Analysis
-
max time kernel
117s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2023, 17:56
Static task
static1
Behavioral task
behavioral1
Sample
e9975e4cb5d9e14d9214519081ac42ed.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e9975e4cb5d9e14d9214519081ac42ed.exe
Resource
win10v2004-20230220-en
General
-
Target
e9975e4cb5d9e14d9214519081ac42ed.exe
-
Size
1.0MB
-
MD5
e9975e4cb5d9e14d9214519081ac42ed
-
SHA1
965697a244c959e39b99b782af20a543b4c3ee2d
-
SHA256
26d54d9d2c8d2cb62e461f7371862c48b44c63cb03f4b5471df274514acbbc8b
-
SHA512
8e91c85b89f6c54a87fe74afd30408abe59ff59c00172805c0e99b7aeb7b5f5334463e71ba81b925ec9da2012cc868dade2f3b2a00c9c26c4d037523f2cc3622
-
SSDEEP
24576:oypw69GHGNrvHfgWpbEp29Kdc6D1c9fTG43R5:vpZGHo0rf12X3R
Malware Config
Extracted
redline
maxi
83.97.73.122:19062
-
auth_value
6a3f22e5f4209b056a3fd330dc71956a
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a1260449.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a1260449.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a1260449.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a1260449.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a1260449.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a1260449.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 17 IoCs
resource yara_rule behavioral2/memory/1520-221-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline behavioral2/memory/1520-222-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline behavioral2/memory/1520-224-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline behavioral2/memory/1520-226-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline behavioral2/memory/1520-228-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline behavioral2/memory/1520-230-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline behavioral2/memory/1520-232-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline behavioral2/memory/1520-234-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline behavioral2/memory/1520-236-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline behavioral2/memory/1520-238-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline behavioral2/memory/1520-240-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline behavioral2/memory/1520-242-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline behavioral2/memory/1520-244-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline behavioral2/memory/1520-246-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline behavioral2/memory/1520-248-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline behavioral2/memory/1520-250-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline behavioral2/memory/1520-252-0x00000000049B0000-0x00000000049EC000-memory.dmp family_redline -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation c3416086.exe -
Executes dropped EXE 9 IoCs
