Analysis

  • max time kernel
    146s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2023, 20:35

General

  • Target

    fa5d18899c7e01709b1e3c77ba674bb9afd04224eee31aefb5fa520cf44740dc.exe

  • Size

    745KB

  • MD5

    e2eab84ffeb179c14f697d6d6daa8157

  • SHA1

    6580b67d0062c8bfae23c765d9cfcff77fabdd4c

  • SHA256

    fa5d18899c7e01709b1e3c77ba674bb9afd04224eee31aefb5fa520cf44740dc

  • SHA512

    fc4f90b1c1c55f88f9616141bd71fe51aa83a5f7bf96da5c744a589cf0d889164232ab89a81f4af65c795105c3784c6a4174d0c9abba74168a4d6d5304f9cd34

  • SSDEEP

    12288:by90hdBTVKFEeAkHfDbQePJzrX3TXXfSGUgaYnx7DCeM:byodBTEFEhSD8cvTXXfCgaYnx7DCeM

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa5d18899c7e01709b1e3c77ba674bb9afd04224eee31aefb5fa520cf44740dc.exe
    "C:\Users\Admin\AppData\Local\Temp\fa5d18899c7e01709b1e3c77ba674bb9afd04224eee31aefb5fa520cf44740dc.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:980
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un692317.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un692317.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:400
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\77300430.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\77300430.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1008
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1008 -s 1080
          4⤵
          • Program crash
          PID:2680
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk686482.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk686482.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:5064
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1008 -ip 1008
    1⤵
      PID:936

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un692317.exe

      Filesize

      591KB

      MD5

      98958c29b128613cdd9ec27f452a5d62

      SHA1

      169d29cabcdb2f07ffb3511166b625ef32ba77ae

      SHA256

      7e060debd8851f456e466af53fd3ef5a4638679bedfa5b2ece1afae3a70cf08f

      SHA512

      0fd2fae045f0b5a9f05c21fdf0220991134e0e47634e8dec07066a8ba2b8158bb3902385347a49301aa3320210c90691e8e843514083e849cbdda6a1ab0e3a75

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un692317.exe

      Filesize

      591KB

      MD5

      98958c29b128613cdd9ec27f452a5d62

      SHA1

      169d29cabcdb2f07ffb3511166b625ef32ba77ae

      SHA256

      7e060debd8851f456e466af53fd3ef5a4638679bedfa5b2ece1afae3a70cf08f

      SHA512

      0fd2fae045f0b5a9f05c21fdf0220991134e0e47634e8dec07066a8ba2b8158bb3902385347a49301aa3320210c90691e8e843514083e849cbdda6a1ab0e3a75

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\77300430.exe

      Filesize

      376KB

      MD5

      7b1f205d2c75bca47cfe640282989d49

      SHA1

      abbed1d3bd9a5c58f6768596bbbde82b5074bf6f

      SHA256

      d0dbae5482ca3f77161822ccba6b89a3fc45cc5456f252bf760a65749c0460c0

      SHA512

      820f89c89e694db349a8d077ca325b977d6ea06bf6226ba294b257ad63b55ff997f5d2f1628c8d8ed7e87edc4088359f8d3825ca1bc68a188b7772643dc45884

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\77300430.exe

      Filesize

      376KB

      MD5

      7b1f205d2c75bca47cfe640282989d49

      SHA1

      abbed1d3bd9a5c58f6768596bbbde82b5074bf6f

      SHA256

      d0dbae5482ca3f77161822ccba6b89a3fc45cc5456f252bf760a65749c0460c0

      SHA512

      820f89c89e694db349a8d077ca325b977d6ea06bf6226ba294b257ad63b55ff997f5d2f1628c8d8ed7e87edc4088359f8d3825ca1bc68a188b7772643dc45884

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk686482.exe

      Filesize

      459KB

      MD5

      6f24bfaa1cf53b6da8e13c280b257e9b

      SHA1

      c727ff6fa06f111ac9cba2623f65f2a7a9155128

      SHA256

      fb5d4c38294f7244091ad5c68097260572ca65ec165deead5013ee67073481e9

      SHA512

      a8b7cff2a2134b48f5cee5a0ec37c4246e0a1f54b12cce58078471b6c43771f77fbc6c06df04f65877375a3d990e9feb4fc7e7730fda0786c0c4453ce8ffc0f0

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk686482.exe

      Filesize

      459KB

      MD5

      6f24bfaa1cf53b6da8e13c280b257e9b

      SHA1

      c727ff6fa06f111ac9cba2623f65f2a7a9155128

      SHA256

      fb5d4c38294f7244091ad5c68097260572ca65ec165deead5013ee67073481e9

      SHA512

      a8b7cff2a2134b48f5cee5a0ec37c4246e0a1f54b12cce58078471b6c43771f77fbc6c06df04f65877375a3d990e9feb4fc7e7730fda0786c0c4453ce8ffc0f0

