Analysis
-
max time kernel
204s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 22:11
Static task
static1
Behavioral task
behavioral1
Sample
60a28689b00f56c7b1be1f893655711fb3a224add70d9e33a7623f05879e50d6.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
60a28689b00f56c7b1be1f893655711fb3a224add70d9e33a7623f05879e50d6.exe
Resource
win10v2004-20230220-en
General
-
Target
60a28689b00f56c7b1be1f893655711fb3a224add70d9e33a7623f05879e50d6.exe
-
Size
913KB
-
MD5
5daf97ba89d7bed2c23a92dd9e0d571d
-
SHA1
ff37fe01e24b8302ef2a2337e08557b194e334b7
-
SHA256
60a28689b00f56c7b1be1f893655711fb3a224add70d9e33a7623f05879e50d6
-
SHA512
e1d305d57cf69631ab628874e63efdc869f72c12e17b740a0a2255dc46fc5b57635b0b5ea0debd127385b4cd6acb37ba172fa826c0b03db08431acf497cdbad8
-
SSDEEP
24576:XyiB4WZhteQ1mwwzmqKE7ZxcVa3sWkHxQdg+:iGLtX1mwKmqKE7Zx38WAGd
Malware Config
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1540-4472-0x0000000005DA0000-0x00000000063B8000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation 29785810.exe -
Executes dropped EXE 5 IoCs
pid Process 2272 st027002.exe 396 29785810.exe 1448 1.exe 3816 kp990655.exe 1540 lr923600.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 1.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 60a28689b00f56c7b1be1f893655711fb3a224add70d9e33a7623f05879e50d6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 60a28689b00f56c7b1be1f893655711fb3a224add70d9e33a7623f05879e50d6.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st027002.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st027002.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1268 3816 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1448 1.exe 1448 1.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 396 29785810.exe Token: SeDebugPrivilege 1448 1.exe Token: SeDebugPrivilege 3816 kp990655.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2272 2104 60a28689b00f56c7b1be1f893655711fb3a224add70d9e33a7623f05879e50d6.exe 81 PID 2104 wrote to memory of 2272 2104 60a28689b00f56c7b1be1f893655711fb3a224add70d9e33a7623f05879e50d6.exe 81 PID 2104 wrote to memory of 2272 2104 60a28689b00f56c7b1be1f893655711fb3a224add70d9e33a7623f05879e50d6.exe 81 PID 2272 wrote to memory of 396 2272 st027002.exe 82 PID 2272 wrote to memory of 396 2272 st027002.exe 82 PID 2272 wrote to memory of 396 2272 st027002.exe 82 PID 396 wrote to memory of 1448 396 29785810.exe 86 PID 396 wrote to memory of 1448 396 29785810.exe 86 PID 2272 wrote to memory of 3816 2272 st027002.exe 87 PID 2272 wrote to memory of 3816 2272 st027002.exe 87 PID 2272 wrote to memory of 3816 2272 st027002.exe 87 PID 2104 wrote to memory of 1540 2104 60a28689b00f56c7b1be1f893655711fb3a224add70d9e33a7623f05879e50d6.exe 94 PID 2104 wrote to memory of 1540 2104 60a28689b00f56c7b1be1f893655711fb3a224add70d9e33a7623f05879e50d6.exe 94 PID 2104 wrote to memory of 1540 2104 60a28689b00f56c7b1be1f893655711fb3a224add70d9e33a7623f05879e50d6.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\60a28689b00f56c7b1be1f893655711fb3a224add70d9e33a7623f05879e50d6.exe"C:\Users\Admin\AppData\Local\Temp\60a28689b00f56c7b1be1f893655711fb3a224add70d9e33a7623f05879e50d6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st027002.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st027002.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\29785810.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\29785810.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1448
