Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 21:38

General

  • Target

    45b5ccd78ac1722cf3aac40c93bf85e31cbb7ded3402b34e18b212b889665470.exe

  • Size

    687KB

  • MD5

    05f75e2e73f49cc28dee712eaf0c7047

  • SHA1

    725c38af3f25d963310768bf31c5f5fe0d644480

  • SHA256

    45b5ccd78ac1722cf3aac40c93bf85e31cbb7ded3402b34e18b212b889665470

  • SHA512

    1d0a60f581f47edf9bb0fb8607cea398a456c2aa65af22a4266eabd8e39ea4f322a1f6766f4111decc2d91527bd0378975e9de4a3d75788e64179251a228a104

  • SSDEEP

    12288:Py90BtLECWtaHdjfeRz6fFryCSJplpVyDtRq0IBsuY3MN5c5oA/ZvRVssP/:PyPPk96z6f1Sblq9YsuYMjcpZpVz/

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45b5ccd78ac1722cf3aac40c93bf85e31cbb7ded3402b34e18b212b889665470.exe
    "C:\Users\Admin\AppData\Local\Temp\45b5ccd78ac1722cf3aac40c93bf85e31cbb7ded3402b34e18b212b889665470.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4380
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un362574.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un362574.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:840
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\92897530.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\92897530.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1856
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1856 -s 1080
          4⤵
          • Program crash
          PID:4832
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk757986.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk757986.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4536
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1856 -ip 1856
    1⤵
      PID:3728

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un362574.exe

      Filesize

      533KB

      MD5

      8944580a9f92b32832fce885672f3897

      SHA1

      d261660ce95d378d2e60c7691d2b3923439216c5

      SHA256

      31844d4c950a300b7dd4f53052825b229dfa487962a6bed6cf239791980b19d4

      SHA512

      069bc796784e8c672869fa36414f4ac5b2df06f350de53e5a46c40993c6665199609f62f6a57eb144b67345a547ecc48d781206c099706e5c7171b1ea2bfe207

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un362574.exe

      Filesize

      533KB

      MD5

      8944580a9f92b32832fce885672f3897

      SHA1

      d261660ce95d378d2e60c7691d2b3923439216c5

      SHA256

      31844d4c950a300b7dd4f53052825b229dfa487962a6bed6cf239791980b19d4

      SHA512

      069bc796784e8c672869fa36414f4ac5b2df06f350de53e5a46c40993c6665199609f62f6a57eb144b67345a547ecc48d781206c099706e5c7171b1ea2bfe207

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\92897530.exe

      Filesize

      249KB

      MD5

      4da7e31f3ac9e53de402ae623fa22514

      SHA1

      cf5962d6698e8adc2e26e6bf405c2c024983b97c

      SHA256

      163f07b6521b73d7b0b04153463e4f888f36e9a073487cf8892961623425606d

      SHA512

      c29fe0a1fb8ef4061824b54f672ec1daa26b498ce384a92e6d1c4608d079911e0cad10e11daedb4dcddaa92757a138d3962f4666f85f51ddda461e5b56eb9096

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\92897530.exe

      Filesize

      249KB

      MD5

      4da7e31f3ac9e53de402ae623fa22514

      SHA1

      cf5962d6698e8adc2e26e6bf405c2c024983b97c

      SHA256

      163f07b6521b73d7b0b04153463e4f888f36e9a073487cf8892961623425606d

      SHA512

      c29fe0a1fb8ef4061824b54f672ec1daa26b498ce384a92e6d1c4608d079911e0cad10e11daedb4dcddaa92757a138d3962f4666f85f51ddda461e5b56eb9096

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk757986.exe

      Filesize

      332KB

      MD5

      f5ae8458fcae81ee61ac8aa173ebbe61

      SHA1

      52bcba266197852c875b52d99aff6e380c241b1e

      SHA256

      0052aa4e2a33122a233030fec1a38a758f191eef616518e4ffae79ff5fc9e45c

      SHA512

      397a5c16f756331ff65e34e021fad75db1be2475846abc8a44dba2d8ed4e40d7284f51adb42c05ab577ae815d61294cf9dfa8f356280df39f28f0daa34ee645e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk757986.exe

      Filesize

      332KB

      MD5

      f5ae8458fcae81ee61ac8aa173ebbe61

      SHA1

      52bcba266197852c875b52d99aff6e380c241b1e

      SHA256

      0052aa4e2a33122a233030fec1a38a758f191eef616518e4ffae79ff5fc9e45c

      SHA512

      397a5c16f756331ff65e34e021fad75db1be2475846abc8a44dba2d8ed4e40d7284f51adb42c05ab577ae815d61294cf9dfa8f356280df39f28f0daa34ee645e

