Analysis

  • max time kernel
    186s
  • max time network
    194s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2023, 20:07

General

  • Target

    e0aa60f173234cc4fda20b67c68c56b8e42ce410b4b4679eb4a468dec2dd114a.exe

  • Size

    612KB

  • MD5

    9413dd2b2313407eedcc42a372119b9c

  • SHA1

    14ce13746d1460c983fc553fd720f07b40bba635

  • SHA256

    e0aa60f173234cc4fda20b67c68c56b8e42ce410b4b4679eb4a468dec2dd114a

  • SHA512

    f818c336403200b093404dd33dc9529d5e09ecda9d15c97fbabaed4cf382f18082a9db04f7c083272afc3ec27f04511dbe44ff21c51bb2f63107c2cc493d33f0

  • SSDEEP

    12288:Ky90Ns/5SIY+gcQB1A97x1ITQ6c5nZGTb+Y9z36IZ2w:KybEJMQBaV8aNZ06Y9jZh

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0aa60f173234cc4fda20b67c68c56b8e42ce410b4b4679eb4a468dec2dd114a.exe
    "C:\Users\Admin\AppData\Local\Temp\e0aa60f173234cc4fda20b67c68c56b8e42ce410b4b4679eb4a468dec2dd114a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2720
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st332708.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st332708.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\32875168.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\32875168.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1508
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp917265.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp917265.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:344

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st332708.exe

    Filesize

    457KB

    MD5

    da9e845b6d7280e684683514788cf735

    SHA1

    dd1eed4320136e2ab2a1414d57567faabd26efcf

    SHA256

    e37df1b57312cf3197fe9925a16f7efdbb027c26772f3a0ec3644df25dbee5b6

    SHA512

    715194ab831ba7d5b1c41724e11e4dbe323d0d22b5294ab2ced7336bf833861411a028ea766d83fb0a0c10d95b114f9eed456f4fcf298b64373f22713bbf5d9d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st332708.exe

    Filesize

    457KB

    MD5

    da9e845b6d7280e684683514788cf735

    SHA1

    dd1eed4320136e2ab2a1414d57567faabd26efcf

    SHA256

    e37df1b57312cf3197fe9925a16f7efdbb027c26772f3a0ec3644df25dbee5b6

    SHA512

    715194ab831ba7d5b1c41724e11e4dbe323d0d22b5294ab2ced7336bf833861411a028ea766d83fb0a0c10d95b114f9eed456f4fcf298b64373f22713bbf5d9d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\32875168.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\32875168.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp917265.exe

    Filesize

    459KB

    MD5

    438ffffe82c0fc7df798f227a856f09d

    SHA1

    c9ddbab8a12dd94758186293871c8a96f4ea86cd

    SHA256

    74596788dbe7840ab48714e0ac6cdb34be9b4577808e2f85c213f33d0e93d2bb

    SHA512

    ecabb05652a63b991ec8a85438d356630327f6f09a70340cc6ca27c176cb604830dde79bac978236f4f82b63707cbbbeba268c214ea53e2b1fd24b5170ed3007

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp917265.exe

    Filesize

    459KB

    MD5

    438ffffe82c0fc7df798f227a856f09d

    SHA1

    c9ddbab8a12dd94758186293871c8a96f4ea86cd

    SHA256

    74596788dbe7840ab48714e0ac6cdb34be9b4577808e2f85c213f33d0e93d2bb

    SHA512

    ecabb05652a63b991ec8a85438d356630327f6f09a70340cc6ca27c176cb604830dde79bac978236f4f82b63707cbbbeba268c214ea53e2b1fd24b5170ed3007

  • memory/344-153-0x00000000021E0000-0x0000000002226000-memory.dmp

    Filesize

    280KB

  • memory/344-154-0x0000000000400000-0x0000000000817000-memory.dmp

    Filesize

    4.1MB

  • memory/344-155-0x00000000021E0000-0x0000000002226000-memory.dmp

    Filesize

    280KB

  • memory/344-156-0x0000000004ED0000-0x0000000005474000-memory.dmp

    Filesize

    5.6MB

  • memory/344-158-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/344-160-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/344-157-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/344-164-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/344-166-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/344-162-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/344-168-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/344-171-0x0000000000400000-0x0000000000817000-memory.dmp

    Filesize

    4.1MB

  • memory/344-173-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/344-170-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/344-175-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/344-177-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/344-174-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/344-178-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/344-180-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/344-182-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/344-184-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/344-186-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/344-188-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/344-192-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/344-190-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/344-194-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/344-196-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/344-198-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/344-200-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/344-202-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/344-204-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/344-206-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/344-208-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/344-210-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/344-212-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/344-214-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/344-216-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/344-218-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/344-220-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/344-222-0x0000000004DC0000-0x0000000004DF5000-memory.dmp

    Filesize

    212KB

  • memory/344-953-0x0000000007900000-0x0000000007F18000-memory.dmp

    Filesize

    6.1MB

  • memory/344-954-0x0000000007F70000-0x0000000007F82000-memory.dmp

    Filesize

    72KB

  • memory/344-955-0x0000000007F90000-0x000000000809A000-memory.dmp

    Filesize

    1.0MB

  • memory/344-956-0x00000000080B0000-0x00000000080EC000-memory.dmp

    Filesize

    240KB

  • memory/344-957-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/344-959-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/344-960-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/344-961-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/344-962-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/1508-147-0x0000000000240000-0x000000000024A000-memory.dmp

    Filesize

    40KB