Analysis
-
max time kernel
149s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 20:33
Static task
static1
Behavioral task
behavioral1
Sample
f831d980af81c5d2a04319794c73bab19ea76eeeb2202a9c3e15eb4aa0c8a0b2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f831d980af81c5d2a04319794c73bab19ea76eeeb2202a9c3e15eb4aa0c8a0b2.exe
Resource
win10v2004-20230220-en
General
-
Target
f831d980af81c5d2a04319794c73bab19ea76eeeb2202a9c3e15eb4aa0c8a0b2.exe
-
Size
892KB
-
MD5
e2ae0107d138a18ee97a0674d1704539
-
SHA1
b37606c722b71e74324b984f68e8a47b66fe738c
-
SHA256
f831d980af81c5d2a04319794c73bab19ea76eeeb2202a9c3e15eb4aa0c8a0b2
-
SHA512
cf05936b4b31245e80eae0d3b57fdbfb864da48d6e35a287c5f698f2e06b3ae53839cb01bcc8daa6ea285f3f8f988f3bade00b69a9ddb6a72fb5d99f00d68c5e
-
SSDEEP
24576:YyWJB9cr4Owta/aRC8OFxFNpGKL3wUDyIxmpE:fWtA47t2/ZFTNUKEIyIg
Malware Config
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4376-4460-0x000000000ABB0000-0x000000000B1C8000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation 91278659.exe -
Executes dropped EXE 5 IoCs
pid Process 3188 st469462.exe 1420 91278659.exe 3692 1.exe 2028 kp819391.exe 4376 lr798924.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 1.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f831d980af81c5d2a04319794c73bab19ea76eeeb2202a9c3e15eb4aa0c8a0b2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f831d980af81c5d2a04319794c73bab19ea76eeeb2202a9c3e15eb4aa0c8a0b2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st469462.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st469462.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1776 2028 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3692 1.exe 3692 1.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1420 91278659.exe Token: SeDebugPrivilege 2028 kp819391.exe Token: SeDebugPrivilege 3692 1.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 916 wrote to memory of 3188 916 f831d980af81c5d2a04319794c73bab19ea76eeeb2202a9c3e15eb4aa0c8a0b2.exe 82 PID 916 wrote to memory of 3188 916 f831d980af81c5d2a04319794c73bab19ea76eeeb2202a9c3e15eb4aa0c8a0b2.exe 82 PID 916 wrote to memory of 3188 916 f831d980af81c5d2a04319794c73bab19ea76eeeb2202a9c3e15eb4aa0c8a0b2.exe 82 PID 3188 wrote to memory of 1420 3188 st469462.exe 83 PID 3188 wrote to memory of 1420 3188 st469462.exe 83 PID 3188 wrote to memory of 1420 3188 st469462.exe 83 PID 1420 wrote to memory of 3692 1420 91278659.exe 86 PID 1420 wrote to memory of 3692 1420 91278659.exe 86 PID 3188 wrote to memory of 2028 3188 st469462.exe 87 PID 3188 wrote to memory of 2028 3188 st469462.exe 87 PID 3188 wrote to memory of 2028 3188 st469462.exe 87 PID 916 wrote to memory of 4376 916 f831d980af81c5d2a04319794c73bab19ea76eeeb2202a9c3e15eb4aa0c8a0b2.exe 96 PID 916 wrote to memory of 4376 916 f831d980af81c5d2a04319794c73bab19ea76eeeb2202a9c3e15eb4aa0c8a0b2.exe 96 PID 916 wrote to memory of 4376 916 f831d980af81c5d2a04319794c73bab19ea76eeeb2202a9c3e15eb4aa0c8a0b2.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\f831d980af81c5d2a04319794c73bab19ea76eeeb2202a9c3e15eb4aa0c8a0b2.exe"C:\Users\Admin\AppData\Local\Temp\f831d980af81c5d2a04319794c73bab19ea76eeeb2202a9c3e15eb4aa0c8a0b2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st469462.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st469462.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\91278659.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\91278659.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3692
