Analysis

  • max time kernel
    152s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-05-2023 18:57

General

  • Target

    e8eec87b6c7ea6d8b996090c06d1ffcfcabcd0354b6f72d8e7c38650d399ef22.exe

  • Size

    696KB

  • MD5

    f0f50e2c40c682e19ec5e88731e2bfa3

  • SHA1

    b625ae79275c8be15da07be9165c2a681d2780ff

  • SHA256

    e8eec87b6c7ea6d8b996090c06d1ffcfcabcd0354b6f72d8e7c38650d399ef22

  • SHA512

    af0b981caf50f55d7e794cae47141154212b001cc440963b884e33916924a4cb41c7f5b6599c9c6d280b6ee6e01aea9cf17e6328369a19067ff5e481bea3cf81

  • SSDEEP

    12288:Fy90FtccbLr90zP0ZfuT0O3HuTUHqxQ9ZRhugHF0iDBe7cuSpC8P:FyYV340luluTUKxGj5Sie7cukC8P

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8eec87b6c7ea6d8b996090c06d1ffcfcabcd0354b6f72d8e7c38650d399ef22.exe
    "C:\Users\Admin\AppData\Local\Temp\e8eec87b6c7ea6d8b996090c06d1ffcfcabcd0354b6f72d8e7c38650d399ef22.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4764
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un628275.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un628275.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2380
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\87099849.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\87099849.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1488
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 1076
          4⤵
          • Program crash
          PID:4864
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk636247.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk636247.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:464
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1488 -ip 1488
    1⤵
      PID:3312

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un628275.exe

      Filesize

      542KB

      MD5

      3379afee3f67a2ee639d579b0382d107

      SHA1

      5b4a91b4571456af5b9b3931aecbc5ad7d995828

      SHA256

      e447d9ebc8208a356f8b35d899ab7df113e85bb8d134f54a98d06386f1515dfa

      SHA512

      1be4cf9017df933f43634a8ff8222ec219fb25a498b6492ecbc790477acc7d0387a6dd484e80add3bb9e022c1ef777194ef103f93eb453274c128e6994904e9b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un628275.exe

      Filesize

      542KB

      MD5

      3379afee3f67a2ee639d579b0382d107

      SHA1

      5b4a91b4571456af5b9b3931aecbc5ad7d995828

      SHA256

      e447d9ebc8208a356f8b35d899ab7df113e85bb8d134f54a98d06386f1515dfa

      SHA512

      1be4cf9017df933f43634a8ff8222ec219fb25a498b6492ecbc790477acc7d0387a6dd484e80add3bb9e022c1ef777194ef103f93eb453274c128e6994904e9b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\87099849.exe

      Filesize

      264KB

      MD5

      52c7287c2f659aa09cd6ca9f5594fa37

      SHA1

      da2bd76eab0f689b2d12e3be10f829e5d5da7689

      SHA256

      5386cef87a0f96faa104b84205764203b6252e4ee61a12450edb5298b78bb829

      SHA512

      9cbc8d9d14176c0a65e519fbe97c919a7f0c8bba67eb4cfa4f1a9f7cbe80a64092f7961a9f9b620d62de67eac0f2a1dfad488ac912ba11c959e87b8fe9f4d07d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\87099849.exe

      Filesize

      264KB

      MD5

      52c7287c2f659aa09cd6ca9f5594fa37

      SHA1

      da2bd76eab0f689b2d12e3be10f829e5d5da7689

      SHA256

      5386cef87a0f96faa104b84205764203b6252e4ee61a12450edb5298b78bb829

      SHA512

      9cbc8d9d14176c0a65e519fbe97c919a7f0c8bba67eb4cfa4f1a9f7cbe80a64092f7961a9f9b620d62de67eac0f2a1dfad488ac912ba11c959e87b8fe9f4d07d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk636247.exe

      Filesize

      348KB

      MD5

      1974a519304d8f7f273f363a5a7243da

      SHA1

      7794a0108a71ff22d1ebc56991b1f264d863d6ec

      SHA256

      428729b8ec5d6b76b5b3fb943f92dc08d22266c7e05ca33ce5dcbd463ca224f7

      SHA512

      c67b038e2ee3ca5ff9d1a89fffd2c77d925ca02829d9da6975fc1581004d3b35fefc03af1b29db4534210b3c2e63455bb73488762ce61a2fd5fb5cf8d49766a8

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk636247.exe

      Filesize

      348KB

      MD5

      1974a519304d8f7f273f363a5a7243da

      SHA1

      7794a0108a71ff22d1ebc56991b1f264d863d6ec

      SHA256

      428729b8ec5d6b76b5b3fb943f92dc08d22266c7e05ca33ce5dcbd463ca224f7

      SHA512

      c67b038e2ee3ca5ff9d1a89fffd2c77d925ca02829d9da6975fc1581004d3b35fefc03af1b29db4534210b3c2e63455bb73488762ce61a2fd5fb5cf8d49766a8

