4364750.exe 75 PID 3608 wrote to memory of 4156 3608 m4364750.exe 75 PID 4156 wrote to memory of 3364 4156 oneetx.exe 76 PID 4156 wrote to memory of 3364 4156 oneetx.exe 76 PID 4156 wrote to memory of 3364 4156 oneetx.exe 76 PID 2624 wrote to memory of 3180 2624 n5911491.exe 74 PID 2624 wrote to memory of 3180 2624 n5911491.exe 74 PID 2624 wrote to memory of 3180 2624 n5911491.exe 74 PID 2624 wrote to memory of 3180 2624 n5911491.exe 74 PID 2624 wrote to memory of 3180 2624 n5911491.exe 74 PID 4156 wrote to memory of 3364 4156 oneetx.exe 76 PID 4156 wrote to memory of 3364 4156 oneetx.exe 76 PID 4156 wrote to memory of 3364 4156 oneetx.exe 76 PID 4156 wrote to memory of 3364 4156 oneetx.exe 76 PID 4156 wrote to memory of 3364 4156 oneetx.exe 76 PID 4156 wrote to memory of 3364 4156 oneetx.exe 76 PID 4156 wrote to memory of 3364 4156 oneetx.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fa105e9f452d1b9905b07d00d8b22d246677f2b6cd4db5e3829bdb06c298543.exe"C:\Users\Admin\AppData\Local\Temp\3fa105e9f452d1b9905b07d00d8b22d246677f2b6cd4db5e3829bdb06c298543.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9289031.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9289031.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6703058.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6703058.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k9690482.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k9690482.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4952
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l5156483.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l5156483.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3600
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m4364750.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m4364750.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m4364750.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m4364750.exe4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe6⤵
- Executes dropped EXE
PID:3364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3364 -s 247⤵
- Program crash
PID:3384
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n5911491.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n5911491.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n5911491.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n5911491.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3180
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD5605f809fab8c19729d39d075f7ffdb53
SHA1c546f877c9bd53563174a90312a8337fdfc5fdd9
SHA2566904d540649e76c55f99530b81be17e099184bb4cad415aa9b9b39cc3677f556
SHA51282cc12c3186ae23884b8d5c104638c8206272c4389ade56b926dfc1d437b03888159b3c790b188b54d277a262e731927e703e680ea642e1417faee27443fd5b3
-
Filesize
903KB
MD5c9e3e50b089c589656f187e80fbf294b
SHA13ef2e127f5821fe7eff4028ca902c56047384ff9
SHA2562f1e2349509195f2bb19fb38ec8a68cddf590e3b7e7e56ec4dd27545da2c47d1
SHA51217750034e4b559d8f059ba44401575ad844284411d1ac554d6c5b6393638bcaf9c42691a6d4a9f2c6ed018a64ecf7d471efff2bb7348c2988b42d930a68a122d
-
Filesize
903KB
MD5c9e3e50b089c589656f187e80fbf294b
SHA13ef2e127f5821fe7eff4028ca902c56047384ff9
SHA2562f1e2349509195f2bb19fb38ec8a68cddf590e3b7e7e56ec4dd27545da2c47d1
SHA51217750034e4b559d8f059ba44401575ad844284411d1ac554d6c5b6393638bcaf9c42691a6d4a9f2c6ed018a64ecf7d471efff2bb7348c2988b42d930a68a122d
-
Filesize
903KB
MD5c9e3e50b089c589656f187e80fbf294b
SHA13ef2e127f5821fe7eff4028ca902c56047384ff9
SHA2562f1e2349509195f2bb19fb38ec8a68cddf590e3b7e7e56ec4dd27545da2c47d1
SHA51217750034e4b559d8f059ba44401575ad844284411d1ac554d6c5b6393638bcaf9c42691a6d4a9f2c6ed018a64ecf7d471efff2bb7348c2988b42d930a68a122d
-
Filesize
751KB
MD574359489ae03ff2a2dbb580f6c454d6e
SHA1691399491f382c3b9e4c8a6d4927b9123bc9a6c5
SHA2562be4598533ed884271f265b2cfb87b5bc42e24b4208a13d2c4ca9d749b303818
SHA5127fe9bfc9c02397bd54eb60bda57b29411304aa51556898b73069f507b1061a7c3dc41700b1634eeb04ae240dc26bc41b0218c8c399b934d94417399937a0377f
-
Filesize
751KB
MD574359489ae03ff2a2dbb580f6c454d6e
SHA1691399491f382c3b9e4c8a6d4927b9123bc9a6c5
SHA2562be4598533ed884271f265b2cfb87b5bc42e24b4208a13d2c4ca9d749b303818
