Analysis
-
max time kernel
75s -
max time network
84s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 18:27
Static task
static1
Behavioral task
behavioral1
Sample
5f558071095f4f97f72828923886a14bab190c9ca85c42c5afc54893102d0d38.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5f558071095f4f97f72828923886a14bab190c9ca85c42c5afc54893102d0d38.exe
Resource
win10v2004-20230220-en
General
-
Target
5f558071095f4f97f72828923886a14bab190c9ca85c42c5afc54893102d0d38.exe
-
Size
1.5MB
-
MD5
3810e4d620629e89095d2024a5dd8f91
-
SHA1
b14697dadf5bf56dad70d8bc3bd5ef6c1e35a63d
-
SHA256
5f558071095f4f97f72828923886a14bab190c9ca85c42c5afc54893102d0d38
-
SHA512
2280c3fd9da69c1d24e75a7460bb4df9377d693e9c8e368e45f01b2fc40bb594c58b4f0fb54ec17a853e3c46bdded390b78dcc32e74ac96b1d077a7f9c392399
-
SSDEEP
49152:aEj3GmxrubgyTCBNRYr62Q5il/do5dGal:F9qbgmCKrnV/S5dxl
Malware Config
Extracted
redline
maxbi
185.161.248.73:4164
-
auth_value
6aa7dba884fe45693dfa04c91440daef
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/2568-212-0x000000000A770000-0x000000000AD88000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a80614746.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a80614746.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a80614746.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a80614746.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a80614746.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a80614746.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 1620 i04415049.exe 4888 i10286750.exe 4280 i08852433.exe 4824 i50244322.exe 884 a80614746.exe 2568 b85160893.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a80614746.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a80614746.exe -
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" i04415049.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" i10286750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" i08852433.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5f558071095f4f97f72828923886a14bab190c9ca85c42c5afc54893102d0d38.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5f558071095f4f97f72828923886a14bab190c9ca85c42c5afc54893102d0d38.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce i04415049.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce i10286750.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce i08852433.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce i50244322.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" i50244322.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4392 884 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 884 a80614746.exe 884 a80614746.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 884 a80614746.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 5012 wrote to memory of 1620 5012 5f558071095f4f97f72828923886a14bab190c9ca85c42c5afc54893102d0d38.exe 80 PID 5012 wrote to memory of 1620 5012 5f558071095f4f97f72828923886a14bab190c9ca85c42c5afc54893102d0d38.exe 80 PID 5012 wrote to memory of 1620 5012 5f558071095f4f97f72828923886a14bab190c9ca85c42c5afc54893102d0d38.exe 80 PID 1620 wrote to memory of 4888 1620 i04415049.exe 81 PID 1620 wrote to memory of 4888 1620 i04415049.exe 81 PID 1620 wrote to memory of 4888 1620 i04415049.exe 81 PID 4888 wrote to memory of 4280 4888 i10286750.exe 82 PID 4888 wrote to memory of 4280 4888 i10286750.exe 82 PID 4888 wrote to memory of 4280 4888 i10286750.exe 82 PID 4280 wrote to memory of 4824 4280 i08852433.exe 83 PID 4280 wrote to memory of 4824 4280 i08852433.exe 83 PID 4280 wrote to memory of 4824 4280 i08852433.exe 83 PID 4824 wrote to memory of 884 4824 i50244322.exe 84 PID 4824 wrote to memory of 884 4824 i50244322.exe 84 PID 4824 wrote to memory of 884 4824 i50244322.exe 84 PID 4824 wrote to memory of 2568 4824 i50244322.exe 93 PID 4824 wrote to memory of 2568 4824 i50244322.exe 93 PID 4824 wrote to memory of 2568 4824 i50244322.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f558071095f4f97f72828923886a14bab190c9ca85c42c5afc54893102d0d38.exe"C:\Users\Admin\AppData\Local\Temp\5f558071095f4f97f72828923886a14bab190c9ca85c42c5afc54893102d0d38.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i04415049.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i04415049.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i10286750.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i10286750.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i08852433.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i08852433.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i50244322.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i50244322.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a80614746.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a80614746.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:884 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 884 -s 10047⤵
