Analysis
-
max time kernel
150s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-05-2023 18:55
Static task
static1
Behavioral task
behavioral1
Sample
e74bb26fa9abfae25e76c18c04ddf0e51268d89c2dd6bb9d8cfd78bb01ff4748.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e74bb26fa9abfae25e76c18c04ddf0e51268d89c2dd6bb9d8cfd78bb01ff4748.exe
Resource
win10v2004-20230220-en
General
-
Target
e74bb26fa9abfae25e76c18c04ddf0e51268d89c2dd6bb9d8cfd78bb01ff4748.exe
-
Size
1.2MB
-
MD5
e37b641c3dccffbe9c19247e133829e9
-
SHA1
c6631d1745ac50077f99effbdf0af95a455d1cef
-
SHA256
e74bb26fa9abfae25e76c18c04ddf0e51268d89c2dd6bb9d8cfd78bb01ff4748
-
SHA512
e6b2148afaf65c610012a973faf9a8a62829a9ad4d22ba8e04c215618211898c6df5c5058ae3630def111e66b965f8df5e301700f712ec27bc9265e58edf5dd8
-
SSDEEP
24576:wy2Xxqm2KGrSjmtRbvW06wNXlBpe5wCHyoOusDIDOGeX:3Cxp2KGWmtJWQVlBoDyo/s0DOB
Malware Config
Extracted
amadey
3.70
212.113.119.255/joomla/index.php
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3888-1055-0x00000000078C0000-0x0000000007ED8000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" u27480180.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 99733439.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 99733439.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 99733439.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 99733439.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" u27480180.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" u27480180.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 99733439.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 99733439.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" u27480180.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" u27480180.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation w51sn15.exe Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation oneetx.exe -
Executes dropped EXE 9 IoCs
pid Process 1196 za984872.exe 1640 za206462.exe 3508 za164429.exe 5040 99733439.exe 3660 u27480180.exe 1628 w51sn15.exe 2536 oneetx.exe 3888 xCvjn21.exe 4444 oneetx.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 99733439.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 99733439.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" u27480180.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" za164429.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e74bb26fa9abfae25e76c18c04ddf0e51268d89c2dd6bb9d8cfd78bb01ff4748.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e74bb26fa9abfae25e76c18c04ddf0e51268d89c2dd6bb9d8cfd78bb01ff4748.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za984872.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" za984872.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za206462.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" za206462.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za164429.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4524 3660 WerFault.exe 89 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1092 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5040 99733439.exe 5040 99733439.exe 3660 u27480180.exe 3660 u27480180.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5040 99733439.exe Token: SeDebugPrivilege 3660 u27480180.exe Token: SeDebugPrivilege 3888 xCvjn21.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1628 w51sn15.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1896 wrote to memory of 1196 1896 e74bb26fa9abfae25e76c18c04ddf0e51268d89c2dd6bb9d8cfd78bb01ff4748.exe 83 PID 1896 wrote to memory of 1196 1896 e74bb26fa9abfae25e76c18c04ddf0e51268d89c2dd6bb9d8cfd78bb01ff4748.exe 83 PID 1896 wrote to memory of 1196 1896 e74bb26fa9abfae25e76c18c04ddf0e51268d89c2dd6bb9d8cfd78bb01ff4748.exe 83 PID 1196 wrote to memory of 1640 1196 za984872.exe 84 PID 1196 wrote to memory of 1640 1196 za984872.exe 84 PID 1196 wrote to memory of 1640 1196 za984872.exe 84 PID 1640 wrote to memory of 3508 1640 za206462.exe 85 PID 1640 wrote to memory of 3508 1640 za206462.exe 85 PID 1640 wrote to memory of 3508 1640 za206462.exe 85 PID 3508 wrote to