Analysis
-
max time kernel
149s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 20:28
Static task
static1
Behavioral task
behavioral1
Sample
f32e9e207dc2ca2615553b9bfcaf75cb30589f9668d9a3974b0ffbc57e66c09a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f32e9e207dc2ca2615553b9bfcaf75cb30589f9668d9a3974b0ffbc57e66c09a.exe
Resource
win10v2004-20230220-en
General
-
Target
f32e9e207dc2ca2615553b9bfcaf75cb30589f9668d9a3974b0ffbc57e66c09a.exe
-
Size
651KB
-
MD5
29f8740fb3f796036957bdf04afe8e60
-
SHA1
3ac5ed3b7817f93ba1f94de4d5dba79eff23c9a4
-
SHA256
f32e9e207dc2ca2615553b9bfcaf75cb30589f9668d9a3974b0ffbc57e66c09a
-
SHA512
17f9b709f3c95cb56dfd6541288ff78d3862f42ff6ab51139b3cc431fc3527ba3ffb64b58274b1c962c5065273ae46ee927b351f971326451c867eee7ccf520f
-
SSDEEP
12288:Qy90lInBAKi3gWE3+/g32ltJqPi6aOj2gDkDD0eZM2hmQWxOGikxD1kkhQc:Qy9nKK4gWE3ultJqPVKny2h5VGBDH7
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1108-983-0x0000000007680000-0x0000000007C98000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 61801270.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 61801270.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 61801270.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 61801270.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 61801270.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 61801270.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 3164 st527886.exe 2056 61801270.exe 1108 kp781129.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 61801270.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 61801270.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f32e9e207dc2ca2615553b9bfcaf75cb30589f9668d9a3974b0ffbc57e66c09a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f32e9e207dc2ca2615553b9bfcaf75cb30589f9668d9a3974b0ffbc57e66c09a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st527886.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st527886.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2056 61801270.exe 2056 61801270.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2056 61801270.exe Token: SeDebugPrivilege 1108 kp781129.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3740 wrote to memory of 3164 3740 f32e9e207dc2ca2615553b9bfcaf75cb30589f9668d9a3974b0ffbc57e66c09a.exe 82 PID 3740 wrote to memory of 3164 3740 f32e9e207dc2ca2615553b9bfcaf75cb30589f9668d9a3974b0ffbc57e66c09a.exe 82 PID 3740 wrote to memory of 3164 3740 f32e9e207dc2ca2615553b9bfcaf75cb30589f9668d9a3974b0ffbc57e66c09a.exe 82 PID 3164 wrote to memory of 2056 3164 st527886.exe 83 PID 3164 wrote to memory of 2056 3164 st527886.exe 83 PID 3164 wrote to memory of 2056 3164 st527886.exe 83 PID 3164 wrote to memory of 1108 3164 st527886.exe 88 PID 3164 wrote to memory of 1108 3164 st527886.exe 88 PID 3164 wrote to memory of 1108 3164 st527886.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\f32e9e207dc2ca2615553b9bfcaf75cb30589f9668d9a3974b0ffbc57e66c09a.exe"C:\Users\Admin\AppData\Local\Temp\f32e9e207dc2ca2615553b9bfcaf75cb30589f9668d9a3974b0ffbc57e66c09a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st527886.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st527886.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\61801270.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\61801270.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp781129.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp781129.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1108
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
497KB
MD516550370b9c1e002255b6903651c6b70
SHA16a1c145ecbb1456ce97981dad22bbe18e068cb0b
SHA2567b0987232bb88e29048489fc0f4e815b96392e4e649b7fe26a115e21aa9a5afc
SHA512bc8bac4758b0c546d96e023d489be7c26b0ea56564c3f4d76440c79bbe7eeaffd89518cfc0ca3456cdc21df570a843d587a74cea7bfe8c3cad75f0609911f38b
-
Filesize
497KB
MD516550370b9c1e002255b6903651c6b70
SHA16a1c145ecbb1456ce97981dad22bbe18e068cb0b
SHA2567b0987232bb88e29048489fc0f4e815b96392e4e649b7fe26a115e21aa9a5afc
SHA512bc8bac4758b0c546d96e023d489be7c26b0ea56564c3f4d76440c79bbe7eeaffd89518cfc0ca3456cdc21df570a843d587a74cea7bfe8c3cad75f0609911f38b
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
341KB
MD52adc87b7eeafc8a10e8ee73a258a356b
SHA1e7d11043fafb08d0670e43ad7f2fe046c7d8d41e
SHA25635457c03fd8b72ae6e39d4add57c2d79d8962b7878044b9013595a0cb7497e02
SHA512ea8245a0b647bf766d69b7888230ba10d930fadbb3e146e5a6e82a7b6aa53a49125df5a8beed1fa3e3b4716c62c98ea01f2b58a2100e061d3b5a0793039599e4
-
Filesize
341KB
MD52adc87b7eeafc8a10e8ee73a258a356b
SHA1e7d11043fafb08d0670e43ad7f2fe046c7d8d41e
SHA25635457c03fd8b72ae6e39d4add57c2d79d8962b7878044b9013595a0cb7497e02
SHA512ea8245a0b647bf766d69b7888230ba10d930fadbb3e146e5a6e82a7b6aa53a49125df5a8beed1fa3e3b4716c62c98ea01f2b58a2100e061d3b5a0793039599e4