Analysis

  • max time kernel
    144s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-05-2023 21:57

General

  • Target

    543ab68b1c5fce8df32ebb02dcd900640cb27b668bfb625502cf08de87217362.exe

  • Size

    690KB

  • MD5

    f0c7cd4460a3b7348cfdc30280f86d83

  • SHA1

    322bcd748f0d54ac2e17eb115ebd74d62b7d3f71

  • SHA256

    543ab68b1c5fce8df32ebb02dcd900640cb27b668bfb625502cf08de87217362

  • SHA512

    6493463afb574586411d80eda07a8ed0e99afc032c1477497fb175139617b894029a615f4f64408bec9bde1abbcb75ed6ec042de825623a977e6b7f6cd635989

  • SSDEEP

    12288:zy90z7fXrWmm6RlMIQDgXxMIcRIO/QxDTT8WNzOvfV0f:zyaXrWL6Rl4sNcsxDTTxNSCf

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\543ab68b1c5fce8df32ebb02dcd900640cb27b668bfb625502cf08de87217362.exe
    "C:\Users\Admin\AppData\Local\Temp\543ab68b1c5fce8df32ebb02dcd900640cb27b668bfb625502cf08de87217362.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un404914.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un404914.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5048
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\99460676.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\99460676.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2288
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 1080
          4⤵
          • Program crash
          PID:1392
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk643771.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk643771.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4088
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2288 -ip 2288
    1⤵
      PID:400

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un404914.exe

      Filesize

      536KB

      MD5

      1fac8401900d1073942473422a13ce73

      SHA1

      2107b2442619d14db6d9402287b1af87da89e4fb

      SHA256

      149b061432fb6ce4ad435e36826d9edbf42af2c10c6d9dd2ad3e917c0849acb6

      SHA512

      db61da7aad22360dd360a3a0bedc3c83fe18c01f0e4432d16bf4bebe7656053e1e3cb4ea5089650dcd18eddb765acf21290317fadcd825c8b28396ed73dee865

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un404914.exe

      Filesize

      536KB

      MD5

      1fac8401900d1073942473422a13ce73

      SHA1

      2107b2442619d14db6d9402287b1af87da89e4fb

      SHA256

      149b061432fb6ce4ad435e36826d9edbf42af2c10c6d9dd2ad3e917c0849acb6

      SHA512

      db61da7aad22360dd360a3a0bedc3c83fe18c01f0e4432d16bf4bebe7656053e1e3cb4ea5089650dcd18eddb765acf21290317fadcd825c8b28396ed73dee865

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\99460676.exe

      Filesize

      259KB

      MD5

      f61893cc078c077e01b6d57875896e7b

      SHA1

      c1a978f44fc0a97dab5dfb857c3e30b5d8371827

      SHA256

      ec20e19320faf045b6e71036a8d7e9722ccb3bcc5ee64e0722e9eab22f14e1ad

      SHA512

      2be84ddef93d499e23588617c4267b1488ccb7bb8fde5c85869bef120c91b1051fe666c28df4b466abc5e37159ef9d6adf0f17bb67540d3a0c0d7c1b82480bea

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\99460676.exe

      Filesize

      259KB

      MD5

      f61893cc078c077e01b6d57875896e7b

      SHA1

      c1a978f44fc0a97dab5dfb857c3e30b5d8371827

      SHA256

      ec20e19320faf045b6e71036a8d7e9722ccb3bcc5ee64e0722e9eab22f14e1ad

      SHA512

      2be84ddef93d499e23588617c4267b1488ccb7bb8fde5c85869bef120c91b1051fe666c28df4b466abc5e37159ef9d6adf0f17bb67540d3a0c0d7c1b82480bea

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk643771.exe

      Filesize

      342KB

      MD5

      54788af31813c06410ee6f6096fe8bcd

      SHA1

      2d65f80e18c7b645c64f8cad06195fba7e20b834

      SHA256

      a162e6edf7956289cda2bd07e1f15491beb15b7ef56c0f9bbae2ad5dd6200568

      SHA512

      9a0a49e97e870810c9e2df28b52677b331f28eda9251e532548f3e7cdf079d2e15f304df17a9222bb27da90d5b011227def60ad17d2a605270b8041c93a25a38

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk643771.exe

      Filesize

      342KB

      MD5

      54788af31813c06410ee6f6096fe8bcd

      SHA1

      2d65f80e18c7b645c64f8cad06195fba7e20b834

      SHA256

      a162e6edf7956289cda2bd07e1f15491beb15b7ef56c0f9bbae2ad5dd6200568

      SHA512

      9a0a49e97e870810c9e2df28b52677b331f28eda9251e532548f3e7cdf079d2e15f304df17a9222bb27da90d5b011227def60ad17d2a605270b8041c93a25a38

