Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2023, 20:23

General

  • Target

    ee4e1544ecd60db08be50cb3d400ba1a79391dfe70b49b7082334b52983786b5.exe

  • Size

    1.1MB

  • MD5

    439e66c47ee1fc2e5fe28c8c06d46fab

  • SHA1

    381152f4cdf622ba8de9142aa9a4735cc0863a21

  • SHA256

    ee4e1544ecd60db08be50cb3d400ba1a79391dfe70b49b7082334b52983786b5

  • SHA512

    93d62d4a3c6303669ffbaa76158bbb73d6b0d958977d929ee6581f8523b34bc3e52fe679bcaf0c89f1173a73e365e8f149bd14fca00953e7e85ca982bec73ee2

  • SSDEEP

    24576:MyQMsIY1vs33YEgrUMPj5OpaYzhxrXhCslPGi3vK5Bvh:7QzZslgrbspaMxrRR3vKj

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Windows security modification 2 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee4e1544ecd60db08be50cb3d400ba1a79391dfe70b49b7082334b52983786b5.exe
    "C:\Users\Admin\AppData\Local\Temp\ee4e1544ecd60db08be50cb3d400ba1a79391dfe70b49b7082334b52983786b5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4116
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Jp694541.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Jp694541.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4660
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hg626204.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hg626204.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1164
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zH350800.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zH350800.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:3900
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\122718550.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\122718550.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1544
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\282926300.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\282926300.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2584
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\380700785.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\380700785.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4124
          • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:4656
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:2016
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "oneetx.exe" /P "Admin:N"&&CACLS "oneetx.exe" /P "Admin:R" /E&&echo Y|CACLS "..\cb7ae701b3" /P "Admin:N"&&CACLS "..\cb7ae701b3" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:4988
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:4620
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "oneetx.exe" /P "Admin:N"
                  7⤵
                    PID:1760
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "oneetx.exe" /P "Admin:R" /E
                    7⤵
                      PID:1224
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      7⤵
                        PID:5000
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\cb7ae701b3" /P "Admin:N"
                        7⤵
                          PID:5112
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\cb7ae701b3" /P "Admin:R" /E
                          7⤵
                            PID:5068
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\444050236.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\444050236.exe
                    3⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:5108
              • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
                C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe
                1⤵
                • Executes dropped EXE
                PID:3036

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Jp694541.exe

                Filesize

                939KB

                MD5

                8f4b4bda69692d285a84c8208e7865c3

                SHA1

                b8fdc7d9b1093b561c80690269d23e44a947170e

                SHA256

                50685a3a52295d9f5bb7ca162963fb7c09e71280fbeeeb5b2b585584ca27b34c

                SHA512

                cef3ad4954d59ea4df448f5f97690749cc485cf29eae70f463123372ee9c2011d68c61fd93b29defcd9fb65353ce441328077d1d3c61ce41021fcc8775ca8529

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Jp694541.exe

                Filesize

                939KB

                MD5

                8f4b4bda69692d285a84c8208e7865c3

                SHA1

                b8fdc7d9b1093b561c80690269d23e44a947170e

                SHA256

                50685a3a52295d9f5bb7ca162963fb7c09e71280fbeeeb5b2b585584ca27b34c

                SHA512

                cef3ad4954d59ea4df448f5f97690749cc485cf29eae70f463123372ee9c2011d68c61fd93b29defcd9fb65353ce441328077d1d3c61ce41021fcc8775ca8529

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\444050236.exe

                Filesize

                341KB

                MD5

                47ba46dc83084b0ce15fa10cee2f3efd

                SHA1

                d14895f5d0c4fb8546fb526be8f231759c4f9a80

                SHA256

                411169afcf1a3c7ee94658cf7a4f0cd7394cb419316bdcd7f93c2d90004b1d48

                SHA512

                5474cc6f9910341358de8052722a2bb5ca508a4ccc154ee780cbfec545f45b36d799b77abbfc5c7df74422c1177149ee29ce0612935ce3a890707fd4504ef1ed

