Analysis

  • max time kernel
    144s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-05-2023 18:58

General

  • Target

    adb8a516de9049b30c71a7fa8c22ea5fe5aad3d935163dae41d45133eb775db2.exe

  • Size

    695KB

  • MD5

    c55521c1467176dbdcaf2bd72ad83d11

  • SHA1

    3a30a341b20248a4b5a48a02d83d501b79264c5a

  • SHA256

    adb8a516de9049b30c71a7fa8c22ea5fe5aad3d935163dae41d45133eb775db2

  • SHA512

    f93e75618cc90e592e6ca5c8871084e81518f0aca592c27b514fde7b92a053b79dfa63429a2f01c17d3054f1eabe1afac06584bbb46a2bf7a040e4bb0351f4e1

  • SSDEEP

    12288:Ky90PpS6bt+3NzXfTbTlVSDHE+54BCUj5vleu2KdWrkei:KyUS3NzXrbJVSDr4BCU7WKdFei

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\adb8a516de9049b30c71a7fa8c22ea5fe5aad3d935163dae41d45133eb775db2.exe
    "C:\Users\Admin\AppData\Local\Temp\adb8a516de9049b30c71a7fa8c22ea5fe5aad3d935163dae41d45133eb775db2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4792
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un620182.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un620182.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2396
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\28300973.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\28300973.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1276
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1276 -s 1012
          4⤵
          • Program crash
          PID:3148
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk252687.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk252687.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:632
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1276 -ip 1276
    1⤵
      PID:4336

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un620182.exe

      Filesize

      541KB

      MD5

      43c7fef1784e5689affd3acf0e66311e

      SHA1

      314178ba12fec3e36a17a0bf0a7a81badc2e91b2

      SHA256

      ac19365be88b6887e08796079d4ed7a1dbe490ff009982537724ced5cfff1b70

      SHA512

      a83f77779963ac81aa5050412c5919ceaabdbb7fe105982f7fb2add5b42c3092694feda9bdff4afbf4c6ec51be1f5ff8971a6004a03fb6195b355ab9dc4bc46a

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un620182.exe

      Filesize

      541KB

      MD5

      43c7fef1784e5689affd3acf0e66311e

      SHA1

      314178ba12fec3e36a17a0bf0a7a81badc2e91b2

      SHA256

      ac19365be88b6887e08796079d4ed7a1dbe490ff009982537724ced5cfff1b70

      SHA512

      a83f77779963ac81aa5050412c5919ceaabdbb7fe105982f7fb2add5b42c3092694feda9bdff4afbf4c6ec51be1f5ff8971a6004a03fb6195b355ab9dc4bc46a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\28300973.exe

      Filesize

      257KB

      MD5

      d5f97e5be9b0acc9bbe4b3a64fdbd2b8

      SHA1

      f1801712a5d8845011fe7ea78837508477b04557

      SHA256

      c3eff1a2308a9a230d725850489923d7ceb406715bcb70aa3510196aeae2364c

      SHA512

      9023bd8d20f35849074fdcf9fb1291bf282d7e5d971d7cd62b9780de1c2e9b84c81284878b83c0de8234280fde95645cf30d1abd242512ffe472863c3ea81858

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\28300973.exe

      Filesize

      257KB

      MD5

      d5f97e5be9b0acc9bbe4b3a64fdbd2b8

      SHA1

      f1801712a5d8845011fe7ea78837508477b04557

      SHA256

      c3eff1a2308a9a230d725850489923d7ceb406715bcb70aa3510196aeae2364c

      SHA512

      9023bd8d20f35849074fdcf9fb1291bf282d7e5d971d7cd62b9780de1c2e9b84c81284878b83c0de8234280fde95645cf30d1abd242512ffe472863c3ea81858

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk252687.exe

      Filesize

      340KB

      MD5

      47188fe98539153b5ac77be5203a7bf0

      SHA1

      76e4eb46c1ab67297a0bf1f5a32d6480c47e3c4a

      SHA256

      1a9034682c12255f29e36f8417ac92c1905431ec775621b93b21466192c5b913

      SHA512

      098a0a0dbe356271992fc59e32550fa09f6d13969fb017eebffac73012f6e9db67c75d64e7edd7004d112903e6e53eafbc2b7842c74eb9ed5d2e7216c901fbc1

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk252687.exe

      Filesize

      340KB

      MD5

      47188fe98539153b5ac77be5203a7bf0

      SHA1

      76e4eb46c1ab67297a0bf1f5a32d6480c47e3c4a

      SHA256

      1a9034682c12255f29e36f8417ac92c1905431ec775621b93b21466192c5b913

      SHA512

      098a0a0dbe356271992fc59e32550fa09f6d13969fb017eebffac73012f6e9db67c75d64e7edd7004d112903e6e53eafbc2b7842c74eb9ed5d2e7216c901fbc1

