Analysis

  • max time kernel
    155s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/05/2023, 18:47

General

  • Target

    df69416c2efa69686573960f72dd6f0e17cdf5081363f36759d876d35598b5e4.exe

  • Size

    674KB

  • MD5

    7440ff76fa12b307497d81a9ab9cd1c7

  • SHA1

    31de0c1438cede9766194bcda8bcc2b77cd07ed8

  • SHA256

    df69416c2efa69686573960f72dd6f0e17cdf5081363f36759d876d35598b5e4

  • SHA512

    8e28f67ab47050ab3fb55f00c10b08917904aa835d1091f1f801d1fd00e910d8bb327fbbcc7103af99d3b6a4c48926cb26e6f5f84504400e38c7bef765bb102f

  • SSDEEP

    12288:Ey90VWPMB7TgeLNvzTAo/PLeNg0s3OuVvGWITSvDWphO82875h:EybPYd8o/P25KOOiTS6phO828T

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df69416c2efa69686573960f72dd6f0e17cdf5081363f36759d876d35598b5e4.exe
    "C:\Users\Admin\AppData\Local\Temp\df69416c2efa69686573960f72dd6f0e17cdf5081363f36759d876d35598b5e4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1408
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st749660.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st749660.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3104
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\56957119.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\56957119.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:376
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp624894.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp624894.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4836

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st749660.exe

    Filesize

    519KB

    MD5

    411df1ab1a708202f347d5af552b9a58

    SHA1

    0cdc36cab112173b8527f82110ecc16f792902f2

    SHA256

    50e5440679e1056d8f8b868e46b7e0b6c779ad2f2362654382fcae718773aa6e

    SHA512

    9b4f8be9a04f843f942dd7ef0bd062319f44ca97d6d9fd6fb45eb60578b74f716916d4aff0aefff904cee7660749fe8695a2b7f227ed4c461c907be8610fca24

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st749660.exe

    Filesize

    519KB

    MD5

    411df1ab1a708202f347d5af552b9a58

    SHA1

    0cdc36cab112173b8527f82110ecc16f792902f2

    SHA256

    50e5440679e1056d8f8b868e46b7e0b6c779ad2f2362654382fcae718773aa6e

    SHA512

    9b4f8be9a04f843f942dd7ef0bd062319f44ca97d6d9fd6fb45eb60578b74f716916d4aff0aefff904cee7660749fe8695a2b7f227ed4c461c907be8610fca24

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\56957119.exe

    Filesize

    175KB

    MD5

    a165b5f6b0a4bdf808b71de57bf9347d

    SHA1

    39a7b301e819e386c162a47e046fa384bb5ab437

    SHA256

    68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

    SHA512

    3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\56957119.exe

    Filesize

    175KB

    MD5

    a165b5f6b0a4bdf808b71de57bf9347d

    SHA1

    39a7b301e819e386c162a47e046fa384bb5ab437

    SHA256

    68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

    SHA512

    3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp624894.exe

    Filesize

    415KB

    MD5

    c8646ad71b08f3d1380a6be0537f281c

    SHA1

    1eab0e05dffb4a72be200dc4fad9cc1ce297fd36

    SHA256

    7d4d166366e9f01fb9e1d917bfdc905289f13eb43120c11175c11e4e2fd7eb0a

    SHA512

    a284b80c0c7cddd8afe22f8e02fa49fe889a096e1bd2d9d49e74872f3614abcd1dff266f7da1e103ac21b93052dfd63b280f050c348f67eb58ccbcd1711e4ff0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp624894.exe

    Filesize

    415KB

    MD5

    c8646ad71b08f3d1380a6be0537f281c

    SHA1

    1eab0e05dffb4a72be200dc4fad9cc1ce297fd36

    SHA256

    7d4d166366e9f01fb9e1d917bfdc905289f13eb43120c11175c11e4e2fd7eb0a

    SHA512

    a284b80c0c7cddd8afe22f8e02fa49fe889a096e1bd2d9d49e74872f3614abcd1dff266f7da1e103ac21b93052dfd63b280f050c348f67eb58ccbcd1711e4ff0

