Analysis
-
max time kernel
78s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
21/05/2023, 18:17
Static task
static1
Behavioral task
behavioral1
Sample
cf9a4bef46815a52331b22793d008972bacf2592ba2ca1ca10d16240c72487b8.exe
Resource
win10v2004-20230221-en
General
-
Target
cf9a4bef46815a52331b22793d008972bacf2592ba2ca1ca10d16240c72487b8.exe
-
Size
1.0MB
-
MD5
b209a3dc47bb50eca411c17ec5d46262
-
SHA1
6e8e5107bd1725bed97f2347b8e63c6540ae739c
-
SHA256
cf9a4bef46815a52331b22793d008972bacf2592ba2ca1ca10d16240c72487b8
-
SHA512
a92048cf4c62532264a61b7080d75ec900cdebd9c0a242eb17b365f6b0ba2a5f512d6467e32d44bd927fe249a13cbe0bd0c0aeab22ec13c5add5cfa39f8a5e43
-
SSDEEP
24576:xyXkWWEnvPuq9TOm5vxVqsskTrZqBvDqaT1B2E:kXLn3uq9pvCsr9aT6
Malware Config
Extracted
redline
mixa
185.161.248.37:4138
-
auth_value
9d14534b25ac495ab25b59800acf3bb2
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a0341962.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a0341962.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a0341962.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a0341962.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a0341962.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a0341962.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 18 IoCs
resource yara_rule behavioral1/memory/696-221-0x0000000002440000-0x000000000247C000-memory.dmp family_redline behavioral1/memory/696-222-0x0000000002440000-0x000000000247C000-memory.dmp family_redline behavioral1/memory/696-224-0x0000000002440000-0x000000000247C000-memory.dmp family_redline behavioral1/memory/696-227-0x0000000002440000-0x000000000247C000-memory.dmp family_redline behavioral1/memory/696-230-0x0000000002440000-0x000000000247C000-memory.dmp family_redline behavioral1/memory/696-233-0x0000000002440000-0x000000000247C000-memory.dmp family_redline behavioral1/memory/696-235-0x0000000002440000-0x000000000247C000-memory.dmp family_redline behavioral1/memory/696-237-0x0000000002440000-0x000000000247C000-memory.dmp family_redline behavioral1/memory/696-239-0x0000000002440000-0x000000000247C000-memory.dmp family_redline behavioral1/memory/696-241-0x0000000002440000-0x000000000247C000-memory.dmp family_redline behavioral1/memory/696-243-0x0000000002440000-0x000000000247C000-memory.dmp family_redline behavioral1/memory/696-245-0x0000000002440000-0x000000000247C000-memory.dmp family_redline behavioral1/memory/696-247-0x0000000002440000-0x000000000247C000-memory.dmp family_redline behavioral1/memory/696-251-0x0000000002440000-0x000000000247C000-memory.dmp family_redline behavioral1/memory/696-253-0x0000000002440000-0x000000000247C000-memory.dmp family_redline behavioral1/memory/696-249-0x0000000002440000-0x000000000247C000-memory.dmp family_redline behavioral1/memory/696-255-0x0000000002440000-0x000000000247C000-memory.dmp family_redline behavioral1/memory/696-1153-0x00000000024A0000-0x00000000024B0000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation c6378178.exe -
Executes dropped EXE 9 IoCs
