Analysis
-
max time kernel
139s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 19:54
Static task
static1
Behavioral task
behavioral1
Sample
d86187af56d7695235d19a0e4162227272b38f1938de06d3b46dbf141dd423fc.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d86187af56d7695235d19a0e4162227272b38f1938de06d3b46dbf141dd423fc.exe
Resource
win10v2004-20230220-en
General
-
Target
d86187af56d7695235d19a0e4162227272b38f1938de06d3b46dbf141dd423fc.exe
-
Size
1.2MB
-
MD5
8fe7b28cc71375ef262cc697d8708a2e
-
SHA1
dd83db447fdb457283f708f1bfae856253c8cfcb
-
SHA256
d86187af56d7695235d19a0e4162227272b38f1938de06d3b46dbf141dd423fc
-
SHA512
f4124ca5997b8943f689e8452069c7aaf4e776f3161262b80fd5d8b481e130f76219af2298895131a4ffef819dc1f6e9df224938dc8d15cd60b406b5d7ac4831
-
SSDEEP
24576:Syfe6f/qKhsFlm6HOGlMCq6lo1oqPA86TVi/DnPlN7sG:526f/VgHOGlFPa6V+P37s
Malware Config
Extracted
redline
lupa
217.196.96.56:4138
-
auth_value
fcb02fce9bc10c56a9841d56974bd7b8
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1492-209-0x0000000005680000-0x0000000005C98000-memory.dmp redline_stealer behavioral2/memory/1492-217-0x0000000005EF0000-0x0000000005F56000-memory.dmp redline_stealer behavioral2/memory/1492-219-0x0000000006BF0000-0x0000000006DB2000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" n5448433.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" n5448433.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection n5448433.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" n5448433.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" n5448433.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" n5448433.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 3428 z3849801.exe 4120 z8935781.exe 3132 z5701024.exe 3408 n5448433.exe 1492 o4186199.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features n5448433.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" n5448433.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z5701024.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d86187af56d7695235d19a0e4162227272b38f1938de06d3b46dbf141dd423fc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d86187af56d7695235d19a0e4162227272b38f1938de06d3b46dbf141dd423fc.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z3849801.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z3849801.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z8935781.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z8935781.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z5701024.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3408 n5448433.exe 3408 n5448433.exe 1492 o4186199.exe 1492 o4186199.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3408 n5448433.exe Token: SeDebugPrivilege 1492 o4186199.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3724 wrote to memory of 3428 3724 d86187af56d7695235d19a0e4162227272b38f1938de06d3b46dbf141dd423fc.exe 79 PID 3724 wrote to memory of 3428 3724 d86187af56d7695235d19a0e4162227272b38f1938de06d3b46dbf141dd423fc.exe 79 PID 3724 wrote to memory of 3428 3724 d86187af56d7695235d19a0e4162227272b38f1938de06d3b46dbf141dd423fc.exe 79 PID 3428 wrote to memory of 4120 3428 z3849801.exe 80 PID 3428 wrote to memory of 4120 3428 z3849801.exe 80 PID 3428 wrote to memory of 4120 3428 z3849801.exe 80 PID 4120 wrote to memory of 3132 4120 z8935781.exe 81 PID 4120 wrote to memory of 3132 4120 z8935781.exe 81 PID 4120 wrote to memory of 3132 4120 z8935781.exe 81 PID 3132 wrote to memory of 3408 3132 z5701024.exe 82 PID 3132 wrote to memory of 3408 3132 z5701024.exe 82 PID 3132 wrote to memory of 3408 3132 z5701024.exe 82 PID 3132 wrote to memory of 1492 3132 z5701024.exe 85 PID 3132 wrote to memory of 1492 3132 z5701024.exe 85 PID 3132 wrote to memory of 1492 3132 z5701024.