Analysis

  • max time kernel
    147s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-05-2023 19:42

General

  • Target

    cf4fc504d12ff2e2333432048964a995c70358497fb61499fe02a55ae71c4419.exe

  • Size

    651KB

  • MD5

    b2b93313828fc1191fd8e16ade789472

  • SHA1

    4a031f85a239f022b6c5f5bcd22eccb14bec86d7

  • SHA256

    cf4fc504d12ff2e2333432048964a995c70358497fb61499fe02a55ae71c4419

  • SHA512

    07abd362179ff42100928f878e00fc2e2a1fea8d72018001107587606b2fecc4e45b327bc5f8905d1bbfa9f0d6bd0159cce3f83fe7289d7614918a955ad3281d

  • SSDEEP

    12288:my90Oqi/LAWEtJZP+2baOjgg8gW7/o0sxY2omQcxOjeYKIXJ0uM:my5qrWEtJZP1MSe2o5njJKIXuX

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf4fc504d12ff2e2333432048964a995c70358497fb61499fe02a55ae71c4419.exe
    "C:\Users\Admin\AppData\Local\Temp\cf4fc504d12ff2e2333432048964a995c70358497fb61499fe02a55ae71c4419.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st482980.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st482980.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3976
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\79209702.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\79209702.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1616
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp576907.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp576907.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4028

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st482980.exe

    Filesize

    497KB

    MD5

    ab9a16bf75f698964dab7295e0a87b47

    SHA1

    71324767de6f6b7ee356bd9c87734879d9f230f3

    SHA256

    5d5473a7884020e87eb07c2f587d97599761decdf3c5566dd7c61529e203e030

    SHA512

    71c3704dd6c3ee13915a075395b6842e536a150205c2652271bbb6fc945c4c3d1f6a86c6fe470f23900e34c3b7d65e93525bc35d019d593a3e259ba8c95d1d9d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st482980.exe

    Filesize

    497KB

    MD5

    ab9a16bf75f698964dab7295e0a87b47

    SHA1

    71324767de6f6b7ee356bd9c87734879d9f230f3

    SHA256

    5d5473a7884020e87eb07c2f587d97599761decdf3c5566dd7c61529e203e030

    SHA512

    71c3704dd6c3ee13915a075395b6842e536a150205c2652271bbb6fc945c4c3d1f6a86c6fe470f23900e34c3b7d65e93525bc35d019d593a3e259ba8c95d1d9d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\79209702.exe

    Filesize

    175KB

    MD5

    a165b5f6b0a4bdf808b71de57bf9347d

    SHA1

    39a7b301e819e386c162a47e046fa384bb5ab437

    SHA256

    68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

    SHA512

    3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\79209702.exe

    Filesize

    175KB

    MD5

    a165b5f6b0a4bdf808b71de57bf9347d

    SHA1

    39a7b301e819e386c162a47e046fa384bb5ab437

    SHA256

    68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

    SHA512

    3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp576907.exe

    Filesize

    341KB

    MD5

    860467327539e06048e5bb5645805b96

    SHA1

    8e013c42d7ff559c94dd89487aedbfef9b0f9b5e

    SHA256

    87e91d93cdbf4b244f21c194b11ab4f3d3d70a973a78f48878d763279cfd433c

    SHA512

    8b0561ea8d884b125f1c35f83bca1615abed661ea828819d691818ead00bc67ea14ed731fe5ef0ac70a5f2c56d2205aaeaca21454cfb04b0614bb9eac707caeb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp576907.exe

    Filesize

    341KB

    MD5

    860467327539e06048e5bb5645805b96

    SHA1

    8e013c42d7ff559c94dd89487aedbfef9b0f9b5e

    SHA256

    87e91d93cdbf4b244f21c194b11ab4f3d3d70a973a78f48878d763279cfd433c

    SHA512

    8b0561ea8d884b125f1c35f83bca1615abed661ea828819d691818ead00bc67ea14ed731fe5ef0ac70a5f2c56d2205aaeaca21454cfb04b0614bb9eac707caeb

