Analysis

  • max time kernel
    155s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2023, 19:00

General

  • Target

    af37016bed7a28ab28ed038685f75a7d6536b6acb0161e0ff49b89c080d03019.exe

  • Size

    1.1MB

  • MD5

    0c308c9934aa87cb5f53b8eeb67e2172

  • SHA1

    e60f090cc2de04bdb0f941ee71f91acce0687e16

  • SHA256

    af37016bed7a28ab28ed038685f75a7d6536b6acb0161e0ff49b89c080d03019

  • SHA512

    c12f5c9480790b0416ad100f68175be8a7b038e6da188a32394e10b2e86848c0227c9f0246201308deb2481878721937e09d7ab65a74a7f132bc56c8198a464f

  • SSDEEP

    24576:iyq+oxpgkWj+wPwGmtNCFo337H3QBadDUT8d3/DOwVLhiPujB:Jew9j+YwGmt2O7HHRs4/DOnPuj

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af37016bed7a28ab28ed038685f75a7d6536b6acb0161e0ff49b89c080d03019.exe
    "C:\Users\Admin\AppData\Local\Temp\af37016bed7a28ab28ed038685f75a7d6536b6acb0161e0ff49b89c080d03019.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4564
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Vu325799.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Vu325799.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ZT256798.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ZT256798.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3736
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\WO695141.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\WO695141.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1156
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\109118752.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\109118752.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2976
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\240098730.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\240098730.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4948
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 1080
              6⤵
              • Program crash
              PID:1848
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\335052391.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\335052391.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4528
          • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:624
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:1680
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1528
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:1312
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "oneetx.exe" /P "Admin:N"
                  7⤵
                    PID:4144
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "oneetx.exe" /P "Admin:R" /E
                    7⤵
                      PID:3420
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\cb7ae701b3" /P "Admin:N"
                      7⤵
                        PID:1040
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        7⤵
                          PID:872
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\cb7ae701b3" /P "Admin:R" /E
                          7⤵
                            PID:5028
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\499359309.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\499359309.exe
                    3⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3620
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4948 -ip 4948
                1⤵
                  PID:2016

                Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Vu325799.exe

                        Filesize

                        939KB

                        MD5

                        74f37ee87641b342dcf370eaffea6f75

                        SHA1

                        4d498a41a8ca510cb6cbfaf8a1ae936623a11f86

                        SHA256

                        8669bc681faa062a860c172e7f1b44565591da66d3a6883f1791e567713984b7

                        SHA512

                        02cbd45d55cbcfdbc3a62140004916c1db7c53e57f0553376f9d30fd83a5666855f555f8ac08fa8b2d4ba71feb2fe6424ec19154ab8647329ae7ea4a28bfaf25

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Vu325799.exe

                        Filesize

                        939KB

                        MD5

                        74f37ee87641b342dcf370eaffea6f75

                        SHA1

                        4d498a41a8ca510cb6cbfaf8a1ae936623a11f86

                        SHA256

                        8669bc681faa062a860c172e7f1b44565591da66d3a6883f1791e567713984b7

                        SHA512

                        02cbd45d55cbcfdbc3a62140004916c1db7c53e57f0553376f9d30fd83a5666855f555f8ac08fa8b2d4ba71feb2fe6424ec19154ab8647329ae7ea4a28bfaf25

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\499359309.exe

                        Filesize

                        341KB

                        MD5

                        270a90be13524bca952ab79cbec7560e

                        SHA1

                        2d2f9931c3c971e8e3f9618a89db734da2a814cd

                        SHA256

                        f00dc6ebb319c3bb15dad4b9c85c0eba713b54a90d4fb0d71fb80184f3959a7b

                        SHA512

                        39b2b004b98cff62d21ee27b06d5670bfb90b83355d366d62dd1f37dee29961d7e2383bd31af977ecb9c3ea42a12c48c7b9d0dff600987e5581e344c6525d750

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\499359309.exe

                        Filesize

                        341KB

                        MD5

                        270a90be13524bca952ab79cbec7560e

                        SHA1

                        2d2f9931c3c971e8e3f9618a89db734da2a814cd

                        SHA256

                        f00dc6ebb319c3bb15dad4b9c85c0eba713b54a90d4fb0d71fb80184f3959a7b

                        SHA512

                        39b2b004b98cff62d21ee27b06d5670bfb90b83355d366d62dd1f37dee29961d7e2383bd31af977ecb9c3ea42a12c48c7b9d0dff600987e5581e344c6525d750

