Analysis
-
max time kernel
188s -
max time network
190s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 19:54
Static task
static1
Behavioral task
behavioral1
Sample
d90ea8bdc64a2e2a1bc1fe2540aa8a8b08b1f1b05d44dc92e771273d4ebe6467.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d90ea8bdc64a2e2a1bc1fe2540aa8a8b08b1f1b05d44dc92e771273d4ebe6467.exe
Resource
win10v2004-20230220-en
General
-
Target
d90ea8bdc64a2e2a1bc1fe2540aa8a8b08b1f1b05d44dc92e771273d4ebe6467.exe
-
Size
480KB
-
MD5
71a55dfbde1f3282695dd8cc2ec35955
-
SHA1
c93660f0848c8af46fb04b043325710ffcae3b2b
-
SHA256
d90ea8bdc64a2e2a1bc1fe2540aa8a8b08b1f1b05d44dc92e771273d4ebe6467
-
SHA512
deae0d41db122d19a98524871e347f5d79b1140a254e295e2af857a385edcac0be86f5d7feaf32cec8177079c76aa0eeb44fc35fdb6ac3b84b53e14758c66232
-
SSDEEP
12288:UMrwy90di7dAdzaxl8q9vBFrCuCHWE8zeD9s:cyddAzaMkdCuC2E8zIa
Malware Config
Extracted
redline
daris
217.196.96.56:4138
-
auth_value
3491f24ae0250969cd45ce4b3fe77549
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/2044-148-0x000000000B130000-0x000000000B748000-memory.dmp redline_stealer behavioral2/memory/2044-157-0x000000000BA60000-0x000000000BAC6000-memory.dmp redline_stealer behavioral2/memory/2044-158-0x000000000C550000-0x000000000C712000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" l0294678.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" l0294678.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" l0294678.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" l0294678.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection l0294678.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" l0294678.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 3556 y2774713.exe 2044 k6826939.exe 2552 l0294678.exe 4840 m3272552.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features l0294678.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" l0294678.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d90ea8bdc64a2e2a1bc1fe2540aa8a8b08b1f1b05d44dc92e771273d4ebe6467.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d90ea8bdc64a2e2a1bc1fe2540aa8a8b08b1f1b05d44dc92e771273d4ebe6467.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y2774713.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y2774713.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2044 k6826939.exe 2044 k6826939.exe 2552 l0294678.exe 2552 l0294678.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2044 k6826939.exe Token: SeDebugPrivilege 2552 l0294678.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1416 wrote to memory of 3556 1416 d90ea8bdc64a2e2a1bc1fe2540aa8a8b08b1f1b05d44dc92e771273d4ebe6467.exe 79 PID 1416 wrote to memory of 3556 1416 d90ea8bdc64a2e2a1bc1fe2540aa8a8b08b1f1b05d44dc92e771273d4ebe6467.exe 79 PID 1416 wrote to memory of 3556 1416 d90ea8bdc64a2e2a1bc1fe2540aa8a8b08b1f1b05d44dc92e771273d4ebe6467.exe 79 PID 3556 wrote to memory of 2044 3556 y2774713.exe 80 PID 3556 wrote to memory of 2044 3556 y2774713.exe 80 PID 3556 wrote to memory of 2044 3556 y2774713.exe 80 PID 3556 wrote to memory of 2552 3556 y2774713.exe 87 PID 3556 wrote to memory of 2552 3556 y2774713.exe 87 PID 3556 wrote to memory of 2552 3556 y2774713.exe 87 PID 1416 wrote to memory of 4840 1416 d90ea8bdc64a2e2a1bc1fe2540aa8a8b08b1f1b05d44dc92e771273d4ebe6467.exe 88 PID 1416 wrote to memory of 4840 1416 d90ea8bdc64a2e2a1bc1fe2540aa8a8b08b1f1b05d44dc92e771273d4ebe6467.exe 88 PID 1416 wrote to memory of 4840 1416 d90ea8bdc64a2e2a1bc1fe2540aa8a8b08b1f1b05d44dc92e771273d4ebe6467.