    • memory/464-222-0x0000000007790000-0x00000000077C5000-memory.dmp

      Filesize

      212KB

    • memory/464-226-0x0000000007790000-0x00000000077C5000-memory.dmp

      Filesize

      212KB

    • memory/464-998-0x0000000004D60000-0x0000000004D70000-memory.dmp

      Filesize

      64KB

    • memory/464-997-0x0000000004D60000-0x0000000004D70000-memory.dmp

      Filesize

      64KB

    • memory/464-202-0x0000000007790000-0x00000000077C5000-memory.dmp

      Filesize

      212KB

    • memory/464-995-0x0000000004D60000-0x0000000004D70000-memory.dmp

      Filesize

      64KB

    • memory/464-993-0x0000000004D60000-0x0000000004D70000-memory.dmp

      Filesize

      64KB

    • memory/464-992-0x000000000A450000-0x000000000A48C000-memory.dmp

      Filesize

      240KB

    • memory/464-991-0x000000000A330000-0x000000000A43A000-memory.dmp

      Filesize

      1.0MB

    • memory/464-989-0x0000000009C90000-0x000000000A2A8000-memory.dmp

      Filesize

      6.1MB

    • memory/464-990-0x000000000A310000-0x000000000A322000-memory.dmp

      Filesize

      72KB

    • memory/464-256-0x0000000004D60000-0x0000000004D70000-memory.dmp

      Filesize

      64KB

    • memory/464-258-0x0000000004D60000-0x0000000004D70000-memory.dmp

      Filesize

      64KB

    • memory/464-254-0x0000000004D60000-0x0000000004D70000-memory.dmp

      Filesize

      64KB

    • memory/464-253-0x0000000004710000-0x0000000004756000-memory.dmp

      Filesize

      280KB

    • memory/464-224-0x0000000007790000-0x00000000077C5000-memory.dmp

      Filesize

      212KB

    • memory/464-212-0x0000000007790000-0x00000000077C5000-memory.dmp

      Filesize

      212KB

    • memory/464-206-0x0000000007790000-0x00000000077C5000-memory.dmp

      Filesize

      212KB

    • memory/464-220-0x0000000007790000-0x00000000077C5000-memory.dmp

      Filesize

      212KB

    • memory/464-218-0x0000000007790000-0x00000000077C5000-memory.dmp

      Filesize

      212KB

    • memory/464-216-0x0000000007790000-0x00000000077C5000-memory.dmp

      Filesize

      212KB

    • memory/464-210-0x0000000007790000-0x00000000077C5000-memory.dmp

      Filesize

      212KB

    • memory/464-198-0x0000000007790000-0x00000000077C5000-memory.dmp

      Filesize

      212KB

    • memory/464-208-0x0000000007790000-0x00000000077C5000-memory.dmp

      Filesize

      212KB

    • memory/464-194-0x0000000007790000-0x00000000077C5000-memory.dmp

      Filesize

      212KB

    • memory/464-200-0x0000000007790000-0x00000000077C5000-memory.dmp

      Filesize

      212KB

    • memory/464-193-0x0000000007790000-0x00000000077C5000-memory.dmp

      Filesize

      212KB

    • memory/464-996-0x0000000004D60000-0x0000000004D70000-memory.dmp

      Filesize

      64KB

    • memory/464-214-0x0000000007790000-0x00000000077C5000-memory.dmp

      Filesize

      212KB

    • memory/464-204-0x0000000007790000-0x00000000077C5000-memory.dmp

      Filesize

      212KB

    • memory/464-196-0x0000000007790000-0x00000000077C5000-memory.dmp

      Filesize

      212KB

    • memory/1488-186-0x00000000073A0000-0x00000000073B0000-memory.dmp

      Filesize

      64KB

    • memory/1488-157-0x0000000004900000-0x0000000004913000-memory.dmp

      Filesize

      76KB

    • memory/1488-188-0x0000000000400000-0x0000000002B9D000-memory.dmp

      Filesize

      39.6MB

    • memory/1488-175-0x0000000004900000-0x0000000004913000-memory.dmp

      Filesize

      76KB

    • memory/1488-185-0x00000000073A0000-0x00000000073B0000-memory.dmp

      Filesize

      64KB

    • memory/1488-184-0x0000000000400000-0x0000000002B9D000-memory.dmp

      Filesize

      39.6MB

    • memory/1488-173-0x0000000004900000-0x0000000004913000-memory.dmp

      Filesize

      76KB

    • memory/1488-181-0x0000000004900000-0x0000000004913000-memory.dmp

      Filesize

      76KB

    • memory/1488-151-0x00000000073B0000-0x0000000007954000-memory.dmp

      Filesize

      5.6MB

    • memory/1488-179-0x0000000004900000-0x0000000004913000-memory.dmp

      Filesize

      76KB

    • memory/1488-155-0x00000000073A0000-0x00000000073B0000-memory.dmp

      Filesize

      64KB

    • memory/1488-177-0x0000000004900000-0x0000000004913000-memory.dmp

      Filesize

      76KB

    • memory/1488-171-0x0000000004900000-0x0000000004913000-memory.dmp

      Filesize

      76KB

    • memory/1488-183-0x0000000004900000-0x0000000004913000-memory.dmp

      Filesize

      76KB

    • memory/1488-153-0x00000000073A0000-0x00000000073B0000-memory.dmp

      Filesize

      64KB

    • memory/1488-169-0x0000000004900000-0x0000000004913000-memory.dmp

      Filesize

      76KB

    • memory/1488-167-0x0000000004900000-0x0000000004913000-memory.dmp

      Filesize

      76KB

    • memory/1488-165-0x0000000004900000-0x0000000004913000-memory.dmp

      Filesize

      76KB

    • memory/1488-163-0x0000000004900000-0x0000000004913000-memory.dmp

      Filesize

      76KB

    • memory/1488-161-0x0000000004900000-0x0000000004913000-memory.dmp

      Filesize

      76KB

    • memory/1488-159-0x0000000004900000-0x0000000004913000-memory.dmp

      Filesize

      76KB

    • memory/1488-152-0x0000000002BE0000-0x0000000002C0D000-memory.dmp

      Filesize

      180KB

    • memory/1488-156-0x0000000004900000-0x0000000004913000-memory.dmp

      Filesize

      76KB

    • memory/1488-154-0x00000000073A0000-0x00000000073B0000-memory.dmp

      Filesize

      64KB