Analysis

  • max time kernel
    206s
  • max time network
    220s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 20:26

General

  • Target

    0c856bc151f53b3820a5abfe6930fdf0dd51bfacfdf2e0d8e3dd20a81d0a8602.exe

  • Size

    747KB

  • MD5

    62bc21d38cb8d88dfbb6fe0b75996112

  • SHA1

    a1ba0d14f3a99126ff5fb3b03c240045c2fa2530

  • SHA256

    0c856bc151f53b3820a5abfe6930fdf0dd51bfacfdf2e0d8e3dd20a81d0a8602

  • SHA512

    e955310da1432294e573e97b52d801f1e572bbd0618e0d0c56bf6aa7084c6627397b65a2bd1cd3895beaca51ae30a3af178d8a2bc0f20ef2aee62cbb31561bfc

  • SSDEEP

    12288:Oy90D2l0aLw2muR5et/rZIzraNV9SZks15JMhMO9pOBtGW5+PbnmYsqnoSk3:Oy62l0O1N7eRrZI+NV9gkkTCGGWoPKL/

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c856bc151f53b3820a5abfe6930fdf0dd51bfacfdf2e0d8e3dd20a81d0a8602.exe
    "C:\Users\Admin\AppData\Local\Temp\0c856bc151f53b3820a5abfe6930fdf0dd51bfacfdf2e0d8e3dd20a81d0a8602.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:624
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un207680.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un207680.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4480
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\43937270.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\43937270.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3136
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3136 -s 1096
          4⤵
          • Program crash
          PID:3460
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk361195.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk361195.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4592
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3136 -ip 3136
    1⤵
      PID:3284

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un207680.exe

      Filesize

      592KB

      MD5

      7e06c6606179c6e4df60051c629b6633

      SHA1

      89b1ff71e07783b42ad06695a1a61e65e99ff7eb

      SHA256

      46c4de730bb3dbf89799a9b33df5a2189f657daed837839082bbd7a3879adc85

      SHA512

      3e7155921c993cd27f10110371fab3eab1a765247ec68e89017132fe736a99926a5cf68b1c19b9c6d4000cc813cf2cb91ad7f65c2d076ffb63a68678790013dd

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un207680.exe

      Filesize

      592KB

      MD5

      7e06c6606179c6e4df60051c629b6633

      SHA1

      89b1ff71e07783b42ad06695a1a61e65e99ff7eb

      SHA256

      46c4de730bb3dbf89799a9b33df5a2189f657daed837839082bbd7a3879adc85

      SHA512

      3e7155921c993cd27f10110371fab3eab1a765247ec68e89017132fe736a99926a5cf68b1c19b9c6d4000cc813cf2cb91ad7f65c2d076ffb63a68678790013dd

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\43937270.exe

      Filesize

      376KB

      MD5

      faeb38832b5eae79f0d50678583c39b5

      SHA1

      e19f9d07954e2e173c1978052bd3ba0413b657b6

      SHA256

      0dfad5a02c60162ee562ff54cb0da87a44a8589549bfaf9fc2befc38647e3798

      SHA512

      098b4112423176aa88269e22e13553c0e74da1d5ad9dd941eb7d966bf7743969d9222b80a468d44a1d155e35edfdf00bc275cea396d7b1501f64cdf111b4a27b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\43937270.exe

      Filesize

      376KB

      MD5

      faeb38832b5eae79f0d50678583c39b5

      SHA1

      e19f9d07954e2e173c1978052bd3ba0413b657b6

      SHA256

      0dfad5a02c60162ee562ff54cb0da87a44a8589549bfaf9fc2befc38647e3798

      SHA512

      098b4112423176aa88269e22e13553c0e74da1d5ad9dd941eb7d966bf7743969d9222b80a468d44a1d155e35edfdf00bc275cea396d7b1501f64cdf111b4a27b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk361195.exe

      Filesize

      459KB

      MD5

      5743d32bf7d508faf5505e600991cc87

      SHA1

      ef0da1f6da8627ac9d4a2b879ac2bdaedb46cb94

      SHA256

      49251de25e33b48ae6dfaa235009db1ea8d83a3d16506e5a832a42c4f2835ae4

      SHA512

      b8ca74ad57ad61685c43e4c8a1c1946811cf44fc41691cb15f14c3f08398aa3ff37b75fb525ea3318a924d8d7dc6b5ec264971dd4015942fc52695c41588f5fa

