Analysis

  • max time kernel
    166s
  • max time network
    194s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 22:33

General

  • Target

    00a6816b344c7bf30a8e9300930df900bb32c229df33d62812c2970d204d3a57.exe

  • Size

    618KB

  • MD5

    295d5772c302628a05e9026c7bbab161

  • SHA1

    46b796a4d43e11b7e95d6ce372f4fa0c6dc6eef1

  • SHA256

    00a6816b344c7bf30a8e9300930df900bb32c229df33d62812c2970d204d3a57

  • SHA512

    a8797ba5919158203d2990bf0faad1d4fbd84329f98b9a64dde13bcfb528b608f69b878c85400e0285fcdf53f1158496b30d23c1771f4e8a675568d8277ec937

  • SSDEEP

    12288:Ay90RUkSWNTQBzeCjKjCE5EsKqTw2eP+TeWss4Du0PvGu:AykUiNTGeCrKEsKqTwbCi5uAGu

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00a6816b344c7bf30a8e9300930df900bb32c229df33d62812c2970d204d3a57.exe
    "C:\Users\Admin\AppData\Local\Temp\00a6816b344c7bf30a8e9300930df900bb32c229df33d62812c2970d204d3a57.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st930138.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st930138.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:960
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\75344210.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\75344210.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:916
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp212862.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp212862.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:4108

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st930138.exe

          Filesize

          463KB

          MD5

          6202ef004ec42e072c57cf11dfbe45cc

          SHA1

          ba31d2b4c41040109005160e751495eed4383f9d

          SHA256

          2801b04b43766c7b1584883db10174c71c7f164f35ecf34094c827e666274753

          SHA512

          67579fb3cd8d52bf28053e8ab241171f6a80895d945f2d668dde9c8b1082ce54432938b02f971226f12a527a2d4da0d24cb94628916e04c4854e903f3c869c4c

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st930138.exe

          Filesize

          463KB

          MD5

          6202ef004ec42e072c57cf11dfbe45cc

          SHA1

          ba31d2b4c41040109005160e751495eed4383f9d

          SHA256

          2801b04b43766c7b1584883db10174c71c7f164f35ecf34094c827e666274753

          SHA512

          67579fb3cd8d52bf28053e8ab241171f6a80895d945f2d668dde9c8b1082ce54432938b02f971226f12a527a2d4da0d24cb94628916e04c4854e903f3c869c4c

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\75344210.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\75344210.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp212862.exe

          Filesize

          473KB

          MD5

          f8e1b82fd7d1161c101b673733694192

          SHA1

          6501c9c6e0d635503d99e17140e522f17f2ccbdb

          SHA256

          f89bb8bb57617d9b93b534489900320a6057928c08d14c756a2ec915f68a134f

          SHA512

          c8c0ca5ffd5081734156e2ea4fed3fabbb1c3cc4efcee38d77c5b78381c6981ffb6c02000aabae5965d2ee15d1ddcc519b7e496d654e872c681be8f585f8a8f1

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp212862.exe

          Filesize

          473KB

          MD5

          f8e1b82fd7d1161c101b673733694192

          SHA1

          6501c9c6e0d635503d99e17140e522f17f2ccbdb

          SHA256

          f89bb8bb57617d9b93b534489900320a6057928c08d14c756a2ec915f68a134f

          SHA512

          c8c0ca5ffd5081734156e2ea4fed3fabbb1c3cc4efcee38d77c5b78381c6981ffb6c02000aabae5965d2ee15d1ddcc519b7e496d654e872c681be8f585f8a8f1

