Analysis
-
max time kernel
117s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2023 12:00
Static task
static1
Behavioral task
behavioral1
Sample
config.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
config.exe
Resource
win10v2004-20230220-en
General
-
Target
config.exe
-
Size
1.0MB
-
MD5
a296236b4cae082d5d35f0f725e42681
-
SHA1
922ef0ea11ac7a7a4d22fee04207ff0793ab65f5
-
SHA256
a5f3b7b70470ed75e8bdcc9f2db015f4de4784352e53d7259aaeb0cbfc25af1b
-
SHA512
e79422fdf250165a4ab3adeb268ed58cd3ae33b20ea4debf4b8c24e21e2cf21f322934e8373cf85f48254a9a3f6fc19a905fccb52da9e3c90f60458ef23b0532
-
SSDEEP
24576:DyajQcJVGdY9PxNkjbu107S8yfTmzVQhLhu22ejPZlWy:WajQc7nNkjbg07S8yrmzYjPZ
Malware Config
Extracted
redline
muser
77.91.68.253:19065
-
auth_value
ab307a8e027ba1296455e3d548f168a3
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a8841520.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8841520.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8841520.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8841520.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8841520.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8841520.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 17 IoCs
resource yara_rule behavioral2/memory/1800-218-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral2/memory/1800-219-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral2/memory/1800-221-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral2/memory/1800-223-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral2/memory/1800-225-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral2/memory/1800-227-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral2/memory/1800-229-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral2/memory/1800-231-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral2/memory/1800-233-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral2/memory/1800-235-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral2/memory/1800-237-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral2/memory/1800-239-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral2/memory/1800-243-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral2/memory/1800-246-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral2/memory/1800-249-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral2/memory/1800-257-0x0000000002530000-0x000000000256C000-memory.dmp family_redline behavioral2/memory/1800-259-0x0000000002530000-0x000000000256C000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation c2058391.exe -
Executes dropped EXE 9 IoCs
pid Process 2544 v7546165.exe 4592 v7346798.exe 3848 a8841520.exe 4612 b1397787.exe 4728 c2058391.exe 3764 c2058391.exe 1800 d3628710.exe 544 oneetx.exe 2244 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a8841520.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a8841520.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce config.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" config.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7546165.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7546165.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7346798.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v7346798.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4728 set thread context of 3764 4728 c2058391.exe 90 PID 544 set thread context of 2244 544 oneetx.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1376 2244 WerFault.exe 93 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3848 a8841520.exe 3848 a8841520.exe 4612 b1397787.exe 4612 b1397787.exe 1800 d3628710.exe 1800 d3628710.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3848 a8841520.exe Token: SeDebugPrivilege 4612 b1397787.exe Token: SeDebugPrivilege 4728 c2058391.exe Token: SeDebugPrivilege 1800 d3628710.exe Token: SeDebugPrivilege 544 oneetx.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3764 c2058391.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2244 oneetx.