Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 19:42
Static task
static1
Behavioral task
behavioral1
Sample
cfab7da011e6166e23da82d55f36cfd45133c378c508d6eb3a6cce7666c3a14a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
cfab7da011e6166e23da82d55f36cfd45133c378c508d6eb3a6cce7666c3a14a.exe
Resource
win10v2004-20230220-en
General
-
Target
cfab7da011e6166e23da82d55f36cfd45133c378c508d6eb3a6cce7666c3a14a.exe
-
Size
674KB
-
MD5
dcdf391cb2d4488e55439d1d99062505
-
SHA1
3c1cb12476bd0ddf1ffb79f252f75228b5038cfd
-
SHA256
cfab7da011e6166e23da82d55f36cfd45133c378c508d6eb3a6cce7666c3a14a
-
SHA512
a028c1edbca78bb569ba2b4e00737a70b8ab82f81c43f963506cc151e9bef4fe258a830410d2a7a33a82d06010b3823a49612908830b2ec9c3b100c1f29cd340
-
SSDEEP
12288:zy90vjJjbCfetJ3Pck0gULPHkKoNcC90wkwSAQ7W:zygBftJ3Pch/7HkKDwSNa
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/676-982-0x0000000007580000-0x0000000007B98000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 75918761.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 75918761.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 75918761.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 75918761.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 75918761.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 75918761.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 448 st101251.exe 1100 75918761.exe 676 kp143625.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 75918761.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 75918761.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cfab7da011e6166e23da82d55f36cfd45133c378c508d6eb3a6cce7666c3a14a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cfab7da011e6166e23da82d55f36cfd45133c378c508d6eb3a6cce7666c3a14a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st101251.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st101251.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1100 75918761.exe 1100 75918761.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1100 75918761.exe Token: SeDebugPrivilege 676 kp143625.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1484 wrote to memory of 448 1484 cfab7da011e6166e23da82d55f36cfd45133c378c508d6eb3a6cce7666c3a14a.exe 85 PID 1484 wrote to memory of 448 1484 cfab7da011e6166e23da82d55f36cfd45133c378c508d6eb3a6cce7666c3a14a.exe 85 PID 1484 wrote to memory of 448 1484 cfab7da011e6166e23da82d55f36cfd45133c378c508d6eb3a6cce7666c3a14a.exe 85 PID 448 wrote to memory of 1100 448 st101251.exe 86 PID 448 wrote to memory of 1100 448 st101251.exe 86 PID 448 wrote to memory of 1100 448 st101251.exe 86 PID 448 wrote to memory of 676 448 st101251.exe 87 PID 448 wrote to memory of 676 448 st101251.exe 87 PID 448 wrote to memory of 676 448 st101251.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\cfab7da011e6166e23da82d55f36cfd45133c378c508d6eb3a6cce7666c3a14a.exe"C:\Users\Admin\AppData\Local\Temp\cfab7da011e6166e23da82d55f36cfd45133c378c508d6eb3a6cce7666c3a14a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st101251.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st101251.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\75918761.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\75918761.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp143625.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp143625.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:676
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
519KB
MD5fd1058da3daff6a8cfeddc90e8cf090b
SHA185beffcd242080357f7203d9d2fbc83638af2919
SHA2564355e4cde75f1a40df3d10021a497ed80c4866488b5c5d91fabb5a7a6ad934c5
SHA512efe4107eff3bf2ee453b50a26b7edef0a1d7dc5331773d8f5d1dc5fb7036a9e6555aaa443e5b0856b07b1bc830ece21119832b7235c9a9e61e80ac89a5a8b34f
-
Filesize
519KB
MD5fd1058da3daff6a8cfeddc90e8cf090b
SHA185beffcd242080357f7203d9d2fbc83638af2919
SHA2564355e4cde75f1a40df3d10021a497ed80c4866488b5c5d91fabb5a7a6ad934c5
SHA512efe4107eff3bf2ee453b50a26b7edef0a1d7dc5331773d8f5d1dc5fb7036a9e6555aaa443e5b0856b07b1bc830ece21119832b7235c9a9e61e80ac89a5a8b34f
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
415KB
MD544aab19749cee7b452fe98d8cf851619
SHA11c4e732554071f59561c74393caadca44bb4ed79
SHA256760f3b974f5a437820cc80b4d41890198fccf01f11e2c6e84629322597e77a3b
SHA512d69a740b7addbb067d0d7a7b697a30e2dba45c66558a2748525fcf0739cc232bc82ddd6ddc86b5803d42795693c244e0335db4f50c0fe3b64513e2adf9036146
-
Filesize
415KB
MD544aab19749cee7b452fe98d8cf851619
SHA11c4e732554071f59561c74393caadca44bb4ed79
SHA256760f3b974f5a437820cc80b4d41890198fccf01f11e2c6e84629322597e77a3b
SHA512d69a740b7addbb067d0d7a7b697a30e2dba45c66558a2748525fcf0739cc232bc82ddd6ddc86b5803d42795693c244e0335db4f50c0fe3b64513e2adf9036146