Analysis

  • max time kernel
    149s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 20:12

General

  • Target

    02a95b4835016a5f0cb57e1429569bfa.exe

  • Size

    747KB

  • MD5

    02a95b4835016a5f0cb57e1429569bfa

  • SHA1

    a6cc2171275faafa07b71ed1f05d69e459de4ec2

  • SHA256

    8e1fde8738b3f83e7e01465a26d198229055664810dcc2342ed53771d6898b9f

  • SHA512

    02237be0baf5d7428d727ac208d5bbcdda2e7647dc59326486c495f719cf82ccca5c62a3187438b2c952bc13396296b819345a0fcae6a3ced2855f11acb275a3

  • SSDEEP

    12288:vy90AYpyJiVwF2vW1Gutmz6bGJM1NcU7NYpuDED2Rbe4wVTa4DF:vyAyN2vGbmwATU7NK0ocbeZVmS

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02a95b4835016a5f0cb57e1429569bfa.exe
    "C:\Users\Admin\AppData\Local\Temp\02a95b4835016a5f0cb57e1429569bfa.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1080
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un875134.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un875134.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1280
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\94988869.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\94988869.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3872
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk088677.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk088677.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:2344

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un875134.exe

          Filesize

          593KB

          MD5

          bcadaab56887edc3b504f754c470a9f5

          SHA1

          89c7fc90796c51fd93431ca7fd717d8647dce196

          SHA256

          c699568d9c14b5741b9b2b7f3fb949757d548647eae0dc82fa8c766a655fc26d

          SHA512

          9e30024de0e419d3589544efa40c680d2d65e7acf3476fa5ea28ce9986dc42a0260f0a61436badaaebab6a505c0e7be9295ecac54cba78bec828d6dec50f09ef

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un875134.exe

          Filesize

          593KB

          MD5

          bcadaab56887edc3b504f754c470a9f5

          SHA1

          89c7fc90796c51fd93431ca7fd717d8647dce196

          SHA256

          c699568d9c14b5741b9b2b7f3fb949757d548647eae0dc82fa8c766a655fc26d

          SHA512

          9e30024de0e419d3589544efa40c680d2d65e7acf3476fa5ea28ce9986dc42a0260f0a61436badaaebab6a505c0e7be9295ecac54cba78bec828d6dec50f09ef

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\94988869.exe

          Filesize

          377KB

          MD5

          dd629787aa53b50aaecf9c60673df001

          SHA1

          cd707ffdd60442422e0f156c91982efa1c5e6bfa

          SHA256

          770196f67910e5a1b2cbb1c666f67801714e41d14cfead27933bde2033faee56

          SHA512

          e129e9197828f9c91df75c9a042c8b82d9231f4c43e1363c0e2d3a0cafbe27de4faba7fbf5e1da31a91bc68beda956a84ec426910732bcab065012baa5abe91f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\94988869.exe

          Filesize

          377KB

          MD5

          dd629787aa53b50aaecf9c60673df001

          SHA1

          cd707ffdd60442422e0f156c91982efa1c5e6bfa

          SHA256

          770196f67910e5a1b2cbb1c666f67801714e41d14cfead27933bde2033faee56

          SHA512

          e129e9197828f9c91df75c9a042c8b82d9231f4c43e1363c0e2d3a0cafbe27de4faba7fbf5e1da31a91bc68beda956a84ec426910732bcab065012baa5abe91f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk088677.exe

          Filesize

          459KB

          MD5

          7dbc69b825d5f6410689926e5ec28a18

          SHA1

          71648a55f9d03112f83ba267c32b1cc430859b25

          SHA256

          6acab6957ebb088ad5ba74495cbb795c5fc44c5bc015d04dd8199d41bde5f173

          SHA512

          011566ffd0fe574d3405bb56bf605a8e6e4d2918ca5be4ffbb0e2592e56cd596e6e73cc0925b3326378f469bb7d0e97c36dc4ed6ac30071d63a83db8dda96f74

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk088677.exe

          Filesize

          459KB

          MD5

          7dbc69b825d5f6410689926e5ec28a18

          SHA1

          71648a55f9d03112f83ba267c32b1cc430859b25

          SHA256

          6acab6957ebb088ad5ba74495cbb795c5fc44c5bc015d04dd8199d41bde5f173

          SHA512

          011566ffd0fe574d3405bb56bf605a8e6e4d2918ca5be4ffbb0e2592e56cd596e6e73cc0925b3326378f469bb7d0e97c36dc4ed6ac30071d63a83db8dda96f74

        • memory/2344-218-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/2344-404-0x0000000000900000-0x0000000000946000-memory.dmp

