Analysis

  • max time kernel
    154s
  • max time network
    206s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2023, 20:39

General

  • Target

    fed450e41edba81aed38a86c9c53514083134a494a53532c3ddc3e626e221ed1.exe

  • Size

    694KB

  • MD5

    bbaafbdb443496e35fae1651a1f5fd7e

  • SHA1

    b9dd0d0c99b28f3609ec1e971bef53246bfdd767

  • SHA256

    fed450e41edba81aed38a86c9c53514083134a494a53532c3ddc3e626e221ed1

  • SHA512

    41d53c8b322f661fd8955774826d3537596cbe8a5eb03b60bb7410b24d07cb5bdd7eb7eeb3d9ba0341f730cf30680d764d5d6569ec84ff151b213b2fdf25dcee

  • SSDEEP

    12288:5y902CwHfsR4s9R+VwpFTsmgw76ZbGdsXnfWw6FW18bEKiA+ih51q+6M5OuK:5ykwg4s9REoFdgUeNj6FW18bEB4xo

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fed450e41edba81aed38a86c9c53514083134a494a53532c3ddc3e626e221ed1.exe
    "C:\Users\Admin\AppData\Local\Temp\fed450e41edba81aed38a86c9c53514083134a494a53532c3ddc3e626e221ed1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:872
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un032897.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un032897.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3148
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\33577360.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\33577360.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2060
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 1084
          4⤵
          • Program crash
          PID:5044
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk569024.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk569024.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:772
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2060 -ip 2060
    1⤵
      PID:1916

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un032897.exe

      Filesize

      540KB

      MD5

      c156a62fe0ef7df4b6e986070262af4c

      SHA1

      ec9f458e7c26973722e79afc3043f728db6b7ac0

      SHA256

      c85da4a16efe22776b66252456a5f1c378cd77b22b5d7bebedc18e8afab740d8

      SHA512

      4dbef0330f60473afdec82e762fd9fed55bff145ba30c4c036ca39b25574516a81789c9a61a2100d61182ad0b7ef75b912f878fe6c09776460235c6c34eb4a79

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un032897.exe

      Filesize

      540KB

      MD5

      c156a62fe0ef7df4b6e986070262af4c

      SHA1

      ec9f458e7c26973722e79afc3043f728db6b7ac0

      SHA256

      c85da4a16efe22776b66252456a5f1c378cd77b22b5d7bebedc18e8afab740d8

      SHA512

      4dbef0330f60473afdec82e762fd9fed55bff145ba30c4c036ca39b25574516a81789c9a61a2100d61182ad0b7ef75b912f878fe6c09776460235c6c34eb4a79

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\33577360.exe

      Filesize

      258KB

      MD5

      4c378860a298115bec7e20da39925ff0

      SHA1

      605bf99cc00454555a1e0093fad96af9ae788154

      SHA256

      6af9b081f3cc15e15814a7b156a40a75d5e9201219b3d6ec4732d6818cc522dc

      SHA512

      2a462f0f04946557329e7ca5c366735d1a90df87c0c7cb60b1d4d1ab23c67e77f81e7e1a882cc175657a9744ebd4f0d00d51e905dbdb1d20c3bf214ec5b808df

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\33577360.exe

      Filesize

      258KB

      MD5

      4c378860a298115bec7e20da39925ff0

      SHA1

      605bf99cc00454555a1e0093fad96af9ae788154

      SHA256

      6af9b081f3cc15e15814a7b156a40a75d5e9201219b3d6ec4732d6818cc522dc

      SHA512

      2a462f0f04946557329e7ca5c366735d1a90df87c0c7cb60b1d4d1ab23c67e77f81e7e1a882cc175657a9744ebd4f0d00d51e905dbdb1d20c3bf214ec5b808df

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk569024.exe

      Filesize

      340KB

      MD5

      3f66de8927a238963a26b00e5f1e7353

      SHA1

      18dbfe339dae4a938473656ca67b105d16aab779

      SHA256

      2f50eee00cf4205d6e069de43d6f2ea689f5f023357dda174be5a4e04fe2c609

      SHA512

      98151cae1b76bf3ef44124034b43bbc7576b9fb58225aeddc3d52f4230008863f35db98f2a4dd23ff602e01c5c6aa11ba1145ed7c96f8eedd41078f40f2a7b14

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk569024.exe

      Filesize

      340KB

      MD5

      3f66de8927a238963a26b00e5f1e7353

      SHA1

      18dbfe339dae4a938473656ca67b105d16aab779

      SHA256

      2f50eee00cf4205d6e069de43d6f2ea689f5f023357dda174be5a4e04fe2c609

      SHA512

      98151cae1b76bf3ef44124034b43bbc7576b9fb58225aeddc3d52f4230008863f35db98f2a4dd23ff602e01c5c6aa11ba1145ed7c96f8eedd41078f40f2a7b14

