Analysis
-
max time kernel
191s -
max time network
200s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-05-2023 18:57
Static task
static1
Behavioral task
behavioral1
Sample
e896c2ba310f250c9af7fa0fc3b762f9d3bdf352da3aab23e8c95577c2f7f5ca.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e896c2ba310f250c9af7fa0fc3b762f9d3bdf352da3aab23e8c95577c2f7f5ca.exe
Resource
win10v2004-20230220-en
General
-
Target
e896c2ba310f250c9af7fa0fc3b762f9d3bdf352da3aab23e8c95577c2f7f5ca.exe
-
Size
1.0MB
-
MD5
0f1d4c615c36eebed9485539aa0af9e0
-
SHA1
3e4d4ba9dde997b937b0012467cbce7e7544eb12
-
SHA256
e896c2ba310f250c9af7fa0fc3b762f9d3bdf352da3aab23e8c95577c2f7f5ca
-
SHA512
5983ef729b290ee9e873ae701ed57efdf4b4534cd6230a4d14edd056cefdb557c6f7344cb3e97298467c7289aa1380b6d548d7a8db804e89461bb665356705c9
-
SSDEEP
24576:vyj1wbkcIchzHir7sear8AIKfpPMsetTgrvQaHQcEU:6Zwbkc3hW3sekpPRvHN
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4692-998-0x0000000007910000-0x0000000007F28000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 23618535.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 23618535.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 23618535.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 23618535.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 23618535.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 23618535.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1516 za223838.exe 220 za006943.exe 2096 23618535.exe 4692 w31Tw36.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 23618535.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 23618535.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za006943.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" za006943.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e896c2ba310f250c9af7fa0fc3b762f9d3bdf352da3aab23e8c95577c2f7f5ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e896c2ba310f250c9af7fa0fc3b762f9d3bdf352da3aab23e8c95577c2f7f5ca.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za223838.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" za223838.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2096 23618535.exe 2096 23618535.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2096 23618535.exe Token: SeDebugPrivilege 4692 w31Tw36.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1468 wrote to memory of 1516 1468 e896c2ba310f250c9af7fa0fc3b762f9d3bdf352da3aab23e8c95577c2f7f5ca.exe 84 PID 1468 wrote to memory of 1516 1468 e896c2ba310f250c9af7fa0fc3b762f9d3bdf352da3aab23e8c95577c2f7f5ca.exe 84 PID 1468 wrote to memory of 1516 1468 e896c2ba310f250c9af7fa0fc3b762f9d3bdf352da3aab23e8c95577c2f7f5ca.exe 84 PID 1516 wrote to memory of 220 1516 za223838.exe 85 PID 1516 wrote to memory of 220 1516 za223838.exe 85 PID 1516 wrote to memory of 220 1516 za223838.exe 85 PID 220 wrote to memory of 2096 220 za006943.exe 86 PID 220 wrote to memory of 2096 220 za006943.exe 86 PID 220 wrote to memory of 2096 220 za006943.exe 86 PID 220 wrote to memory of 4692 220 za006943.exe 88 PID 220 wrote to memory of 4692 220 za006943.exe 88 PID 220 wrote to memory of 4692 220 za006943.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\e896c2ba310f250c9af7fa0fc3b762f9d3bdf352da3aab23e8c95577c2f7f5ca.exe"C:\Users\Admin\AppData\Local\Temp\e896c2ba310f250c9af7fa0fc3b762f9d3bdf352da3aab23e8c95577c2f7f5ca.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za223838.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za223838.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za006943.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za006943.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\23618535.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\23618535.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2096
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w31Tw36.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w31Tw36.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4692
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
775KB
MD5f7bc433cfae146a7301e6b5aaa57fc98
SHA1ad03dd10a7fff5fd43d9392494015d1b268d84cd
SHA2567fb0bf3e4510b36c04b937d83ad599b5843d751e44606268342730a38f3f2d01
SHA512015816f14791b9f5f50b7fa28fccff1378ef53740b472b4440ae06bdd56be5e1011ca14f34cb00596781b1b12916b69611f0d5fb11312e4184bcb9998f3f9ea4
-
Filesize
775KB
MD5f7bc433cfae146a7301e6b5aaa57fc98
SHA1ad03dd10a7fff5fd43d9392494015d1b268d84cd
SHA2567fb0bf3e4510b36c04b937d83ad599b5843d751e44606268342730a38f3f2d01
SHA512015816f14791b9f5f50b7fa28fccff1378ef53740b472b4440ae06bdd56be5e1011ca14f34cb00596781b1b12916b69611f0d5fb11312e4184bcb9998f3f9ea4
-
Filesize
592KB
MD5b2a17d25df6c6f9f087a1a2c30d73b47
SHA19062c9a34b4b2896bdb431ad628aa207bfb4e526
SHA25603131ae997063b1522072a2bc6c07e40948d94ac97bad683a017daf8bf5ba4c5
SHA512a0fddf908e9576361ce2d07bffd14baa7c6a86078faaa22c3e0227c530b09843ab037ea8390c1380dd924dfed67c1ad1bdb3dc005a7bea89cdbce3ea751c1ad8
-
Filesize
592KB
MD5b2a17d25df6c6f9f087a1a2c30d73b47
SHA19062c9a34b4b2896bdb431ad628aa207bfb4e526
SHA25603131ae997063b1522072a2bc6c07e40948d94ac97bad683a017daf8bf5ba4c5
SHA512a0fddf908e9576361ce2d07bffd14baa7c6a86078faaa22c3e0227c530b09843ab037ea8390c1380dd924dfed67c1ad1bdb3dc005a7bea89cdbce3ea751c1ad8
-
Filesize
377KB
MD5e6fef72cc41ec0f12373382601a8c0a6
SHA1bd3d62d966f42520aaf8c919286d1c618401bf0b
SHA256d8715555f2bb26ede8831bb2f82b09d63eab356dc502fc8641cf182f990f4b36
SHA512d779ea410092aa31d1af10a1d32a1d84e29b2120ee6bf73ba2c343755a16f427215c5c61644bc8238d52d21ca2670b3cf5488637575579e49ec3fb346e8de0c1
-
Filesize
377KB
MD5e6fef72cc41ec0f12373382601a8c0a6
SHA1bd3d62d966f42520aaf8c919286d1c618401bf0b
SHA256d8715555f2bb26ede8831bb2f82b09d63eab356dc502fc8641cf182f990f4b36
SHA512d779ea410092aa31d1af10a1d32a1d84e29b2120ee6bf73ba2c343755a16f427215c5c61644bc8238d52d21ca2670b3cf5488637575579e49ec3fb346e8de0c1
-
Filesize
459KB
MD5f26f082d3165716a437277b14fb96449
SHA1963b47dcae45314f6f2dfbd44df6ed06a7cb1b09
SHA25692fa2e78d0e6c251b4012b71bc547cb61f494414defab1934a77870cf871ed2c
SHA51248ac93c30e0c24f7ed04145e94fce08ac984e9471b900e81c760694bd6a7c2334702ad017a7af007c010e2c1161563472bc8e39f36225e50cadc25f048dac195
-
Filesize
459KB
MD5f26f082d3165716a437277b14fb96449
SHA1963b47dcae45314f6f2dfbd44df6ed06a7cb1b09
SHA25692fa2e78d0e6c251b4012b71bc547cb61f494414defab1934a77870cf871ed2c
SHA51248ac93c30e0c24f7ed04145e94fce08ac984e9471b900e81c760694bd6a7c2334702ad017a7af007c010e2c1161563472bc8e39f36225e50cadc25f048dac195