Analysis

  • max time kernel
    155s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-05-2023 21:40

General

  • Target

    46c5f9212c02daee60a01060d8646165f7c37f11537f2c7922c0a0dd1d6727d8.exe

  • Size

    563KB

  • MD5

    f2f2496cc0286c2f7bf95c7a9e040599

  • SHA1

    90814cb1dae6027a62979a6d6e4d2e41e14baa3f

  • SHA256

    46c5f9212c02daee60a01060d8646165f7c37f11537f2c7922c0a0dd1d6727d8

  • SHA512

    60f349ba20ef96f880eb89cb37413a6ec77f8078d3aaa4a8ef9411bfff8a8d0d13537dd0fe9cabd8764611a1363a09f1bb76cf98423809e8edfb07a367d45e57

  • SSDEEP

    12288:Zy906kYcDIyUUxTXnnoCmIV70kGtGrF4c:ZyRkYML3oCbu7+ec

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\46c5f9212c02daee60a01060d8646165f7c37f11537f2c7922c0a0dd1d6727d8.exe
    "C:\Users\Admin\AppData\Local\Temp\46c5f9212c02daee60a01060d8646165f7c37f11537f2c7922c0a0dd1d6727d8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5080
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st498827.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st498827.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4804
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\49022654.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\49022654.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3560
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp506673.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp506673.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1300

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st498827.exe

    Filesize

    408KB

    MD5

    7fdf0bbfda5ed60df03cf77f3af48a3e

    SHA1

    82ebebfdc7305b357546a2e63848450c062c2660

    SHA256

    5f99b97f9c60692e409606158688b2cae9080ba79291fb6643f4261b617faf02

    SHA512

    9f7f4dc3c160f584321b0e5fd5e8759dace86e02da0801760395cf91ba1943b405e81a7d9db8d888a1f6615ecbcabcbe5f064683041d31966de701c12ac8b042

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st498827.exe

    Filesize

    408KB

    MD5

    7fdf0bbfda5ed60df03cf77f3af48a3e

    SHA1

    82ebebfdc7305b357546a2e63848450c062c2660

    SHA256

    5f99b97f9c60692e409606158688b2cae9080ba79291fb6643f4261b617faf02

    SHA512

    9f7f4dc3c160f584321b0e5fd5e8759dace86e02da0801760395cf91ba1943b405e81a7d9db8d888a1f6615ecbcabcbe5f064683041d31966de701c12ac8b042

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\49022654.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\49022654.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp506673.exe

    Filesize

    360KB

    MD5

    bf7373331240b6952e90e0c1fc732678

    SHA1

    268159218cf10995bea2e231304fd479910be07e

    SHA256

    0dbc1a0f08196656270469cefcc1ecea15b40a07cdce579bfee3b35b9391f7f2

    SHA512

    e96c25860718b57ccb341b76ff30137926262926f15512406f9552bfd900accc4b6c3f97afec7fccbccfa59174a65681c6e8309aa5c5098799ead1121cd0aca3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp506673.exe

    Filesize

    360KB

    MD5

    bf7373331240b6952e90e0c1fc732678

    SHA1

    268159218cf10995bea2e231304fd479910be07e

    SHA256

    0dbc1a0f08196656270469cefcc1ecea15b40a07cdce579bfee3b35b9391f7f2

    SHA512

    e96c25860718b57ccb341b76ff30137926262926f15512406f9552bfd900accc4b6c3f97afec7fccbccfa59174a65681c6e8309aa5c5098799ead1121cd0aca3