  • memory/1616-147-0x00000000023A0000-0x00000000023B0000-memory.dmp

    Filesize

    64KB

  • memory/1616-148-0x00000000049B0000-0x0000000004F54000-memory.dmp

    Filesize

    5.6MB

  • memory/1616-149-0x00000000023A0000-0x00000000023B0000-memory.dmp

    Filesize

    64KB

  • memory/1616-151-0x0000000002410000-0x0000000002423000-memory.dmp

    Filesize

    76KB

  • memory/1616-150-0x0000000002410000-0x0000000002423000-memory.dmp

    Filesize

    76KB

  • memory/1616-153-0x0000000002410000-0x0000000002423000-memory.dmp

    Filesize

    76KB

  • memory/1616-155-0x0000000002410000-0x0000000002423000-memory.dmp

    Filesize

    76KB

  • memory/1616-157-0x0000000002410000-0x0000000002423000-memory.dmp

    Filesize

    76KB

  • memory/1616-159-0x0000000002410000-0x0000000002423000-memory.dmp

    Filesize

    76KB

  • memory/1616-161-0x0000000002410000-0x0000000002423000-memory.dmp

    Filesize

    76KB

  • memory/1616-165-0x0000000002410000-0x0000000002423000-memory.dmp

    Filesize

    76KB

  • memory/1616-163-0x0000000002410000-0x0000000002423000-memory.dmp

    Filesize

    76KB

  • memory/1616-167-0x0000000002410000-0x0000000002423000-memory.dmp

    Filesize

    76KB

  • memory/1616-169-0x0000000002410000-0x0000000002423000-memory.dmp

    Filesize

    76KB

  • memory/1616-171-0x0000000002410000-0x0000000002423000-memory.dmp

    Filesize

    76KB

  • memory/1616-173-0x0000000002410000-0x0000000002423000-memory.dmp

    Filesize

    76KB

  • memory/1616-175-0x0000000002410000-0x0000000002423000-memory.dmp

    Filesize

    76KB

  • memory/1616-177-0x0000000002410000-0x0000000002423000-memory.dmp

    Filesize

    76KB

  • memory/1616-178-0x00000000023A0000-0x00000000023B0000-memory.dmp

    Filesize

    64KB

  • memory/1616-180-0x00000000023A0000-0x00000000023B0000-memory.dmp

    Filesize

    64KB

  • memory/1616-179-0x00000000023A0000-0x00000000023B0000-memory.dmp

    Filesize

    64KB

  • memory/4028-186-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/4028-187-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/4028-189-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/4028-191-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/4028-193-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/4028-195-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/4028-197-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/4028-199-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/4028-201-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/4028-203-0x0000000000600000-0x0000000000646000-memory.dmp

    Filesize

    280KB

  • memory/4028-204-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/4028-205-0x00000000022C0000-0x00000000022D0000-memory.dmp

    Filesize

    64KB

  • memory/4028-208-0x00000000022C0000-0x00000000022D0000-memory.dmp

    Filesize

    64KB

  • memory/4028-207-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/4028-210-0x00000000022C0000-0x00000000022D0000-memory.dmp

    Filesize

    64KB

  • memory/4028-211-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/4028-213-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/4028-215-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/4028-217-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/4028-219-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/4028-221-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/4028-223-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/4028-225-0x0000000002520000-0x0000000002555000-memory.dmp

    Filesize

    212KB

  • memory/4028-982-0x0000000007550000-0x0000000007B68000-memory.dmp

    Filesize

    6.1MB

  • memory/4028-983-0x0000000007BC0000-0x0000000007BD2000-memory.dmp

    Filesize

    72KB

  • memory/4028-984-0x0000000007BE0000-0x0000000007CEA000-memory.dmp

    Filesize

    1.0MB

  • memory/4028-985-0x00000000022C0000-0x00000000022D0000-memory.dmp

    Filesize

    64KB

  • memory/4028-986-0x0000000007D00000-0x0000000007D3C000-memory.dmp

    Filesize

    240KB

  • memory/4028-988-0x00000000022C0000-0x00000000022D0000-memory.dmp

    Filesize

    64KB

  • memory/4028-989-0x00000000022C0000-0x00000000022D0000-memory.dmp

    Filesize

    64KB

  • memory/4028-990-0x00000000022C0000-0x00000000022D0000-memory.dmp

    Filesize

    64KB

  • memory/4028-991-0x00000000022C0000-0x00000000022D0000-memory.dmp

    Filesize

    64KB