Analysis

  • max time kernel
    200s
  • max time network
    222s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-05-2023 20:52

General

  • Target

    1fa21bad70fb9eba5f1dd16b39fae60326de473cec6956232984b3ad675f32c7.exe

  • Size

    707KB

  • MD5

    982a5fdc6779e4491d9a42aced94632d

  • SHA1

    e4b5f1b040df9232e9a1210ba19df9684b4af431

  • SHA256

    1fa21bad70fb9eba5f1dd16b39fae60326de473cec6956232984b3ad675f32c7

  • SHA512

    dd5876ab60345c2654011c15b5b3956f4c2cbe83bbd0bcce7ee75d978d1ab237bd0a05e8c34907e94b88c52211b4cb75260a8e5577c797c5d5793f42939e0be4

  • SSDEEP

    12288:Jy90R4cYuZUSZinTLlcNfgXxGk0STEn3OmYOIDA6kk/Ee4rY:JykvZUSZinTxcNfghGDV3CHYkEE

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1fa21bad70fb9eba5f1dd16b39fae60326de473cec6956232984b3ad675f32c7.exe
    "C:\Users\Admin\AppData\Local\Temp\1fa21bad70fb9eba5f1dd16b39fae60326de473cec6956232984b3ad675f32c7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4304
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un214049.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un214049.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1308
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\93344822.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\93344822.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:940
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 940 -s 1088
          4⤵
          • Program crash
          PID:724
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk207501.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk207501.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3532
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 940 -ip 940
    1⤵
      PID:4936

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un214049.exe

      Filesize

      553KB

      MD5

      e4328d9300ec5d28249e6e0ba3f30eb9

      SHA1

      23bcd416b481f881b53d85acb88b81014d031c7a

      SHA256

      c2ddfa10209cd315f346f058484a14a6ee9bc32ebb62a4dc6db6c2b8d9fb5c95

      SHA512

      20badb971ec5eb25fbb75e60fc5cbc727071e06b98fd53e9caed99b8be594ddf09243559a62db4c382f430f99a88d11ea844a9af1ab39de353d068eb4067b065

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un214049.exe

      Filesize

      553KB

      MD5

      e4328d9300ec5d28249e6e0ba3f30eb9

      SHA1

      23bcd416b481f881b53d85acb88b81014d031c7a

      SHA256

      c2ddfa10209cd315f346f058484a14a6ee9bc32ebb62a4dc6db6c2b8d9fb5c95

      SHA512

      20badb971ec5eb25fbb75e60fc5cbc727071e06b98fd53e9caed99b8be594ddf09243559a62db4c382f430f99a88d11ea844a9af1ab39de353d068eb4067b065

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\93344822.exe

      Filesize

      258KB

      MD5

      db910f874c102d6882343c7a16532084

      SHA1

      7a3077123f3f7bfd4d1754f1183cac8990f5183d

      SHA256

      29c26c29278d863002e1f57a191befb69955e43f39025d44e36bec6584d6fe24

      SHA512

      9d900b17e69eb55dd9273b76176bd391d47c52277f8308b26ee28f13c9fb9039c5a2d206f1c3eb2ef524ac1bdfc19016d10b0c88b4f777316a0ee0710a044399

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\93344822.exe

      Filesize

      258KB

      MD5

      db910f874c102d6882343c7a16532084

      SHA1

      7a3077123f3f7bfd4d1754f1183cac8990f5183d

      SHA256

      29c26c29278d863002e1f57a191befb69955e43f39025d44e36bec6584d6fe24

      SHA512

      9d900b17e69eb55dd9273b76176bd391d47c52277f8308b26ee28f13c9fb9039c5a2d206f1c3eb2ef524ac1bdfc19016d10b0c88b4f777316a0ee0710a044399

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk207501.exe

      Filesize

      353KB

      MD5

      a64d14f9bf215515c2456977b98a1d98

      SHA1

      ed65b121fef2b10ab434f87e7e96ab3e3ca78057

      SHA256

      004efb3b0aef0991604cf845f8bcb0dafc6afded7aa607cc5c8627397c84232f

      SHA512

      d08bd84b9a776081921486538dd147064898c31d1d0f20b076da85c6f7aeb4b8c21cd3e7dd5d083bd18a98bdaca89d2a7c897f69bfb5bd9bc61cee07aab16d6d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk207501.exe

      Filesize

      353KB

      MD5

      a64d14f9bf215515c2456977b98a1d98

      SHA1

      ed65b121fef2b10ab434f87e7e96ab3e3ca78057

      SHA256

      004efb3b0aef0991604cf845f8bcb0dafc6afded7aa607cc5c8627397c84232f

      SHA512

      d08bd84b9a776081921486538dd147064898c31d1d0f20b076da85c6f7aeb4b8c21cd3e7dd5d083bd18a98bdaca89d2a7c897f69bfb5bd9bc61cee07aab16d6d

