Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-05-2023 19:40

General

  • Target

    cd76a2f90473dae4a54925032783ba222535ae7c981a2672989cf3964cbc29c8.exe

  • Size

    701KB

  • MD5

    e76f6bf34e41c01ab28e7c9da86d0a0a

  • SHA1

    70c0594b7abb241cacb2d7abe75725a6957f06ba

  • SHA256

    cd76a2f90473dae4a54925032783ba222535ae7c981a2672989cf3964cbc29c8

  • SHA512

    31fa1068a7b1ba84f7a7bdd7d38fddc38a893209e775c95e6325ab5be8c7993c2c29568fd569e78d0e68a66dfb1031317e91ae95f4058fd09f648ab728aebe53

  • SSDEEP

    12288:Ay90eWTbXxZXbZnUSLUPkEWDOMqpTfR3+GhKzVpARuB6q2E3BLimrny8V:AyxgXxZX1n/LDEWDOfJIpARuB6Y

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd76a2f90473dae4a54925032783ba222535ae7c981a2672989cf3964cbc29c8.exe
    "C:\Users\Admin\AppData\Local\Temp\cd76a2f90473dae4a54925032783ba222535ae7c981a2672989cf3964cbc29c8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4444
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un038927.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un038927.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1536
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\91905041.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\91905041.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1164
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1164 -s 1084
          4⤵
          • Program crash
          PID:4124
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk315025.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk315025.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:724
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1164 -ip 1164
    1⤵
      PID:3192

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un038927.exe

      Filesize

      547KB

      MD5

      d1c141d7d363fd009940fd6b3cce6d64

      SHA1

      b20606df5cb4d9ddf955eba229f3ae54342e19ab

      SHA256

      49484fe66a47dde6ef4041bd087e96b4f0a1617014fac9d50734d52f05a69ba7

      SHA512

      bc87705991f101625324b9fa1a85491d526aa2cb97b0eed658cc5328b275e4f2b22b416bd820e7aef718baee8cae7a7f097e4f24c284f211e31e39690d24b3a0

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un038927.exe

      Filesize

      547KB

      MD5

      d1c141d7d363fd009940fd6b3cce6d64

      SHA1

      b20606df5cb4d9ddf955eba229f3ae54342e19ab

      SHA256

      49484fe66a47dde6ef4041bd087e96b4f0a1617014fac9d50734d52f05a69ba7

      SHA512

      bc87705991f101625324b9fa1a85491d526aa2cb97b0eed658cc5328b275e4f2b22b416bd820e7aef718baee8cae7a7f097e4f24c284f211e31e39690d24b3a0

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\91905041.exe

      Filesize

      269KB

      MD5

      12c7bcdf1a87bc1c994793f4ab83895e

      SHA1

      0d9d01d056d232e4f903fcc8e4ccc687a5ada59d

      SHA256

      b5ec2d3fb48c7fed056509f9cd37f3334d4d0574231d28333edf3c71687e9aa3

      SHA512

      9515f7270681ffe21fd465c505d0d05de594292a43d35f4e4dba91961da2f5d911ea29cdf31846858e460b2070e1a56871e88712cab5e71bcb5e4520b7016dcd

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\91905041.exe

      Filesize

      269KB

      MD5

      12c7bcdf1a87bc1c994793f4ab83895e

      SHA1

      0d9d01d056d232e4f903fcc8e4ccc687a5ada59d

      SHA256

      b5ec2d3fb48c7fed056509f9cd37f3334d4d0574231d28333edf3c71687e9aa3

      SHA512

      9515f7270681ffe21fd465c505d0d05de594292a43d35f4e4dba91961da2f5d911ea29cdf31846858e460b2070e1a56871e88712cab5e71bcb5e4520b7016dcd

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk315025.exe

      Filesize

      353KB

      MD5

      522c4ca06d3787fbb376fe56bc2b5931

      SHA1

      3fc1428257f6ec47716fe0ae22054f135aaa4d5f

      SHA256

      5c8b5b6abac933b35292d512ade991c92e01608025087a10fd2110f9153ebb25

      SHA512

      713ee4e6f291155b2b02f11131a6778e99dcbd11aa2603d9f333f4bdb07dec0d0396f510d92d29dcc59eaef6b005282f14936838485f532192c57f0722949d7d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk315025.exe

      Filesize

      353KB

      MD5

      522c4ca06d3787fbb376fe56bc2b5931

      SHA1

      3fc1428257f6ec47716fe0ae22054f135aaa4d5f

      SHA256

      5c8b5b6abac933b35292d512ade991c92e01608025087a10fd2110f9153ebb25

      SHA512

      713ee4e6f291155b2b02f11131a6778e99dcbd11aa2603d9f333f4bdb07dec0d0396f510d92d29dcc59eaef6b005282f14936838485f532192c57f0722949d7d

