Analysis

  • max time kernel
    149s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-05-2023 18:57

General

  • Target

    ace943288cf51105b08d361d8169ab401ae21d20d7f6041130e2658547629bcb.exe

  • Size

    752KB

  • MD5

    6dcc771778f7c089a3ee4ae7305ebcce

  • SHA1

    a2cb1a0b844dc6df45c5ed7bd9b09c6e04070707

  • SHA256

    ace943288cf51105b08d361d8169ab401ae21d20d7f6041130e2658547629bcb

  • SHA512

    6c0e40b6d6bd6d4756a25454332de0cf753d3149c6cc054ae29f4954fcdf7100ccbed2d0bee85e91b3e065aa114d93e8ef803a298711c7e5d678211c542ef64c

  • SSDEEP

    12288:ny90nI7pNanUkzIejb4kgUeuEn/cDlTBa4il7Mg+EOum6xdpXwWA6VRXWk8I0oD:nyEwpSfzfjbXuvn0BI4iaHrumsvXgCcC

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ace943288cf51105b08d361d8169ab401ae21d20d7f6041130e2658547629bcb.exe
    "C:\Users\Admin\AppData\Local\Temp\ace943288cf51105b08d361d8169ab401ae21d20d7f6041130e2658547629bcb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4128
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un012154.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un012154.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4124
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\62180111.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\62180111.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4756
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk354583.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk354583.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1476

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un012154.exe

    Filesize

    598KB

    MD5

    afeb3b1b00dc6993d135e312f3166e51

    SHA1

    988637ba75f00e1ad91210f4e80acb70c4a46aec

    SHA256

    b9b27015c35d8d65721d338a5e52ffdef0ae18277d04a395ae2564f7ccb7f60c

    SHA512

    acc503aa5e8331db9d86811c72fbbb9326a28610627a0c75ae4daba6cd02e3f6d14b15fdc2e078ca43de350d5a49b5f6a83110c52ee82e4cac597757b4b1215c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un012154.exe

    Filesize

    598KB

    MD5

    afeb3b1b00dc6993d135e312f3166e51

    SHA1

    988637ba75f00e1ad91210f4e80acb70c4a46aec

    SHA256

    b9b27015c35d8d65721d338a5e52ffdef0ae18277d04a395ae2564f7ccb7f60c

    SHA512

    acc503aa5e8331db9d86811c72fbbb9326a28610627a0c75ae4daba6cd02e3f6d14b15fdc2e078ca43de350d5a49b5f6a83110c52ee82e4cac597757b4b1215c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\62180111.exe

    Filesize

    390KB

    MD5

    acd26f7d98a58d8833a99ddc8c035d7b

    SHA1

    958c8de1d125548b0bdcccde4a62fa30767e33af

    SHA256

    49ceac6965494d52c5a9bf8ccf9d5ddf8b882321aeee6a9722613583bd1db313

    SHA512

    f43c6ace4cd872feba2fd1c1bd21faadd9b6bef4360e22af2379af7aa293e5d7266f8c0563f0290c8a59eea1efa3b6ee6e0db2d81218ff640baa1d4141f862b4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\62180111.exe

    Filesize

    390KB

    MD5

    acd26f7d98a58d8833a99ddc8c035d7b

    SHA1

    958c8de1d125548b0bdcccde4a62fa30767e33af

    SHA256

    49ceac6965494d52c5a9bf8ccf9d5ddf8b882321aeee6a9722613583bd1db313

    SHA512

    f43c6ace4cd872feba2fd1c1bd21faadd9b6bef4360e22af2379af7aa293e5d7266f8c0563f0290c8a59eea1efa3b6ee6e0db2d81218ff640baa1d4141f862b4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk354583.exe

    Filesize

    473KB

    MD5

    2d2b724b11505d2df5d0ee9499a847e5

    SHA1

    7b2d9e070ab7f39d268c4c0b6eb7418c96ea8b8a

    SHA256

    d6e70034b1f18f4290aa7430539689ad42dcc2912426fb5da7c198218ea97899

    SHA512

    5c7ee47fcf75bd5f8d436ad2c595f94cd865e35339939cf5637d11695202fbd5e127b4aa527d0f4bdefa31b0b983631eb09f39f342d3ca80693c8bfaeb897b8f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk354583.exe

