Analysis

  • max time kernel
    153s
  • max time network
    181s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-05-2023 22:28

General

  • Target

    6fbec7f117b792d37196d140ec801d0da997aca7776f555bcc9f72bb7f90677b.exe

  • Size

    674KB

  • MD5

    f0db961e5964d66acff85a2a83fb2305

  • SHA1

    3e2d99147e9153bdd18670839d897e9aedd633ca

  • SHA256

    6fbec7f117b792d37196d140ec801d0da997aca7776f555bcc9f72bb7f90677b

  • SHA512

    00afc8a319fb75975d57f678da3c33858c9ad936b36d0723cae3e3eeed33cffe44cdcc4d0a2487a50035c4de378b5c18ca329d3c25b1c7a9fadc4fe4631bd143

  • SSDEEP

    12288:Dy905boP0avqFRh1DP4eehNE2gcvhIcvUriomkvwDozsvJHWMZoY+hU:DymoPdvQJDP/ehNE2gcvq4Wv9wAsvJH/

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6fbec7f117b792d37196d140ec801d0da997aca7776f555bcc9f72bb7f90677b.exe
    "C:\Users\Admin\AppData\Local\Temp\6fbec7f117b792d37196d140ec801d0da997aca7776f555bcc9f72bb7f90677b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1456
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st874250.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st874250.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3132
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\33913897.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\33913897.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2976
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp804953.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp804953.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:220

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st874250.exe

    Filesize

    520KB

    MD5

    b9653abfdc77729f81a3fae32ff431a6

    SHA1

    6bf2e0e4e40cab121e4c4eb8947dca50f4759466

    SHA256

    06b7115a3710e17f0d2108347a2d99a671b055f11e718a7f91e9ec95fcf6ae3c

    SHA512

    5625d78dc300d820a3fa9fee172ed65d869f2f7c09205aecde1f2e7d470fd4c281da7e29ad86296f748f04152c148a1057f7c0db2328596fcdac422291702ffc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st874250.exe

    Filesize

    520KB

    MD5

    b9653abfdc77729f81a3fae32ff431a6

    SHA1

    6bf2e0e4e40cab121e4c4eb8947dca50f4759466

    SHA256

    06b7115a3710e17f0d2108347a2d99a671b055f11e718a7f91e9ec95fcf6ae3c

    SHA512

    5625d78dc300d820a3fa9fee172ed65d869f2f7c09205aecde1f2e7d470fd4c281da7e29ad86296f748f04152c148a1057f7c0db2328596fcdac422291702ffc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\33913897.exe

    Filesize

    175KB

    MD5

    589e3c1408637af1404797442d75e828

    SHA1

    ee6c5a572e6c7f547e6075e22eb56ae1f34d3f98

    SHA256

    e4e5c922fc14096d64d8ff600d9669c83e5938a61ac78b582874a4087dfd9b84

    SHA512

    2b0c31973768dd8d446b8fea5aee7cf85e66c1256dd515f26799284a9ea33aafeae3e9850ef79ae4106f2244279cc9ac3a5d3d7d78e03e7982d0e3e3a87f3d04

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\33913897.exe

    Filesize

    175KB

    MD5

    589e3c1408637af1404797442d75e828

    SHA1

    ee6c5a572e6c7f547e6075e22eb56ae1f34d3f98

    SHA256

    e4e5c922fc14096d64d8ff600d9669c83e5938a61ac78b582874a4087dfd9b84

    SHA512

    2b0c31973768dd8d446b8fea5aee7cf85e66c1256dd515f26799284a9ea33aafeae3e9850ef79ae4106f2244279cc9ac3a5d3d7d78e03e7982d0e3e3a87f3d04

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp804953.exe

    Filesize

    415KB

    MD5

    82f478920dd5dfd994243645f80f6105

    SHA1

    1fa84909fa4b41b0ad4abb22cb303123d7b9a2b2

    SHA256

    c6f23a17ec0a2346e611c5eab9a60b8461d4b441e3159f1538fcec7d90c8f6f0

    SHA512

    dd32d533b8ec8e13b2a8cda95944890b88e1cd1ed636e51322cd55ecbe96abf314046792f41cc813fea881422034e14fcd7445cc14bf009d725d6466e9fc2a3a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp804953.exe

    Filesize

    415KB

    MD5

    82f478920dd5dfd994243645f80f6105

    SHA1

    1fa84909fa4b41b0ad4abb22cb303123d7b9a2b2

    SHA256

    c6f23a17ec0a2346e611c5eab9a60b8461d4b441e3159f1538fcec7d90c8f6f0

    SHA512

    dd32d533b8ec8e13b2a8cda95944890b88e1cd1ed636e51322cd55ecbe96abf314046792f41cc813fea881422034e14fcd7445cc14bf009d725d6466e9fc2a3a