    • memory/632-214-0x0000000007710000-0x0000000007745000-memory.dmp

      Filesize

      212KB

    • memory/632-212-0x0000000007710000-0x0000000007745000-memory.dmp

      Filesize

      212KB

    • memory/632-996-0x0000000007110000-0x0000000007120000-memory.dmp

      Filesize

      64KB

    • memory/632-995-0x0000000007110000-0x0000000007120000-memory.dmp

      Filesize

      64KB

    • memory/632-192-0x0000000007710000-0x0000000007745000-memory.dmp

      Filesize

      212KB

    • memory/632-993-0x0000000007110000-0x0000000007120000-memory.dmp

      Filesize

      64KB

    • memory/632-194-0x0000000007710000-0x0000000007745000-memory.dmp

      Filesize

      212KB

    • memory/632-990-0x000000000A440000-0x000000000A47C000-memory.dmp

      Filesize

      240KB

    • memory/632-989-0x000000000A320000-0x000000000A42A000-memory.dmp

      Filesize

      1.0MB

    • memory/632-988-0x000000000A300000-0x000000000A312000-memory.dmp

      Filesize

      72KB

    • memory/632-987-0x0000000009C40000-0x000000000A258000-memory.dmp

      Filesize

      6.1MB

    • memory/632-228-0x0000000007710000-0x0000000007745000-memory.dmp

      Filesize

      212KB

    • memory/632-226-0x0000000007710000-0x0000000007745000-memory.dmp

      Filesize

      212KB

    • memory/632-224-0x0000000007710000-0x0000000007745000-memory.dmp

      Filesize

      212KB

    • memory/632-222-0x0000000007710000-0x0000000007745000-memory.dmp

      Filesize

      212KB

    • memory/632-220-0x0000000007710000-0x0000000007745000-memory.dmp

      Filesize

      212KB

    • memory/632-218-0x0000000007710000-0x0000000007745000-memory.dmp

      Filesize

      212KB

    • memory/632-216-0x0000000007710000-0x0000000007745000-memory.dmp

      Filesize

      212KB

    • memory/632-210-0x0000000007710000-0x0000000007745000-memory.dmp

      Filesize

      212KB

    • memory/632-208-0x0000000007710000-0x0000000007745000-memory.dmp

      Filesize

      212KB

    • memory/632-206-0x0000000007710000-0x0000000007745000-memory.dmp

      Filesize

      212KB

    • memory/632-197-0x0000000002CD0000-0x0000000002D16000-memory.dmp

      Filesize

      280KB

    • memory/632-203-0x0000000007110000-0x0000000007120000-memory.dmp

      Filesize

      64KB

    • memory/632-201-0x0000000007710000-0x0000000007745000-memory.dmp

      Filesize

      212KB

    • memory/632-200-0x0000000007110000-0x0000000007120000-memory.dmp

      Filesize

      64KB

    • memory/632-191-0x0000000007710000-0x0000000007745000-memory.dmp

      Filesize

      212KB

    • memory/632-994-0x0000000007110000-0x0000000007120000-memory.dmp

      Filesize

      64KB

    • memory/632-991-0x0000000007110000-0x0000000007120000-memory.dmp

      Filesize

      64KB

    • memory/632-204-0x0000000007710000-0x0000000007745000-memory.dmp

      Filesize

      212KB

    • memory/632-196-0x0000000007710000-0x0000000007745000-memory.dmp

      Filesize

      212KB

    • memory/632-199-0x0000000007110000-0x0000000007120000-memory.dmp

      Filesize

      64KB

    • memory/1276-150-0x0000000004B00000-0x0000000004B13000-memory.dmp

      Filesize

      76KB

    • memory/1276-183-0x00000000072C0000-0x00000000072D0000-memory.dmp

      Filesize

      64KB

    • memory/1276-149-0x00000000072D0000-0x0000000007874000-memory.dmp

      Filesize

      5.6MB

    • memory/1276-185-0x00000000072C0000-0x00000000072D0000-memory.dmp

      Filesize

      64KB

    • memory/1276-186-0x0000000000400000-0x0000000002B9B000-memory.dmp

      Filesize

      39.6MB

    • memory/1276-184-0x00000000072C0000-0x00000000072D0000-memory.dmp

      Filesize

      64KB

    • memory/1276-181-0x0000000000400000-0x0000000002B9B000-memory.dmp

      Filesize

      39.6MB

    • memory/1276-173-0x0000000004B00000-0x0000000004B13000-memory.dmp

      Filesize

      76KB

    • memory/1276-148-0x0000000002BC0000-0x0000000002BED000-memory.dmp

      Filesize

      180KB

    • memory/1276-179-0x00000000072C0000-0x00000000072D0000-memory.dmp

      Filesize

      64KB

    • memory/1276-151-0x0000000004B00000-0x0000000004B13000-memory.dmp

      Filesize

      76KB

    • memory/1276-153-0x0000000004B00000-0x0000000004B13000-memory.dmp

      Filesize

      76KB

    • memory/1276-175-0x0000000004B00000-0x0000000004B13000-memory.dmp

      Filesize

      76KB

    • memory/1276-177-0x0000000004B00000-0x0000000004B13000-memory.dmp

      Filesize

      76KB

    • memory/1276-180-0x00000000072C0000-0x00000000072D0000-memory.dmp

      Filesize

      64KB

    • memory/1276-171-0x0000000004B00000-0x0000000004B13000-memory.dmp

      Filesize

      76KB

    • memory/1276-165-0x0000000004B00000-0x0000000004B13000-memory.dmp

      Filesize

      76KB

    • memory/1276-167-0x0000000004B00000-0x0000000004B13000-memory.dmp

      Filesize

      76KB

    • memory/1276-169-0x0000000004B00000-0x0000000004B13000-memory.dmp

      Filesize

      76KB

    • memory/1276-163-0x0000000004B00000-0x0000000004B13000-memory.dmp

      Filesize

      76KB

    • memory/1276-161-0x0000000004B00000-0x0000000004B13000-memory.dmp

      Filesize

      76KB

    • memory/1276-159-0x0000000004B00000-0x0000000004B13000-memory.dmp

      Filesize

      76KB

    • memory/1276-157-0x0000000004B00000-0x0000000004B13000-memory.dmp

      Filesize

      76KB

    • memory/1276-155-0x0000000004B00000-0x0000000004B13000-memory.dmp

      Filesize

      76KB

    • memory/1276-178-0x00000000072C0000-0x00000000072D0000-memory.dmp

      Filesize

      64KB