    • memory/1008-160-0x0000000002A60000-0x0000000002A72000-memory.dmp

      Filesize

      72KB

    • memory/1008-164-0x0000000002A60000-0x0000000002A72000-memory.dmp

      Filesize

      72KB

    • memory/1008-152-0x0000000004FF0000-0x0000000005000000-memory.dmp

      Filesize

      64KB

    • memory/1008-153-0x0000000002A60000-0x0000000002A72000-memory.dmp

      Filesize

      72KB

    • memory/1008-154-0x0000000002A60000-0x0000000002A72000-memory.dmp

      Filesize

      72KB

    • memory/1008-156-0x0000000002A60000-0x0000000002A72000-memory.dmp

      Filesize

      72KB

    • memory/1008-158-0x0000000002A60000-0x0000000002A72000-memory.dmp

      Filesize

      72KB

    • memory/1008-151-0x0000000004FF0000-0x0000000005000000-memory.dmp

      Filesize

      64KB

    • memory/1008-162-0x0000000002A60000-0x0000000002A72000-memory.dmp

      Filesize

      72KB

    • memory/1008-150-0x0000000004FF0000-0x0000000005000000-memory.dmp

      Filesize

      64KB

    • memory/1008-166-0x0000000002A60000-0x0000000002A72000-memory.dmp

      Filesize

      72KB

    • memory/1008-168-0x0000000002A60000-0x0000000002A72000-memory.dmp

      Filesize

      72KB

    • memory/1008-170-0x0000000002A60000-0x0000000002A72000-memory.dmp

      Filesize

      72KB

    • memory/1008-172-0x0000000002A60000-0x0000000002A72000-memory.dmp

      Filesize

      72KB

    • memory/1008-174-0x0000000002A60000-0x0000000002A72000-memory.dmp

      Filesize

      72KB

    • memory/1008-176-0x0000000002A60000-0x0000000002A72000-memory.dmp

      Filesize

      72KB

    • memory/1008-178-0x0000000002A60000-0x0000000002A72000-memory.dmp

      Filesize

      72KB

    • memory/1008-180-0x0000000002A60000-0x0000000002A72000-memory.dmp

      Filesize

      72KB

    • memory/1008-181-0x0000000000400000-0x0000000000803000-memory.dmp

      Filesize

      4.0MB

    • memory/1008-182-0x00000000008E0000-0x000000000090D000-memory.dmp

      Filesize

      180KB

    • memory/1008-183-0x0000000004FF0000-0x0000000005000000-memory.dmp

      Filesize

      64KB

    • memory/1008-184-0x0000000004FF0000-0x0000000005000000-memory.dmp

      Filesize

      64KB

    • memory/1008-185-0x0000000004FF0000-0x0000000005000000-memory.dmp

      Filesize

      64KB

    • memory/1008-187-0x0000000000400000-0x0000000000803000-memory.dmp

      Filesize

      4.0MB

    • memory/1008-149-0x0000000005000000-0x00000000055A4000-memory.dmp

      Filesize

      5.6MB

    • memory/1008-148-0x00000000008E0000-0x000000000090D000-memory.dmp

      Filesize

      180KB

    • memory/5064-226-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/5064-219-0x0000000004E60000-0x0000000004E70000-memory.dmp

      Filesize

      64KB

    • memory/5064-193-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/5064-198-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/5064-200-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/5064-202-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/5064-204-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/5064-206-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/5064-212-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/5064-210-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/5064-208-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/5064-216-0x0000000004E60000-0x0000000004E70000-memory.dmp

      Filesize

      64KB

    • memory/5064-215-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/5064-196-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/5064-228-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/5064-221-0x0000000004E60000-0x0000000004E70000-memory.dmp

      Filesize

      64KB

    • memory/5064-214-0x0000000000820000-0x0000000000866000-memory.dmp

      Filesize

      280KB

    • memory/5064-222-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/5064-224-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/5064-989-0x00000000078E0000-0x0000000007EF8000-memory.dmp

      Filesize

      6.1MB

    • memory/5064-194-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/5064-218-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

      Filesize

      212KB

    • memory/5064-990-0x0000000007F70000-0x0000000007F82000-memory.dmp

      Filesize

      72KB

    • memory/5064-991-0x0000000007F90000-0x000000000809A000-memory.dmp

      Filesize

      1.0MB

    • memory/5064-992-0x00000000080B0000-0x00000000080EC000-memory.dmp

      Filesize

      240KB

    • memory/5064-993-0x0000000004E60000-0x0000000004E70000-memory.dmp

      Filesize

      64KB

    • memory/5064-995-0x0000000004E60000-0x0000000004E70000-memory.dmp

      Filesize

      64KB

    • memory/5064-996-0x0000000004E60000-0x0000000004E70000-memory.dmp

      Filesize

      64KB

    • memory/5064-997-0x0000000004E60000-0x0000000004E70000-memory.dmp

      Filesize

      64KB