Analysis

  • max time kernel
    162s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-05-2023 21:10

General

  • Target

    2ec094aeca5937179eec1109d2812a04496c099ff93bc40dd2def1e42c23584d.exe

  • Size

    479KB

  • MD5

    dee8b6a9f99bdf28422241cb30b8357d

  • SHA1

    754309ac37afcefe91caf5c89b6514bd79077b30

  • SHA256

    2ec094aeca5937179eec1109d2812a04496c099ff93bc40dd2def1e42c23584d

  • SHA512

    c7f7d9e5cfecf18a5cc880e38a40e7492ead02983be8b20fa3282d9524f71266c559c12c3c926f70140b779b94cc36dc116855be568a50c7922a2799747e5f27

  • SSDEEP

    12288:5MrHy90w7fudhar668T5MkLYQbtQHQ8Ipmb:iyDbF5GXtQGpe

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ec094aeca5937179eec1109d2812a04496c099ff93bc40dd2def1e42c23584d.exe
    "C:\Users\Admin\AppData\Local\Temp\2ec094aeca5937179eec1109d2812a04496c099ff93bc40dd2def1e42c23584d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:684
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4222001.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4222001.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1084
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7989297.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7989297.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2120
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1976792.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1976792.exe
        3⤵
        • Executes dropped EXE
        PID:2500

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4222001.exe

    Filesize

    307KB

    MD5

    25b0602e64cc84c548ba4c27b89462da

    SHA1

    beb50d19284a5b31034585ea04616f4063868d7b

    SHA256

    3a0a9b1632235b610d6bfdaf6938430c79110a54435bb8a5ec1ff46c44af2aec

    SHA512

    fc8bf775441617a34672187b643b56dd1f6ecac5e620b124a4b68e3a051be304fbc459ecc63da46b9513f488b766b1453cf83d904d0b4eb15218a2b3f38aa37b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4222001.exe

    Filesize

    307KB

    MD5

    25b0602e64cc84c548ba4c27b89462da

    SHA1

    beb50d19284a5b31034585ea04616f4063868d7b

    SHA256

    3a0a9b1632235b610d6bfdaf6938430c79110a54435bb8a5ec1ff46c44af2aec

    SHA512

    fc8bf775441617a34672187b643b56dd1f6ecac5e620b124a4b68e3a051be304fbc459ecc63da46b9513f488b766b1453cf83d904d0b4eb15218a2b3f38aa37b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7989297.exe

    Filesize

    175KB

    MD5

    fda920f5cd1710449bb17f0e59949de0

    SHA1

    5f35959e05af960abaa26c684bf2444b17a5eb2c

    SHA256

    ad69096d600237c6d92916b6872433a7273be7551cc7afff8b25eece300c8dff

    SHA512

    a5db2e7db5336045b1c24d142c4fe0962d5495fc32083a17b75d7576766285bc0dc670d850d714c5634c095aa962887e64ec0e5a09c7936838aa04cd95a6b1d3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7989297.exe

    Filesize

    175KB

    MD5

    fda920f5cd1710449bb17f0e59949de0

    SHA1

    5f35959e05af960abaa26c684bf2444b17a5eb2c

    SHA256

    ad69096d600237c6d92916b6872433a7273be7551cc7afff8b25eece300c8dff

    SHA512

    a5db2e7db5336045b1c24d142c4fe0962d5495fc32083a17b75d7576766285bc0dc670d850d714c5634c095aa962887e64ec0e5a09c7936838aa04cd95a6b1d3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1976792.exe

    Filesize

    136KB

    MD5

    2c8f22138c22578c91191d470b1a9b59

    SHA1

    a895010432b20340c085ad7a760741b73e0aefa4

    SHA256

    b0cf78b0c171fcc200face4d80fcaca53455892654b6e122b04f3c586a0d6f0b

    SHA512

    478bb86c35af5ea5d190f569561a8eeadeec9d09ef93ce73a4cf198d7c48c21f06ae7962def4a47b1c16e728434596bd2292aaeebd22e552a2db4140b76e5aad

