Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/05/2023, 18:47

General

  • Target

    dee3ff932456ceea743e52df91bad5c2f6171f2c8c27c9b83e718fa4eeffd733.exe

  • Size

    697KB

  • MD5

    8fb1d874c6af69f9a563592847334934

  • SHA1

    f7bb188241c0808bc16d264c667da4449d281b0d

  • SHA256

    dee3ff932456ceea743e52df91bad5c2f6171f2c8c27c9b83e718fa4eeffd733

  • SHA512

    65fd4774832d6e50ab95514e7de439102da3c5adb6ff66e5c29de16e37e27bfcb4e365d381b34b1730fe6c75fea577ecc39e167e025d35be743bc1dc4709869b

  • SSDEEP

    12288:gy90Qvr/Ui+UH4NVw5iOAD1kCD+Ar9/kSTQYvOmX26CAn4s:gy1Yf7NVcCRj+ArlkmvxFP4s

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dee3ff932456ceea743e52df91bad5c2f6171f2c8c27c9b83e718fa4eeffd733.exe
    "C:\Users\Admin\AppData\Local\Temp\dee3ff932456ceea743e52df91bad5c2f6171f2c8c27c9b83e718fa4eeffd733.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4324
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za648816.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za648816.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2824
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\49503633.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\49503633.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2856
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2856 -s 1080
          4⤵
          • Program crash
          PID:884
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\w81af33.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\w81af33.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3364
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2856 -ip 2856
    1⤵
      PID:1524

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za648816.exe

            Filesize

            546KB

            MD5

            d2c3ef6acf4a54ca9128ad2c8b622ff2

            SHA1

            ec514b0697a05212634dce524cb2ac84323db4c8

            SHA256

            ebaf927e7bc6fc927d414c594faeb0591e9811a2a3e235067d733bb51a0ccceb

            SHA512

            db13a333e71a7b6c99f9df967ea5a505fe0a9e66a7cf7dd9d8b25eb52099d3612a5ebc93ad025d6d7fefa29bfb73fbe4985aa4de1fc33268087bf9f2b39daf5c

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za648816.exe

            Filesize

            546KB

            MD5

            d2c3ef6acf4a54ca9128ad2c8b622ff2

            SHA1

            ec514b0697a05212634dce524cb2ac84323db4c8

            SHA256

            ebaf927e7bc6fc927d414c594faeb0591e9811a2a3e235067d733bb51a0ccceb

            SHA512

            db13a333e71a7b6c99f9df967ea5a505fe0a9e66a7cf7dd9d8b25eb52099d3612a5ebc93ad025d6d7fefa29bfb73fbe4985aa4de1fc33268087bf9f2b39daf5c

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\49503633.exe

            Filesize

            269KB

            MD5

            931314dbdc497393e8dd7a7845d2ce3e

            SHA1

            3701995be1fc29ae88eca1cefcb62711f1bccbf5

            SHA256

            23c53c1495e7d3c5552efc61c8e0e35c2bec7e127b97a72a8715c0b870e2eccc

            SHA512

            c2523880eaa24edd2eea6e495c9f1b04124ad9dc94587b0f511df31625ae25ad682fe044e0ddf728706596dbeb7ea5b5e2ee3bf892aca52ef2ab29300ec8d3ab

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\49503633.exe

            Filesize

            269KB

            MD5

            931314dbdc497393e8dd7a7845d2ce3e

            SHA1

            3701995be1fc29ae88eca1cefcb62711f1bccbf5

            SHA256

            23c53c1495e7d3c5552efc61c8e0e35c2bec7e127b97a72a8715c0b870e2eccc

            SHA512

            c2523880eaa24edd2eea6e495c9f1b04124ad9dc94587b0f511df31625ae25ad682fe044e0ddf728706596dbeb7ea5b5e2ee3bf892aca52ef2ab29300ec8d3ab

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\w81af33.exe

            Filesize

            353KB

            MD5

            0b0fde03585070fb12dc9fd4cea2429a

            SHA1

            b7f873286a8283f51edaa0add18b2845909cbb3a

            SHA256

            84b5ee9a88e8a1edb55d46af53ae3db445287de22033b4044de26a94c1349915

            SHA512

            c1bc7a7723952ab1fb2e44e347633a6e9435712bf38619ed29c24241f014daa430d528f36ae550399085a265e74b70cfc39fdc9ce190231a4cc39f60e5ea7a19

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\w81af33.exe

            Filesize

            353KB

            MD5

            0b0fde03585070fb12dc9fd4cea2429a

            SHA1

            b7f873286a8283f51edaa0add18b2845909cbb3a

            SHA256

            84b5ee9a88e8a1edb55d46af53ae3db445287de22033b4044de26a94c1349915

            SHA512

            c1bc7a7723952ab1fb2e44e347633a6e9435712bf38619ed29c24241f014daa430d528f36ae550399085a265e74b70cfc39fdc9ce190231a4cc39f60e5ea7a19