pid Process 4332 v1955262.exe 1256 v8720080.exe 4520 a1260449.exe 1292 b5013979.exe 1152 c3416086.exe 5036 c3416086.exe 1520 d2475992.exe 3472 oneetx.exe 5040 oneetx.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a1260449.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a1260449.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1955262.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v1955262.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v8720080.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v8720080.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e9975e4cb5d9e14d9214519081ac42ed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e9975e4cb5d9e14d9214519081ac42ed.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1152 set thread context of 5036 1152 c3416086.exe 87 PID 3472 set thread context of 5040 3472 oneetx.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1908 5040 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4520 a1260449.exe 4520 a1260449.exe 1292 b5013979.exe 1292 b5013979.exe 1520 d2475992.exe 1520 d2475992.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4520 a1260449.exe Token: SeDebugPrivilege 1292 b5013979.exe Token: SeDebugPrivilege 1152 c3416086.exe Token: SeDebugPrivilege 1520 d2475992.exe Token: SeDebugPrivilege 3472 oneetx.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5036 c3416086.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 5040 oneetx.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 4660 wrote to memory of 4332 4660 e9975e4cb5d9e14d9214519081ac42ed.exe 82 PID 4660 wrote to memory of 4332 4660 e9975e4cb5d9e14d9214519081ac42ed.exe 82 PID 4660 wrote to memory of 4332 4660 e9975e4cb5d9e14d9214519081ac42ed.exe 82 PID 4332 wrote to memory of 1256 4332 v1955262.exe 83 PID 4332 wrote to memory of 1256 4332 v1955262.exe 83 PID 4332 wrote to memory of 1256 4332 v1955262.exe 83 PID 1256 wrote to memory of 4520 1256 v8720080.exe 84 PID 1256 wrote to memory of 4520 1256 v8720080.exe 84 PID 1256 wrote to memory of 4520 1256 v8720080.exe 84 PID 1256 wrote to memory of 1292 1256 v8720080.exe 85 PID 1256 wrote to memory of 1292 1256 v8720080.exe 85 PID 1256 wrote to memory of 1292 1256 v8720080.exe 85 PID 4332 wrote to memory of 1152 4332 v1955262.exe 86 PID 4332 wrote to memory of 1152 4332 v1955262.exe 86 PID 4332 wrote to memory of 1152 4332 v1955262.exe 86 PID 1152 wrote to memory of 5036 1152 c3416086.exe 87 PID 1152 wrote to memory of 5036 1152 c3416086.exe 87 PID 1152 wrote to memory of 5036 1152 c3416086.exe 87 PID 1152 wrote to memory of 5036 1152 c3416086.exe 87 PID 1152 wrote to memory of 5036 1152 c3416086.exe 87 PID 1152 wrote to memory of 5036 1152 c3416086.exe 87 PID 1152 wrote to memory of 5036 1152 c3416086.exe 87 PID 1152 wrote to memory of 5036 1152 c3416086.exe 87 PID 1152 wrote to memory of 5036 1152 c3416086.exe 87 PID 1152 wrote to memory of 5036 1152 c3416086.exe 87 PID 4660 wrote to memory of 1520 4660 e9975e4cb5d9e14d9214519081ac42ed.exe 88 PID 4660 wrote to memory of 1520 4660 e9975e4cb5d9e14d9214519081ac42ed.exe 88 PID 4660 wrote to memory of 1520 4660 e9975e4cb5d9e14d9214519081ac42ed.exe 88 PID 5036 wrote to memory of 3472 5036 c3416086.exe 90 PID 5036 wrote to memory of 3472 5036 c3416086.exe 90 PID 5036 wrote to memory of 3472 5036 c3416086.exe 90 PID 3472 wrote to memory of 5040 3472 oneetx.exe 91 PID 3472 wrote to memory of 5040 3472 oneetx.exe 91 PID 3472 wrote to memory of 5040 3472 oneetx.exe 91 PID 3472 wrote to memory of 5040 3472 oneetx.exe 91 PID 3472 wrote to memory of 5040 3472 oneetx.exe 91 PID 3472 wrote to memory of 5040 3472 oneetx.exe 91 PID 3472 wrote to memory of 5040 3472 oneetx.exe 91 PID 3472 wrote to memory of 5040 3472 oneetx.exe 91 PID 3472 wrote to memory of 5040 3472 oneetx.exe 91 PID 3472 wrote to memory of 5040 3472 oneetx.