Analysis
-
max time kernel
219s -
max time network
229s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 19:16
Static task
static1
Behavioral task
behavioral1
Sample
bc6b2c6478f7462db0ef9d954aee580e3d83ecb8da646316804a3dce11e09716.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
bc6b2c6478f7462db0ef9d954aee580e3d83ecb8da646316804a3dce11e09716.exe
Resource
win10v2004-20230221-en
General
-
Target
bc6b2c6478f7462db0ef9d954aee580e3d83ecb8da646316804a3dce11e09716.exe
-
Size
1.0MB
-
MD5
c24465100d43503a13a1de45a091a1d8
-
SHA1
b17c6a3cdf29dc916ef8fb82fcdeeac62b307694
-
SHA256
bc6b2c6478f7462db0ef9d954aee580e3d83ecb8da646316804a3dce11e09716
-
SHA512
1f036f7d03250f3903d3409c5a22a49f6f34eaf7169109198d4a359fc6fe285a071b71c228a9d0b593ed6bca5e44402486319aacd0742ba2e37b3b267a8ee42e
-
SSDEEP
12288:Zy90pEvZe7nT2lGVKvpgz1QwWoEVTlA7DjxvU8zKHLIxdclgWG6VDbWh1h/Qu6gE:Zyhe7l1fa5spU8zEaml2CH8z/QJOu
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1236-997-0x00000000078F0000-0x0000000007F08000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 197294511.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 197294511.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 197294511.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 197294511.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 197294511.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 197294511.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 340 RS103643.exe 1584 ZI764762.exe 4624 197294511.exe 1236 249998071.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 197294511.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 197294511.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" RS103643.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ZI764762.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ZI764762.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce bc6b2c6478f7462db0ef9d954aee580e3d83ecb8da646316804a3dce11e09716.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bc6b2c6478f7462db0ef9d954aee580e3d83ecb8da646316804a3dce11e09716.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce RS103643.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4624 197294511.exe 4624 197294511.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4624 197294511.exe Token: SeDebugPrivilege 1236 249998071.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3116 wrote to memory of 340 3116 bc6b2c6478f7462db0ef9d954aee580e3d83ecb8da646316804a3dce11e09716.exe 80 PID 3116 wrote to memory of 340 3116 bc6b2c6478f7462db0ef9d954aee580e3d83ecb8da646316804a3dce11e09716.exe 80 PID 3116 wrote to memory of 340 3116 bc6b2c6478f7462db0ef9d954aee580e3d83ecb8da646316804a3dce11e09716.exe 80 PID 340 wrote to memory of 1584 340 RS103643.exe 81 PID 340 wrote to memory of 1584 340 RS103643.exe 81 PID 340 wrote to memory of 1584 340 RS103643.exe 81 PID 1584 wrote to memory of 4624 1584 ZI764762.exe 82 PID 1584 wrote to memory of 4624 1584 ZI764762.exe 82 PID 1584 wrote to memory of 4624 1584 ZI764762.exe 82 PID 1584 wrote to memory of 1236 1584 ZI764762.exe 83 PID 1584 wrote to memory of 1236 1584 ZI764762.exe 83 PID 1584 wrote to memory of 1236 1584 ZI764762.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc6b2c6478f7462db0ef9d954aee580e3d83ecb8da646316804a3dce11e09716.exe"C:\Users\Admin\AppData\Local\Temp\bc6b2c6478f7462db0ef9d954aee580e3d83ecb8da646316804a3dce11e09716.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RS103643.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\RS103643.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ZI764762.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ZI764762.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\197294511.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\197294511.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4624
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\249998071.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\249998071.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1236
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
770KB
MD508e4f0c55be17a256b1e3c11900f60c9
SHA174fb8a1d7f24543732f2b4130159cd9967c8a1ce
SHA256650200ac93464fef3e9afe8e1e91e7206fd147241ca041d45d781778359e5793
SHA5126934aaf69a09e78786ae521e1512fbcb14a84d424fc18d28ad0d6cc72a7fcbd30eaf56a5947ec23e25ad7f8d7a410f302d353009adf8bb2105c2ec2a261aaae2
-
Filesize
770KB
MD508e4f0c55be17a256b1e3c11900f60c9
SHA174fb8a1d7f24543732f2b4130159cd9967c8a1ce
SHA256650200ac93464fef3e9afe8e1e91e7206fd147241ca041d45d781778359e5793
SHA5126934aaf69a09e78786ae521e1512fbcb14a84d424fc18d28ad0d6cc72a7fcbd30eaf56a5947ec23e25ad7f8d7a410f302d353009adf8bb2105c2ec2a261aaae2
-
Filesize
598KB
MD5457ffb6790af160bb4ee266a0775ca17
SHA1279ec9ab4d7dae0ece4eca3a421c40c125d19048
SHA25621b6b593b64843a3e5503f96d369862d87c924de8efeac946e57233fc2defade
SHA51216ddcca970aa6b5c63bf4753d00e63b27d08719b1496a56c23a8b606c2fe6ed5633377949887b61908cc6593370f85ebefbf353b0744df0e3d9a324f5293f48e
-
Filesize
598KB
MD5457ffb6790af160bb4ee266a0775ca17
SHA1279ec9ab4d7dae0ece4eca3a421c40c125d19048
SHA25621b6b593b64843a3e5503f96d369862d87c924de8efeac946e57233fc2defade
SHA51216ddcca970aa6b5c63bf4753d00e63b27d08719b1496a56c23a8b606c2fe6ed5633377949887b61908cc6593370f85ebefbf353b0744df0e3d9a324f5293f48e
-
Filesize
390KB
MD5b05707c4da4faf3cb1031d6536be5e96
SHA12e2cbcbe7de3bef64857427e5502947136fe65ad
SHA2568503741dc35685ee12be49f49e91e934cd125076ee67cc9b5de4023b2e2593ad
SHA5127a6d76eb85e1c9e557ee76666c4eb6afba56c8c5b3e439287d602a43b539967fe4efb9b6f900882b35d7803cfe274a425506b8d7f20d9201d62d773c1bcf7948
-
Filesize
390KB
MD5b05707c4da4faf3cb1031d6536be5e96
SHA12e2cbcbe7de3bef64857427e5502947136fe65ad
SHA2568503741dc35685ee12be49f49e91e934cd125076ee67cc9b5de4023b2e2593ad
SHA5127a6d76eb85e1c9e557ee76666c4eb6afba56c8c5b3e439287d602a43b539967fe4efb9b6f900882b35d7803cfe274a425506b8d7f20d9201d62d773c1bcf7948
-
Filesize
473KB
MD54bcab34d0ce5c714fd1cd918a5a74be6
SHA171e7c548e4ae903e57f379d41d5028d4af5f96e8
SHA256238fc5169139e8d50e176fe6cb4e8433a7a5eebe323823485c03996e70851067
SHA5124236877abfda7ae28fc65383e8d4ee57b33365d26797c55efc9cc94331ce063aa0b57c2b9eeda41b28ffeac4a1e79f09d944e73b090d2188f0d00c8af79e6fc0
-
Filesize
473KB
MD54bcab34d0ce5c714fd1cd918a5a74be6
SHA171e7c548e4ae903e57f379d41d5028d4af5f96e8
SHA256238fc5169139e8d50e176fe6cb4e8433a7a5eebe323823485c03996e70851067
SHA5124236877abfda7ae28fc65383e8d4ee57b33365d26797c55efc9cc94331ce063aa0b57c2b9eeda41b28ffeac4a1e79f09d944e73b090d2188f0d00c8af79e6fc0