          • memory/2856-185-0x00000000072E0000-0x00000000072F0000-memory.dmp

            Filesize

            64KB

          • memory/2856-150-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

            Filesize

            72KB

          • memory/2856-153-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

            Filesize

            72KB

          • memory/2856-155-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

            Filesize

            72KB

          • memory/2856-157-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

            Filesize

            72KB

          • memory/2856-159-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

            Filesize

            72KB

          • memory/2856-161-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

            Filesize

            72KB

          • memory/2856-163-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

            Filesize

            72KB

          • memory/2856-165-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

            Filesize

            72KB

          • memory/2856-167-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

            Filesize

            72KB

          • memory/2856-169-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

            Filesize

            72KB

          • memory/2856-171-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

            Filesize

            72KB

          • memory/2856-173-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

            Filesize

            72KB

          • memory/2856-175-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

            Filesize

            72KB

          • memory/2856-177-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

            Filesize

            72KB

          • memory/2856-178-0x00000000072E0000-0x00000000072F0000-memory.dmp

            Filesize

            64KB

          • memory/2856-179-0x00000000072E0000-0x00000000072F0000-memory.dmp

            Filesize

            64KB

          • memory/2856-180-0x0000000000400000-0x0000000002B9E000-memory.dmp

            Filesize

            39.6MB

          • memory/2856-181-0x0000000002C70000-0x0000000002C9D000-memory.dmp

            Filesize

            180KB

          • memory/2856-183-0x00000000072E0000-0x00000000072F0000-memory.dmp

            Filesize

            64KB

          • memory/2856-184-0x00000000072E0000-0x00000000072F0000-memory.dmp

            Filesize

            64KB

          • memory/2856-151-0x0000000004BD0000-0x0000000004BE2000-memory.dmp

            Filesize

            72KB

          • memory/2856-186-0x0000000000400000-0x0000000002B9E000-memory.dmp

            Filesize

            39.6MB

          • memory/2856-149-0x00000000072F0000-0x0000000007894000-memory.dmp

            Filesize

            5.6MB

          • memory/2856-148-0x0000000002C70000-0x0000000002C9D000-memory.dmp

            Filesize

            180KB

          • memory/3364-224-0x00000000077A0000-0x00000000077D5000-memory.dmp

            Filesize

            212KB

          • memory/3364-990-0x000000000A450000-0x000000000A48C000-memory.dmp

            Filesize

            240KB

          • memory/3364-989-0x000000000A330000-0x000000000A43A000-memory.dmp

            Filesize

            1.0MB

          • memory/3364-193-0x00000000077A0000-0x00000000077D5000-memory.dmp

            Filesize

            212KB

          • memory/3364-218-0x0000000002BC0000-0x0000000002C06000-memory.dmp

            Filesize

            280KB

          • memory/3364-201-0x00000000077A0000-0x00000000077D5000-memory.dmp

            Filesize

            212KB

          • memory/3364-203-0x00000000077A0000-0x00000000077D5000-memory.dmp

            Filesize

            212KB

          • memory/3364-205-0x00000000077A0000-0x00000000077D5000-memory.dmp

            Filesize

            212KB

          • memory/3364-207-0x00000000077A0000-0x00000000077D5000-memory.dmp

            Filesize

            212KB

          • memory/3364-209-0x00000000077A0000-0x00000000077D5000-memory.dmp

            Filesize

            212KB

          • memory/3364-213-0x00000000077A0000-0x00000000077D5000-memory.dmp

            Filesize

            212KB

          • memory/3364-211-0x00000000077A0000-0x00000000077D5000-memory.dmp

            Filesize

            212KB

          • memory/3364-195-0x00000000077A0000-0x00000000077D5000-memory.dmp

            Filesize

            212KB

          • memory/3364-215-0x00000000077A0000-0x00000000077D5000-memory.dmp

            Filesize

            212KB

          • memory/3364-199-0x00000000077A0000-0x00000000077D5000-memory.dmp

            Filesize

            212KB

          • memory/3364-217-0x00000000077A0000-0x00000000077D5000-memory.dmp

            Filesize

            212KB

          • memory/3364-220-0x0000000002F00000-0x0000000002F10000-memory.dmp

            Filesize

            64KB

          • memory/3364-222-0x0000000002F00000-0x0000000002F10000-memory.dmp

            Filesize

            64KB

          • memory/3364-221-0x00000000077A0000-0x00000000077D5000-memory.dmp

            Filesize

            212KB

          • memory/3364-226-0x00000000077A0000-0x00000000077D5000-memory.dmp

            Filesize

            212KB

          • memory/3364-987-0x0000000009CA0000-0x000000000A2B8000-memory.dmp

            Filesize

            6.1MB

          • memory/3364-988-0x000000000A310000-0x000000000A322000-memory.dmp

            Filesize

            72KB

          • memory/3364-197-0x00000000077A0000-0x00000000077D5000-memory.dmp

            Filesize

            212KB

          • memory/3364-192-0x00000000077A0000-0x00000000077D5000-memory.dmp

            Filesize

            212KB

          • memory/3364-992-0x0000000002F00000-0x0000000002F10000-memory.dmp

            Filesize

            64KB

          • memory/3364-993-0x0000000002F00000-0x0000000002F10000-memory.dmp

            Filesize

            64KB

          • memory/3364-994-0x0000000002F00000-0x0000000002F10000-memory.dmp

            Filesize

            64KB

          • memory/3364-996-0x0000000002F00000-0x0000000002F10000-memory.dmp

            Filesize

            64KB