Analysis

  • max time kernel
    149s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/05/2023, 20:37

General

  • Target

    149ccd08547ea7712248e6bb43abf9adae70369ab7d74715ff1ee53a8684319c.exe

  • Size

    480KB

  • MD5

    fccb196b90077409fa826ef20cbacda1

  • SHA1

    efc861335a9442544f6b8b411a4c94d8f00ffb28

  • SHA256

    149ccd08547ea7712248e6bb43abf9adae70369ab7d74715ff1ee53a8684319c

  • SHA512

    9c79c1b97b9aefad38df6af9c0851042426c6be9a5b70c5bd89a8a5f88136c93a435b2383ce725e2869920690362b439beee46bc190b00077e655653422daa3e

  • SSDEEP

    12288:bMrRy90tjRxu8Wx7wgkkbJzMgBuvT1IfQBzUhM4u2hhX:6y2Dnk1zVuZIfQRUCQhX

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\149ccd08547ea7712248e6bb43abf9adae70369ab7d74715ff1ee53a8684319c.exe
    "C:\Users\Admin\AppData\Local\Temp\149ccd08547ea7712248e6bb43abf9adae70369ab7d74715ff1ee53a8684319c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1264
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7777525.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7777525.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1976
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4766856.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4766856.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:940
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0887288.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0887288.exe
        3⤵
        • Executes dropped EXE
        PID:2372

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7777525.exe

          Filesize

          308KB

          MD5

          e1a10c3333bbaf3b22b0d6cfc964b70c

          SHA1

          73a842e9cfcb81fb1d1566c2aa8add812bc5245d

          SHA256

          c5b1ca8a87a208bfa31e1ae98baa0916ea3f580f209793104c7699c835c1df77

          SHA512

          ed5aff460c065001746b61957aa35797e749508ba94bfe2b06a1b79d3bc76d7f746f8e9a685cc43e1bbc04c502a09bc15c5c7d4723225221ce4310b046af2c77

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7777525.exe

          Filesize

          308KB

          MD5

          e1a10c3333bbaf3b22b0d6cfc964b70c

          SHA1

          73a842e9cfcb81fb1d1566c2aa8add812bc5245d

          SHA256

          c5b1ca8a87a208bfa31e1ae98baa0916ea3f580f209793104c7699c835c1df77

          SHA512

          ed5aff460c065001746b61957aa35797e749508ba94bfe2b06a1b79d3bc76d7f746f8e9a685cc43e1bbc04c502a09bc15c5c7d4723225221ce4310b046af2c77

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4766856.exe

          Filesize

          175KB

          MD5

          bcc6bc6b94ec491efee242acb61dabe5

          SHA1

          3a3b6946d7004d52562d219799f4120ed043cea0

          SHA256

          0cfebf7c842d9a42ec7a53e66b23ad9077cd4a17eac07d4e78889bfece5c81fc

          SHA512

          d2b489094968cc1f81937a8ce4b0c406b3537897a3f72d544e775ba6ad0ab62c662a56714a9369ca663e8408a05bad3cc54a02d8a68fc3e153ee24f3b5741b4b

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4766856.exe

          Filesize

          175KB

          MD5

          bcc6bc6b94ec491efee242acb61dabe5

          SHA1

          3a3b6946d7004d52562d219799f4120ed043cea0

          SHA256

          0cfebf7c842d9a42ec7a53e66b23ad9077cd4a17eac07d4e78889bfece5c81fc

          SHA512

          d2b489094968cc1f81937a8ce4b0c406b3537897a3f72d544e775ba6ad0ab62c662a56714a9369ca663e8408a05bad3cc54a02d8a68fc3e153ee24f3b5741b4b

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0887288.exe

          Filesize

          136KB

          MD5

          0385b3ad30119d3a75b047a99ba6f7f8

          SHA1

          e8294992ac6b880c4a523b92bafe23d0a6e8836d

          SHA256

          16ed4ea994a26cbbeb98ce1c55511ea62db625dfa56c16725398750dce9c4025

          SHA512

          3764a3262dde5b4c4b328d2d0f3e1c08da3a7c5c411df6b5b8d97cd2b276632fb0a4e908dd1d37d81d163fc17cf1e1d4d19f01ff795f165ebab98bd382d4c971

