Analysis

  • max time kernel
    153s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-05-2023 21:36

General

  • Target

    436b7c58821bd0e30ba1a9ffb0c87946280e61340b6b837985b8bbcd5419f1df.exe

  • Size

    704KB

  • MD5

    c18320aee784ea07a6dce8ae2fdce5c1

  • SHA1

    49c2fb1f129d377c7b774b2fa3dd8d5e99cfa939

  • SHA256

    436b7c58821bd0e30ba1a9ffb0c87946280e61340b6b837985b8bbcd5419f1df

  • SHA512

    97163d698fa5013006e7f3593e5b4e09e409778218631616f8554dc72b5b783478060b99cadcfd03c7567b2a3a2ffaf75ef14dc4a3a54b9600f690ab387fa662

  • SSDEEP

    12288:fy90gfeRw3ZvxRX8ps2H06rIsVhwq13AuI15zC+LIzjM1C/nVM8I4IguO:fy9feW3ZZRX8morIkKU3AHBfLIfS016O

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\436b7c58821bd0e30ba1a9ffb0c87946280e61340b6b837985b8bbcd5419f1df.exe
    "C:\Users\Admin\AppData\Local\Temp\436b7c58821bd0e30ba1a9ffb0c87946280e61340b6b837985b8bbcd5419f1df.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4388
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un405951.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un405951.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4404
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr259975.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr259975.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3644
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 1088
          4⤵
          • Program crash
          PID:3096
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu084990.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu084990.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4460
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3644 -ip 3644
    1⤵
      PID:1540

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un405951.exe

      Filesize

      550KB

      MD5

      438bc8dfeb2b6098c50c606c5ca5037e

      SHA1

      18250bc70611e52ba4fa906de1cb5584f9f60b66

      SHA256

      63ae5ab1b76064e05bbc606cdf3033ce683ef6e03baa3a5deeea2692523a34f6

      SHA512

      0171123670653ec13b4794684fa78c12b623a12f529589f076311821441a3b8f52a3df51b33f0a74b697d8643417323e6dff9e034ec9db17afcb2fd414b08b09

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un405951.exe

      Filesize

      550KB

      MD5

      438bc8dfeb2b6098c50c606c5ca5037e

      SHA1

      18250bc70611e52ba4fa906de1cb5584f9f60b66

      SHA256

      63ae5ab1b76064e05bbc606cdf3033ce683ef6e03baa3a5deeea2692523a34f6

      SHA512

      0171123670653ec13b4794684fa78c12b623a12f529589f076311821441a3b8f52a3df51b33f0a74b697d8643417323e6dff9e034ec9db17afcb2fd414b08b09

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr259975.exe

      Filesize

      278KB

      MD5

      165e9c1a00ef7838f5f3613f16d79773

      SHA1

      88ab28abd57d9debd05ca8d6a54c68048b1f27d7

      SHA256

      4d0fe47dcc49e85a913cad1f25466ff55fa89cd7ba9c320e0721ca482dca92fa

      SHA512

      6cd6743954a1cf7473796937bb1a79d0b5b22172c724c577a3132d16c217f6d305930c97fd16514aedff1c08af0354d3260ae74232b7a4a47746f5cc09f07204

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr259975.exe

      Filesize

      278KB

      MD5

      165e9c1a00ef7838f5f3613f16d79773

      SHA1

      88ab28abd57d9debd05ca8d6a54c68048b1f27d7

      SHA256

      4d0fe47dcc49e85a913cad1f25466ff55fa89cd7ba9c320e0721ca482dca92fa

      SHA512

      6cd6743954a1cf7473796937bb1a79d0b5b22172c724c577a3132d16c217f6d305930c97fd16514aedff1c08af0354d3260ae74232b7a4a47746f5cc09f07204

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu084990.exe

      Filesize

      361KB

      MD5

      9e5668b179ca1e394171fd60747b43f9

      SHA1

      aa7bc4756335b0abe46955e13fe916a47d81128f

      SHA256

      73ecdc5b7c56a6526301645c9db51e710e7293619cb507eb639c00c7fe66cf07

      SHA512

      e653eaaff60f856527a7ebb54d81d9bb44b34a8db02169d77b71b24e3311bdad15dcbacb691556fc11fc9c6b2c0466a889a16fdd829684ae8e81b98dea7322a7

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu084990.exe

      Filesize

      361KB

      MD5

      9e5668b179ca1e394171fd60747b43f9

      SHA1

      aa7bc4756335b0abe46955e13fe916a47d81128f

      SHA256

      73ecdc5b7c56a6526301645c9db51e710e7293619cb507eb639c00c7fe66cf07

      SHA512

      e653eaaff60f856527a7ebb54d81d9bb44b34a8db02169d77b71b24e3311bdad15dcbacb691556fc11fc9c6b2c0466a889a16fdd829684ae8e81b98dea7322a7