- Program crash
PID:4392
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b85160893.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b85160893.exe6⤵
- Executes dropped EXE
PID:2568
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 884 -ip 8841⤵PID:3236
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5da9291527dfdaab551693a783065cf1e
SHA1deea25b69cb569a4e0b9e0d7cd80b94518a0ecfa
SHA2568e9694e53a439d0dde140ecda293ab2e25ac7e00e2ffc7d0b1e7eaf9f81037b2
SHA512e385d48fe141fe7db8c0da32e87ae89e3b8bf71a371b9ca673d0c1288970d0d6b7fd095d8757134036275d03fe3deabb63f65afc5cd8ed46def4e8d6889d56f2
-
Filesize
1.3MB
MD5da9291527dfdaab551693a783065cf1e
SHA1deea25b69cb569a4e0b9e0d7cd80b94518a0ecfa
SHA2568e9694e53a439d0dde140ecda293ab2e25ac7e00e2ffc7d0b1e7eaf9f81037b2
SHA512e385d48fe141fe7db8c0da32e87ae89e3b8bf71a371b9ca673d0c1288970d0d6b7fd095d8757134036275d03fe3deabb63f65afc5cd8ed46def4e8d6889d56f2
-
Filesize
1.1MB
MD5c88369738627119921756e4d100b92be
SHA14c96636a972f6eece28af689e9392f0cae5e2e19
SHA256228e9b9e1311fcbe70b127a25529e1b7b768ad2c772f2466e669e9c4b05eb71f
SHA512f99f26f6afa5d03748ee30c924fb47dee07d5fd772cd2535c246f6133db30a9dabf4970249ab423b3e7df5b5e892130805d28b588d341159916682db599c6a96
-
Filesize
1.1MB
MD5c88369738627119921756e4d100b92be
SHA14c96636a972f6eece28af689e9392f0cae5e2e19
SHA256228e9b9e1311fcbe70b127a25529e1b7b768ad2c772f2466e669e9c4b05eb71f
SHA512f99f26f6afa5d03748ee30c924fb47dee07d5fd772cd2535c246f6133db30a9dabf4970249ab423b3e7df5b5e892130805d28b588d341159916682db599c6a96
-
Filesize
685KB
MD58ec1015040d537731aaccd6927869814
SHA16e1e254a1150c2e5d42783724215cd44bb298f99
SHA2563a7e871b88cec1256c643422f2fe4bff19a4bf98f82b3798428932fc7e9e1d5d
SHA512bd4d8abf1d101b3a1fbe82bba15ca78bc91374d538f712c4703df4aa22d125ee2307b1ea90999d0e927affaf70c423aca120226999f87dde99d459ad742efd95
-
Filesize
685KB
MD58ec1015040d537731aaccd6927869814
SHA16e1e254a1150c2e5d42783724215cd44bb298f99
SHA2563a7e871b88cec1256c643422f2fe4bff19a4bf98f82b3798428932fc7e9e1d5d
SHA512bd4d8abf1d101b3a1fbe82bba15ca78bc91374d538f712c4703df4aa22d125ee2307b1ea90999d0e927affaf70c423aca120226999f87dde99d459ad742efd95
-
Filesize
405KB
MD5fb68a545c47bef8d86fc7fae244cb745
SHA178c00e4aa63d42f0c9f88a16a766072bc01ef64f
SHA25640dab0ca74c5946c8ab487a234fec1ef46555e93d1d01e9200458b8736601d79
SHA5125d31fc637870809e2183a61c4f4897ad32ebdf68dc941852efc0c694d6034450bf59028e30fdee0452538ea428482b1718e8670db3b696e38df2319fcc7599db
-
Filesize
405KB
MD5fb68a545c47bef8d86fc7fae244cb745
SHA178c00e4aa63d42f0c9f88a16a766072bc01ef64f
SHA25640dab0ca74c5946c8ab487a234fec1ef46555e93d1d01e9200458b8736601d79
SHA5125d31fc637870809e2183a61c4f4897ad32ebdf68dc941852efc0c694d6034450bf59028e30fdee0452538ea428482b1718e8670db3b696e38df2319fcc7599db
-
Filesize
345KB
MD54f51b141bd80fd27490866eacbbd1b9d
SHA17a8538e072de6a9135bee8e2385699e076c8cdfa
SHA25674d5e0fd12beef64f224ac393fb04abe498742acabfdea572d33f532156ac05c
SHA512e2f476a944b8108114c337cb77adbc92557975ac14a8c1ecc5745011d40d08c48a1b2b70027d51580d44429c4280b432ce70c73087e1a517b5f148a8e52415dc
-
Filesize
345KB
MD54f51b141bd80fd27490866eacbbd1b9d
SHA17a8538e072de6a9135bee8e2385699e076c8cdfa
SHA25674d5e0fd12beef64f224ac393fb04abe498742acabfdea572d33f532156ac05c
SHA512e2f476a944b8108114c337cb77adbc92557975ac14a8c1ecc5745011d40d08c48a1b2b70027d51580d44429c4280b432ce70c73087e1a517b5f148a8e52415dc
-
Filesize
168KB
MD564d125ef77d19411db5a256e23a99132
SHA1b37fb0a2fa43a28f118064faebe20fea9d7ef3a1
SHA25672005502b374e3ea03a663a20450c5278f69b7b8b98bd566073d98b2aed6b385
SHA512c1483751d034dbd901e6f73140fa7ef29993cee07556af92b8381795b6c22c62d96c82c48e0e95c3328b07331d6a9b9e7e09ff503b4ba9bc340c54dc70225338
-
Filesize
168KB
MD564d125ef77d19411db5a256e23a99132
SHA1b37fb0a2fa43a28f118064faebe20fea9d7ef3a1
SHA25672005502b374e3ea03a663a20450c5278f69b7b8b98bd566073d98b2aed6b385
SHA512c1483751d034dbd901e6f73140fa7ef29993cee07556af92b8381795b6c22c62d96c82c48e0e95c3328b07331d6a9b9e7e09ff503b4ba9bc340c54dc70225338