memory of 5040 3508 za164429.exe 86 PID 3508 wrote to memory of 5040 3508 za164429.exe 86 PID 3508 wrote to memory of 5040 3508 za164429.exe 86 PID 3508 wrote to memory of 3660 3508 za164429.exe 89 PID 3508 wrote to memory of 3660 3508 za164429.exe 89 PID 3508 wrote to memory of 3660 3508 za164429.exe 89 PID 1640 wrote to memory of 1628 1640 za206462.exe 93 PID 1640 wrote to memory of 1628 1640 za206462.exe 93 PID 1640 wrote to memory of 1628 1640 za206462.exe 93 PID 1628 wrote to memory of 2536 1628 w51sn15.exe 94 PID 1628 wrote to memory of 2536 1628 w51sn15.exe 94 PID 1628 wrote to memory of 2536 1628 w51sn15.exe 94 PID 1196 wrote to memory of 3888 1196 za984872.exe 95 PID 1196 wrote to memory of 3888 1196 za984872.exe 95 PID 1196 wrote to memory of 3888 1196 za984872.exe 95 PID 2536 wrote to memory of 1092 2536 oneetx.exe 96 PID 2536 wrote to memory of 1092 2536 oneetx.exe 96 PID 2536 wrote to memory of 1092 2536 oneetx.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\e74bb26fa9abfae25e76c18c04ddf0e51268d89c2dd6bb9d8cfd78bb01ff4748.exe"C:\Users\Admin\AppData\Local\Temp\e74bb26fa9abfae25e76c18c04ddf0e51268d89c2dd6bb9d8cfd78bb01ff4748.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za984872.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za984872.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za206462.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za206462.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za164429.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\za164429.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\99733439.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\99733439.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5040
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u27480180.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\u27480180.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 10766⤵
- Program crash
PID:4524
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w51sn15.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w51sn15.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN oneetx.exe /TR "C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe" /F6⤵
- Creates scheduled task(s)
PID:1092
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xCvjn21.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\xCvjn21.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3888
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3660 -ip 36601⤵PID:4484
-
C:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exeC:\Users\Admin\AppData\Local\Temp\5cb6818d6c\oneetx.exe1⤵
- Executes dropped EXE
PID:4444
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229KB
MD5550b197e13146b5cf326d2999df1e060
SHA10c53ee0bf52ca00e6e610c9e46a9d7acf1bad630
SHA25657b41095a8540f5514d9e52d5c04ef982282390d486dd907f0fdaaa8aa045eb0
SHA51206fdd9a7345d8c0fe40a674e1af14dce47570164ed3382b4842a48d23441e26a215b69374551e98c4656a622186ccf6ad5e30b557a0c5931e002394e880790ad
-
Filesize
229KB
MD5550b197e13146b5cf326d2999df1e060
SHA10c53ee0bf52ca00e6e610c9e46a9d7acf1bad630
SHA25657b41095a8540f5514d9e52d5c04ef982282390d486dd907f0fdaaa8aa045eb0
SHA51206fdd9a7345d8c0fe40a674e1af14dce47570164ed3382b4842a48d23441e26a215b69374551e98c4656a622186ccf6ad5e30b557a0c5931e002394e880790ad
-
Filesize
229KB
MD5550b197e13146b5cf326d2999df1e060
SHA10c53ee0bf52ca00e6e610c9e46a9d7acf1bad630
SHA25657b41095a8540f5514d9e52d5c04ef982282390d486dd907f0fdaaa8aa045eb0
SHA51206fdd9a7345d8c0fe40a674e1af14dce47570164ed3382b4842a48d23441e26a215b69374551e98c4656a622186ccf6ad5e30b557a0c5931e002394e880790ad
-
Filesize
229KB
MD5550b197e13146b5cf326d2999df1e060
SHA10c53ee0bf52ca00e6e610c9e46a9d7acf1bad630
SHA25657b41095a8540f5514d9e52d5c04ef982282390d486dd907f0fdaaa8aa045eb0
SHA51206fdd9a7345d8c0fe40a674e1af14dce47570164ed3382b4842a48d23441e26a215b69374551e98c4656a622186ccf6ad5e30b557a0c5931e002394e880790ad
-
Filesize
1.0MB
MD56b0ef73e99acc5c1c04695c524d4468c
SHA128249204427505c9a82fda41ace1e6675e900758
SHA256870d263c1680beb83a62251462fbe2ec9f5c2b5f0a1644cf365b918b88223524
