Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 22:19
Static task
static1
Behavioral task
behavioral1
Sample
67d42b19dc8aa2cece921c837b75853318b3ff2f9b314ae20d5561d3e97b190e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
67d42b19dc8aa2cece921c837b75853318b3ff2f9b314ae20d5561d3e97b190e.exe
Resource
win10v2004-20230220-en
General
-
Target
67d42b19dc8aa2cece921c837b75853318b3ff2f9b314ae20d5561d3e97b190e.exe
-
Size
376KB
-
MD5
47eb7f8e62d1e1158823f5c3fb9f9a67
-
SHA1
c2b2fe81e9feb6e6e87ce0a865f77b1527a088ef
-
SHA256
67d42b19dc8aa2cece921c837b75853318b3ff2f9b314ae20d5561d3e97b190e
-
SHA512
d8ba3ac7a302378e40ff13013cd1f96f394460184ac0c261011a2f00655a6f69a72cd5e1c0a26603ac059a16009382d3c84674bbcee393b73b3382cbc7a314b7
-
SSDEEP
6144:KGy+bnr+qp0yN90QE2JPulnepE1lUu3larWDFyb4wVRh/PtJwoDo3:GMrmy90wJufUu1IWDFyMwVn/FJwv
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/776-153-0x0000000008140000-0x0000000008758000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a7913622.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a7913622.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a7913622.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a7913622.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a7913622.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a7913622.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 3660 v2092004.exe 5084 a7913622.exe 776 b8651371.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a7913622.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 67d42b19dc8aa2cece921c837b75853318b3ff2f9b314ae20d5561d3e97b190e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2092004.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2092004.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 67d42b19dc8aa2cece921c837b75853318b3ff2f9b314ae20d5561d3e97b190e.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5084 a7913622.exe 5084 a7913622.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5084 a7913622.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1816 wrote to memory of 3660 1816 67d42b19dc8aa2cece921c837b75853318b3ff2f9b314ae20d5561d3e97b190e.exe 84 PID 1816 wrote to memory of 3660 1816 67d42b19dc8aa2cece921c837b75853318b3ff2f9b314ae20d5561d3e97b190e.exe 84 PID 1816 wrote to memory of 3660 1816 67d42b19dc8aa2cece921c837b75853318b3ff2f9b314ae20d5561d3e97b190e.exe 84 PID 3660 wrote to memory of 5084 3660 v2092004.exe 85 PID 3660 wrote to memory of 5084 3660 v2092004.exe 85 PID 3660 wrote to memory of 776 3660 v2092004.exe 86 PID 3660 wrote to memory of 776 3660 v2092004.exe 86 PID 3660 wrote to memory of 776 3660 v2092004.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\67d42b19dc8aa2cece921c837b75853318b3ff2f9b314ae20d5561d3e97b190e.exe"C:\Users\Admin\AppData\Local\Temp\67d42b19dc8aa2cece921c837b75853318b3ff2f9b314ae20d5561d3e97b190e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2092004.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2092004.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7913622.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7913622.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5084
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b8651371.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b8651371.exe3⤵
- Executes dropped EXE
PID:776
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD53c5fac6529e47315af23d8b3d288cf69
SHA1a1ab2f3279cb8ffd329e8971abff9ea5395e72a7
SHA256ceafee2d8cfd06e81609011cc3956b6a12ca64281b5f91774e8d9f877ea11485
SHA512bda13c4a8e1a4eebd0af19a81c2a2fec159aaf3580b24664c4dd7a273eb063180fa1c95b98667abada11460d9b8bd76c9f94a34d814da91f0f085072c179b54a
-
Filesize
204KB
MD53c5fac6529e47315af23d8b3d288cf69
SHA1a1ab2f3279cb8ffd329e8971abff9ea5395e72a7
SHA256ceafee2d8cfd06e81609011cc3956b6a12ca64281b5f91774e8d9f877ea11485
SHA512bda13c4a8e1a4eebd0af19a81c2a2fec159aaf3580b24664c4dd7a273eb063180fa1c95b98667abada11460d9b8bd76c9f94a34d814da91f0f085072c179b54a
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
136KB
MD5ed06ca28c3926ba30af7bffd56392d5d
SHA10f07f497213e0688365b4b70f28dfa1cf569287f
SHA25606a6283fdaa8bc3ad6b1b6f2b2dec484b8f2812a9e3da97aca92ec565b45f810
SHA5120659e9ef387c0cde26093bb8f9c377f8522d29fa912e7f972f8f0bf86e00689a4532ab349637c6550254e05539c20a77edb5845bade2f02d92b3e0f02acbf026
-
Filesize
136KB
MD5ed06ca28c3926ba30af7bffd56392d5d
SHA10f07f497213e0688365b4b70f28dfa1cf569287f
SHA25606a6283fdaa8bc3ad6b1b6f2b2dec484b8f2812a9e3da97aca92ec565b45f810
SHA5120659e9ef387c0cde26093bb8f9c377f8522d29fa912e7f972f8f0bf86e00689a4532ab349637c6550254e05539c20a77edb5845bade2f02d92b3e0f02acbf026