Analysis

  • max time kernel
    152s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 22:44

General

  • Target

    0715d4780f10de781cb3f914eee9407bfb8123695ca5ab89649cc23f39deeb20.exe

  • Size

    966KB

  • MD5

    0577d37fce6009336863c78e6f9f4b6e

  • SHA1

    23fe9400b25a4ab2c077b3a19a6ad1f13f160ec7

  • SHA256

    0715d4780f10de781cb3f914eee9407bfb8123695ca5ab89649cc23f39deeb20

  • SHA512

    89ddeb724ec49f7200de3ced19d905d679337d606951bf70d3777f12e54a5b84f265fd1eb68b5099ab916f761b9fd8dfdcabb4d04d8feba01bee86ec7dda747d

  • SSDEEP

    12288:oy90rf0WEwrEJXC+c/aPblP0p6H+9TQWd8vtuCrto3dr8mC8c025ZED0HuJP+LXo:oyFWE/xeGJnxzfyr84cB+OX1A4o5AE

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0715d4780f10de781cb3f914eee9407bfb8123695ca5ab89649cc23f39deeb20.exe
    "C:\Users\Admin\AppData\Local\Temp\0715d4780f10de781cb3f914eee9407bfb8123695ca5ab89649cc23f39deeb20.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:772
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un864061.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un864061.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1040
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un289695.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un289695.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3748
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr296962.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr296962.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2248
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2248 -s 1036
            5⤵
            • Program crash
            PID:1932
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu460922.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu460922.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:2860
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2248 -ip 2248
    1⤵
      PID:3292

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un864061.exe

      Filesize

      706KB

      MD5

      fcc9d9303a73b18d073eb4b6d5c27bd4

      SHA1

      4237ac5bc2355fc46a1f35a70d0273b5229d4ffe

      SHA256

      f003fd6d521fbff6e62caed4e4f711fd3b22c1046caff7c59128f97224200031

      SHA512

      b3f2519c1b4ecfaf491061ff58efeab9611fd35b386d570eb296babd822a44419c2ec5e86004376cd882a833daea4c81cee595cda54b36827c62fe7081eb60d8

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un864061.exe

      Filesize

      706KB

      MD5

      fcc9d9303a73b18d073eb4b6d5c27bd4

      SHA1

      4237ac5bc2355fc46a1f35a70d0273b5229d4ffe

      SHA256

      f003fd6d521fbff6e62caed4e4f711fd3b22c1046caff7c59128f97224200031

      SHA512

      b3f2519c1b4ecfaf491061ff58efeab9611fd35b386d570eb296babd822a44419c2ec5e86004376cd882a833daea4c81cee595cda54b36827c62fe7081eb60d8

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un289695.exe

      Filesize

      552KB

      MD5

      5c63ec066717d0f3ad1fc38428dd9fcb

      SHA1

      045897da15bb504752f8f45e25961a6d3f4f599e

      SHA256

      a0e7f1b8775b297ee5f5f1e5d53bd0106d3f76a544e2f96b8c1f6e866b15d5c8

      SHA512

      9212d1c47d23f83d7f78660d8b3c16808e00262b004601c7f576602324ffc01f062ec213a6830a3a1e307326329be840785db25619fd10f00c6b15913ebc23b3

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un289695.exe

      Filesize

      552KB

      MD5

      5c63ec066717d0f3ad1fc38428dd9fcb

      SHA1

      045897da15bb504752f8f45e25961a6d3f4f599e

      SHA256

      a0e7f1b8775b297ee5f5f1e5d53bd0106d3f76a544e2f96b8c1f6e866b15d5c8

      SHA512

      9212d1c47d23f83d7f78660d8b3c16808e00262b004601c7f576602324ffc01f062ec213a6830a3a1e307326329be840785db25619fd10f00c6b15913ebc23b3

