Analysis

  • max time kernel
    194s
  • max time network
    251s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/05/2023, 18:51

General

  • Target

    e25f301195cfb929ff5cee7af3db3dd5821691c33a2d3dd070d707aad172b31e.exe

  • Size

    656KB

  • MD5

    1b17406c3740b948677fbf300353e028

  • SHA1

    7b09c969443928b2ac0fcc6a95b52b8f4203567e

  • SHA256

    e25f301195cfb929ff5cee7af3db3dd5821691c33a2d3dd070d707aad172b31e

  • SHA512

    afac493add16d72e86605e870833eba8173a2786e3b8cb98b33d0b7ae8d798ca7894dde6ec0ae51edd16749c0d957f4b3106709ac96e29363584251bb4de92bf

  • SSDEEP

    12288:ny90EJpOnTOtJ6sfse5afv1sNSOdvnWhXgHp:nyBJ6TOtJZfse5afY9vncwHp

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e25f301195cfb929ff5cee7af3db3dd5821691c33a2d3dd070d707aad172b31e.exe
    "C:\Users\Admin\AppData\Local\Temp\e25f301195cfb929ff5cee7af3db3dd5821691c33a2d3dd070d707aad172b31e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1428
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st802476.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st802476.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1376
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\04087755.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\04087755.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3016
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp709438.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp709438.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:336

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st802476.exe

          Filesize

          503KB

          MD5

          41e63ddd4437c71780fd2df8752be9fc

          SHA1

          4d68b9cc078bbc65150bc9bd23df588d7829f53b

          SHA256

          2637cb5b4ad7db3a907401b2e1c016eb8e421bafaf090429c607ba6a998733b0

          SHA512

          47755b8fae93c641f34e34e4bab40fd42ae94fc3e1304ca018ea0e1cebac8afdc77acfa5d5d36ac634d9a258dc85a839d189b543898406fe26435eb70a5a1a9d

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st802476.exe

          Filesize

          503KB

          MD5

          41e63ddd4437c71780fd2df8752be9fc

          SHA1

          4d68b9cc078bbc65150bc9bd23df588d7829f53b

          SHA256

          2637cb5b4ad7db3a907401b2e1c016eb8e421bafaf090429c607ba6a998733b0

          SHA512

          47755b8fae93c641f34e34e4bab40fd42ae94fc3e1304ca018ea0e1cebac8afdc77acfa5d5d36ac634d9a258dc85a839d189b543898406fe26435eb70a5a1a9d

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\04087755.exe

          Filesize

          175KB

          MD5

          a165b5f6b0a4bdf808b71de57bf9347d

          SHA1

          39a7b301e819e386c162a47e046fa384bb5ab437

          SHA256

          68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

          SHA512

          3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\04087755.exe

          Filesize

          175KB

          MD5

          a165b5f6b0a4bdf808b71de57bf9347d

          SHA1

          39a7b301e819e386c162a47e046fa384bb5ab437

          SHA256

          68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

          SHA512

          3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp709438.exe

          Filesize

          366KB

          MD5

          eb52579c876f367a7eb00345f9cf9a0e

          SHA1

          0b29d151afbc71aeaa8a13ed78e56f54f7ad49fc

          SHA256

          75f282295d837b929cba9b6ee69ac8c6e880a2327f54c565a4ffa9f24176769f

          SHA512

          d8023ba55b780003f04dd1364948fa2638569439c0708d5e6c69d1d84034e88bd0dd38d0d7a580f6e8e7c3e92adc07244058e0890bb9407c423fd6c68b42bc80

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp709438.exe

          Filesize

          366KB

          MD5

          eb52579c876f367a7eb00345f9cf9a0e

          SHA1

          0b29d151afbc71aeaa8a13ed78e56f54f7ad49fc

          SHA256

          75f282295d837b929cba9b6ee69ac8c6e880a2327f54c565a4ffa9f24176769f

          SHA512

          d8023ba55b780003f04dd1364948fa2638569439c0708d5e6c69d1d84034e88bd0dd38d0d7a580f6e8e7c3e92adc07244058e0890bb9407c423fd6c68b42bc80

