Analysis
-
max time kernel
189s -
max time network
222s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2023, 19:05
Static task
static1
Behavioral task
behavioral1
Sample
ee562ad5a51de37f4b141fee1cfc3809e3df2745e94a7198ea89dacf4d2f782b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ee562ad5a51de37f4b141fee1cfc3809e3df2745e94a7198ea89dacf4d2f782b.exe
Resource
win10v2004-20230220-en
General
-
Target
ee562ad5a51de37f4b141fee1cfc3809e3df2745e94a7198ea89dacf4d2f782b.exe
-
Size
618KB
-
MD5
6fb5adc47dd63b9438184f15ccd15cdf
-
SHA1
75c9ccad0ad35bf06deb0033e8639902cb02f965
-
SHA256
ee562ad5a51de37f4b141fee1cfc3809e3df2745e94a7198ea89dacf4d2f782b
-
SHA512
c6b0aa4b1047209a383670c7dd8da85b92c1ff4a2f56e8d3714ad1604fbec74a800ff33b424d289c131df7b36b6e976954cd2f6a16eb9bba372d3e922efdd304
-
SSDEEP
12288:9y90st1h5pCoXqMydWhEp1QgDMaz6hsV9Rd2FXiIcLQdFpBk:9y7tB8bWhEf+hsV9Rd2IUdFPk
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4688-950-0x0000000007920000-0x0000000007F38000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 15041037.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 15041037.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 15041037.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 15041037.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 15041037.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 15041037.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 664 st304990.exe 1040 15041037.exe 4688 kp895566.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 15041037.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st304990.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ee562ad5a51de37f4b141fee1cfc3809e3df2745e94a7198ea89dacf4d2f782b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ee562ad5a51de37f4b141fee1cfc3809e3df2745e94a7198ea89dacf4d2f782b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st304990.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1040 15041037.exe 1040 15041037.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1040 15041037.exe Token: SeDebugPrivilege 4688 kp895566.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3528 wrote to memory of 664 3528 ee562ad5a51de37f4b141fee1cfc3809e3df2745e94a7198ea89dacf4d2f782b.exe 81 PID 3528 wrote to memory of 664 3528 ee562ad5a51de37f4b141fee1cfc3809e3df2745e94a7198ea89dacf4d2f782b.exe 81 PID 3528 wrote to memory of 664 3528 ee562ad5a51de37f4b141fee1cfc3809e3df2745e94a7198ea89dacf4d2f782b.exe 81 PID 664 wrote to memory of 1040 664 st304990.exe 82 PID 664 wrote to memory of 1040 664 st304990.exe 82 PID 664 wrote to memory of 4688 664 st304990.exe 83 PID 664 wrote to memory of 4688 664 st304990.exe 83 PID 664 wrote to memory of 4688 664 st304990.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee562ad5a51de37f4b141fee1cfc3809e3df2745e94a7198ea89dacf4d2f782b.exe"C:\Users\Admin\AppData\Local\Temp\ee562ad5a51de37f4b141fee1cfc3809e3df2745e94a7198ea89dacf4d2f782b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st304990.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st304990.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\15041037.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\15041037.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1040
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp895566.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp895566.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4688
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
464KB
MD55de57b899dd43c1811ceaa0726554efb
SHA113a3a3ac9dacfd4692c5440b35716f22fb1c2925
SHA2562d8550c6dfb0932d50090fb52250724caa7082e4f3e417645fefefa963f92d3b
SHA512579eab3473b00d4a55d740b1b0a937d0bafe4213f7d19f4ed8bd2ec0fb8493b56dba42a2ead352a8a8f80ec60022f29378b1e48eee0d7668bc1b35b23f91592e
-
Filesize
464KB
MD55de57b899dd43c1811ceaa0726554efb
SHA113a3a3ac9dacfd4692c5440b35716f22fb1c2925
SHA2562d8550c6dfb0932d50090fb52250724caa7082e4f3e417645fefefa963f92d3b
SHA512579eab3473b00d4a55d740b1b0a937d0bafe4213f7d19f4ed8bd2ec0fb8493b56dba42a2ead352a8a8f80ec60022f29378b1e48eee0d7668bc1b35b23f91592e
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
478KB
MD52ac6a98783b451d84afd1688df1fa9fb
SHA1339c946ccae0b4e79abfb1e8e344bc845e1a65b6
SHA25606b6e588586a443b1cf930be6c23b9cfb8693c972ac5f892837b7739a97af81a
SHA512abf4e5a22f3bcd9ab2685ece45f041b173795b90d3f9ea29bbc17b0a6b3fadf9315f9f5347633ab132b6f58089329ec89e7abe1cee043d5c55ed6df9b50e10d8
-
Filesize
478KB
MD52ac6a98783b451d84afd1688df1fa9fb
SHA1339c946ccae0b4e79abfb1e8e344bc845e1a65b6
SHA25606b6e588586a443b1cf930be6c23b9cfb8693c972ac5f892837b7739a97af81a
SHA512abf4e5a22f3bcd9ab2685ece45f041b173795b90d3f9ea29bbc17b0a6b3fadf9315f9f5347633ab132b6f58089329ec89e7abe1cee043d5c55ed6df9b50e10d8