Analysis

  • max time kernel
    151s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 21:51

General

  • Target

    4f7670aa1fd00b54572185e6b900a710af7b7eea7e2ec2198cadc0b87c112aa2.exe

  • Size

    1.2MB

  • MD5

    94a0bdd076d07a95d8cbe616ddfc4d9f

  • SHA1

    c558eb8d29d5a70cbeada7a2fe24983a33020ef3

  • SHA256

    4f7670aa1fd00b54572185e6b900a710af7b7eea7e2ec2198cadc0b87c112aa2

  • SHA512

    7ede6e107172e19bdd48437ac460fad809c970435439fb98a597677726cdf744c743f5a919534588fc1d37fd93c8cd371c745b0fe35fe60a763abdf1d05a04a0

  • SSDEEP

    24576:hy2ByZcE5sNSeUMDK3P+kHGoMi4neMze9Hr9r4MyXa9fulZvv2CuQ:UKG15sEeFm/7HGtnI9L3huzv2p

Malware Config

Extracted

Family

redline

Botnet

lisa

C2

185.161.248.73:4164

Attributes
  • auth_value

    c2dc311db9820012377b054447d37949

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 5 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4f7670aa1fd00b54572185e6b900a710af7b7eea7e2ec2198cadc0b87c112aa2.exe
    "C:\Users\Admin\AppData\Local\Temp\4f7670aa1fd00b54572185e6b900a710af7b7eea7e2ec2198cadc0b87c112aa2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:860
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z93380882.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z93380882.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1356
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z82302301.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z82302301.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2272
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z47624718.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z47624718.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:448
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s41434207.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s41434207.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1580
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t69353951.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t69353951.exe
            5⤵
            • Executes dropped EXE
            PID:2376

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z93380882.exe

          Filesize

          958KB

          MD5

          988d67b6dceca1792056de6cf02d68d1

          SHA1

          a1629da6e3c8cf6c436aeec55d59ddff24ae58c0

          SHA256

          3c9016b3a6282977bd4bad2e8607c3dedf1a65c2231d244882c9b94e708f678a

          SHA512

          90ffa2a52250b0db95289da04b304b7f467a7b0a15e89cf956e5edfac275832117831bf6104612cee35aad4c22719006c06e94e2f932c523f5a824b56ea4c8e5

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z93380882.exe

          Filesize

          958KB

          MD5

          988d67b6dceca1792056de6cf02d68d1

          SHA1

          a1629da6e3c8cf6c436aeec55d59ddff24ae58c0

          SHA256

          3c9016b3a6282977bd4bad2e8607c3dedf1a65c2231d244882c9b94e708f678a

          SHA512

          90ffa2a52250b0db95289da04b304b7f467a7b0a15e89cf956e5edfac275832117831bf6104612cee35aad4c22719006c06e94e2f932c523f5a824b56ea4c8e5

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z82302301.exe

          Filesize

          775KB

          MD5

          d2bb50d60a1bae1642451a6eecb1b480

          SHA1

          c94c54a75223b3b64b70aa6307d2d56b6be14a8e

          SHA256

          86f52ee81d9afeee3f0a0793b7609f4c282ac44265a6cffadb07457b0381cfeb

          SHA512

          2bf40d3d2389720895d5ca094745976a08e9d9593794c281eb5a0a22dadcd37685d957f914a907a15fb76046ca3626ac0e545b7c83e56d342e9bfd58796a1718

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z82302301.exe

          Filesize

          775KB

          MD5

          d2bb50d60a1bae1642451a6eecb1b480

          SHA1

          c94c54a75223b3b64b70aa6307d2d56b6be14a8e

          SHA256

          86f52ee81d9afeee3f0a0793b7609f4c282ac44265a6cffadb07457b0381cfeb

          SHA512

          2bf40d3d2389720895d5ca094745976a08e9d9593794c281eb5a0a22dadcd37685d957f914a907a15fb76046ca3626ac0e545b7c83e56d342e9bfd58796a1718

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z47624718.exe

          Filesize

          310KB

          MD5

          93a45a6bd3ff7cd27cbe126cef4c181a

          SHA1

          07e57b974f35ad99d808ec38c7f50cfa4f60d416

          SHA256

          f6403e7352cf1bb9d5e5fad15467d529f7f520ce30b1230776e1bd3ca24ddb85

          SHA512

          eba851d562f565b9b87ebcf8b72b152d69be78871885818c7f54141c42c4d37a1f7061710803be9600918d887b9af90279917824c54ff47dcea4f2f83e3a62f4

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z47624718.exe

          Filesize

          310KB

          MD5

          93a45a6bd3ff7cd27cbe126cef4c181a

          SHA1

          07e57b974f35ad99d808ec38c7f50cfa4f60d416

          SHA256

          f6403e7352cf1bb9d5e5fad15467d529f7f520ce30b1230776e1bd3ca24ddb85

          SHA512

          eba851d562f565b9b87ebcf8b72b152d69be78871885818c7f54141c42c4d37a1f7061710803be9600918d887b9af90279917824c54ff47dcea4f2f83e3a62f4