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9975e4cb5d9e14d9214519081ac42ed.exe"C:\Users\Admin\AppData\Local\Temp\e9975e4cb5d9e14d9214519081ac42ed.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1955262.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1955262.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8720080.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8720080.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1260449.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1260449.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4520
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5013979.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5013979.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1292
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3416086.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3416086.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3416086.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3416086.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exeC:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe6⤵
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:5040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 127⤵
- Program crash
PID:1908
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2475992.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2475992.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1520
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 5040 -ip 50401⤵PID:4772
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD593f1b25e4391d28f44d57c3a19dc704b
SHA14103e569272d243d43c4f8cc1b79db23caf23e0e
SHA2569719567b2fd666b2d91ccdbbc3577ff80240b3ddbe45df53652b597b1597d5fa
SHA512ac2b7b00d87fafcc8dbc29a91720689a8f879233872e4c233a9309ebc810e06185d6515f530254ae28376299c8fb794a7a8f54d5e3260cbef7d7cb44fb4d1e28
-
Filesize
284KB
MD593f1b25e4391d28f44d57c3a19dc704b
SHA14103e569272d243d43c4f8cc1b79db23caf23e0e
SHA2569719567b2fd666b2d91ccdbbc3577ff80240b3ddbe45df53652b597b1597d5fa
SHA512ac2b7b00d87fafcc8dbc29a91720689a8f879233872e4c233a9309ebc810e06185d6515f530254ae28376299c8fb794a7a8f54d5e3260cbef7d7cb44fb4d1e28
-
Filesize
749KB
MD56f4661608dbac52cc88eac5e74e60127
SHA13644e81a2dd1a8d54cf5cf4719725f6a4aad1f2d
SHA25613225950cdf0bd45f5e49f72dbbf1fd701fcebe1e50d6a5f78c9cb89db8dc1f8
SHA512824da1781bb3807f18ccc2194c9176e4e8fdc32b104550e0228a4f31a71312e915d83dace34a9ff70b7f3b68e3e9542f4df3ae00f44108f041d35d3d917de8ab
-
Filesize
749KB
MD56f4661608dbac52cc88eac5e74e60127
SHA13644e81a2dd1a8d54cf5cf4719725f6a4aad1f2d
SHA25613225950cdf0bd45f5e49f72dbbf1fd701fcebe1e50d6a5f78c9cb89db8dc1f8
SHA512824da1781bb3807f18ccc2194c9176e4e8fdc32b104550e0228a4f31a71312e915d83dace34a9ff70b7f3b68e3e9542f4df3ae00f44108f041d35d3d917de8ab
-
Filesize
967KB
MD539e0140486f305224de7b5a7f9add146
SHA103309f5df6ebebcf8ed000049217cc834f4ffd96
SHA256893202421d52a60398c41387f9bd013e89dc8798bf0c317735c8ea73270d85a2
SHA5125f4acf53e6f7dac5ba87440c4f53d4a8368594834c3b76f962970cd8cde171d3d8a374f2b31c7a3c6f22306f09769586649a1dafce17b5378b2e28ad5dc0e312
-
Filesize
967KB
MD539e0140486f305224de7b5a7f9add146
SHA103309f5df6ebebcf8ed000049217cc834f4ffd96
SHA256893202421d52a60398c41387f9bd013e89dc8798bf0c317735c8ea73270d85a2
SHA5125f4acf53e6f7dac5ba87440c4f53d4a8368594834c3b76f962970cd8cde171d3d8a374f2b31c7a3c6f22306f09769586649a1dafce17b5378b2e28ad5dc0e312