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0887288.exe

          Filesize

          136KB

          MD5

          0385b3ad30119d3a75b047a99ba6f7f8

          SHA1

          e8294992ac6b880c4a523b92bafe23d0a6e8836d

          SHA256

          16ed4ea994a26cbbeb98ce1c55511ea62db625dfa56c16725398750dce9c4025

          SHA512

          3764a3262dde5b4c4b328d2d0f3e1c08da3a7c5c411df6b5b8d97cd2b276632fb0a4e908dd1d37d81d163fc17cf1e1d4d19f01ff795f165ebab98bd382d4c971

        • memory/940-167-0x0000000002640000-0x0000000002652000-memory.dmp

          Filesize

          72KB

        • memory/940-173-0x0000000002640000-0x0000000002652000-memory.dmp

          Filesize

          72KB

        • memory/940-151-0x0000000002640000-0x0000000002652000-memory.dmp

          Filesize

          72KB

        • memory/940-153-0x0000000002640000-0x0000000002652000-memory.dmp

          Filesize

          72KB

        • memory/940-155-0x0000000002640000-0x0000000002652000-memory.dmp

          Filesize

          72KB

        • memory/940-157-0x0000000002640000-0x0000000002652000-memory.dmp

          Filesize

          72KB

        • memory/940-159-0x0000000002640000-0x0000000002652000-memory.dmp

          Filesize

          72KB

        • memory/940-161-0x0000000002640000-0x0000000002652000-memory.dmp

          Filesize

          72KB

        • memory/940-163-0x0000000002640000-0x0000000002652000-memory.dmp

          Filesize

          72KB

        • memory/940-165-0x0000000002640000-0x0000000002652000-memory.dmp

          Filesize

          72KB

        • memory/940-149-0x0000000002670000-0x0000000002680000-memory.dmp

          Filesize

          64KB

        • memory/940-169-0x0000000002640000-0x0000000002652000-memory.dmp

          Filesize

          72KB

        • memory/940-171-0x0000000002640000-0x0000000002652000-memory.dmp

          Filesize

          72KB

        • memory/940-150-0x0000000002640000-0x0000000002652000-memory.dmp

          Filesize

          72KB

        • memory/940-175-0x0000000002640000-0x0000000002652000-memory.dmp

          Filesize

          72KB

        • memory/940-177-0x0000000002640000-0x0000000002652000-memory.dmp

          Filesize

          72KB

        • memory/940-178-0x0000000002670000-0x0000000002680000-memory.dmp

          Filesize

          64KB

        • memory/940-179-0x0000000002670000-0x0000000002680000-memory.dmp

          Filesize

          64KB

        • memory/940-180-0x0000000002670000-0x0000000002680000-memory.dmp

          Filesize

          64KB

        • memory/940-148-0x0000000002670000-0x0000000002680000-memory.dmp

          Filesize

          64KB

        • memory/940-147-0x0000000004B10000-0x00000000050B4000-memory.dmp

          Filesize

          5.6MB

        • memory/2372-185-0x0000000000280000-0x00000000002A8000-memory.dmp

          Filesize

          160KB

        • memory/2372-186-0x0000000007650000-0x0000000007C68000-memory.dmp

          Filesize

          6.1MB

        • memory/2372-187-0x00000000070F0000-0x0000000007102000-memory.dmp

          Filesize

          72KB

        • memory/2372-188-0x0000000007220000-0x000000000732A000-memory.dmp

          Filesize

          1.0MB

        • memory/2372-189-0x00000000071F0000-0x0000000007200000-memory.dmp

          Filesize

          64KB

        • memory/2372-190-0x0000000007150000-0x000000000718C000-memory.dmp

          Filesize

          240KB

        • memory/2372-191-0x00000000071F0000-0x0000000007200000-memory.dmp

          Filesize

          64KB