    • memory/772-224-0x00000000072E0000-0x00000000072F0000-memory.dmp

      Filesize

      64KB

    • memory/772-220-0x00000000072E0000-0x00000000072F0000-memory.dmp

      Filesize

      64KB

    • memory/772-995-0x00000000072E0000-0x00000000072F0000-memory.dmp

      Filesize

      64KB

    • memory/772-994-0x000000000A340000-0x000000000A44A000-memory.dmp

      Filesize

      1.0MB

    • memory/772-993-0x00000000072A0000-0x00000000072B2000-memory.dmp

      Filesize

      72KB

    • memory/772-992-0x0000000009D20000-0x000000000A338000-memory.dmp

      Filesize

      6.1MB

    • memory/772-226-0x0000000004C30000-0x0000000004C65000-memory.dmp

      Filesize

      212KB

    • memory/772-228-0x0000000004C30000-0x0000000004C65000-memory.dmp

      Filesize

      212KB

    • memory/772-996-0x00000000072E0000-0x00000000072F0000-memory.dmp

      Filesize

      64KB

    • memory/772-218-0x0000000002EE0000-0x0000000002F26000-memory.dmp

      Filesize

      280KB

    • memory/772-200-0x0000000004C30000-0x0000000004C65000-memory.dmp

      Filesize

      212KB

    • memory/772-222-0x0000000004C30000-0x0000000004C65000-memory.dmp

      Filesize

      212KB

    • memory/772-223-0x00000000072E0000-0x00000000072F0000-memory.dmp

      Filesize

      64KB

    • memory/772-997-0x00000000072E0000-0x00000000072F0000-memory.dmp

      Filesize

      64KB

    • memory/772-219-0x0000000004C30000-0x0000000004C65000-memory.dmp

      Filesize

      212KB

    • memory/772-216-0x0000000004C30000-0x0000000004C65000-memory.dmp

      Filesize

      212KB

    • memory/772-214-0x0000000004C30000-0x0000000004C65000-memory.dmp

      Filesize

      212KB

    • memory/772-212-0x0000000004C30000-0x0000000004C65000-memory.dmp

      Filesize

      212KB

    • memory/772-210-0x0000000004C30000-0x0000000004C65000-memory.dmp

      Filesize

      212KB

    • memory/772-208-0x0000000004C30000-0x0000000004C65000-memory.dmp

      Filesize

      212KB

    • memory/772-206-0x0000000004C30000-0x0000000004C65000-memory.dmp

      Filesize

      212KB

    • memory/772-204-0x0000000004C30000-0x0000000004C65000-memory.dmp

      Filesize

      212KB

    • memory/772-202-0x0000000004C30000-0x0000000004C65000-memory.dmp

      Filesize

      212KB

    • memory/772-999-0x00000000072E0000-0x00000000072F0000-memory.dmp

      Filesize

      64KB

    • memory/772-1000-0x000000000A450000-0x000000000A48C000-memory.dmp

      Filesize

      240KB

    • memory/772-196-0x0000000004C30000-0x0000000004C65000-memory.dmp

      Filesize

      212KB

    • memory/772-195-0x0000000004C30000-0x0000000004C65000-memory.dmp

      Filesize

      212KB

    • memory/772-198-0x0000000004C30000-0x0000000004C65000-memory.dmp

      Filesize

      212KB

    • memory/2060-161-0x0000000004B00000-0x0000000004B13000-memory.dmp

      Filesize

      76KB

    • memory/2060-188-0x0000000000400000-0x0000000002B9B000-memory.dmp

      Filesize

      39.6MB

    • memory/2060-184-0x00000000072E0000-0x00000000072F0000-memory.dmp

      Filesize

      64KB

    • memory/2060-183-0x00000000072E0000-0x00000000072F0000-memory.dmp

      Filesize

      64KB

    • memory/2060-182-0x00000000072E0000-0x00000000072F0000-memory.dmp

      Filesize

      64KB

    • memory/2060-181-0x0000000004B00000-0x0000000004B13000-memory.dmp

      Filesize

      76KB

    • memory/2060-179-0x0000000004B00000-0x0000000004B13000-memory.dmp

      Filesize

      76KB

    • memory/2060-177-0x0000000004B00000-0x0000000004B13000-memory.dmp

      Filesize

      76KB

    • memory/2060-175-0x0000000004B00000-0x0000000004B13000-memory.dmp

      Filesize

      76KB

    • memory/2060-173-0x0000000004B00000-0x0000000004B13000-memory.dmp

      Filesize

      76KB

    • memory/2060-171-0x0000000004B00000-0x0000000004B13000-memory.dmp

      Filesize

      76KB

    • memory/2060-169-0x0000000004B00000-0x0000000004B13000-memory.dmp

      Filesize

      76KB

    • memory/2060-167-0x0000000004B00000-0x0000000004B13000-memory.dmp

      Filesize

      76KB

    • memory/2060-165-0x0000000004B00000-0x0000000004B13000-memory.dmp

      Filesize

      76KB

    • memory/2060-163-0x0000000004B00000-0x0000000004B13000-memory.dmp

      Filesize

      76KB

    • memory/2060-159-0x0000000004B00000-0x0000000004B13000-memory.dmp

      Filesize

      76KB

    • memory/2060-157-0x0000000004B00000-0x0000000004B13000-memory.dmp

      Filesize

      76KB

    • memory/2060-155-0x0000000004B00000-0x0000000004B13000-memory.dmp

      Filesize

      76KB

    • memory/2060-154-0x0000000004B00000-0x0000000004B13000-memory.dmp

      Filesize

      76KB

    • memory/2060-153-0x0000000000400000-0x0000000002B9B000-memory.dmp

      Filesize

      39.6MB

    • memory/2060-152-0x00000000072E0000-0x00000000072F0000-memory.dmp

      Filesize

      64KB

    • memory/2060-151-0x00000000072E0000-0x00000000072F0000-memory.dmp

      Filesize

      64KB

    • memory/2060-150-0x00000000072F0000-0x0000000007894000-memory.dmp

      Filesize

      5.6MB

    • memory/2060-148-0x0000000002BE0000-0x0000000002C0D000-memory.dmp

      Filesize

      180KB

    • memory/2060-149-0x00000000072E0000-0x00000000072F0000-memory.dmp

      Filesize

      64KB