Analysis

  • max time kernel
    152s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-05-2023 18:28

General

  • Target

    65e927b43ad5e5c9e01570c197da93530191b622d90abad16e486d69157942b9.exe

  • Size

    599KB

  • MD5

    9fcf210a9e62502d2332c6cf658b50d5

  • SHA1

    91ed85654df42d0f41c02cc344bac9f11c858f34

  • SHA256

    65e927b43ad5e5c9e01570c197da93530191b622d90abad16e486d69157942b9

  • SHA512

    ebbb43549280464616956cfa60d1755deeaf0918c46f1023f7c8c0105b1362b267b9190cb49eabadf9f04618d14d8a21cdb2810ffedbadfb33ecdf916146774c

  • SSDEEP

    12288:sMrSy90mYT6rZjgyo7HoX1Id3CWyEh62U2+6cWCLxCs88Zpg2FaUOZ/t:OymTmJyHgasPv2RwK2bO7

Malware Config

Signatures

  • Detects Redline Stealer samples 3 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 17 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65e927b43ad5e5c9e01570c197da93530191b622d90abad16e486d69157942b9.exe
    "C:\Users\Admin\AppData\Local\Temp\65e927b43ad5e5c9e01570c197da93530191b622d90abad16e486d69157942b9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1360
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4520007.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4520007.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3308
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9594817.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9594817.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:652
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6152104.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6152104.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1888
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m1594315.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m1594315.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3292
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 696
        3⤵
        • Program crash
        PID:2360
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 748
        3⤵
        • Program crash
        PID:3228
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 856
        3⤵
        • Program crash
        PID:4344
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 880
        3⤵
        • Program crash
        PID:2228
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 1000
        3⤵
        • Program crash
        PID:4188
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 976
        3⤵
        • Program crash
        PID:1004
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 1204
        3⤵
        • Program crash
        PID:1336
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 1224
        3⤵
        • Program crash
        PID:4272
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 1316
        3⤵
        • Program crash
        PID:4304
      • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
        3⤵
        • Executes dropped EXE
        PID:2172
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 692
          4⤵
          • Program crash
          PID:4820
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 832
          4⤵
          • Program crash
          PID:1736
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 788
          4⤵
          • Program crash
          PID:2892
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 1056
          4⤵
          • Program crash
          PID:748
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 1076
          4⤵
          • Program crash
          PID:4996
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 1076
          4⤵
          • Program crash
          PID:1140
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 1056
          4⤵
          • Program crash
          PID:4400
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 1308
        3⤵
        • Program crash
        PID:3112
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 3292 -ip 3292
    1⤵
      PID:2428
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3292 -ip 3292
      1⤵
        PID:2636
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3292 -ip 3292
        1⤵
          PID:1240
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3292 -ip 3292
          1⤵
            PID:3740
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 3292 -ip 3292
            1⤵
              PID:5004
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3292 -ip 3292
              1⤵
                PID:3516
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3292 -ip 3292
                1⤵
                  PID:2568
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3292 -ip 3292
                  1⤵
                    PID:4548
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3292 -ip 3292
                    1⤵
                      PID:3952
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3292 -ip 3292
                      1⤵
                        PID:1060
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2172 -ip 2172
                        1⤵
                          PID:3340
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2172 -ip 2172
                          1⤵
                            PID:4944
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 2172 -ip 2172
                            1⤵
                              PID:3976
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2172 -ip 2172
                              1⤵
                                PID:1664
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2172 -ip 2172
                                1⤵
                                  PID:4484
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2172 -ip 2172
                                  1⤵
                                    PID:3312
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2172 -ip 2172
                                    1⤵
                                      PID:2096

                                    Network

                                    MITRE ATT&CK Enterprise v6

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m1594315.exe

                                      Filesize

                                      339KB

                                      MD5

                                      f7680cd47798241ba96ea97e9aba488a

                                      SHA1

                                      0ab00f2aa273435a4ddf6fdcc910afdd1079155a

                                      SHA256

                                      74f10b901f35b22177c1ac43c290c36611b383a40de4faaf9feacaa6d86be6a8

                                      SHA512

                                      2ceff59af4c369c7b7531450116c992092f7ab6141bc9dd74eb5a6bb36e4120686c0381a4e234c40f0ae5551f10c520c592d93e2485f3479e90507bc79f19155

                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m1594315.exe

                                      Filesize

                                      339KB

                                      MD5

                                      f7680cd47798241ba96ea97e9aba488a

                                      SHA1

                                      0ab00f2aa273435a4ddf6fdcc910afdd1079155a

                                      SHA256

                                      74f10b901f35b22177c1ac43c290c36611b383a40de4faaf9feacaa6d86be6a8

                                      SHA512

                                      2ceff59af4c369c7b7531450116c992092f7ab6141bc9dd74eb5a6bb36e4120686c0381a4e234c40f0ae5551f10c520c592d93e2485f3479e90507bc79f19155

