Analysis

  • max time kernel
    189s
  • max time network
    222s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/05/2023, 19:05

General

  • Target

    ee562ad5a51de37f4b141fee1cfc3809e3df2745e94a7198ea89dacf4d2f782b.exe

  • Size

    618KB

  • MD5

    6fb5adc47dd63b9438184f15ccd15cdf

  • SHA1

    75c9ccad0ad35bf06deb0033e8639902cb02f965

  • SHA256

    ee562ad5a51de37f4b141fee1cfc3809e3df2745e94a7198ea89dacf4d2f782b

  • SHA512

    c6b0aa4b1047209a383670c7dd8da85b92c1ff4a2f56e8d3714ad1604fbec74a800ff33b424d289c131df7b36b6e976954cd2f6a16eb9bba372d3e922efdd304

  • SSDEEP

    12288:9y90st1h5pCoXqMydWhEp1QgDMaz6hsV9Rd2FXiIcLQdFpBk:9y7tB8bWhEf+hsV9Rd2IUdFPk

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee562ad5a51de37f4b141fee1cfc3809e3df2745e94a7198ea89dacf4d2f782b.exe
    "C:\Users\Admin\AppData\Local\Temp\ee562ad5a51de37f4b141fee1cfc3809e3df2745e94a7198ea89dacf4d2f782b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3528
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st304990.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st304990.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:664
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\15041037.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\15041037.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1040
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp895566.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp895566.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4688

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st304990.exe

    Filesize

    464KB

    MD5

    5de57b899dd43c1811ceaa0726554efb

    SHA1

    13a3a3ac9dacfd4692c5440b35716f22fb1c2925

    SHA256

    2d8550c6dfb0932d50090fb52250724caa7082e4f3e417645fefefa963f92d3b

    SHA512

    579eab3473b00d4a55d740b1b0a937d0bafe4213f7d19f4ed8bd2ec0fb8493b56dba42a2ead352a8a8f80ec60022f29378b1e48eee0d7668bc1b35b23f91592e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st304990.exe

    Filesize

    464KB

    MD5

    5de57b899dd43c1811ceaa0726554efb

    SHA1

    13a3a3ac9dacfd4692c5440b35716f22fb1c2925

    SHA256

    2d8550c6dfb0932d50090fb52250724caa7082e4f3e417645fefefa963f92d3b

    SHA512

    579eab3473b00d4a55d740b1b0a937d0bafe4213f7d19f4ed8bd2ec0fb8493b56dba42a2ead352a8a8f80ec60022f29378b1e48eee0d7668bc1b35b23f91592e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\15041037.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\15041037.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp895566.exe

    Filesize

    478KB

    MD5

    2ac6a98783b451d84afd1688df1fa9fb

    SHA1

    339c946ccae0b4e79abfb1e8e344bc845e1a65b6

    SHA256

    06b6e588586a443b1cf930be6c23b9cfb8693c972ac5f892837b7739a97af81a

    SHA512

    abf4e5a22f3bcd9ab2685ece45f041b173795b90d3f9ea29bbc17b0a6b3fadf9315f9f5347633ab132b6f58089329ec89e7abe1cee043d5c55ed6df9b50e10d8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp895566.exe

    Filesize

    478KB

    MD5

    2ac6a98783b451d84afd1688df1fa9fb

    SHA1

    339c946ccae0b4e79abfb1e8e344bc845e1a65b6

    SHA256

    06b6e588586a443b1cf930be6c23b9cfb8693c972ac5f892837b7739a97af81a

    SHA512

    abf4e5a22f3bcd9ab2685ece45f041b173795b90d3f9ea29bbc17b0a6b3fadf9315f9f5347633ab132b6f58089329ec89e7abe1cee043d5c55ed6df9b50e10d8

