Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2023, 19:20

General

  • Target

    bf7f498c8b37077dc3ad38e18b62b6f74b9462f0bda81bccad4b556bf0207143.exe

  • Size

    694KB

  • MD5

    dd2d202badee775ea9c9771189f215e3

  • SHA1

    62dd322096d3aff4a4d40bbf290bd59e28fa12f0

  • SHA256

    bf7f498c8b37077dc3ad38e18b62b6f74b9462f0bda81bccad4b556bf0207143

  • SHA512

    e9a04bcaa4387e8797e7baee6d0ccb4be6a7a739dc798dcee791357e6ce26284b74c37af22ee73983e8f4dc362be6dd844faada310e036cdd70220d53cbcb5de

  • SSDEEP

    12288:xy908CEt57Vv8Grha375FJ60qlniSVdUN0cRxbPDUBTOYGQBqm9T:xy+e7V0Gda37HJZqlVdUeEb1Y5q8

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bf7f498c8b37077dc3ad38e18b62b6f74b9462f0bda81bccad4b556bf0207143.exe
    "C:\Users\Admin\AppData\Local\Temp\bf7f498c8b37077dc3ad38e18b62b6f74b9462f0bda81bccad4b556bf0207143.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1500
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un972163.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un972163.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3208
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\12438575.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\12438575.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3684
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk483991.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk483991.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:936

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un972163.exe

    Filesize

    540KB

    MD5

    ef29a63423d3871a7796ead771fa4557

    SHA1

    949fb565e75663fef5470926003390be46055a03

    SHA256

    4fd1dbf5fa7440889733db01ea650a29e000e0f4cd878e58cfa9a6dd94e10a66

    SHA512

    9ddb1d4b9cf3502a7d95bd5caa63d9e667cb30e3902bd9a237ce1825a2eaaf14bbe354b5693d1d89d56e8e435a746f5fb9e7c9e5c21ab9368787fab85b41d91d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un972163.exe

    Filesize

    540KB

    MD5

    ef29a63423d3871a7796ead771fa4557

    SHA1

    949fb565e75663fef5470926003390be46055a03

    SHA256

    4fd1dbf5fa7440889733db01ea650a29e000e0f4cd878e58cfa9a6dd94e10a66

    SHA512

    9ddb1d4b9cf3502a7d95bd5caa63d9e667cb30e3902bd9a237ce1825a2eaaf14bbe354b5693d1d89d56e8e435a746f5fb9e7c9e5c21ab9368787fab85b41d91d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\12438575.exe

    Filesize

    258KB

    MD5

    bc4ee02854bd043f990dab2d8ad92db3

    SHA1

    60e767841bbf1617040953ef1579ddbb6a0a4566

    SHA256

    0431f69a6764625540bd42d7e60b8bfa540ce3d0bbdf10cb230ae1de1a734f07

    SHA512

    17e706e7f02b4a1ce4b4ce1f78025b7f075d1d11441d98322efebc55f72ee3a6988a7e8d146c1541fc5f1a9b1ccdff4a35a7a2d133a627ded607ecddc724ae3b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\12438575.exe

    Filesize

    258KB

    MD5

    bc4ee02854bd043f990dab2d8ad92db3

    SHA1

    60e767841bbf1617040953ef1579ddbb6a0a4566

    SHA256

    0431f69a6764625540bd42d7e60b8bfa540ce3d0bbdf10cb230ae1de1a734f07

    SHA512

    17e706e7f02b4a1ce4b4ce1f78025b7f075d1d11441d98322efebc55f72ee3a6988a7e8d146c1541fc5f1a9b1ccdff4a35a7a2d133a627ded607ecddc724ae3b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk483991.exe

    Filesize

    341KB

    MD5

    3a4a31e28202034c475024725a90472b

    SHA1

    8ff7a828dcaa0e7acc9cca46f36fb560e999bdda

    SHA256

    fc9d51cd0cd8a32b9d95a5f58ecf94a804a228a8e0da86a3bbe2c52445fae7d3

    SHA512

    c44398b76c03fe3a183208811f0f598bfa094ad16e7408d6dda7fe67590e5f38a26e34094cda3b18f21d5f2335cb9936cc37c1c7096d647f1a69013b3bca7a8a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk483991.exe

    Filesize

    341KB

    MD5

    3a4a31e28202034c475024725a90472b

    SHA1

    8ff7a828dcaa0e7acc9cca46f36fb560e999bdda

    SHA256

    fc9d51cd0cd8a32b9d95a5f58ecf94a804a228a8e0da86a3bbe2c52445fae7d3

    SHA512

    c44398b76c03fe3a183208811f0f598bfa094ad16e7408d6dda7fe67590e5f38a26e34094cda3b18f21d5f2335cb9936cc37c1c7096d647f1a69013b3bca7a8a

  • memory/936-215-0x0000000004D00000-0x0000000004D35000-memory.dmp

    Filesize

    212KB

  • memory/936-223-0x0000000004D00000-0x0000000004D35000-memory.dmp

    Filesize

    212KB

  • memory/936-1001-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/936-999-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/936-998-0x000000000A440000-0x000000000A47C000-memory.dmp