  • memory/1300-153-0x0000000007390000-0x0000000007934000-memory.dmp

    Filesize

    5.6MB

  • memory/1300-154-0x0000000002E10000-0x0000000002E56000-memory.dmp

    Filesize

    280KB

  • memory/1300-155-0x0000000007380000-0x0000000007390000-memory.dmp

    Filesize

    64KB

  • memory/1300-156-0x0000000007380000-0x0000000007390000-memory.dmp

    Filesize

    64KB

  • memory/1300-157-0x0000000007190000-0x00000000071C5000-memory.dmp

    Filesize

    212KB

  • memory/1300-158-0x0000000007190000-0x00000000071C5000-memory.dmp

    Filesize

    212KB

  • memory/1300-160-0x0000000007190000-0x00000000071C5000-memory.dmp

    Filesize

    212KB

  • memory/1300-162-0x0000000007190000-0x00000000071C5000-memory.dmp

    Filesize

    212KB

  • memory/1300-164-0x0000000007190000-0x00000000071C5000-memory.dmp

    Filesize

    212KB

  • memory/1300-166-0x0000000007190000-0x00000000071C5000-memory.dmp

    Filesize

    212KB

  • memory/1300-168-0x0000000007190000-0x00000000071C5000-memory.dmp

    Filesize

    212KB

  • memory/1300-170-0x0000000007190000-0x00000000071C5000-memory.dmp

    Filesize

    212KB

  • memory/1300-172-0x0000000007190000-0x00000000071C5000-memory.dmp

    Filesize

    212KB

  • memory/1300-174-0x0000000007190000-0x00000000071C5000-memory.dmp

    Filesize

    212KB

  • memory/1300-176-0x0000000007190000-0x00000000071C5000-memory.dmp

    Filesize

    212KB

  • memory/1300-178-0x0000000007190000-0x00000000071C5000-memory.dmp

    Filesize

    212KB

  • memory/1300-180-0x0000000007190000-0x00000000071C5000-memory.dmp

    Filesize

    212KB

  • memory/1300-182-0x0000000007190000-0x00000000071C5000-memory.dmp

    Filesize

    212KB

  • memory/1300-184-0x0000000007190000-0x00000000071C5000-memory.dmp

    Filesize

    212KB

  • memory/1300-186-0x0000000007190000-0x00000000071C5000-memory.dmp

    Filesize

    212KB

  • memory/1300-188-0x0000000007190000-0x00000000071C5000-memory.dmp

    Filesize

    212KB

  • memory/1300-190-0x0000000007190000-0x00000000071C5000-memory.dmp

    Filesize

    212KB

  • memory/1300-192-0x0000000007190000-0x00000000071C5000-memory.dmp

    Filesize

    212KB

  • memory/1300-194-0x0000000007190000-0x00000000071C5000-memory.dmp

    Filesize

    212KB

  • memory/1300-196-0x0000000007190000-0x00000000071C5000-memory.dmp

    Filesize

    212KB

  • memory/1300-198-0x0000000007190000-0x00000000071C5000-memory.dmp

    Filesize

    212KB

  • memory/1300-200-0x0000000007190000-0x00000000071C5000-memory.dmp

    Filesize

    212KB

  • memory/1300-202-0x0000000007190000-0x00000000071C5000-memory.dmp

    Filesize

    212KB

  • memory/1300-204-0x0000000007190000-0x00000000071C5000-memory.dmp

    Filesize

    212KB

  • memory/1300-206-0x0000000007190000-0x00000000071C5000-memory.dmp

    Filesize

    212KB

  • memory/1300-208-0x0000000007190000-0x00000000071C5000-memory.dmp

    Filesize

    212KB

  • memory/1300-210-0x0000000007190000-0x00000000071C5000-memory.dmp

    Filesize

    212KB

  • memory/1300-212-0x0000000007190000-0x00000000071C5000-memory.dmp

    Filesize

    212KB

  • memory/1300-214-0x0000000007190000-0x00000000071C5000-memory.dmp

    Filesize

    212KB

  • memory/1300-216-0x0000000007190000-0x00000000071C5000-memory.dmp

    Filesize

    212KB

  • memory/1300-218-0x0000000007190000-0x00000000071C5000-memory.dmp

    Filesize

    212KB

  • memory/1300-220-0x0000000007190000-0x00000000071C5000-memory.dmp

    Filesize

    212KB

  • memory/1300-949-0x0000000009CC0000-0x000000000A2D8000-memory.dmp

    Filesize

    6.1MB

  • memory/1300-950-0x000000000A320000-0x000000000A332000-memory.dmp

    Filesize

    72KB

  • memory/1300-951-0x000000000A340000-0x000000000A44A000-memory.dmp

    Filesize

    1.0MB

  • memory/1300-952-0x0000000007380000-0x0000000007390000-memory.dmp

    Filesize

    64KB

  • memory/1300-954-0x0000000007380000-0x0000000007390000-memory.dmp

    Filesize

    64KB

  • memory/1300-955-0x0000000007380000-0x0000000007390000-memory.dmp

    Filesize

    64KB

  • memory/1300-956-0x0000000007380000-0x0000000007390000-memory.dmp

    Filesize

    64KB

  • memory/1300-957-0x000000000A460000-0x000000000A49C000-memory.dmp

    Filesize

    240KB

  • memory/1300-958-0x0000000007380000-0x0000000007390000-memory.dmp

    Filesize

    64KB

  • memory/3560-147-0x0000000000C90000-0x0000000000C9A000-memory.dmp

    Filesize

    40KB