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp819391.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp819391.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 12564⤵
- Program crash
PID:1776
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr798924.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr798924.exe2⤵
- Executes dropped EXE
PID:4376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2028 -ip 20281⤵PID:3540
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
170KB
MD51914eaab4eb60ad1c49ab94d7c2ddbed
SHA11e02d40b2c793e1767d653ce5c3cab333ca193f2
SHA25641e29a503f144201d03b7bb21fcc22f6c08a739f0c21f6788c71548c13d580ae
SHA512fb16312878a68890636cd8c5c60d68b572ea55c1d8322d8bba6d491038d3f0f7415600929f4cd971f03543584ef63cf550b6687696d6e760c18f99e48c4c6c23
-
Filesize
170KB
MD51914eaab4eb60ad1c49ab94d7c2ddbed
SHA11e02d40b2c793e1767d653ce5c3cab333ca193f2
SHA25641e29a503f144201d03b7bb21fcc22f6c08a739f0c21f6788c71548c13d580ae
SHA512fb16312878a68890636cd8c5c60d68b572ea55c1d8322d8bba6d491038d3f0f7415600929f4cd971f03543584ef63cf550b6687696d6e760c18f99e48c4c6c23
-
Filesize
739KB
MD50d161b09550c1f9b639686d869ea73ac
SHA112c3ff640bc50e610f09d8585e2a241d39d5a231
SHA256d1c9a3433cbd181f91bf64fdd7baf3a78cdecbfbddeffed9b0e9aa2f1438a643
SHA5129fe35c8950997406356d593234586e73796273b67e40d8e9877d5f5148d15e2290ab94eb26c54241003d628eb2c40a9007d429c5161ce8d043e67dfbdb3cb010
-
Filesize
739KB
MD50d161b09550c1f9b639686d869ea73ac
SHA112c3ff640bc50e610f09d8585e2a241d39d5a231
SHA256d1c9a3433cbd181f91bf64fdd7baf3a78cdecbfbddeffed9b0e9aa2f1438a643
SHA5129fe35c8950997406356d593234586e73796273b67e40d8e9877d5f5148d15e2290ab94eb26c54241003d628eb2c40a9007d429c5161ce8d043e67dfbdb3cb010
-
Filesize
302KB
MD516466b3dbaeb8b9f6f5707c5cb0c9632
SHA1cf5ae1d494824eb98c0912f412ec75684f842484
SHA2565d2108aee36712fc8a61562afbd68598254bdc4a97215b183cb90417805b9ac4
SHA5124140a66df223d555fb0c5d0d740afe0370e61a0e48a1bf607e7ae289f48d4d3015f93d813320b83480a66a9f0a834028c3b47fe1705c74e5568fbed63d06e8a3
-
Filesize
302KB
MD516466b3dbaeb8b9f6f5707c5cb0c9632
SHA1cf5ae1d494824eb98c0912f412ec75684f842484
SHA2565d2108aee36712fc8a61562afbd68598254bdc4a97215b183cb90417805b9ac4
SHA5124140a66df223d555fb0c5d0d740afe0370e61a0e48a1bf607e7ae289f48d4d3015f93d813320b83480a66a9f0a834028c3b47fe1705c74e5568fbed63d06e8a3
-
Filesize
581KB
MD591e6986a2b439477ca33c9f3f7fe0ea0
SHA18a9a0667835d45ad25d6af3067ac4599529f7e05
SHA2562ae0e36f5a300e6c18ea2c93436d8e94b11cd0f2ca4274d2c4939e7ddfced1bb
SHA512c58d02c959d48bca30ae60fbc7d9f26dc16baaca05f15980e868533f6a846ddb26e7e6e085070855453e6f92b3b3e65e4e0df554a34e233701ded8cce23461ee
-
Filesize
581KB
MD591e6986a2b439477ca33c9f3f7fe0ea0
SHA18a9a0667835d45ad25d6af3067ac4599529f7e05
SHA2562ae0e36f5a300e6c18ea2c93436d8e94b11cd0f2ca4274d2c4939e7ddfced1bb
SHA512c58d02c959d48bca30ae60fbc7d9f26dc16baaca05f15980e868533f6a846ddb26e7e6e085070855453e6f92b3b3e65e4e0df554a34e233701ded8cce23461ee
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91