Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 20:28
Static task
static1
Behavioral task
behavioral1
Sample
f2d26d2fa68a5f9850e3e1d79d9c62a4531888891f61891328edec2d6221b57f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f2d26d2fa68a5f9850e3e1d79d9c62a4531888891f61891328edec2d6221b57f.exe
Resource
win10v2004-20230220-en
General
-
Target
f2d26d2fa68a5f9850e3e1d79d9c62a4531888891f61891328edec2d6221b57f.exe
-
Size
651KB
-
MD5
9d29e233066402a26914183371a7bb34
-
SHA1
03db3e5ded98c2245c166290ee9b227be78684bc
-
SHA256
f2d26d2fa68a5f9850e3e1d79d9c62a4531888891f61891328edec2d6221b57f
-
SHA512
c360a802d0ac05f7f1e66569481eb18557f8d043f550406e70c98aedae4d3af3817cfd4c869d9de4c99c4a74d9ec64570c058198fa85efee7f902e797240642d
-
SSDEEP
12288:Vy90iyGwfbmQZ+3qwQP7tKvRUOXdpbGDYFATqnd/ks:VyxQaFKPpKJpbGUqT0/ks
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/552-982-0x0000000007530000-0x0000000007B48000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 37103057.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 37103057.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 37103057.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 37103057.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 37103057.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 37103057.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2132 st533925.exe 2808 37103057.exe 552 kp395774.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 37103057.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 37103057.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f2d26d2fa68a5f9850e3e1d79d9c62a4531888891f61891328edec2d6221b57f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st533925.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st533925.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f2d26d2fa68a5f9850e3e1d79d9c62a4531888891f61891328edec2d6221b57f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2808 37103057.exe 2808 37103057.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2808 37103057.exe Token: SeDebugPrivilege 552 kp395774.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4052 wrote to memory of 2132 4052 f2d26d2fa68a5f9850e3e1d79d9c62a4531888891f61891328edec2d6221b57f.exe 82 PID 4052 wrote to memory of 2132 4052 f2d26d2fa68a5f9850e3e1d79d9c62a4531888891f61891328edec2d6221b57f.exe 82 PID 4052 wrote to memory of 2132 4052 f2d26d2fa68a5f9850e3e1d79d9c62a4531888891f61891328edec2d6221b57f.exe 82 PID 2132 wrote to memory of 2808 2132 st533925.exe 83 PID 2132 wrote to memory of 2808 2132 st533925.exe 83 PID 2132 wrote to memory of 2808 2132 st533925.exe 83 PID 2132 wrote to memory of 552 2132 st533925.exe 89 PID 2132 wrote to memory of 552 2132 st533925.exe 89 PID 2132 wrote to memory of 552 2132 st533925.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2d26d2fa68a5f9850e3e1d79d9c62a4531888891f61891328edec2d6221b57f.exe"C:\Users\Admin\AppData\Local\Temp\f2d26d2fa68a5f9850e3e1d79d9c62a4531888891f61891328edec2d6221b57f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st533925.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st533925.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\37103057.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\37103057.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp395774.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp395774.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:552
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
497KB
MD5598b3aefb85f49218384519e0b346d9e
SHA1345ec2f195fce61c91c06d49cb350bb2c0b1b033
SHA2564c5a962fe2c9fe080f70d0ff9ba65db86d6fe760fe133f131cecfaee4b21ed60
SHA512f8ccb6d4eec169d644f19cff483516a38bbe144ee6b0e5685ac19e128d234ac59804dcc33ca196cbfaa9f6be9a316db52959c4a58ed6aa1852750a69cc32c5d6
-
Filesize
497KB
MD5598b3aefb85f49218384519e0b346d9e
SHA1345ec2f195fce61c91c06d49cb350bb2c0b1b033
SHA2564c5a962fe2c9fe080f70d0ff9ba65db86d6fe760fe133f131cecfaee4b21ed60
SHA512f8ccb6d4eec169d644f19cff483516a38bbe144ee6b0e5685ac19e128d234ac59804dcc33ca196cbfaa9f6be9a316db52959c4a58ed6aa1852750a69cc32c5d6
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
342KB
MD59be9b974501f98ecfc7296f660312ea5
SHA17faeb1fa0e20d0dc46f37663b1c6b6a172214f12
SHA2567a28f394b8b8462e49be058f34be62f64815faec3fcb863d1bb14db24cc98e1c
SHA5125a063308464f6e6612e3599c07f9c9e75e380876e9e8ed76c3bf0f4a5fa3ea3473b58a6f265153416076d019e7034aa88751df58a587227a44154946291b72af
-
Filesize
342KB
MD59be9b974501f98ecfc7296f660312ea5
SHA17faeb1fa0e20d0dc46f37663b1c6b6a172214f12
SHA2567a28f394b8b8462e49be058f34be62f64815faec3fcb863d1bb14db24cc98e1c
SHA5125a063308464f6e6612e3599c07f9c9e75e380876e9e8ed76c3bf0f4a5fa3ea3473b58a6f265153416076d019e7034aa88751df58a587227a44154946291b72af