    Filesize

    473KB

    MD5

    2d2b724b11505d2df5d0ee9499a847e5

    SHA1

    7b2d9e070ab7f39d268c4c0b6eb7418c96ea8b8a

    SHA256

    d6e70034b1f18f4290aa7430539689ad42dcc2912426fb5da7c198218ea97899

    SHA512

    5c7ee47fcf75bd5f8d436ad2c595f94cd865e35339939cf5637d11695202fbd5e127b4aa527d0f4bdefa31b0b983631eb09f39f342d3ca80693c8bfaeb897b8f

  • memory/1476-214-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1476-222-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1476-994-0x0000000004F20000-0x0000000004F30000-memory.dmp

    Filesize

    64KB

  • memory/1476-991-0x0000000004F20000-0x0000000004F30000-memory.dmp

    Filesize

    64KB

  • memory/1476-196-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1476-990-0x0000000004F20000-0x0000000004F30000-memory.dmp

    Filesize

    64KB

  • memory/1476-989-0x00000000080B0000-0x00000000080EC000-memory.dmp

    Filesize

    240KB

  • memory/1476-198-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1476-986-0x0000000007F80000-0x0000000007F92000-memory.dmp

    Filesize

    72KB

  • memory/1476-985-0x0000000007960000-0x0000000007F78000-memory.dmp

    Filesize

    6.1MB

  • memory/1476-482-0x0000000004F20000-0x0000000004F30000-memory.dmp

    Filesize

    64KB

  • memory/1476-478-0x0000000004F20000-0x0000000004F30000-memory.dmp

    Filesize

    64KB

  • memory/1476-481-0x0000000004F20000-0x0000000004F30000-memory.dmp

    Filesize

    64KB

  • memory/1476-477-0x0000000000980000-0x00000000009C6000-memory.dmp

    Filesize

    280KB

  • memory/1476-220-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1476-218-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1476-216-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1476-212-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1476-210-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1476-208-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1476-206-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1476-204-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1476-202-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1476-190-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1476-194-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1476-189-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1476-192-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/1476-992-0x0000000004F20000-0x0000000004F30000-memory.dmp

    Filesize

    64KB

  • memory/1476-988-0x0000000007FA0000-0x00000000080AA000-memory.dmp

    Filesize

    1.0MB

  • memory/1476-200-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/4756-156-0x0000000004D80000-0x0000000004D92000-memory.dmp

    Filesize

    72KB

  • memory/4756-176-0x0000000004D80000-0x0000000004D92000-memory.dmp

    Filesize

    72KB

  • memory/4756-148-0x0000000000850000-0x000000000087D000-memory.dmp

    Filesize

    180KB

  • memory/4756-182-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

    Filesize

    64KB

  • memory/4756-181-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/4756-180-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

    Filesize

    64KB

  • memory/4756-149-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

    Filesize

    64KB

  • memory/4756-179-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

    Filesize

    64KB

  • memory/4756-178-0x0000000004D80000-0x0000000004D92000-memory.dmp

    Filesize

    72KB

  • memory/4756-172-0x0000000004D80000-0x0000000004D92000-memory.dmp

    Filesize

    72KB

  • memory/4756-184-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/4756-150-0x0000000004DC0000-0x0000000005364000-memory.dmp

    Filesize

    5.6MB

  • memory/4756-152-0x0000000004D80000-0x0000000004D92000-memory.dmp

    Filesize

    72KB

  • memory/4756-174-0x0000000004D80000-0x0000000004D92000-memory.dmp

    Filesize

    72KB

  • memory/4756-168-0x0000000004D80000-0x0000000004D92000-memory.dmp

    Filesize

    72KB

  • memory/4756-166-0x0000000004D80000-0x0000000004D92000-memory.dmp

    Filesize

    72KB

  • memory/4756-164-0x0000000004D80000-0x0000000004D92000-memory.dmp

    Filesize

    72KB

  • memory/4756-162-0x0000000004D80000-0x0000000004D92000-memory.dmp

    Filesize

    72KB

  • memory/4756-160-0x0000000004D80000-0x0000000004D92000-memory.dmp

    Filesize

    72KB

  • memory/4756-158-0x0000000004D80000-0x0000000004D92000-memory.dmp

    Filesize

    72KB

  • memory/4756-151-0x0000000004D80000-0x0000000004D92000-memory.dmp

    Filesize

    72KB

  • memory/4756-154-0x0000000004D80000-0x0000000004D92000-memory.dmp

    Filesize

    72KB

  • memory/4756-170-0x0000000004D80000-0x0000000004D92000-memory.dmp

    Filesize

    72KB