Analysis

  • max time kernel
    148s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 21:19

General

  • Target

    35fb5f5b7888cd756ede29efa67886e0d2c460646dba646ec1be48c1971003d7.exe

  • Size

    690KB

  • MD5

    d59e31f538f8e328546a340674f8645c

  • SHA1

    51b717cc1541c1b5a07d096e902e25b0b055a348

  • SHA256

    35fb5f5b7888cd756ede29efa67886e0d2c460646dba646ec1be48c1971003d7

  • SHA512

    077a22efd0319adcca4afcb213fa75f6ff78f8143d81a92861bbc6d6a23676bc362d124b6eaf8bf9ee1c18dde1d25f2f3849316908eb4fd059b50cdf2cadabaf

  • SSDEEP

    12288:Ay90VnUFJk/ufMrRPvMhsofdkfRkVS63Mq0ZGhGJniNEmVu1ul6A/EyK:AyLk/uf8RPvGskGRkSJxZ4NoGRsyK

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\35fb5f5b7888cd756ede29efa67886e0d2c460646dba646ec1be48c1971003d7.exe
    "C:\Users\Admin\AppData\Local\Temp\35fb5f5b7888cd756ede29efa67886e0d2c460646dba646ec1be48c1971003d7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2284
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un133688.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un133688.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2192
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\53309168.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\53309168.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4516
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4516 -s 1084
          4⤵
          • Program crash
          PID:224
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk197346.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk197346.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4104
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4516 -ip 4516
    1⤵
      PID:3740

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un133688.exe

      Filesize

      536KB

      MD5

      9ec1f4ea7e0ea9b25522736ec8ae1317

      SHA1

      9cf02362d8f01465e2e0d8e713b05cc5888adfb5

      SHA256

      fa0164d731494fae163726e74d78cba342a31e85fb1d4e5373651b931a0ba35a

      SHA512

      e8093a3b544c903f0007747d80d153f8fac3c2b2aa5982ea23c793dcabbe4ca9bf0a3beff788918bbbc669ef9962d96d985ac749fa48753f6ed68e83fad39f7c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un133688.exe

      Filesize

      536KB

      MD5

      9ec1f4ea7e0ea9b25522736ec8ae1317

      SHA1

      9cf02362d8f01465e2e0d8e713b05cc5888adfb5

      SHA256

      fa0164d731494fae163726e74d78cba342a31e85fb1d4e5373651b931a0ba35a

      SHA512

      e8093a3b544c903f0007747d80d153f8fac3c2b2aa5982ea23c793dcabbe4ca9bf0a3beff788918bbbc669ef9962d96d985ac749fa48753f6ed68e83fad39f7c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\53309168.exe

      Filesize

      258KB

      MD5

      951edf838f3fd6f73ef7dfce34a4049c

      SHA1

      ee4b00c87be6ceb851dc9f6569f31333b1afaa0b

      SHA256

      2a139a1c47e26170ef6af3840bcbe99872eb4dcc2c02de836ab1fc1d8a869442

      SHA512

      22d17a8bd0337e91a2c4fb6913cc29481f072c8a0ebf97ab95aae998207d327e765adb6a07bee44c765a77db2577a2d4285fe0cda134f526cd14c391aa4d0716

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\53309168.exe

      Filesize

      258KB

      MD5

      951edf838f3fd6f73ef7dfce34a4049c

      SHA1

      ee4b00c87be6ceb851dc9f6569f31333b1afaa0b

      SHA256

      2a139a1c47e26170ef6af3840bcbe99872eb4dcc2c02de836ab1fc1d8a869442

      SHA512

      22d17a8bd0337e91a2c4fb6913cc29481f072c8a0ebf97ab95aae998207d327e765adb6a07bee44c765a77db2577a2d4285fe0cda134f526cd14c391aa4d0716

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk197346.exe

      Filesize

      341KB

      MD5

      e1ac90120d52cc657eefb538d254c540

      SHA1

      73b764dc4e41f8fddecab6bf4c61b1b5251be666

      SHA256

      6dfea7801190d7f8b2851d3980e62cfbe941b541e7e13c75ebb168fa4342acca

      SHA512

      1832bc0223e7f0f30386be91af6e5e829156c9f6edb2554040d2893a9f7626e38c905bcd1d471ac5082fab46a298bf9e8dc564d8b0337ba4b8fd9117042eab81

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk197346.exe

      Filesize

      341KB

      MD5

      e1ac90120d52cc657eefb538d254c540

      SHA1

      73b764dc4e41f8fddecab6bf4c61b1b5251be666

      SHA256

      6dfea7801190d7f8b2851d3980e62cfbe941b541e7e13c75ebb168fa4342acca

      SHA512

      1832bc0223e7f0f30386be91af6e5e829156c9f6edb2554040d2893a9f7626e38c905bcd1d471ac5082fab46a298bf9e8dc564d8b0337ba4b8fd9117042eab81