    • memory/1856-168-0x0000000004B50000-0x0000000004B63000-memory.dmp

      Filesize

      76KB

    • memory/1856-150-0x0000000004B50000-0x0000000004B63000-memory.dmp

      Filesize

      76KB

    • memory/1856-154-0x0000000004B50000-0x0000000004B63000-memory.dmp

      Filesize

      76KB

    • memory/1856-156-0x0000000004B50000-0x0000000004B63000-memory.dmp

      Filesize

      76KB

    • memory/1856-158-0x0000000004B50000-0x0000000004B63000-memory.dmp

      Filesize

      76KB

    • memory/1856-160-0x0000000004B50000-0x0000000004B63000-memory.dmp

      Filesize

      76KB

    • memory/1856-162-0x0000000004B50000-0x0000000004B63000-memory.dmp

      Filesize

      76KB

    • memory/1856-165-0x0000000002D30000-0x0000000002D5D000-memory.dmp

      Filesize

      180KB

    • memory/1856-166-0x0000000004B40000-0x0000000004B50000-memory.dmp

      Filesize

      64KB

    • memory/1856-152-0x0000000004B50000-0x0000000004B63000-memory.dmp

      Filesize

      76KB

    • memory/1856-172-0x0000000004B50000-0x0000000004B63000-memory.dmp

      Filesize

      76KB

    • memory/1856-169-0x0000000004B40000-0x0000000004B50000-memory.dmp

      Filesize

      64KB

    • memory/1856-164-0x0000000004B50000-0x0000000004B63000-memory.dmp

      Filesize

      76KB

    • memory/1856-171-0x0000000004B40000-0x0000000004B50000-memory.dmp

      Filesize

      64KB

    • memory/1856-174-0x0000000004B50000-0x0000000004B63000-memory.dmp

      Filesize

      76KB

    • memory/1856-176-0x0000000004B50000-0x0000000004B63000-memory.dmp

      Filesize

      76KB

    • memory/1856-178-0x0000000004B50000-0x0000000004B63000-memory.dmp

      Filesize

      76KB

    • memory/1856-180-0x0000000004B50000-0x0000000004B63000-memory.dmp

      Filesize

      76KB

    • memory/1856-181-0x0000000000400000-0x0000000002B9A000-memory.dmp

      Filesize

      39.6MB

    • memory/1856-183-0x0000000004B40000-0x0000000004B50000-memory.dmp

      Filesize

      64KB

    • memory/1856-184-0x0000000004B40000-0x0000000004B50000-memory.dmp

      Filesize

      64KB

    • memory/1856-185-0x0000000004B40000-0x0000000004B50000-memory.dmp

      Filesize

      64KB

    • memory/1856-186-0x0000000000400000-0x0000000002B9A000-memory.dmp

      Filesize

      39.6MB

    • memory/1856-149-0x0000000004B50000-0x0000000004B63000-memory.dmp

      Filesize

      76KB

    • memory/1856-148-0x0000000007270000-0x0000000007814000-memory.dmp

      Filesize

      5.6MB

    • memory/4536-226-0x0000000007150000-0x0000000007185000-memory.dmp

      Filesize

      212KB

    • memory/4536-216-0x0000000007150000-0x0000000007185000-memory.dmp

      Filesize

      212KB

    • memory/4536-192-0x0000000007150000-0x0000000007185000-memory.dmp

      Filesize

      212KB

    • memory/4536-988-0x000000000A300000-0x000000000A312000-memory.dmp

      Filesize

      72KB

    • memory/4536-198-0x0000000007150000-0x0000000007185000-memory.dmp

      Filesize

      212KB

    • memory/4536-202-0x00000000071E0000-0x00000000071F0000-memory.dmp

      Filesize

      64KB

    • memory/4536-204-0x00000000071E0000-0x00000000071F0000-memory.dmp

      Filesize

      64KB

    • memory/4536-200-0x00000000071E0000-0x00000000071F0000-memory.dmp

      Filesize

      64KB

    • memory/4536-199-0x0000000004810000-0x0000000004856000-memory.dmp

      Filesize

      280KB

    • memory/4536-203-0x0000000007150000-0x0000000007185000-memory.dmp

      Filesize

      212KB

    • memory/4536-206-0x0000000007150000-0x0000000007185000-memory.dmp

      Filesize

      212KB

    • memory/4536-208-0x0000000007150000-0x0000000007185000-memory.dmp

      Filesize

      212KB

    • memory/4536-210-0x0000000007150000-0x0000000007185000-memory.dmp

      Filesize

      212KB

    • memory/4536-212-0x0000000007150000-0x0000000007185000-memory.dmp

      Filesize

      212KB

    • memory/4536-214-0x0000000007150000-0x0000000007185000-memory.dmp

      Filesize

      212KB

    • memory/4536-191-0x0000000007150000-0x0000000007185000-memory.dmp

      Filesize

      212KB

    • memory/4536-218-0x0000000007150000-0x0000000007185000-memory.dmp

      Filesize

      212KB

    • memory/4536-220-0x0000000007150000-0x0000000007185000-memory.dmp

      Filesize

      212KB

    • memory/4536-222-0x0000000007150000-0x0000000007185000-memory.dmp

      Filesize

      212KB

    • memory/4536-224-0x0000000007150000-0x0000000007185000-memory.dmp

      Filesize

      212KB

    • memory/4536-194-0x0000000007150000-0x0000000007185000-memory.dmp

      Filesize

      212KB

    • memory/4536-228-0x0000000007150000-0x0000000007185000-memory.dmp

      Filesize

      212KB

    • memory/4536-987-0x0000000009C60000-0x000000000A278000-memory.dmp

      Filesize

      6.1MB

    • memory/4536-196-0x0000000007150000-0x0000000007185000-memory.dmp

      Filesize

      212KB

    • memory/4536-989-0x000000000A320000-0x000000000A42A000-memory.dmp

      Filesize

      1.0MB

    • memory/4536-990-0x000000000A440000-0x000000000A47C000-memory.dmp

      Filesize

      240KB

    • memory/4536-991-0x00000000071E0000-0x00000000071F0000-memory.dmp

      Filesize

      64KB

    • memory/4536-993-0x00000000071E0000-0x00000000071F0000-memory.dmp

      Filesize

      64KB

    • memory/4536-994-0x00000000071E0000-0x00000000071F0000-memory.dmp

      Filesize

      64KB

    • memory/4536-995-0x00000000071E0000-0x00000000071F0000-memory.dmp

      Filesize

      64KB

    • memory/4536-996-0x00000000071E0000-0x00000000071F0000-memory.dmp

      Filesize

      64KB