pid Process 4060 v0805761.exe 1384 v3096365.exe 3220 a0341962.exe 4688 b9102073.exe 4196 c6378178.exe 3876 c6378178.exe 696 d3365813.exe 3228 oneetx.exe 756 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a0341962.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a0341962.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cf9a4bef46815a52331b22793d008972bacf2592ba2ca1ca10d16240c72487b8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cf9a4bef46815a52331b22793d008972bacf2592ba2ca1ca10d16240c72487b8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v0805761.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v0805761.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3096365.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v3096365.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4196 set thread context of 3876 4196 c6378178.exe 91 PID 3228 set thread context of 756 3228 oneetx.exe 94 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1972 756 WerFault.exe 94 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3220 a0341962.exe 3220 a0341962.exe 4688 b9102073.exe 4688 b9102073.exe 696 d3365813.exe 696 d3365813.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3220 a0341962.exe Token: SeDebugPrivilege 4688 b9102073.exe Token: SeDebugPrivilege 4196 c6378178.exe Token: SeDebugPrivilege 696 d3365813.exe Token: SeDebugPrivilege 3228 oneetx.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3876 c6378178.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 756 oneetx.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 1968 wrote to memory of 4060 1968 cf9a4bef46815a52331b22793d008972bacf2592ba2ca1ca10d16240c72487b8.exe 83 PID 1968 wrote to memory of 4060 1968 cf9a4bef46815a52331b22793d008972bacf2592ba2ca1ca10d16240c72487b8.exe 83 PID 1968 wrote to memory of 4060 1968 cf9a4bef46815a52331b22793d008972bacf2592ba2ca1ca10d16240c72487b8.exe 83 PID 4060 wrote to memory of 1384 4060 v0805761.exe 84 PID 4060 wrote to memory of 1384 4060 v0805761.exe 84 PID 4060 wrote to memory of 1384 4060 v0805761.exe 84 PID 1384 wrote to memory of 3220 1384 v3096365.exe 85 PID 1384 wrote to memory of 3220 1384 v3096365.exe 85 PID 1384 wrote to memory of 3220 1384 v3096365.exe 85 PID 1384 wrote to memory of 4688 1384 v3096365.exe 88 PID 1384 wrote to memory of 4688 1384 v3096365.exe 88 PID 1384 wrote to memory of 4688 1384 v3096365.exe 88 PID 4060 wrote to memory of 4196 4060 v0805761.exe 89 PID 4060 wrote to memory of 4196 4060 v0805761.exe 89 PID 4060 wrote to memory of 4196 4060 v0805761.exe 89 PID 4196 wrote to memory of 3876 4196 c6378178.exe 91 PID 4196 wrote to memory of 3876 4196 c6378178.exe 91 PID 4196 wrote to memory of 3876 4196 c6378178.exe 91 PID 4196 wrote to memory of 3876 4196 c6378178.exe 91 PID 4196 wrote to memory of 3876 4196 c6378178.exe 91 PID 4196 wrote to memory of 3876 4196 c6378178.exe 91 PID 4196 wrote to memory of 3876 4196 c6378178.exe 91 PID 4196 wrote to memory of 3876 4196 c6378178.exe 91 PID 4196 wrote to memory of 3876 4196 c6378178.exe 91 PID 4196 wrote to memory of 3876 4196 c6378178.exe 91 PID 1968 wrote to memory of 696 1968 cf9a4bef46815a52331b22793d008972bacf2592ba2ca1ca10d16240c72487b8.exe 92 PID 1968 wrote to memory of 696 1968 cf9a4bef46815a52331b22793d008972bacf2592ba2ca1ca10d16240c72487b8.exe 92 PID 1968 wrote to memory of 696 1968 cf9a4bef46815a52331b22793d008972bacf2592ba2ca1ca10d16240c72487b8.exe 92 PID 3876 wrote to memory of 3228 3876 c6378178.exe 93 PID 3876 wrote to memory of 3228 3876 c6378178.exe 93 PID 3876 wrote to memory of 3228 3876 c6378178.exe 93 PID 3228 wrote to memory of 756 3228 oneetx.exe 94 PID 3228 wrote to memory of 756 3228 oneetx.exe 94 PID 3228 wrote to memory of 756 3228 oneetx.exe 94 PID 3228 wrote to memory of 756 3228 oneetx.exe 94 PID 3228 wrote to memory of 756 3228 oneetx.exe 94 PID 3228 wrote to memory of 756 3228 oneetx.exe 94 PID 3228 wrote to memory of 756 3228 oneetx.exe 94 PID 3228 wrote to memory of 756 3228 oneetx.exe 94 PID 3228 wrote to memory of 756 3228 oneetx.exe 94 PID 3228 wrote to memory of 756 3228 oneetx.