Analysis
-
max time kernel
151s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 18:50
Static task
static1
Behavioral task
behavioral1
Sample
a5eb2f0b1ca214b4979f1ab80afdb234fd2a5250dcbaaf5945cf7e58be787dd4.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a5eb2f0b1ca214b4979f1ab80afdb234fd2a5250dcbaaf5945cf7e58be787dd4.exe
Resource
win10v2004-20230220-en
General
-
Target
a5eb2f0b1ca214b4979f1ab80afdb234fd2a5250dcbaaf5945cf7e58be787dd4.exe
-
Size
674KB
-
MD5
57010affc0dc3cfded0cb04b499857ca
-
SHA1
7bc7c28e0dca80c0f33274d05b710be6e19b0d99
-
SHA256
a5eb2f0b1ca214b4979f1ab80afdb234fd2a5250dcbaaf5945cf7e58be787dd4
-
SHA512
b6a367528798a1c04b530bf936e1b144b867cd1ef237effd9c12275fcfc3bac7fbacd6fdfc34804ba9a0a950df69abd505fe09cffe28cd51b6c63b2ee15fea12
-
SSDEEP
12288:oy90FtWi7tJaPcMaF+9rfq3f5P9fBPVtWDyVjqGOtzI:oystWi7tJaPmkS3fh9LtkyIlI
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3440-983-0x0000000007550000-0x0000000007B68000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 53914821.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 53914821.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 53914821.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 53914821.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 53914821.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 53914821.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1096 st237151.exe 1596 53914821.exe 3440 kp018076.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 53914821.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 53914821.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a5eb2f0b1ca214b4979f1ab80afdb234fd2a5250dcbaaf5945cf7e58be787dd4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a5eb2f0b1ca214b4979f1ab80afdb234fd2a5250dcbaaf5945cf7e58be787dd4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st237151.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st237151.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1596 53914821.exe 1596 53914821.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1596 53914821.exe Token: SeDebugPrivilege 3440 kp018076.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2016 wrote to memory of 1096 2016 a5eb2f0b1ca214b4979f1ab80afdb234fd2a5250dcbaaf5945cf7e58be787dd4.exe 79 PID 2016 wrote to memory of 1096 2016 a5eb2f0b1ca214b4979f1ab80afdb234fd2a5250dcbaaf5945cf7e58be787dd4.exe 79 PID 2016 wrote to memory of 1096 2016 a5eb2f0b1ca214b4979f1ab80afdb234fd2a5250dcbaaf5945cf7e58be787dd4.exe 79 PID 1096 wrote to memory of 1596 1096 st237151.exe 80 PID 1096 wrote to memory of 1596 1096 st237151.exe 80 PID 1096 wrote to memory of 1596 1096 st237151.exe 80 PID 1096 wrote to memory of 3440 1096 st237151.exe 86 PID 1096 wrote to memory of 3440 1096 st237151.exe 86 PID 1096 wrote to memory of 3440 1096 st237151.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5eb2f0b1ca214b4979f1ab80afdb234fd2a5250dcbaaf5945cf7e58be787dd4.exe"C:\Users\Admin\AppData\Local\Temp\a5eb2f0b1ca214b4979f1ab80afdb234fd2a5250dcbaaf5945cf7e58be787dd4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st237151.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st237151.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\53914821.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\53914821.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp018076.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp018076.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3440
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
520KB
MD5c3c623acfcb13bebef91d25db9db3af8
SHA19cb545076de899e0d6574f7269fd2dd58c54ae60
SHA2566fa01861ccb17bb28083dbe1a26e8a08085d3c3b0226793ae63c20dbed472569
SHA51224f55582853da26a541550ee7386dc95a7e583ae73398d3059b4871bce8926f40072d06545b4b16a0dea5975730a32dfce6aea33fd1b95149e2afd76e1c42e70
-
Filesize
520KB
MD5c3c623acfcb13bebef91d25db9db3af8
SHA19cb545076de899e0d6574f7269fd2dd58c54ae60
SHA2566fa01861ccb17bb28083dbe1a26e8a08085d3c3b0226793ae63c20dbed472569
SHA51224f55582853da26a541550ee7386dc95a7e583ae73398d3059b4871bce8926f40072d06545b4b16a0dea5975730a32dfce6aea33fd1b95149e2afd76e1c42e70
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
416KB
MD5bf66208d7f588ae760bcac6be9690508
SHA1788158d62adec2e66462650f7181f59ecdc8d3f6
SHA256c4a8e80e305014533d5ae82ce082a039423831761b1f5326dc93ce94eac27331
SHA512f8ade36927262f9c4777823fc0c27c3c251036e81369f8594b82e339b365f17e023c7595d3c68b8d945bafa57e21a8af15ac3d58fc5dcac33ce3e9560010f2fd
-
Filesize
416KB
MD5bf66208d7f588ae760bcac6be9690508
SHA1788158d62adec2e66462650f7181f59ecdc8d3f6
SHA256c4a8e80e305014533d5ae82ce082a039423831761b1f5326dc93ce94eac27331
SHA512f8ade36927262f9c4777823fc0c27c3c251036e81369f8594b82e339b365f17e023c7595d3c68b8d945bafa57e21a8af15ac3d58fc5dcac33ce3e9560010f2fd