Analysis
-
max time kernel
345s -
max time network
442s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 18:43
Static task
static1
Behavioral task
behavioral1
Sample
9fa7b13610b981c7cd872e514c3e930df25002eab3ee5c4e9c744d2995e9b785.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9fa7b13610b981c7cd872e514c3e930df25002eab3ee5c4e9c744d2995e9b785.exe
Resource
win10v2004-20230221-en
General
-
Target
9fa7b13610b981c7cd872e514c3e930df25002eab3ee5c4e9c744d2995e9b785.exe
-
Size
1.1MB
-
MD5
78759a370d9984c95c657c515369afb6
-
SHA1
bd2239398fc00e030df52bd235e5cc2d220bd742
-
SHA256
9fa7b13610b981c7cd872e514c3e930df25002eab3ee5c4e9c744d2995e9b785
-
SHA512
c31446fc19b703bad33d35b825f82d5f3c9321fca6edffc36efc9aa81efbe306d4746c16c3927604db9b68f924b9f95a3682cbd3ada1af360a26063e92e19281
-
SSDEEP
24576:cy4ZlrwSR0Y397zpteD91pZAcEFtqWvduVlD3e1YgFB9Ud6zZmSM:L6lrwSR0Y39npID91pZOqWFuHD3+FB9n
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1840-155-0x00000000078F0000-0x0000000007F08000-memory.dmp redline_stealer -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2672 y4948776.exe 2908 y0119048.exe 1840 k9610519.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y4948776.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y4948776.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y0119048.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y0119048.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9fa7b13610b981c7cd872e514c3e930df25002eab3ee5c4e9c744d2995e9b785.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9fa7b13610b981c7cd872e514c3e930df25002eab3ee5c4e9c744d2995e9b785.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4776 wrote to memory of 2672 4776 9fa7b13610b981c7cd872e514c3e930df25002eab3ee5c4e9c744d2995e9b785.exe 77 PID 4776 wrote to memory of 2672 4776 9fa7b13610b981c7cd872e514c3e930df25002eab3ee5c4e9c744d2995e9b785.exe 77 PID 4776 wrote to memory of 2672 4776 9fa7b13610b981c7cd872e514c3e930df25002eab3ee5c4e9c744d2995e9b785.exe 77 PID 2672 wrote to memory of 2908 2672 y4948776.exe 78 PID 2672 wrote to memory of 2908 2672 y4948776.exe 78 PID 2672 wrote to memory of 2908 2672 y4948776.exe 78 PID 2908 wrote to memory of 1840 2908 y0119048.exe 79 PID 2908 wrote to memory of 1840 2908 y0119048.exe 79 PID 2908 wrote to memory of 1840 2908 y0119048.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fa7b13610b981c7cd872e514c3e930df25002eab3ee5c4e9c744d2995e9b785.exe"C:\Users\Admin\AppData\Local\Temp\9fa7b13610b981c7cd872e514c3e930df25002eab3ee5c4e9c744d2995e9b785.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4948776.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4948776.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0119048.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0119048.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k9610519.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k9610519.exe4⤵
- Executes dropped EXE
PID:1840
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
598KB
MD51cd8e6a9c08cd921458e124226ea121f
SHA1406dea461ad0b7d5da11a0b681a1d898a6644f8a
SHA25669d0f6857c2db347dd537bf87ae7e99553f1233d9d9635e301a214f79b24bffc
SHA51259f1b3fd6de68e362d60e61dd9007b4321868209964c167a0bce836e103f9995ffc71b984919e5a2ed128d324d003ece1b174d89cf976132ba75650bf3b68805
-
Filesize
598KB
MD51cd8e6a9c08cd921458e124226ea121f
SHA1406dea461ad0b7d5da11a0b681a1d898a6644f8a
SHA25669d0f6857c2db347dd537bf87ae7e99553f1233d9d9635e301a214f79b24bffc
SHA51259f1b3fd6de68e362d60e61dd9007b4321868209964c167a0bce836e103f9995ffc71b984919e5a2ed128d324d003ece1b174d89cf976132ba75650bf3b68805
-
Filesize
395KB
MD578cc7b8cf45e9a68fa86816fb2592267
SHA1dd49c216f5f1aa3c17970d86310ebbceb02f3d23
SHA256bcaebea9a78e984456e04f672c48f1997561c3f394ee033d03df1b13548962ca
SHA51250595437e9ff94a80175d5fa2b5ef51dba70aca1f30a8230e46b162e545014ef87f75518e347c9512cf5fa965ece3687c0b0f63e25258a87c148aa9953ef7afb
-
Filesize
395KB
MD578cc7b8cf45e9a68fa86816fb2592267
SHA1dd49c216f5f1aa3c17970d86310ebbceb02f3d23
SHA256bcaebea9a78e984456e04f672c48f1997561c3f394ee033d03df1b13548962ca
SHA51250595437e9ff94a80175d5fa2b5ef51dba70aca1f30a8230e46b162e545014ef87f75518e347c9512cf5fa965ece3687c0b0f63e25258a87c148aa9953ef7afb
-
Filesize
137KB
MD543272bd97716dbae4385a467df1cb91c
SHA17b5af319b6ffcdf8dbf585b941e0c01ca1cda775
SHA25681b7f168a6562dcd08248a9dc11f0f151811657e4684c6f912c174dd07cd3b66
SHA51268957caf3b8546d8575e1fa29ce6ce9855c65e3887226141e1f29235f1aabe6cb83bbb1eae3ed93c728ad96074c1c3f9cb26532b3e892e96a7122da18fb9284a
-
Filesize
137KB
MD543272bd97716dbae4385a467df1cb91c
SHA17b5af319b6ffcdf8dbf585b941e0c01ca1cda775
SHA25681b7f168a6562dcd08248a9dc11f0f151811657e4684c6f912c174dd07cd3b66
SHA51268957caf3b8546d8575e1fa29ce6ce9855c65e3887226141e1f29235f1aabe6cb83bbb1eae3ed93c728ad96074c1c3f9cb26532b3e892e96a7122da18fb9284a