Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-05-2023 21:11

General

  • Target

    2f3e52216162db48e32a06954a8a8cd5df82b0d1fb27d5abaca81388801b359a.exe

  • Size

    746KB

  • MD5

    e4e716a0b8e190b6bb318178318f7421

  • SHA1

    33bdbdb03c72eb11e02cc5b5477d1689c1948bd4

  • SHA256

    2f3e52216162db48e32a06954a8a8cd5df82b0d1fb27d5abaca81388801b359a

  • SHA512

    e33893b67926afd8fa7b6792832866b05b46bcbdac3ba3ce994083f4fff020d3ddb10fd95fc8c7fb9e944338fce9fa7e149a186fc29825717d986627a5eb00b6

  • SSDEEP

    12288:Iy90Q1aVJmlvBnnyPcOL5WUMU7W0GUm5rvmh2R56sl248NPSJUdBllxknl78rn5:IyWVJmvhyPcw5/MU7WzfrG2/DcNPwG7Z

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f3e52216162db48e32a06954a8a8cd5df82b0d1fb27d5abaca81388801b359a.exe
    "C:\Users\Admin\AppData\Local\Temp\2f3e52216162db48e32a06954a8a8cd5df82b0d1fb27d5abaca81388801b359a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un285504.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un285504.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1112
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\83730441.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\83730441.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2932
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2932 -s 1080
          4⤵
          • Program crash
          PID:1336
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk657419.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk657419.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4568
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2932 -ip 2932
    1⤵
      PID:4652

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un285504.exe

      Filesize

      592KB

      MD5

      617d4f6291fa24b40dab8434bc664b43

      SHA1

      bd0343d8172752ebb6848bfb8c4a7f4481fc4a55

      SHA256

      acb568641e6a3667e281356cfd3cfc5deb59e8149731c0aad2a3f57299536636

      SHA512

      4719d4db706dffa923a0a7dd9da0fcc5f0e358516faaefc8df856577536ed0a93e7327ab909a93d6eabbb79448f133918824acedb3d2a5dc0e73df27ecb62721

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un285504.exe

      Filesize

      592KB

      MD5

      617d4f6291fa24b40dab8434bc664b43

      SHA1

      bd0343d8172752ebb6848bfb8c4a7f4481fc4a55

      SHA256

      acb568641e6a3667e281356cfd3cfc5deb59e8149731c0aad2a3f57299536636

      SHA512

      4719d4db706dffa923a0a7dd9da0fcc5f0e358516faaefc8df856577536ed0a93e7327ab909a93d6eabbb79448f133918824acedb3d2a5dc0e73df27ecb62721

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\83730441.exe

      Filesize

      377KB

      MD5

      90208df0ba58359e6bba0939e468f8a4

      SHA1

      70edf1c0f63f1f38a79cdec82d3774b38557d08d

      SHA256

      708bdea7a0971be71738361cfec577ded2d659a8c42b4af2b1f2854373d9443e

      SHA512

      a6d87ec8b1c59b46d376e4321326b29898a3cb4b447546a219739fc7224569f5d85fa6eaee1a64ff2fe72d8e5ac3b0778bef7f770c3b6881c61f9752beb594e9

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\83730441.exe

      Filesize

      377KB

      MD5

      90208df0ba58359e6bba0939e468f8a4

      SHA1

      70edf1c0f63f1f38a79cdec82d3774b38557d08d

      SHA256

      708bdea7a0971be71738361cfec577ded2d659a8c42b4af2b1f2854373d9443e

      SHA512

      a6d87ec8b1c59b46d376e4321326b29898a3cb4b447546a219739fc7224569f5d85fa6eaee1a64ff2fe72d8e5ac3b0778bef7f770c3b6881c61f9752beb594e9

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk657419.exe

      Filesize

      459KB

      MD5

      da79495f3cd15173f52c4c11aae2927a

      SHA1

      a87aadedf50341f05abe3d8976722892fe80e103

      SHA256

      3660799614d52d064260bb0bc2c8a2fddf71d5db2f6b79ac885413dc99bdeeb9

      SHA512

      ffac1df415e677092710dbd443ce8aeeec03f677e5692705a7df7ef3602131fbbfd3ed389d7d5f786bc578abcf1d9bac81ea88891832e0a46eb0cda1a6643372

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk657419.exe

      Filesize

      459KB

      MD5

      da79495f3cd15173f52c4c11aae2927a

      SHA1

      a87aadedf50341f05abe3d8976722892fe80e103

      SHA256

      3660799614d52d064260bb0bc2c8a2fddf71d5db2f6b79ac885413dc99bdeeb9

      SHA512

      ffac1df415e677092710dbd443ce8aeeec03f677e5692705a7df7ef3602131fbbfd3ed389d7d5f786bc578abcf1d9bac81ea88891832e0a46eb0cda1a6643372