SHA512bc58c73932131d199e1f0cbe172e45864f2785aa1eb0f2ba58a8aec927444b3d0c35b17683d3c48ddda3ded6bc6666087cd38e3f5356fafad6af5a9d2dd6f05c
-
Filesize
1.0MB
MD56b0ef73e99acc5c1c04695c524d4468c
SHA128249204427505c9a82fda41ace1e6675e900758
SHA256870d263c1680beb83a62251462fbe2ec9f5c2b5f0a1644cf365b918b88223524
SHA512bc58c73932131d199e1f0cbe172e45864f2785aa1eb0f2ba58a8aec927444b3d0c35b17683d3c48ddda3ded6bc6666087cd38e3f5356fafad6af5a9d2dd6f05c
-
Filesize
461KB
MD50b90af945a793638d26f90867ce2598e
SHA15522961b85640b7aba9d70c3b94fb603a098ecb9
SHA2566b8f640ea01d4d029c9a0b499b733888778a08802acf2995d2616b61a23fcdd9
SHA512763c7d67a5fe8cc4cb8f5a8366f67db8812855a1acc5086282f56693939da6633a3fa2472c3e578abf8a31a47aaa754070473122e4057408e4f6af17d5d3f572
-
Filesize
461KB
MD50b90af945a793638d26f90867ce2598e
SHA15522961b85640b7aba9d70c3b94fb603a098ecb9
SHA2566b8f640ea01d4d029c9a0b499b733888778a08802acf2995d2616b61a23fcdd9
SHA512763c7d67a5fe8cc4cb8f5a8366f67db8812855a1acc5086282f56693939da6633a3fa2472c3e578abf8a31a47aaa754070473122e4057408e4f6af17d5d3f572
-
Filesize
649KB
MD593c593eec5638ca96f4e7819f42a784d
SHA1344a9894fe7a36b2f499eee75753e091189161ce
SHA2565bcdb9a864c670cec037282f3cad3e92371b22cea44cb0d3d9649025d64a3c3f
SHA5122217886b1653b3df69808a43e5894faa2a13980a59880696965782187f3b022e9f22a41c5234f3f4a521dec9979afaf91bc1b346e3220f58c1c7e74b46b93843
-
Filesize
649KB
MD593c593eec5638ca96f4e7819f42a784d
SHA1344a9894fe7a36b2f499eee75753e091189161ce
SHA2565bcdb9a864c670cec037282f3cad3e92371b22cea44cb0d3d9649025d64a3c3f
SHA5122217886b1653b3df69808a43e5894faa2a13980a59880696965782187f3b022e9f22a41c5234f3f4a521dec9979afaf91bc1b346e3220f58c1c7e74b46b93843
-
Filesize
229KB
MD5550b197e13146b5cf326d2999df1e060
SHA10c53ee0bf52ca00e6e610c9e46a9d7acf1bad630
SHA25657b41095a8540f5514d9e52d5c04ef982282390d486dd907f0fdaaa8aa045eb0
SHA51206fdd9a7345d8c0fe40a674e1af14dce47570164ed3382b4842a48d23441e26a215b69374551e98c4656a622186ccf6ad5e30b557a0c5931e002394e880790ad
-
Filesize
229KB
MD5550b197e13146b5cf326d2999df1e060
SHA10c53ee0bf52ca00e6e610c9e46a9d7acf1bad630
SHA25657b41095a8540f5514d9e52d5c04ef982282390d486dd907f0fdaaa8aa045eb0
SHA51206fdd9a7345d8c0fe40a674e1af14dce47570164ed3382b4842a48d23441e26a215b69374551e98c4656a622186ccf6ad5e30b557a0c5931e002394e880790ad
-
Filesize
467KB
MD5a9ee188b1877bad3631c278db28359f3
SHA17791449ee9b692e9b5aef3091600011e272f5f9e
SHA2562e4bd083acea107a66b9661f91b792df4758cabbdf29d8801332425a39463fac
SHA512d84d079eff188dafcbb6578c9f1ade39c0fdd849639a41232cd8d7b0c8a80847557ea9a4b31567c164d4afed2cc3247f7d1cae951aa34bf7a85605cfd550571d
-
Filesize
467KB
MD5a9ee188b1877bad3631c278db28359f3
SHA17791449ee9b692e9b5aef3091600011e272f5f9e
SHA2562e4bd083acea107a66b9661f91b792df4758cabbdf29d8801332425a39463fac
SHA512d84d079eff188dafcbb6578c9f1ade39c0fdd849639a41232cd8d7b0c8a80847557ea9a4b31567c164d4afed2cc3247f7d1cae951aa34bf7a85605cfd550571d
-
Filesize
176KB
MD534efaad38dd82d68351d7af02be00c9b
SHA1ac4dbec8c01d2cc11e49ac66ea3c37a30b9c2324
SHA256df1c9178c4d0bb2dfbd77562b4198766e508414d7fd81ea6b09058caea057f00
SHA512c6c92c262338a41aba9501662be760645dee869008ad4b216e3435b402f6e6d83f27b10040e9d524c64570657f4a9167068edee0e0aaf3f19e5eace596af55c0
-
Filesize
176KB
MD534efaad38dd82d68351d7af02be00c9b
SHA1ac4dbec8c01d2cc11e49ac66ea3c37a30b9c2324
SHA256df1c9178c4d0bb2dfbd77562b4198766e508414d7fd81ea6b09058caea057f00
SHA512c6c92c262338a41aba9501662be760645dee869008ad4b216e3435b402f6e6d83f27b10040e9d524c64570657f4a9167068edee0e0aaf3f19e5eace596af55c0
-
Filesize
377KB
MD5a81aab9b23f67453b4868df925891d39
SHA181a0349318dacea667c554ec870c0d458e5206bd
SHA2565c6d3f8f017217e14601edd1c8ebdd443007ba90a3b9cd9fdae8683291693937
SHA512c17a64feda25a707eb7c80e5bb252e67ad6fc2988868dcd517f416b64c3756d400f65e6e3563aee3e8817a91f9eafcb1b28e1dfbbdfde16882382a7fe273ae58
-
Filesize
377KB
MD5a81aab9b23f67453b4868df925891d39
SHA181a0349318dacea667c554ec870c0d458e5206bd
SHA2565c6d3f8f017217e14601edd1c8ebdd443007ba90a3b9cd9fdae8683291693937
SHA512c17a64feda25a707eb7c80e5bb252e67ad6fc2988868dcd517f416b64c3756d400f65e6e3563aee3e8817a91f9eafcb1b28e1dfbbdfde16882382a7fe273ae58