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1976792.exe

    Filesize

    136KB

    MD5

    2c8f22138c22578c91191d470b1a9b59

    SHA1

    a895010432b20340c085ad7a760741b73e0aefa4

    SHA256

    b0cf78b0c171fcc200face4d80fcaca53455892654b6e122b04f3c586a0d6f0b

    SHA512

    478bb86c35af5ea5d190f569561a8eeadeec9d09ef93ce73a4cf198d7c48c21f06ae7962def4a47b1c16e728434596bd2292aaeebd22e552a2db4140b76e5aad

  • memory/2120-168-0x0000000002610000-0x0000000002622000-memory.dmp

    Filesize

    72KB

  • memory/2120-177-0x0000000002600000-0x0000000002610000-memory.dmp

    Filesize

    64KB

  • memory/2120-152-0x0000000002610000-0x0000000002622000-memory.dmp

    Filesize

    72KB

  • memory/2120-154-0x0000000002610000-0x0000000002622000-memory.dmp

    Filesize

    72KB

  • memory/2120-156-0x0000000002610000-0x0000000002622000-memory.dmp

    Filesize

    72KB

  • memory/2120-158-0x0000000002610000-0x0000000002622000-memory.dmp

    Filesize

    72KB

  • memory/2120-160-0x0000000002610000-0x0000000002622000-memory.dmp

    Filesize

    72KB

  • memory/2120-162-0x0000000002610000-0x0000000002622000-memory.dmp

    Filesize

    72KB

  • memory/2120-164-0x0000000002610000-0x0000000002622000-memory.dmp

    Filesize

    72KB

  • memory/2120-166-0x0000000002610000-0x0000000002622000-memory.dmp

    Filesize

    72KB

  • memory/2120-150-0x0000000002610000-0x0000000002622000-memory.dmp

    Filesize

    72KB

  • memory/2120-170-0x0000000002610000-0x0000000002622000-memory.dmp

    Filesize

    72KB

  • memory/2120-172-0x0000000002610000-0x0000000002622000-memory.dmp

    Filesize

    72KB

  • memory/2120-174-0x0000000002610000-0x0000000002622000-memory.dmp

    Filesize

    72KB

  • memory/2120-176-0x0000000002610000-0x0000000002622000-memory.dmp

    Filesize

    72KB

  • memory/2120-149-0x0000000002610000-0x0000000002622000-memory.dmp

    Filesize

    72KB

  • memory/2120-178-0x0000000002600000-0x0000000002610000-memory.dmp

    Filesize

    64KB

  • memory/2120-179-0x0000000002600000-0x0000000002610000-memory.dmp

    Filesize

    64KB

  • memory/2120-180-0x0000000002600000-0x0000000002610000-memory.dmp

    Filesize

    64KB

  • memory/2120-181-0x0000000002600000-0x0000000002610000-memory.dmp

    Filesize

    64KB

  • memory/2120-148-0x00000000049A0000-0x0000000004F44000-memory.dmp

    Filesize

    5.6MB

  • memory/2120-147-0x0000000002600000-0x0000000002610000-memory.dmp

    Filesize

    64KB

  • memory/2500-186-0x00000000005F0000-0x0000000000618000-memory.dmp

    Filesize

    160KB

  • memory/2500-187-0x0000000007880000-0x0000000007E98000-memory.dmp

    Filesize

    6.1MB

  • memory/2500-188-0x0000000007320000-0x0000000007332000-memory.dmp

    Filesize

    72KB

  • memory/2500-189-0x0000000007450000-0x000000000755A000-memory.dmp

    Filesize

    1.0MB

  • memory/2500-190-0x00000000073A0000-0x00000000073DC000-memory.dmp

    Filesize

    240KB

  • memory/2500-191-0x0000000007390000-0x00000000073A0000-memory.dmp

    Filesize

    64KB

  • memory/2500-192-0x0000000007390000-0x00000000073A0000-memory.dmp

    Filesize

    64KB