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\444050236.exe

                Filesize

                341KB

                MD5

                47ba46dc83084b0ce15fa10cee2f3efd

                SHA1

                d14895f5d0c4fb8546fb526be8f231759c4f9a80

                SHA256

                411169afcf1a3c7ee94658cf7a4f0cd7394cb419316bdcd7f93c2d90004b1d48

                SHA512

                5474cc6f9910341358de8052722a2bb5ca508a4ccc154ee780cbfec545f45b36d799b77abbfc5c7df74422c1177149ee29ce0612935ce3a890707fd4504ef1ed

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hg626204.exe

                Filesize

                586KB

                MD5

                bbac3299abdaf8fbc75f64c1786e99cd

                SHA1

                3e1244e7cb3302cae2fc7a03fd69f19e935527d7

                SHA256

                c577cd9aa15ec53351d7b8f79f01ce0fd80b332920394098a72769eb3807bf43

                SHA512

                48b086e11affb9817f281ff9d20253da72f759275cba954f607a2a8ab98ca6970a30810deb4ef293f15b4e78c8c4df4a67116d20eb7324835ce0504d438e3aae

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hg626204.exe

                Filesize

                586KB

                MD5

                bbac3299abdaf8fbc75f64c1786e99cd

                SHA1

                3e1244e7cb3302cae2fc7a03fd69f19e935527d7

                SHA256

                c577cd9aa15ec53351d7b8f79f01ce0fd80b332920394098a72769eb3807bf43

                SHA512

                48b086e11affb9817f281ff9d20253da72f759275cba954f607a2a8ab98ca6970a30810deb4ef293f15b4e78c8c4df4a67116d20eb7324835ce0504d438e3aae

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\380700785.exe

                Filesize

                204KB

                MD5

                1304f384653e08ae497008ff13498608

                SHA1

                d9a76ed63d74d4217c5027757cb9a7a0d0093080

                SHA256

                2a9dabab35fb09085750e1cc762e32b0fe4cbd7ed4276ef7e68ba159ae330eaa

                SHA512

                4138217fd538e827c89db5c0cd4ea21bd8c8d3a7196d2eabf10412caf7b929479e768747df5fd92fc022d758f1840474530ba82dcb7e8672cc6eb88caeaf38c1

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\380700785.exe

                Filesize

                204KB

                MD5

                1304f384653e08ae497008ff13498608

                SHA1

                d9a76ed63d74d4217c5027757cb9a7a0d0093080

                SHA256

                2a9dabab35fb09085750e1cc762e32b0fe4cbd7ed4276ef7e68ba159ae330eaa

                SHA512

                4138217fd538e827c89db5c0cd4ea21bd8c8d3a7196d2eabf10412caf7b929479e768747df5fd92fc022d758f1840474530ba82dcb7e8672cc6eb88caeaf38c1

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zH350800.exe

                Filesize

                414KB

                MD5

                27e1923ad9b94a144fedca270dc06aa8

                SHA1

                1de17d3ed0d7aed7aa78a51492b3c697878224be

                SHA256

                233a8752823b78cc6820b9c3777af10a396829f5e9d52d165f816a3ba8a775b7

                SHA512

                7f9201f748709dd4fdb557c1c5b6fea5a5f3f1ed091c27c1301d43588116972e65ac79a6de2f6e30a9ec53ca5930de50fd0743546150a24e120b07342166d4bf

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zH350800.exe

                Filesize

                414KB

                MD5

                27e1923ad9b94a144fedca270dc06aa8

                SHA1

                1de17d3ed0d7aed7aa78a51492b3c697878224be

                SHA256

                233a8752823b78cc6820b9c3777af10a396829f5e9d52d165f816a3ba8a775b7

                SHA512

                7f9201f748709dd4fdb557c1c5b6fea5a5f3f1ed091c27c1301d43588116972e65ac79a6de2f6e30a9ec53ca5930de50fd0743546150a24e120b07342166d4bf

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\122718550.exe

                Filesize

                175KB

                MD5

                a165b5f6b0a4bdf808b71de57bf9347d

                SHA1

                39a7b301e819e386c162a47e046fa384bb5ab437

                SHA256

                68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

                SHA512

                3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\122718550.exe

                Filesize

                175KB

                MD5

                a165b5f6b0a4bdf808b71de57bf9347d

                SHA1

                39a7b301e819e386c162a47e046fa384bb5ab437

                SHA256

                68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

                SHA512

                3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\282926300.exe

                Filesize

                259KB

                MD5

                39689e78850659e0fdca5150fbe38944

                SHA1

                998a1e7efba9849591bedc4d3293cefa01cb1a65

                SHA256

                df2d6f039588107ad39adc67553742d3887f1d602b413fd8e66424810c9ec91a

                SHA512

                5786bbade8d55bf681201f588d31f6de0209b26081de316780ccab0c4e81d6d71e0fb407814856d9e29788cccf356a91f0bfd2dc274d3c40c5ff0d68bb778769

              • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\282926300.exe

                Filesize

                259KB

                MD5

                39689e78850659e0fdca5150fbe38944

                SHA1

                998a1e7efba9849591bedc4d3293cefa01cb1a65

                SHA256

                df2d6f039588107ad39adc67553742d3887f1d602b413fd8e66424810c9ec91a

                SHA512

                5786bbade8d55bf681201f588d31f6de0209b26081de316780ccab0c4e81d6d71e0fb407814856d9e29788cccf356a91f0bfd2dc274d3c40c5ff0d68bb778769

              • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe

                Filesize

                204KB

                MD5

                1304f384653e08ae497008ff13498608

                SHA1

                d9a76ed63d74d4217c5027757cb9a7a0d0093080

                SHA256

                2a9dabab35fb09085750e1cc762e32b0fe4cbd7ed4276ef7e68ba159ae330eaa

                SHA512

                4138217fd538e827c89db5c0cd4ea21bd8c8d3a7196d2eabf10412caf7b929479e768747df5fd92fc022d758f1840474530ba82dcb7e8672cc6eb88caeaf38c1

              • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe

                Filesize

                204KB

                MD5

                1304f384653e08ae497008ff13498608

                SHA1

                d9a76ed63d74d4217c5027757cb9a7a0d0093080

                SHA256

                2a9dabab35fb09085750e1cc762e32b0fe4cbd7ed4276ef7e68ba159ae330eaa

                SHA512

                4138217fd538e827c89db5c0cd4ea21bd8c8d3a7196d2eabf10412caf7b929479e768747df5fd92fc022d758f1840474530ba82dcb7e8672cc6eb88caeaf38c1

              • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe

                Filesize

                204KB

                MD5

                1304f384653e08ae497008ff13498608

                SHA1

                d9a76ed63d74d4217c5027757cb9a7a0d0093080

                SHA256

                2a9dabab35fb09085750e1cc762e32b0fe4cbd7ed4276ef7e68ba159ae330eaa

                SHA512

                4138217fd538e827c89db5c0cd4ea21bd8c8d3a7196d2eabf10412caf7b929479e768747df5fd92fc022d758f1840474530ba82dcb7e8672cc6eb88caeaf38c1

              • C:\Users\Admin\AppData\Local\Temp\cb7ae701b3\oneetx.exe

                Filesize

                204KB

                MD5

                1304f384653e08ae497008ff13498608

                SHA1

                d9a76ed63d74d4217c5027757cb9a7a0d0093080

                SHA256

                2a9dabab35fb09085750e1cc762e32b0fe4cbd7ed4276ef7e68ba159ae330eaa

                SHA512

                4138217fd538e827c89db5c0cd4ea21bd8c8d3a7196d2eabf10412caf7b929479e768747df5fd92fc022d758f1840474530ba82dcb7e8672cc6eb88caeaf38c1