  • memory/1040-147-0x0000000000120000-0x000000000012A000-memory.dmp

    Filesize

    40KB

  • memory/4688-153-0x0000000004FF0000-0x0000000005594000-memory.dmp

    Filesize

    5.6MB

  • memory/4688-154-0x0000000000400000-0x000000000081C000-memory.dmp

    Filesize

    4.1MB

  • memory/4688-156-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

    Filesize

    64KB

  • memory/4688-155-0x00000000009A0000-0x00000000009E6000-memory.dmp

    Filesize

    280KB

  • memory/4688-157-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

    Filesize

    64KB

  • memory/4688-158-0x0000000002A70000-0x0000000002AA5000-memory.dmp

    Filesize

    212KB

  • memory/4688-159-0x0000000002A70000-0x0000000002AA5000-memory.dmp

    Filesize

    212KB

  • memory/4688-161-0x0000000002A70000-0x0000000002AA5000-memory.dmp

    Filesize

    212KB

  • memory/4688-163-0x0000000002A70000-0x0000000002AA5000-memory.dmp

    Filesize

    212KB

  • memory/4688-165-0x0000000002A70000-0x0000000002AA5000-memory.dmp

    Filesize

    212KB

  • memory/4688-167-0x0000000002A70000-0x0000000002AA5000-memory.dmp

    Filesize

    212KB

  • memory/4688-169-0x0000000002A70000-0x0000000002AA5000-memory.dmp

    Filesize

    212KB

  • memory/4688-171-0x0000000002A70000-0x0000000002AA5000-memory.dmp

    Filesize

    212KB

  • memory/4688-173-0x0000000002A70000-0x0000000002AA5000-memory.dmp

    Filesize

    212KB

  • memory/4688-175-0x0000000002A70000-0x0000000002AA5000-memory.dmp

    Filesize

    212KB

  • memory/4688-177-0x0000000002A70000-0x0000000002AA5000-memory.dmp

    Filesize

    212KB

  • memory/4688-179-0x0000000002A70000-0x0000000002AA5000-memory.dmp

    Filesize

    212KB

  • memory/4688-181-0x0000000002A70000-0x0000000002AA5000-memory.dmp

    Filesize

    212KB

  • memory/4688-183-0x0000000002A70000-0x0000000002AA5000-memory.dmp

    Filesize

    212KB

  • memory/4688-185-0x0000000002A70000-0x0000000002AA5000-memory.dmp

    Filesize

    212KB

  • memory/4688-187-0x0000000002A70000-0x0000000002AA5000-memory.dmp

    Filesize

    212KB

  • memory/4688-189-0x0000000002A70000-0x0000000002AA5000-memory.dmp

    Filesize

    212KB

  • memory/4688-191-0x0000000002A70000-0x0000000002AA5000-memory.dmp

    Filesize

    212KB

  • memory/4688-193-0x0000000002A70000-0x0000000002AA5000-memory.dmp

    Filesize

    212KB

  • memory/4688-195-0x0000000002A70000-0x0000000002AA5000-memory.dmp

    Filesize

    212KB

  • memory/4688-197-0x0000000002A70000-0x0000000002AA5000-memory.dmp

    Filesize

    212KB

  • memory/4688-199-0x0000000002A70000-0x0000000002AA5000-memory.dmp

    Filesize

    212KB

  • memory/4688-201-0x0000000002A70000-0x0000000002AA5000-memory.dmp

    Filesize

    212KB

  • memory/4688-203-0x0000000002A70000-0x0000000002AA5000-memory.dmp

    Filesize

    212KB

  • memory/4688-205-0x0000000002A70000-0x0000000002AA5000-memory.dmp

    Filesize

    212KB

  • memory/4688-207-0x0000000002A70000-0x0000000002AA5000-memory.dmp

    Filesize

    212KB

  • memory/4688-209-0x0000000002A70000-0x0000000002AA5000-memory.dmp

    Filesize

    212KB

  • memory/4688-211-0x0000000002A70000-0x0000000002AA5000-memory.dmp

    Filesize

    212KB

  • memory/4688-213-0x0000000002A70000-0x0000000002AA5000-memory.dmp

    Filesize

    212KB

  • memory/4688-215-0x0000000002A70000-0x0000000002AA5000-memory.dmp

    Filesize

    212KB

  • memory/4688-217-0x0000000002A70000-0x0000000002AA5000-memory.dmp

    Filesize

    212KB

  • memory/4688-219-0x0000000002A70000-0x0000000002AA5000-memory.dmp

    Filesize

    212KB

  • memory/4688-950-0x0000000007920000-0x0000000007F38000-memory.dmp

    Filesize

    6.1MB

  • memory/4688-951-0x0000000007F70000-0x0000000007F82000-memory.dmp

    Filesize

    72KB

  • memory/4688-952-0x0000000007F90000-0x000000000809A000-memory.dmp

    Filesize

    1.0MB

  • memory/4688-953-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

    Filesize

    64KB

  • memory/4688-954-0x00000000080B0000-0x00000000080EC000-memory.dmp

    Filesize

    240KB

  • memory/4688-956-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

    Filesize

    64KB

  • memory/4688-957-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

    Filesize

    64KB

  • memory/4688-958-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

    Filesize

    64KB