Analysis

  • max time kernel
    153s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 20:25

General

  • Target

    0b83073508a39544984653c8717b40850ffb532ed8ec59168a0c96cc5edcdd20.exe

  • Size

    491KB

  • MD5

    597b4b838319f027f20f025559f30e5d

  • SHA1

    a3078083ef1910a13e16de1bed9c871834c948dc

  • SHA256

    0b83073508a39544984653c8717b40850ffb532ed8ec59168a0c96cc5edcdd20

  • SHA512

    c95bc7599c4c222a55c4d93f6df9fc375836bdbe27c294729e2898e577032a0340dc90c83af87a74d5720709f5ca0c241cfe3e37812145ff5eb1b195090cfbe4

  • SSDEEP

    12288:tMruy90eGuEz/wm1tv1qbVz0/fRDgTEL7:3ydLEHtwJzD+

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b83073508a39544984653c8717b40850ffb532ed8ec59168a0c96cc5edcdd20.exe
    "C:\Users\Admin\AppData\Local\Temp\0b83073508a39544984653c8717b40850ffb532ed8ec59168a0c96cc5edcdd20.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8705940.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8705940.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5092
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o0994209.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o0994209.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:632
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6639824.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6639824.exe
        3⤵
        • Executes dropped EXE
        PID:1736

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8705940.exe

          Filesize

          308KB

          MD5

          7d2d138358c84fb5587578e21074e416

          SHA1

          ce1abe8c72b49bc2ec28687f4a44e570b1974087

          SHA256

          9d0c772b915eda42df185843a6d6c2751c4a39324b7f875ba57ea5b84fe77027

          SHA512

          ddac13963f15e76ae4a200b15c5051591c81122e3cd7b97e1dd26e55855e881eecdeb1c4eecf7c249d4500d16cc379e3a3e4f006ba1b7c023eb3bcd1c327050e

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8705940.exe

          Filesize

          308KB

          MD5

          7d2d138358c84fb5587578e21074e416

          SHA1

          ce1abe8c72b49bc2ec28687f4a44e570b1974087

          SHA256

          9d0c772b915eda42df185843a6d6c2751c4a39324b7f875ba57ea5b84fe77027

          SHA512

          ddac13963f15e76ae4a200b15c5051591c81122e3cd7b97e1dd26e55855e881eecdeb1c4eecf7c249d4500d16cc379e3a3e4f006ba1b7c023eb3bcd1c327050e

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o0994209.exe

          Filesize

          175KB

          MD5

          db829c8dd899785f96718cbb0a48cc1b

          SHA1

          3f1874a3a4d630284677556745ba915b6b3a155a

          SHA256

          ceb1e61c144d1494eaff1a298bd5c079ca6b3133bc17e6915b28ba08a7b58722

          SHA512

          f35b39f9e0f8ad85982ef6ed43556cfaceeeecd77eb030a5c678eafa4d1ba655789f3b91e5c5fac901473957fd3e481c407c5fde339bc3f0d4b29fcde985bde7

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o0994209.exe

          Filesize

          175KB

          MD5

          db829c8dd899785f96718cbb0a48cc1b

          SHA1

          3f1874a3a4d630284677556745ba915b6b3a155a

          SHA256

          ceb1e61c144d1494eaff1a298bd5c079ca6b3133bc17e6915b28ba08a7b58722

          SHA512

          f35b39f9e0f8ad85982ef6ed43556cfaceeeecd77eb030a5c678eafa4d1ba655789f3b91e5c5fac901473957fd3e481c407c5fde339bc3f0d4b29fcde985bde7

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6639824.exe

          Filesize

          136KB

          MD5

          16ec4c51933e98f547b6e2de67b28ea1

          SHA1

          98db49013388b4eba2341a917d3c97070ed4c72a

          SHA256

          b513886896aa7a82b4de8d5f15e80c5b3b543a121d951f617c4fb5d7eb9c3478

          SHA512

          5a138cdd167a8b7f2923c777e434bf5a44f9c35aba136d8f1e345d4d88edc3b6cdfb9ac4bc772d8165f02f953d90295a965f3902e7d8738612f88e1d025cd3f4