    • memory/724-218-0x0000000007150000-0x0000000007160000-memory.dmp

      Filesize

      64KB

    • memory/724-216-0x0000000007150000-0x0000000007160000-memory.dmp

      Filesize

      64KB

    • memory/724-996-0x0000000007150000-0x0000000007160000-memory.dmp

      Filesize

      64KB

    • memory/724-995-0x0000000007150000-0x0000000007160000-memory.dmp

      Filesize

      64KB

    • memory/724-191-0x0000000007750000-0x0000000007785000-memory.dmp

      Filesize

      212KB

    • memory/724-993-0x0000000007150000-0x0000000007160000-memory.dmp

      Filesize

      64KB

    • memory/724-196-0x0000000007750000-0x0000000007785000-memory.dmp

      Filesize

      212KB

    • memory/724-990-0x000000000A450000-0x000000000A48C000-memory.dmp

      Filesize

      240KB

    • memory/724-989-0x000000000A330000-0x000000000A43A000-memory.dmp

      Filesize

      1.0MB

    • memory/724-988-0x000000000A310000-0x000000000A322000-memory.dmp

      Filesize

      72KB

    • memory/724-987-0x0000000009C50000-0x000000000A268000-memory.dmp

      Filesize

      6.1MB

    • memory/724-228-0x0000000007750000-0x0000000007785000-memory.dmp

      Filesize

      212KB

    • memory/724-226-0x0000000007750000-0x0000000007785000-memory.dmp

      Filesize

      212KB

    • memory/724-220-0x0000000007150000-0x0000000007160000-memory.dmp

      Filesize

      64KB

    • memory/724-224-0x0000000007750000-0x0000000007785000-memory.dmp

      Filesize

      212KB

    • memory/724-222-0x0000000007750000-0x0000000007785000-memory.dmp

      Filesize

      212KB

    • memory/724-219-0x0000000007750000-0x0000000007785000-memory.dmp

      Filesize

      212KB

    • memory/724-215-0x0000000007750000-0x0000000007785000-memory.dmp

      Filesize

      212KB

    • memory/724-214-0x0000000002D10000-0x0000000002D56000-memory.dmp

      Filesize

      280KB

    • memory/724-212-0x0000000007750000-0x0000000007785000-memory.dmp

      Filesize

      212KB

    • memory/724-210-0x0000000007750000-0x0000000007785000-memory.dmp

      Filesize

      212KB

    • memory/724-194-0x0000000007750000-0x0000000007785000-memory.dmp

      Filesize

      212KB

    • memory/724-206-0x0000000007750000-0x0000000007785000-memory.dmp

      Filesize

      212KB

    • memory/724-204-0x0000000007750000-0x0000000007785000-memory.dmp

      Filesize

      212KB

    • memory/724-202-0x0000000007750000-0x0000000007785000-memory.dmp

      Filesize

      212KB

    • memory/724-192-0x0000000007750000-0x0000000007785000-memory.dmp

      Filesize

      212KB

    • memory/724-994-0x0000000007150000-0x0000000007160000-memory.dmp

      Filesize

      64KB

    • memory/724-991-0x0000000007150000-0x0000000007160000-memory.dmp

      Filesize

      64KB

    • memory/724-208-0x0000000007750000-0x0000000007785000-memory.dmp

      Filesize

      212KB

    • memory/724-198-0x0000000007750000-0x0000000007785000-memory.dmp

      Filesize

      212KB

    • memory/724-200-0x0000000007750000-0x0000000007785000-memory.dmp

      Filesize

      212KB

    • memory/1164-150-0x0000000007380000-0x0000000007390000-memory.dmp

      Filesize

      64KB

    • memory/1164-183-0x0000000007380000-0x0000000007390000-memory.dmp

      Filesize

      64KB

    • memory/1164-149-0x0000000007380000-0x0000000007390000-memory.dmp

      Filesize

      64KB

    • memory/1164-184-0x0000000007380000-0x0000000007390000-memory.dmp

      Filesize

      64KB

    • memory/1164-186-0x0000000000400000-0x0000000002B9E000-memory.dmp

      Filesize

      39.6MB

    • memory/1164-182-0x0000000007380000-0x0000000007390000-memory.dmp

      Filesize

      64KB

    • memory/1164-181-0x0000000000400000-0x0000000002B9E000-memory.dmp

      Filesize

      39.6MB

    • memory/1164-170-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/1164-148-0x0000000002BA0000-0x0000000002BCD000-memory.dmp

      Filesize

      180KB

    • memory/1164-178-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/1164-151-0x0000000007380000-0x0000000007390000-memory.dmp

      Filesize

      64KB

    • memory/1164-152-0x0000000007390000-0x0000000007934000-memory.dmp

      Filesize

      5.6MB

    • memory/1164-172-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/1164-174-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/1164-180-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/1164-168-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/1164-166-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/1164-164-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/1164-162-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/1164-160-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/1164-158-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/1164-156-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/1164-154-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/1164-153-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB

    • memory/1164-176-0x0000000007250000-0x0000000007262000-memory.dmp

      Filesize

      72KB