Analysis

  • max time kernel
    197s
  • max time network
    203s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 22:04

General

  • Target

    5a27523c66e350af5eb8b00c810551000d33776401848b7d8a51495fed7d17fa.exe

  • Size

    704KB

  • MD5

    6b87d296b21dae3b099cc25936aa0e0d

  • SHA1

    812c82a464c8fdc7fc2e049cde2597d269783d20

  • SHA256

    5a27523c66e350af5eb8b00c810551000d33776401848b7d8a51495fed7d17fa

  • SHA512

    9b16d51fe2b45831d56e8df8937c44eaebbcf162b91f311abd8974fb18e4dc5ea036c0901de19b1112ddf34ed73d27d1bee303fcde5fdbf16bf960e466b8d453

  • SSDEEP

    12288:Wy90X0hsfPYmJDJY23T91HGrDmBO7MDLCgKnI1IzCGLIztMCx/KL6iwZyn:WyphsYm28B1mrOO7OWEU/LIJJ9n8

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a27523c66e350af5eb8b00c810551000d33776401848b7d8a51495fed7d17fa.exe
    "C:\Users\Admin\AppData\Local\Temp\5a27523c66e350af5eb8b00c810551000d33776401848b7d8a51495fed7d17fa.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2704
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un084612.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un084612.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1508
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr217839.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr217839.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:548
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 548 -s 1048
          4⤵
          • Program crash
          PID:1632
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu406365.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu406365.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4868
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 548 -ip 548
    1⤵
      PID:4236

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un084612.exe

            Filesize

            550KB

            MD5

            90b10c0e296ef2dc0bda455b428776bf

            SHA1

            6fee97a53515717bed3df128bb164ab50be3d5cf

            SHA256

            d9fe5bdceeea4b6d7df6517e3cbbf1c905fdbf5a2726b394c942132b41d7b7bb

            SHA512

            724ad77cdba2a6505e04ef7f51783ea9d5654df178db0df16123a8485611b71b43cd5bc88f3fca6ac68ef981becf475a6a2c1f30f9c8ef33ef38bb9b18a80c00

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un084612.exe

            Filesize

            550KB

            MD5

            90b10c0e296ef2dc0bda455b428776bf

            SHA1

            6fee97a53515717bed3df128bb164ab50be3d5cf

            SHA256

            d9fe5bdceeea4b6d7df6517e3cbbf1c905fdbf5a2726b394c942132b41d7b7bb

            SHA512

            724ad77cdba2a6505e04ef7f51783ea9d5654df178db0df16123a8485611b71b43cd5bc88f3fca6ac68ef981becf475a6a2c1f30f9c8ef33ef38bb9b18a80c00

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr217839.exe

            Filesize

            278KB

            MD5

            cbae47461a1a60c1f0c654763684bcb7

            SHA1

            5a11eaea105ae7aa07117d7620854e165d1b7918

            SHA256

            577874c96a143b37e3e34cbc1b8ad88c05575972633c707e27cec2af9debfb36

            SHA512

            8d69b016e59c6b22b5b7afeb2788e8d226453fc72a132204deae52f0c06ed1f332baf47d4043a772df8057150223c4a2a6f74a4d7c2a719ec33e521a75b949c4

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr217839.exe

            Filesize

            278KB

            MD5

            cbae47461a1a60c1f0c654763684bcb7

            SHA1

            5a11eaea105ae7aa07117d7620854e165d1b7918

            SHA256

            577874c96a143b37e3e34cbc1b8ad88c05575972633c707e27cec2af9debfb36

            SHA512

            8d69b016e59c6b22b5b7afeb2788e8d226453fc72a132204deae52f0c06ed1f332baf47d4043a772df8057150223c4a2a6f74a4d7c2a719ec33e521a75b949c4

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu406365.exe

            Filesize

            361KB

            MD5

            e2d103d516c40e00c75afd6406f04623

            SHA1

            ff90fb95a8b3de2b1fd8ae31e39a84702736d443

            SHA256

            d44621426d05ed3d1947ae07350c3c5aff2ade538f13a7bd578b26f2ed2942f1

            SHA512

            764ce8d0c1a576e1299ce633dce6a0627c41fc87f464c1c5a28c2a32595a86718e571bd67b2d5d634befdd672988beeb1867b17f6f0e0d1c97d32c247d096c93

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu406365.exe

            Filesize

            361KB

            MD5

            e2d103d516c40e00c75afd6406f04623

            SHA1

            ff90fb95a8b3de2b1fd8ae31e39a84702736d443

            SHA256

            d44621426d05ed3d1947ae07350c3c5aff2ade538f13a7bd578b26f2ed2942f1

            SHA512

            764ce8d0c1a576e1299ce633dce6a0627c41fc87f464c1c5a28c2a32595a86718e571bd67b2d5d634befdd672988beeb1867b17f6f0e0d1c97d32c247d096c93

