Analysis

  • max time kernel
    144s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2023, 19:46

General

  • Target

    d167832211109205969ba2a2a353006ed6638d63891633c7b0f540312dc08653.exe

  • Size

    704KB

  • MD5

    50488eb45e7e5af0aa57bc1ecbd85859

  • SHA1

    5e4e7b29e159d986caeca3675aa4621371785db6

  • SHA256

    d167832211109205969ba2a2a353006ed6638d63891633c7b0f540312dc08653

  • SHA512

    1694dcf6aa402e99e81ecbb06b424356276af798f834818cd0494b2f0cd7ae94d530a6050eea7a9c8762825b95a9b2f7ff3f0ce3643280fbcec621ad9d340623

  • SSDEEP

    12288:Ly90Yv/MW4VbNmR8CXCrI19vZqopAW4I1NzCK/Iz/MC4/KlgUhMZ:Ly1v/MRfmR8XI17qi1L/Ir1VgUhO

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d167832211109205969ba2a2a353006ed6638d63891633c7b0f540312dc08653.exe
    "C:\Users\Admin\AppData\Local\Temp\d167832211109205969ba2a2a353006ed6638d63891633c7b0f540312dc08653.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4868
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un059142.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un059142.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3588
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr621982.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr621982.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1404
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1404 -s 1080
          4⤵
          • Program crash
          PID:116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu576556.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu576556.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4164
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1404 -ip 1404
    1⤵
      PID:216

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un059142.exe

      Filesize

      550KB

      MD5

      84580215f90feacd03d48d8fc2d6afc8

      SHA1

      d83be9ffaf30530356bdc6eb451c9a6e70525713

      SHA256

      be8b39b4b3308a0791f30e0ea01e7423828d46b7f31a0e71054f7be41f637a44

      SHA512

      2430072b2275e51984015d2dab327f8d4a69d7d10f8455cae7362ef39e8cb3113d0a6fb2ce87583c29919706c227f65e6ecf0498318e0320174090f1ac5f4f2f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un059142.exe

      Filesize

      550KB

      MD5

      84580215f90feacd03d48d8fc2d6afc8

      SHA1

      d83be9ffaf30530356bdc6eb451c9a6e70525713

      SHA256

      be8b39b4b3308a0791f30e0ea01e7423828d46b7f31a0e71054f7be41f637a44

      SHA512

      2430072b2275e51984015d2dab327f8d4a69d7d10f8455cae7362ef39e8cb3113d0a6fb2ce87583c29919706c227f65e6ecf0498318e0320174090f1ac5f4f2f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr621982.exe

      Filesize

      278KB

      MD5

      39985530de26edda1dc4b5f3a5ae7f20

      SHA1

      9723071acd8abdb8fff1e1630a774eb789cd9767

      SHA256

      e21aca0a4b51ac03580c214e237dd28ad573b2692d8a0363c66d7fd76c4906b2

      SHA512

      ba2f5519121670e55c315c7f671d36fc2ad0e0fb6171c1eff3f2909a1f0e825da940bc62faa6e5999b0f16577e66d4301de19774cb92b12f65a06cfa3aebb973

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr621982.exe

      Filesize

      278KB

      MD5

      39985530de26edda1dc4b5f3a5ae7f20

      SHA1

      9723071acd8abdb8fff1e1630a774eb789cd9767

      SHA256

      e21aca0a4b51ac03580c214e237dd28ad573b2692d8a0363c66d7fd76c4906b2

      SHA512

      ba2f5519121670e55c315c7f671d36fc2ad0e0fb6171c1eff3f2909a1f0e825da940bc62faa6e5999b0f16577e66d4301de19774cb92b12f65a06cfa3aebb973

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu576556.exe

      Filesize

      361KB

      MD5

      70c83f3ac70dc491046401d97b5b4128

      SHA1

      ed3abe11e4999902721beba0bb5b31b2a6f9125b

      SHA256

      cc4f4f36116a9fb5e2615ababbba1b487568f75be9aec0fca037c8d0c3db91f8

      SHA512

      65349183ecacd3a5d9358e667e61563de33abcadd82c3973516790e881734b63c5d750bc9b9df0f0ad31d8bc293b977ca37c849f123487853179b6129aeb1d07

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu576556.exe

      Filesize

      361KB

      MD5

      70c83f3ac70dc491046401d97b5b4128

      SHA1

      ed3abe11e4999902721beba0bb5b31b2a6f9125b

      SHA256

      cc4f4f36116a9fb5e2615ababbba1b487568f75be9aec0fca037c8d0c3db91f8

      SHA512

      65349183ecacd3a5d9358e667e61563de33abcadd82c3973516790e881734b63c5d750bc9b9df0f0ad31d8bc293b977ca37c849f123487853179b6129aeb1d07

