Analysis
-
max time kernel
194s -
max time network
251s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2023, 18:51
Static task
static1
Behavioral task
behavioral1
Sample
e25f301195cfb929ff5cee7af3db3dd5821691c33a2d3dd070d707aad172b31e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e25f301195cfb929ff5cee7af3db3dd5821691c33a2d3dd070d707aad172b31e.exe
Resource
win10v2004-20230221-en
General
-
Target
e25f301195cfb929ff5cee7af3db3dd5821691c33a2d3dd070d707aad172b31e.exe
-
Size
656KB
-
MD5
1b17406c3740b948677fbf300353e028
-
SHA1
7b09c969443928b2ac0fcc6a95b52b8f4203567e
-
SHA256
e25f301195cfb929ff5cee7af3db3dd5821691c33a2d3dd070d707aad172b31e
-
SHA512
afac493add16d72e86605e870833eba8173a2786e3b8cb98b33d0b7ae8d798ca7894dde6ec0ae51edd16749c0d957f4b3106709ac96e29363584251bb4de92bf
-
SSDEEP
12288:ny90EJpOnTOtJ6sfse5afv1sNSOdvnWhXgHp:nyBJ6TOtJZfse5afY9vncwHp
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/336-980-0x0000000007600000-0x0000000007C18000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 04087755.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 04087755.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 04087755.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 04087755.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 04087755.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 04087755.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1376 st802476.exe 3016 04087755.exe 336 kp709438.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 04087755.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 04087755.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e25f301195cfb929ff5cee7af3db3dd5821691c33a2d3dd070d707aad172b31e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e25f301195cfb929ff5cee7af3db3dd5821691c33a2d3dd070d707aad172b31e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st802476.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st802476.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3016 04087755.exe 3016 04087755.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3016 04087755.exe Token: SeDebugPrivilege 336 kp709438.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1428 wrote to memory of 1376 1428 e25f301195cfb929ff5cee7af3db3dd5821691c33a2d3dd070d707aad172b31e.exe 79 PID 1428 wrote to memory of 1376 1428 e25f301195cfb929ff5cee7af3db3dd5821691c33a2d3dd070d707aad172b31e.exe 79 PID 1428 wrote to memory of 1376 1428 e25f301195cfb929ff5cee7af3db3dd5821691c33a2d3dd070d707aad172b31e.exe 79 PID 1376 wrote to memory of 3016 1376 st802476.exe 81 PID 1376 wrote to memory of 3016 1376 st802476.exe 81 PID 1376 wrote to memory of 3016 1376 st802476.exe 81 PID 1376 wrote to memory of 336 1376 st802476.exe 85 PID 1376 wrote to memory of 336 1376 st802476.exe 85 PID 1376 wrote to memory of 336 1376 st802476.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\e25f301195cfb929ff5cee7af3db3dd5821691c33a2d3dd070d707aad172b31e.exe"C:\Users\Admin\AppData\Local\Temp\e25f301195cfb929ff5cee7af3db3dd5821691c33a2d3dd070d707aad172b31e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st802476.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st802476.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\04087755.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\04087755.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3016
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp709438.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp709438.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:336
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
503KB
MD541e63ddd4437c71780fd2df8752be9fc
SHA14d68b9cc078bbc65150bc9bd23df588d7829f53b
SHA2562637cb5b4ad7db3a907401b2e1c016eb8e421bafaf090429c607ba6a998733b0
SHA51247755b8fae93c641f34e34e4bab40fd42ae94fc3e1304ca018ea0e1cebac8afdc77acfa5d5d36ac634d9a258dc85a839d189b543898406fe26435eb70a5a1a9d
-
Filesize
503KB
MD541e63ddd4437c71780fd2df8752be9fc
SHA14d68b9cc078bbc65150bc9bd23df588d7829f53b
SHA2562637cb5b4ad7db3a907401b2e1c016eb8e421bafaf090429c607ba6a998733b0
SHA51247755b8fae93c641f34e34e4bab40fd42ae94fc3e1304ca018ea0e1cebac8afdc77acfa5d5d36ac634d9a258dc85a839d189b543898406fe26435eb70a5a1a9d
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
366KB
MD5eb52579c876f367a7eb00345f9cf9a0e
SHA10b29d151afbc71aeaa8a13ed78e56f54f7ad49fc
SHA25675f282295d837b929cba9b6ee69ac8c6e880a2327f54c565a4ffa9f24176769f
SHA512d8023ba55b780003f04dd1364948fa2638569439c0708d5e6c69d1d84034e88bd0dd38d0d7a580f6e8e7c3e92adc07244058e0890bb9407c423fd6c68b42bc80
-
Filesize
366KB
MD5eb52579c876f367a7eb00345f9cf9a0e
SHA10b29d151afbc71aeaa8a13ed78e56f54f7ad49fc
SHA25675f282295d837b929cba9b6ee69ac8c6e880a2327f54c565a4ffa9f24176769f
SHA512d8023ba55b780003f04dd1364948fa2638569439c0708d5e6c69d1d84034e88bd0dd38d0d7a580f6e8e7c3e92adc07244058e0890bb9407c423fd6c68b42bc80