Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-05-2023 20:37

General

  • Target

    14cb15bfc6c567225f9c19006ef79650eaf0622e5790317f7be2aae647f7e3cf.exe

  • Size

    701KB

  • MD5

    4bcaf8cdbef79b4dc47c3a4ee21da181

  • SHA1

    d7baa68613ffa89f3e98ab6a1dbfbc091d8a1205

  • SHA256

    14cb15bfc6c567225f9c19006ef79650eaf0622e5790317f7be2aae647f7e3cf

  • SHA512

    3b3910178d40b6cdbf987b755121c1741984ac6dc2392493f4eeabafb0670c4e475fdcdcf3e8de8f65c31afdfd5db998c87e28d9969da36c49ca065af9c61020

  • SSDEEP

    12288:Zy907uUizD6uPZRNT/x8FPclOhgVXb9jMpGiG8GJrGVRmBnBccqoXr:ZyYuFOuxRNTx8lcIhm9jVrGVRmBn2lU

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14cb15bfc6c567225f9c19006ef79650eaf0622e5790317f7be2aae647f7e3cf.exe
    "C:\Users\Admin\AppData\Local\Temp\14cb15bfc6c567225f9c19006ef79650eaf0622e5790317f7be2aae647f7e3cf.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1772
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un281626.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un281626.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1540
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\03177054.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\03177054.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2128
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2128 -s 1096
          4⤵
          • Program crash
          PID:984
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk806980.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk806980.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2560
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2128 -ip 2128
    1⤵
      PID:4160

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un281626.exe

      Filesize

      547KB

      MD5

      1e999155a42215ce3561ee98e7582615

      SHA1

      b443ee2cc1793e498082ba4575a004821fba7e8a

      SHA256

      0324fc7bd08b96423553594ba2861ba48e04137caa9db72426fe4b0d9c177f93

      SHA512

      1a9564236fdc5feb8be10df2d2268d3e4ca613d418b5b32c44ae3ab0d27c7d869ba7e737f4cc650cc951bdfacf7a4273860bc5600cee03c9b3c66058e5c467da

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un281626.exe

      Filesize

      547KB

      MD5

      1e999155a42215ce3561ee98e7582615

      SHA1

      b443ee2cc1793e498082ba4575a004821fba7e8a

      SHA256

      0324fc7bd08b96423553594ba2861ba48e04137caa9db72426fe4b0d9c177f93

      SHA512

      1a9564236fdc5feb8be10df2d2268d3e4ca613d418b5b32c44ae3ab0d27c7d869ba7e737f4cc650cc951bdfacf7a4273860bc5600cee03c9b3c66058e5c467da

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\03177054.exe

      Filesize

      269KB

      MD5

      b30cc80e434c5d0eb23678030f2e0702

      SHA1

      477560df97c9fc157325dee019702a68c4888590

      SHA256

      9ff7a9af2f80a21591310728682b34630f69bbf35298385530ca44f1b2800304

      SHA512

      8e1c46f4f91db98fdd6fc5828756e156f203979b19469e618bd3db3d356eef16d7022b4960c7d5127d173e58869c6cf904c6560e04a9b1f834be5efe4d936539

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\03177054.exe

      Filesize

      269KB

      MD5

      b30cc80e434c5d0eb23678030f2e0702

      SHA1

      477560df97c9fc157325dee019702a68c4888590

      SHA256

      9ff7a9af2f80a21591310728682b34630f69bbf35298385530ca44f1b2800304

      SHA512

      8e1c46f4f91db98fdd6fc5828756e156f203979b19469e618bd3db3d356eef16d7022b4960c7d5127d173e58869c6cf904c6560e04a9b1f834be5efe4d936539

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk806980.exe

      Filesize

      353KB

      MD5

      b0052a48f062ef5922a4914ac648b8d7

      SHA1

      86f04d8d805c989bc22a0772336d968a1ecb4708

      SHA256

      58469f8da41f284cc3880bfb129a6aa4ae485bc2659759b0565954648aac20e9

      SHA512

      84b24e3410e9f02a5d532c0c2d79afa6aae13c85100c4c192443f96ab3e8bc8d6991d6e087cd0a0e7b24714889a873502557dc9677f64303711c36f6aef14acb

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk806980.exe

      Filesize

      353KB

      MD5

      b0052a48f062ef5922a4914ac648b8d7

      SHA1

      86f04d8d805c989bc22a0772336d968a1ecb4708

      SHA256

      58469f8da41f284cc3880bfb129a6aa4ae485bc2659759b0565954648aac20e9

      SHA512

      84b24e3410e9f02a5d532c0c2d79afa6aae13c85100c4c192443f96ab3e8bc8d6991d6e087cd0a0e7b24714889a873502557dc9677f64303711c36f6aef14acb