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp990655.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp990655.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3816 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3816 -s 12764⤵
- Program crash
PID:1268
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr923600.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr923600.exe2⤵
- Executes dropped EXE
PID:1540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3816 -ip 38161⤵PID:4048
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5761c5a51727a947224c3ffaa853e8feb
SHA1e222bcdd8a72096d5273aa47a3f63816a85782bf
SHA256905e0a6580c0166149a2141a24abcec5f17b19b254fb4c928ce870cfcf279fe4
SHA512829a7a70f1ebf123f78d09e60ecc9586d5bd26e5117807ffbd536ecf8f61d758f81b16af3ff69c8ba6afbe1d108a7bd85de860550a4f011df01ad3ee82c30795
-
Filesize
168KB
MD5761c5a51727a947224c3ffaa853e8feb
SHA1e222bcdd8a72096d5273aa47a3f63816a85782bf
SHA256905e0a6580c0166149a2141a24abcec5f17b19b254fb4c928ce870cfcf279fe4
SHA512829a7a70f1ebf123f78d09e60ecc9586d5bd26e5117807ffbd536ecf8f61d758f81b16af3ff69c8ba6afbe1d108a7bd85de860550a4f011df01ad3ee82c30795
-
Filesize
759KB
MD5fbaab3afcc4ac520e911910b6ef2d3c9
SHA1d2df6e919b0f720a4f0543c477eb3bb935de309a
SHA256fa9995192f20da880a544c3c224496141aaeb4442623d7675e5002a1ab0f4d21
SHA51270d6bcbeeaf5305f1d7e800e85999b9e7f8dba3bb567ea1a4d1834d9eb9997938906e8ac78f40b0b2e586eb9a334e5c42c682d570333549030526c37a1eccf05
-
Filesize
759KB
MD5fbaab3afcc4ac520e911910b6ef2d3c9
SHA1d2df6e919b0f720a4f0543c477eb3bb935de309a
SHA256fa9995192f20da880a544c3c224496141aaeb4442623d7675e5002a1ab0f4d21
SHA51270d6bcbeeaf5305f1d7e800e85999b9e7f8dba3bb567ea1a4d1834d9eb9997938906e8ac78f40b0b2e586eb9a334e5c42c682d570333549030526c37a1eccf05
-
Filesize
300KB
MD5f6171d9a5f3f9be09c5801cf48f08ae2
SHA18a36d59081d98b20494004482b9479f66e470542
SHA256a6ca35091a3d8a697b4402637e58af4bb96915962c79d9fce8ba96e0f6a93f61
SHA5123d5a783c8a77ab8be5fe54109ed37933a617d4bac5130e068faec341ae2e3692d63b62236af8f673b021d91bf5d085c5b046020691d2d8face2e69149872a164
-
Filesize
300KB
MD5f6171d9a5f3f9be09c5801cf48f08ae2
SHA18a36d59081d98b20494004482b9479f66e470542
SHA256a6ca35091a3d8a697b4402637e58af4bb96915962c79d9fce8ba96e0f6a93f61
SHA5123d5a783c8a77ab8be5fe54109ed37933a617d4bac5130e068faec341ae2e3692d63b62236af8f673b021d91bf5d085c5b046020691d2d8face2e69149872a164
-
Filesize
539KB
MD5ac16b21e81ff7bb68d423eb3352575d4
SHA1c16e184bfbb018e482b66c6725296fa20f09fa83
SHA256a206a8e54ff3c0409c90e6f6e6b88e5786a980b1156f59ec74f809e3baa36804
SHA51296ee22b600bf1c0f7c973da15b610b55f2f90d31fb0eb5c620e256692483e82086751c58d2e797cac76c1d542a01f24a8f10c470f83058e63d8856834e019391
-
Filesize
539KB
MD5ac16b21e81ff7bb68d423eb3352575d4
SHA1c16e184bfbb018e482b66c6725296fa20f09fa83
SHA256a206a8e54ff3c0409c90e6f6e6b88e5786a980b1156f59ec74f809e3baa36804
SHA51296ee22b600bf1c0f7c973da15b610b55f2f90d31fb0eb5c620e256692483e82086751c58d2e797cac76c1d542a01f24a8f10c470f83058e63d8856834e019391
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91