Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 18:40
Static task
static1
Behavioral task
behavioral1
Sample
9ce4574e9ae6006efe4680835041cae023030a713a26012d96080a7500c6efab.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9ce4574e9ae6006efe4680835041cae023030a713a26012d96080a7500c6efab.exe
Resource
win10v2004-20230220-en
General
-
Target
9ce4574e9ae6006efe4680835041cae023030a713a26012d96080a7500c6efab.exe
-
Size
618KB
-
MD5
c60401df68c5cf954bee44d163328b81
-
SHA1
5576a174ab2bd07ba9f0bb700066fb03b7f66b19
-
SHA256
9ce4574e9ae6006efe4680835041cae023030a713a26012d96080a7500c6efab
-
SHA512
5274cf4ba857fdc8a1255c7a17038f5cc98f0fa920d54d0166152679d99669872eae6d494b0b03b70654f1394b82c53ca349bb4a637801f35f2a73e7dda5a34b
-
SSDEEP
12288:iy908XhvpYIP8bwNtFKZTKImkaAIdezohF51V:iy7xRpgwNTKZTKiaDDhFzV
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/380-950-0x0000000007990000-0x0000000007FA8000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 73089242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 73089242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 73089242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 73089242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 73089242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 73089242.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1880 st765991.exe 4520 73089242.exe 380 kp234658.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 73089242.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st765991.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st765991.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9ce4574e9ae6006efe4680835041cae023030a713a26012d96080a7500c6efab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9ce4574e9ae6006efe4680835041cae023030a713a26012d96080a7500c6efab.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4520 73089242.exe 4520 73089242.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4520 73089242.exe Token: SeDebugPrivilege 380 kp234658.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1912 wrote to memory of 1880 1912 9ce4574e9ae6006efe4680835041cae023030a713a26012d96080a7500c6efab.exe 83 PID 1912 wrote to memory of 1880 1912 9ce4574e9ae6006efe4680835041cae023030a713a26012d96080a7500c6efab.exe 83 PID 1912 wrote to memory of 1880 1912 9ce4574e9ae6006efe4680835041cae023030a713a26012d96080a7500c6efab.exe 83 PID 1880 wrote to memory of 4520 1880 st765991.exe 84 PID 1880 wrote to memory of 4520 1880 st765991.exe 84 PID 1880 wrote to memory of 380 1880 st765991.exe 86 PID 1880 wrote to memory of 380 1880 st765991.exe 86 PID 1880 wrote to memory of 380 1880 st765991.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ce4574e9ae6006efe4680835041cae023030a713a26012d96080a7500c6efab.exe"C:\Users\Admin\AppData\Local\Temp\9ce4574e9ae6006efe4680835041cae023030a713a26012d96080a7500c6efab.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st765991.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st765991.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\73089242.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\73089242.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4520
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp234658.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp234658.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:380
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
463KB
MD5d2e89d9f3c4a35cb4bd1fef7ed799193
SHA1ffe6050de372c651c831e44dc83ef5f159237eda
SHA2566cbcfb355ef21e7bd1b43d51d17a8dfe9160ae1e59af081272641d0f313033aa
SHA5125bde03322889676088e1dfc7af133d046cc3e9e287594769cde6734aa447861d735b69d1d329cac159edd78805c0ca4901a6410202ceca58dd501c6537a36179
-
Filesize
463KB
MD5d2e89d9f3c4a35cb4bd1fef7ed799193
SHA1ffe6050de372c651c831e44dc83ef5f159237eda
SHA2566cbcfb355ef21e7bd1b43d51d17a8dfe9160ae1e59af081272641d0f313033aa
SHA5125bde03322889676088e1dfc7af133d046cc3e9e287594769cde6734aa447861d735b69d1d329cac159edd78805c0ca4901a6410202ceca58dd501c6537a36179
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
473KB
MD5e495c5b12886065a3e33095af21184a4
SHA1ec5989e2429736b2539f62a299ea0e1a9ef46091
SHA256c81848c12da1e08b9d7a477e76956b3daeb091ecf10e57d4d4ac755477837821
SHA5126aa3d343c441c3e5dc8a81ad40b36d26c2f017c647d4f8efbc8374b9989627c6893eb508aa4de4eef2e1b37ec9ab0fcdb61dd182800797b0ccd7eab36d339837
-
Filesize
473KB
MD5e495c5b12886065a3e33095af21184a4
SHA1ec5989e2429736b2539f62a299ea0e1a9ef46091
SHA256c81848c12da1e08b9d7a477e76956b3daeb091ecf10e57d4d4ac755477837821
SHA5126aa3d343c441c3e5dc8a81ad40b36d26c2f017c647d4f8efbc8374b9989627c6893eb508aa4de4eef2e1b37ec9ab0fcdb61dd182800797b0ccd7eab36d339837