    • memory/2288-167-0x00000000049C0000-0x00000000049D3000-memory.dmp

      Filesize

      76KB

    • memory/2288-153-0x00000000049C0000-0x00000000049D3000-memory.dmp

      Filesize

      76KB

    • memory/2288-151-0x00000000049C0000-0x00000000049D3000-memory.dmp

      Filesize

      76KB

    • memory/2288-155-0x00000000049C0000-0x00000000049D3000-memory.dmp

      Filesize

      76KB

    • memory/2288-157-0x00000000049C0000-0x00000000049D3000-memory.dmp

      Filesize

      76KB

    • memory/2288-159-0x00000000049C0000-0x00000000049D3000-memory.dmp

      Filesize

      76KB

    • memory/2288-161-0x00000000049C0000-0x00000000049D3000-memory.dmp

      Filesize

      76KB

    • memory/2288-163-0x00000000049C0000-0x00000000049D3000-memory.dmp

      Filesize

      76KB

    • memory/2288-165-0x00000000049C0000-0x00000000049D3000-memory.dmp

      Filesize

      76KB

    • memory/2288-150-0x00000000049C0000-0x00000000049D3000-memory.dmp

      Filesize

      76KB

    • memory/2288-169-0x00000000049C0000-0x00000000049D3000-memory.dmp

      Filesize

      76KB

    • memory/2288-171-0x00000000049C0000-0x00000000049D3000-memory.dmp

      Filesize

      76KB

    • memory/2288-173-0x00000000049C0000-0x00000000049D3000-memory.dmp

      Filesize

      76KB

    • memory/2288-175-0x00000000049C0000-0x00000000049D3000-memory.dmp

      Filesize

      76KB

    • memory/2288-177-0x00000000049C0000-0x00000000049D3000-memory.dmp

      Filesize

      76KB

    • memory/2288-178-0x0000000004B70000-0x0000000004B80000-memory.dmp

      Filesize

      64KB

    • memory/2288-179-0x0000000004B70000-0x0000000004B80000-memory.dmp

      Filesize

      64KB

    • memory/2288-180-0x0000000004B70000-0x0000000004B80000-memory.dmp

      Filesize

      64KB

    • memory/2288-181-0x0000000000400000-0x0000000000455000-memory.dmp

      Filesize

      340KB

    • memory/2288-182-0x0000000004B70000-0x0000000004B80000-memory.dmp

      Filesize

      64KB

    • memory/2288-183-0x0000000004B70000-0x0000000004B80000-memory.dmp

      Filesize

      64KB

    • memory/2288-184-0x0000000004B70000-0x0000000004B80000-memory.dmp

      Filesize

      64KB

    • memory/2288-186-0x0000000000400000-0x0000000000455000-memory.dmp

      Filesize

      340KB

    • memory/2288-149-0x0000000004B80000-0x0000000005124000-memory.dmp

      Filesize

      5.6MB

    • memory/2288-148-0x0000000002090000-0x00000000020BD000-memory.dmp

      Filesize

      180KB

    • memory/4088-992-0x0000000007BC0000-0x0000000007BD2000-memory.dmp

      Filesize

      72KB

    • memory/4088-221-0x0000000002700000-0x0000000002735000-memory.dmp

      Filesize

      212KB

    • memory/4088-193-0x0000000002700000-0x0000000002735000-memory.dmp

      Filesize

      212KB

    • memory/4088-414-0x0000000004C20000-0x0000000004C30000-memory.dmp

      Filesize

      64KB

    • memory/4088-199-0x0000000002700000-0x0000000002735000-memory.dmp

      Filesize

      212KB

    • memory/4088-201-0x0000000002700000-0x0000000002735000-memory.dmp

      Filesize

      212KB

    • memory/4088-203-0x0000000002700000-0x0000000002735000-memory.dmp

      Filesize

      212KB

    • memory/4088-205-0x0000000002700000-0x0000000002735000-memory.dmp

      Filesize

      212KB

    • memory/4088-207-0x0000000002700000-0x0000000002735000-memory.dmp

      Filesize

      212KB

    • memory/4088-209-0x0000000002700000-0x0000000002735000-memory.dmp

      Filesize

      212KB

    • memory/4088-211-0x0000000002700000-0x0000000002735000-memory.dmp

      Filesize

      212KB

    • memory/4088-213-0x0000000002700000-0x0000000002735000-memory.dmp

      Filesize

      212KB

    • memory/4088-215-0x0000000002700000-0x0000000002735000-memory.dmp

      Filesize

      212KB

    • memory/4088-217-0x0000000002700000-0x0000000002735000-memory.dmp

      Filesize

      212KB

    • memory/4088-219-0x0000000002700000-0x0000000002735000-memory.dmp

      Filesize

      212KB

    • memory/4088-192-0x0000000002700000-0x0000000002735000-memory.dmp

      Filesize

      212KB

    • memory/4088-223-0x0000000002700000-0x0000000002735000-memory.dmp

      Filesize

      212KB

    • memory/4088-411-0x0000000001F90000-0x0000000001FD6000-memory.dmp

      Filesize

      280KB

    • memory/4088-412-0x0000000004C20000-0x0000000004C30000-memory.dmp

      Filesize

      64KB

    • memory/4088-197-0x0000000002700000-0x0000000002735000-memory.dmp

      Filesize

      212KB

    • memory/4088-988-0x0000000004C20000-0x0000000004C30000-memory.dmp

      Filesize

      64KB

    • memory/4088-989-0x0000000004C20000-0x0000000004C30000-memory.dmp

      Filesize

      64KB

    • memory/4088-990-0x0000000004C20000-0x0000000004C30000-memory.dmp

      Filesize

      64KB

    • memory/4088-991-0x0000000007560000-0x0000000007B78000-memory.dmp

      Filesize

      6.1MB

    • memory/4088-195-0x0000000002700000-0x0000000002735000-memory.dmp

      Filesize

      212KB

    • memory/4088-993-0x0000000007BE0000-0x0000000007CEA000-memory.dmp

      Filesize

      1.0MB

    • memory/4088-994-0x0000000007D40000-0x0000000007D7C000-memory.dmp

      Filesize

      240KB

    • memory/4088-996-0x0000000004C20000-0x0000000004C30000-memory.dmp

      Filesize

      64KB

    • memory/4088-998-0x0000000004C20000-0x0000000004C30000-memory.dmp

      Filesize

      64KB