                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4520007.exe

                                      Filesize

                                      307KB

                                      MD5

                                      e4d1ae8baed68e4158c2a0e0271241ae

                                      SHA1

                                      ab5d03a6d558323053b181e2934d841e594f9080

                                      SHA256

                                      b291cd810edaf2c15fc09d39fbbc0867cfc6b24f8a708ea13d26872b7ea1ebbb

                                      SHA512

                                      7e2400cc5d9f59840ea5b0f05c2559ec03f7f8d4809fc69a1cfa12b1d4dab46e88fdc3f857e36ffced6a6e87a1eeb905df008d52aea8b1c70b5e32a57365803a

                                    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4520007.exe

                                      Filesize

                                      307KB

                                      MD5

                                      e4d1ae8baed68e4158c2a0e0271241ae

                                      SHA1

                                      ab5d03a6d558323053b181e2934d841e594f9080

                                      SHA256

                                      b291cd810edaf2c15fc09d39fbbc0867cfc6b24f8a708ea13d26872b7ea1ebbb

                                      SHA512

                                      7e2400cc5d9f59840ea5b0f05c2559ec03f7f8d4809fc69a1cfa12b1d4dab46e88fdc3f857e36ffced6a6e87a1eeb905df008d52aea8b1c70b5e32a57365803a

                                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9594817.exe

                                      Filesize

                                      137KB

                                      MD5

                                      3c86b66f6b7eb077a276399f63928dfb

                                      SHA1

                                      df370706189600c6e338fc5801dfa3e9dbe24ed4

                                      SHA256

                                      40d329b81431fe6b10aa348762c0cd94d500426f422f96a2e9999823e62ce367

                                      SHA512

                                      5d53ef8c1c08e45ddbad80571598faebbd17cadc6b86145ee03f734db482181ea913b953a8655abc4f39b75fd9c132a1e4d07cc7a3b2ba94e898f4195bc5d805

                                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9594817.exe

                                      Filesize

                                      137KB

                                      MD5

                                      3c86b66f6b7eb077a276399f63928dfb

                                      SHA1

                                      df370706189600c6e338fc5801dfa3e9dbe24ed4

                                      SHA256

                                      40d329b81431fe6b10aa348762c0cd94d500426f422f96a2e9999823e62ce367

                                      SHA512

                                      5d53ef8c1c08e45ddbad80571598faebbd17cadc6b86145ee03f734db482181ea913b953a8655abc4f39b75fd9c132a1e4d07cc7a3b2ba94e898f4195bc5d805

                                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6152104.exe

                                      Filesize

                                      175KB

                                      MD5

                                      1a9386ede9644869205c20849dd34d31

                                      SHA1

                                      b9f7917d31b85d161dae7f5e244a0c29f23ca48a

                                      SHA256

                                      b740d1a000f4cc25f64333945800ba955243a792836ceed806699e355a8787a8

                                      SHA512

                                      d36b695ceb93270a5fd693cb498ff729788d93a5b40697414ea4a28b510d4d22aa69096f37287cf8bf6daee10edbb78b7c4f30b4d1d3c47f492c4d1cec9bc2b4

                                    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6152104.exe

                                      Filesize

                                      175KB

                                      MD5

                                      1a9386ede9644869205c20849dd34d31

                                      SHA1

                                      b9f7917d31b85d161dae7f5e244a0c29f23ca48a

                                      SHA256

                                      b740d1a000f4cc25f64333945800ba955243a792836ceed806699e355a8787a8

                                      SHA512

                                      d36b695ceb93270a5fd693cb498ff729788d93a5b40697414ea4a28b510d4d22aa69096f37287cf8bf6daee10edbb78b7c4f30b4d1d3c47f492c4d1cec9bc2b4

                                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                                      Filesize

                                      339KB

                                      MD5

                                      f7680cd47798241ba96ea97e9aba488a

                                      SHA1

                                      0ab00f2aa273435a4ddf6fdcc910afdd1079155a

                                      SHA256

                                      74f10b901f35b22177c1ac43c290c36611b383a40de4faaf9feacaa6d86be6a8

                                      SHA512

                                      2ceff59af4c369c7b7531450116c992092f7ab6141bc9dd74eb5a6bb36e4120686c0381a4e234c40f0ae5551f10c520c592d93e2485f3479e90507bc79f19155

                                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                                      Filesize