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s41434207.exe

          Filesize

          177KB

          MD5

          9b675da1b2f5cca050a0f0cc347ef174

          SHA1

          036d510726e242a0438833cef94567530e5ee86f

          SHA256

          94663a4913d28e901a795a2c3d35f52bbd2543c2e8f3eabd6c2ecc90d1547c91

          SHA512

          9b6eb5d18fccc3d66e6cbbf22b0d73c796f64d0587841e85e4984d17b5b8e106f39b58b84b72fbc9c1c1480efc596d8b74b22bf2f6f79af82af80a3ab45cef59

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s41434207.exe

          Filesize

          177KB

          MD5

          9b675da1b2f5cca050a0f0cc347ef174

          SHA1

          036d510726e242a0438833cef94567530e5ee86f

          SHA256

          94663a4913d28e901a795a2c3d35f52bbd2543c2e8f3eabd6c2ecc90d1547c91

          SHA512

          9b6eb5d18fccc3d66e6cbbf22b0d73c796f64d0587841e85e4984d17b5b8e106f39b58b84b72fbc9c1c1480efc596d8b74b22bf2f6f79af82af80a3ab45cef59

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t69353951.exe

          Filesize

          168KB

          MD5

          106ff54e574d7e0d303b77724d1bcacd

          SHA1

          954e788ba88062a176338a9be2736d0324383270

          SHA256

          48be919dd21d075852054eed8ef7cf59b6ecfb090660873bed83ec9766f71869

          SHA512

          8e4ce46fc607e421219133b404a3c7e2e99ed676d9490178d5a2e7cfb28583b5a8ccacb8c62f9c2185f810fdffe0aa82e9888e33a84e8be508ffd37cf668a680

        • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t69353951.exe

          Filesize

          168KB

          MD5

          106ff54e574d7e0d303b77724d1bcacd

          SHA1

          954e788ba88062a176338a9be2736d0324383270

          SHA256

          48be919dd21d075852054eed8ef7cf59b6ecfb090660873bed83ec9766f71869

          SHA512

          8e4ce46fc607e421219133b404a3c7e2e99ed676d9490178d5a2e7cfb28583b5a8ccacb8c62f9c2185f810fdffe0aa82e9888e33a84e8be508ffd37cf668a680

        • memory/1580-176-0x0000000005070000-0x0000000005083000-memory.dmp

          Filesize

          76KB

        • memory/1580-186-0x0000000005070000-0x0000000005083000-memory.dmp

          Filesize

          76KB

        • memory/1580-165-0x0000000005070000-0x0000000005083000-memory.dmp

          Filesize

          76KB

        • memory/1580-166-0x0000000005070000-0x0000000005083000-memory.dmp

          Filesize

          76KB

        • memory/1580-168-0x0000000005070000-0x0000000005083000-memory.dmp

          Filesize

          76KB

        • memory/1580-170-0x0000000005070000-0x0000000005083000-memory.dmp

          Filesize

          76KB

        • memory/1580-172-0x0000000005070000-0x0000000005083000-memory.dmp

          Filesize

          76KB

        • memory/1580-174-0x0000000005070000-0x0000000005083000-memory.dmp

          Filesize

          76KB

        • memory/1580-163-0x0000000002130000-0x0000000002140000-memory.dmp

          Filesize

          64KB

        • memory/1580-178-0x0000000005070000-0x0000000005083000-memory.dmp

          Filesize

          76KB

        • memory/1580-180-0x0000000005070000-0x0000000005083000-memory.dmp

          Filesize

          76KB

        • memory/1580-182-0x0000000005070000-0x0000000005083000-memory.dmp

          Filesize

          76KB

        • memory/1580-184-0x0000000005070000-0x0000000005083000-memory.dmp

          Filesize

          76KB

        • memory/1580-164-0x0000000002130000-0x0000000002140000-memory.dmp

          Filesize

          64KB

        • memory/1580-188-0x0000000005070000-0x0000000005083000-memory.dmp

          Filesize

          76KB

        • memory/1580-190-0x0000000005070000-0x0000000005083000-memory.dmp

          Filesize

          76KB

        • memory/1580-192-0x0000000005070000-0x0000000005083000-memory.dmp

          Filesize

          76KB

        • memory/1580-193-0x0000000002130000-0x0000000002140000-memory.dmp

          Filesize

          64KB

        • memory/1580-194-0x0000000002130000-0x0000000002140000-memory.dmp

          Filesize

          64KB

        • memory/1580-162-0x0000000004A80000-0x0000000005024000-memory.dmp

          Filesize

          5.6MB

        • memory/1580-161-0x0000000002130000-0x0000000002140000-memory.dmp

          Filesize

          64KB

        • memory/2376-199-0x00000000000D0000-0x0000000000100000-memory.dmp

          Filesize

          192KB

        • memory/2376-200-0x000000000A4D0000-0x000000000AAE8000-memory.dmp

          Filesize

          6.1MB

        • memory/2376-201-0x000000000A050000-0x000000000A15A000-memory.dmp

          Filesize

          1.0MB

        • memory/2376-202-0x0000000009F80000-0x0000000009F92000-memory.dmp

          Filesize

          72KB

        • memory/2376-203-0x0000000009FE0000-0x000000000A01C000-memory.dmp

          Filesize

          240KB

        • memory/2376-204-0x0000000004920000-0x0000000004930000-memory.dmp

          Filesize

          64KB

        • memory/2376-205-0x0000000004920000-0x0000000004930000-memory.dmp

          Filesize

          64KB