Analysis

  • max time kernel
    138s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-05-2023 22:06

General

  • Target

    5c68ab6bd4dd50b50b8b7392541d43744cda7eca8fb5493a96b121e704e2d4e3.exe

  • Size

    480KB

  • MD5

    c22ecf7be4172b40ba0f12d3b88f3a77

  • SHA1

    c0aa96d17ff1e8a6169a98e45c91414561d2d72c

  • SHA256

    5c68ab6bd4dd50b50b8b7392541d43744cda7eca8fb5493a96b121e704e2d4e3

  • SHA512

    2edcc61f51188a4a998bc472b6fe40049e8412d2f767fcab953f4c61a41700f4ada723ad88d88667a200f947660a7bf8b324e2a3b0c739d21e7c2a04e708af14

  • SSDEEP

    12288:kMrWy90a4K3p1NKtuwa5suOqk8F3rXhyXP/:yy30tF63rhQ/

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c68ab6bd4dd50b50b8b7392541d43744cda7eca8fb5493a96b121e704e2d4e3.exe
    "C:\Users\Admin\AppData\Local\Temp\5c68ab6bd4dd50b50b8b7392541d43744cda7eca8fb5493a96b121e704e2d4e3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2092
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7874431.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7874431.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5104
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7428967.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7428967.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2376
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2688427.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2688427.exe
        3⤵
        • Executes dropped EXE
        PID:4080

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7874431.exe

    Filesize

    308KB

    MD5

    4bd71a90a4aa125a8590163447d94c3f

    SHA1

    67318fed9bdfa16bdc5479059c1f88528cf64138

    SHA256

    80510d6679fbf1690ce783f9c6c0d0fc501a28bb041290b84bef0c11f1928887

    SHA512

    107d37a3c94470c7694b46ca8712f7ab0aaefb68f516adc305c165a45a13cc8934071f4dadfd2ea7c3ac50a8f89904780315937a8b1c99e72a843422933f2c4e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7874431.exe

    Filesize

    308KB

    MD5

    4bd71a90a4aa125a8590163447d94c3f

    SHA1

    67318fed9bdfa16bdc5479059c1f88528cf64138

    SHA256

    80510d6679fbf1690ce783f9c6c0d0fc501a28bb041290b84bef0c11f1928887

    SHA512

    107d37a3c94470c7694b46ca8712f7ab0aaefb68f516adc305c165a45a13cc8934071f4dadfd2ea7c3ac50a8f89904780315937a8b1c99e72a843422933f2c4e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7428967.exe

    Filesize

    175KB

    MD5

    6efa797eb50dac8657ff6d73429238c0

    SHA1

    c90fb0c95ab592d374a87509f25849ede9c76b0e

    SHA256

    0e62738c1d9c012ac4442b31491d45780fb8e0e968b43d96624a278e9a2585b8

    SHA512

    d01d7673e72e4e5f56041fd3d20dd72d2261298118cc20981da4d2a81fbc446af014809c022ec21d422648065a0b603a71a4e5fe2d9a14192edb5422ee192dbd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7428967.exe

    Filesize

    175KB

    MD5

    6efa797eb50dac8657ff6d73429238c0

    SHA1

    c90fb0c95ab592d374a87509f25849ede9c76b0e

    SHA256

    0e62738c1d9c012ac4442b31491d45780fb8e0e968b43d96624a278e9a2585b8

    SHA512

    d01d7673e72e4e5f56041fd3d20dd72d2261298118cc20981da4d2a81fbc446af014809c022ec21d422648065a0b603a71a4e5fe2d9a14192edb5422ee192dbd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2688427.exe

    Filesize

    136KB

    MD5

    a9cffe55332618677bd3a47a2074e1d5

    SHA1

    97a87c851200aa3b4affb8f9e5fb249f95fe430b

    SHA256

    8bbbb84343c512e9f36b18f4ffe3ed6e53a5668c64958f1bcbb20c0a9b2bce93

    SHA512

    4f6f4c13ac0721fafbc1957262dd996608beab786e270c7f5f5b51b918ccd3b9925052d9d5225f5795b2a98e516597491547ccc3ef0c6d625371b96809949e5f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2688427.exe

    Filesize

    136KB

    MD5

    a9cffe55332618677bd3a47a2074e1d5

    SHA1

    97a87c851200aa3b4affb8f9e5fb249f95fe430b

    SHA256

    8bbbb84343c512e9f36b18f4ffe3ed6e53a5668c64958f1bcbb20c0a9b2bce93

    SHA512

    4f6f4c13ac0721fafbc1957262dd996608beab786e270c7f5f5b51b918ccd3b9925052d9d5225f5795b2a98e516597491547ccc3ef0c6d625371b96809949e5f

  • memory/2376-166-0x0000000005050000-0x0000000005062000-memory.dmp

    Filesize

    72KB

  • memory/2376-176-0x0000000005050000-0x0000000005062000-memory.dmp

    Filesize

    72KB

  • memory/2376-153-0x0000000005050000-0x0000000005062000-memory.dmp

    Filesize

    72KB

  • memory/2376-158-0x0000000004A90000-0x0000000004AA0000-memory.dmp

    Filesize

    64KB

  • memory/2376-157-0x0000000004A90000-0x0000000004AA0000-memory.dmp

    Filesize

    64KB

  • memory/2376-156-0x0000000005050000-0x0000000005062000-memory.dmp

    Filesize

    72KB

  • memory/2376-160-0x0000000005050000-0x0000000005062000-memory.dmp

    Filesize

    72KB

  • memory/2376-155-0x0000000004A90000-0x0000000004AA0000-memory.dmp

    Filesize

    64KB

  • memory/2376-162-0x0000000005050000-0x0000000005062000-memory.dmp

    Filesize

    72KB

  • memory/2376-164-0x0000000005050000-0x0000000005062000-memory.dmp

    Filesize

    72KB

  • memory/2376-149-0x0000000005050000-0x0000000005062000-memory.dmp

    Filesize

    72KB

  • memory/2376-168-0x0000000005050000-0x0000000005062000-memory.dmp

    Filesize

    72KB

  • memory/2376-170-0x0000000005050000-0x0000000005062000-memory.dmp

    Filesize

    72KB

  • memory/2376-172-0x0000000005050000-0x0000000005062000-memory.dmp

    Filesize

    72KB

  • memory/2376-174-0x0000000005050000-0x0000000005062000-memory.dmp

    Filesize

    72KB

  • memory/2376-151-0x0000000005050000-0x0000000005062000-memory.dmp

    Filesize

    72KB

  • memory/2376-178-0x0000000005050000-0x0000000005062000-memory.dmp

    Filesize

    72KB

  • memory/2376-179-0x0000000004A90000-0x0000000004AA0000-memory.dmp

    Filesize

    64KB

  • memory/2376-180-0x0000000004A90000-0x0000000004AA0000-memory.dmp

    Filesize

    64KB

  • memory/2376-181-0x0000000004A90000-0x0000000004AA0000-memory.dmp

    Filesize

    64KB

  • memory/2376-148-0x0000000005050000-0x0000000005062000-memory.dmp

    Filesize

    72KB

  • memory/2376-147-0x0000000004AA0000-0x0000000005044000-memory.dmp

    Filesize

    5.6MB

  • memory/4080-186-0x0000000000BF0000-0x0000000000C18000-memory.dmp

    Filesize

    160KB

  • memory/4080-187-0x0000000007EC0000-0x00000000084D8000-memory.dmp

    Filesize

    6.1MB

  • memory/4080-188-0x0000000007920000-0x0000000007932000-memory.dmp

    Filesize

    72KB

  • memory/4080-189-0x0000000007A50000-0x0000000007B5A000-memory.dmp

    Filesize

    1.0MB

  • memory/4080-191-0x0000000007980000-0x00000000079BC000-memory.dmp

    Filesize

    240KB

  • memory/4080-190-0x0000000007CD0000-0x0000000007CE0000-memory.dmp

    Filesize

    64KB

  • memory/4080-192-0x0000000007CD0000-0x0000000007CE0000-memory.dmp

    Filesize

    64KB