Analysis

  • max time kernel
    190s
  • max time network
    198s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 21:42

General

  • Target

    485f881d0d75b13ab0c029a282b8e6a1e95885b23f9a583542c9216cad9eba6b.exe

  • Size

    1014KB

  • MD5

    f4f79566cafc95de47242858c0fc8cec

  • SHA1

    23ef970c0d01b54c4cae269991f09e6c235a74af

  • SHA256

    485f881d0d75b13ab0c029a282b8e6a1e95885b23f9a583542c9216cad9eba6b

  • SHA512

    6969e79630e59d50508df3f26ba2447a3f22af824a86f8887d0b2851061f7770723b3069af400e7368848e2a342d35f9ab7115973df3a0ea2386fb1376cfc62a

  • SSDEEP

    24576:fyIp80fg6PaCak5FvQLZrKL8QxNScqBQpmLrZLg:qb0fg+aJka1A/qBYmL

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\485f881d0d75b13ab0c029a282b8e6a1e95885b23f9a583542c9216cad9eba6b.exe
    "C:\Users\Admin\AppData\Local\Temp\485f881d0d75b13ab0c029a282b8e6a1e95885b23f9a583542c9216cad9eba6b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4476
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za987152.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za987152.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5112
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za063106.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za063106.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2184
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\05321043.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\05321043.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2120
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w92Xg31.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w92Xg31.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:3496

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za987152.exe

    Filesize

    787KB

    MD5

    ceae418f4f28b1b93016ba3b5de69005

    SHA1

    cf1bc82190f0f1ebe8915236d785520b6b832007

    SHA256

    607952e2255ef810fac4202013486f91508da64bedb161184f86eb6e2d5b3dc0

    SHA512

    ab3731bfe9de7d1ab1771c7970d1da6f5ded8502b5b16dddbac6b90f9e3c9eca2d8d502e7bb17faff9e9887b58c7b5d56967d164e93d1e6f6d67ea568cfafb98

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za987152.exe

    Filesize

    787KB

    MD5

    ceae418f4f28b1b93016ba3b5de69005

    SHA1

    cf1bc82190f0f1ebe8915236d785520b6b832007

    SHA256

    607952e2255ef810fac4202013486f91508da64bedb161184f86eb6e2d5b3dc0

    SHA512

    ab3731bfe9de7d1ab1771c7970d1da6f5ded8502b5b16dddbac6b90f9e3c9eca2d8d502e7bb17faff9e9887b58c7b5d56967d164e93d1e6f6d67ea568cfafb98

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za063106.exe

    Filesize

    603KB

    MD5

    ae570aa8e84f02b918b3d8ad1dad70a7

    SHA1

    4e6f7d878100358a8b714c53619333363b763fcc

    SHA256

    441a837b4e3408f59969f6a2f1ba03e5301e2d4abb6192b11fa8b3ea2d08af6e

    SHA512

    4b0526f8e861b583f7ba97f943759174904859fad8b5d20404be6e38629de02ff17664be8f8797f1da1a453dfed3b615b50b020042f2a02afd13f2d380d1a4dc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za063106.exe

    Filesize

    603KB

    MD5

    ae570aa8e84f02b918b3d8ad1dad70a7

    SHA1

    4e6f7d878100358a8b714c53619333363b763fcc

    SHA256

    441a837b4e3408f59969f6a2f1ba03e5301e2d4abb6192b11fa8b3ea2d08af6e

    SHA512

    4b0526f8e861b583f7ba97f943759174904859fad8b5d20404be6e38629de02ff17664be8f8797f1da1a453dfed3b615b50b020042f2a02afd13f2d380d1a4dc

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\05321043.exe

    Filesize

    390KB

    MD5

    ebce50193d65c46c287d3983bf301e5e

    SHA1

    069c69f8bfac65370eb1dc57f60e44d91cb5b244

    SHA256

    1d84c3f1503d67322557efbbd19d6a36de51efe10b2e4e06d2924820752dcd32

    SHA512

    0fabcb66337d030cbb871e1cc817adf90dc18b6758311b4cf76709c65f910ce14f4552116fa483d3c4307a74ee7cf7d0f600ba7589fdb81dcf663d7405a33b12

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\05321043.exe

    Filesize

    390KB

    MD5

    ebce50193d65c46c287d3983bf301e5e

    SHA1

    069c69f8bfac65370eb1dc57f60e44d91cb5b244

    SHA256

    1d84c3f1503d67322557efbbd19d6a36de51efe10b2e4e06d2924820752dcd32

    SHA512

    0fabcb66337d030cbb871e1cc817adf90dc18b6758311b4cf76709c65f910ce14f4552116fa483d3c4307a74ee7cf7d0f600ba7589fdb81dcf663d7405a33b12

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w92Xg31.exe

    Filesize

    478KB

    MD5

    0b2b5335f2b1cee5ff6485861dcbd140

    SHA1

    235c36d5855fa45f9bb08ded9865ec0fb1fcc4fc

    SHA256

    ac74a16720217d1ab3e4db2d9baf2faeb7befe2485c2ab991d41ee561a6ab950

    SHA512

    7a706e4a4340908fe628e618e3769e23be3e3a1ce8f31402542120a70e3ffa2dbdcb2fc909370e3ef74fa5a26b850b09082ce7d295a336b2740d97b1bb34be6b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w92Xg31.exe