  • memory/376-147-0x0000000004B60000-0x0000000004B70000-memory.dmp

    Filesize

    64KB

  • memory/376-148-0x0000000004B70000-0x0000000005114000-memory.dmp

    Filesize

    5.6MB

  • memory/376-149-0x0000000004B60000-0x0000000004B70000-memory.dmp

    Filesize

    64KB

  • memory/376-150-0x0000000004B60000-0x0000000004B70000-memory.dmp

    Filesize

    64KB

  • memory/376-151-0x0000000004A90000-0x0000000004AA3000-memory.dmp

    Filesize

    76KB

  • memory/376-152-0x0000000004A90000-0x0000000004AA3000-memory.dmp

    Filesize

    76KB

  • memory/376-154-0x0000000004A90000-0x0000000004AA3000-memory.dmp

    Filesize

    76KB

  • memory/376-156-0x0000000004A90000-0x0000000004AA3000-memory.dmp

    Filesize

    76KB

  • memory/376-166-0x0000000004A90000-0x0000000004AA3000-memory.dmp

    Filesize

    76KB

  • memory/376-164-0x0000000004A90000-0x0000000004AA3000-memory.dmp

    Filesize

    76KB

  • memory/376-178-0x0000000004A90000-0x0000000004AA3000-memory.dmp

    Filesize

    76KB

  • memory/376-176-0x0000000004A90000-0x0000000004AA3000-memory.dmp

    Filesize

    76KB

  • memory/376-174-0x0000000004A90000-0x0000000004AA3000-memory.dmp

    Filesize

    76KB

  • memory/376-172-0x0000000004A90000-0x0000000004AA3000-memory.dmp

    Filesize

    76KB

  • memory/376-170-0x0000000004A90000-0x0000000004AA3000-memory.dmp

    Filesize

    76KB

  • memory/376-168-0x0000000004A90000-0x0000000004AA3000-memory.dmp

    Filesize

    76KB

  • memory/376-162-0x0000000004A90000-0x0000000004AA3000-memory.dmp

    Filesize

    76KB

  • memory/376-160-0x0000000004A90000-0x0000000004AA3000-memory.dmp

    Filesize

    76KB

  • memory/376-158-0x0000000004A90000-0x0000000004AA3000-memory.dmp

    Filesize

    76KB

  • memory/376-179-0x0000000004B60000-0x0000000004B70000-memory.dmp

    Filesize

    64KB

  • memory/376-180-0x0000000004B60000-0x0000000004B70000-memory.dmp

    Filesize

    64KB

  • memory/376-181-0x0000000004B60000-0x0000000004B70000-memory.dmp

    Filesize

    64KB

  • memory/4836-187-0x0000000000640000-0x0000000000686000-memory.dmp

    Filesize

    280KB

  • memory/4836-189-0x0000000002710000-0x0000000002745000-memory.dmp

    Filesize

    212KB

  • memory/4836-191-0x0000000002710000-0x0000000002745000-memory.dmp

    Filesize

    212KB

  • memory/4836-188-0x0000000002710000-0x0000000002745000-memory.dmp

    Filesize

    212KB

  • memory/4836-193-0x0000000002710000-0x0000000002745000-memory.dmp

    Filesize

    212KB

  • memory/4836-195-0x0000000002710000-0x0000000002745000-memory.dmp

    Filesize

    212KB

  • memory/4836-197-0x0000000002710000-0x0000000002745000-memory.dmp

    Filesize

    212KB

  • memory/4836-203-0x0000000002710000-0x0000000002745000-memory.dmp

    Filesize

    212KB

  • memory/4836-201-0x0000000002710000-0x0000000002745000-memory.dmp

    Filesize

    212KB

  • memory/4836-199-0x0000000002710000-0x0000000002745000-memory.dmp

    Filesize

    212KB

  • memory/4836-205-0x0000000002710000-0x0000000002745000-memory.dmp

    Filesize

    212KB

  • memory/4836-207-0x0000000002710000-0x0000000002745000-memory.dmp

    Filesize

    212KB

  • memory/4836-209-0x0000000002710000-0x0000000002745000-memory.dmp

    Filesize

    212KB

  • memory/4836-211-0x0000000002710000-0x0000000002745000-memory.dmp

    Filesize

    212KB

  • memory/4836-213-0x0000000002710000-0x0000000002745000-memory.dmp

    Filesize

    212KB

  • memory/4836-215-0x0000000002710000-0x0000000002745000-memory.dmp

    Filesize

    212KB

  • memory/4836-217-0x0000000002710000-0x0000000002745000-memory.dmp

    Filesize

    212KB

  • memory/4836-219-0x0000000002710000-0x0000000002745000-memory.dmp

    Filesize

    212KB

  • memory/4836-221-0x0000000002710000-0x0000000002745000-memory.dmp

    Filesize

    212KB

  • memory/4836-223-0x0000000002710000-0x0000000002745000-memory.dmp

    Filesize

    212KB

  • memory/4836-256-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/4836-258-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/4836-982-0x0000000007730000-0x0000000007D48000-memory.dmp

    Filesize

    6.1MB

  • memory/4836-983-0x0000000004CB0000-0x0000000004CC2000-memory.dmp

    Filesize

    72KB

  • memory/4836-984-0x0000000007D50000-0x0000000007E5A000-memory.dmp

    Filesize

    1.0MB

  • memory/4836-985-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/4836-986-0x0000000007E60000-0x0000000007E9C000-memory.dmp

    Filesize

    240KB

  • memory/4836-988-0x0000000000640000-0x0000000000686000-memory.dmp

    Filesize

    280KB

  • memory/4836-989-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/4836-990-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/4836-991-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/4836-992-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB