Analysis

  • max time kernel
    146s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-05-2023 21:32

General

  • Target

    409bec3a7ade14b4afde539d6bbbe36d9c3aaff2796da953cc96ff37f7e8f57c.exe

  • Size

    690KB

  • MD5

    bedec3f68e81c94687011bd42826fa30

  • SHA1

    d9330ea0651fe8dc507bf875731226e23e20aecd

  • SHA256

    409bec3a7ade14b4afde539d6bbbe36d9c3aaff2796da953cc96ff37f7e8f57c

  • SHA512

    40c632f546d9d6170cbecbbed902edd499a4629802a6f8bece11c0cdad2abf82882ea57c1a11e9553fbde7d791ab3ae98fb613c410ebaf9cc04425dd28968c63

  • SSDEEP

    12288:Py90w95D1XSpkeYUA4LHfMI7Bwh74ZQIJoM00yK12VB9Kl2CiEMjiJEV:Pyx5pckeYUA4LfnKhLPMTyS2+diZ+K

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\409bec3a7ade14b4afde539d6bbbe36d9c3aaff2796da953cc96ff37f7e8f57c.exe
    "C:\Users\Admin\AppData\Local\Temp\409bec3a7ade14b4afde539d6bbbe36d9c3aaff2796da953cc96ff37f7e8f57c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4972
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un551109.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un551109.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5104
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\14404211.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\14404211.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1168
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 1004
          4⤵
          • Program crash
          PID:5072
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk063711.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk063711.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1864
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1168 -ip 1168
    1⤵
      PID:3112

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un551109.exe

      Filesize

      536KB

      MD5

      91f383cb9a29abec482915613fd6524d

      SHA1

      62a3388432be26273ed153f9684d7ecb68b1dd71

      SHA256

      2183963b41cb70e603ee380c0db667ec550769dd92f30ffcce5df5f9fa90cbda

      SHA512

      828363c661c3e8bb6abb210788a9acbde4b733e65947d5d01c96afb951c91ad35d6cb31512eabea4c12a92369ddb494573282ca81324f51809a3e835b1bcaf0c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un551109.exe

      Filesize

      536KB

      MD5

      91f383cb9a29abec482915613fd6524d

      SHA1

      62a3388432be26273ed153f9684d7ecb68b1dd71

      SHA256

      2183963b41cb70e603ee380c0db667ec550769dd92f30ffcce5df5f9fa90cbda

      SHA512

      828363c661c3e8bb6abb210788a9acbde4b733e65947d5d01c96afb951c91ad35d6cb31512eabea4c12a92369ddb494573282ca81324f51809a3e835b1bcaf0c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\14404211.exe

      Filesize

      259KB

      MD5

      28946ab545213bc4d521c744fd29fbf4

      SHA1

      d983b5e4c30b55373df177351d6e2cafb85ed5f3

      SHA256

      f28abe3b44179871d7f9983e5b2977bd9069922317bc9cf8cb15e8a1ee699daa

      SHA512

      e82bf04f4617937f556641672af9dbf058491d16b7197ec08f852b10e7a9a613ac39dcf455bd7600cadde107c82112c847b1fd5bce3ac35f47799e9be4892f31

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\14404211.exe

      Filesize

      259KB

      MD5

      28946ab545213bc4d521c744fd29fbf4

      SHA1

      d983b5e4c30b55373df177351d6e2cafb85ed5f3

      SHA256

      f28abe3b44179871d7f9983e5b2977bd9069922317bc9cf8cb15e8a1ee699daa

      SHA512

      e82bf04f4617937f556641672af9dbf058491d16b7197ec08f852b10e7a9a613ac39dcf455bd7600cadde107c82112c847b1fd5bce3ac35f47799e9be4892f31

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk063711.exe

      Filesize

      341KB

      MD5

      511371d6be0a0826c6e4eed3915d5f3d

      SHA1

      e5d1538059bdd1c3e369dfa7f0f389f45530bf94

      SHA256

      817419070ca2f2c7a519edf84ca99fde60523e34bae2b412c973d306105ece1a

      SHA512

      961f4d1ec010c8833dfb0f4499425cc4279ab95534c072133f4caad6dd7811769a8334f0371c4c5d1b4d85095c32db4fb1ef62994c09f638a45d7d4e5f8bb7f0

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk063711.exe

      Filesize

      341KB

      MD5

      511371d6be0a0826c6e4eed3915d5f3d

      SHA1

      e5d1538059bdd1c3e369dfa7f0f389f45530bf94

      SHA256

      817419070ca2f2c7a519edf84ca99fde60523e34bae2b412c973d306105ece1a

      SHA512

      961f4d1ec010c8833dfb0f4499425cc4279ab95534c072133f4caad6dd7811769a8334f0371c4c5d1b4d85095c32db4fb1ef62994c09f638a45d7d4e5f8bb7f0