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf9a4bef46815a52331b22793d008972bacf2592ba2ca1ca10d16240c72487b8.exe"C:\Users\Admin\AppData\Local\Temp\cf9a4bef46815a52331b22793d008972bacf2592ba2ca1ca10d16240c72487b8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0805761.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0805761.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3096365.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3096365.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0341962.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0341962.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3220
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9102073.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9102073.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4688
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6378178.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6378178.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6378178.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6378178.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe6⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 756 -s 127⤵
- Program crash
PID:1972
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3365813.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3365813.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 756 -ip 7561⤵PID:2404
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
285KB
MD5b2d6493cea5d9d10727f2fcb22c67764
SHA10e99146b4abd4b8702110790842f4aa9145786bd
SHA256f3742a7a3309d9dc7ebe7e5d57bd84fdf69f7b935e50268120fcf08687e988de
SHA5121e60fb6df320c852eb9ca2c1114dbdd1762fb70c559b772e82fe45df0114a4ef7ba3fe081af49a45ec2838dd64c1dd314f4ab90923ed23cd48f482c1d6f2b414
-
Filesize
285KB
MD5b2d6493cea5d9d10727f2fcb22c67764
SHA10e99146b4abd4b8702110790842f4aa9145786bd
SHA256f3742a7a3309d9dc7ebe7e5d57bd84fdf69f7b935e50268120fcf08687e988de
SHA5121e60fb6df320c852eb9ca2c1114dbdd1762fb70c559b772e82fe45df0114a4ef7ba3fe081af49a45ec2838dd64c1dd314f4ab90923ed23cd48f482c1d6f2b414
-
Filesize
751KB
MD5e64d4dea147302ce77a4eb01fec279a2
SHA1a08e938a7ebc6256f98176b8c662ded30fe31841
SHA2564abbb4fd1ae5666a2da88a17700f3a66d4197e051ce033ea31c6ec769a15e1bb
SHA5120175b75ed848a7ccac7eca3d4abada032cb8a3a72294489d6ec90999b6e526d87371a54775e5b7c9c8ee856961da3993d44d0b1e5a3fdc54f4c4cce17bce11f6
-
Filesize
751KB
MD5e64d4dea147302ce77a4eb01fec279a2
SHA1a08e938a7ebc6256f98176b8c662ded30fe31841
SHA2564abbb4fd1ae5666a2da88a17700f3a66d4197e051ce033ea31c6ec769a15e1bb
SHA5120175b75ed848a7ccac7eca3d4abada032cb8a3a72294489d6ec90999b6e526d87371a54775e5b7c9c8ee856961da3993d44d0b1e5a3fdc54f4c4cce17bce11f6
-
Filesize
965KB
MD5ec75c45379ba01d32eca0675d030f9b6
SHA1b5370ede7834975f181ebc86699289427b869150
SHA256b6a86ca4fb6db830bc35ed6af2adc781852076b166a4a25ce046568634d6637f
SHA51227ff5f99c95950336ef8e22ae9c5647a87baa9976559f323d0d1b915ad160a31427af89dc16a31dd37a1f820b7d2540b19e51bea5dabacc2deebf50e319b303c
-
Filesize
965KB
MD5ec75c45379ba01d32eca0675d030f9b6
SHA1b5370ede7834975f181ebc86699289427b869150
SHA256b6a86ca4fb6db830bc35ed6af2adc781852076b166a4a25ce046568634d6637f
