Analysis

  • max time kernel
    188s
  • max time network
    192s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 21:48

General

  • Target

    4da11aceb3c22460e9eff2a5047cf101ac2571633fb5243426f7f86e6a32cbee.exe

  • Size

    563KB

  • MD5

    2f877ed8bad79a84e0e0787ad36d04df

  • SHA1

    c14ae1944d0559ddb7183eb890c051eb08d6910d

  • SHA256

    4da11aceb3c22460e9eff2a5047cf101ac2571633fb5243426f7f86e6a32cbee

  • SHA512

    c29e0c426f5722e7419abfbaf16c3c5c792d2ee4d0c3511bde0ec70c99e5583ffde5994e626302f2d3ae1e149c947aa573a693d61baebfc7412dfffaaeeae844

  • SSDEEP

    12288:ty90OlkqWBIBVsxE1E9o9wiR5pSXBQ8pX3q2sy:tyvjWusO1LwAPh8pX3z9

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4da11aceb3c22460e9eff2a5047cf101ac2571633fb5243426f7f86e6a32cbee.exe
    "C:\Users\Admin\AppData\Local\Temp\4da11aceb3c22460e9eff2a5047cf101ac2571633fb5243426f7f86e6a32cbee.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3572
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st683303.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st683303.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3640
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\09571225.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\09571225.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2312
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp874925.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp874925.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:208

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st683303.exe

    Filesize

    409KB

    MD5

    29050559266711a75a662eb7c9542134

    SHA1

    1aa89065b10e9cc52f49012864afc5386109e705

    SHA256

    8a493bc131cbb6d99fa280df973339125f99c532c759736ae826e95c1db35e93

    SHA512

    bbe66666d331a473398dd3748f7fea06ec5a381cbf4de9aafdce9a736a5f8997fd3f72b6cb1d8cd03530671ee809b371ea24ac81487785043e45eade0a8202b0

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st683303.exe

    Filesize

    409KB

    MD5

    29050559266711a75a662eb7c9542134

    SHA1

    1aa89065b10e9cc52f49012864afc5386109e705

    SHA256

    8a493bc131cbb6d99fa280df973339125f99c532c759736ae826e95c1db35e93

    SHA512

    bbe66666d331a473398dd3748f7fea06ec5a381cbf4de9aafdce9a736a5f8997fd3f72b6cb1d8cd03530671ee809b371ea24ac81487785043e45eade0a8202b0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\09571225.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\09571225.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp874925.exe

    Filesize

    353KB

    MD5

    bca4ad35ce17633e5dc77685c068ecb3

    SHA1

    e4f295cf2b8147f12ca85cc0d12080093e0477fb

    SHA256

    e29b7e453fb1062f3dd8116e84c2c7cc41d6b652c569dc5ba0523eddcf455d7b

    SHA512

    fa00e327915cd5395a0a63709926699f5d90cf3f27e763d3238ff1e75bdcce9068b3b0a386a8b9a7cbe1a7e71ce7ce1d4b89b44ba75693b126ea1e63e1f74553

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp874925.exe

    Filesize

    353KB

    MD5

    bca4ad35ce17633e5dc77685c068ecb3

    SHA1

    e4f295cf2b8147f12ca85cc0d12080093e0477fb

    SHA256

    e29b7e453fb1062f3dd8116e84c2c7cc41d6b652c569dc5ba0523eddcf455d7b

    SHA512

    fa00e327915cd5395a0a63709926699f5d90cf3f27e763d3238ff1e75bdcce9068b3b0a386a8b9a7cbe1a7e71ce7ce1d4b89b44ba75693b126ea1e63e1f74553

  • memory/208-153-0x0000000002BC0000-0x0000000002C06000-memory.dmp

    Filesize

    280KB

  • memory/208-154-0x0000000000400000-0x0000000002BB3000-memory.dmp

    Filesize

    39.7MB

  • memory/208-155-0x0000000007310000-0x0000000007320000-memory.dmp

    Filesize

    64KB

  • memory/208-156-0x0000000007310000-0x0000000007320000-memory.dmp

    Filesize

    64KB

  • memory/208-157-0x0000000007310000-0x0000000007320000-memory.dmp

    Filesize

    64KB

  • memory/208-158-0x0000000007320000-0x00000000078C4000-memory.dmp

    Filesize

    5.6MB

  • memory/208-160-0x0000000007310000-0x0000000007320000-memory.dmp

    Filesize

    64KB

  • memory/208-161-0x0000000007310000-0x0000000007320000-memory.dmp

    Filesize

    64KB

  • memory/208-162-0x0000000007310000-0x0000000007320000-memory.dmp

    Filesize

    64KB

  • memory/208-163-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/208-164-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/208-166-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/208-168-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/208-170-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/208-172-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/208-174-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/208-176-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/208-178-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/208-180-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/208-182-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/208-184-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/208-186-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/208-188-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/208-190-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/208-192-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/208-194-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/208-196-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/208-198-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/208-200-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/208-202-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/208-204-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/208-206-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/208-208-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/208-210-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/208-212-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/208-216-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/208-220-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/208-218-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/208-224-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/208-222-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/208-214-0x0000000007180000-0x00000000071B5000-memory.dmp

    Filesize

    212KB

  • memory/208-956-0x0000000009C50000-0x000000000A268000-memory.dmp

    Filesize

    6.1MB

  • memory/208-957-0x000000000A590000-0x000000000A5A2000-memory.dmp

    Filesize

    72KB

  • memory/208-959-0x000000000A5B0000-0x000000000A6BA000-memory.dmp

    Filesize

    1.0MB

  • memory/208-960-0x0000000007310000-0x0000000007320000-memory.dmp

    Filesize

    64KB

  • memory/208-961-0x000000000A6D0000-0x000000000A70C000-memory.dmp

    Filesize

    240KB

  • memory/208-963-0x0000000007310000-0x0000000007320000-memory.dmp

    Filesize

    64KB

  • memory/2312-147-0x0000000000280000-0x000000000028A000-memory.dmp

    Filesize

    40KB