  • memory/220-213-0x00000000024F0000-0x0000000002525000-memory.dmp

    Filesize

    212KB

  • memory/220-221-0x00000000024F0000-0x0000000002525000-memory.dmp

    Filesize

    212KB

  • memory/220-995-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

    Filesize

    64KB

  • memory/220-993-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

    Filesize

    64KB

  • memory/220-195-0x00000000024F0000-0x0000000002525000-memory.dmp

    Filesize

    212KB

  • memory/220-990-0x0000000007C00000-0x0000000007D0A000-memory.dmp

    Filesize

    1.0MB

  • memory/220-988-0x0000000004C70000-0x0000000004C82000-memory.dmp

    Filesize

    72KB

  • memory/220-197-0x00000000024F0000-0x0000000002525000-memory.dmp

    Filesize

    212KB

  • memory/220-986-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

    Filesize

    64KB

  • memory/220-984-0x0000000001FD0000-0x0000000002016000-memory.dmp

    Filesize

    280KB

  • memory/220-477-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

    Filesize

    64KB

  • memory/220-475-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

    Filesize

    64KB

  • memory/220-473-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

    Filesize

    64KB

  • memory/220-223-0x00000000024F0000-0x0000000002525000-memory.dmp

    Filesize

    212KB

  • memory/220-217-0x00000000024F0000-0x0000000002525000-memory.dmp

    Filesize

    212KB

  • memory/220-219-0x00000000024F0000-0x0000000002525000-memory.dmp

    Filesize

    212KB

  • memory/220-215-0x00000000024F0000-0x0000000002525000-memory.dmp

    Filesize

    212KB

  • memory/220-211-0x00000000024F0000-0x0000000002525000-memory.dmp

    Filesize

    212KB

  • memory/220-209-0x00000000024F0000-0x0000000002525000-memory.dmp

    Filesize

    212KB

  • memory/220-207-0x00000000024F0000-0x0000000002525000-memory.dmp

    Filesize

    212KB

  • memory/220-205-0x00000000024F0000-0x0000000002525000-memory.dmp

    Filesize

    212KB

  • memory/220-203-0x00000000024F0000-0x0000000002525000-memory.dmp

    Filesize

    212KB

  • memory/220-187-0x0000000001FD0000-0x0000000002016000-memory.dmp

    Filesize

    280KB

  • memory/220-188-0x00000000024F0000-0x0000000002525000-memory.dmp

    Filesize

    212KB

  • memory/220-193-0x00000000024F0000-0x0000000002525000-memory.dmp

    Filesize

    212KB

  • memory/220-191-0x00000000024F0000-0x0000000002525000-memory.dmp

    Filesize

    212KB

  • memory/220-189-0x00000000024F0000-0x0000000002525000-memory.dmp

    Filesize

    212KB

  • memory/220-992-0x0000000007F90000-0x0000000007FCC000-memory.dmp

    Filesize

    240KB

  • memory/220-987-0x00000000075E0000-0x0000000007BF8000-memory.dmp

    Filesize

    6.1MB

  • memory/220-199-0x00000000024F0000-0x0000000002525000-memory.dmp

    Filesize

    212KB

  • memory/220-201-0x00000000024F0000-0x0000000002525000-memory.dmp

    Filesize

    212KB

  • memory/2976-151-0x0000000002640000-0x0000000002653000-memory.dmp

    Filesize

    76KB

  • memory/2976-181-0x00000000025B0000-0x00000000025C0000-memory.dmp

    Filesize

    64KB

  • memory/2976-178-0x0000000002640000-0x0000000002653000-memory.dmp

    Filesize

    76KB

  • memory/2976-180-0x00000000025B0000-0x00000000025C0000-memory.dmp

    Filesize

    64KB

  • memory/2976-179-0x00000000025B0000-0x00000000025C0000-memory.dmp

    Filesize

    64KB

  • memory/2976-147-0x0000000004BB0000-0x0000000005154000-memory.dmp

    Filesize

    5.6MB

  • memory/2976-174-0x0000000002640000-0x0000000002653000-memory.dmp

    Filesize

    76KB

  • memory/2976-176-0x0000000002640000-0x0000000002653000-memory.dmp

    Filesize

    76KB

  • memory/2976-168-0x0000000002640000-0x0000000002653000-memory.dmp

    Filesize

    76KB

  • memory/2976-150-0x00000000025B0000-0x00000000025C0000-memory.dmp

    Filesize

    64KB

  • memory/2976-172-0x0000000002640000-0x0000000002653000-memory.dmp

    Filesize

    76KB

  • memory/2976-149-0x00000000025B0000-0x00000000025C0000-memory.dmp

    Filesize

    64KB

  • memory/2976-170-0x0000000002640000-0x0000000002653000-memory.dmp

    Filesize

    76KB

  • memory/2976-166-0x0000000002640000-0x0000000002653000-memory.dmp

    Filesize

    76KB

  • memory/2976-164-0x0000000002640000-0x0000000002653000-memory.dmp

    Filesize

    76KB

  • memory/2976-162-0x0000000002640000-0x0000000002653000-memory.dmp

    Filesize

    76KB

  • memory/2976-160-0x0000000002640000-0x0000000002653000-memory.dmp

    Filesize

    76KB

  • memory/2976-158-0x0000000002640000-0x0000000002653000-memory.dmp

    Filesize

    76KB

  • memory/2976-156-0x0000000002640000-0x0000000002653000-memory.dmp

    Filesize

    76KB

  • memory/2976-154-0x0000000002640000-0x0000000002653000-memory.dmp

    Filesize

    76KB

  • memory/2976-152-0x0000000002640000-0x0000000002653000-memory.dmp

    Filesize

    76KB

  • memory/2976-148-0x00000000025B0000-0x00000000025C0000-memory.dmp

    Filesize

    64KB