Analysis
-
max time kernel
155s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2023, 18:47
Static task
static1
Behavioral task
behavioral1
Sample
df69416c2efa69686573960f72dd6f0e17cdf5081363f36759d876d35598b5e4.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
df69416c2efa69686573960f72dd6f0e17cdf5081363f36759d876d35598b5e4.exe
Resource
win10v2004-20230220-en
General
-
Target
df69416c2efa69686573960f72dd6f0e17cdf5081363f36759d876d35598b5e4.exe
-
Size
674KB
-
MD5
7440ff76fa12b307497d81a9ab9cd1c7
-
SHA1
31de0c1438cede9766194bcda8bcc2b77cd07ed8
-
SHA256
df69416c2efa69686573960f72dd6f0e17cdf5081363f36759d876d35598b5e4
-
SHA512
8e28f67ab47050ab3fb55f00c10b08917904aa835d1091f1f801d1fd00e910d8bb327fbbcc7103af99d3b6a4c48926cb26e6f5f84504400e38c7bef765bb102f
-
SSDEEP
12288:Ey90VWPMB7TgeLNvzTAo/PLeNg0s3OuVvGWITSvDWphO82875h:EybPYd8o/P25KOOiTS6phO828T
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4836-982-0x0000000007730000-0x0000000007D48000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 56957119.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 56957119.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 56957119.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 56957119.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 56957119.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 56957119.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 3104 st749660.exe 376 56957119.exe 4836 kp624894.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 56957119.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 56957119.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" df69416c2efa69686573960f72dd6f0e17cdf5081363f36759d876d35598b5e4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st749660.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st749660.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce df69416c2efa69686573960f72dd6f0e17cdf5081363f36759d876d35598b5e4.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 376 56957119.exe 376 56957119.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 376 56957119.exe Token: SeDebugPrivilege 4836 kp624894.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1408 wrote to memory of 3104 1408 df69416c2efa69686573960f72dd6f0e17cdf5081363f36759d876d35598b5e4.exe 83 PID 1408 wrote to memory of 3104 1408 df69416c2efa69686573960f72dd6f0e17cdf5081363f36759d876d35598b5e4.exe 83 PID 1408 wrote to memory of 3104 1408 df69416c2efa69686573960f72dd6f0e17cdf5081363f36759d876d35598b5e4.exe 83 PID 3104 wrote to memory of 376 3104 st749660.exe 84 PID 3104 wrote to memory of 376 3104 st749660.exe 84 PID 3104 wrote to memory of 376 3104 st749660.exe 84 PID 3104 wrote to memory of 4836 3104 st749660.exe 86 PID 3104 wrote to memory of 4836 3104 st749660.exe 86 PID 3104 wrote to memory of 4836 3104 st749660.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\df69416c2efa69686573960f72dd6f0e17cdf5081363f36759d876d35598b5e4.exe"C:\Users\Admin\AppData\Local\Temp\df69416c2efa69686573960f72dd6f0e17cdf5081363f36759d876d35598b5e4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st749660.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st749660.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\56957119.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\56957119.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:376
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp624894.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp624894.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4836
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
519KB
MD5411df1ab1a708202f347d5af552b9a58
SHA10cdc36cab112173b8527f82110ecc16f792902f2
SHA25650e5440679e1056d8f8b868e46b7e0b6c779ad2f2362654382fcae718773aa6e
SHA5129b4f8be9a04f843f942dd7ef0bd062319f44ca97d6d9fd6fb45eb60578b74f716916d4aff0aefff904cee7660749fe8695a2b7f227ed4c461c907be8610fca24
-
Filesize
519KB
MD5411df1ab1a708202f347d5af552b9a58
SHA10cdc36cab112173b8527f82110ecc16f792902f2
SHA25650e5440679e1056d8f8b868e46b7e0b6c779ad2f2362654382fcae718773aa6e
SHA5129b4f8be9a04f843f942dd7ef0bd062319f44ca97d6d9fd6fb45eb60578b74f716916d4aff0aefff904cee7660749fe8695a2b7f227ed4c461c907be8610fca24
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
415KB
MD5c8646ad71b08f3d1380a6be0537f281c
SHA11eab0e05dffb4a72be200dc4fad9cc1ce297fd36
SHA2567d4d166366e9f01fb9e1d917bfdc905289f13eb43120c11175c11e4e2fd7eb0a
SHA512a284b80c0c7cddd8afe22f8e02fa49fe889a096e1bd2d9d49e74872f3614abcd1dff266f7da1e103ac21b93052dfd63b280f050c348f67eb58ccbcd1711e4ff0
-
Filesize
415KB
MD5c8646ad71b08f3d1380a6be0537f281c
SHA11eab0e05dffb4a72be200dc4fad9cc1ce297fd36
SHA2567d4d166366e9f01fb9e1d917bfdc905289f13eb43120c11175c11e4e2fd7eb0a
SHA512a284b80c0c7cddd8afe22f8e02fa49fe889a096e1bd2d9d49e74872f3614abcd1dff266f7da1e103ac21b93052dfd63b280f050c348f67eb58ccbcd1711e4ff0