        • memory/916-147-0x00000000000D0000-0x00000000000DA000-memory.dmp

          Filesize

          40KB

        • memory/4108-153-0x00000000009A0000-0x00000000009E6000-memory.dmp

          Filesize

          280KB

        • memory/4108-154-0x0000000005170000-0x0000000005714000-memory.dmp

          Filesize

          5.6MB

        • memory/4108-155-0x0000000004F80000-0x0000000004FB5000-memory.dmp

          Filesize

          212KB

        • memory/4108-156-0x0000000004F80000-0x0000000004FB5000-memory.dmp

          Filesize

          212KB

        • memory/4108-158-0x0000000004F80000-0x0000000004FB5000-memory.dmp

          Filesize

          212KB

        • memory/4108-160-0x0000000004F80000-0x0000000004FB5000-memory.dmp

          Filesize

          212KB

        • memory/4108-162-0x0000000004F80000-0x0000000004FB5000-memory.dmp

          Filesize

          212KB

        • memory/4108-164-0x0000000004F80000-0x0000000004FB5000-memory.dmp

          Filesize

          212KB

        • memory/4108-166-0x0000000004F80000-0x0000000004FB5000-memory.dmp

          Filesize

          212KB

        • memory/4108-168-0x0000000004F80000-0x0000000004FB5000-memory.dmp

          Filesize

          212KB

        • memory/4108-170-0x0000000004F80000-0x0000000004FB5000-memory.dmp

          Filesize

          212KB

        • memory/4108-178-0x0000000004F80000-0x0000000004FB5000-memory.dmp

          Filesize

          212KB

        • memory/4108-176-0x0000000004F80000-0x0000000004FB5000-memory.dmp

          Filesize

          212KB

        • memory/4108-174-0x0000000004F80000-0x0000000004FB5000-memory.dmp

          Filesize

          212KB

        • memory/4108-172-0x0000000004F80000-0x0000000004FB5000-memory.dmp

          Filesize

          212KB

        • memory/4108-180-0x0000000004F80000-0x0000000004FB5000-memory.dmp

          Filesize

          212KB

        • memory/4108-182-0x0000000004F80000-0x0000000004FB5000-memory.dmp

          Filesize

          212KB

        • memory/4108-184-0x0000000004F80000-0x0000000004FB5000-memory.dmp

          Filesize

          212KB

        • memory/4108-186-0x0000000004F80000-0x0000000004FB5000-memory.dmp

          Filesize

          212KB

        • memory/4108-188-0x0000000004F80000-0x0000000004FB5000-memory.dmp

          Filesize

          212KB

        • memory/4108-190-0x0000000004F80000-0x0000000004FB5000-memory.dmp

          Filesize

          212KB

        • memory/4108-192-0x0000000004F80000-0x0000000004FB5000-memory.dmp

          Filesize

          212KB

        • memory/4108-194-0x0000000004F80000-0x0000000004FB5000-memory.dmp

          Filesize

          212KB

        • memory/4108-196-0x0000000004F80000-0x0000000004FB5000-memory.dmp

          Filesize

          212KB

        • memory/4108-198-0x0000000004F80000-0x0000000004FB5000-memory.dmp

          Filesize

          212KB

        • memory/4108-200-0x0000000004F80000-0x0000000004FB5000-memory.dmp

          Filesize

          212KB

        • memory/4108-202-0x0000000004F80000-0x0000000004FB5000-memory.dmp

          Filesize

          212KB

        • memory/4108-204-0x0000000004F80000-0x0000000004FB5000-memory.dmp

          Filesize

          212KB

        • memory/4108-206-0x0000000005160000-0x0000000005170000-memory.dmp

          Filesize

          64KB

        • memory/4108-209-0x0000000005160000-0x0000000005170000-memory.dmp

          Filesize

          64KB

        • memory/4108-207-0x0000000004F80000-0x0000000004FB5000-memory.dmp

          Filesize

          212KB

        • memory/4108-211-0x0000000005160000-0x0000000005170000-memory.dmp

          Filesize

          64KB

        • memory/4108-210-0x0000000004F80000-0x0000000004FB5000-memory.dmp

          Filesize

          212KB

        • memory/4108-213-0x0000000004F80000-0x0000000004FB5000-memory.dmp

          Filesize

          212KB

        • memory/4108-215-0x0000000004F80000-0x0000000004FB5000-memory.dmp

          Filesize

          212KB

        • memory/4108-217-0x0000000004F80000-0x0000000004FB5000-memory.dmp

          Filesize

          212KB

        • memory/4108-219-0x0000000004F80000-0x0000000004FB5000-memory.dmp

          Filesize

          212KB

        • memory/4108-221-0x0000000004F80000-0x0000000004FB5000-memory.dmp

          Filesize

          212KB

        • memory/4108-950-0x0000000007AA0000-0x00000000080B8000-memory.dmp

          Filesize

          6.1MB

        • memory/4108-951-0x00000000080C0000-0x00000000080D2000-memory.dmp

          Filesize

          72KB

        • memory/4108-952-0x00000000080E0000-0x00000000081EA000-memory.dmp

          Filesize

          1.0MB

        • memory/4108-953-0x0000000005160000-0x0000000005170000-memory.dmp

          Filesize

          64KB

        • memory/4108-954-0x00000000081F0000-0x000000000822C000-memory.dmp

          Filesize

          240KB

        • memory/4108-956-0x00000000009A0000-0x00000000009E6000-memory.dmp

          Filesize

          280KB

        • memory/4108-957-0x0000000005160000-0x0000000005170000-memory.dmp

          Filesize

          64KB

        • memory/4108-958-0x0000000005160000-0x0000000005170000-memory.dmp

          Filesize

          64KB

        • memory/4108-959-0x0000000005160000-0x0000000005170000-memory.dmp

          Filesize

          64KB

        • memory/4108-960-0x0000000005160000-0x0000000005170000-memory.dmp

          Filesize

          64KB