SHA51227ff5f99c95950336ef8e22ae9c5647a87baa9976559f323d0d1b915ad160a31427af89dc16a31dd37a1f820b7d2540b19e51bea5dabacc2deebf50e319b303c
-
Filesize
965KB
MD5ec75c45379ba01d32eca0675d030f9b6
SHA1b5370ede7834975f181ebc86699289427b869150
SHA256b6a86ca4fb6db830bc35ed6af2adc781852076b166a4a25ce046568634d6637f
SHA51227ff5f99c95950336ef8e22ae9c5647a87baa9976559f323d0d1b915ad160a31427af89dc16a31dd37a1f820b7d2540b19e51bea5dabacc2deebf50e319b303c
-
Filesize
306KB
MD5ee83bc3647f2f0754d96807582e61b84
SHA1e3ed63f3fe82783bc05a8cd63e4bd4df56ab0f06
SHA256f46e9cbabc2e569622dd27853906edde1a0b5e1352e9fb2457ae88318ebf00e2
SHA5129ffbf5f3590bd1fe315d0e3f95f1d5e82e9f0cafdafcc1cb2267a363f94d1085a4191daf5a396f27de532e4763734f8cfddb32dc10f25b9b987f87814ab4c4bc
-
Filesize
306KB
MD5ee83bc3647f2f0754d96807582e61b84
SHA1e3ed63f3fe82783bc05a8cd63e4bd4df56ab0f06
SHA256f46e9cbabc2e569622dd27853906edde1a0b5e1352e9fb2457ae88318ebf00e2
SHA5129ffbf5f3590bd1fe315d0e3f95f1d5e82e9f0cafdafcc1cb2267a363f94d1085a4191daf5a396f27de532e4763734f8cfddb32dc10f25b9b987f87814ab4c4bc
-
Filesize
185KB
MD5a99a4c2ccec1cd1fdb7a8fbc1c079e3f
SHA11fcbf07d3136784525db8c279787c52690da74a0
SHA256934f2f12545ebdbb6fca5bb549000f057f97b03211321b56217b9e2d32e67035
SHA51237e72f7bc12fbb3a22076cc51e81a3f95e3767081b4cfc25b86e95be3fc805d3de078772c61ccbb7b3266f551c3036a544060c5698976fb5d346f1502b8ecfa8
-
Filesize
185KB
MD5a99a4c2ccec1cd1fdb7a8fbc1c079e3f
SHA11fcbf07d3136784525db8c279787c52690da74a0
SHA256934f2f12545ebdbb6fca5bb549000f057f97b03211321b56217b9e2d32e67035
SHA51237e72f7bc12fbb3a22076cc51e81a3f95e3767081b4cfc25b86e95be3fc805d3de078772c61ccbb7b3266f551c3036a544060c5698976fb5d346f1502b8ecfa8
-
Filesize
145KB
MD5519c5092c8e96e6a53b79fd832e49cf0
SHA1a0eb92d60ebda7140e88b16377d637fffd5497b0
SHA256dd0056fcff7f7effc05b48c3f5d8026ba5031c4dbc54d77b5fe7c3867c36b077
SHA5121e93775ee50f1ca7f746626cbde467ca6e7e6a33fb36ba0ebf5749db3913d1267019a303bebc21dd3eb5f8cd61095ac35bfeb3d8de36b903e9d7d4d894328842
-
Filesize
145KB
MD5519c5092c8e96e6a53b79fd832e49cf0
SHA1a0eb92d60ebda7140e88b16377d637fffd5497b0
SHA256dd0056fcff7f7effc05b48c3f5d8026ba5031c4dbc54d77b5fe7c3867c36b077
SHA5121e93775ee50f1ca7f746626cbde467ca6e7e6a33fb36ba0ebf5749db3913d1267019a303bebc21dd3eb5f8cd61095ac35bfeb3d8de36b903e9d7d4d894328842
-
Filesize
965KB
MD5ec75c45379ba01d32eca0675d030f9b6
SHA1b5370ede7834975f181ebc86699289427b869150
SHA256b6a86ca4fb6db830bc35ed6af2adc781852076b166a4a25ce046568634d6637f
SHA51227ff5f99c95950336ef8e22ae9c5647a87baa9976559f323d0d1b915ad160a31427af89dc16a31dd37a1f820b7d2540b19e51bea5dabacc2deebf50e319b303c
-
Filesize
965KB
MD5ec75c45379ba01d32eca0675d030f9b6
SHA1b5370ede7834975f181ebc86699289427b869150
SHA256b6a86ca4fb6db830bc35ed6af2adc781852076b166a4a25ce046568634d6637f
SHA51227ff5f99c95950336ef8e22ae9c5647a87baa9976559f323d0d1b915ad160a31427af89dc16a31dd37a1f820b7d2540b19e51bea5dabacc2deebf50e319b303c
-
Filesize
965KB
MD5ec75c45379ba01d32eca0675d030f9b6
SHA1b5370ede7834975f181ebc86699289427b869150
SHA256b6a86ca4fb6db830bc35ed6af2adc781852076b166a4a25ce046568634d6637f
SHA51227ff5f99c95950336ef8e22ae9c5647a87baa9976559f323d0d1b915ad160a31427af89dc16a31dd37a1f820b7d2540b19e51bea5dabacc2deebf50e319b303c
-
Filesize
965KB
MD5ec75c45379ba01d32eca0675d030f9b6
SHA1b5370ede7834975f181ebc86699289427b869150
SHA256b6a86ca4fb6db830bc35ed6af2adc781852076b166a4a25ce046568634d6637f
SHA51227ff5f99c95950336ef8e22ae9c5647a87baa9976559f323d0d1b915ad160a31427af89dc16a31dd37a1f820b7d2540b19e51bea5dabacc2deebf50e319b303c