    • memory/2932-164-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

      Filesize

      72KB

    • memory/2932-186-0x0000000000400000-0x0000000000803000-memory.dmp

      Filesize

      4.0MB

    • memory/2932-152-0x0000000004F90000-0x0000000004FA0000-memory.dmp

      Filesize

      64KB

    • memory/2932-153-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

      Filesize

      72KB

    • memory/2932-154-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

      Filesize

      72KB

    • memory/2932-156-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

      Filesize

      72KB

    • memory/2932-158-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

      Filesize

      72KB

    • memory/2932-160-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

      Filesize

      72KB

    • memory/2932-162-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

      Filesize

      72KB

    • memory/2932-150-0x0000000004FA0000-0x0000000005544000-memory.dmp

      Filesize

      5.6MB

    • memory/2932-166-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

      Filesize

      72KB

    • memory/2932-168-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

      Filesize

      72KB

    • memory/2932-170-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

      Filesize

      72KB

    • memory/2932-172-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

      Filesize

      72KB

    • memory/2932-174-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

      Filesize

      72KB

    • memory/2932-176-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

      Filesize

      72KB

    • memory/2932-178-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

      Filesize

      72KB

    • memory/2932-180-0x0000000004EB0000-0x0000000004EC2000-memory.dmp

      Filesize

      72KB

    • memory/2932-181-0x0000000000400000-0x0000000000803000-memory.dmp

      Filesize

      4.0MB

    • memory/2932-182-0x0000000004F90000-0x0000000004FA0000-memory.dmp

      Filesize

      64KB

    • memory/2932-183-0x0000000004F90000-0x0000000004FA0000-memory.dmp

      Filesize

      64KB

    • memory/2932-184-0x0000000004F90000-0x0000000004FA0000-memory.dmp

      Filesize

      64KB

    • memory/2932-151-0x0000000004F90000-0x0000000004FA0000-memory.dmp

      Filesize

      64KB

    • memory/2932-149-0x0000000004F90000-0x0000000004FA0000-memory.dmp

      Filesize

      64KB

    • memory/2932-148-0x00000000008E0000-0x000000000090D000-memory.dmp

      Filesize

      180KB

    • memory/4568-993-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

      Filesize

      64KB

    • memory/4568-217-0x0000000005390000-0x00000000053C5000-memory.dmp

      Filesize

      212KB

    • memory/4568-192-0x0000000005390000-0x00000000053C5000-memory.dmp

      Filesize

      212KB

    • memory/4568-211-0x0000000005390000-0x00000000053C5000-memory.dmp

      Filesize

      212KB

    • memory/4568-198-0x0000000005390000-0x00000000053C5000-memory.dmp

      Filesize

      212KB

    • memory/4568-200-0x0000000005390000-0x00000000053C5000-memory.dmp

      Filesize

      212KB

    • memory/4568-202-0x0000000005390000-0x00000000053C5000-memory.dmp

      Filesize

      212KB

    • memory/4568-204-0x00000000021F0000-0x0000000002236000-memory.dmp

      Filesize

      280KB

    • memory/4568-205-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

      Filesize

      64KB

    • memory/4568-206-0x0000000005390000-0x00000000053C5000-memory.dmp

      Filesize

      212KB

    • memory/4568-207-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

      Filesize

      64KB

    • memory/4568-209-0x0000000005390000-0x00000000053C5000-memory.dmp

      Filesize

      212KB

    • memory/4568-196-0x0000000005390000-0x00000000053C5000-memory.dmp

      Filesize

      212KB

    • memory/4568-213-0x0000000005390000-0x00000000053C5000-memory.dmp

      Filesize

      212KB

    • memory/4568-215-0x0000000005390000-0x00000000053C5000-memory.dmp

      Filesize

      212KB

    • memory/4568-191-0x0000000005390000-0x00000000053C5000-memory.dmp

      Filesize

      212KB

    • memory/4568-219-0x0000000005390000-0x00000000053C5000-memory.dmp

      Filesize

      212KB

    • memory/4568-221-0x0000000005390000-0x00000000053C5000-memory.dmp

      Filesize

      212KB

    • memory/4568-223-0x0000000005390000-0x00000000053C5000-memory.dmp

      Filesize

      212KB

    • memory/4568-225-0x0000000005390000-0x00000000053C5000-memory.dmp

      Filesize

      212KB

    • memory/4568-227-0x0000000005390000-0x00000000053C5000-memory.dmp

      Filesize

      212KB

    • memory/4568-986-0x00000000078B0000-0x0000000007EC8000-memory.dmp

      Filesize

      6.1MB

    • memory/4568-987-0x0000000007F70000-0x0000000007F82000-memory.dmp

      Filesize

      72KB

    • memory/4568-988-0x0000000007F90000-0x000000000809A000-memory.dmp

      Filesize

      1.0MB

    • memory/4568-989-0x00000000080B0000-0x00000000080EC000-memory.dmp

      Filesize

      240KB

    • memory/4568-990-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

      Filesize

      64KB

    • memory/4568-992-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

      Filesize

      64KB

    • memory/4568-194-0x0000000005390000-0x00000000053C5000-memory.dmp

      Filesize

      212KB

    • memory/4568-994-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

      Filesize

      64KB

    • memory/4568-995-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

      Filesize

      64KB