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ZT256798.exe

                        Filesize

                        586KB

                        MD5

                        47b9a01ad5d72aa6a073176c26f9d459

                        SHA1

                        23b3afe1c29f32ef7cb483d05dfbe37d55fb3eaa

                        SHA256

                        5eeb6982fc111d4e62be2efbced729ebdefd86d58fb3ca6498916e103519928d

                        SHA512

                        78a0a45013c390605dd4875c91d0f51003ffc431e1dd451f40c9741cce5a77c5000ccc90835c51747fec955fe59adc54347896cab72d6630fc991d804d1f0e0f

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ZT256798.exe

                        Filesize

                        586KB

                        MD5

                        47b9a01ad5d72aa6a073176c26f9d459

                        SHA1

                        23b3afe1c29f32ef7cb483d05dfbe37d55fb3eaa

                        SHA256

                        5eeb6982fc111d4e62be2efbced729ebdefd86d58fb3ca6498916e103519928d

                        SHA512

                        78a0a45013c390605dd4875c91d0f51003ffc431e1dd451f40c9741cce5a77c5000ccc90835c51747fec955fe59adc54347896cab72d6630fc991d804d1f0e0f

                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\335052391.exe

                        Filesize

                        204KB

                        MD5

                        1304f384653e08ae497008ff13498608

                        SHA1

                        d9a76ed63d74d4217c5027757cb9a7a0d0093080

                        SHA256

                        2a9dabab35fb09085750e1cc762e32b0fe4cbd7ed4276ef7e68ba159ae330eaa

                        SHA512

                        4138217fd538e827c89db5c0cd4ea21bd8c8d3a7196d2eabf10412caf7b929479e768747df5fd92fc022d758f1840474530ba82dcb7e8672cc6eb88caeaf38c1

                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\335052391.exe

                        Filesize

                        204KB

                        MD5

                        1304f384653e08ae497008ff13498608

                        SHA1

                        d9a76ed63d74d4217c5027757cb9a7a0d0093080

                        SHA256

                        2a9dabab35fb09085750e1cc762e32b0fe4cbd7ed4276ef7e68ba159ae330eaa

                        SHA512

                        4138217fd538e827c89db5c0cd4ea21bd8c8d3a7196d2eabf10412caf7b929479e768747df5fd92fc022d758f1840474530ba82dcb7e8672cc6eb88caeaf38c1

                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\WO695141.exe

                        Filesize

                        414KB

                        MD5

                        a4f24c6de02888ccd755d57110dd2666

                        SHA1

                        a0692e9604d3c27b449603a79720521804dbf5f0

                        SHA256

                        a4ac9d93164ea0d1355311c73f4f3f455dd136f6b4d7c6a6590a5edccce5468f

                        SHA512

                        ee10ee25143bf3152f46b452c5e186122a0dd362040757dcc5a2d185dbca50f199edbf19c0e61d7f683d4702e04522d3efe70962b4a7745916db6c24bad251b9

                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\WO695141.exe

                        Filesize

                        414KB

                        MD5

                        a4f24c6de02888ccd755d57110dd2666

                        SHA1

                        a0692e9604d3c27b449603a79720521804dbf5f0

                        SHA256

                        a4ac9d93164ea0d1355311c73f4f3f455dd136f6b4d7c6a6590a5edccce5468f

                        SHA512

                        ee10ee25143bf3152f46b452c5e186122a0dd362040757dcc5a2d185dbca50f199edbf19c0e61d7f683d4702e04522d3efe70962b4a7745916db6c24bad251b9

