Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 20:16

General

  • Target

    057290692f19d9d7b3438b0a64df07f8fd00898014cb718f59832c5f034638c3.exe

  • Size

    651KB

  • MD5

    610a8f214fb76216b3990fd4fbb845fe

  • SHA1

    8ccd2ca761997fb625181a0e9f4bf2565544972d

  • SHA256

    057290692f19d9d7b3438b0a64df07f8fd00898014cb718f59832c5f034638c3

  • SHA512

    24e4c4c8ceb86c685f53294009ab2180314bed40ee41266a2fe957b61997635f1c205220ec191a97efdee2a5e0e0107e4e4a2146d07a308d4ea698e9f2941bf1

  • SSDEEP

    12288:ey90kEcu9yZZtJc4qoXR7iDPoGKnKNkpMy39EEZdL1fcy:eywcugZZtJPqoB2DPtNC3CEZ5my

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\057290692f19d9d7b3438b0a64df07f8fd00898014cb718f59832c5f034638c3.exe
    "C:\Users\Admin\AppData\Local\Temp\057290692f19d9d7b3438b0a64df07f8fd00898014cb718f59832c5f034638c3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4228
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st337363.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st337363.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3604
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\68720229.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\68720229.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3644
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp177926.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp177926.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2072

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st337363.exe

          Filesize

          497KB

          MD5

          a45c6a540b71e6e50d9ce824e014b9b5

          SHA1

          2ee7dd09f4baaff2cf586d85ea97ed71ff7be2ae

          SHA256

          e85f9afe2c58b09a4006f1e52b52a69140df83f5d438cd74709968623197b3a7

          SHA512

          d89da634a0c967ca039e430c503444406e4a2727a4bcbb058cf2fa99ff77ffcee08360e019016d3015fc42fe04c98ea44c0cba530d7721610a8e6effe0a2fff5

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st337363.exe

          Filesize

          497KB

          MD5

          a45c6a540b71e6e50d9ce824e014b9b5

          SHA1

          2ee7dd09f4baaff2cf586d85ea97ed71ff7be2ae

          SHA256

          e85f9afe2c58b09a4006f1e52b52a69140df83f5d438cd74709968623197b3a7

          SHA512

          d89da634a0c967ca039e430c503444406e4a2727a4bcbb058cf2fa99ff77ffcee08360e019016d3015fc42fe04c98ea44c0cba530d7721610a8e6effe0a2fff5

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\68720229.exe

          Filesize

          175KB

          MD5

          a165b5f6b0a4bdf808b71de57bf9347d

          SHA1

          39a7b301e819e386c162a47e046fa384bb5ab437

          SHA256

          68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

          SHA512

          3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\68720229.exe

          Filesize

          175KB

          MD5

          a165b5f6b0a4bdf808b71de57bf9347d

          SHA1

          39a7b301e819e386c162a47e046fa384bb5ab437

          SHA256

          68349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a

          SHA512

          3dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp177926.exe

          Filesize

          341KB

          MD5

          c1800cb8710bcd33cb601334e60f3a10

          SHA1

          f02f9d87a5558d1507c6ba11473c5c81fc91706f

          SHA256

          9c8cff38a89b70fe0a026d1dfd9320070b515426e281b8b9c69df7bb9f06eb52

          SHA512

          33d7c53742c88785b74a1467a6d448616cb709f444e37ff5dc77502df2508ef95e80c101bf56859be66c86b8a90f44ba6915ce594b3644797e1739d9a98b67f4

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp177926.exe

          Filesize

          341KB

          MD5

          c1800cb8710bcd33cb601334e60f3a10

          SHA1

          f02f9d87a5558d1507c6ba11473c5c81fc91706f

          SHA256

          9c8cff38a89b70fe0a026d1dfd9320070b515426e281b8b9c69df7bb9f06eb52

          SHA512

          33d7c53742c88785b74a1467a6d448616cb709f444e37ff5dc77502df2508ef95e80c101bf56859be66c86b8a90f44ba6915ce594b3644797e1739d9a98b67f4

