Analysis

  • max time kernel
    154s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-05-2023 21:52

General

  • Target

    50409bbf2696d231f352a1a1c517196f9030e0f4e8b9a3698141a838b81bd78b.exe

  • Size

    690KB

  • MD5

    2db13383df88cddde2b8d7a2f9e9378a

  • SHA1

    9a482506a699339250c832fc3636697040a7b77f

  • SHA256

    50409bbf2696d231f352a1a1c517196f9030e0f4e8b9a3698141a838b81bd78b

  • SHA512

    00fbe2a8b74bfec01cd9997d624a9ab89fdc5bdecbe63c0277aeaff57ad9ed547e82d8cb975576b0f20d2fe58c5d05c7a247fc7f83a4d711d0a1bd169bf1dee3

  • SSDEEP

    12288:/y90uQpuxOE4ELPcPj3jqkfRkVP1Jr+s9P+LMGXniNom2k+lrIVR:/yEsJhoTjqGRuSsoONHUra

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\50409bbf2696d231f352a1a1c517196f9030e0f4e8b9a3698141a838b81bd78b.exe
    "C:\Users\Admin\AppData\Local\Temp\50409bbf2696d231f352a1a1c517196f9030e0f4e8b9a3698141a838b81bd78b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un738470.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un738470.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4884
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\04730777.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\04730777.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4160
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 1004
          4⤵
          • Program crash
          PID:2524
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk837966.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk837966.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2044
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4160 -ip 4160
    1⤵
      PID:2124

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un738470.exe

      Filesize

      536KB

      MD5

      39a2ae7955df9d9f31dd64f4a2658ad6

      SHA1

      c1739805734774871582917e465e65134ba500ef

      SHA256

      a9f98f2b765d3adbed9ac08b80da1edc11f5733d6793f640e5ea9cda812c4e8c

      SHA512

      a1afee22fa3f5836e4a331043dcb50af1f0a9508baf1bc427fef1d69781d367546fa24a9d56f1912abe54891e7e5ab3b491256d100b415565c66e1f6c14ebdb8

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un738470.exe

      Filesize

      536KB

      MD5

      39a2ae7955df9d9f31dd64f4a2658ad6

      SHA1

      c1739805734774871582917e465e65134ba500ef

      SHA256

      a9f98f2b765d3adbed9ac08b80da1edc11f5733d6793f640e5ea9cda812c4e8c

      SHA512

      a1afee22fa3f5836e4a331043dcb50af1f0a9508baf1bc427fef1d69781d367546fa24a9d56f1912abe54891e7e5ab3b491256d100b415565c66e1f6c14ebdb8

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\04730777.exe

      Filesize

      258KB

      MD5

      b5fdf24a9e7eaf585c081960b8240458

      SHA1

      8b17be5797391c97909b9622ddcd1486193cab55

      SHA256

      fbb53a4cd704ff34b81b9def0da4e6b014fb90b0b56a61f151c30bee002b7bda

      SHA512

      765e9774df21fac1b58cdfa00d189800e03c7e7be62e033d52be1b356ce488040e14b1fb9e0e3f3ca484b1c0fc841e467de624befbd343e0df7ee73b3a7503b1

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\04730777.exe

      Filesize

      258KB

      MD5

      b5fdf24a9e7eaf585c081960b8240458

      SHA1

      8b17be5797391c97909b9622ddcd1486193cab55

      SHA256

      fbb53a4cd704ff34b81b9def0da4e6b014fb90b0b56a61f151c30bee002b7bda

      SHA512

      765e9774df21fac1b58cdfa00d189800e03c7e7be62e033d52be1b356ce488040e14b1fb9e0e3f3ca484b1c0fc841e467de624befbd343e0df7ee73b3a7503b1

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk837966.exe

      Filesize

      341KB

      MD5

      061550f87d822e0717a1ca8f0e4b3ef0

      SHA1

      df757e025f786db975891a92a5bc70f96275c47d

      SHA256

      9782370baea374f43a3df3491babbe10b4421cbeca3d2c475957e1da9d26a529

      SHA512

      4970becb8ce833f27285fc4dcbcada69ceb2f81937b3a598fb786a4d643897043d565d41e3b3f2ae69ca751da1416bd66db46d206cf317cad75db95ceb32bc30

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk837966.exe

      Filesize

      341KB

      MD5

      061550f87d822e0717a1ca8f0e4b3ef0

      SHA1

      df757e025f786db975891a92a5bc70f96275c47d

      SHA256

      9782370baea374f43a3df3491babbe10b4421cbeca3d2c475957e1da9d26a529

      SHA512

      4970becb8ce833f27285fc4dcbcada69ceb2f81937b3a598fb786a4d643897043d565d41e3b3f2ae69ca751da1416bd66db46d206cf317cad75db95ceb32bc30