                      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\109118752.exe

                        Filesize

                        175KB

                        MD5

                        a165b5f6b0a4bdf808b71de57bf9347d

                        SHA1

                        39a7b301e819e386c162a47e046fa384bb5ab437

                        SHA256

                        68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

                        SHA512

                        3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

                      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\109118752.exe

                        Filesize

                        175KB

                        MD5

                        a165b5f6b0a4bdf808b71de57bf9347d

                        SHA1

                        39a7b301e819e386c162a47e046fa384bb5ab437

                        SHA256

                        68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

                        SHA512

                        3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

                      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\240098730.exe

                        Filesize

                        259KB

                        MD5

                        fb92b02996168544c0cf6c2c4080c8f0

                        SHA1

                        ba09f26f8d580392ef8ae33b406a3ee0cfe81b1e

                        SHA256

                        a995ded56679ee3e77f344155467a21db01fba5f0e0443960a0826d57602125b

                        SHA512

                        04f8488a6aa86a853bbe4f88b823612643ae30ef234317564fc3a931e99ab0daa367e5280feb15f5717a026caab1450a685da1fc688a6874f0a69687e4fcd5ac

                      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\240098730.exe

                        Filesize

                        259KB

                        MD5

                        fb92b02996168544c0cf6c2c4080c8f0

                        SHA1

                        ba09f26f8d580392ef8ae33b406a3ee0cfe81b1e

                        SHA256

                        a995ded56679ee3e77f344155467a21db01fba5f0e0443960a0826d57602125b

                        SHA512

                        04f8488a6aa86a853bbe4f88b823612643ae30ef234317564fc3a931e99ab0daa367e5280feb15f5717a026caab1450a685da1fc688a6874f0a69687e4fcd5ac

                      • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe

                        Filesize

                        204KB

                        MD5

                        1304f384653e08ae497008ff13498608

                        SHA1

                        d9a76ed63d74d4217c5027757cb9a7a0d0093080

                        SHA256

                        2a9dabab35fb09085750e1cc762e32b0fe4cbd7ed4276ef7e68ba159ae330eaa

                        SHA512

                        4138217fd538e827c89db5c0cd4ea21bd8c8d3a7196d2eabf10412caf7b929479e768747df5fd92fc022d758f1840474530ba82dcb7e8672cc6eb88caeaf38c1

                      • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe

                        Filesize

                        204KB

                        MD5

                        1304f384653e08ae497008ff13498608

                        SHA1

                        d9a76ed63d74d4217c5027757cb9a7a0d0093080

                        SHA256

                        2a9dabab35fb09085750e1cc762e32b0fe4cbd7ed4276ef7e68ba159ae330eaa

                        SHA512

                        4138217fd538e827c89db5c0cd4ea21bd8c8d3a7196d2eabf10412caf7b929479e768747df5fd92fc022d758f1840474530ba82dcb7e8672cc6eb88caeaf38c1

                      • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe

                        Filesize

                        204KB

                        MD5

                        1304f384653e08ae497008ff13498608

                        SHA1

                        d9a76ed63d74d4217c5027757cb9a7a0d0093080

                        SHA256

                        2a9dabab35fb09085750e1cc762e32b0fe4cbd7ed4276ef7e68ba159ae330eaa

                        SHA512

                        4138217fd538e827c89db5c0cd4ea21bd8c8d3a7196d2eabf10412caf7b929479e768747df5fd92fc022d758f1840474530ba82dcb7e8672cc6eb88caeaf38c1