          • memory/548-184-0x0000000004CD0000-0x0000000004CE2000-memory.dmp

            Filesize

            72KB

          • memory/548-150-0x0000000004770000-0x0000000004780000-memory.dmp

            Filesize

            64KB

          • memory/548-152-0x0000000004770000-0x0000000004780000-memory.dmp

            Filesize

            64KB

          • memory/548-153-0x0000000000400000-0x0000000002BAF000-memory.dmp

            Filesize

            39.7MB

          • memory/548-154-0x0000000004770000-0x0000000004780000-memory.dmp

            Filesize

            64KB

          • memory/548-156-0x0000000004770000-0x0000000004780000-memory.dmp

            Filesize

            64KB

          • memory/548-155-0x0000000004770000-0x0000000004780000-memory.dmp

            Filesize

            64KB

          • memory/548-157-0x0000000004CD0000-0x0000000004CE2000-memory.dmp

            Filesize

            72KB

          • memory/548-158-0x0000000004CD0000-0x0000000004CE2000-memory.dmp

            Filesize

            72KB

          • memory/548-160-0x0000000004CD0000-0x0000000004CE2000-memory.dmp

            Filesize

            72KB

          • memory/548-162-0x0000000004CD0000-0x0000000004CE2000-memory.dmp

            Filesize

            72KB

          • memory/548-164-0x0000000004CD0000-0x0000000004CE2000-memory.dmp

            Filesize

            72KB

          • memory/548-166-0x0000000004CD0000-0x0000000004CE2000-memory.dmp

            Filesize

            72KB

          • memory/548-168-0x0000000004CD0000-0x0000000004CE2000-memory.dmp

            Filesize

            72KB

          • memory/548-170-0x0000000004CD0000-0x0000000004CE2000-memory.dmp

            Filesize

            72KB

          • memory/548-172-0x0000000004CD0000-0x0000000004CE2000-memory.dmp

            Filesize

            72KB

          • memory/548-174-0x0000000004CD0000-0x0000000004CE2000-memory.dmp

            Filesize

            72KB

          • memory/548-178-0x0000000004CD0000-0x0000000004CE2000-memory.dmp

            Filesize

            72KB

          • memory/548-176-0x0000000004CD0000-0x0000000004CE2000-memory.dmp

            Filesize

            72KB

          • memory/548-180-0x0000000004CD0000-0x0000000004CE2000-memory.dmp

            Filesize

            72KB

          • memory/548-182-0x0000000004CD0000-0x0000000004CE2000-memory.dmp

            Filesize

            72KB

          • memory/548-151-0x0000000004770000-0x0000000004780000-memory.dmp

            Filesize

            64KB

          • memory/548-188-0x0000000000400000-0x0000000002BAF000-memory.dmp

            Filesize

            39.7MB

          • memory/548-149-0x00000000071A0000-0x0000000007744000-memory.dmp

            Filesize

            5.6MB

          • memory/548-148-0x0000000002BB0000-0x0000000002BDD000-memory.dmp

            Filesize

            180KB

          • memory/4868-225-0x0000000002CE0000-0x0000000002D26000-memory.dmp

            Filesize

            280KB

          • memory/4868-993-0x0000000007360000-0x0000000007370000-memory.dmp

            Filesize

            64KB

          • memory/4868-992-0x00000000072F0000-0x000000000732C000-memory.dmp

            Filesize

            240KB

          • memory/4868-194-0x0000000007210000-0x0000000007245000-memory.dmp

            Filesize

            212KB

          • memory/4868-223-0x0000000007210000-0x0000000007245000-memory.dmp

            Filesize

            212KB

          • memory/4868-203-0x0000000007210000-0x0000000007245000-memory.dmp

            Filesize

            212KB

          • memory/4868-205-0x0000000007210000-0x0000000007245000-memory.dmp

            Filesize

            212KB

          • memory/4868-207-0x0000000007210000-0x0000000007245000-memory.dmp

            Filesize

            212KB

          • memory/4868-209-0x0000000007210000-0x0000000007245000-memory.dmp

            Filesize

            212KB

          • memory/4868-213-0x0000000007210000-0x0000000007245000-memory.dmp

            Filesize

            212KB

          • memory/4868-211-0x0000000007210000-0x0000000007245000-memory.dmp

            Filesize

            212KB

          • memory/4868-215-0x0000000007210000-0x0000000007245000-memory.dmp

            Filesize

            212KB

          • memory/4868-199-0x0000000007210000-0x0000000007245000-memory.dmp

            Filesize

            212KB

          • memory/4868-217-0x0000000007210000-0x0000000007245000-memory.dmp

            Filesize

            212KB

          • memory/4868-201-0x0000000007210000-0x0000000007245000-memory.dmp

            Filesize

            212KB

          • memory/4868-219-0x0000000007210000-0x0000000007245000-memory.dmp

            Filesize

            212KB

          • memory/4868-227-0x0000000007360000-0x0000000007370000-memory.dmp

            Filesize

            64KB

          • memory/4868-230-0x0000000007360000-0x0000000007370000-memory.dmp

            Filesize

            64KB

          • memory/4868-221-0x0000000007210000-0x0000000007245000-memory.dmp

            Filesize

            212KB

          • memory/4868-989-0x0000000009DA0000-0x000000000A3B8000-memory.dmp

            Filesize

            6.1MB

          • memory/4868-990-0x00000000072D0000-0x00000000072E2000-memory.dmp

            Filesize

            72KB

          • memory/4868-991-0x000000000A3C0000-0x000000000A4CA000-memory.dmp

            Filesize

            1.0MB

          • memory/4868-197-0x0000000007210000-0x0000000007245000-memory.dmp

            Filesize

            212KB

          • memory/4868-195-0x0000000007210000-0x0000000007245000-memory.dmp

            Filesize

            212KB

          • memory/4868-995-0x0000000007360000-0x0000000007370000-memory.dmp

            Filesize

            64KB

          • memory/4868-996-0x0000000007360000-0x0000000007370000-memory.dmp

            Filesize

            64KB

          • memory/4868-997-0x0000000007360000-0x0000000007370000-memory.dmp

            Filesize

            64KB

          • memory/4868-998-0x0000000007360000-0x0000000007370000-memory.dmp

            Filesize

            64KB