Analysis

  • max time kernel
    146s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 22:08

General

  • Target

    5d8cbf347a1974bf7542a409bdf8702234b16772c7c6f0e0ac0ea5331ffa3bf0.exe

  • Size

    564KB

  • MD5

    c20c5176d4b991dd711c18fee0b8291a

  • SHA1

    c707b486625ac543e32cd22b597c87be8b8bedeb

  • SHA256

    5d8cbf347a1974bf7542a409bdf8702234b16772c7c6f0e0ac0ea5331ffa3bf0

  • SHA512

    0588592b76bb1e8c1601569bbf75fe18dc70aae6b21ec85c9747dce621392ce1baebd54a1ee48c3a84d6c971aeee96e4b99a12778a794faeb66c27f024adf4a1

  • SSDEEP

    12288:ay90CXKOQ4wWCZmhNf2Iv/zs0PLsnMnIK1ndQe:ayJXKYWYhNf1LzPLsAVV

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d8cbf347a1974bf7542a409bdf8702234b16772c7c6f0e0ac0ea5331ffa3bf0.exe
    "C:\Users\Admin\AppData\Local\Temp\5d8cbf347a1974bf7542a409bdf8702234b16772c7c6f0e0ac0ea5331ffa3bf0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4528
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zilt3481.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zilt3481.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4984
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it536459.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it536459.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2024
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp055622.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp055622.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3784

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zilt3481.exe

    Filesize

    409KB

    MD5

    a03290b0f1445f35e270d8ba1937bfe0

    SHA1

    6dd881c2c49156405f8ccf038213329d93df4e9b

    SHA256

    a36fd0192d158c76bc6b96483b7cb26e7747177bf94392a8c0bdd7d159a4c360

    SHA512

    accfc134b5d9493d8b759e61d9587f24c024cd42514be0deec8b4dfaca7237b00cbc17d12216879370164678bde6e8323a5fad3e788831662d15d047b54ca340

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zilt3481.exe

    Filesize

    409KB

    MD5

    a03290b0f1445f35e270d8ba1937bfe0

    SHA1

    6dd881c2c49156405f8ccf038213329d93df4e9b

    SHA256

    a36fd0192d158c76bc6b96483b7cb26e7747177bf94392a8c0bdd7d159a4c360

    SHA512

    accfc134b5d9493d8b759e61d9587f24c024cd42514be0deec8b4dfaca7237b00cbc17d12216879370164678bde6e8323a5fad3e788831662d15d047b54ca340

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it536459.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it536459.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp055622.exe

    Filesize

    361KB

    MD5

    88a3b5b6ae5887cb8c6e2d38b2d11fbd

    SHA1

    0a749821b96f2125a7aa9a33a77cfb21b3e845be

    SHA256

    1bef5782e64f7156419b25aeaf766903f3eed0056ff551dfa94b55bd378ecbfc

    SHA512

    7d851384a46a3c3502c85c9ae16928c4bc7742531c086a63f1341bf498cfc0332eca2bacee58aa12d4784258c1e7ff361f137f3e65023d208c5e931255e88d8d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp055622.exe

    Filesize

    361KB

    MD5

    88a3b5b6ae5887cb8c6e2d38b2d11fbd

    SHA1

    0a749821b96f2125a7aa9a33a77cfb21b3e845be

    SHA256

    1bef5782e64f7156419b25aeaf766903f3eed0056ff551dfa94b55bd378ecbfc

    SHA512

    7d851384a46a3c3502c85c9ae16928c4bc7742531c086a63f1341bf498cfc0332eca2bacee58aa12d4784258c1e7ff361f137f3e65023d208c5e931255e88d8d