    • memory/1404-164-0x0000000007110000-0x0000000007122000-memory.dmp

      Filesize

      72KB

    • memory/1404-150-0x00000000072E0000-0x0000000007884000-memory.dmp

      Filesize

      5.6MB

    • memory/1404-152-0x00000000072D0000-0x00000000072E0000-memory.dmp

      Filesize

      64KB

    • memory/1404-153-0x0000000007110000-0x0000000007122000-memory.dmp

      Filesize

      72KB

    • memory/1404-154-0x0000000007110000-0x0000000007122000-memory.dmp

      Filesize

      72KB

    • memory/1404-156-0x0000000007110000-0x0000000007122000-memory.dmp

      Filesize

      72KB

    • memory/1404-158-0x0000000007110000-0x0000000007122000-memory.dmp

      Filesize

      72KB

    • memory/1404-160-0x0000000007110000-0x0000000007122000-memory.dmp

      Filesize

      72KB

    • memory/1404-162-0x0000000007110000-0x0000000007122000-memory.dmp

      Filesize

      72KB

    • memory/1404-151-0x00000000072D0000-0x00000000072E0000-memory.dmp

      Filesize

      64KB

    • memory/1404-166-0x0000000007110000-0x0000000007122000-memory.dmp

      Filesize

      72KB

    • memory/1404-168-0x0000000007110000-0x0000000007122000-memory.dmp

      Filesize

      72KB

    • memory/1404-170-0x0000000007110000-0x0000000007122000-memory.dmp

      Filesize

      72KB

    • memory/1404-172-0x0000000007110000-0x0000000007122000-memory.dmp

      Filesize

      72KB

    • memory/1404-174-0x0000000007110000-0x0000000007122000-memory.dmp

      Filesize

      72KB

    • memory/1404-176-0x0000000007110000-0x0000000007122000-memory.dmp

      Filesize

      72KB

    • memory/1404-178-0x0000000007110000-0x0000000007122000-memory.dmp

      Filesize

      72KB

    • memory/1404-180-0x0000000007110000-0x0000000007122000-memory.dmp

      Filesize

      72KB

    • memory/1404-181-0x0000000000400000-0x0000000002BAF000-memory.dmp

      Filesize

      39.7MB

    • memory/1404-182-0x00000000072D0000-0x00000000072E0000-memory.dmp

      Filesize

      64KB

    • memory/1404-183-0x00000000072D0000-0x00000000072E0000-memory.dmp

      Filesize

      64KB

    • memory/1404-184-0x00000000072D0000-0x00000000072E0000-memory.dmp

      Filesize

      64KB

    • memory/1404-186-0x0000000000400000-0x0000000002BAF000-memory.dmp

      Filesize

      39.7MB

    • memory/1404-149-0x00000000072D0000-0x00000000072E0000-memory.dmp

      Filesize

      64KB

    • memory/1404-148-0x0000000002C80000-0x0000000002CAD000-memory.dmp

      Filesize

      180KB

    • memory/4164-227-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4164-217-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4164-993-0x000000000A460000-0x000000000A49C000-memory.dmp

      Filesize

      240KB

    • memory/4164-195-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4164-201-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4164-203-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4164-205-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4164-207-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4164-209-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4164-210-0x0000000002CA0000-0x0000000002CE6000-memory.dmp

      Filesize

      280KB

    • memory/4164-213-0x0000000007280000-0x0000000007290000-memory.dmp

      Filesize

      64KB

    • memory/4164-215-0x0000000007280000-0x0000000007290000-memory.dmp

      Filesize

      64KB

    • memory/4164-216-0x0000000007280000-0x0000000007290000-memory.dmp

      Filesize

      64KB

    • memory/4164-194-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4164-199-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4164-221-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4164-212-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4164-223-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4164-225-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4164-991-0x000000000A320000-0x000000000A332000-memory.dmp

      Filesize

      72KB

    • memory/4164-990-0x0000000009CC0000-0x000000000A2D8000-memory.dmp

      Filesize

      6.1MB

    • memory/4164-219-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4164-992-0x000000000A340000-0x000000000A44A000-memory.dmp

      Filesize

      1.0MB

    • memory/4164-197-0x0000000007170000-0x00000000071A5000-memory.dmp

      Filesize

      212KB

    • memory/4164-994-0x0000000007280000-0x0000000007290000-memory.dmp

      Filesize

      64KB

    • memory/4164-996-0x0000000007280000-0x0000000007290000-memory.dmp

      Filesize

      64KB

    • memory/4164-997-0x0000000007280000-0x0000000007290000-memory.dmp

      Filesize

      64KB

    • memory/4164-998-0x0000000007280000-0x0000000007290000-memory.dmp

      Filesize

      64KB

    • memory/4164-999-0x0000000007280000-0x0000000007290000-memory.dmp

      Filesize

      64KB