Analysis

  • max time kernel
    159s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2023, 20:00

General

  • Target

    dd08112ba8942c14db848019368ed40d.exe

  • Size

    696KB

  • MD5

    dd08112ba8942c14db848019368ed40d

  • SHA1

    2db5fdb287e16201a4d7612e5593acffff0a0848

  • SHA256

    101e6d28a5cb1216e2700a4236cb81df4a7e422e404c80bfb86462bdfef78ba9

  • SHA512

    7287a333f257190d4b1d1948671fbb3d76051209fce222d46d137bbac38f650ae2251f945415234cd8b1ce64e7f14b3a9529664887ec2c8fa293b60a9337cb6c

  • SSDEEP

    12288:ty904sMhGxdVU0uugGGx/qsvi8NU15z/kkxW6Yn0:tyi9wNDBqs68Ni5z/kK/Yn0

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd08112ba8942c14db848019368ed40d.exe
    "C:\Users\Admin\AppData\Local\Temp\dd08112ba8942c14db848019368ed40d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4272
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un737002.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un737002.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1356
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\97782074.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\97782074.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2552
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 1080
          4⤵
          • Program crash
          PID:3912
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk680629.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk680629.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:796
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2552 -ip 2552
    1⤵
      PID:1292

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un737002.exe

            Filesize

            542KB

            MD5

            33ed1c1c974634369710a79f39fbcf7c

            SHA1

            13235a75e2e3c835e37b28d01f675c1f668ae3fc

            SHA256

            03a1d70d56346a9145f854e2a615a0688a110a6aefbf9b907d57890361b73e79

            SHA512

            5f87e96bbc50515dc0f2177d9e400a5f615776b53124666fb43b8715a9b88d7ca1b635b434c5f3d86800702e351f4700b1c87b09535e7507ad385afe24c129d9

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un737002.exe

            Filesize

            542KB

            MD5

            33ed1c1c974634369710a79f39fbcf7c

            SHA1

            13235a75e2e3c835e37b28d01f675c1f668ae3fc

            SHA256

            03a1d70d56346a9145f854e2a615a0688a110a6aefbf9b907d57890361b73e79

            SHA512

            5f87e96bbc50515dc0f2177d9e400a5f615776b53124666fb43b8715a9b88d7ca1b635b434c5f3d86800702e351f4700b1c87b09535e7507ad385afe24c129d9

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\97782074.exe

            Filesize

            258KB

            MD5

            5c4441fa274f4e1338f5337f5dfe7610

            SHA1

            44e7a06668230575ffc14153712df3c341ceafe5

            SHA256

            ad4b12e1eda665409c95a9f9120b5706258cdcb53590ce7e9b1ab6d7702dfc27

            SHA512

            135ea509043f8215050c3d7d96701e85e6740cf697f14f24fbdb2c4309bd917ab930ea137141e0a8d1a14a28cd1fc364adfa7990f8c760c03e7a3e5f42d19481

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\97782074.exe

            Filesize

            258KB

            MD5

            5c4441fa274f4e1338f5337f5dfe7610

            SHA1

            44e7a06668230575ffc14153712df3c341ceafe5

            SHA256

            ad4b12e1eda665409c95a9f9120b5706258cdcb53590ce7e9b1ab6d7702dfc27

            SHA512

            135ea509043f8215050c3d7d96701e85e6740cf697f14f24fbdb2c4309bd917ab930ea137141e0a8d1a14a28cd1fc364adfa7990f8c760c03e7a3e5f42d19481

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk680629.exe

            Filesize

            340KB

            MD5

            2755880412919bf5b1bb139a47efb455

            SHA1

            99666a60a44c82c33430caaad2507b3d9fd18a27

            SHA256

            c0919163526f44e905a26d8bd85f21d9f7011c77baf5ae7cd2e29af6b12559cf

            SHA512

            55c8fe0c4ab715accf8600374867db6cbf52df01164e86705743687a2b9d90968a0383e501c1650af781d9add039dec9563626d0df4673bd1a5ed3be322832a6

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk680629.exe

            Filesize

            340KB

            MD5

            2755880412919bf5b1bb139a47efb455

            SHA1

            99666a60a44c82c33430caaad2507b3d9fd18a27

            SHA256

            c0919163526f44e905a26d8bd85f21d9f7011c77baf5ae7cd2e29af6b12559cf

            SHA512

            55c8fe0c4ab715accf8600374867db6cbf52df01164e86705743687a2b9d90968a0383e501c1650af781d9add039dec9563626d0df4673bd1a5ed3be322832a6

