Analysis
-
max time kernel
138s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 22:06
Static task
static1
Behavioral task
behavioral1
Sample
5c68ab6bd4dd50b50b8b7392541d43744cda7eca8fb5493a96b121e704e2d4e3.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5c68ab6bd4dd50b50b8b7392541d43744cda7eca8fb5493a96b121e704e2d4e3.exe
Resource
win10v2004-20230220-en
General
-
Target
5c68ab6bd4dd50b50b8b7392541d43744cda7eca8fb5493a96b121e704e2d4e3.exe
-
Size
480KB
-
MD5
c22ecf7be4172b40ba0f12d3b88f3a77
-
SHA1
c0aa96d17ff1e8a6169a98e45c91414561d2d72c
-
SHA256
5c68ab6bd4dd50b50b8b7392541d43744cda7eca8fb5493a96b121e704e2d4e3
-
SHA512
2edcc61f51188a4a998bc472b6fe40049e8412d2f767fcab953f4c61a41700f4ada723ad88d88667a200f947660a7bf8b324e2a3b0c739d21e7c2a04e708af14
-
SSDEEP
12288:kMrWy90a4K3p1NKtuwa5suOqk8F3rXhyXP/:yy30tF63rhQ/
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4080-187-0x0000000007EC0000-0x00000000084D8000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k7428967.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k7428967.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k7428967.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k7428967.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k7428967.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k7428967.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 5104 y7874431.exe 2376 k7428967.exe 4080 l2688427.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k7428967.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k7428967.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5c68ab6bd4dd50b50b8b7392541d43744cda7eca8fb5493a96b121e704e2d4e3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5c68ab6bd4dd50b50b8b7392541d43744cda7eca8fb5493a96b121e704e2d4e3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y7874431.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y7874431.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2376 k7428967.exe 2376 k7428967.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2376 k7428967.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2092 wrote to memory of 5104 2092 5c68ab6bd4dd50b50b8b7392541d43744cda7eca8fb5493a96b121e704e2d4e3.exe 85 PID 2092 wrote to memory of 5104 2092 5c68ab6bd4dd50b50b8b7392541d43744cda7eca8fb5493a96b121e704e2d4e3.exe 85 PID 2092 wrote to memory of 5104 2092 5c68ab6bd4dd50b50b8b7392541d43744cda7eca8fb5493a96b121e704e2d4e3.exe 85 PID 5104 wrote to memory of 2376 5104 y7874431.exe 86 PID 5104 wrote to memory of 2376 5104 y7874431.exe 86 PID 5104 wrote to memory of 2376 5104 y7874431.exe 86 PID 5104 wrote to memory of 4080 5104 y7874431.exe 87 PID 5104 wrote to memory of 4080 5104 y7874431.exe 87 PID 5104 wrote to memory of 4080 5104 y7874431.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c68ab6bd4dd50b50b8b7392541d43744cda7eca8fb5493a96b121e704e2d4e3.exe"C:\Users\Admin\AppData\Local\Temp\5c68ab6bd4dd50b50b8b7392541d43744cda7eca8fb5493a96b121e704e2d4e3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7874431.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7874431.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7428967.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7428967.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2376
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2688427.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l2688427.exe3⤵
- Executes dropped EXE
PID:4080
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD54bd71a90a4aa125a8590163447d94c3f
SHA167318fed9bdfa16bdc5479059c1f88528cf64138
SHA25680510d6679fbf1690ce783f9c6c0d0fc501a28bb041290b84bef0c11f1928887
SHA512107d37a3c94470c7694b46ca8712f7ab0aaefb68f516adc305c165a45a13cc8934071f4dadfd2ea7c3ac50a8f89904780315937a8b1c99e72a843422933f2c4e
-
Filesize
308KB
MD54bd71a90a4aa125a8590163447d94c3f
SHA167318fed9bdfa16bdc5479059c1f88528cf64138
SHA25680510d6679fbf1690ce783f9c6c0d0fc501a28bb041290b84bef0c11f1928887
SHA512107d37a3c94470c7694b46ca8712f7ab0aaefb68f516adc305c165a45a13cc8934071f4dadfd2ea7c3ac50a8f89904780315937a8b1c99e72a843422933f2c4e
-
Filesize
175KB
MD56efa797eb50dac8657ff6d73429238c0
SHA1c90fb0c95ab592d374a87509f25849ede9c76b0e
SHA2560e62738c1d9c012ac4442b31491d45780fb8e0e968b43d96624a278e9a2585b8
SHA512d01d7673e72e4e5f56041fd3d20dd72d2261298118cc20981da4d2a81fbc446af014809c022ec21d422648065a0b603a71a4e5fe2d9a14192edb5422ee192dbd
-
Filesize
175KB
MD56efa797eb50dac8657ff6d73429238c0
SHA1c90fb0c95ab592d374a87509f25849ede9c76b0e
SHA2560e62738c1d9c012ac4442b31491d45780fb8e0e968b43d96624a278e9a2585b8
SHA512d01d7673e72e4e5f56041fd3d20dd72d2261298118cc20981da4d2a81fbc446af014809c022ec21d422648065a0b603a71a4e5fe2d9a14192edb5422ee192dbd
-
Filesize
136KB
MD5a9cffe55332618677bd3a47a2074e1d5
SHA197a87c851200aa3b4affb8f9e5fb249f95fe430b
SHA2568bbbb84343c512e9f36b18f4ffe3ed6e53a5668c64958f1bcbb20c0a9b2bce93
SHA5124f6f4c13ac0721fafbc1957262dd996608beab786e270c7f5f5b51b918ccd3b9925052d9d5225f5795b2a98e516597491547ccc3ef0c6d625371b96809949e5f
-
Filesize
136KB
MD5a9cffe55332618677bd3a47a2074e1d5
SHA197a87c851200aa3b4affb8f9e5fb249f95fe430b
SHA2568bbbb84343c512e9f36b18f4ffe3ed6e53a5668c64958f1bcbb20c0a9b2bce93
SHA5124f6f4c13ac0721fafbc1957262dd996608beab786e270c7f5f5b51b918ccd3b9925052d9d5225f5795b2a98e516597491547ccc3ef0c6d625371b96809949e5f