    • memory/3644-164-0x00000000048B0000-0x00000000048C2000-memory.dmp

      Filesize

      72KB

    • memory/3644-186-0x0000000000400000-0x0000000002BAF000-memory.dmp

      Filesize

      39.7MB

    • memory/3644-152-0x00000000071A0000-0x0000000007744000-memory.dmp

      Filesize

      5.6MB

    • memory/3644-153-0x00000000048B0000-0x00000000048C2000-memory.dmp

      Filesize

      72KB

    • memory/3644-154-0x00000000048B0000-0x00000000048C2000-memory.dmp

      Filesize

      72KB

    • memory/3644-156-0x00000000048B0000-0x00000000048C2000-memory.dmp

      Filesize

      72KB

    • memory/3644-158-0x00000000048B0000-0x00000000048C2000-memory.dmp

      Filesize

      72KB

    • memory/3644-160-0x00000000048B0000-0x00000000048C2000-memory.dmp

      Filesize

      72KB

    • memory/3644-162-0x00000000048B0000-0x00000000048C2000-memory.dmp

      Filesize

      72KB

    • memory/3644-150-0x0000000007190000-0x00000000071A0000-memory.dmp

      Filesize

      64KB

    • memory/3644-166-0x00000000048B0000-0x00000000048C2000-memory.dmp

      Filesize

      72KB

    • memory/3644-168-0x00000000048B0000-0x00000000048C2000-memory.dmp

      Filesize

      72KB

    • memory/3644-170-0x00000000048B0000-0x00000000048C2000-memory.dmp

      Filesize

      72KB

    • memory/3644-172-0x00000000048B0000-0x00000000048C2000-memory.dmp

      Filesize

      72KB

    • memory/3644-174-0x00000000048B0000-0x00000000048C2000-memory.dmp

      Filesize

      72KB

    • memory/3644-176-0x00000000048B0000-0x00000000048C2000-memory.dmp

      Filesize

      72KB

    • memory/3644-178-0x00000000048B0000-0x00000000048C2000-memory.dmp

      Filesize

      72KB

    • memory/3644-180-0x00000000048B0000-0x00000000048C2000-memory.dmp

      Filesize

      72KB

    • memory/3644-181-0x0000000000400000-0x0000000002BAF000-memory.dmp

      Filesize

      39.7MB

    • memory/3644-182-0x0000000007190000-0x00000000071A0000-memory.dmp

      Filesize

      64KB

    • memory/3644-183-0x0000000007190000-0x00000000071A0000-memory.dmp

      Filesize

      64KB

    • memory/3644-184-0x0000000007190000-0x00000000071A0000-memory.dmp

      Filesize

      64KB

    • memory/3644-151-0x0000000007190000-0x00000000071A0000-memory.dmp

      Filesize

      64KB

    • memory/3644-149-0x0000000007190000-0x00000000071A0000-memory.dmp

      Filesize

      64KB

    • memory/3644-148-0x0000000002BB0000-0x0000000002BDD000-memory.dmp

      Filesize

      180KB

    • memory/4460-995-0x00000000072F0000-0x0000000007300000-memory.dmp

      Filesize

      64KB

    • memory/4460-217-0x00000000071B0000-0x00000000071E5000-memory.dmp

      Filesize

      212KB

    • memory/4460-193-0x00000000071B0000-0x00000000071E5000-memory.dmp

      Filesize

      212KB

    • memory/4460-211-0x00000000071B0000-0x00000000071E5000-memory.dmp

      Filesize

      212KB

    • memory/4460-199-0x00000000072F0000-0x0000000007300000-memory.dmp

      Filesize

      64KB

    • memory/4460-197-0x0000000002BD0000-0x0000000002C16000-memory.dmp

      Filesize

      280KB

    • memory/4460-202-0x00000000072F0000-0x0000000007300000-memory.dmp

      Filesize

      64KB

    • memory/4460-203-0x00000000071B0000-0x00000000071E5000-memory.dmp

      Filesize

      212KB

    • memory/4460-200-0x00000000072F0000-0x0000000007300000-memory.dmp

      Filesize

      64KB

    • memory/4460-205-0x00000000071B0000-0x00000000071E5000-memory.dmp

      Filesize

      212KB

    • memory/4460-207-0x00000000071B0000-0x00000000071E5000-memory.dmp

      Filesize

      212KB

    • memory/4460-209-0x00000000071B0000-0x00000000071E5000-memory.dmp

      Filesize

      212KB

    • memory/4460-198-0x00000000071B0000-0x00000000071E5000-memory.dmp

      Filesize

      212KB

    • memory/4460-213-0x00000000071B0000-0x00000000071E5000-memory.dmp

      Filesize

      212KB

    • memory/4460-215-0x00000000071B0000-0x00000000071E5000-memory.dmp

      Filesize

      212KB

    • memory/4460-192-0x00000000071B0000-0x00000000071E5000-memory.dmp

      Filesize

      212KB

    • memory/4460-219-0x00000000071B0000-0x00000000071E5000-memory.dmp

      Filesize

      212KB

    • memory/4460-221-0x00000000071B0000-0x00000000071E5000-memory.dmp

      Filesize

      212KB

    • memory/4460-223-0x00000000071B0000-0x00000000071E5000-memory.dmp

      Filesize

      212KB

    • memory/4460-225-0x00000000071B0000-0x00000000071E5000-memory.dmp

      Filesize

      212KB

    • memory/4460-227-0x00000000071B0000-0x00000000071E5000-memory.dmp

      Filesize

      212KB

    • memory/4460-988-0x0000000009D30000-0x000000000A348000-memory.dmp

      Filesize

      6.1MB

    • memory/4460-989-0x00000000072C0000-0x00000000072D2000-memory.dmp

      Filesize

      72KB

    • memory/4460-990-0x000000000A350000-0x000000000A45A000-memory.dmp

      Filesize

      1.0MB

    • memory/4460-991-0x000000000A460000-0x000000000A49C000-memory.dmp

      Filesize

      240KB

    • memory/4460-992-0x00000000072F0000-0x0000000007300000-memory.dmp

      Filesize

      64KB

    • memory/4460-994-0x00000000072F0000-0x0000000007300000-memory.dmp

      Filesize

      64KB

    • memory/4460-195-0x00000000071B0000-0x00000000071E5000-memory.dmp

      Filesize

      212KB

    • memory/4460-996-0x00000000072F0000-0x0000000007300000-memory.dmp

      Filesize

      64KB

    • memory/4460-997-0x00000000072F0000-0x0000000007300000-memory.dmp

      Filesize

      64KB