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 4476 wrote to memory of 2544 4476 config.exe 85 PID 4476 wrote to memory of 2544 4476 config.exe 85 PID 4476 wrote to memory of 2544 4476 config.exe 85 PID 2544 wrote to memory of 4592 2544 v7546165.exe 86 PID 2544 wrote to memory of 4592 2544 v7546165.exe 86 PID 2544 wrote to memory of 4592 2544 v7546165.exe 86 PID 4592 wrote to memory of 3848 4592 v7346798.exe 87 PID 4592 wrote to memory of 3848 4592 v7346798.exe 87 PID 4592 wrote to memory of 3848 4592 v7346798.exe 87 PID 4592 wrote to memory of 4612 4592 v7346798.exe 88 PID 4592 wrote to memory of 4612 4592 v7346798.exe 88 PID 4592 wrote to memory of 4612 4592 v7346798.exe 88 PID 2544 wrote to memory of 4728 2544 v7546165.exe 89 PID 2544 wrote to memory of 4728 2544 v7546165.exe 89 PID 2544 wrote to memory of 4728 2544 v7546165.exe 89 PID 4728 wrote to memory of 3764 4728 c2058391.exe 90 PID 4728 wrote to memory of 3764 4728 c2058391.exe 90 PID 4728 wrote to memory of 3764 4728 c2058391.exe 90 PID 4728 wrote to memory of 3764 4728 c2058391.exe 90 PID 4728 wrote to memory of 3764 4728 c2058391.exe 90 PID 4728 wrote to memory of 3764 4728 c2058391.exe 90 PID 4728 wrote to memory of 3764 4728 c2058391.exe 90 PID 4728 wrote to memory of 3764 4728 c2058391.exe 90 PID 4728 wrote to memory of 3764 4728 c2058391.exe 90 PID 4728 wrote to memory of 3764 4728 c2058391.exe 90 PID 4476 wrote to memory of 1800 4476 config.exe 91 PID 4476 wrote to memory of 1800 4476 config.exe 91 PID 4476 wrote to memory of 1800 4476 config.exe 91 PID 3764 wrote to memory of 544 3764 c2058391.exe 92 PID 3764 wrote to memory of 544 3764 c2058391.exe 92 PID 3764 wrote to memory of 544 3764 c2058391.exe 92 PID 544 wrote to memory of 2244 544 oneetx.exe 93 PID 544 wrote to memory of 2244 544 oneetx.exe 93 PID 544 wrote to memory of 2244 544 oneetx.exe 93 PID 544 wrote to memory of 2244 544 oneetx.exe 93 PID 544 wrote to memory of 2244 544 oneetx.exe 93 PID 544 wrote to memory of 2244 544 oneetx.exe 93 PID 544 wrote to memory of 2244 544 oneetx.exe 93 PID 544 wrote to memory of 2244 544 oneetx.exe 93 PID 544 wrote to memory of 2244 544 oneetx.exe 93 PID 544 wrote to memory of 2244 544 oneetx.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\config.exe"C:\Users\Admin\AppData\Local\Temp\config.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7546165.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7546165.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7346798.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7346798.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8841520.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8841520.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3848
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1397787.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1397787.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4612
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2058391.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2058391.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2058391.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2058391.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe6⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:2244 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2244 -s 127⤵
- Program crash
PID:1376
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3628710.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3628710.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1800
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2244 -ip 22441⤵PID:692
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD5acb51e65b346e19724fc4d0af17f54f1
SHA118af3b918f7f55779f539f2962573ad07773aa39
SHA256a85414ef5d2268271d75bca0b5b892fb4fd01c95e804b776c885eafb989ec6af
SHA512730ffe3d558d03bc62ceacd6e5e59bd58988377280b54b36d5690710c63f4a93c9da2f40cc089739213ee2a7f99e61435e0ce194be28898a2954b5c18a89140c
-
Filesize
284KB
MD5acb51e65b346e19724fc4d0af17f54f1
SHA118af3b918f7f55779f539f2962573ad07773aa39
SHA256a85414ef5d2268271d75bca0b5b892fb4fd01c95e804b776c885eafb989ec6af
SHA512730ffe3d558d03bc62ceacd6e5e59bd58988377280b54b36d5690710c63f4a93c9da2f40cc089739213ee2a7f99e61435e0ce194be28898a2954b5c18a89140c
-
Filesize
751KB
MD52bcd0d85f092baadd3aa8df9fb89a58d
SHA129eac4c2fd71cf43f7631508006ff5afe318d4c8
SHA256f636f45996087105f51e749141d2f13707106bb435ef2f5220651a2e5178e05f
SHA512ebee1472ff0cd6fdb1f59a1e87b2393f42493ca3b1ae88007201872f4334c6f32e97133e7a2591840cb017a8a776cd68e40163721d2161d83604aced11936502
