Analysis
-
max time kernel
161s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-05-2023 19:15
Static task
static1
Behavioral task
behavioral1
Sample
f098890f3a3ef76f5024724635e10f707971a05e5e1501719312c9206fd9f3b9.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f098890f3a3ef76f5024724635e10f707971a05e5e1501719312c9206fd9f3b9.exe
Resource
win10v2004-20230220-en
General
-
Target
f098890f3a3ef76f5024724635e10f707971a05e5e1501719312c9206fd9f3b9.exe
-
Size
1.0MB
-
MD5
0f1f20160ec8db10603aefeab47a66dc
-
SHA1
7b2d9269431e77f8887665c40564a21e997c89a1
-
SHA256
f098890f3a3ef76f5024724635e10f707971a05e5e1501719312c9206fd9f3b9
-
SHA512
2e5c8aa4186daf1d9c2b0b1e8f6aa79c058738a51c8698ab0ca2bd64b976029d0f5cea7227d872917d7fa0cf8864866be2081a955a70e591bdd107261b988c8c
-
SSDEEP
24576:hywNEtThlbVucwn8CDJl6OgCF2DwKfN/i3tsjhD:UwNGvb/CDPXFHKl/8a
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4764-993-0x0000000007A90000-0x00000000080A8000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 166266833.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 166266833.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 166266833.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 166266833.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 166266833.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 166266833.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1272 Ij314179.exe 4628 OM564591.exe 4784 166266833.exe 4764 236003234.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 166266833.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 166266833.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" OM564591.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f098890f3a3ef76f5024724635e10f707971a05e5e1501719312c9206fd9f3b9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f098890f3a3ef76f5024724635e10f707971a05e5e1501719312c9206fd9f3b9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce Ij314179.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Ij314179.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce OM564591.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4784 166266833.exe 4784 166266833.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4784 166266833.exe Token: SeDebugPrivilege 4764 236003234.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4540 wrote to memory of 1272 4540 f098890f3a3ef76f5024724635e10f707971a05e5e1501719312c9206fd9f3b9.exe 82 PID 4540 wrote to memory of 1272 4540 f098890f3a3ef76f5024724635e10f707971a05e5e1501719312c9206fd9f3b9.exe 82 PID 4540 wrote to memory of 1272 4540 f098890f3a3ef76f5024724635e10f707971a05e5e1501719312c9206fd9f3b9.exe 82 PID 1272 wrote to memory of 4628 1272 Ij314179.exe 83 PID 1272 wrote to memory of 4628 1272 Ij314179.exe 83 PID 1272 wrote to memory of 4628 1272 Ij314179.exe 83 PID 4628 wrote to memory of 4784 4628 OM564591.exe 84 PID 4628 wrote to memory of 4784 4628 OM564591.exe 84 PID 4628 wrote to memory of 4784 4628 OM564591.exe 84 PID 4628 wrote to memory of 4764 4628 OM564591.exe 88 PID 4628 wrote to memory of 4764 4628 OM564591.exe 88 PID 4628 wrote to memory of 4764 4628 OM564591.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\f098890f3a3ef76f5024724635e10f707971a05e5e1501719312c9206fd9f3b9.exe"C:\Users\Admin\AppData\Local\Temp\f098890f3a3ef76f5024724635e10f707971a05e5e1501719312c9206fd9f3b9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ij314179.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ij314179.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\OM564591.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\OM564591.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\166266833.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\166266833.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4784
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\236003234.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\236003234.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
770KB
MD5cb97a4d93811fdfbe1f042b2e79c684e
SHA1aa809a0c01596ce1df381e5b4dba58a7bf4460af
SHA256eaa3640661d8a00683bbf8ab3e070b0f76eac59b63f3578091c4d06e77113c7b
SHA5125c14bcf7aa7f7fb465951fc17fe489003c413c665cf93c91fdf270dbe3746ffa949773c3226bd7b09d20034b1ccf09e4ea53becf418ff756234ac273a7ef5c4b
-
Filesize
770KB
MD5cb97a4d93811fdfbe1f042b2e79c684e
SHA1aa809a0c01596ce1df381e5b4dba58a7bf4460af
SHA256eaa3640661d8a00683bbf8ab3e070b0f76eac59b63f3578091c4d06e77113c7b
SHA5125c14bcf7aa7f7fb465951fc17fe489003c413c665cf93c91fdf270dbe3746ffa949773c3226bd7b09d20034b1ccf09e4ea53becf418ff756234ac273a7ef5c4b
-
Filesize
598KB
MD55e1eca8b13a1ceac7b0278d93c25200e
SHA1e4628e7f231c9139aa05eb43907dd386b13e4072
SHA256a8c04776b83156a072fd28f4c98078615e97d7a8f837f519a2b981e90eb5e776
SHA512289bcb6de7d36242b695215c995318a2001111cfc259158d1c46e9e084f8202ba3a25fc3ec7a8e93760d7f8810b3250233c18ac0b8a1ff206943c6a12214dfd9
-
Filesize
598KB
MD55e1eca8b13a1ceac7b0278d93c25200e
SHA1e4628e7f231c9139aa05eb43907dd386b13e4072
SHA256a8c04776b83156a072fd28f4c98078615e97d7a8f837f519a2b981e90eb5e776
SHA512289bcb6de7d36242b695215c995318a2001111cfc259158d1c46e9e084f8202ba3a25fc3ec7a8e93760d7f8810b3250233c18ac0b8a1ff206943c6a12214dfd9
-
Filesize
390KB
MD59a21ac8eb69b388f18ea279c4c94379b
SHA177179a82216bc20bb95b99586ed9ee00d8e3cc1b
SHA256083a3f7d2b508fc7f569021826434bf9f460cf7adaf4894a4e3900fade7d2923
SHA512ed417fab3bf7e1d4196947f2497f25422779da9c151d459254902fbf1eb191759bee71bda2eb5ffe4e1d788e13fa5e7c1f0b9cecc625e7f0bddad2a1e18bd9f8
-
Filesize
390KB
MD59a21ac8eb69b388f18ea279c4c94379b
SHA177179a82216bc20bb95b99586ed9ee00d8e3cc1b
SHA256083a3f7d2b508fc7f569021826434bf9f460cf7adaf4894a4e3900fade7d2923
SHA512ed417fab3bf7e1d4196947f2497f25422779da9c151d459254902fbf1eb191759bee71bda2eb5ffe4e1d788e13fa5e7c1f0b9cecc625e7f0bddad2a1e18bd9f8
-
Filesize
473KB
MD57b59227204ad9b45ca92e7ca35da309a
SHA1d1d950591327619fc95a5e5458a8264a002e27fe
SHA25661d62df2ec2b7057563fbf5b9216601418f16abcca72adfc7b833a5d02b22869
SHA5122fdce6b9f0c1a4aaa2c5d1598916606c515a382cd756d92d74aeaa33219c96b6105237b213472432dfae78cb281f824376de4911d41db9d8ac861e7a09c71848
-
Filesize
473KB
MD57b59227204ad9b45ca92e7ca35da309a
SHA1d1d950591327619fc95a5e5458a8264a002e27fe
SHA25661d62df2ec2b7057563fbf5b9216601418f16abcca72adfc7b833a5d02b22869
SHA5122fdce6b9f0c1a4aaa2c5d1598916606c515a382cd756d92d74aeaa33219c96b6105237b213472432dfae78cb281f824376de4911d41db9d8ac861e7a09c71848