Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 19:35
Static task
static1
Behavioral task
behavioral1
Sample
ca666e9315d9e714aef0e4c1112c70b0942fedfe3198c6a007104b09f5e51d63.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ca666e9315d9e714aef0e4c1112c70b0942fedfe3198c6a007104b09f5e51d63.exe
Resource
win10v2004-20230220-en
General
-
Target
ca666e9315d9e714aef0e4c1112c70b0942fedfe3198c6a007104b09f5e51d63.exe
-
Size
643KB
-
MD5
070eb319ae588d62a47bb7937cdcd99c
-
SHA1
46f41d8aa31a8e96e0ab36ef52d33d2715607911
-
SHA256
ca666e9315d9e714aef0e4c1112c70b0942fedfe3198c6a007104b09f5e51d63
-
SHA512
43180d97510c26bc144868c4a65a69cf33170659feced6efd2e37fcadb2cd0a6308abee64f13de840e45bf3b6fef9e11209091c6d21376daa0e2778e66fae2f3
-
SSDEEP
12288:ay90vRktWugmtsdpqe6krKGr76c/Un5ANUw5vPeu21jCMPVNi9EN:ayYRMlzKLHr17h/K5ANUiW19PVNfN
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1092-982-0x0000000009C90000-0x000000000A2A8000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 56332445.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 56332445.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 56332445.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 56332445.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 56332445.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 56332445.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1444 st068855.exe 4040 56332445.exe 1092 kp641669.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 56332445.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 56332445.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ca666e9315d9e714aef0e4c1112c70b0942fedfe3198c6a007104b09f5e51d63.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ca666e9315d9e714aef0e4c1112c70b0942fedfe3198c6a007104b09f5e51d63.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st068855.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st068855.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4576 sc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4040 56332445.exe 4040 56332445.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4040 56332445.exe Token: SeDebugPrivilege 1092 kp641669.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4152 wrote to memory of 1444 4152 ca666e9315d9e714aef0e4c1112c70b0942fedfe3198c6a007104b09f5e51d63.exe 84 PID 4152 wrote to memory of 1444 4152 ca666e9315d9e714aef0e4c1112c70b0942fedfe3198c6a007104b09f5e51d63.exe 84 PID 4152 wrote to memory of 1444 4152 ca666e9315d9e714aef0e4c1112c70b0942fedfe3198c6a007104b09f5e51d63.exe 84 PID 1444 wrote to memory of 4040 1444 st068855.exe 85 PID 1444 wrote to memory of 4040 1444 st068855.exe 85 PID 1444 wrote to memory of 4040 1444 st068855.exe 85 PID 1444 wrote to memory of 1092 1444 st068855.exe 89 PID 1444 wrote to memory of 1092 1444 st068855.exe 89 PID 1444 wrote to memory of 1092 1444 st068855.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca666e9315d9e714aef0e4c1112c70b0942fedfe3198c6a007104b09f5e51d63.exe"C:\Users\Admin\AppData\Local\Temp\ca666e9315d9e714aef0e4c1112c70b0942fedfe3198c6a007104b09f5e51d63.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st068855.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st068855.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\56332445.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\56332445.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4040
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp641669.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp641669.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4576
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
488KB
MD526a413fc6c0bc262967c4683046c8fbb
SHA1942e19171ad3e9f91e45b2c8a351b817f6711518
SHA256ab7b4b09e9bf7fa980ae39e0809088bc16062afe7011bfc05521d9152f370867
SHA512171aa70463c9fbaaa16fe148db7ff628bb6de7dc08c5d08edc36d7d980b7b1a3a2eb22d1e6331cc26515f280d194de928f4ae7e8f9e87965fb51631f1664da7b
-
Filesize
488KB
MD526a413fc6c0bc262967c4683046c8fbb
SHA1942e19171ad3e9f91e45b2c8a351b817f6711518
SHA256ab7b4b09e9bf7fa980ae39e0809088bc16062afe7011bfc05521d9152f370867
SHA512171aa70463c9fbaaa16fe148db7ff628bb6de7dc08c5d08edc36d7d980b7b1a3a2eb22d1e6331cc26515f280d194de928f4ae7e8f9e87965fb51631f1664da7b
-
Filesize
176KB
MD52b71f4b18ac8214a2bff547b6ce2f64f
SHA1b8f2f25139a7b2e8d5e8fbc024eb5cac518bc6a5
SHA256f7eedf3aec775a62c265d1652686b30a8a45a953523e2fb3cfc1fac3c6a66fbc
SHA51233518eff768610bf54f9888d9d0d746b0c3500dc5f2b8fd5f1641d5a264f657a8311b40364f70932512581183b244fec3feb535e21c13e0ec8adec9994175177
-
Filesize
176KB
MD52b71f4b18ac8214a2bff547b6ce2f64f
SHA1b8f2f25139a7b2e8d5e8fbc024eb5cac518bc6a5
SHA256f7eedf3aec775a62c265d1652686b30a8a45a953523e2fb3cfc1fac3c6a66fbc
SHA51233518eff768610bf54f9888d9d0d746b0c3500dc5f2b8fd5f1641d5a264f657a8311b40364f70932512581183b244fec3feb535e21c13e0ec8adec9994175177
-
Filesize
340KB
MD557cb1aacc4cd60cf9948a54b6af5ab4e
SHA1d38b344cb0b2f586a5641f291cba4053b63e1de1
SHA2566a563ce07d35c123bf0cfd585942b37fe2f15d25357df04823e9b6d5e243fa14
SHA512f635668b7cca0daaa3b1cebf5b08c462fb6d7a95acb12672b5f11a459c77937dbf711325bbe0c0f6a2f25719bb9c3f3e98bb9313f0c447ed96f499fbf56590e7
-
Filesize
340KB
MD557cb1aacc4cd60cf9948a54b6af5ab4e
SHA1d38b344cb0b2f586a5641f291cba4053b63e1de1
SHA2566a563ce07d35c123bf0cfd585942b37fe2f15d25357df04823e9b6d5e243fa14
SHA512f635668b7cca0daaa3b1cebf5b08c462fb6d7a95acb12672b5f11a459c77937dbf711325bbe0c0f6a2f25719bb9c3f3e98bb9313f0c447ed96f499fbf56590e7