-
Filesize
967KB
MD539e0140486f305224de7b5a7f9add146
SHA103309f5df6ebebcf8ed000049217cc834f4ffd96
SHA256893202421d52a60398c41387f9bd013e89dc8798bf0c317735c8ea73270d85a2
SHA5125f4acf53e6f7dac5ba87440c4f53d4a8368594834c3b76f962970cd8cde171d3d8a374f2b31c7a3c6f22306f09769586649a1dafce17b5378b2e28ad5dc0e312
-
Filesize
305KB
MD57a162efe8d20d6baa8c2bb8d11196043
SHA1834fd7877fae8aa0129a6c489c12d5ca2ed1b644
SHA25692f1f0d093e7085b15b489fea506ed0862dd40217cd469f1ad2d267e3f52d8f0
SHA5123f3871204e4d7861aec61422321d5852b85cccee8be7495c296a3ae21c40c86316849fb7fac90f0b2c306a41ce774be58e9e47801c0aeb74bc2d58768c3bf075
-
Filesize
305KB
MD57a162efe8d20d6baa8c2bb8d11196043
SHA1834fd7877fae8aa0129a6c489c12d5ca2ed1b644
SHA25692f1f0d093e7085b15b489fea506ed0862dd40217cd469f1ad2d267e3f52d8f0
SHA5123f3871204e4d7861aec61422321d5852b85cccee8be7495c296a3ae21c40c86316849fb7fac90f0b2c306a41ce774be58e9e47801c0aeb74bc2d58768c3bf075
-
Filesize
185KB
MD59b227758819637c3b781139d829c1a53
SHA16154acae95d4aea83e43ac8ea581b5e4f4bc0956
SHA256bed8baadb540c589ebe2f30d48091a73ef2216e73e49c03111ff9bdb109a7b1f
SHA5125ee93e3ebdb16672b4370f99ffbd3f7dcf5834a447f7417a6761f16247199ee6900778f07151a9f47e88c22770464171c9cfe7e258054b8a227543090b636ef9
-
Filesize
185KB
MD59b227758819637c3b781139d829c1a53
SHA16154acae95d4aea83e43ac8ea581b5e4f4bc0956
SHA256bed8baadb540c589ebe2f30d48091a73ef2216e73e49c03111ff9bdb109a7b1f
SHA5125ee93e3ebdb16672b4370f99ffbd3f7dcf5834a447f7417a6761f16247199ee6900778f07151a9f47e88c22770464171c9cfe7e258054b8a227543090b636ef9
-
Filesize
145KB
MD582f832046440d5734e98708dedb66980
SHA1aa37e910b59948d93057fdb8b89ddc07e2ef91e1
SHA256f6862b502336aca2612fa4192034187a8079b4b8d30c69322b8be66a2224e2bb
SHA51285e502d7b5c71c04220f4a2a0757d3482d13c195b4dd4d13a477aa377ef7685b1d571e9ee870838f1789a385c6822a9db1332f3b5264307efe84b90ebaa7dac6
-
Filesize
145KB
MD582f832046440d5734e98708dedb66980
SHA1aa37e910b59948d93057fdb8b89ddc07e2ef91e1
SHA256f6862b502336aca2612fa4192034187a8079b4b8d30c69322b8be66a2224e2bb
SHA51285e502d7b5c71c04220f4a2a0757d3482d13c195b4dd4d13a477aa377ef7685b1d571e9ee870838f1789a385c6822a9db1332f3b5264307efe84b90ebaa7dac6
-
Filesize
967KB
MD539e0140486f305224de7b5a7f9add146
SHA103309f5df6ebebcf8ed000049217cc834f4ffd96
SHA256893202421d52a60398c41387f9bd013e89dc8798bf0c317735c8ea73270d85a2
SHA5125f4acf53e6f7dac5ba87440c4f53d4a8368594834c3b76f962970cd8cde171d3d8a374f2b31c7a3c6f22306f09769586649a1dafce17b5378b2e28ad5dc0e312
-
Filesize
967KB
MD539e0140486f305224de7b5a7f9add146
SHA103309f5df6ebebcf8ed000049217cc834f4ffd96
SHA256893202421d52a60398c41387f9bd013e89dc8798bf0c317735c8ea73270d85a2
SHA5125f4acf53e6f7dac5ba87440c4f53d4a8368594834c3b76f962970cd8cde171d3d8a374f2b31c7a3c6f22306f09769586649a1dafce17b5378b2e28ad5dc0e312
-
Filesize
967KB
MD539e0140486f305224de7b5a7f9add146
SHA103309f5df6ebebcf8ed000049217cc834f4ffd96
SHA256893202421d52a60398c41387f9bd013e89dc8798bf0c317735c8ea73270d85a2
SHA5125f4acf53e6f7dac5ba87440c4f53d4a8368594834c3b76f962970cd8cde171d3d8a374f2b31c7a3c6f22306f09769586649a1dafce17b5378b2e28ad5dc0e312
-
Filesize
967KB
MD539e0140486f305224de7b5a7f9add146
SHA103309f5df6ebebcf8ed000049217cc834f4ffd96
SHA256893202421d52a60398c41387f9bd013e89dc8798bf0c317735c8ea73270d85a2
SHA5125f4acf53e6f7dac5ba87440c4f53d4a8368594834c3b76f962970cd8cde171d3d8a374f2b31c7a3c6f22306f09769586649a1dafce17b5378b2e28ad5dc0e312