Analysis
-
max time kernel
146s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 22:08
Static task
static1
Behavioral task
behavioral1
Sample
5d8cbf347a1974bf7542a409bdf8702234b16772c7c6f0e0ac0ea5331ffa3bf0.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5d8cbf347a1974bf7542a409bdf8702234b16772c7c6f0e0ac0ea5331ffa3bf0.exe
Resource
win10v2004-20230220-en
General
-
Target
5d8cbf347a1974bf7542a409bdf8702234b16772c7c6f0e0ac0ea5331ffa3bf0.exe
-
Size
564KB
-
MD5
c20c5176d4b991dd711c18fee0b8291a
-
SHA1
c707b486625ac543e32cd22b597c87be8b8bedeb
-
SHA256
5d8cbf347a1974bf7542a409bdf8702234b16772c7c6f0e0ac0ea5331ffa3bf0
-
SHA512
0588592b76bb1e8c1601569bbf75fe18dc70aae6b21ec85c9747dce621392ce1baebd54a1ee48c3a84d6c971aeee96e4b99a12778a794faeb66c27f024adf4a1
-
SSDEEP
12288:ay90CXKOQ4wWCZmhNf2Iv/zs0PLsnMnIK1ndQe:ayJXKYWYhNf1LzPLsAVV
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3784-949-0x0000000009D70000-0x000000000A388000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it536459.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it536459.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it536459.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it536459.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it536459.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it536459.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4984 zilt3481.exe 2024 it536459.exe 3784 kp055622.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it536459.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce zilt3481.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zilt3481.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5d8cbf347a1974bf7542a409bdf8702234b16772c7c6f0e0ac0ea5331ffa3bf0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5d8cbf347a1974bf7542a409bdf8702234b16772c7c6f0e0ac0ea5331ffa3bf0.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2024 it536459.exe 2024 it536459.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2024 it536459.exe Token: SeDebugPrivilege 3784 kp055622.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4528 wrote to memory of 4984 4528 5d8cbf347a1974bf7542a409bdf8702234b16772c7c6f0e0ac0ea5331ffa3bf0.exe 82 PID 4528 wrote to memory of 4984 4528 5d8cbf347a1974bf7542a409bdf8702234b16772c7c6f0e0ac0ea5331ffa3bf0.exe 82 PID 4528 wrote to memory of 4984 4528 5d8cbf347a1974bf7542a409bdf8702234b16772c7c6f0e0ac0ea5331ffa3bf0.exe 82 PID 4984 wrote to memory of 2024 4984 zilt3481.exe 83 PID 4984 wrote to memory of 2024 4984 zilt3481.exe 83 PID 4984 wrote to memory of 3784 4984 zilt3481.exe 84 PID 4984 wrote to memory of 3784 4984 zilt3481.exe 84 PID 4984 wrote to memory of 3784 4984 zilt3481.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d8cbf347a1974bf7542a409bdf8702234b16772c7c6f0e0ac0ea5331ffa3bf0.exe"C:\Users\Admin\AppData\Local\Temp\5d8cbf347a1974bf7542a409bdf8702234b16772c7c6f0e0ac0ea5331ffa3bf0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zilt3481.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zilt3481.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it536459.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it536459.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp055622.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp055622.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3784
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
409KB
MD5a03290b0f1445f35e270d8ba1937bfe0
SHA16dd881c2c49156405f8ccf038213329d93df4e9b
SHA256a36fd0192d158c76bc6b96483b7cb26e7747177bf94392a8c0bdd7d159a4c360
SHA512accfc134b5d9493d8b759e61d9587f24c024cd42514be0deec8b4dfaca7237b00cbc17d12216879370164678bde6e8323a5fad3e788831662d15d047b54ca340
-
Filesize
409KB
MD5a03290b0f1445f35e270d8ba1937bfe0
SHA16dd881c2c49156405f8ccf038213329d93df4e9b
SHA256a36fd0192d158c76bc6b96483b7cb26e7747177bf94392a8c0bdd7d159a4c360
SHA512accfc134b5d9493d8b759e61d9587f24c024cd42514be0deec8b4dfaca7237b00cbc17d12216879370164678bde6e8323a5fad3e788831662d15d047b54ca340
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
361KB
MD588a3b5b6ae5887cb8c6e2d38b2d11fbd
SHA10a749821b96f2125a7aa9a33a77cfb21b3e845be
SHA2561bef5782e64f7156419b25aeaf766903f3eed0056ff551dfa94b55bd378ecbfc
SHA5127d851384a46a3c3502c85c9ae16928c4bc7742531c086a63f1341bf498cfc0332eca2bacee58aa12d4784258c1e7ff361f137f3e65023d208c5e931255e88d8d
-
Filesize
361KB
MD588a3b5b6ae5887cb8c6e2d38b2d11fbd
SHA10a749821b96f2125a7aa9a33a77cfb21b3e845be
SHA2561bef5782e64f7156419b25aeaf766903f3eed0056ff551dfa94b55bd378ecbfc
SHA5127d851384a46a3c3502c85c9ae16928c4bc7742531c086a63f1341bf498cfc0332eca2bacee58aa12d4784258c1e7ff361f137f3e65023d208c5e931255e88d8d