Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 19:31
Static task
static1
Behavioral task
behavioral1
Sample
c611eb80a876b934b7baffd23e8a7e59f30bb852aa5dfe4881a47520ded23ff2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c611eb80a876b934b7baffd23e8a7e59f30bb852aa5dfe4881a47520ded23ff2.exe
Resource
win10v2004-20230220-en
General
-
Target
c611eb80a876b934b7baffd23e8a7e59f30bb852aa5dfe4881a47520ded23ff2.exe
-
Size
642KB
-
MD5
88040981837527a7f29adc05c8e6a69a
-
SHA1
ad13a009dd0ba88e46f074b5416a4479021b9a3d
-
SHA256
c611eb80a876b934b7baffd23e8a7e59f30bb852aa5dfe4881a47520ded23ff2
-
SHA512
91ab171c695adfd2a2d51e51fc1fb800759096bb89b31222c441d223c033499af9f01014c75cd16590041caaba5ad3ba2e45935aca8df4e895131056e3f20ec7
-
SSDEEP
12288:zy90fBeV4r4p4YNPH4WMXtj17Y92LSyzHcXIwZZa94UWW873:zygW49kAWMN17cWcYwZzP73
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1928-980-0x0000000009C50000-0x000000000A268000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 09697423.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 09697423.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 09697423.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 09697423.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 09697423.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 09697423.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4460 st839475.exe 1036 09697423.exe 1928 kp597773.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 09697423.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 09697423.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c611eb80a876b934b7baffd23e8a7e59f30bb852aa5dfe4881a47520ded23ff2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st839475.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st839475.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce c611eb80a876b934b7baffd23e8a7e59f30bb852aa5dfe4881a47520ded23ff2.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1036 09697423.exe 1036 09697423.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1036 09697423.exe Token: SeDebugPrivilege 1928 kp597773.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1072 wrote to memory of 4460 1072 c611eb80a876b934b7baffd23e8a7e59f30bb852aa5dfe4881a47520ded23ff2.exe 83 PID 1072 wrote to memory of 4460 1072 c611eb80a876b934b7baffd23e8a7e59f30bb852aa5dfe4881a47520ded23ff2.exe 83 PID 1072 wrote to memory of 4460 1072 c611eb80a876b934b7baffd23e8a7e59f30bb852aa5dfe4881a47520ded23ff2.exe 83 PID 4460 wrote to memory of 1036 4460 st839475.exe 84 PID 4460 wrote to memory of 1036 4460 st839475.exe 84 PID 4460 wrote to memory of 1036 4460 st839475.exe 84 PID 4460 wrote to memory of 1928 4460 st839475.exe 85 PID 4460 wrote to memory of 1928 4460 st839475.exe 85 PID 4460 wrote to memory of 1928 4460 st839475.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\c611eb80a876b934b7baffd23e8a7e59f30bb852aa5dfe4881a47520ded23ff2.exe"C:\Users\Admin\AppData\Local\Temp\c611eb80a876b934b7baffd23e8a7e59f30bb852aa5dfe4881a47520ded23ff2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st839475.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st839475.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\09697423.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\09697423.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1036
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp597773.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp597773.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
488KB
MD50a20ed3960b6ea68230e1b1ef4ca7609
SHA11c01946a35831e374a41d54cb2e38de373a88b02
SHA256c30e70f2866a788ec6ba5147ec45aec8d414e02d82d1ac28712d244ffa4bf797
SHA51221ad13f2eacd220f1dacb492ab15feb412bc20b17c59c2df115828b1b89e4da34b07e34b41859db9b567422bd6d10e6441ce4923a98c8444d946d3db20091704
-
Filesize
488KB
MD50a20ed3960b6ea68230e1b1ef4ca7609
SHA11c01946a35831e374a41d54cb2e38de373a88b02
SHA256c30e70f2866a788ec6ba5147ec45aec8d414e02d82d1ac28712d244ffa4bf797
SHA51221ad13f2eacd220f1dacb492ab15feb412bc20b17c59c2df115828b1b89e4da34b07e34b41859db9b567422bd6d10e6441ce4923a98c8444d946d3db20091704
-
Filesize
176KB
MD52b71f4b18ac8214a2bff547b6ce2f64f
SHA1b8f2f25139a7b2e8d5e8fbc024eb5cac518bc6a5
SHA256f7eedf3aec775a62c265d1652686b30a8a45a953523e2fb3cfc1fac3c6a66fbc
SHA51233518eff768610bf54f9888d9d0d746b0c3500dc5f2b8fd5f1641d5a264f657a8311b40364f70932512581183b244fec3feb535e21c13e0ec8adec9994175177
-
Filesize
176KB
MD52b71f4b18ac8214a2bff547b6ce2f64f
SHA1b8f2f25139a7b2e8d5e8fbc024eb5cac518bc6a5
SHA256f7eedf3aec775a62c265d1652686b30a8a45a953523e2fb3cfc1fac3c6a66fbc
SHA51233518eff768610bf54f9888d9d0d746b0c3500dc5f2b8fd5f1641d5a264f657a8311b40364f70932512581183b244fec3feb535e21c13e0ec8adec9994175177
-
Filesize
340KB
MD546eaf2c3f351bdab7e45b454cc11de26
SHA1b12e19e479bb782775378dac735d391150b01b74
SHA256a74f03bb2aafc600a2193cd41907739e75aa3786bc130416b7c29e0dc5ed1b13
SHA512e926bf0ca247c3f9ad58b028daddf5d255e1d54d919deb264cd3f146c0cdaf8fe97e02011991adc39d728ddad82fb2ee2f2416a42f2892a027277e53ca8940af
-
Filesize
340KB
MD546eaf2c3f351bdab7e45b454cc11de26
SHA1b12e19e479bb782775378dac735d391150b01b74
SHA256a74f03bb2aafc600a2193cd41907739e75aa3786bc130416b7c29e0dc5ed1b13
SHA512e926bf0ca247c3f9ad58b028daddf5d255e1d54d919deb264cd3f146c0cdaf8fe97e02011991adc39d728ddad82fb2ee2f2416a42f2892a027277e53ca8940af