Analysis
-
max time kernel
157s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 18:14
Static task
static1
Behavioral task
behavioral1
Sample
26a8200a6884f82e07b85f103467ee3d72854c14655af3bba15e7905103dc078.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
26a8200a6884f82e07b85f103467ee3d72854c14655af3bba15e7905103dc078.exe
Resource
win10v2004-20230220-en
General
-
Target
26a8200a6884f82e07b85f103467ee3d72854c14655af3bba15e7905103dc078.exe
-
Size
308KB
-
MD5
e5ccca4856f60651c62e9b9db3ac7a82
-
SHA1
caf5368ae43b366b31036c4270a88d56ba8231b6
-
SHA256
26a8200a6884f82e07b85f103467ee3d72854c14655af3bba15e7905103dc078
-
SHA512
432fda43f2e936adf9aa5781747eb756a82665bc3fcdf77f511a60c4d25da3e71550b486a600d2fa60e43642f9bb957375a4bba29db0f6c24357a0f6fda3bc9f
-
SSDEEP
6144:K1y+bnr+/p0yN90QEYlEY+zbPsR4JDFR7wCv7TJbOLuUXEe:nMrby90Gb+zKeYwJbOae
Malware Config
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4084-177-0x0000000007FF0000-0x0000000008608000-memory.dmp redline_stealer behavioral2/memory/4084-182-0x0000000007E90000-0x0000000007EF6000-memory.dmp redline_stealer behavioral2/memory/4084-187-0x0000000009570000-0x0000000009732000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" g3644476.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" g3644476.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" g3644476.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" g3644476.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection g3644476.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" g3644476.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 2 IoCs
pid Process 2684 g3644476.exe 4084 h4655576.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features g3644476.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" g3644476.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 26a8200a6884f82e07b85f103467ee3d72854c14655af3bba15e7905103dc078.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 26a8200a6884f82e07b85f103467ee3d72854c14655af3bba15e7905103dc078.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2684 g3644476.exe 2684 g3644476.exe 4084 h4655576.exe 4084 h4655576.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2684 g3644476.exe Token: SeDebugPrivilege 4084 h4655576.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1564 wrote to memory of 2684 1564 26a8200a6884f82e07b85f103467ee3d72854c14655af3bba15e7905103dc078.exe 82 PID 1564 wrote to memory of 2684 1564 26a8200a6884f82e07b85f103467ee3d72854c14655af3bba15e7905103dc078.exe 82 PID 1564 wrote to memory of 2684 1564 26a8200a6884f82e07b85f103467ee3d72854c14655af3bba15e7905103dc078.exe 82 PID 1564 wrote to memory of 4084 1564 26a8200a6884f82e07b85f103467ee3d72854c14655af3bba15e7905103dc078.exe 84 PID 1564 wrote to memory of 4084 1564 26a8200a6884f82e07b85f103467ee3d72854c14655af3bba15e7905103dc078.exe 84 PID 1564 wrote to memory of 4084 1564 26a8200a6884f82e07b85f103467ee3d72854c14655af3bba15e7905103dc078.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\26a8200a6884f82e07b85f103467ee3d72854c14655af3bba15e7905103dc078.exe"C:\Users\Admin\AppData\Local\Temp\26a8200a6884f82e07b85f103467ee3d72854c14655af3bba15e7905103dc078.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g3644476.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g3644476.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\h4655576.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\h4655576.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4084
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD58ad9ebb607ade3b8efcdefe8ee8f6061
SHA1c0f7cfa513438e078f9244e1f1a547587bac1bae
SHA256b726f60be2e4d913ef91697172269c89febacb96b53874acda76f27025d7af3e
SHA5126f9520c09c872612a870305b02c190e4e6fc3b0fe826d35c8a2d726e665bed418b31d1aaedbacaa7449ffda986de660be46a8cc668b8992e6bba3828ec59b4a9
-
Filesize
176KB
MD58ad9ebb607ade3b8efcdefe8ee8f6061
SHA1c0f7cfa513438e078f9244e1f1a547587bac1bae
SHA256b726f60be2e4d913ef91697172269c89febacb96b53874acda76f27025d7af3e
SHA5126f9520c09c872612a870305b02c190e4e6fc3b0fe826d35c8a2d726e665bed418b31d1aaedbacaa7449ffda986de660be46a8cc668b8992e6bba3828ec59b4a9
-
Filesize
136KB
MD5f1bf39c66cabfea2224d9e8841fee124
SHA15d91d1baab417c343ec36487edf5f804781ff8fb
SHA256a62c87c9784eb87c3a5ca307ac57a52aa3b8347682e96276952f42dd6aac15cf
SHA5122faa49b5d037aa7b79f4762843f7d93f1c0044245bace6295247c8013054cc0766ca0edb2714a4119578d99a3f8753326e0b7c2fe0ea6bc720377a1f085c179e
-
Filesize
136KB
MD5f1bf39c66cabfea2224d9e8841fee124
SHA15d91d1baab417c343ec36487edf5f804781ff8fb
SHA256a62c87c9784eb87c3a5ca307ac57a52aa3b8347682e96276952f42dd6aac15cf
SHA5122faa49b5d037aa7b79f4762843f7d93f1c0044245bace6295247c8013054cc0766ca0edb2714a4119578d99a3f8753326e0b7c2fe0ea6bc720377a1f085c179e