Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 19:20
Static task
static1
Behavioral task
behavioral1
Sample
bf7f498c8b37077dc3ad38e18b62b6f74b9462f0bda81bccad4b556bf0207143.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bf7f498c8b37077dc3ad38e18b62b6f74b9462f0bda81bccad4b556bf0207143.exe
Resource
win10v2004-20230220-en
General
-
Target
bf7f498c8b37077dc3ad38e18b62b6f74b9462f0bda81bccad4b556bf0207143.exe
-
Size
694KB
-
MD5
dd2d202badee775ea9c9771189f215e3
-
SHA1
62dd322096d3aff4a4d40bbf290bd59e28fa12f0
-
SHA256
bf7f498c8b37077dc3ad38e18b62b6f74b9462f0bda81bccad4b556bf0207143
-
SHA512
e9a04bcaa4387e8797e7baee6d0ccb4be6a7a739dc798dcee791357e6ce26284b74c37af22ee73983e8f4dc362be6dd844faada310e036cdd70220d53cbcb5de
-
SSDEEP
12288:xy908CEt57Vv8Grha375FJ60qlniSVdUN0cRxbPDUBTOYGQBqm9T:xy+e7V0Gda37HJZqlVdUeEb1Y5q8
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/936-994-0x0000000009C40000-0x000000000A258000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 12438575.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 12438575.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 12438575.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 12438575.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 12438575.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 12438575.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 3208 un972163.exe 3684 12438575.exe 936 rk483991.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 12438575.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 12438575.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bf7f498c8b37077dc3ad38e18b62b6f74b9462f0bda81bccad4b556bf0207143.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bf7f498c8b37077dc3ad38e18b62b6f74b9462f0bda81bccad4b556bf0207143.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un972163.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un972163.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3684 12438575.exe 3684 12438575.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3684 12438575.exe Token: SeDebugPrivilege 936 rk483991.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1500 wrote to memory of 3208 1500 bf7f498c8b37077dc3ad38e18b62b6f74b9462f0bda81bccad4b556bf0207143.exe 85 PID 1500 wrote to memory of 3208 1500 bf7f498c8b37077dc3ad38e18b62b6f74b9462f0bda81bccad4b556bf0207143.exe 85 PID 1500 wrote to memory of 3208 1500 bf7f498c8b37077dc3ad38e18b62b6f74b9462f0bda81bccad4b556bf0207143.exe 85 PID 3208 wrote to memory of 3684 3208 un972163.exe 86 PID 3208 wrote to memory of 3684 3208 un972163.exe 86 PID 3208 wrote to memory of 3684 3208 un972163.exe 86 PID 3208 wrote to memory of 936 3208 un972163.exe 91 PID 3208 wrote to memory of 936 3208 un972163.exe 91 PID 3208 wrote to memory of 936 3208 un972163.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf7f498c8b37077dc3ad38e18b62b6f74b9462f0bda81bccad4b556bf0207143.exe"C:\Users\Admin\AppData\Local\Temp\bf7f498c8b37077dc3ad38e18b62b6f74b9462f0bda81bccad4b556bf0207143.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un972163.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un972163.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\12438575.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\12438575.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3684
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk483991.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk483991.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:936
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
540KB
MD5ef29a63423d3871a7796ead771fa4557
SHA1949fb565e75663fef5470926003390be46055a03
SHA2564fd1dbf5fa7440889733db01ea650a29e000e0f4cd878e58cfa9a6dd94e10a66
SHA5129ddb1d4b9cf3502a7d95bd5caa63d9e667cb30e3902bd9a237ce1825a2eaaf14bbe354b5693d1d89d56e8e435a746f5fb9e7c9e5c21ab9368787fab85b41d91d
-
Filesize
540KB
MD5ef29a63423d3871a7796ead771fa4557
SHA1949fb565e75663fef5470926003390be46055a03
SHA2564fd1dbf5fa7440889733db01ea650a29e000e0f4cd878e58cfa9a6dd94e10a66
SHA5129ddb1d4b9cf3502a7d95bd5caa63d9e667cb30e3902bd9a237ce1825a2eaaf14bbe354b5693d1d89d56e8e435a746f5fb9e7c9e5c21ab9368787fab85b41d91d
-
Filesize
258KB
MD5bc4ee02854bd043f990dab2d8ad92db3
SHA160e767841bbf1617040953ef1579ddbb6a0a4566
SHA2560431f69a6764625540bd42d7e60b8bfa540ce3d0bbdf10cb230ae1de1a734f07
SHA51217e706e7f02b4a1ce4b4ce1f78025b7f075d1d11441d98322efebc55f72ee3a6988a7e8d146c1541fc5f1a9b1ccdff4a35a7a2d133a627ded607ecddc724ae3b
-
Filesize
258KB
MD5bc4ee02854bd043f990dab2d8ad92db3
SHA160e767841bbf1617040953ef1579ddbb6a0a4566
SHA2560431f69a6764625540bd42d7e60b8bfa540ce3d0bbdf10cb230ae1de1a734f07
SHA51217e706e7f02b4a1ce4b4ce1f78025b7f075d1d11441d98322efebc55f72ee3a6988a7e8d146c1541fc5f1a9b1ccdff4a35a7a2d133a627ded607ecddc724ae3b
-
Filesize
341KB
MD53a4a31e28202034c475024725a90472b
SHA18ff7a828dcaa0e7acc9cca46f36fb560e999bdda
SHA256fc9d51cd0cd8a32b9d95a5f58ecf94a804a228a8e0da86a3bbe2c52445fae7d3
SHA512c44398b76c03fe3a183208811f0f598bfa094ad16e7408d6dda7fe67590e5f38a26e34094cda3b18f21d5f2335cb9936cc37c1c7096d647f1a69013b3bca7a8a
-
Filesize
341KB
MD53a4a31e28202034c475024725a90472b
SHA18ff7a828dcaa0e7acc9cca46f36fb560e999bdda
SHA256fc9d51cd0cd8a32b9d95a5f58ecf94a804a228a8e0da86a3bbe2c52445fae7d3
SHA512c44398b76c03fe3a183208811f0f598bfa094ad16e7408d6dda7fe67590e5f38a26e34094cda3b18f21d5f2335cb9936cc37c1c7096d647f1a69013b3bca7a8a