    • memory/2128-148-0x0000000002CC0000-0x0000000002CED000-memory.dmp

      Filesize

      180KB

    • memory/2128-149-0x0000000007280000-0x0000000007290000-memory.dmp

      Filesize

      64KB

    • memory/2128-150-0x0000000007280000-0x0000000007290000-memory.dmp

      Filesize

      64KB

    • memory/2128-151-0x0000000007290000-0x0000000007834000-memory.dmp

      Filesize

      5.6MB

    • memory/2128-153-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

      Filesize

      72KB

    • memory/2128-152-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

      Filesize

      72KB

    • memory/2128-155-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

      Filesize

      72KB

    • memory/2128-157-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

      Filesize

      72KB

    • memory/2128-159-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

      Filesize

      72KB

    • memory/2128-161-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

      Filesize

      72KB

    • memory/2128-163-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

      Filesize

      72KB

    • memory/2128-165-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

      Filesize

      72KB

    • memory/2128-169-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

      Filesize

      72KB

    • memory/2128-167-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

      Filesize

      72KB

    • memory/2128-171-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

      Filesize

      72KB

    • memory/2128-173-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

      Filesize

      72KB

    • memory/2128-175-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

      Filesize

      72KB

    • memory/2128-177-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

      Filesize

      72KB

    • memory/2128-179-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

      Filesize

      72KB

    • memory/2128-180-0x0000000000400000-0x0000000002B9E000-memory.dmp

      Filesize

      39.6MB

    • memory/2128-182-0x0000000000400000-0x0000000002B9E000-memory.dmp

      Filesize

      39.6MB

    • memory/2560-188-0x0000000007760000-0x0000000007795000-memory.dmp

      Filesize

      212KB

    • memory/2560-189-0x0000000007760000-0x0000000007795000-memory.dmp

      Filesize

      212KB

    • memory/2560-191-0x0000000007760000-0x0000000007795000-memory.dmp

      Filesize

      212KB

    • memory/2560-193-0x0000000007760000-0x0000000007795000-memory.dmp

      Filesize

      212KB

    • memory/2560-195-0x0000000007760000-0x0000000007795000-memory.dmp

      Filesize

      212KB

    • memory/2560-197-0x0000000007760000-0x0000000007795000-memory.dmp

      Filesize

      212KB

    • memory/2560-199-0x0000000007760000-0x0000000007795000-memory.dmp

      Filesize

      212KB

    • memory/2560-201-0x0000000007760000-0x0000000007795000-memory.dmp

      Filesize

      212KB

    • memory/2560-203-0x0000000007760000-0x0000000007795000-memory.dmp

      Filesize

      212KB

    • memory/2560-205-0x0000000007760000-0x0000000007795000-memory.dmp

      Filesize

      212KB

    • memory/2560-207-0x0000000007760000-0x0000000007795000-memory.dmp

      Filesize

      212KB

    • memory/2560-209-0x0000000007760000-0x0000000007795000-memory.dmp

      Filesize

      212KB

    • memory/2560-211-0x0000000007760000-0x0000000007795000-memory.dmp

      Filesize

      212KB

    • memory/2560-213-0x0000000007760000-0x0000000007795000-memory.dmp

      Filesize

      212KB

    • memory/2560-215-0x0000000007760000-0x0000000007795000-memory.dmp

      Filesize

      212KB

    • memory/2560-219-0x0000000007760000-0x0000000007795000-memory.dmp

      Filesize

      212KB

    • memory/2560-217-0x0000000007760000-0x0000000007795000-memory.dmp

      Filesize

      212KB

    • memory/2560-260-0x0000000002CC0000-0x0000000002D06000-memory.dmp

      Filesize

      280KB

    • memory/2560-262-0x00000000071A0000-0x00000000071B0000-memory.dmp

      Filesize

      64KB

    • memory/2560-264-0x00000000071A0000-0x00000000071B0000-memory.dmp

      Filesize

      64KB

    • memory/2560-266-0x00000000071A0000-0x00000000071B0000-memory.dmp

      Filesize

      64KB

    • memory/2560-984-0x0000000009C60000-0x000000000A278000-memory.dmp

      Filesize

      6.1MB

    • memory/2560-985-0x000000000A310000-0x000000000A322000-memory.dmp

      Filesize

      72KB

    • memory/2560-986-0x000000000A330000-0x000000000A43A000-memory.dmp

      Filesize

      1.0MB

    • memory/2560-987-0x000000000A450000-0x000000000A48C000-memory.dmp

      Filesize

      240KB

    • memory/2560-988-0x00000000071A0000-0x00000000071B0000-memory.dmp

      Filesize

      64KB

    • memory/2560-990-0x00000000071A0000-0x00000000071B0000-memory.dmp

      Filesize

      64KB

    • memory/2560-991-0x00000000071A0000-0x00000000071B0000-memory.dmp

      Filesize

      64KB

    • memory/2560-992-0x00000000071A0000-0x00000000071B0000-memory.dmp

      Filesize

      64KB

    • memory/2560-993-0x00000000071A0000-0x00000000071B0000-memory.dmp

      Filesize

      64KB