          • memory/796-219-0x0000000007160000-0x0000000007195000-memory.dmp

            Filesize

            212KB

          • memory/796-454-0x0000000007280000-0x0000000007290000-memory.dmp

            Filesize

            64KB

          • memory/796-996-0x0000000007280000-0x0000000007290000-memory.dmp

            Filesize

            64KB

          • memory/796-995-0x0000000007280000-0x0000000007290000-memory.dmp

            Filesize

            64KB

          • memory/796-994-0x0000000007280000-0x0000000007290000-memory.dmp

            Filesize

            64KB

          • memory/796-993-0x0000000007280000-0x0000000007290000-memory.dmp

            Filesize

            64KB

          • memory/796-991-0x0000000007280000-0x0000000007290000-memory.dmp

            Filesize

            64KB

          • memory/796-195-0x0000000007160000-0x0000000007195000-memory.dmp

            Filesize

            212KB

          • memory/796-989-0x000000000A320000-0x000000000A42A000-memory.dmp

            Filesize

            1.0MB

          • memory/796-197-0x0000000007160000-0x0000000007195000-memory.dmp

            Filesize

            212KB

          • memory/796-988-0x000000000A300000-0x000000000A312000-memory.dmp

            Filesize

            72KB

          • memory/796-987-0x0000000009CC0000-0x000000000A2D8000-memory.dmp

            Filesize

            6.1MB

          • memory/796-455-0x0000000007280000-0x0000000007290000-memory.dmp

            Filesize

            64KB

          • memory/796-458-0x0000000007280000-0x0000000007290000-memory.dmp

            Filesize

            64KB

          • memory/796-193-0x0000000007160000-0x0000000007195000-memory.dmp

            Filesize

            212KB

          • memory/796-201-0x0000000007160000-0x0000000007195000-memory.dmp

            Filesize

            212KB

          • memory/796-223-0x0000000007160000-0x0000000007195000-memory.dmp

            Filesize

            212KB

          • memory/796-221-0x0000000007160000-0x0000000007195000-memory.dmp

            Filesize

            212KB

          • memory/796-217-0x0000000007160000-0x0000000007195000-memory.dmp

            Filesize

            212KB

          • memory/796-215-0x0000000007160000-0x0000000007195000-memory.dmp

            Filesize

            212KB

          • memory/796-213-0x0000000007160000-0x0000000007195000-memory.dmp

            Filesize

            212KB

          • memory/796-211-0x0000000007160000-0x0000000007195000-memory.dmp

            Filesize

            212KB

          • memory/796-209-0x0000000007160000-0x0000000007195000-memory.dmp

            Filesize

            212KB

          • memory/796-207-0x0000000007160000-0x0000000007195000-memory.dmp

            Filesize

            212KB

          • memory/796-191-0x0000000002CD0000-0x0000000002D16000-memory.dmp

            Filesize

            280KB

          • memory/796-192-0x0000000007160000-0x0000000007195000-memory.dmp

            Filesize

            212KB

          • memory/796-205-0x0000000007160000-0x0000000007195000-memory.dmp

            Filesize

            212KB

          • memory/796-990-0x000000000A440000-0x000000000A47C000-memory.dmp

            Filesize

            240KB

          • memory/796-203-0x0000000007160000-0x0000000007195000-memory.dmp

            Filesize

            212KB

          • memory/796-199-0x0000000007160000-0x0000000007195000-memory.dmp

            Filesize

            212KB

          • memory/2552-174-0x0000000004A00000-0x0000000004A13000-memory.dmp

            Filesize

            76KB

          • memory/2552-164-0x0000000004A00000-0x0000000004A13000-memory.dmp

            Filesize

            76KB

          • memory/2552-151-0x00000000049E0000-0x00000000049F0000-memory.dmp

            Filesize

            64KB

          • memory/2552-149-0x00000000049E0000-0x00000000049F0000-memory.dmp

            Filesize

            64KB

          • memory/2552-150-0x00000000049E0000-0x00000000049F0000-memory.dmp

            Filesize

            64KB

          • memory/2552-185-0x0000000000400000-0x0000000002B9B000-memory.dmp

            Filesize

            39.6MB

          • memory/2552-183-0x00000000049E0000-0x00000000049F0000-memory.dmp

            Filesize

            64KB

          • memory/2552-182-0x00000000049E0000-0x00000000049F0000-memory.dmp

            Filesize

            64KB

          • memory/2552-181-0x0000000000400000-0x0000000002B9B000-memory.dmp

            Filesize

            39.6MB

          • memory/2552-148-0x0000000002BA0000-0x0000000002BCD000-memory.dmp

            Filesize

            180KB

          • memory/2552-180-0x0000000004A00000-0x0000000004A13000-memory.dmp

            Filesize

            76KB

          • memory/2552-178-0x0000000004A00000-0x0000000004A13000-memory.dmp

            Filesize

            76KB

          • memory/2552-176-0x0000000004A00000-0x0000000004A13000-memory.dmp

            Filesize

            76KB

          • memory/2552-172-0x0000000004A00000-0x0000000004A13000-memory.dmp

            Filesize

            76KB

          • memory/2552-170-0x0000000004A00000-0x0000000004A13000-memory.dmp

            Filesize

            76KB

          • memory/2552-168-0x0000000004A00000-0x0000000004A13000-memory.dmp

            Filesize

            76KB

          • memory/2552-166-0x0000000004A00000-0x0000000004A13000-memory.dmp

            Filesize

            76KB

          • memory/2552-162-0x0000000004A00000-0x0000000004A13000-memory.dmp

            Filesize

            76KB

          • memory/2552-160-0x0000000004A00000-0x0000000004A13000-memory.dmp

            Filesize

            76KB

          • memory/2552-158-0x0000000004A00000-0x0000000004A13000-memory.dmp

            Filesize

            76KB

          • memory/2552-156-0x0000000004A00000-0x0000000004A13000-memory.dmp

            Filesize

            76KB

          • memory/2552-154-0x0000000004A00000-0x0000000004A13000-memory.dmp

            Filesize

            76KB

          • memory/2552-153-0x0000000004A00000-0x0000000004A13000-memory.dmp

            Filesize

            76KB

          • memory/2552-152-0x0000000007240000-0x00000000077E4000-memory.dmp

            Filesize

            5.6MB