        • memory/336-216-0x00000000024E0000-0x0000000002515000-memory.dmp

          Filesize

          212KB

        • memory/336-220-0x00000000024E0000-0x0000000002515000-memory.dmp

          Filesize

          212KB

        • memory/336-991-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

          Filesize

          64KB

        • memory/336-989-0x0000000007E40000-0x0000000007E7C000-memory.dmp

          Filesize

          240KB

        • memory/336-988-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

          Filesize

          64KB

        • memory/336-987-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

          Filesize

          64KB

        • memory/336-986-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

          Filesize

          64KB

        • memory/336-985-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

          Filesize

          64KB

        • memory/336-194-0x00000000024E0000-0x0000000002515000-memory.dmp

          Filesize

          212KB

        • memory/336-982-0x0000000007C20000-0x0000000007D2A000-memory.dmp

          Filesize

          1.0MB

        • memory/336-981-0x0000000002610000-0x0000000002622000-memory.dmp

          Filesize

          72KB

        • memory/336-980-0x0000000007600000-0x0000000007C18000-memory.dmp

          Filesize

          6.1MB

        • memory/336-364-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

          Filesize

          64KB

        • memory/336-362-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

          Filesize

          64KB

        • memory/336-192-0x00000000024E0000-0x0000000002515000-memory.dmp

          Filesize

          212KB

        • memory/336-218-0x00000000024E0000-0x0000000002515000-memory.dmp

          Filesize

          212KB

        • memory/336-196-0x00000000024E0000-0x0000000002515000-memory.dmp

          Filesize

          212KB

        • memory/336-212-0x00000000024E0000-0x0000000002515000-memory.dmp

          Filesize

          212KB

        • memory/336-210-0x00000000024E0000-0x0000000002515000-memory.dmp

          Filesize

          212KB

        • memory/336-184-0x0000000001FD0000-0x0000000002016000-memory.dmp

          Filesize

          280KB

        • memory/336-186-0x00000000024E0000-0x0000000002515000-memory.dmp

          Filesize

          212KB

        • memory/336-185-0x00000000024E0000-0x0000000002515000-memory.dmp

          Filesize

          212KB

        • memory/336-188-0x00000000024E0000-0x0000000002515000-memory.dmp

          Filesize

          212KB

        • memory/336-190-0x00000000024E0000-0x0000000002515000-memory.dmp

          Filesize

          212KB

        • memory/336-208-0x00000000024E0000-0x0000000002515000-memory.dmp

          Filesize

          212KB

        • memory/336-984-0x0000000001FD0000-0x0000000002016000-memory.dmp

          Filesize

          280KB

        • memory/336-214-0x00000000024E0000-0x0000000002515000-memory.dmp

          Filesize

          212KB

        • memory/336-198-0x00000000024E0000-0x0000000002515000-memory.dmp

          Filesize

          212KB

        • memory/336-200-0x00000000024E0000-0x0000000002515000-memory.dmp

          Filesize

          212KB

        • memory/336-202-0x00000000024E0000-0x0000000002515000-memory.dmp

          Filesize

          212KB

        • memory/336-204-0x00000000024E0000-0x0000000002515000-memory.dmp

          Filesize

          212KB

        • memory/336-206-0x00000000024E0000-0x0000000002515000-memory.dmp

          Filesize

          212KB

        • memory/3016-151-0x0000000004950000-0x0000000004963000-memory.dmp

          Filesize

          76KB

        • memory/3016-167-0x0000000004950000-0x0000000004963000-memory.dmp

          Filesize

          76KB

        • memory/3016-149-0x0000000004B00000-0x00000000050A4000-memory.dmp

          Filesize

          5.6MB

        • memory/3016-165-0x0000000004950000-0x0000000004963000-memory.dmp

          Filesize

          76KB

        • memory/3016-147-0x0000000004AF0000-0x0000000004B00000-memory.dmp

          Filesize

          64KB

        • memory/3016-177-0x0000000004950000-0x0000000004963000-memory.dmp

          Filesize

          76KB

        • memory/3016-175-0x0000000004950000-0x0000000004963000-memory.dmp

          Filesize

          76KB

        • memory/3016-171-0x0000000004950000-0x0000000004963000-memory.dmp

          Filesize

          76KB

        • memory/3016-148-0x0000000004AF0000-0x0000000004B00000-memory.dmp

          Filesize

          64KB

        • memory/3016-173-0x0000000004950000-0x0000000004963000-memory.dmp

          Filesize

          76KB

        • memory/3016-178-0x0000000004AF0000-0x0000000004B00000-memory.dmp

          Filesize

          64KB

        • memory/3016-169-0x0000000004950000-0x0000000004963000-memory.dmp

          Filesize

          76KB

        • memory/3016-163-0x0000000004950000-0x0000000004963000-memory.dmp

          Filesize

          76KB

        • memory/3016-161-0x0000000004950000-0x0000000004963000-memory.dmp

          Filesize

          76KB

        • memory/3016-159-0x0000000004950000-0x0000000004963000-memory.dmp

          Filesize

          76KB

        • memory/3016-157-0x0000000004950000-0x0000000004963000-memory.dmp

          Filesize

          76KB

        • memory/3016-155-0x0000000004950000-0x0000000004963000-memory.dmp

          Filesize

          76KB

        • memory/3016-150-0x0000000004950000-0x0000000004963000-memory.dmp

          Filesize

          76KB

        • memory/3016-153-0x0000000004950000-0x0000000004963000-memory.dmp

          Filesize

          76KB