Analysis

  • max time kernel
    201s
  • max time network
    208s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-05-2023 22:31

General

  • Target

    72609d7db9b41b0c1eb29b131f6e693be189e103a03157ab530ac845e37a20f7.exe

  • Size

    611KB

  • MD5

    204e166c754dda250602c6dbc17180de

  • SHA1

    d073c88b97313982dd7b050b4068517e5db8a067

  • SHA256

    72609d7db9b41b0c1eb29b131f6e693be189e103a03157ab530ac845e37a20f7

  • SHA512

    3739476a8e4ab80f57f38f4f9a35a900bc026b19037e625fc9befafe2373b66ac6f7b3e9afe32dda465aef0d87f012306ed6f8482b7fb59645d6a090a79ffef6

  • SSDEEP

    12288:qy90MSMFAM8KvPs3Gld0aFHEVmxKqgSRUIiWhOJLwX:qy1SMnPPUWwmxfR9icOJMX

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\72609d7db9b41b0c1eb29b131f6e693be189e103a03157ab530ac845e37a20f7.exe
    "C:\Users\Admin\AppData\Local\Temp\72609d7db9b41b0c1eb29b131f6e693be189e103a03157ab530ac845e37a20f7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4412
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st138067.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st138067.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4296
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\35691995.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\35691995.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2556
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp897525.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp897525.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2224

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st138067.exe

    Filesize

    457KB

    MD5

    ca08a3d0bc37bc7aabb9f96a3e25e4c8

    SHA1

    7562d38468422c862b4744d779230104c13cc1c7

    SHA256

    5ecf3e238a013a214665cbe2153f0e59927dbbe1669e6b5e8646c5f5bc60f74d

    SHA512

    2a60f011a3fc5488a8683f33c9037f6008cadef7bdf1ec6a00be37b950da6dfeedc73b39f73fede7eec17716ce5767736b7288c2837f9762dddf0d2ebe20fc60

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st138067.exe

    Filesize

    457KB

    MD5

    ca08a3d0bc37bc7aabb9f96a3e25e4c8

    SHA1

    7562d38468422c862b4744d779230104c13cc1c7

    SHA256

    5ecf3e238a013a214665cbe2153f0e59927dbbe1669e6b5e8646c5f5bc60f74d

    SHA512

    2a60f011a3fc5488a8683f33c9037f6008cadef7bdf1ec6a00be37b950da6dfeedc73b39f73fede7eec17716ce5767736b7288c2837f9762dddf0d2ebe20fc60

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\35691995.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\35691995.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp897525.exe

    Filesize

    459KB

    MD5

    4774971f914ff8114cc38c1ca194a880

    SHA1

    fbbc320551e223858391fbd007b195b0e5a7caa1

    SHA256

    fb3459d9e23b133dfb14673440a0eade25e1eb51d65089503ae68e2f6b80d25f

    SHA512

    7b7b76316b22ca0933757f0cad71987e9bd9de4bd1fa3741159ac49a62a60a67ff68a14fe69ac546dc53ef533783b0ba1c4f8e6ee61bd1207e19b63b29891622

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp897525.exe

    Filesize

    459KB

    MD5

    4774971f914ff8114cc38c1ca194a880

    SHA1

    fbbc320551e223858391fbd007b195b0e5a7caa1

    SHA256

    fb3459d9e23b133dfb14673440a0eade25e1eb51d65089503ae68e2f6b80d25f

    SHA512

    7b7b76316b22ca0933757f0cad71987e9bd9de4bd1fa3741159ac49a62a60a67ff68a14fe69ac546dc53ef533783b0ba1c4f8e6ee61bd1207e19b63b29891622