              • memory/1544-191-0x0000000004950000-0x0000000004963000-memory.dmp

                Filesize

                76KB

              • memory/1544-163-0x00000000049C0000-0x0000000004F64000-memory.dmp

                Filesize

                5.6MB

              • memory/1544-171-0x0000000004950000-0x0000000004963000-memory.dmp

                Filesize

                76KB

              • memory/1544-173-0x0000000004950000-0x0000000004963000-memory.dmp

                Filesize

                76KB

              • memory/1544-175-0x0000000004950000-0x0000000004963000-memory.dmp

                Filesize

                76KB

              • memory/1544-177-0x0000000004950000-0x0000000004963000-memory.dmp

                Filesize

                76KB

              • memory/1544-179-0x0000000004950000-0x0000000004963000-memory.dmp

                Filesize

                76KB

              • memory/1544-181-0x0000000004950000-0x0000000004963000-memory.dmp

                Filesize

                76KB

              • memory/1544-183-0x0000000004950000-0x0000000004963000-memory.dmp

                Filesize

                76KB

              • memory/1544-185-0x0000000004950000-0x0000000004963000-memory.dmp

                Filesize

                76KB

              • memory/1544-187-0x0000000004950000-0x0000000004963000-memory.dmp

                Filesize

                76KB

              • memory/1544-189-0x0000000004950000-0x0000000004963000-memory.dmp

                Filesize

                76KB

              • memory/1544-167-0x0000000004950000-0x0000000004963000-memory.dmp

                Filesize

                76KB

              • memory/1544-192-0x00000000049B0000-0x00000000049C0000-memory.dmp

                Filesize

                64KB

              • memory/1544-193-0x00000000049B0000-0x00000000049C0000-memory.dmp

                Filesize

                64KB

              • memory/1544-161-0x00000000049B0000-0x00000000049C0000-memory.dmp

                Filesize

                64KB

              • memory/1544-162-0x00000000049B0000-0x00000000049C0000-memory.dmp

                Filesize

                64KB

              • memory/1544-169-0x0000000004950000-0x0000000004963000-memory.dmp

                Filesize

                76KB

              • memory/1544-165-0x0000000004950000-0x0000000004963000-memory.dmp

                Filesize

                76KB

              • memory/1544-164-0x0000000004950000-0x0000000004963000-memory.dmp

                Filesize

                76KB

              • memory/2584-231-0x00000000027B0000-0x00000000027C0000-memory.dmp

                Filesize

                64KB

              • memory/2584-229-0x0000000000400000-0x0000000000455000-memory.dmp

                Filesize

                340KB

              • memory/2584-200-0x00000000027B0000-0x00000000027C0000-memory.dmp

                Filesize

                64KB

              • memory/2584-233-0x00000000027B0000-0x00000000027C0000-memory.dmp

                Filesize

                64KB

              • memory/2584-230-0x00000000027B0000-0x00000000027C0000-memory.dmp

                Filesize

                64KB

              • memory/2584-234-0x0000000000400000-0x0000000000455000-memory.dmp

                Filesize

                340KB

              • memory/2584-199-0x00000000005B0000-0x00000000005DD000-memory.dmp

                Filesize

                180KB

              • memory/5108-259-0x0000000004C00000-0x0000000004C10000-memory.dmp

                Filesize

                64KB

              • memory/5108-1050-0x0000000007BE0000-0x0000000007CEA000-memory.dmp

                Filesize

                1.0MB

              • memory/5108-256-0x0000000002450000-0x0000000002485000-memory.dmp

                Filesize

                212KB

              • memory/5108-257-0x0000000004C00000-0x0000000004C10000-memory.dmp

                Filesize

                64KB

              • memory/5108-260-0x0000000002450000-0x0000000002485000-memory.dmp

                Filesize

                212KB

              • memory/5108-253-0x0000000002450000-0x0000000002485000-memory.dmp

                Filesize

                212KB

              • memory/5108-261-0x0000000004C00000-0x0000000004C10000-memory.dmp

                Filesize

                64KB

              • memory/5108-1048-0x0000000007540000-0x0000000007B58000-memory.dmp

                Filesize

                6.1MB

              • memory/5108-1049-0x0000000007BC0000-0x0000000007BD2000-memory.dmp

                Filesize

                72KB

              • memory/5108-255-0x0000000002120000-0x0000000002166000-memory.dmp

                Filesize

                280KB

              • memory/5108-1051-0x0000000004C00000-0x0000000004C10000-memory.dmp

                Filesize

                64KB

              • memory/5108-1052-0x0000000007D00000-0x0000000007D3C000-memory.dmp

                Filesize

                240KB

              • memory/5108-1054-0x0000000004C00000-0x0000000004C10000-memory.dmp

                Filesize

                64KB

              • memory/5108-1055-0x0000000004C00000-0x0000000004C10000-memory.dmp

                Filesize

                64KB

              • memory/5108-1056-0x0000000004C00000-0x0000000004C10000-memory.dmp

                Filesize

                64KB

              • memory/5108-1057-0x0000000004C00000-0x0000000004C10000-memory.dmp

                Filesize

                64KB

              • memory/5108-252-0x0000000002450000-0x0000000002485000-memory.dmp

                Filesize

                212KB