          Filesize

          280KB

        • memory/2344-996-0x0000000005000000-0x0000000005010000-memory.dmp

          Filesize

          64KB

        • memory/2344-995-0x0000000005000000-0x0000000005010000-memory.dmp

          Filesize

          64KB

        • memory/2344-994-0x00000000080B0000-0x00000000080EC000-memory.dmp

          Filesize

          240KB

        • memory/2344-992-0x0000000005000000-0x0000000005010000-memory.dmp

          Filesize

          64KB

        • memory/2344-991-0x0000000007F90000-0x000000000809A000-memory.dmp

          Filesize

          1.0MB

        • memory/2344-194-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/2344-989-0x0000000007940000-0x0000000007F58000-memory.dmp

          Filesize

          6.1MB

        • memory/2344-196-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/2344-409-0x0000000005000000-0x0000000005010000-memory.dmp

          Filesize

          64KB

        • memory/2344-405-0x0000000005000000-0x0000000005010000-memory.dmp

          Filesize

          64KB

        • memory/2344-407-0x0000000005000000-0x0000000005010000-memory.dmp

          Filesize

          64KB

        • memory/2344-198-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/2344-193-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/2344-224-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/2344-222-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/2344-220-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/2344-216-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/2344-214-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/2344-212-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/2344-210-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/2344-208-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/2344-206-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/2344-204-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/2344-202-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/2344-200-0x0000000002970000-0x00000000029A5000-memory.dmp

          Filesize

          212KB

        • memory/2344-990-0x0000000007F70000-0x0000000007F82000-memory.dmp

          Filesize

          72KB

        • memory/3872-172-0x0000000005330000-0x0000000005342000-memory.dmp

          Filesize

          72KB

        • memory/3872-162-0x0000000005330000-0x0000000005342000-memory.dmp

          Filesize

          72KB

        • memory/3872-151-0x0000000000930000-0x000000000095D000-memory.dmp

          Filesize

          180KB

        • memory/3872-149-0x0000000004D30000-0x0000000004D40000-memory.dmp

          Filesize

          64KB

        • memory/3872-150-0x0000000000400000-0x0000000000803000-memory.dmp

          Filesize

          4.0MB

        • memory/3872-188-0x0000000000400000-0x0000000000803000-memory.dmp

          Filesize

          4.0MB

        • memory/3872-186-0x0000000004D30000-0x0000000004D40000-memory.dmp

          Filesize

          64KB

        • memory/3872-185-0x0000000004D30000-0x0000000004D40000-memory.dmp

          Filesize

          64KB

        • memory/3872-183-0x0000000004D30000-0x0000000004D40000-memory.dmp

          Filesize

          64KB

        • memory/3872-182-0x0000000005330000-0x0000000005342000-memory.dmp

          Filesize

          72KB

        • memory/3872-180-0x0000000005330000-0x0000000005342000-memory.dmp

          Filesize

          72KB

        • memory/3872-148-0x0000000000930000-0x000000000095D000-memory.dmp

          Filesize

          180KB

        • memory/3872-178-0x0000000005330000-0x0000000005342000-memory.dmp

          Filesize

          72KB

        • memory/3872-176-0x0000000005330000-0x0000000005342000-memory.dmp

          Filesize

          72KB

        • memory/3872-174-0x0000000005330000-0x0000000005342000-memory.dmp

          Filesize

          72KB

        • memory/3872-170-0x0000000005330000-0x0000000005342000-memory.dmp

          Filesize

          72KB

        • memory/3872-168-0x0000000005330000-0x0000000005342000-memory.dmp

          Filesize

          72KB

        • memory/3872-166-0x0000000005330000-0x0000000005342000-memory.dmp

          Filesize

          72KB

        • memory/3872-164-0x0000000005330000-0x0000000005342000-memory.dmp

          Filesize

          72KB

        • memory/3872-160-0x0000000005330000-0x0000000005342000-memory.dmp

          Filesize

          72KB

        • memory/3872-158-0x0000000005330000-0x0000000005342000-memory.dmp

          Filesize

          72KB

        • memory/3872-155-0x0000000005330000-0x0000000005342000-memory.dmp

          Filesize

          72KB

        • memory/3872-156-0x0000000005330000-0x0000000005342000-memory.dmp

          Filesize

          72KB

        • memory/3872-154-0x0000000004D40000-0x00000000052E4000-memory.dmp

          Filesize

          5.6MB

        • memory/3872-153-0x0000000004D30000-0x0000000004D40000-memory.dmp

          Filesize

          64KB

        • memory/3872-152-0x0000000004D30000-0x0000000004D40000-memory.dmp

          Filesize

          64KB