    • memory/2044-223-0x0000000002600000-0x0000000002635000-memory.dmp

      Filesize

      212KB

    • memory/2044-217-0x0000000002600000-0x0000000002635000-memory.dmp

      Filesize

      212KB

    • memory/2044-994-0x0000000004C30000-0x0000000004C40000-memory.dmp

      Filesize

      64KB

    • memory/2044-993-0x0000000007D00000-0x0000000007D3C000-memory.dmp

      Filesize

      240KB

    • memory/2044-992-0x0000000007BF0000-0x0000000007CFA000-memory.dmp

      Filesize

      1.0MB

    • memory/2044-991-0x0000000007BD0000-0x0000000007BE2000-memory.dmp

      Filesize

      72KB

    • memory/2044-990-0x0000000007570000-0x0000000007B88000-memory.dmp

      Filesize

      6.1MB

    • memory/2044-227-0x0000000002600000-0x0000000002635000-memory.dmp

      Filesize

      212KB

    • memory/2044-997-0x0000000004C30000-0x0000000004C40000-memory.dmp

      Filesize

      64KB

    • memory/2044-225-0x0000000002600000-0x0000000002635000-memory.dmp

      Filesize

      212KB

    • memory/2044-200-0x0000000002600000-0x0000000002635000-memory.dmp

      Filesize

      212KB

    • memory/2044-221-0x0000000002600000-0x0000000002635000-memory.dmp

      Filesize

      212KB

    • memory/2044-219-0x0000000002600000-0x0000000002635000-memory.dmp

      Filesize

      212KB

    • memory/2044-996-0x0000000004C30000-0x0000000004C40000-memory.dmp

      Filesize

      64KB

    • memory/2044-215-0x0000000002600000-0x0000000002635000-memory.dmp

      Filesize

      212KB

    • memory/2044-213-0x0000000002600000-0x0000000002635000-memory.dmp

      Filesize

      212KB

    • memory/2044-211-0x0000000002600000-0x0000000002635000-memory.dmp

      Filesize

      212KB

    • memory/2044-209-0x0000000002600000-0x0000000002635000-memory.dmp

      Filesize

      212KB

    • memory/2044-207-0x0000000002600000-0x0000000002635000-memory.dmp

      Filesize

      212KB

    • memory/2044-205-0x0000000004C30000-0x0000000004C40000-memory.dmp

      Filesize

      64KB

    • memory/2044-204-0x0000000002600000-0x0000000002635000-memory.dmp

      Filesize

      212KB

    • memory/2044-203-0x0000000004C30000-0x0000000004C40000-memory.dmp

      Filesize

      64KB

    • memory/2044-202-0x0000000000500000-0x0000000000546000-memory.dmp

      Filesize

      280KB

    • memory/2044-998-0x0000000004C30000-0x0000000004C40000-memory.dmp

      Filesize

      64KB

    • memory/2044-999-0x0000000004C30000-0x0000000004C40000-memory.dmp

      Filesize

      64KB

    • memory/2044-196-0x0000000002600000-0x0000000002635000-memory.dmp

      Filesize

      212KB

    • memory/2044-195-0x0000000002600000-0x0000000002635000-memory.dmp

      Filesize

      212KB

    • memory/2044-198-0x0000000002600000-0x0000000002635000-memory.dmp

      Filesize

      212KB

    • memory/4160-164-0x0000000002410000-0x0000000002423000-memory.dmp

      Filesize

      76KB

    • memory/4160-186-0x0000000000400000-0x0000000000455000-memory.dmp

      Filesize

      340KB

    • memory/4160-184-0x0000000002470000-0x0000000002480000-memory.dmp

      Filesize

      64KB

    • memory/4160-183-0x0000000002470000-0x0000000002480000-memory.dmp

      Filesize

      64KB

    • memory/4160-182-0x0000000002470000-0x0000000002480000-memory.dmp

      Filesize

      64KB

    • memory/4160-181-0x0000000000400000-0x0000000000455000-memory.dmp

      Filesize

      340KB

    • memory/4160-180-0x0000000002470000-0x0000000002480000-memory.dmp

      Filesize

      64KB

    • memory/4160-179-0x0000000002470000-0x0000000002480000-memory.dmp

      Filesize

      64KB

    • memory/4160-178-0x0000000002410000-0x0000000002423000-memory.dmp

      Filesize

      76KB

    • memory/4160-176-0x0000000002410000-0x0000000002423000-memory.dmp

      Filesize

      76KB

    • memory/4160-174-0x0000000002410000-0x0000000002423000-memory.dmp

      Filesize

      76KB

    • memory/4160-172-0x0000000002410000-0x0000000002423000-memory.dmp

      Filesize

      76KB

    • memory/4160-170-0x0000000002410000-0x0000000002423000-memory.dmp

      Filesize

      76KB

    • memory/4160-168-0x0000000002410000-0x0000000002423000-memory.dmp

      Filesize

      76KB

    • memory/4160-166-0x0000000002410000-0x0000000002423000-memory.dmp

      Filesize

      76KB

    • memory/4160-162-0x0000000002410000-0x0000000002423000-memory.dmp

      Filesize

      76KB

    • memory/4160-160-0x0000000002410000-0x0000000002423000-memory.dmp

      Filesize

      76KB

    • memory/4160-158-0x0000000002410000-0x0000000002423000-memory.dmp

      Filesize

      76KB

    • memory/4160-156-0x0000000002410000-0x0000000002423000-memory.dmp

      Filesize

      76KB

    • memory/4160-154-0x0000000002410000-0x0000000002423000-memory.dmp

      Filesize

      76KB

    • memory/4160-152-0x0000000002410000-0x0000000002423000-memory.dmp

      Filesize

      76KB

    • memory/4160-151-0x0000000002410000-0x0000000002423000-memory.dmp

      Filesize

      76KB

    • memory/4160-150-0x0000000004B90000-0x0000000005134000-memory.dmp

      Filesize

      5.6MB

    • memory/4160-149-0x0000000002470000-0x0000000002480000-memory.dmp

      Filesize

      64KB

    • memory/4160-148-0x00000000005B0000-0x00000000005DD000-memory.dmp

      Filesize

      180KB