SHA5127fe9bfc9c02397bd54eb60bda57b29411304aa51556898b73069f507b1061a7c3dc41700b1634eeb04ae240dc26bc41b0218c8c399b934d94417399937a0377f
-
Filesize
963KB
MD54b14c95936ec44ee6c86d70099f23381
SHA1e76f1c112cb918df71697a38184342dc15b7289f
SHA256a324c108478e1845d3337dd7da1cadce6b8f07e49c24acde1e1a1eec6de454e0
SHA5127fa6fa1250c32d5493ab2a82bc69fb54179378b52b3df7035147f474c2eb392fabb8acbf9cf66fff3a51493af7476bd0dc1fa425af61c1e66afb26813fbf1886
-
Filesize
963KB
MD54b14c95936ec44ee6c86d70099f23381
SHA1e76f1c112cb918df71697a38184342dc15b7289f
SHA256a324c108478e1845d3337dd7da1cadce6b8f07e49c24acde1e1a1eec6de454e0
SHA5127fa6fa1250c32d5493ab2a82bc69fb54179378b52b3df7035147f474c2eb392fabb8acbf9cf66fff3a51493af7476bd0dc1fa425af61c1e66afb26813fbf1886
-
Filesize
963KB
MD54b14c95936ec44ee6c86d70099f23381
SHA1e76f1c112cb918df71697a38184342dc15b7289f
SHA256a324c108478e1845d3337dd7da1cadce6b8f07e49c24acde1e1a1eec6de454e0
SHA5127fa6fa1250c32d5493ab2a82bc69fb54179378b52b3df7035147f474c2eb392fabb8acbf9cf66fff3a51493af7476bd0dc1fa425af61c1e66afb26813fbf1886
-
Filesize
306KB
MD5c5fdaee26ca2c5339fea95a0390658f8
SHA10894ad74d45d4d719ee1168e5fa318a81cb6f1c7
SHA256efb161d6468c2aedbd0da0c4b4c70d005d6202a641f13b4299d1b98c0b59b173
SHA5127e13d99c515549a37695bc329f4804492a2c7b5796e8c5917b5da7689429333ea57d2cbe3740460ddfb64c39df93c9dd924f5f81293a82a093e9562503d06e60
-
Filesize
306KB
MD5c5fdaee26ca2c5339fea95a0390658f8
SHA10894ad74d45d4d719ee1168e5fa318a81cb6f1c7
SHA256efb161d6468c2aedbd0da0c4b4c70d005d6202a641f13b4299d1b98c0b59b173
SHA5127e13d99c515549a37695bc329f4804492a2c7b5796e8c5917b5da7689429333ea57d2cbe3740460ddfb64c39df93c9dd924f5f81293a82a093e9562503d06e60
-
Filesize
184KB
MD51e14affc481850500b4bcbfea46a8a75
SHA16bddb1151b6bcf720ec8a680fc5de8e2d1c3343e
SHA2562ff09186fded9b17ede6480fb4929b283b86f87fa67fcd4d80fad896c4a2ea19
SHA51277d88a37f754d202a988f50945f931ac2e74a5226fcf6c987c9df0ec24640693e1de5d4caff4e88c7b1a1a45c2c19c22f51842fbb7c7959adbe868f6125d271b
-
Filesize
184KB
MD51e14affc481850500b4bcbfea46a8a75
SHA16bddb1151b6bcf720ec8a680fc5de8e2d1c3343e
SHA2562ff09186fded9b17ede6480fb4929b283b86f87fa67fcd4d80fad896c4a2ea19
SHA51277d88a37f754d202a988f50945f931ac2e74a5226fcf6c987c9df0ec24640693e1de5d4caff4e88c7b1a1a45c2c19c22f51842fbb7c7959adbe868f6125d271b
-
Filesize
145KB
MD5e408a6c4426af31cfdeb1563cbfe2746
SHA18b1e8a5a1bed1654669ad70e08ce1de78dd93a67
SHA2568ccaf8f87c5209100bbd0a709e3d8fbd4805763a78570db264e330cf65aaca75
SHA5123b6b3d634452523a8d0466a5c0de43e55c807fc4ae2b728a4f536f68387e2332218e770ad4e3e743f897ea890b914f82791129d1ab5145744bd3780b6df7e199
-
Filesize
145KB
MD5e408a6c4426af31cfdeb1563cbfe2746
SHA18b1e8a5a1bed1654669ad70e08ce1de78dd93a67
SHA2568ccaf8f87c5209100bbd0a709e3d8fbd4805763a78570db264e330cf65aaca75
SHA5123b6b3d634452523a8d0466a5c0de43e55c807fc4ae2b728a4f536f68387e2332218e770ad4e3e743f897ea890b914f82791129d1ab5145744bd3780b6df7e199
-
Filesize
963KB
MD54b14c95936ec44ee6c86d70099f23381
SHA1e76f1c112cb918df71697a38184342dc15b7289f
SHA256a324c108478e1845d3337dd7da1cadce6b8f07e49c24acde1e1a1eec6de454e0
SHA5127fa6fa1250c32d5493ab2a82bc69fb54179378b52b3df7035147f474c2eb392fabb8acbf9cf66fff3a51493af7476bd0dc1fa425af61c1e66afb26813fbf1886
-
Filesize
963KB
MD54b14c95936ec44ee6c86d70099f23381
SHA1e76f1c112cb918df71697a38184342dc15b7289f
SHA256a324c108478e1845d3337dd7da1cadce6b8f07e49c24acde1e1a1eec6de454e0
SHA5127fa6fa1250c32d5493ab2a82bc69fb54179378b52b3df7035147f474c2eb392fabb8acbf9cf66fff3a51493af7476bd0dc1fa425af61c1e66afb26813fbf1886
-
Filesize
963KB
MD54b14c95936ec44ee6c86d70099f23381
SHA1e76f1c112cb918df71697a38184342dc15b7289f
SHA256a324c108478e1845d3337dd7da1cadce6b8f07e49c24acde1e1a1eec6de454e0
SHA5127fa6fa1250c32d5493ab2a82bc69fb54179378b52b3df7035147f474c2eb392fabb8acbf9cf66fff3a51493af7476bd0dc1fa425af61c1e66afb26813fbf1886
-
Filesize
963KB
MD54b14c95936ec44ee6c86d70099f23381
SHA1e76f1c112cb918df71697a38184342dc15b7289f
SHA256a324c108478e1845d3337dd7da1cadce6b8f07e49c24acde1e1a1eec6de454e0
SHA5127fa6fa1250c32d5493ab2a82bc69fb54179378b52b3df7035147f474c2eb392fabb8acbf9cf66fff3a51493af7476bd0dc1fa425af61c1e66afb26813fbf1886