  • memory/2224-154-0x0000000000820000-0x0000000000866000-memory.dmp

    Filesize

    280KB

  • memory/2224-155-0x0000000002880000-0x0000000002890000-memory.dmp

    Filesize

    64KB

  • memory/2224-156-0x0000000002880000-0x0000000002890000-memory.dmp

    Filesize

    64KB

  • memory/2224-157-0x0000000002880000-0x0000000002890000-memory.dmp

    Filesize

    64KB

  • memory/2224-158-0x0000000004DA0000-0x0000000005344000-memory.dmp

    Filesize

    5.6MB

  • memory/2224-159-0x0000000005390000-0x00000000053C5000-memory.dmp

    Filesize

    212KB

  • memory/2224-160-0x0000000005390000-0x00000000053C5000-memory.dmp

    Filesize

    212KB

  • memory/2224-162-0x0000000005390000-0x00000000053C5000-memory.dmp

    Filesize

    212KB

  • memory/2224-164-0x0000000005390000-0x00000000053C5000-memory.dmp

    Filesize

    212KB

  • memory/2224-166-0x0000000005390000-0x00000000053C5000-memory.dmp

    Filesize

    212KB

  • memory/2224-168-0x0000000005390000-0x00000000053C5000-memory.dmp

    Filesize

    212KB

  • memory/2224-170-0x0000000005390000-0x00000000053C5000-memory.dmp

    Filesize

    212KB

  • memory/2224-172-0x0000000005390000-0x00000000053C5000-memory.dmp

    Filesize

    212KB

  • memory/2224-174-0x0000000005390000-0x00000000053C5000-memory.dmp

    Filesize

    212KB

  • memory/2224-176-0x0000000005390000-0x00000000053C5000-memory.dmp

    Filesize

    212KB

  • memory/2224-178-0x0000000005390000-0x00000000053C5000-memory.dmp

    Filesize

    212KB

  • memory/2224-180-0x0000000005390000-0x00000000053C5000-memory.dmp

    Filesize

    212KB

  • memory/2224-182-0x0000000005390000-0x00000000053C5000-memory.dmp

    Filesize

    212KB

  • memory/2224-184-0x0000000005390000-0x00000000053C5000-memory.dmp

    Filesize

    212KB

  • memory/2224-186-0x0000000005390000-0x00000000053C5000-memory.dmp

    Filesize

    212KB

  • memory/2224-188-0x0000000005390000-0x00000000053C5000-memory.dmp

    Filesize

    212KB

  • memory/2224-190-0x0000000005390000-0x00000000053C5000-memory.dmp

    Filesize

    212KB

  • memory/2224-192-0x0000000005390000-0x00000000053C5000-memory.dmp

    Filesize

    212KB

  • memory/2224-194-0x0000000005390000-0x00000000053C5000-memory.dmp

    Filesize

    212KB

  • memory/2224-196-0x0000000005390000-0x00000000053C5000-memory.dmp

    Filesize

    212KB

  • memory/2224-198-0x0000000005390000-0x00000000053C5000-memory.dmp

    Filesize

    212KB

  • memory/2224-200-0x0000000005390000-0x00000000053C5000-memory.dmp

    Filesize

    212KB

  • memory/2224-202-0x0000000005390000-0x00000000053C5000-memory.dmp

    Filesize

    212KB

  • memory/2224-204-0x0000000005390000-0x00000000053C5000-memory.dmp

    Filesize

    212KB

  • memory/2224-206-0x0000000005390000-0x00000000053C5000-memory.dmp

    Filesize

    212KB

  • memory/2224-208-0x0000000005390000-0x00000000053C5000-memory.dmp

    Filesize

    212KB

  • memory/2224-210-0x0000000005390000-0x00000000053C5000-memory.dmp

    Filesize

    212KB

  • memory/2224-212-0x0000000005390000-0x00000000053C5000-memory.dmp

    Filesize

    212KB

  • memory/2224-214-0x0000000005390000-0x00000000053C5000-memory.dmp

    Filesize

    212KB

  • memory/2224-216-0x0000000005390000-0x00000000053C5000-memory.dmp

    Filesize

    212KB

  • memory/2224-218-0x0000000005390000-0x00000000053C5000-memory.dmp

    Filesize

    212KB

  • memory/2224-220-0x0000000005390000-0x00000000053C5000-memory.dmp

    Filesize

    212KB

  • memory/2224-222-0x0000000005390000-0x00000000053C5000-memory.dmp

    Filesize

    212KB

  • memory/2224-951-0x00000000078B0000-0x0000000007EC8000-memory.dmp

    Filesize

    6.1MB

  • memory/2224-952-0x0000000007F70000-0x0000000007F82000-memory.dmp

    Filesize

    72KB

  • memory/2224-953-0x0000000007F90000-0x000000000809A000-memory.dmp

    Filesize

    1.0MB

  • memory/2224-954-0x00000000080B0000-0x00000000080EC000-memory.dmp

    Filesize

    240KB

  • memory/2224-955-0x0000000002880000-0x0000000002890000-memory.dmp

    Filesize

    64KB

  • memory/2224-957-0x0000000000820000-0x0000000000866000-memory.dmp

    Filesize

    280KB

  • memory/2224-958-0x0000000002880000-0x0000000002890000-memory.dmp

    Filesize

    64KB

  • memory/2224-959-0x0000000002880000-0x0000000002890000-memory.dmp

    Filesize

    64KB

  • memory/2556-148-0x0000000000DE0000-0x0000000000DEA000-memory.dmp

    Filesize

    40KB