Analysis

  • max time kernel
    151s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2023, 19:55

General

  • Target

    d9992fb396aba64346224cd4cc5de7f27220c67623fde519267d7a268d257a31.exe

  • Size

    707KB

  • MD5

    5d72159004c0c68b3319d0068dcb730f

  • SHA1

    61bd2a870581970f5ac0b0b239776032ee94941d

  • SHA256

    d9992fb396aba64346224cd4cc5de7f27220c67623fde519267d7a268d257a31

  • SHA512

    fe5df3b3d0fb8b2da009cbf12a5feacfc2324aa4a580952902a8a49d770a08dd0b2e9e2e47cfe36bd5dee97390392d80de768ecd209c9adc0f366e1ae9fb2ddf

  • SSDEEP

    12288:HMrBy90gCCkuMVnXgJpIAM+/bsR7eLpewAAQ9R2k2CR84cBZ68aSaXEBcj3FPpr8:Cy4LVnXgJ+Avs1O9AAQ9cFCR84cLtaSx

Malware Config

Signatures

  • Detects Redline Stealer samples 3 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9992fb396aba64346224cd4cc5de7f27220c67623fde519267d7a268d257a31.exe
    "C:\Users\Admin\AppData\Local\Temp\d9992fb396aba64346224cd4cc5de7f27220c67623fde519267d7a268d257a31.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3740
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3853606.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3853606.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3652
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g3364337.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g3364337.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4560
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5114354.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5114354.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:376
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 376 -s 1088
          4⤵
          • Program crash
          PID:1172
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7185555.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7185555.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4328
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 696
        3⤵
        • Program crash
        PID:2240
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 764
        3⤵
        • Program crash
        PID:3428
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 856
        3⤵
        • Program crash
        PID:4052
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 976
        3⤵
        • Program crash
        PID:2968
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 1012
        3⤵
        • Program crash
        PID:4080
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 956
        3⤵
        • Program crash
        PID:3212
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 1220
        3⤵
        • Program crash
        PID:3988
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 1232
        3⤵
        • Program crash
        PID:1840
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 1324
        3⤵
        • Program crash
        PID:2184
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 1364
        3⤵
        • Program crash
        PID:1552
      • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
        "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
        3⤵
        • Executes dropped EXE
        PID:4244
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4244 -s 692
          4⤵
          • Program crash
          PID:4416
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4244 -s 844
          4⤵
          • Program crash
          PID:1136
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4244 -s 912
          4⤵
          • Program crash
          PID:5072
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 1332
        3⤵
        • Program crash
        PID:2272
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 376 -ip 376
    1⤵
      PID:4824
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4328 -ip 4328
      1⤵
        PID:4240
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4328 -ip 4328
        1⤵
          PID:2876
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4328 -ip 4328
          1⤵
            PID:1372
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4328 -ip 4328
            1⤵
              PID:984
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4328 -ip 4328
              1⤵
                PID:4752
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4328 -ip 4328
                1⤵
                  PID:2384
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4328 -ip 4328
                  1⤵
                    PID:3200
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4328 -ip 4328
                    1⤵
                      PID:3744
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4328 -ip 4328
                      1⤵
                        PID:1480
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4328 -ip 4328
                        1⤵
                          PID:3780
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4328 -ip 4328
                          1⤵
                            PID:4148
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4244 -ip 4244
                            1⤵
                              PID:4676
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4244 -ip 4244
                              1⤵
                                PID:1240
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4244 -ip 4244
                                1⤵
                                  PID:2816

                                Network

                                MITRE ATT&CK Enterprise v6

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7185555.exe

                                  Filesize

                                  340KB

                                  MD5

                                  b64cb3b5ac26e26aabba5882c88498e1

                                  SHA1

                                  b94354f9f07522bd04fa9a1b724d8a6008902eb7

                                  SHA256

                                  a001c843fedc8fecb01880099c9ca74c9dd560b7c613a56d4abfda6811eab65c

                                  SHA512

                                  64e3b69f4394637d70799a1aae5d1b37e949092d7ab8bf12afd1583feae420ddeb00faf563ab49425d7b564fa709c8dbb45321290e55e839ccdf642e577b1953

                                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i7185555.exe

                                  Filesize

                                  340KB

                                  MD5

                                  b64cb3b5ac26e26aabba5882c88498e1

                                  SHA1

                                  b94354f9f07522bd04fa9a1b724d8a6008902eb7

                                  SHA256

                                  a001c843fedc8fecb01880099c9ca74c9dd560b7c613a56d4abfda6811eab65c

                                  SHA512

                                  64e3b69f4394637d70799a1aae5d1b37e949092d7ab8bf12afd1583feae420ddeb00faf563ab49425d7b564fa709c8dbb45321290e55e839ccdf642e577b1953