        • memory/2072-214-0x00000000025D0000-0x0000000002605000-memory.dmp

          Filesize

          212KB

        • memory/2072-222-0x00000000025D0000-0x0000000002605000-memory.dmp

          Filesize

          212KB

        • memory/2072-990-0x0000000002460000-0x0000000002470000-memory.dmp

          Filesize

          64KB

        • memory/2072-989-0x0000000002460000-0x0000000002470000-memory.dmp

          Filesize

          64KB

        • memory/2072-988-0x0000000002460000-0x0000000002470000-memory.dmp

          Filesize

          64KB

        • memory/2072-986-0x0000000002460000-0x0000000002470000-memory.dmp

          Filesize

          64KB

        • memory/2072-985-0x0000000007D10000-0x0000000007D4C000-memory.dmp

          Filesize

          240KB

        • memory/2072-984-0x0000000007C00000-0x0000000007D0A000-memory.dmp

          Filesize

          1.0MB

        • memory/2072-983-0x0000000002820000-0x0000000002832000-memory.dmp

          Filesize

          72KB

        • memory/2072-982-0x00000000075E0000-0x0000000007BF8000-memory.dmp

          Filesize

          6.1MB

        • memory/2072-192-0x00000000025D0000-0x0000000002605000-memory.dmp

          Filesize

          212KB

        • memory/2072-331-0x0000000002460000-0x0000000002470000-memory.dmp

          Filesize

          64KB

        • memory/2072-194-0x00000000025D0000-0x0000000002605000-memory.dmp

          Filesize

          212KB

        • memory/2072-190-0x00000000025D0000-0x0000000002605000-memory.dmp

          Filesize

          212KB

        • memory/2072-329-0x0000000000600000-0x0000000000646000-memory.dmp

          Filesize

          280KB

        • memory/2072-202-0x00000000025D0000-0x0000000002605000-memory.dmp

          Filesize

          212KB

        • memory/2072-220-0x00000000025D0000-0x0000000002605000-memory.dmp

          Filesize

          212KB

        • memory/2072-218-0x00000000025D0000-0x0000000002605000-memory.dmp

          Filesize

          212KB

        • memory/2072-216-0x00000000025D0000-0x0000000002605000-memory.dmp

          Filesize

          212KB

        • memory/2072-212-0x00000000025D0000-0x0000000002605000-memory.dmp

          Filesize

          212KB

        • memory/2072-210-0x00000000025D0000-0x0000000002605000-memory.dmp

          Filesize

          212KB

        • memory/2072-208-0x00000000025D0000-0x0000000002605000-memory.dmp

          Filesize

          212KB

        • memory/2072-187-0x00000000025D0000-0x0000000002605000-memory.dmp

          Filesize

          212KB

        • memory/2072-188-0x00000000025D0000-0x0000000002605000-memory.dmp

          Filesize

          212KB

        • memory/2072-206-0x00000000025D0000-0x0000000002605000-memory.dmp

          Filesize

          212KB

        • memory/2072-333-0x0000000002460000-0x0000000002470000-memory.dmp

          Filesize

          64KB

        • memory/2072-204-0x00000000025D0000-0x0000000002605000-memory.dmp

          Filesize

          212KB

        • memory/2072-196-0x00000000025D0000-0x0000000002605000-memory.dmp

          Filesize

          212KB

        • memory/2072-198-0x00000000025D0000-0x0000000002605000-memory.dmp

          Filesize

          212KB

        • memory/2072-200-0x00000000025D0000-0x0000000002605000-memory.dmp

          Filesize

          212KB

        • memory/3644-172-0x0000000002150000-0x0000000002163000-memory.dmp

          Filesize

          76KB

        • memory/3644-170-0x0000000002150000-0x0000000002163000-memory.dmp

          Filesize

          76KB

        • memory/3644-149-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

          Filesize

          64KB

        • memory/3644-148-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

          Filesize

          64KB

        • memory/3644-150-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

          Filesize

          64KB

        • memory/3644-181-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

          Filesize

          64KB

        • memory/3644-147-0x0000000004CB0000-0x0000000005254000-memory.dmp

          Filesize

          5.6MB

        • memory/3644-180-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

          Filesize

          64KB

        • memory/3644-179-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

          Filesize

          64KB

        • memory/3644-178-0x0000000002150000-0x0000000002163000-memory.dmp

          Filesize

          76KB

        • memory/3644-176-0x0000000002150000-0x0000000002163000-memory.dmp

          Filesize

          76KB

        • memory/3644-174-0x0000000002150000-0x0000000002163000-memory.dmp

          Filesize

          76KB

        • memory/3644-168-0x0000000002150000-0x0000000002163000-memory.dmp

          Filesize

          76KB

        • memory/3644-166-0x0000000002150000-0x0000000002163000-memory.dmp

          Filesize

          76KB

        • memory/3644-164-0x0000000002150000-0x0000000002163000-memory.dmp

          Filesize

          76KB

        • memory/3644-162-0x0000000002150000-0x0000000002163000-memory.dmp

          Filesize

          76KB

        • memory/3644-160-0x0000000002150000-0x0000000002163000-memory.dmp

          Filesize

          76KB

        • memory/3644-158-0x0000000002150000-0x0000000002163000-memory.dmp

          Filesize

          76KB

        • memory/3644-156-0x0000000002150000-0x0000000002163000-memory.dmp

          Filesize

          76KB

        • memory/3644-154-0x0000000002150000-0x0000000002163000-memory.dmp

          Filesize

          76KB

        • memory/3644-152-0x0000000002150000-0x0000000002163000-memory.dmp

          Filesize

          76KB

        • memory/3644-151-0x0000000002150000-0x0000000002163000-memory.dmp

          Filesize

          76KB