Analysis
-
max time kernel
147s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 19:42
Static task
static1
Behavioral task
behavioral1
Sample
cf4fc504d12ff2e2333432048964a995c70358497fb61499fe02a55ae71c4419.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
cf4fc504d12ff2e2333432048964a995c70358497fb61499fe02a55ae71c4419.exe
Resource
win10v2004-20230220-en
General
-
Target
cf4fc504d12ff2e2333432048964a995c70358497fb61499fe02a55ae71c4419.exe
-
Size
651KB
-
MD5
b2b93313828fc1191fd8e16ade789472
-
SHA1
4a031f85a239f022b6c5f5bcd22eccb14bec86d7
-
SHA256
cf4fc504d12ff2e2333432048964a995c70358497fb61499fe02a55ae71c4419
-
SHA512
07abd362179ff42100928f878e00fc2e2a1fea8d72018001107587606b2fecc4e45b327bc5f8905d1bbfa9f0d6bd0159cce3f83fe7289d7614918a955ad3281d
-
SSDEEP
12288:my90Oqi/LAWEtJZP+2baOjgg8gW7/o0sxY2omQcxOjeYKIXJ0uM:my5qrWEtJZP1MSe2o5njJKIXuX
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4028-982-0x0000000007550000-0x0000000007B68000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 79209702.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 79209702.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 79209702.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 79209702.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 79209702.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 79209702.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 3976 st482980.exe 1616 79209702.exe 4028 kp576907.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 79209702.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 79209702.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cf4fc504d12ff2e2333432048964a995c70358497fb61499fe02a55ae71c4419.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cf4fc504d12ff2e2333432048964a995c70358497fb61499fe02a55ae71c4419.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st482980.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st482980.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1616 79209702.exe 1616 79209702.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1616 79209702.exe Token: SeDebugPrivilege 4028 kp576907.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1940 wrote to memory of 3976 1940 cf4fc504d12ff2e2333432048964a995c70358497fb61499fe02a55ae71c4419.exe 85 PID 1940 wrote to memory of 3976 1940 cf4fc504d12ff2e2333432048964a995c70358497fb61499fe02a55ae71c4419.exe 85 PID 1940 wrote to memory of 3976 1940 cf4fc504d12ff2e2333432048964a995c70358497fb61499fe02a55ae71c4419.exe 85 PID 3976 wrote to memory of 1616 3976 st482980.exe 86 PID 3976 wrote to memory of 1616 3976 st482980.exe 86 PID 3976 wrote to memory of 1616 3976 st482980.exe 86 PID 3976 wrote to memory of 4028 3976 st482980.exe 91 PID 3976 wrote to memory of 4028 3976 st482980.exe 91 PID 3976 wrote to memory of 4028 3976 st482980.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf4fc504d12ff2e2333432048964a995c70358497fb61499fe02a55ae71c4419.exe"C:\Users\Admin\AppData\Local\Temp\cf4fc504d12ff2e2333432048964a995c70358497fb61499fe02a55ae71c4419.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st482980.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st482980.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\79209702.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\79209702.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp576907.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp576907.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4028
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
497KB
MD5ab9a16bf75f698964dab7295e0a87b47
SHA171324767de6f6b7ee356bd9c87734879d9f230f3
SHA2565d5473a7884020e87eb07c2f587d97599761decdf3c5566dd7c61529e203e030
SHA51271c3704dd6c3ee13915a075395b6842e536a150205c2652271bbb6fc945c4c3d1f6a86c6fe470f23900e34c3b7d65e93525bc35d019d593a3e259ba8c95d1d9d
-
Filesize
497KB
MD5ab9a16bf75f698964dab7295e0a87b47
SHA171324767de6f6b7ee356bd9c87734879d9f230f3
SHA2565d5473a7884020e87eb07c2f587d97599761decdf3c5566dd7c61529e203e030
SHA51271c3704dd6c3ee13915a075395b6842e536a150205c2652271bbb6fc945c4c3d1f6a86c6fe470f23900e34c3b7d65e93525bc35d019d593a3e259ba8c95d1d9d
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
175KB
MD5a165b5f6b0a4bdf808b71de57bf9347d
SHA139a7b301e819e386c162a47e046fa384bb5ab437
SHA25668349ed349ed7bbb9a279ac34ea4984206a1a1b3b73587fd1b109d55391af09a
SHA5123dd6ca63a2aecb2a0599f0b918329e75b92eb5259d6986bd8d41cb8ebcf7b965bbd12786929d61743ae8613c2e180078f2eed2835ccb54378cd343c4a048c1a1
-
Filesize
341KB
MD5860467327539e06048e5bb5645805b96
SHA18e013c42d7ff559c94dd89487aedbfef9b0f9b5e
SHA25687e91d93cdbf4b244f21c194b11ab4f3d3d70a973a78f48878d763279cfd433c
SHA5128b0561ea8d884b125f1c35f83bca1615abed661ea828819d691818ead00bc67ea14ed731fe5ef0ac70a5f2c56d2205aaeaca21454cfb04b0614bb9eac707caeb
-
Filesize
341KB
MD5860467327539e06048e5bb5645805b96
SHA18e013c42d7ff559c94dd89487aedbfef9b0f9b5e
SHA25687e91d93cdbf4b244f21c194b11ab4f3d3d70a973a78f48878d763279cfd433c
SHA5128b0561ea8d884b125f1c35f83bca1615abed661ea828819d691818ead00bc67ea14ed731fe5ef0ac70a5f2c56d2205aaeaca21454cfb04b0614bb9eac707caeb