    • memory/1168-148-0x0000000000500000-0x000000000052D000-memory.dmp

      Filesize

      180KB

    • memory/1168-149-0x0000000004C50000-0x0000000004C60000-memory.dmp

      Filesize

      64KB

    • memory/1168-150-0x0000000004C60000-0x0000000005204000-memory.dmp

      Filesize

      5.6MB

    • memory/1168-151-0x0000000004C50000-0x0000000004C60000-memory.dmp

      Filesize

      64KB

    • memory/1168-152-0x0000000002670000-0x0000000002683000-memory.dmp

      Filesize

      76KB

    • memory/1168-153-0x0000000002670000-0x0000000002683000-memory.dmp

      Filesize

      76KB

    • memory/1168-155-0x0000000002670000-0x0000000002683000-memory.dmp

      Filesize

      76KB

    • memory/1168-157-0x0000000002670000-0x0000000002683000-memory.dmp

      Filesize

      76KB

    • memory/1168-159-0x0000000002670000-0x0000000002683000-memory.dmp

      Filesize

      76KB

    • memory/1168-161-0x0000000002670000-0x0000000002683000-memory.dmp

      Filesize

      76KB

    • memory/1168-163-0x0000000002670000-0x0000000002683000-memory.dmp

      Filesize

      76KB

    • memory/1168-165-0x0000000002670000-0x0000000002683000-memory.dmp

      Filesize

      76KB

    • memory/1168-167-0x0000000002670000-0x0000000002683000-memory.dmp

      Filesize

      76KB

    • memory/1168-169-0x0000000002670000-0x0000000002683000-memory.dmp

      Filesize

      76KB

    • memory/1168-171-0x0000000002670000-0x0000000002683000-memory.dmp

      Filesize

      76KB

    • memory/1168-173-0x0000000002670000-0x0000000002683000-memory.dmp

      Filesize

      76KB

    • memory/1168-175-0x0000000002670000-0x0000000002683000-memory.dmp

      Filesize

      76KB

    • memory/1168-177-0x0000000002670000-0x0000000002683000-memory.dmp

      Filesize

      76KB

    • memory/1168-179-0x0000000002670000-0x0000000002683000-memory.dmp

      Filesize

      76KB

    • memory/1168-180-0x0000000000400000-0x0000000000455000-memory.dmp

      Filesize

      340KB

    • memory/1168-181-0x0000000004C50000-0x0000000004C60000-memory.dmp

      Filesize

      64KB

    • memory/1168-182-0x0000000004C50000-0x0000000004C60000-memory.dmp

      Filesize

      64KB

    • memory/1168-183-0x0000000004C50000-0x0000000004C60000-memory.dmp

      Filesize

      64KB

    • memory/1168-186-0x0000000000400000-0x0000000000455000-memory.dmp

      Filesize

      340KB

    • memory/1864-192-0x0000000004A50000-0x0000000004A85000-memory.dmp

      Filesize

      212KB

    • memory/1864-193-0x0000000004A50000-0x0000000004A85000-memory.dmp

      Filesize

      212KB

    • memory/1864-195-0x0000000004A50000-0x0000000004A85000-memory.dmp

      Filesize

      212KB

    • memory/1864-197-0x0000000004A50000-0x0000000004A85000-memory.dmp

      Filesize

      212KB

    • memory/1864-199-0x0000000004A50000-0x0000000004A85000-memory.dmp

      Filesize

      212KB

    • memory/1864-201-0x0000000004A50000-0x0000000004A85000-memory.dmp

      Filesize

      212KB

    • memory/1864-203-0x0000000004A50000-0x0000000004A85000-memory.dmp

      Filesize

      212KB

    • memory/1864-205-0x0000000004A50000-0x0000000004A85000-memory.dmp

      Filesize

      212KB

    • memory/1864-208-0x00000000020F0000-0x0000000002136000-memory.dmp

      Filesize

      280KB

    • memory/1864-207-0x0000000004A50000-0x0000000004A85000-memory.dmp

      Filesize

      212KB

    • memory/1864-211-0x0000000004B20000-0x0000000004B30000-memory.dmp

      Filesize

      64KB

    • memory/1864-210-0x0000000004B20000-0x0000000004B30000-memory.dmp

      Filesize

      64KB

    • memory/1864-212-0x0000000004A50000-0x0000000004A85000-memory.dmp

      Filesize

      212KB

    • memory/1864-215-0x0000000004A50000-0x0000000004A85000-memory.dmp

      Filesize

      212KB

    • memory/1864-213-0x0000000004B20000-0x0000000004B30000-memory.dmp

      Filesize

      64KB

    • memory/1864-217-0x0000000004A50000-0x0000000004A85000-memory.dmp

      Filesize

      212KB

    • memory/1864-219-0x0000000004A50000-0x0000000004A85000-memory.dmp

      Filesize

      212KB

    • memory/1864-221-0x0000000004A50000-0x0000000004A85000-memory.dmp

      Filesize

      212KB

    • memory/1864-223-0x0000000004A50000-0x0000000004A85000-memory.dmp

      Filesize

      212KB

    • memory/1864-225-0x0000000004A50000-0x0000000004A85000-memory.dmp

      Filesize

      212KB

    • memory/1864-227-0x0000000004A50000-0x0000000004A85000-memory.dmp

      Filesize

      212KB

    • memory/1864-988-0x0000000007560000-0x0000000007B78000-memory.dmp

      Filesize

      6.1MB

    • memory/1864-989-0x0000000007BC0000-0x0000000007BD2000-memory.dmp

      Filesize

      72KB

    • memory/1864-990-0x0000000007BE0000-0x0000000007CEA000-memory.dmp

      Filesize

      1.0MB

    • memory/1864-991-0x0000000004B20000-0x0000000004B30000-memory.dmp

      Filesize

      64KB

    • memory/1864-992-0x0000000007D00000-0x0000000007D3C000-memory.dmp

      Filesize

      240KB

    • memory/1864-994-0x0000000004B20000-0x0000000004B30000-memory.dmp

      Filesize

      64KB

    • memory/1864-995-0x0000000004B20000-0x0000000004B30000-memory.dmp

      Filesize

      64KB

    • memory/1864-996-0x0000000004B20000-0x0000000004B30000-memory.dmp

      Filesize

      64KB

    • memory/1864-997-0x0000000004B20000-0x0000000004B30000-memory.dmp

      Filesize

      64KB