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\d90ea8bdc64a2e2a1bc1fe2540aa8a8b08b1f1b05d44dc92e771273d4ebe6467.exe"C:\Users\Admin\AppData\Local\Temp\d90ea8bdc64a2e2a1bc1fe2540aa8a8b08b1f1b05d44dc92e771273d4ebe6467.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2774713.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y2774713.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k6826939.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k6826939.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l0294678.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l0294678.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m3272552.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\m3272552.exe2⤵
- Executes dropped EXE
PID:4840
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5393419f7f0420f9e5459ca7c77f63f7d
SHA1894d8a2e44ba85095afab81a4cf2d7ec6a3b490e
SHA25607703062d66d1b05516834bed10c65bec274eafd390fce37d16262ecb0ae0e54
SHA5125a2040a0528d9527d3a479afda5b3f059d2b95fae76dec4b01a3204ae0853c3dcb51f2007b372764741a541c7926207d0d5ccf0e1074cc798f339f94f9ed5ff6
-
Filesize
206KB
MD5393419f7f0420f9e5459ca7c77f63f7d
SHA1894d8a2e44ba85095afab81a4cf2d7ec6a3b490e
SHA25607703062d66d1b05516834bed10c65bec274eafd390fce37d16262ecb0ae0e54
SHA5125a2040a0528d9527d3a479afda5b3f059d2b95fae76dec4b01a3204ae0853c3dcb51f2007b372764741a541c7926207d0d5ccf0e1074cc798f339f94f9ed5ff6
-
Filesize
308KB
MD520426e769c9558554d8709ac0ff300f3
SHA183c3308d9d77decee1f125b6365f319584349b9f
SHA2563b8022086260ce89131bfa38be42c6589ade5657056605fdbd0a0081c1689d2a
SHA512cff1b85445d088bfeba9581f41f2c06a1d3658b44683f996f9dd29d44b58f903c24783c881513d23959f0aebca30fc74b655ac3f5b0911e02e7f9f869bdcd7a0
-
Filesize
308KB
MD520426e769c9558554d8709ac0ff300f3
SHA183c3308d9d77decee1f125b6365f319584349b9f
SHA2563b8022086260ce89131bfa38be42c6589ade5657056605fdbd0a0081c1689d2a
SHA512cff1b85445d088bfeba9581f41f2c06a1d3658b44683f996f9dd29d44b58f903c24783c881513d23959f0aebca30fc74b655ac3f5b0911e02e7f9f869bdcd7a0
-
Filesize
168KB
MD52301af2882f8fe0919359b31080348f5
SHA1ce598529a52ad445afefda6e9ce7b02453439bab
SHA256efe45c45c113a4eac2132e63e26b0646296659b90fafa6abdba97c6f27387c31
SHA51243293aa13438f8f5c2242f890fb62af2bda7100d5330c68a538842bbbcf4382c8f0e42d577dd25cabce7f15f2e332ae9ae791475e230048d0b3f59b1f72f643a
-
Filesize
168KB
MD52301af2882f8fe0919359b31080348f5
SHA1ce598529a52ad445afefda6e9ce7b02453439bab
SHA256efe45c45c113a4eac2132e63e26b0646296659b90fafa6abdba97c6f27387c31
SHA51243293aa13438f8f5c2242f890fb62af2bda7100d5330c68a538842bbbcf4382c8f0e42d577dd25cabce7f15f2e332ae9ae791475e230048d0b3f59b1f72f643a
-
Filesize
179KB
MD591ab710efa6b4b666fbd67220e1fb679
SHA18011552171cb08e5282063a85d6656071d024ba5
SHA2563a482318b30f3654afe5106a50a42a1fc5e3cdfb2916ce5e6ca0c58abf0d16ac
SHA512cb99aa348ea6036e4da99af389c7a6224895cbf12a513705222e36e9c8c3146ad1f2252518442573c005f667ec346d5224c9c1457a4636d3be3cd3a2d2243ef8
-
Filesize
179KB
MD591ab710efa6b4b666fbd67220e1fb679
SHA18011552171cb08e5282063a85d6656071d024ba5
SHA2563a482318b30f3654afe5106a50a42a1fc5e3cdfb2916ce5e6ca0c58abf0d16ac
SHA512cb99aa348ea6036e4da99af389c7a6224895cbf12a513705222e36e9c8c3146ad1f2252518442573c005f667ec346d5224c9c1457a4636d3be3cd3a2d2243ef8