Analysis

  • max time kernel
    144s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 21:00

General

  • Target

    25127fae13cfd4f55168c66f0aeb2258c02fe9b21178d81b76b48ac9f880c784.exe

  • Size

    695KB

  • MD5

    8eddcf66ae93f064ceac58f02e666bbd

  • SHA1

    3356865d0eb3ba1c9144844839eefe75b1da1ed9

  • SHA256

    25127fae13cfd4f55168c66f0aeb2258c02fe9b21178d81b76b48ac9f880c784

  • SHA512

    7ba7170f2d3e31f0b7a4866defcb3e4e830fc246aa1c4555c912b6b89509fcae2576ba68bd9ca46ff234ceaf0035ce98dc0428f39b6a86470b4f0f57bb3dd719

  • SSDEEP

    12288:Fy907D25SxS/FelSftk1AfrnOLKNL1sqlniZVdUN0cRIbPAHBt00i9OcP3:FyWy5CSk4ftoPLKR1sqlsdUeTbei9nP3

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\25127fae13cfd4f55168c66f0aeb2258c02fe9b21178d81b76b48ac9f880c784.exe
    "C:\Users\Admin\AppData\Local\Temp\25127fae13cfd4f55168c66f0aeb2258c02fe9b21178d81b76b48ac9f880c784.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3484
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un835840.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un835840.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4428
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\27455554.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\27455554.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2652
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 1084
          4⤵
          • Program crash
          PID:224
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk599322.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk599322.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4408
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2652 -ip 2652
    1⤵
      PID:4036

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un835840.exe

      Filesize

      541KB

      MD5

      fe2bf6b3129111ec059d3c4a576f93b5

      SHA1

      3bf6a03d2136a50d48738d6de3e3d00ff624f4a1

      SHA256

      595afbecf659756834868be4aa8eb5e36341d73885ff0baa7ba47fb589231305

      SHA512

      0f9c61e0e9ddfe05a0915e23522a8d07bb30224a56ab8fc06638aa568ae690aa179feece6c86ff339bf87a1a054456a7d43b3ecf539f4a7ff0d2f02a8b37828c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un835840.exe

      Filesize

      541KB

      MD5

      fe2bf6b3129111ec059d3c4a576f93b5

      SHA1

      3bf6a03d2136a50d48738d6de3e3d00ff624f4a1

      SHA256

      595afbecf659756834868be4aa8eb5e36341d73885ff0baa7ba47fb589231305

      SHA512

      0f9c61e0e9ddfe05a0915e23522a8d07bb30224a56ab8fc06638aa568ae690aa179feece6c86ff339bf87a1a054456a7d43b3ecf539f4a7ff0d2f02a8b37828c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\27455554.exe

      Filesize

      258KB

      MD5

      2757490ee89555e38e27164927cd7d7d

      SHA1

      49467f22230ea794c9f3bbbeb487c4b5a48a656d

      SHA256

      3c8fbada537a1d5e231556bc57fff71b609a43d948fc58cd3707b0c1c2bf777d

      SHA512

      1c8d15800513bea1982473b15061aeef9575d0acc58b8b4e18b9400314c7581f74201c727b6f19bea4e890fd9b0a5640d7a227a5fa7dde22cb7871c9b0ab1058

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\27455554.exe

      Filesize

      258KB

      MD5

      2757490ee89555e38e27164927cd7d7d

      SHA1

      49467f22230ea794c9f3bbbeb487c4b5a48a656d

      SHA256

      3c8fbada537a1d5e231556bc57fff71b609a43d948fc58cd3707b0c1c2bf777d

      SHA512

      1c8d15800513bea1982473b15061aeef9575d0acc58b8b4e18b9400314c7581f74201c727b6f19bea4e890fd9b0a5640d7a227a5fa7dde22cb7871c9b0ab1058

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk599322.exe

      Filesize

      341KB

      MD5

      0e72b9bf5ac504dbf52f139554dd4748

      SHA1

      7b2b1301e9f4863da193b764c8a4fbbf0dcff40b

      SHA256

      ccd02e85a163c8c4f619aea954b321ad157df5939979f126e254cf04d0da06c0

      SHA512

      7759b36fdfd98c811958e5efd52ed9cce2602bbe297be67e068050b36cee967a16c2fa29fca72c3249dc96f845a98aac0f5d8f4795b504aec6f6b1c39afa5307

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk599322.exe

      Filesize

      341KB

      MD5

      0e72b9bf5ac504dbf52f139554dd4748

      SHA1

      7b2b1301e9f4863da193b764c8a4fbbf0dcff40b

      SHA256

      ccd02e85a163c8c4f619aea954b321ad157df5939979f126e254cf04d0da06c0

      SHA512

      7759b36fdfd98c811958e5efd52ed9cce2602bbe297be67e068050b36cee967a16c2fa29fca72c3249dc96f845a98aac0f5d8f4795b504aec6f6b1c39afa5307

