Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-05-2023 21:03

General

  • Target

    27af3faa9b75e9348cb64f222e12763155ef194b7ba10de66a0445594e1eebf3.exe

  • Size

    491KB

  • MD5

    84a2c8c45478367a9461bd236b88e561

  • SHA1

    4e752eaf0d3cd5b1a32571901f4d586802941767

  • SHA256

    27af3faa9b75e9348cb64f222e12763155ef194b7ba10de66a0445594e1eebf3

  • SHA512

    1da02b574e1afc8f3539ab3b5b13a262e3eb64adc4db7b0b2b4b1f2369cd78340a721a01ffccdf592cd39d11f0f7a71a616dd29fb4511540f8af955a2b8c0765

  • SSDEEP

    12288:rMrqy90kcjOLe2jfDhzU+IrOQXJ3agqPn6z0L:dyvceewbhg+fQAf6z0L

Malware Config

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\27af3faa9b75e9348cb64f222e12763155ef194b7ba10de66a0445594e1eebf3.exe
    "C:\Users\Admin\AppData\Local\Temp\27af3faa9b75e9348cb64f222e12763155ef194b7ba10de66a0445594e1eebf3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4912
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0114916.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0114916.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:536
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o4327791.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o4327791.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:652
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6053242.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6053242.exe
        3⤵
        • Executes dropped EXE
        PID:2600

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0114916.exe

    Filesize

    308KB

    MD5

    cbb2d096c787f9d0512e8948843db742

    SHA1

    0d7e910f5d8ed6f6fe185227f34c985afa42bb84

    SHA256

    d4b7eecdfbb27049cf6b8dc882d0f1c5c804a5ebe413f1f3825fce45f36a5401

    SHA512

    5e8f0dc0096bc97bd2317e5d6075cc49c63dfde7b0f89106f2abb202e63703b3043985af2f025fe6edf348393d1d212d40ba8c54501838295204937575dd7317

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0114916.exe

    Filesize

    308KB

    MD5

    cbb2d096c787f9d0512e8948843db742

    SHA1

    0d7e910f5d8ed6f6fe185227f34c985afa42bb84

    SHA256

    d4b7eecdfbb27049cf6b8dc882d0f1c5c804a5ebe413f1f3825fce45f36a5401

    SHA512

    5e8f0dc0096bc97bd2317e5d6075cc49c63dfde7b0f89106f2abb202e63703b3043985af2f025fe6edf348393d1d212d40ba8c54501838295204937575dd7317

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o4327791.exe

    Filesize

    175KB

    MD5

    8becd60a08b9425130bf835604bc736e

    SHA1

    53b7ef74326db3591a6504b4da064b1a3b1331ff

    SHA256

    73922bdaed94181ebc42c730e20a862c90e979a5356251ed5dc971415f705a7c

    SHA512

    fac94d050c9113eb20a9b2aeda59b2e22e9ce776ccf6319800c00aeeecaea4e5225d6642d4c6ce31194844a330eec018586b81393cf0278fb739b0a4a4696a23

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o4327791.exe

    Filesize

    175KB

    MD5

    8becd60a08b9425130bf835604bc736e

    SHA1

    53b7ef74326db3591a6504b4da064b1a3b1331ff

    SHA256

    73922bdaed94181ebc42c730e20a862c90e979a5356251ed5dc971415f705a7c

    SHA512

    fac94d050c9113eb20a9b2aeda59b2e22e9ce776ccf6319800c00aeeecaea4e5225d6642d4c6ce31194844a330eec018586b81393cf0278fb739b0a4a4696a23

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6053242.exe

    Filesize

    136KB

    MD5

    e6b3415e635e27f7971ba49e6e6ac500

    SHA1

    6c8897aefaf1c9cbdf0b7d5e8384a1d286cc3d1b

    SHA256

    585d2658fa3dfa87d7062e5c5703bca99526d8b91e035716b6e2960bdc1ea6d9

    SHA512

    583fbee0c3395aa94a59b0befb61b6cecc2dc3bf83350f163e98767c6346b48161293a8eab4533aa05a480aadd99b881a9999379d646532a11ab9b31038e0776

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6053242.exe

    Filesize

    136KB

    MD5

    e6b3415e635e27f7971ba49e6e6ac500

    SHA1

    6c8897aefaf1c9cbdf0b7d5e8384a1d286cc3d1b

    SHA256

    585d2658fa3dfa87d7062e5c5703bca99526d8b91e035716b6e2960bdc1ea6d9

    SHA512

    583fbee0c3395aa94a59b0befb61b6cecc2dc3bf83350f163e98767c6346b48161293a8eab4533aa05a480aadd99b881a9999379d646532a11ab9b31038e0776

  • memory/652-151-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/652-172-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/652-149-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/652-152-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/652-154-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/652-156-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/652-158-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/652-160-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/652-164-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/652-162-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/652-166-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/652-168-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/652-170-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/652-150-0x0000000004DB0000-0x0000000005354000-memory.dmp

    Filesize

    5.6MB

  • memory/652-174-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/652-176-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/652-178-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/652-179-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/652-148-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/652-147-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/2600-184-0x0000000000AF0000-0x0000000000B18000-memory.dmp

    Filesize

    160KB

  • memory/2600-185-0x0000000007F30000-0x0000000008548000-memory.dmp

    Filesize

    6.1MB

  • memory/2600-186-0x0000000007970000-0x0000000007982000-memory.dmp

    Filesize

    72KB

  • memory/2600-187-0x0000000007AA0000-0x0000000007BAA000-memory.dmp

    Filesize

    1.0MB

  • memory/2600-188-0x00000000079E0000-0x00000000079F0000-memory.dmp

    Filesize

    64KB

  • memory/2600-189-0x00000000079F0000-0x0000000007A2C000-memory.dmp

    Filesize

    240KB

  • memory/2600-190-0x00000000079E0000-0x00000000079F0000-memory.dmp

    Filesize

    64KB