    • memory/4104-217-0x0000000002300000-0x0000000002335000-memory.dmp

      Filesize

      212KB

    • memory/4104-329-0x00000000020D0000-0x0000000002116000-memory.dmp

      Filesize

      280KB

    • memory/4104-999-0x0000000002700000-0x0000000002710000-memory.dmp

      Filesize

      64KB

    • memory/4104-996-0x0000000002700000-0x0000000002710000-memory.dmp

      Filesize

      64KB

    • memory/4104-995-0x0000000007D00000-0x0000000007D3C000-memory.dmp

      Filesize

      240KB

    • memory/4104-994-0x0000000007BF0000-0x0000000007CFA000-memory.dmp

      Filesize

      1.0MB

    • memory/4104-993-0x0000000002700000-0x0000000002710000-memory.dmp

      Filesize

      64KB

    • memory/4104-992-0x0000000002700000-0x0000000002710000-memory.dmp

      Filesize

      64KB

    • memory/4104-991-0x0000000002700000-0x0000000002710000-memory.dmp

      Filesize

      64KB

    • memory/4104-990-0x0000000002720000-0x0000000002732000-memory.dmp

      Filesize

      72KB

    • memory/4104-195-0x0000000002300000-0x0000000002335000-memory.dmp

      Filesize

      212KB

    • memory/4104-335-0x0000000002700000-0x0000000002710000-memory.dmp

      Filesize

      64KB

    • memory/4104-199-0x0000000002300000-0x0000000002335000-memory.dmp

      Filesize

      212KB

    • memory/4104-193-0x0000000002300000-0x0000000002335000-memory.dmp

      Filesize

      212KB

    • memory/4104-333-0x0000000002700000-0x0000000002710000-memory.dmp

      Filesize

      64KB

    • memory/4104-203-0x0000000002300000-0x0000000002335000-memory.dmp

      Filesize

      212KB

    • memory/4104-331-0x0000000002700000-0x0000000002710000-memory.dmp

      Filesize

      64KB

    • memory/4104-221-0x0000000002300000-0x0000000002335000-memory.dmp

      Filesize

      212KB

    • memory/4104-219-0x0000000002300000-0x0000000002335000-memory.dmp

      Filesize

      212KB

    • memory/4104-215-0x0000000002300000-0x0000000002335000-memory.dmp

      Filesize

      212KB

    • memory/4104-213-0x0000000002300000-0x0000000002335000-memory.dmp

      Filesize

      212KB

    • memory/4104-211-0x0000000002300000-0x0000000002335000-memory.dmp

      Filesize

      212KB

    • memory/4104-209-0x0000000002300000-0x0000000002335000-memory.dmp

      Filesize

      212KB

    • memory/4104-192-0x0000000002300000-0x0000000002335000-memory.dmp

      Filesize

      212KB

    • memory/4104-207-0x0000000002300000-0x0000000002335000-memory.dmp

      Filesize

      212KB

    • memory/4104-988-0x00000000075D0000-0x0000000007BE8000-memory.dmp

      Filesize

      6.1MB

    • memory/4104-205-0x0000000002300000-0x0000000002335000-memory.dmp

      Filesize

      212KB

    • memory/4104-197-0x0000000002300000-0x0000000002335000-memory.dmp

      Filesize

      212KB

    • memory/4104-201-0x0000000002300000-0x0000000002335000-memory.dmp

      Filesize

      212KB

    • memory/4516-175-0x0000000002580000-0x0000000002593000-memory.dmp

      Filesize

      76KB

    • memory/4516-173-0x0000000002580000-0x0000000002593000-memory.dmp

      Filesize

      76KB

    • memory/4516-153-0x0000000002580000-0x0000000002593000-memory.dmp

      Filesize

      76KB

    • memory/4516-149-0x0000000004A60000-0x0000000005004000-memory.dmp

      Filesize

      5.6MB

    • memory/4516-150-0x0000000002580000-0x0000000002593000-memory.dmp

      Filesize

      76KB

    • memory/4516-183-0x0000000000400000-0x0000000000455000-memory.dmp

      Filesize

      340KB

    • memory/4516-182-0x00000000025A0000-0x00000000025B0000-memory.dmp

      Filesize

      64KB

    • memory/4516-148-0x00000000005D0000-0x00000000005FD000-memory.dmp

      Filesize

      180KB

    • memory/4516-181-0x00000000025A0000-0x00000000025B0000-memory.dmp

      Filesize

      64KB

    • memory/4516-180-0x00000000025A0000-0x00000000025B0000-memory.dmp

      Filesize

      64KB

    • memory/4516-179-0x0000000000400000-0x0000000000455000-memory.dmp

      Filesize

      340KB

    • memory/4516-178-0x00000000025A0000-0x00000000025B0000-memory.dmp

      Filesize

      64KB

    • memory/4516-177-0x0000000002580000-0x0000000002593000-memory.dmp

      Filesize

      76KB

    • memory/4516-171-0x0000000002580000-0x0000000002593000-memory.dmp

      Filesize

      76KB

    • memory/4516-169-0x0000000002580000-0x0000000002593000-memory.dmp

      Filesize

      76KB

    • memory/4516-167-0x0000000002580000-0x0000000002593000-memory.dmp

      Filesize

      76KB

    • memory/4516-165-0x0000000002580000-0x0000000002593000-memory.dmp

      Filesize

      76KB

    • memory/4516-159-0x0000000002580000-0x0000000002593000-memory.dmp

      Filesize

      76KB

    • memory/4516-161-0x0000000002580000-0x0000000002593000-memory.dmp

      Filesize

      76KB

    • memory/4516-163-0x0000000002580000-0x0000000002593000-memory.dmp

      Filesize

      76KB

    • memory/4516-157-0x0000000002580000-0x0000000002593000-memory.dmp

      Filesize

      76KB

    • memory/4516-155-0x0000000002580000-0x0000000002593000-memory.dmp

      Filesize

      76KB

    • memory/4516-151-0x0000000002580000-0x0000000002593000-memory.dmp

      Filesize

      76KB