                      • memory/2976-192-0x0000000004950000-0x0000000004963000-memory.dmp

                        Filesize

                        76KB

                      • memory/2976-194-0x0000000004A50000-0x0000000004A60000-memory.dmp

                        Filesize

                        64KB

                      • memory/2976-176-0x0000000004950000-0x0000000004963000-memory.dmp

                        Filesize

                        76KB

                      • memory/2976-184-0x0000000004950000-0x0000000004963000-memory.dmp

                        Filesize

                        76KB

                      • memory/2976-182-0x0000000004950000-0x0000000004963000-memory.dmp

                        Filesize

                        76KB

                      • memory/2976-180-0x0000000004950000-0x0000000004963000-memory.dmp

                        Filesize

                        76KB

                      • memory/2976-186-0x0000000004950000-0x0000000004963000-memory.dmp

                        Filesize

                        76KB

                      • memory/2976-190-0x0000000004950000-0x0000000004963000-memory.dmp

                        Filesize

                        76KB

                      • memory/2976-188-0x0000000004950000-0x0000000004963000-memory.dmp

                        Filesize

                        76KB

                      • memory/2976-195-0x0000000004A50000-0x0000000004A60000-memory.dmp

                        Filesize

                        64KB

                      • memory/2976-178-0x0000000004950000-0x0000000004963000-memory.dmp

                        Filesize

                        76KB

                      • memory/2976-193-0x0000000004A50000-0x0000000004A60000-memory.dmp

                        Filesize

                        64KB

                      • memory/2976-166-0x0000000004950000-0x0000000004963000-memory.dmp

                        Filesize

                        76KB

                      • memory/2976-170-0x0000000004950000-0x0000000004963000-memory.dmp

                        Filesize

                        76KB

                      • memory/2976-168-0x0000000004950000-0x0000000004963000-memory.dmp

                        Filesize

                        76KB

                      • memory/2976-172-0x0000000004950000-0x0000000004963000-memory.dmp

                        Filesize

                        76KB

                      • memory/2976-161-0x0000000004A60000-0x0000000005004000-memory.dmp

                        Filesize

                        5.6MB

                      • memory/2976-162-0x0000000004A50000-0x0000000004A60000-memory.dmp

                        Filesize

                        64KB

                      • memory/2976-174-0x0000000004950000-0x0000000004963000-memory.dmp

                        Filesize

                        76KB

                      • memory/2976-163-0x0000000004A50000-0x0000000004A60000-memory.dmp

                        Filesize

                        64KB

                      • memory/2976-164-0x0000000004A50000-0x0000000004A60000-memory.dmp

                        Filesize

                        64KB

                      • memory/2976-165-0x0000000004950000-0x0000000004963000-memory.dmp

                        Filesize

                        76KB

                      • memory/3620-261-0x0000000004A10000-0x0000000004A45000-memory.dmp

                        Filesize

                        212KB

                      • memory/3620-1057-0x0000000007BC0000-0x0000000007BD2000-memory.dmp

                        Filesize

                        72KB

                      • memory/3620-1066-0x0000000004B00000-0x0000000004B10000-memory.dmp

                        Filesize

                        64KB

                      • memory/3620-1064-0x0000000004B00000-0x0000000004B10000-memory.dmp

                        Filesize

                        64KB

                      • memory/3620-1063-0x0000000007D00000-0x0000000007D3C000-memory.dmp

                        Filesize

                        240KB

                      • memory/3620-1062-0x0000000004B00000-0x0000000004B10000-memory.dmp

                        Filesize

                        64KB

                      • memory/3620-1061-0x0000000004B00000-0x0000000004B10000-memory.dmp

                        Filesize

                        64KB

                      • memory/3620-1060-0x0000000004B00000-0x0000000004B10000-memory.dmp

                        Filesize

                        64KB

                      • memory/3620-1059-0x0000000007BE0000-0x0000000007CEA000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/3620-260-0x0000000004A10000-0x0000000004A45000-memory.dmp

                        Filesize

                        212KB

                      • memory/3620-1056-0x0000000007540000-0x0000000007B58000-memory.dmp

                        Filesize

                        6.1MB

                      • memory/3620-348-0x0000000002100000-0x0000000002146000-memory.dmp

                        Filesize

                        280KB

                      • memory/3620-350-0x0000000004B00000-0x0000000004B10000-memory.dmp

                        Filesize

                        64KB

                      • memory/3620-353-0x0000000004B00000-0x0000000004B10000-memory.dmp

                        Filesize

                        64KB

                      • memory/3620-352-0x0000000004B00000-0x0000000004B10000-memory.dmp

                        Filesize

                        64KB

                      • memory/4948-229-0x00000000005B0000-0x00000000005DD000-memory.dmp

                        Filesize

                        180KB

                      • memory/4948-238-0x0000000000400000-0x0000000000455000-memory.dmp

                        Filesize

                        340KB

                      • memory/4948-230-0x0000000004AE0000-0x0000000004AF0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4948-231-0x0000000004AE0000-0x0000000004AF0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4948-232-0x0000000004AE0000-0x0000000004AF0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4948-233-0x0000000000400000-0x0000000000455000-memory.dmp

                        Filesize

                        340KB

                      • memory/4948-234-0x0000000004AE0000-0x0000000004AF0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4948-235-0x0000000004AE0000-0x0000000004AF0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4948-236-0x0000000004AE0000-0x0000000004AF0000-memory.dmp

                        Filesize

                        64KB