                                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3853606.exe

                                  Filesize

                                  416KB

                                  MD5

                                  e8bb96c2d872a5e63402d5516c1894ac

                                  SHA1

                                  e1bc788b7c08bf168170c8753bd402ff7b089b5f

                                  SHA256

                                  83b471a78dea32883876db467e60e6c8fae70d1e901c0d8868ea8722d6fed25c

                                  SHA512

                                  0043ad98b7918b4f24ac4455a448b157b765ef1c558e4afa9365719661c4718569dafbccce896f94d0c61e74ed6c693df2846994417affe08fbba568d82bcb78

                                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3853606.exe

                                  Filesize

                                  416KB

                                  MD5

                                  e8bb96c2d872a5e63402d5516c1894ac

                                  SHA1

                                  e1bc788b7c08bf168170c8753bd402ff7b089b5f

                                  SHA256

                                  83b471a78dea32883876db467e60e6c8fae70d1e901c0d8868ea8722d6fed25c

                                  SHA512

                                  0043ad98b7918b4f24ac4455a448b157b765ef1c558e4afa9365719661c4718569dafbccce896f94d0c61e74ed6c693df2846994417affe08fbba568d82bcb78

                                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g3364337.exe

                                  Filesize

                                  136KB

                                  MD5

                                  a737e9507a7d38850157debdc1e5d208

                                  SHA1

                                  50b952ef777e16503fa8393539e7cbd583417062

                                  SHA256

                                  8ca6a5b10fea08013d4892e791bc52b44e10bf59828159990eca706c0d1a9018

                                  SHA512

                                  26c99885fc26703a20c3076b0e30c6d00eaf0b2286e4b12ee8341dc4cb853f7c95a8d4bc9c97d0cbe09b990c15c76cacecebed0aef7ae4dd900c905f32c36b9e

                                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g3364337.exe

                                  Filesize

                                  136KB

                                  MD5

                                  a737e9507a7d38850157debdc1e5d208

                                  SHA1

                                  50b952ef777e16503fa8393539e7cbd583417062

                                  SHA256

                                  8ca6a5b10fea08013d4892e791bc52b44e10bf59828159990eca706c0d1a9018

                                  SHA512

                                  26c99885fc26703a20c3076b0e30c6d00eaf0b2286e4b12ee8341dc4cb853f7c95a8d4bc9c97d0cbe09b990c15c76cacecebed0aef7ae4dd900c905f32c36b9e

                                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5114354.exe

                                  Filesize

                                  360KB

                                  MD5

                                  af0672f3d12f39b9098e7d2c1501f0e8

                                  SHA1

                                  ffd638249c513996800164549f46b21b85b8354f

                                  SHA256

                                  e18f311da080846d27481c57c44dd7f5930d189f0259f99f43600a90de0456ad

                                  SHA512

                                  76b738c92aa22e349f668775e0928773cc512a60c430979021fd686b6f2d5eb5cd42befd4d226aedc7425a1435ec94f501e651074b0ba3228792710a3c17e0a1

                                • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h5114354.exe

                                  Filesize

                                  360KB

                                  MD5

                                  af0672f3d12f39b9098e7d2c1501f0e8

                                  SHA1

                                  ffd638249c513996800164549f46b21b85b8354f

                                  SHA256

                                  e18f311da080846d27481c57c44dd7f5930d189f0259f99f43600a90de0456ad

                                  SHA512

                                  76b738c92aa22e349f668775e0928773cc512a60c430979021fd686b6f2d5eb5cd42befd4d226aedc7425a1435ec94f501e651074b0ba3228792710a3c17e0a1

                                • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                                  Filesize

                                  340KB

                                  MD5

                                  b64cb3b5ac26e26aabba5882c88498e1

                                  SHA1

                                  b94354f9f07522bd04fa9a1b724d8a6008902eb7

                                  SHA256

                                  a001c843fedc8fecb01880099c9ca74c9dd560b7c613a56d4abfda6811eab65c

                                  SHA512

                                  64e3b69f4394637d70799a1aae5d1b37e949092d7ab8bf12afd1583feae420ddeb00faf563ab49425d7b564fa709c8dbb45321290e55e839ccdf642e577b1953

                                • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                                  Filesize