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr296962.exe

      Filesize

      299KB

      MD5

      c84683a274d99cc645007df85509c064

      SHA1

      2e2afcbf4f3e439cf8f2e37bed0f0aed1977df58

      SHA256

      d4d906cd8786db867e41045efc5925e18d556b9ad7c025f2ffd3bc128e25d204

      SHA512

      e80a264232b2b3fe521b30e482794c7fe46ab0a6974f6f44be2aff7a5da1a97eab6789b508508cd4e8a34434bf4469884d4068ba86f1d77c7f4b4f27f9039431

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr296962.exe

      Filesize

      299KB

      MD5

      c84683a274d99cc645007df85509c064

      SHA1

      2e2afcbf4f3e439cf8f2e37bed0f0aed1977df58

      SHA256

      d4d906cd8786db867e41045efc5925e18d556b9ad7c025f2ffd3bc128e25d204

      SHA512

      e80a264232b2b3fe521b30e482794c7fe46ab0a6974f6f44be2aff7a5da1a97eab6789b508508cd4e8a34434bf4469884d4068ba86f1d77c7f4b4f27f9039431

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu460922.exe

      Filesize

      382KB

      MD5

      76277ef0dc11080cf5c36242d1d9aa2f

      SHA1

      a21615d638ffa7002f5249af0c8846b13f6ed357

      SHA256

      39fdfbf63597fb3b390600d04da77b747402394d4aee3641b78e4d1f68bd0da4

      SHA512

      8af3cf7bdea7c7a38aaf96c179c1bd5d1193e7d6fca80e2411335c6a5b42ea1ac9f32831a518ab5b2d389565b8f74cc90d64d4c6b11e3e3b006d038c28ed627e

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu460922.exe

      Filesize

      382KB

      MD5

      76277ef0dc11080cf5c36242d1d9aa2f

      SHA1

      a21615d638ffa7002f5249af0c8846b13f6ed357

      SHA256

      39fdfbf63597fb3b390600d04da77b747402394d4aee3641b78e4d1f68bd0da4

      SHA512

      8af3cf7bdea7c7a38aaf96c179c1bd5d1193e7d6fca80e2411335c6a5b42ea1ac9f32831a518ab5b2d389565b8f74cc90d64d4c6b11e3e3b006d038c28ed627e