                                      339KB

                                      MD5

                                      f7680cd47798241ba96ea97e9aba488a

                                      SHA1

                                      0ab00f2aa273435a4ddf6fdcc910afdd1079155a

                                      SHA256

                                      74f10b901f35b22177c1ac43c290c36611b383a40de4faaf9feacaa6d86be6a8

                                      SHA512

                                      2ceff59af4c369c7b7531450116c992092f7ab6141bc9dd74eb5a6bb36e4120686c0381a4e234c40f0ae5551f10c520c592d93e2485f3479e90507bc79f19155

                                    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                                      Filesize

                                      339KB

                                      MD5

                                      f7680cd47798241ba96ea97e9aba488a

                                      SHA1

                                      0ab00f2aa273435a4ddf6fdcc910afdd1079155a

                                      SHA256

                                      74f10b901f35b22177c1ac43c290c36611b383a40de4faaf9feacaa6d86be6a8

                                      SHA512

                                      2ceff59af4c369c7b7531450116c992092f7ab6141bc9dd74eb5a6bb36e4120686c0381a4e234c40f0ae5551f10c520c592d93e2485f3479e90507bc79f19155

                                    • memory/652-150-0x0000000007570000-0x000000000767A000-memory.dmp

                                      Filesize

                                      1.0MB

                                    • memory/652-156-0x0000000008A10000-0x0000000008FB4000-memory.dmp

                                      Filesize

                                      5.6MB

                                    • memory/652-151-0x00000000074A0000-0x00000000074DC000-memory.dmp

                                      Filesize

                                      240KB

                                    • memory/652-152-0x00000000077B0000-0x00000000077C0000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/652-153-0x00000000077B0000-0x00000000077C0000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/652-154-0x0000000007830000-0x0000000007896000-memory.dmp

                                      Filesize

                                      408KB

                                    • memory/652-155-0x00000000083C0000-0x0000000008452000-memory.dmp

                                      Filesize

                                      584KB

                                    • memory/652-149-0x0000000007440000-0x0000000007452000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/652-157-0x0000000008460000-0x00000000084B0000-memory.dmp

                                      Filesize

                                      320KB

                                    • memory/652-158-0x0000000008640000-0x00000000086B6000-memory.dmp

                                      Filesize

                                      472KB

                                    • memory/652-159-0x0000000008FC0000-0x0000000009182000-memory.dmp

                                      Filesize

                                      1.8MB

                                    • memory/652-160-0x00000000096C0000-0x0000000009BEC000-memory.dmp

                                      Filesize

                                      5.2MB

                                    • memory/652-161-0x00000000088C0000-0x00000000088DE000-memory.dmp

                                      Filesize

                                      120KB

                                    • memory/652-148-0x00000000079C0000-0x0000000007FD8000-memory.dmp

                                      Filesize

                                      6.1MB

                                    • memory/652-147-0x0000000000730000-0x0000000000758000-memory.dmp

                                      Filesize

                                      160KB

                                    • memory/1888-166-0x0000000002410000-0x0000000002422000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/1888-194-0x0000000002380000-0x0000000002390000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/1888-173-0x0000000002410000-0x0000000002422000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/1888-175-0x0000000002410000-0x0000000002422000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/1888-177-0x0000000002410000-0x0000000002422000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/1888-179-0x0000000002410000-0x0000000002422000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/1888-181-0x0000000002410000-0x0000000002422000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/1888-183-0x0000000002410000-0x0000000002422000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/1888-189-0x0000000002410000-0x0000000002422000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/1888-187-0x0000000002410000-0x0000000002422000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/1888-191-0x0000000002410000-0x0000000002422000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/1888-185-0x0000000002410000-0x0000000002422000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/1888-193-0x0000000002410000-0x0000000002422000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/1888-171-0x0000000002410000-0x0000000002422000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/1888-195-0x0000000002380000-0x0000000002390000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/1888-196-0x0000000002380000-0x0000000002390000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/1888-197-0x0000000002380000-0x0000000002390000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/1888-198-0x0000000002380000-0x0000000002390000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/1888-199-0x0000000002380000-0x0000000002390000-memory.dmp

                                      Filesize

                                      64KB

                                    • memory/1888-169-0x0000000002410000-0x0000000002422000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/1888-167-0x0000000002410000-0x0000000002422000-memory.dmp

                                      Filesize

                                      72KB

                                    • memory/2172-222-0x0000000000400000-0x00000000006EF000-memory.dmp

                                      Filesize

                                      2.9MB

                                    • memory/3292-205-0x00000000009A0000-0x00000000009D5000-memory.dmp

                                      Filesize

                                      212KB

                                    • memory/3292-206-0x0000000000400000-0x00000000006EF000-memory.dmp

                                      Filesize

                                      2.9MB

                                    • memory/3292-221-0x0000000000400000-0x00000000006EF000-memory.dmp

                                      Filesize

                                      2.9MB