  • memory/2024-147-0x00000000008F0000-0x00000000008FA000-memory.dmp

    Filesize

    40KB

  • memory/3784-153-0x0000000002BD0000-0x0000000002C16000-memory.dmp

    Filesize

    280KB

  • memory/3784-154-0x0000000007330000-0x0000000007340000-memory.dmp

    Filesize

    64KB

  • memory/3784-155-0x0000000007340000-0x00000000078E4000-memory.dmp

    Filesize

    5.6MB

  • memory/3784-156-0x0000000007330000-0x0000000007340000-memory.dmp

    Filesize

    64KB

  • memory/3784-157-0x0000000004A80000-0x0000000004AB5000-memory.dmp

    Filesize

    212KB

  • memory/3784-158-0x0000000004A80000-0x0000000004AB5000-memory.dmp

    Filesize

    212KB

  • memory/3784-160-0x0000000004A80000-0x0000000004AB5000-memory.dmp

    Filesize

    212KB

  • memory/3784-162-0x0000000004A80000-0x0000000004AB5000-memory.dmp

    Filesize

    212KB

  • memory/3784-164-0x0000000004A80000-0x0000000004AB5000-memory.dmp

    Filesize

    212KB

  • memory/3784-166-0x0000000004A80000-0x0000000004AB5000-memory.dmp

    Filesize

    212KB

  • memory/3784-168-0x0000000004A80000-0x0000000004AB5000-memory.dmp

    Filesize

    212KB

  • memory/3784-170-0x0000000004A80000-0x0000000004AB5000-memory.dmp

    Filesize

    212KB

  • memory/3784-172-0x0000000004A80000-0x0000000004AB5000-memory.dmp

    Filesize

    212KB

  • memory/3784-174-0x0000000004A80000-0x0000000004AB5000-memory.dmp

    Filesize

    212KB

  • memory/3784-176-0x0000000004A80000-0x0000000004AB5000-memory.dmp

    Filesize

    212KB

  • memory/3784-178-0x0000000004A80000-0x0000000004AB5000-memory.dmp

    Filesize

    212KB

  • memory/3784-180-0x0000000004A80000-0x0000000004AB5000-memory.dmp

    Filesize

    212KB

  • memory/3784-182-0x0000000004A80000-0x0000000004AB5000-memory.dmp

    Filesize

    212KB

  • memory/3784-184-0x0000000004A80000-0x0000000004AB5000-memory.dmp

    Filesize

    212KB

  • memory/3784-186-0x0000000004A80000-0x0000000004AB5000-memory.dmp

    Filesize

    212KB

  • memory/3784-188-0x0000000004A80000-0x0000000004AB5000-memory.dmp

    Filesize

    212KB

  • memory/3784-190-0x0000000004A80000-0x0000000004AB5000-memory.dmp

    Filesize

    212KB

  • memory/3784-192-0x0000000004A80000-0x0000000004AB5000-memory.dmp

    Filesize

    212KB

  • memory/3784-194-0x0000000004A80000-0x0000000004AB5000-memory.dmp

    Filesize

    212KB

  • memory/3784-196-0x0000000004A80000-0x0000000004AB5000-memory.dmp

    Filesize

    212KB

  • memory/3784-198-0x0000000004A80000-0x0000000004AB5000-memory.dmp

    Filesize

    212KB

  • memory/3784-200-0x0000000004A80000-0x0000000004AB5000-memory.dmp

    Filesize

    212KB

  • memory/3784-202-0x0000000004A80000-0x0000000004AB5000-memory.dmp

    Filesize

    212KB

  • memory/3784-204-0x0000000004A80000-0x0000000004AB5000-memory.dmp

    Filesize

    212KB

  • memory/3784-206-0x0000000004A80000-0x0000000004AB5000-memory.dmp

    Filesize

    212KB

  • memory/3784-208-0x0000000004A80000-0x0000000004AB5000-memory.dmp

    Filesize

    212KB

  • memory/3784-210-0x0000000004A80000-0x0000000004AB5000-memory.dmp

    Filesize

    212KB

  • memory/3784-212-0x0000000004A80000-0x0000000004AB5000-memory.dmp

    Filesize

    212KB

  • memory/3784-214-0x0000000004A80000-0x0000000004AB5000-memory.dmp

    Filesize

    212KB

  • memory/3784-216-0x0000000004A80000-0x0000000004AB5000-memory.dmp

    Filesize

    212KB

  • memory/3784-218-0x0000000004A80000-0x0000000004AB5000-memory.dmp

    Filesize

    212KB

  • memory/3784-220-0x0000000004A80000-0x0000000004AB5000-memory.dmp

    Filesize

    212KB

  • memory/3784-949-0x0000000009D70000-0x000000000A388000-memory.dmp

    Filesize

    6.1MB

  • memory/3784-950-0x00000000072C0000-0x00000000072D2000-memory.dmp

    Filesize

    72KB

  • memory/3784-951-0x000000000A390000-0x000000000A49A000-memory.dmp

    Filesize

    1.0MB

  • memory/3784-952-0x00000000072F0000-0x000000000732C000-memory.dmp

    Filesize

    240KB

  • memory/3784-953-0x0000000007330000-0x0000000007340000-memory.dmp

    Filesize

    64KB

  • memory/3784-955-0x0000000007330000-0x0000000007340000-memory.dmp

    Filesize

    64KB

  • memory/3784-956-0x0000000007330000-0x0000000007340000-memory.dmp

    Filesize

    64KB

  • memory/3784-957-0x0000000007330000-0x0000000007340000-memory.dmp

    Filesize

    64KB

  • memory/3784-959-0x0000000007330000-0x0000000007340000-memory.dmp

    Filesize

    64KB