Analysis

  • max time kernel
    156s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 21:55

General

  • Target

    524efa1755ea4a0943a65c9ab219615a42ddcd98db30881cc711f43141a1f637.exe

  • Size

    563KB

  • MD5

    0df69b84cf491c9dd1ad5fa1252359e8

  • SHA1

    907666573a5c8cde25bf66bd63069474f8adf2de

  • SHA256

    524efa1755ea4a0943a65c9ab219615a42ddcd98db30881cc711f43141a1f637

  • SHA512

    d9573e5a080b6956b12bd2570466a2b483e12a775339ce33efdf754feeb2d3e7415b0b88bff5aae72dd6c4e37137e6e1bb83620a8724f96badf3038ccfe57de9

  • SSDEEP

    12288:0y90gokXwihVMxruS0ojPI27kwVkgTl1j9t:0yBYiIBnjAPwagZ1jD

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\524efa1755ea4a0943a65c9ab219615a42ddcd98db30881cc711f43141a1f637.exe
    "C:\Users\Admin\AppData\Local\Temp\524efa1755ea4a0943a65c9ab219615a42ddcd98db30881cc711f43141a1f637.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4376
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st146648.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st146648.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4504
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\52094437.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\52094437.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1052
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp356710.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp356710.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1480

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st146648.exe

    Filesize

    408KB

    MD5

    668cbbf8ad14d4513c6e767ac62b0756

    SHA1

    d09d798ebd5e1e46f6cf551e3df10027a4ee357b

    SHA256

    d949b643ea0fbb66d38b2d318425d8a62cedaff6275c24930150780d6391a162

    SHA512

    4240c0fea565fcf370c27faf4ce0a3292a0a4b65c17c1eb2fa4928df25f7dc678d8bd25208768ae5fc9a221492c9a836a1487d56eead7ada0e411439d4db468e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st146648.exe

    Filesize

    408KB

    MD5

    668cbbf8ad14d4513c6e767ac62b0756

    SHA1

    d09d798ebd5e1e46f6cf551e3df10027a4ee357b

    SHA256

    d949b643ea0fbb66d38b2d318425d8a62cedaff6275c24930150780d6391a162

    SHA512

    4240c0fea565fcf370c27faf4ce0a3292a0a4b65c17c1eb2fa4928df25f7dc678d8bd25208768ae5fc9a221492c9a836a1487d56eead7ada0e411439d4db468e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\52094437.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\52094437.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp356710.exe

    Filesize

    360KB

    MD5

    a11d29f537cc6f8b1be33e9331ae6962

    SHA1

    8a3b7896cd6b506045fd030cbec8f2cc3297700c

    SHA256

    33b26f55858c227f4f015350197c953a358612e84551ba7e6b67a8bb383e986a

    SHA512

    f5bc2cc511b316ba925a5aab747de57219fc5f73a45bedd69874aca211cae20e95270233e1c8c23b0c296a9262fd88188e07edc99ef0874c4dacb8f30ad2b6bb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp356710.exe

    Filesize

    360KB

    MD5

    a11d29f537cc6f8b1be33e9331ae6962

    SHA1

    8a3b7896cd6b506045fd030cbec8f2cc3297700c

    SHA256

    33b26f55858c227f4f015350197c953a358612e84551ba7e6b67a8bb383e986a

    SHA512

    f5bc2cc511b316ba925a5aab747de57219fc5f73a45bedd69874aca211cae20e95270233e1c8c23b0c296a9262fd88188e07edc99ef0874c4dacb8f30ad2b6bb

  • memory/1052-147-0x0000000000090000-0x000000000009A000-memory.dmp

    Filesize

    40KB

  • memory/1480-154-0x00000000048E0000-0x00000000048F0000-memory.dmp

    Filesize

    64KB

  • memory/1480-153-0x0000000002CA0000-0x0000000002CE6000-memory.dmp

    Filesize

    280KB

  • memory/1480-155-0x00000000048E0000-0x00000000048F0000-memory.dmp

    Filesize

    64KB

  • memory/1480-156-0x0000000007270000-0x0000000007814000-memory.dmp

    Filesize

    5.6MB

  • memory/1480-157-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/1480-158-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/1480-160-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/1480-162-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/1480-164-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/1480-166-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/1480-168-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/1480-170-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/1480-172-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/1480-174-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/1480-176-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/1480-178-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/1480-180-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/1480-182-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/1480-184-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/1480-186-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/1480-188-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/1480-190-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/1480-192-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/1480-194-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/1480-196-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/1480-198-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/1480-200-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/1480-202-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/1480-204-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/1480-206-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/1480-208-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/1480-210-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/1480-216-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/1480-214-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/1480-218-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/1480-212-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/1480-220-0x0000000004C40000-0x0000000004C75000-memory.dmp

    Filesize

    212KB

  • memory/1480-949-0x0000000009CA0000-0x000000000A2B8000-memory.dmp

    Filesize

    6.1MB

  • memory/1480-950-0x000000000A320000-0x000000000A332000-memory.dmp

    Filesize

    72KB

  • memory/1480-951-0x000000000A340000-0x000000000A44A000-memory.dmp

    Filesize

    1.0MB

  • memory/1480-952-0x000000000A460000-0x000000000A49C000-memory.dmp

    Filesize

    240KB

  • memory/1480-953-0x00000000048E0000-0x00000000048F0000-memory.dmp

    Filesize

    64KB

  • memory/1480-955-0x00000000048E0000-0x00000000048F0000-memory.dmp

    Filesize

    64KB

  • memory/1480-956-0x00000000048E0000-0x00000000048F0000-memory.dmp

    Filesize

    64KB

  • memory/1480-957-0x00000000048E0000-0x00000000048F0000-memory.dmp

    Filesize

    64KB