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk361195.exe

      Filesize

      459KB

      MD5

      5743d32bf7d508faf5505e600991cc87

      SHA1

      ef0da1f6da8627ac9d4a2b879ac2bdaedb46cb94

      SHA256

      49251de25e33b48ae6dfaa235009db1ea8d83a3d16506e5a832a42c4f2835ae4

      SHA512

      b8ca74ad57ad61685c43e4c8a1c1946811cf44fc41691cb15f14c3f08398aa3ff37b75fb525ea3318a924d8d7dc6b5ec264971dd4015942fc52695c41588f5fa

    • memory/3136-150-0x0000000000810000-0x000000000083D000-memory.dmp

      Filesize

      180KB

    • memory/3136-151-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

      Filesize

      64KB

    • memory/3136-152-0x0000000004EB0000-0x0000000005454000-memory.dmp

      Filesize

      5.6MB

    • memory/3136-153-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/3136-154-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/3136-156-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/3136-158-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/3136-160-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/3136-162-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/3136-164-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/3136-166-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/3136-168-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/3136-170-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/3136-172-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/3136-174-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/3136-176-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/3136-178-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/3136-180-0x0000000004D70000-0x0000000004D82000-memory.dmp

      Filesize

      72KB

    • memory/3136-181-0x0000000000400000-0x0000000000803000-memory.dmp

      Filesize

      4.0MB

    • memory/3136-186-0x0000000000400000-0x0000000000803000-memory.dmp

      Filesize

      4.0MB

    • memory/4592-194-0x0000000002890000-0x00000000028C5000-memory.dmp

      Filesize

      212KB

    • memory/4592-193-0x0000000002890000-0x00000000028C5000-memory.dmp

      Filesize

      212KB

    • memory/4592-196-0x0000000002890000-0x00000000028C5000-memory.dmp

      Filesize

      212KB

    • memory/4592-198-0x0000000002890000-0x00000000028C5000-memory.dmp

      Filesize

      212KB

    • memory/4592-200-0x0000000002890000-0x00000000028C5000-memory.dmp

      Filesize

      212KB

    • memory/4592-202-0x0000000002890000-0x00000000028C5000-memory.dmp

      Filesize

      212KB

    • memory/4592-204-0x0000000002890000-0x00000000028C5000-memory.dmp

      Filesize

      212KB

    • memory/4592-206-0x0000000002890000-0x00000000028C5000-memory.dmp

      Filesize

      212KB

    • memory/4592-208-0x0000000002890000-0x00000000028C5000-memory.dmp

      Filesize

      212KB

    • memory/4592-210-0x0000000002890000-0x00000000028C5000-memory.dmp

      Filesize

      212KB

    • memory/4592-212-0x0000000002890000-0x00000000028C5000-memory.dmp

      Filesize

      212KB

    • memory/4592-214-0x0000000002890000-0x00000000028C5000-memory.dmp

      Filesize

      212KB

    • memory/4592-216-0x0000000002890000-0x00000000028C5000-memory.dmp

      Filesize

      212KB

    • memory/4592-218-0x0000000002890000-0x00000000028C5000-memory.dmp

      Filesize

      212KB

    • memory/4592-220-0x0000000002890000-0x00000000028C5000-memory.dmp

      Filesize

      212KB

    • memory/4592-524-0x00000000008F0000-0x0000000000936000-memory.dmp

      Filesize

      280KB

    • memory/4592-525-0x0000000002720000-0x0000000002730000-memory.dmp

      Filesize

      64KB

    • memory/4592-530-0x0000000002720000-0x0000000002730000-memory.dmp

      Filesize

      64KB

    • memory/4592-528-0x0000000002720000-0x0000000002730000-memory.dmp

      Filesize

      64KB

    • memory/4592-990-0x0000000002720000-0x0000000002730000-memory.dmp

      Filesize

      64KB

    • memory/4592-991-0x0000000002720000-0x0000000002730000-memory.dmp

      Filesize

      64KB

    • memory/4592-992-0x0000000002720000-0x0000000002730000-memory.dmp

      Filesize

      64KB

    • memory/4592-994-0x00000000078F0000-0x0000000007F08000-memory.dmp

      Filesize

      6.1MB

    • memory/4592-995-0x0000000007F70000-0x0000000007F82000-memory.dmp

      Filesize

      72KB

    • memory/4592-996-0x0000000007F90000-0x000000000809A000-memory.dmp

      Filesize

      1.0MB

    • memory/4592-997-0x0000000002720000-0x0000000002730000-memory.dmp

      Filesize

      64KB

    • memory/4592-998-0x00000000080B0000-0x00000000080EC000-memory.dmp

      Filesize

      240KB

    • memory/4592-1000-0x0000000002720000-0x0000000002730000-memory.dmp

      Filesize

      64KB