Analysis
-
max time kernel
186s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 20:07
Static task
static1
Behavioral task
behavioral1
Sample
e0aa60f173234cc4fda20b67c68c56b8e42ce410b4b4679eb4a468dec2dd114a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e0aa60f173234cc4fda20b67c68c56b8e42ce410b4b4679eb4a468dec2dd114a.exe
Resource
win10v2004-20230220-en
General
-
Target
e0aa60f173234cc4fda20b67c68c56b8e42ce410b4b4679eb4a468dec2dd114a.exe
-
Size
612KB
-
MD5
9413dd2b2313407eedcc42a372119b9c
-
SHA1
14ce13746d1460c983fc553fd720f07b40bba635
-
SHA256
e0aa60f173234cc4fda20b67c68c56b8e42ce410b4b4679eb4a468dec2dd114a
-
SHA512
f818c336403200b093404dd33dc9529d5e09ecda9d15c97fbabaed4cf382f18082a9db04f7c083272afc3ec27f04511dbe44ff21c51bb2f63107c2cc493d33f0
-
SSDEEP
12288:Ky90Ns/5SIY+gcQB1A97x1ITQ6c5nZGTb+Y9z36IZ2w:KybEJMQBaV8aNZ06Y9jZh
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/344-953-0x0000000007900000-0x0000000007F18000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 32875168.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 32875168.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 32875168.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 32875168.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 32875168.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 32875168.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2748 st332708.exe 1508 32875168.exe 344 kp917265.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 32875168.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e0aa60f173234cc4fda20b67c68c56b8e42ce410b4b4679eb4a468dec2dd114a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e0aa60f173234cc4fda20b67c68c56b8e42ce410b4b4679eb4a468dec2dd114a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st332708.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st332708.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1508 32875168.exe 1508 32875168.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1508 32875168.exe Token: SeDebugPrivilege 344 kp917265.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2748 2720 e0aa60f173234cc4fda20b67c68c56b8e42ce410b4b4679eb4a468dec2dd114a.exe 80 PID 2720 wrote to memory of 2748 2720 e0aa60f173234cc4fda20b67c68c56b8e42ce410b4b4679eb4a468dec2dd114a.exe 80 PID 2720 wrote to memory of 2748 2720 e0aa60f173234cc4fda20b67c68c56b8e42ce410b4b4679eb4a468dec2dd114a.exe 80 PID 2748 wrote to memory of 1508 2748 st332708.exe 81 PID 2748 wrote to memory of 1508 2748 st332708.exe 81 PID 2748 wrote to memory of 344 2748 st332708.exe 82 PID 2748 wrote to memory of 344 2748 st332708.exe 82 PID 2748 wrote to memory of 344 2748 st332708.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\e0aa60f173234cc4fda20b67c68c56b8e42ce410b4b4679eb4a468dec2dd114a.exe"C:\Users\Admin\AppData\Local\Temp\e0aa60f173234cc4fda20b67c68c56b8e42ce410b4b4679eb4a468dec2dd114a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st332708.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st332708.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\32875168.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\32875168.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp917265.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp917265.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:344
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
457KB
MD5da9e845b6d7280e684683514788cf735
SHA1dd1eed4320136e2ab2a1414d57567faabd26efcf
SHA256e37df1b57312cf3197fe9925a16f7efdbb027c26772f3a0ec3644df25dbee5b6
SHA512715194ab831ba7d5b1c41724e11e4dbe323d0d22b5294ab2ced7336bf833861411a028ea766d83fb0a0c10d95b114f9eed456f4fcf298b64373f22713bbf5d9d
-
Filesize
457KB
MD5da9e845b6d7280e684683514788cf735
SHA1dd1eed4320136e2ab2a1414d57567faabd26efcf
SHA256e37df1b57312cf3197fe9925a16f7efdbb027c26772f3a0ec3644df25dbee5b6
SHA512715194ab831ba7d5b1c41724e11e4dbe323d0d22b5294ab2ced7336bf833861411a028ea766d83fb0a0c10d95b114f9eed456f4fcf298b64373f22713bbf5d9d
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
459KB
MD5438ffffe82c0fc7df798f227a856f09d
SHA1c9ddbab8a12dd94758186293871c8a96f4ea86cd
SHA25674596788dbe7840ab48714e0ac6cdb34be9b4577808e2f85c213f33d0e93d2bb
SHA512ecabb05652a63b991ec8a85438d356630327f6f09a70340cc6ca27c176cb604830dde79bac978236f4f82b63707cbbbeba268c214ea53e2b1fd24b5170ed3007
-
Filesize
459KB
MD5438ffffe82c0fc7df798f227a856f09d
SHA1c9ddbab8a12dd94758186293871c8a96f4ea86cd
SHA25674596788dbe7840ab48714e0ac6cdb34be9b4577808e2f85c213f33d0e93d2bb
SHA512ecabb05652a63b991ec8a85438d356630327f6f09a70340cc6ca27c176cb604830dde79bac978236f4f82b63707cbbbeba268c214ea53e2b1fd24b5170ed3007