                                  340KB

                                  MD5

                                  b64cb3b5ac26e26aabba5882c88498e1

                                  SHA1

                                  b94354f9f07522bd04fa9a1b724d8a6008902eb7

                                  SHA256

                                  a001c843fedc8fecb01880099c9ca74c9dd560b7c613a56d4abfda6811eab65c

                                  SHA512

                                  64e3b69f4394637d70799a1aae5d1b37e949092d7ab8bf12afd1583feae420ddeb00faf563ab49425d7b564fa709c8dbb45321290e55e839ccdf642e577b1953

                                • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

                                  Filesize

                                  340KB

                                  MD5

                                  b64cb3b5ac26e26aabba5882c88498e1

                                  SHA1

                                  b94354f9f07522bd04fa9a1b724d8a6008902eb7

                                  SHA256

                                  a001c843fedc8fecb01880099c9ca74c9dd560b7c613a56d4abfda6811eab65c

                                  SHA512

                                  64e3b69f4394637d70799a1aae5d1b37e949092d7ab8bf12afd1583feae420ddeb00faf563ab49425d7b564fa709c8dbb45321290e55e839ccdf642e577b1953

                                • memory/376-198-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/376-187-0x0000000004C70000-0x0000000004C82000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/376-207-0x0000000000400000-0x00000000006F4000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/376-203-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/376-202-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/376-201-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/376-199-0x0000000000400000-0x00000000006F4000-memory.dmp

                                  Filesize

                                  3.0MB

                                • memory/376-197-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/376-196-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/376-195-0x0000000004C70000-0x0000000004C82000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/376-167-0x0000000002340000-0x000000000236D000-memory.dmp

                                  Filesize

                                  180KB

                                • memory/376-169-0x0000000004C70000-0x0000000004C82000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/376-168-0x0000000004C70000-0x0000000004C82000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/376-171-0x0000000004C70000-0x0000000004C82000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/376-173-0x0000000004C70000-0x0000000004C82000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/376-175-0x0000000004C70000-0x0000000004C82000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/376-177-0x0000000004C70000-0x0000000004C82000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/376-179-0x0000000004C70000-0x0000000004C82000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/376-181-0x0000000004C70000-0x0000000004C82000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/376-183-0x0000000004C70000-0x0000000004C82000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/376-185-0x0000000004C70000-0x0000000004C82000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/376-193-0x0000000004C70000-0x0000000004C82000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/376-189-0x0000000004C70000-0x0000000004C82000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/376-191-0x0000000004C70000-0x0000000004C82000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/4328-213-0x0000000000AA0000-0x0000000000AD5000-memory.dmp

                                  Filesize

                                  212KB

                                • memory/4328-232-0x0000000000400000-0x00000000006EF000-memory.dmp

                                  Filesize

                                  2.9MB

                                • memory/4328-214-0x0000000000400000-0x00000000006EF000-memory.dmp

                                  Filesize

                                  2.9MB

                                • memory/4560-152-0x0000000007020000-0x0000000007030000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4560-151-0x0000000007020000-0x0000000007030000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4560-160-0x0000000008240000-0x000000000825E000-memory.dmp

                                  Filesize

                                  120KB

                                • memory/4560-159-0x00000000091D0000-0x00000000096FC000-memory.dmp

                                  Filesize

                                  5.2MB

                                • memory/4560-158-0x0000000008AD0000-0x0000000008C92000-memory.dmp

                                  Filesize

                                  1.8MB

                                • memory/4560-157-0x0000000008140000-0x00000000081B6000-memory.dmp

                                  Filesize

                                  472KB

                                • memory/4560-156-0x0000000008520000-0x0000000008AC4000-memory.dmp

                                  Filesize

                                  5.6MB

                                • memory/4560-155-0x0000000007ED0000-0x0000000007F62000-memory.dmp

                                  Filesize

                                  584KB

                                • memory/4560-150-0x0000000007070000-0x000000000717A000-memory.dmp

                                  Filesize

                                  1.0MB

                                • memory/4560-161-0x00000000082C0000-0x0000000008310000-memory.dmp

                                  Filesize

                                  320KB

                                • memory/4560-154-0x0000000007BC0000-0x0000000007C26000-memory.dmp

                                  Filesize

                                  408KB

                                • memory/4560-149-0x0000000006F40000-0x0000000006F52000-memory.dmp

                                  Filesize

                                  72KB

                                • memory/4560-148-0x00000000074A0000-0x0000000007AB8000-memory.dmp

                                  Filesize

                                  6.1MB

                                • memory/4560-147-0x00000000000F0000-0x0000000000118000-memory.dmp

                                  Filesize

                                  160KB

                                • memory/4560-153-0x0000000006FA0000-0x0000000006FDC000-memory.dmp

                                  Filesize

                                  240KB