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\d86187af56d7695235d19a0e4162227272b38f1938de06d3b46dbf141dd423fc.exe"C:\Users\Admin\AppData\Local\Temp\d86187af56d7695235d19a0e4162227272b38f1938de06d3b46dbf141dd423fc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3849801.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z3849801.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8935781.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8935781.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5701024.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z5701024.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n5448433.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n5448433.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3408
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o4186199.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o4186199.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5f1755ec31ab7e77a1c5344c0e2806f25
SHA1b4252412d964a12fe19983b2c08bef40bcfc6fae
SHA25622c75f862f181c50bf0b992865eff7d2e73b9d7fb2c4973fa7de4f7ccb11dab7
SHA5128bca893f5e41d2f1e944941fcfcf69afc59bc93e501bba92611b05417fbd61a210b208dbb0a4b7768fc5b4f8d33d6727108339416ce0d064523523657c19f849
-
Filesize
1.0MB
MD5f1755ec31ab7e77a1c5344c0e2806f25
SHA1b4252412d964a12fe19983b2c08bef40bcfc6fae
SHA25622c75f862f181c50bf0b992865eff7d2e73b9d7fb2c4973fa7de4f7ccb11dab7
SHA5128bca893f5e41d2f1e944941fcfcf69afc59bc93e501bba92611b05417fbd61a210b208dbb0a4b7768fc5b4f8d33d6727108339416ce0d064523523657c19f849
-
Filesize
590KB
MD54971f906eb8b059050d2cdb83325f0f7
SHA156d45c0d5b23045ad79fc2353df3de4f7c60e0d5
SHA256c243071697805304c3f7b47a78b9d0c08b2cc9ea1f9a0b3317d6dd1199edf65f
SHA5129202f75fa3c2991bcbae5cb3259a91e585a679e12ee09e4bc6e59e50eec292467a55efeeb6e7421d94c00d878498871d6af3a5f082fc2736ec0e3db03676c915
-
Filesize
590KB
MD54971f906eb8b059050d2cdb83325f0f7
SHA156d45c0d5b23045ad79fc2353df3de4f7c60e0d5
SHA256c243071697805304c3f7b47a78b9d0c08b2cc9ea1f9a0b3317d6dd1199edf65f
SHA5129202f75fa3c2991bcbae5cb3259a91e585a679e12ee09e4bc6e59e50eec292467a55efeeb6e7421d94c00d878498871d6af3a5f082fc2736ec0e3db03676c915
-
Filesize
386KB
MD543f6043604b34428b38fc2d890d45c78
SHA16788585451cf8ec12a0e96b3128373cf02eec026
SHA256ead2067f6c588736f79fa3c54200d14483723df85503b70133917417104ba6bf
SHA512ebcd592dd231edd1f861e2d75ea8d4f37ed7d0865e08da3f45011d1ec8e95ab84ea0d99703aff7116c25bb0a441478e64cc293472c7e2665674f0ddba1276a16
-
Filesize
386KB
MD543f6043604b34428b38fc2d890d45c78
SHA16788585451cf8ec12a0e96b3128373cf02eec026
SHA256ead2067f6c588736f79fa3c54200d14483723df85503b70133917417104ba6bf
SHA512ebcd592dd231edd1f861e2d75ea8d4f37ed7d0865e08da3f45011d1ec8e95ab84ea0d99703aff7116c25bb0a441478e64cc293472c7e2665674f0ddba1276a16
-
Filesize
286KB
MD5958ecef5a42ba65cb19e4e98decea671
SHA11ee8304888dd573d5dc6b31304383bfc6b96e771
SHA25663168b4a1bd6c45d80803ca60af1357233131a71fa3e7c0c0d82fddc82d75293
SHA512dee527ff9a046ca5f591baf8b8c3f40ec2b15d1a1d4b291bffd46616c3cc78a498a389ee8124575ea6cc1ae59a7d40dfba1d4c4626bf571a725fed01b4ff09aa
-
Filesize
286KB
MD5958ecef5a42ba65cb19e4e98decea671
SHA11ee8304888dd573d5dc6b31304383bfc6b96e771
SHA25663168b4a1bd6c45d80803ca60af1357233131a71fa3e7c0c0d82fddc82d75293
SHA512dee527ff9a046ca5f591baf8b8c3f40ec2b15d1a1d4b291bffd46616c3cc78a498a389ee8124575ea6cc1ae59a7d40dfba1d4c4626bf571a725fed01b4ff09aa
-
Filesize
169KB
MD50e15c9afb39a920963155fe2e09474a3
SHA1480d649ebb44c302f40bced1e6ccc8a847c1144c
SHA256e497b3da206c6f2c9614a3d5f2115c2bafbf03dece64b2e4f11178da4c6512d7
SHA512b7f51b862ad74d1a0381dcbbaf02964dd938d7821df7ef3bf8896798d217b22a930746c3e31579a54d3e5ba7bc693c079ae5315345acd72ae1635e6a4b94941c
-
Filesize
169KB
MD50e15c9afb39a920963155fe2e09474a3
SHA1480d649ebb44c302f40bced1e6ccc8a847c1144c
SHA256e497b3da206c6f2c9614a3d5f2115c2bafbf03dece64b2e4f11178da4c6512d7
SHA512b7f51b862ad74d1a0381dcbbaf02964dd938d7821df7ef3bf8896798d217b22a930746c3e31579a54d3e5ba7bc693c079ae5315345acd72ae1635e6a4b94941c