-
Filesize
751KB
MD52bcd0d85f092baadd3aa8df9fb89a58d
SHA129eac4c2fd71cf43f7631508006ff5afe318d4c8
SHA256f636f45996087105f51e749141d2f13707106bb435ef2f5220651a2e5178e05f
SHA512ebee1472ff0cd6fdb1f59a1e87b2393f42493ca3b1ae88007201872f4334c6f32e97133e7a2591840cb017a8a776cd68e40163721d2161d83604aced11936502
-
Filesize
963KB
MD5181b014ec7e875429203a2f8a5a15d0c
SHA10106677318e2bd9e1d1ba50abbbf288346a3eee6
SHA25651e5520f9b6317221e6069757239b4d8155066ec80e2d7aa10e4f52e23b0eefa
SHA512201a4a4d7786fb5e00ef581bd9cf73d34e1ed87942225efdb9ef7935f9d06acc41a07dc215d52cf14fbc8f49407cf0ceba07e3410a92888e2737d5edb6acbbce
-
Filesize
963KB
MD5181b014ec7e875429203a2f8a5a15d0c
SHA10106677318e2bd9e1d1ba50abbbf288346a3eee6
SHA25651e5520f9b6317221e6069757239b4d8155066ec80e2d7aa10e4f52e23b0eefa
SHA512201a4a4d7786fb5e00ef581bd9cf73d34e1ed87942225efdb9ef7935f9d06acc41a07dc215d52cf14fbc8f49407cf0ceba07e3410a92888e2737d5edb6acbbce
-
Filesize
963KB
MD5181b014ec7e875429203a2f8a5a15d0c
SHA10106677318e2bd9e1d1ba50abbbf288346a3eee6
SHA25651e5520f9b6317221e6069757239b4d8155066ec80e2d7aa10e4f52e23b0eefa
SHA512201a4a4d7786fb5e00ef581bd9cf73d34e1ed87942225efdb9ef7935f9d06acc41a07dc215d52cf14fbc8f49407cf0ceba07e3410a92888e2737d5edb6acbbce
-
Filesize
305KB
MD5538e54016d31e297a8a23c4435f81732
SHA132c8940dcac8eabd98f4a8f798a3539c3f9f5b39
SHA256576a7010dc0f7e5fcf637367fc41cc7ce804cbea8a874788ee4060dc84747b5b
SHA512893bf9af4bb11dd758e395c8397cb9ac076ce5dea17f24f146e30963b4babb81f6710b4e55b21533d27178511a09447958c921399eb0ee5f0e9cf766ae858a6c
-
Filesize
305KB
MD5538e54016d31e297a8a23c4435f81732
SHA132c8940dcac8eabd98f4a8f798a3539c3f9f5b39
SHA256576a7010dc0f7e5fcf637367fc41cc7ce804cbea8a874788ee4060dc84747b5b
SHA512893bf9af4bb11dd758e395c8397cb9ac076ce5dea17f24f146e30963b4babb81f6710b4e55b21533d27178511a09447958c921399eb0ee5f0e9cf766ae858a6c
-
Filesize
184KB
MD5175c8c242008747ad34c60865a286925
SHA13d6c0cbbd1632a134f59c101c69eb2c3bbbac47a
SHA25687bacb6f81f713798e445678ec34add3c69cb41b5a9674928beec32643c8d1be
SHA512cfce928eba7397595fe472e010574f72d6217fee6096181fe9727bf4f1b4ed96e918993e73d93073a818a8ebeac9d80c5fe997686abbc7f2b8a7cf5581b9e764
-
Filesize
184KB
MD5175c8c242008747ad34c60865a286925
SHA13d6c0cbbd1632a134f59c101c69eb2c3bbbac47a
SHA25687bacb6f81f713798e445678ec34add3c69cb41b5a9674928beec32643c8d1be
SHA512cfce928eba7397595fe472e010574f72d6217fee6096181fe9727bf4f1b4ed96e918993e73d93073a818a8ebeac9d80c5fe997686abbc7f2b8a7cf5581b9e764
-
Filesize
145KB
MD54488293ba13c90fe81a09ad98f05d575
SHA14e01cd6c385ebd31dd554639bd4fab73f97d570e
SHA25632ba2a81480f904d40711b7dfb470ec75afac9966fe5a9f64a9f7edaaac76e8d
SHA512790753e4ed69508a5e6b588fa51e58dccb7a137e5b270d65c959f63b104098cef37f5f354b4bd5787868b5fb242358fed04455123845e57bb8e4fba54975d80d
-
Filesize
145KB
MD54488293ba13c90fe81a09ad98f05d575
SHA14e01cd6c385ebd31dd554639bd4fab73f97d570e
SHA25632ba2a81480f904d40711b7dfb470ec75afac9966fe5a9f64a9f7edaaac76e8d
SHA512790753e4ed69508a5e6b588fa51e58dccb7a137e5b270d65c959f63b104098cef37f5f354b4bd5787868b5fb242358fed04455123845e57bb8e4fba54975d80d
-
Filesize
963KB
MD5181b014ec7e875429203a2f8a5a15d0c
SHA10106677318e2bd9e1d1ba50abbbf288346a3eee6
SHA25651e5520f9b6317221e6069757239b4d8155066ec80e2d7aa10e4f52e23b0eefa
SHA512201a4a4d7786fb5e00ef581bd9cf73d34e1ed87942225efdb9ef7935f9d06acc41a07dc215d52cf14fbc8f49407cf0ceba07e3410a92888e2737d5edb6acbbce
-
Filesize
963KB
MD5181b014ec7e875429203a2f8a5a15d0c
SHA10106677318e2bd9e1d1ba50abbbf288346a3eee6
SHA25651e5520f9b6317221e6069757239b4d8155066ec80e2d7aa10e4f52e23b0eefa
SHA512201a4a4d7786fb5e00ef581bd9cf73d34e1ed87942225efdb9ef7935f9d06acc41a07dc215d52cf14fbc8f49407cf0ceba07e3410a92888e2737d5edb6acbbce
-
Filesize
963KB
MD5181b014ec7e875429203a2f8a5a15d0c
SHA10106677318e2bd9e1d1ba50abbbf288346a3eee6
SHA25651e5520f9b6317221e6069757239b4d8155066ec80e2d7aa10e4f52e23b0eefa
SHA512201a4a4d7786fb5e00ef581bd9cf73d34e1ed87942225efdb9ef7935f9d06acc41a07dc215d52cf14fbc8f49407cf0ceba07e3410a92888e2737d5edb6acbbce
-
Filesize
963KB
MD5181b014ec7e875429203a2f8a5a15d0c
SHA10106677318e2bd9e1d1ba50abbbf288346a3eee6
SHA25651e5520f9b6317221e6069757239b4d8155066ec80e2d7aa10e4f52e23b0eefa
SHA512201a4a4d7786fb5e00ef581bd9cf73d34e1ed87942225efdb9ef7935f9d06acc41a07dc215d52cf14fbc8f49407cf0ceba07e3410a92888e2737d5edb6acbbce