    • memory/940-185-0x0000000004D10000-0x0000000004D20000-memory.dmp

      Filesize

      64KB

    • memory/940-158-0x0000000004CD0000-0x0000000004CE3000-memory.dmp

      Filesize

      76KB

    • memory/940-152-0x0000000004D10000-0x0000000004D20000-memory.dmp

      Filesize

      64KB

    • memory/940-153-0x0000000004CD0000-0x0000000004CE3000-memory.dmp

      Filesize

      76KB

    • memory/940-154-0x0000000004CD0000-0x0000000004CE3000-memory.dmp

      Filesize

      76KB

    • memory/940-156-0x0000000004CD0000-0x0000000004CE3000-memory.dmp

      Filesize

      76KB

    • memory/940-151-0x0000000004D10000-0x0000000004D20000-memory.dmp

      Filesize

      64KB

    • memory/940-160-0x0000000004CD0000-0x0000000004CE3000-memory.dmp

      Filesize

      76KB

    • memory/940-162-0x0000000004CD0000-0x0000000004CE3000-memory.dmp

      Filesize

      76KB

    • memory/940-164-0x0000000004CD0000-0x0000000004CE3000-memory.dmp

      Filesize

      76KB

    • memory/940-166-0x0000000004CD0000-0x0000000004CE3000-memory.dmp

      Filesize

      76KB

    • memory/940-168-0x0000000004CD0000-0x0000000004CE3000-memory.dmp

      Filesize

      76KB

    • memory/940-170-0x0000000004CD0000-0x0000000004CE3000-memory.dmp

      Filesize

      76KB

    • memory/940-172-0x0000000004CD0000-0x0000000004CE3000-memory.dmp

      Filesize

      76KB

    • memory/940-174-0x0000000004CD0000-0x0000000004CE3000-memory.dmp

      Filesize

      76KB

    • memory/940-176-0x0000000004CD0000-0x0000000004CE3000-memory.dmp

      Filesize

      76KB

    • memory/940-178-0x0000000004CD0000-0x0000000004CE3000-memory.dmp

      Filesize

      76KB

    • memory/940-180-0x0000000004CD0000-0x0000000004CE3000-memory.dmp

      Filesize

      76KB

    • memory/940-148-0x00000000071C0000-0x0000000007764000-memory.dmp

      Filesize

      5.6MB

    • memory/940-183-0x0000000004D10000-0x0000000004D20000-memory.dmp

      Filesize

      64KB

    • memory/940-184-0x0000000004D10000-0x0000000004D20000-memory.dmp

      Filesize

      64KB

    • memory/940-150-0x0000000004D10000-0x0000000004D20000-memory.dmp

      Filesize

      64KB

    • memory/940-190-0x0000000000400000-0x0000000002B9B000-memory.dmp

      Filesize

      39.6MB

    • memory/940-149-0x0000000002BC0000-0x0000000002BED000-memory.dmp

      Filesize

      180KB

    • memory/940-181-0x0000000000400000-0x0000000002B9B000-memory.dmp

      Filesize

      39.6MB

    • memory/3532-1002-0x000000000A450000-0x000000000A48C000-memory.dmp

      Filesize

      240KB

    • memory/3532-201-0x0000000004C30000-0x0000000004C65000-memory.dmp

      Filesize

      212KB

    • memory/3532-996-0x00000000073E0000-0x00000000073F0000-memory.dmp

      Filesize

      64KB

    • memory/3532-424-0x0000000002C90000-0x0000000002CD6000-memory.dmp

      Filesize

      280KB

    • memory/3532-205-0x0000000004C30000-0x0000000004C65000-memory.dmp

      Filesize

      212KB

    • memory/3532-207-0x0000000004C30000-0x0000000004C65000-memory.dmp

      Filesize

      212KB

    • memory/3532-209-0x0000000004C30000-0x0000000004C65000-memory.dmp

      Filesize

      212KB

    • memory/3532-211-0x0000000004C30000-0x0000000004C65000-memory.dmp

      Filesize

      212KB

    • memory/3532-213-0x0000000004C30000-0x0000000004C65000-memory.dmp

      Filesize

      212KB

    • memory/3532-215-0x0000000004C30000-0x0000000004C65000-memory.dmp

      Filesize

      212KB

    • memory/3532-217-0x0000000004C30000-0x0000000004C65000-memory.dmp

      Filesize

      212KB

    • memory/3532-1001-0x00000000073E0000-0x00000000073F0000-memory.dmp

      Filesize

      64KB

    • memory/3532-221-0x0000000004C30000-0x0000000004C65000-memory.dmp

      Filesize

      212KB

    • memory/3532-219-0x0000000004C30000-0x0000000004C65000-memory.dmp

      Filesize

      212KB

    • memory/3532-203-0x0000000004C30000-0x0000000004C65000-memory.dmp

      Filesize

      212KB

    • memory/3532-426-0x00000000073E0000-0x00000000073F0000-memory.dmp

      Filesize

      64KB

    • memory/3532-428-0x00000000073E0000-0x00000000073F0000-memory.dmp

      Filesize

      64KB

    • memory/3532-993-0x0000000009D20000-0x000000000A338000-memory.dmp

      Filesize

      6.1MB

    • memory/3532-994-0x00000000073B0000-0x00000000073C2000-memory.dmp

      Filesize

      72KB

    • memory/3532-995-0x000000000A340000-0x000000000A44A000-memory.dmp

      Filesize

      1.0MB

    • memory/3532-223-0x0000000004C30000-0x0000000004C65000-memory.dmp

      Filesize

      212KB

    • memory/3532-998-0x00000000073E0000-0x00000000073F0000-memory.dmp

      Filesize

      64KB

    • memory/3532-999-0x00000000073E0000-0x00000000073F0000-memory.dmp

      Filesize

      64KB

    • memory/3532-1000-0x00000000073E0000-0x00000000073F0000-memory.dmp

      Filesize

      64KB

    • memory/3532-199-0x0000000004C30000-0x0000000004C65000-memory.dmp

      Filesize

      212KB

    • memory/3532-198-0x0000000004C30000-0x0000000004C65000-memory.dmp

      Filesize

      212KB