    Filesize

    240KB

  • memory/936-997-0x000000000A320000-0x000000000A42A000-memory.dmp

    Filesize

    1.0MB

  • memory/936-996-0x000000000A300000-0x000000000A312000-memory.dmp

    Filesize

    72KB

  • memory/936-203-0x0000000004D00000-0x0000000004D35000-memory.dmp

    Filesize

    212KB

  • memory/936-994-0x0000000009C40000-0x000000000A258000-memory.dmp

    Filesize

    6.1MB

  • memory/936-993-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/936-992-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/936-195-0x0000000004D00000-0x0000000004D35000-memory.dmp

    Filesize

    212KB

  • memory/936-227-0x0000000004D00000-0x0000000004D35000-memory.dmp

    Filesize

    212KB

  • memory/936-225-0x0000000004D00000-0x0000000004D35000-memory.dmp

    Filesize

    212KB

  • memory/936-194-0x0000000004D00000-0x0000000004D35000-memory.dmp

    Filesize

    212KB

  • memory/936-201-0x0000000004D00000-0x0000000004D35000-memory.dmp

    Filesize

    212KB

  • memory/936-221-0x0000000004D00000-0x0000000004D35000-memory.dmp

    Filesize

    212KB

  • memory/936-217-0x0000000004D00000-0x0000000004D35000-memory.dmp

    Filesize

    212KB

  • memory/936-219-0x0000000004D00000-0x0000000004D35000-memory.dmp

    Filesize

    212KB

  • memory/936-197-0x0000000004D00000-0x0000000004D35000-memory.dmp

    Filesize

    212KB

  • memory/936-199-0x0000000004D00000-0x0000000004D35000-memory.dmp

    Filesize

    212KB

  • memory/936-209-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/936-213-0x0000000004D00000-0x0000000004D35000-memory.dmp

    Filesize

    212KB

  • memory/936-212-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/936-210-0x0000000004D00000-0x0000000004D35000-memory.dmp

    Filesize

    212KB

  • memory/936-206-0x0000000004D00000-0x0000000004D35000-memory.dmp

    Filesize

    212KB

  • memory/936-207-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/936-991-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/936-205-0x0000000002C80000-0x0000000002CC6000-memory.dmp

    Filesize

    280KB

  • memory/3684-172-0x00000000048F0000-0x0000000004903000-memory.dmp

    Filesize

    76KB

  • memory/3684-158-0x00000000048F0000-0x0000000004903000-memory.dmp

    Filesize

    76KB

  • memory/3684-151-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/3684-149-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/3684-150-0x0000000002F90000-0x0000000002FA0000-memory.dmp

    Filesize

    64KB

  • memory/3684-189-0x0000000002BA0000-0x0000000002BCD000-memory.dmp

    Filesize

    180KB

  • memory/3684-188-0x0000000000400000-0x0000000002B9B000-memory.dmp

    Filesize

    39.6MB

  • memory/3684-185-0x0000000002F90000-0x0000000002FA0000-memory.dmp

    Filesize

    64KB

  • memory/3684-184-0x0000000002F90000-0x0000000002FA0000-memory.dmp

    Filesize

    64KB

  • memory/3684-182-0x00000000048F0000-0x0000000004903000-memory.dmp

    Filesize

    76KB

  • memory/3684-148-0x0000000002BA0000-0x0000000002BCD000-memory.dmp

    Filesize

    180KB

  • memory/3684-180-0x00000000048F0000-0x0000000004903000-memory.dmp

    Filesize

    76KB

  • memory/3684-178-0x00000000048F0000-0x0000000004903000-memory.dmp

    Filesize

    76KB

  • memory/3684-176-0x00000000048F0000-0x0000000004903000-memory.dmp

    Filesize

    76KB

  • memory/3684-174-0x00000000048F0000-0x0000000004903000-memory.dmp

    Filesize

    76KB

  • memory/3684-170-0x00000000048F0000-0x0000000004903000-memory.dmp

    Filesize

    76KB

  • memory/3684-166-0x00000000048F0000-0x0000000004903000-memory.dmp

    Filesize

    76KB

  • memory/3684-168-0x00000000048F0000-0x0000000004903000-memory.dmp

    Filesize

    76KB

  • memory/3684-164-0x00000000048F0000-0x0000000004903000-memory.dmp

    Filesize

    76KB

  • memory/3684-162-0x00000000048F0000-0x0000000004903000-memory.dmp

    Filesize

    76KB

  • memory/3684-160-0x00000000048F0000-0x0000000004903000-memory.dmp

    Filesize

    76KB

  • memory/3684-155-0x00000000048F0000-0x0000000004903000-memory.dmp

    Filesize

    76KB

  • memory/3684-156-0x00000000048F0000-0x0000000004903000-memory.dmp

    Filesize

    76KB

  • memory/3684-153-0x0000000002F90000-0x0000000002FA0000-memory.dmp

    Filesize

    64KB

  • memory/3684-154-0x0000000002F90000-0x0000000002FA0000-memory.dmp

    Filesize

    64KB

  • memory/3684-152-0x00000000071D0000-0x0000000007774000-memory.dmp

    Filesize

    5.6MB