    • memory/2652-167-0x0000000004A90000-0x0000000004AA3000-memory.dmp

      Filesize

      76KB

    • memory/2652-153-0x0000000007170000-0x0000000007180000-memory.dmp

      Filesize

      64KB

    • memory/2652-155-0x0000000007170000-0x0000000007180000-memory.dmp

      Filesize

      64KB

    • memory/2652-156-0x0000000004A90000-0x0000000004AA3000-memory.dmp

      Filesize

      76KB

    • memory/2652-157-0x0000000004A90000-0x0000000004AA3000-memory.dmp

      Filesize

      76KB

    • memory/2652-159-0x0000000004A90000-0x0000000004AA3000-memory.dmp

      Filesize

      76KB

    • memory/2652-161-0x0000000004A90000-0x0000000004AA3000-memory.dmp

      Filesize

      76KB

    • memory/2652-163-0x0000000004A90000-0x0000000004AA3000-memory.dmp

      Filesize

      76KB

    • memory/2652-165-0x0000000004A90000-0x0000000004AA3000-memory.dmp

      Filesize

      76KB

    • memory/2652-154-0x0000000007170000-0x0000000007180000-memory.dmp

      Filesize

      64KB

    • memory/2652-169-0x0000000004A90000-0x0000000004AA3000-memory.dmp

      Filesize

      76KB

    • memory/2652-171-0x0000000004A90000-0x0000000004AA3000-memory.dmp

      Filesize

      76KB

    • memory/2652-173-0x0000000004A90000-0x0000000004AA3000-memory.dmp

      Filesize

      76KB

    • memory/2652-175-0x0000000004A90000-0x0000000004AA3000-memory.dmp

      Filesize

      76KB

    • memory/2652-177-0x0000000004A90000-0x0000000004AA3000-memory.dmp

      Filesize

      76KB

    • memory/2652-179-0x0000000004A90000-0x0000000004AA3000-memory.dmp

      Filesize

      76KB

    • memory/2652-181-0x0000000004A90000-0x0000000004AA3000-memory.dmp

      Filesize

      76KB

    • memory/2652-183-0x0000000004A90000-0x0000000004AA3000-memory.dmp

      Filesize

      76KB

    • memory/2652-184-0x0000000000400000-0x0000000002B9B000-memory.dmp

      Filesize

      39.6MB

    • memory/2652-185-0x0000000007170000-0x0000000007180000-memory.dmp

      Filesize

      64KB

    • memory/2652-186-0x0000000007170000-0x0000000007180000-memory.dmp

      Filesize

      64KB

    • memory/2652-187-0x0000000007170000-0x0000000007180000-memory.dmp

      Filesize

      64KB

    • memory/2652-189-0x0000000000400000-0x0000000002B9B000-memory.dmp

      Filesize

      39.6MB

    • memory/2652-152-0x0000000002BA0000-0x0000000002BCD000-memory.dmp

      Filesize

      180KB

    • memory/2652-151-0x0000000007180000-0x0000000007724000-memory.dmp

      Filesize

      5.6MB

    • memory/4408-426-0x0000000007070000-0x0000000007080000-memory.dmp

      Filesize

      64KB

    • memory/4408-221-0x0000000007730000-0x0000000007765000-memory.dmp

      Filesize

      212KB

    • memory/4408-993-0x000000000A320000-0x000000000A42A000-memory.dmp

      Filesize

      1.0MB

    • memory/4408-196-0x0000000007730000-0x0000000007765000-memory.dmp

      Filesize

      212KB

    • memory/4408-201-0x0000000007730000-0x0000000007765000-memory.dmp

      Filesize

      212KB

    • memory/4408-203-0x0000000007730000-0x0000000007765000-memory.dmp

      Filesize

      212KB

    • memory/4408-205-0x0000000007730000-0x0000000007765000-memory.dmp

      Filesize

      212KB

    • memory/4408-207-0x0000000007730000-0x0000000007765000-memory.dmp

      Filesize

      212KB

    • memory/4408-209-0x0000000007730000-0x0000000007765000-memory.dmp

      Filesize

      212KB

    • memory/4408-211-0x0000000007730000-0x0000000007765000-memory.dmp

      Filesize

      212KB

    • memory/4408-213-0x0000000007730000-0x0000000007765000-memory.dmp

      Filesize

      212KB

    • memory/4408-215-0x0000000007730000-0x0000000007765000-memory.dmp

      Filesize

      212KB

    • memory/4408-217-0x0000000007730000-0x0000000007765000-memory.dmp

      Filesize

      212KB

    • memory/4408-195-0x0000000002CB0000-0x0000000002CF6000-memory.dmp

      Filesize

      280KB

    • memory/4408-199-0x0000000007730000-0x0000000007765000-memory.dmp

      Filesize

      212KB

    • memory/4408-223-0x0000000007730000-0x0000000007765000-memory.dmp

      Filesize

      212KB

    • memory/4408-219-0x0000000007730000-0x0000000007765000-memory.dmp

      Filesize

      212KB

    • memory/4408-227-0x0000000007730000-0x0000000007765000-memory.dmp

      Filesize

      212KB

    • memory/4408-424-0x0000000007070000-0x0000000007080000-memory.dmp

      Filesize

      64KB

    • memory/4408-991-0x0000000009C40000-0x000000000A258000-memory.dmp

      Filesize

      6.1MB

    • memory/4408-428-0x0000000007070000-0x0000000007080000-memory.dmp

      Filesize

      64KB

    • memory/4408-225-0x0000000007730000-0x0000000007765000-memory.dmp

      Filesize

      212KB

    • memory/4408-992-0x000000000A300000-0x000000000A312000-memory.dmp

      Filesize

      72KB

    • memory/4408-197-0x0000000007730000-0x0000000007765000-memory.dmp

      Filesize

      212KB

    • memory/4408-995-0x0000000007070000-0x0000000007080000-memory.dmp

      Filesize

      64KB

    • memory/4408-996-0x000000000A440000-0x000000000A47C000-memory.dmp

      Filesize

      240KB

    • memory/4408-997-0x0000000007070000-0x0000000007080000-memory.dmp

      Filesize

      64KB

    • memory/4408-998-0x0000000007070000-0x0000000007080000-memory.dmp

      Filesize

      64KB

    • memory/4408-1000-0x0000000007070000-0x0000000007080000-memory.dmp

      Filesize

      64KB