    • memory/2248-192-0x0000000007390000-0x00000000073A0000-memory.dmp

      Filesize

      64KB

    • memory/2248-158-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

      Filesize

      72KB

    • memory/2248-160-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

      Filesize

      72KB

    • memory/2248-162-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

      Filesize

      72KB

    • memory/2248-176-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

      Filesize

      72KB

    • memory/2248-180-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

      Filesize

      72KB

    • memory/2248-184-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

      Filesize

      72KB

    • memory/2248-182-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

      Filesize

      72KB

    • memory/2248-178-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

      Filesize

      72KB

    • memory/2248-174-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

      Filesize

      72KB

    • memory/2248-172-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

      Filesize

      72KB

    • memory/2248-170-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

      Filesize

      72KB

    • memory/2248-168-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

      Filesize

      72KB

    • memory/2248-166-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

      Filesize

      72KB

    • memory/2248-164-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

      Filesize

      72KB

    • memory/2248-186-0x0000000007390000-0x00000000073A0000-memory.dmp

      Filesize

      64KB

    • memory/2248-185-0x0000000007390000-0x00000000073A0000-memory.dmp

      Filesize

      64KB

    • memory/2248-187-0x0000000007390000-0x00000000073A0000-memory.dmp

      Filesize

      64KB

    • memory/2248-188-0x0000000000400000-0x0000000002BB5000-memory.dmp

      Filesize

      39.7MB

    • memory/2248-190-0x0000000007390000-0x00000000073A0000-memory.dmp

      Filesize

      64KB

    • memory/2248-191-0x0000000007390000-0x00000000073A0000-memory.dmp

      Filesize

      64KB

    • memory/2248-157-0x0000000004BC0000-0x0000000004BD2000-memory.dmp

      Filesize

      72KB

    • memory/2248-193-0x0000000000400000-0x0000000002BB5000-memory.dmp

      Filesize

      39.7MB

    • memory/2248-156-0x00000000073A0000-0x0000000007944000-memory.dmp

      Filesize

      5.6MB

    • memory/2248-155-0x0000000002BC0000-0x0000000002BED000-memory.dmp

      Filesize

      180KB

    • memory/2860-201-0x0000000007190000-0x00000000071C5000-memory.dmp

      Filesize

      212KB

    • memory/2860-227-0x0000000007190000-0x00000000071C5000-memory.dmp

      Filesize

      212KB

    • memory/2860-198-0x0000000007190000-0x00000000071C5000-memory.dmp

      Filesize

      212KB

    • memory/2860-203-0x0000000007190000-0x00000000071C5000-memory.dmp

      Filesize

      212KB

    • memory/2860-205-0x0000000007190000-0x00000000071C5000-memory.dmp

      Filesize

      212KB

    • memory/2860-207-0x0000000007190000-0x00000000071C5000-memory.dmp

      Filesize

      212KB

    • memory/2860-211-0x0000000007190000-0x00000000071C5000-memory.dmp

      Filesize

      212KB

    • memory/2860-213-0x0000000007190000-0x00000000071C5000-memory.dmp

      Filesize

      212KB

    • memory/2860-209-0x0000000007190000-0x00000000071C5000-memory.dmp

      Filesize

      212KB

    • memory/2860-215-0x0000000007190000-0x00000000071C5000-memory.dmp

      Filesize

      212KB

    • memory/2860-217-0x0000000007190000-0x00000000071C5000-memory.dmp

      Filesize

      212KB

    • memory/2860-219-0x0000000007190000-0x00000000071C5000-memory.dmp

      Filesize

      212KB

    • memory/2860-221-0x0000000007190000-0x00000000071C5000-memory.dmp

      Filesize

      212KB

    • memory/2860-223-0x0000000007190000-0x00000000071C5000-memory.dmp

      Filesize

      212KB

    • memory/2860-225-0x0000000007190000-0x00000000071C5000-memory.dmp

      Filesize

      212KB

    • memory/2860-199-0x0000000007190000-0x00000000071C5000-memory.dmp

      Filesize

      212KB

    • memory/2860-231-0x0000000007190000-0x00000000071C5000-memory.dmp

      Filesize

      212KB

    • memory/2860-229-0x0000000007190000-0x00000000071C5000-memory.dmp

      Filesize

      212KB

    • memory/2860-273-0x0000000002C40000-0x0000000002C86000-memory.dmp

      Filesize

      280KB

    • memory/2860-275-0x00000000072E0000-0x00000000072F0000-memory.dmp

      Filesize

      64KB

    • memory/2860-276-0x00000000072E0000-0x00000000072F0000-memory.dmp

      Filesize

      64KB

    • memory/2860-278-0x00000000072E0000-0x00000000072F0000-memory.dmp

      Filesize

      64KB

    • memory/2860-994-0x0000000009D20000-0x000000000A338000-memory.dmp

      Filesize

      6.1MB

    • memory/2860-995-0x00000000072C0000-0x00000000072D2000-memory.dmp

      Filesize

      72KB

    • memory/2860-996-0x000000000A340000-0x000000000A44A000-memory.dmp

      Filesize

      1.0MB

    • memory/2860-997-0x00000000072E0000-0x00000000072F0000-memory.dmp

      Filesize

      64KB

    • memory/2860-998-0x000000000A470000-0x000000000A4AC000-memory.dmp

      Filesize

      240KB

    • memory/2860-1000-0x00000000072E0000-0x00000000072F0000-memory.dmp

      Filesize

      64KB

    • memory/2860-1001-0x00000000072E0000-0x00000000072F0000-memory.dmp

      Filesize

      64KB

    • memory/2860-1002-0x00000000072E0000-0x00000000072F0000-memory.dmp

      Filesize

      64KB