Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-05-2023 21:59

General

  • Target

    555c2548f2747ea170f1739f78993faa2cb9679ab5f7506994702065c2d42750.exe

  • Size

    617KB

  • MD5

    0d137f931dec213f9689aa7653ccc356

  • SHA1

    8e8d3ed73718307e884a50219e68329792646f4a

  • SHA256

    555c2548f2747ea170f1739f78993faa2cb9679ab5f7506994702065c2d42750

  • SHA512

    65c3697fb8da53065a001bfab723ac0719c8ae71689942a566eae46e519323c72621fb13d8ee7e829073f891d8510fd2e045648cccc38bc4ed530004a8826168

  • SSDEEP

    12288:my90j6toTLidRMCV6HjjKRxdcKiWMi+W4TcJ2S4L8:myrOLiXeDj2SKOi+fa2BL8

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\555c2548f2747ea170f1739f78993faa2cb9679ab5f7506994702065c2d42750.exe
    "C:\Users\Admin\AppData\Local\Temp\555c2548f2747ea170f1739f78993faa2cb9679ab5f7506994702065c2d42750.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:636
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st190935.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st190935.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2472
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\62567553.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\62567553.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2652
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp450642.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp450642.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3904

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st190935.exe

    Filesize

    463KB

    MD5

    4d3e3ba8b6e48b367bdeb3ad0f6e87e5

    SHA1

    e45ebc6a7f7568752df2ecf0972bfc7799e4b112

    SHA256

    e21f6a133e9984ee1dbf55b2552b46e91a82723edebd18b24765af1b190b376d

    SHA512

    2beab9190cde8290d9a08287384833a266f43941dc005abf2246fe0da69c2124e0b9600a243a35b0af29434f582213fddd94abecd6b154ac524bfac893f8aa01

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st190935.exe

    Filesize

    463KB

    MD5

    4d3e3ba8b6e48b367bdeb3ad0f6e87e5

    SHA1

    e45ebc6a7f7568752df2ecf0972bfc7799e4b112

    SHA256

    e21f6a133e9984ee1dbf55b2552b46e91a82723edebd18b24765af1b190b376d

    SHA512

    2beab9190cde8290d9a08287384833a266f43941dc005abf2246fe0da69c2124e0b9600a243a35b0af29434f582213fddd94abecd6b154ac524bfac893f8aa01

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\62567553.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\62567553.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp450642.exe

    Filesize

    473KB

    MD5

    c2fd71ee6d8fc08ba2f715577b3ab478

    SHA1

    857e8daffe6a043698621593412bccce2458ebc7

    SHA256

    ada60fe7bad1ae171ad7ff9aad45a2f65b863defd30e2e2bc1e7fbd5030dd178

    SHA512

    c03c0320baa030b3750865c3e698a6c0f384bf94c77c634ff551be75df85cdac573f892f1a01f199e568fc9e0689264493869bbe02da762f24f6f2e36ab69a55

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp450642.exe

    Filesize

    473KB

    MD5

    c2fd71ee6d8fc08ba2f715577b3ab478

    SHA1

    857e8daffe6a043698621593412bccce2458ebc7

    SHA256

    ada60fe7bad1ae171ad7ff9aad45a2f65b863defd30e2e2bc1e7fbd5030dd178

    SHA512

    c03c0320baa030b3750865c3e698a6c0f384bf94c77c634ff551be75df85cdac573f892f1a01f199e568fc9e0689264493869bbe02da762f24f6f2e36ab69a55

  • memory/2652-147-0x0000000000A50000-0x0000000000A5A000-memory.dmp

    Filesize

    40KB

  • memory/3904-153-0x0000000004F20000-0x00000000054C4000-memory.dmp

    Filesize

    5.6MB

  • memory/3904-154-0x0000000000AD0000-0x0000000000B16000-memory.dmp

    Filesize

    280KB

  • memory/3904-156-0x0000000004F10000-0x0000000004F20000-memory.dmp

    Filesize

    64KB

  • memory/3904-155-0x0000000004F10000-0x0000000004F20000-memory.dmp

    Filesize

    64KB

  • memory/3904-157-0x0000000004F10000-0x0000000004F20000-memory.dmp

    Filesize

    64KB

  • memory/3904-158-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3904-159-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3904-161-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3904-163-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3904-165-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3904-167-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3904-169-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3904-171-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3904-173-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3904-175-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3904-177-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3904-179-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3904-181-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3904-183-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3904-185-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3904-187-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3904-189-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3904-191-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3904-193-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3904-195-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3904-197-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3904-199-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3904-201-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3904-203-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3904-205-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3904-207-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3904-209-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3904-211-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3904-213-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3904-215-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3904-217-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3904-219-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3904-221-0x0000000004DD0000-0x0000000004E05000-memory.dmp

    Filesize

    212KB

  • memory/3904-950-0x0000000007950000-0x0000000007F68000-memory.dmp

    Filesize

    6.1MB

  • memory/3904-951-0x0000000007F70000-0x0000000007F82000-memory.dmp

    Filesize

    72KB

  • memory/3904-952-0x0000000007F90000-0x000000000809A000-memory.dmp

    Filesize

    1.0MB

  • memory/3904-953-0x0000000004F10000-0x0000000004F20000-memory.dmp

    Filesize

    64KB

  • memory/3904-954-0x00000000080B0000-0x00000000080EC000-memory.dmp

    Filesize

    240KB

  • memory/3904-956-0x0000000004F10000-0x0000000004F20000-memory.dmp

    Filesize

    64KB

  • memory/3904-957-0x0000000004F10000-0x0000000004F20000-memory.dmp

    Filesize

    64KB

  • memory/3904-958-0x0000000004F10000-0x0000000004F20000-memory.dmp

    Filesize

    64KB

  • memory/3904-959-0x0000000004F10000-0x0000000004F20000-memory.dmp

    Filesize

    64KB