    Filesize

    478KB

    MD5

    0b2b5335f2b1cee5ff6485861dcbd140

    SHA1

    235c36d5855fa45f9bb08ded9865ec0fb1fcc4fc

    SHA256

    ac74a16720217d1ab3e4db2d9baf2faeb7befe2485c2ab991d41ee561a6ab950

    SHA512

    7a706e4a4340908fe628e618e3769e23be3e3a1ce8f31402542120a70e3ffa2dbdcb2fc909370e3ef74fa5a26b850b09082ce7d295a336b2740d97b1bb34be6b

  • memory/2120-191-0x0000000004F10000-0x0000000004F20000-memory.dmp

    Filesize

    64KB

  • memory/2120-158-0x0000000004F10000-0x0000000004F20000-memory.dmp

    Filesize

    64KB

  • memory/2120-159-0x0000000004F10000-0x0000000004F20000-memory.dmp

    Filesize

    64KB

  • memory/2120-160-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/2120-161-0x0000000004F10000-0x0000000004F20000-memory.dmp

    Filesize

    64KB

  • memory/2120-162-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/2120-163-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/2120-165-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/2120-167-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/2120-169-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/2120-171-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/2120-173-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/2120-175-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/2120-177-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/2120-179-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/2120-181-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/2120-183-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/2120-185-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/2120-187-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/2120-189-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/2120-190-0x0000000004F10000-0x0000000004F20000-memory.dmp

    Filesize

    64KB

  • memory/2120-157-0x0000000004F20000-0x00000000054C4000-memory.dmp

    Filesize

    5.6MB

  • memory/2120-194-0x0000000000400000-0x0000000000807000-memory.dmp

    Filesize

    4.0MB

  • memory/2120-156-0x0000000004F10000-0x0000000004F20000-memory.dmp

    Filesize

    64KB

  • memory/2120-155-0x0000000002470000-0x000000000249D000-memory.dmp

    Filesize

    180KB

  • memory/3496-202-0x0000000002980000-0x00000000029B5000-memory.dmp

    Filesize

    212KB

  • memory/3496-228-0x0000000002980000-0x00000000029B5000-memory.dmp

    Filesize

    212KB

  • memory/3496-200-0x0000000002980000-0x00000000029B5000-memory.dmp

    Filesize

    212KB

  • memory/3496-204-0x0000000002980000-0x00000000029B5000-memory.dmp

    Filesize

    212KB

  • memory/3496-206-0x0000000002980000-0x00000000029B5000-memory.dmp

    Filesize

    212KB

  • memory/3496-208-0x0000000002980000-0x00000000029B5000-memory.dmp

    Filesize

    212KB

  • memory/3496-210-0x0000000002980000-0x00000000029B5000-memory.dmp

    Filesize

    212KB

  • memory/3496-212-0x0000000002980000-0x00000000029B5000-memory.dmp

    Filesize

    212KB

  • memory/3496-214-0x0000000002980000-0x00000000029B5000-memory.dmp

    Filesize

    212KB

  • memory/3496-216-0x0000000002980000-0x00000000029B5000-memory.dmp

    Filesize

    212KB

  • memory/3496-218-0x0000000002980000-0x00000000029B5000-memory.dmp

    Filesize

    212KB

  • memory/3496-220-0x0000000002980000-0x00000000029B5000-memory.dmp

    Filesize

    212KB

  • memory/3496-222-0x0000000002980000-0x00000000029B5000-memory.dmp

    Filesize

    212KB

  • memory/3496-224-0x0000000002980000-0x00000000029B5000-memory.dmp

    Filesize

    212KB

  • memory/3496-226-0x0000000002980000-0x00000000029B5000-memory.dmp

    Filesize

    212KB

  • memory/3496-199-0x0000000002980000-0x00000000029B5000-memory.dmp

    Filesize

    212KB

  • memory/3496-229-0x00000000009B0000-0x00000000009F6000-memory.dmp

    Filesize

    280KB

  • memory/3496-233-0x0000000004F20000-0x0000000004F30000-memory.dmp

    Filesize

    64KB

  • memory/3496-232-0x0000000002980000-0x00000000029B5000-memory.dmp

    Filesize

    212KB

  • memory/3496-234-0x0000000004F20000-0x0000000004F30000-memory.dmp

    Filesize

    64KB

  • memory/3496-230-0x0000000004F20000-0x0000000004F30000-memory.dmp

    Filesize

    64KB

  • memory/3496-996-0x0000000004F20000-0x0000000004F30000-memory.dmp

    Filesize

    64KB

  • memory/3496-997-0x0000000004F20000-0x0000000004F30000-memory.dmp

    Filesize

    64KB

  • memory/3496-998-0x0000000004F20000-0x0000000004F30000-memory.dmp

    Filesize

    64KB

  • memory/3496-999-0x0000000007960000-0x0000000007F78000-memory.dmp

    Filesize

    6.1MB

  • memory/3496-1000-0x0000000007F80000-0x0000000007F92000-memory.dmp

    Filesize

    72KB

  • memory/3496-1001-0x0000000007FA0000-0x00000000080AA000-memory.dmp

    Filesize

    1.0MB

  • memory/3496-1002-0x00000000080B0000-0x00000000080EC000-memory.dmp

    Filesize

    240KB

  • memory/3496-1003-0x0000000004F20000-0x0000000004F30000-memory.dmp

    Filesize

    64KB

  • memory/3496-1005-0x0000000004F20000-0x0000000004F30000-memory.dmp

    Filesize

    64KB