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6639824.exe

          Filesize

          136KB

          MD5

          16ec4c51933e98f547b6e2de67b28ea1

          SHA1

          98db49013388b4eba2341a917d3c97070ed4c72a

          SHA256

          b513886896aa7a82b4de8d5f15e80c5b3b543a121d951f617c4fb5d7eb9c3478

          SHA512

          5a138cdd167a8b7f2923c777e434bf5a44f9c35aba136d8f1e345d4d88edc3b6cdfb9ac4bc772d8165f02f953d90295a965f3902e7d8738612f88e1d025cd3f4

        • memory/632-166-0x0000000002500000-0x0000000002512000-memory.dmp

          Filesize

          72KB

        • memory/632-176-0x0000000002500000-0x0000000002512000-memory.dmp

          Filesize

          72KB

        • memory/632-151-0x0000000002500000-0x0000000002512000-memory.dmp

          Filesize

          72KB

        • memory/632-152-0x0000000002500000-0x0000000002512000-memory.dmp

          Filesize

          72KB

        • memory/632-154-0x0000000002500000-0x0000000002512000-memory.dmp

          Filesize

          72KB

        • memory/632-156-0x0000000002500000-0x0000000002512000-memory.dmp

          Filesize

          72KB

        • memory/632-158-0x0000000002500000-0x0000000002512000-memory.dmp

          Filesize

          72KB

        • memory/632-160-0x0000000002500000-0x0000000002512000-memory.dmp

          Filesize

          72KB

        • memory/632-162-0x0000000002500000-0x0000000002512000-memory.dmp

          Filesize

          72KB

        • memory/632-164-0x0000000002500000-0x0000000002512000-memory.dmp

          Filesize

          72KB

        • memory/632-149-0x0000000004A90000-0x0000000004AA0000-memory.dmp

          Filesize

          64KB

        • memory/632-168-0x0000000002500000-0x0000000002512000-memory.dmp

          Filesize

          72KB

        • memory/632-170-0x0000000002500000-0x0000000002512000-memory.dmp

          Filesize

          72KB

        • memory/632-172-0x0000000002500000-0x0000000002512000-memory.dmp

          Filesize

          72KB

        • memory/632-174-0x0000000002500000-0x0000000002512000-memory.dmp

          Filesize

          72KB

        • memory/632-150-0x0000000004A90000-0x0000000004AA0000-memory.dmp

          Filesize

          64KB

        • memory/632-178-0x0000000002500000-0x0000000002512000-memory.dmp

          Filesize

          72KB

        • memory/632-179-0x0000000004A90000-0x0000000004AA0000-memory.dmp

          Filesize

          64KB

        • memory/632-180-0x0000000004A90000-0x0000000004AA0000-memory.dmp

          Filesize

          64KB

        • memory/632-181-0x0000000004A90000-0x0000000004AA0000-memory.dmp

          Filesize

          64KB

        • memory/632-148-0x0000000004A90000-0x0000000004AA0000-memory.dmp

          Filesize

          64KB

        • memory/632-147-0x0000000004AA0000-0x0000000005044000-memory.dmp

          Filesize

          5.6MB

        • memory/1736-186-0x0000000000450000-0x0000000000478000-memory.dmp

          Filesize

          160KB

        • memory/1736-187-0x00000000076F0000-0x0000000007D08000-memory.dmp

          Filesize

          6.1MB

        • memory/1736-188-0x0000000007180000-0x0000000007192000-memory.dmp

          Filesize

          72KB

        • memory/1736-189-0x00000000072B0000-0x00000000073BA000-memory.dmp

          Filesize

          1.0MB

        • memory/1736-190-0x00000000071F0000-0x0000000007200000-memory.dmp

          Filesize

          64KB

        • memory/1736-191-0x0000000007200000-0x000000000723C000-memory.dmp

          Filesize

          240KB

        • memory/1736-192-0x00000000071F0000-0x0000000007200000-memory.dmp

          Filesize

          64KB