Analysis
-
max time kernel
184s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 22:21
Static task
static1
Behavioral task
behavioral1
Sample
69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c.exe
Resource
win10v2004-20230220-en
General
-
Target
69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c.exe
-
Size
934KB
-
MD5
baebcb29052de8caa8aabaf105c26784
-
SHA1
013abd1f46591da06e79979fea0082fe389fac78
-
SHA256
69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c
-
SHA512
5dde310300c937656a2c397fb623fbd926c203dcfb47ac340e0f7699510a1dff513ff4dd876c047a2679626eb7998f02f50e5e122fec459f1b72502d8b62e20e
-
SSDEEP
24576:DyJ8vrKB1w0nZOXgkOFX/l8p3nDTTfiPbduPvx:WKT4w0MwRFXtODqPEn
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/5008-4485-0x0000000005F30000-0x0000000006548000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation 85940504.exe Key value queried \REGISTRY\USER\S-1-5-21-1529757233-3489015626-3409890339-1000\Control Panel\International\Geo\Nation rk904859.exe -
Executes dropped EXE 6 IoCs
pid Process 5040 un015561.exe 264 85940504.exe 2552 1.exe 3148 rk904859.exe 2700 1.exe 5008 si042132.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 1.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un015561.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un015561.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4060 264 WerFault.exe 82 1628 3148 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2552 1.exe 2552 1.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 264 85940504.exe Token: SeDebugPrivilege 2552 1.exe Token: SeDebugPrivilege 3148 rk904859.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4904 wrote to memory of 5040 4904 69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c.exe 81 PID 4904 wrote to memory of 5040 4904 69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c.exe 81 PID 4904 wrote to memory of 5040 4904 69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c.exe 81 PID 5040 wrote to memory of 264 5040 un015561.exe 82 PID 5040 wrote to memory of 264 5040 un015561.exe 82 PID 5040 wrote to memory of 264 5040 un015561.exe 82 PID 264 wrote to memory of 2552 264 85940504.exe 83 PID 264 wrote to memory of 2552 264 85940504.exe 83 PID 5040 wrote to memory of 3148 5040 un015561.exe 89 PID 5040 wrote to memory of 3148 5040 un015561.exe 89 PID 5040 wrote to memory of 3148 5040 un015561.exe 89 PID 3148 wrote to memory of 2700 3148 rk904859.exe 94 PID 3148 wrote to memory of 2700 3148 rk904859.exe 94 PID 3148 wrote to memory of 2700 3148 rk904859.exe 94 PID 4904 wrote to memory of 5008 4904 69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c.exe 97 PID 4904 wrote to memory of 5008 4904 69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c.exe 97 PID 4904 wrote to memory of 5008 4904 69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c.exe"C:\Users\Admin\AppData\Local\Temp\69a0693685dc519e57c5b08e9d1375df0bc56428ccc2167fc7e38f84ab46897c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un015561.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un015561.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\85940504.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\85940504.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 264 -s 13844⤵
- Program crash
PID:4060
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk904859.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk904859.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
PID:2700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3148 -s 13764⤵
- Program crash
PID:1628
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si042132.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si042132.exe2⤵
- Executes dropped EXE
PID:5008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 264 -ip 2641⤵PID:1016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3148 -ip 31481⤵PID:4212
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD52b51c6b70e77afdbd275c80eae26c30d
SHA1af59cb3982cf578734d2ca82d849a35adb5b0465
SHA25629fdf4d1cd97ab492bd487e03c71c045c00cb7d70f9f2e77e29aab061f08d77f
SHA512c80c605934f005fffceec5667b0d1367dceffb8ca55f61fda9111e5e83be6c25a3aa56d57d77ab658e0fb8370417353c39d95e051455e034674ac0c87a109d47
-
Filesize
169KB
MD52b51c6b70e77afdbd275c80eae26c30d
SHA1af59cb3982cf578734d2ca82d849a35adb5b0465
SHA25629fdf4d1cd97ab492bd487e03c71c045c00cb7d70f9f2e77e29aab061f08d77f
SHA512c80c605934f005fffceec5667b0d1367dceffb8ca55f61fda9111e5e83be6c25a3aa56d57d77ab658e0fb8370417353c39d95e051455e034674ac0c87a109d47
-
Filesize
781KB
MD599c9a2bf4700a390fbbd5c3cb80187ff
SHA14ca59ed616f895f81be69cec43ec1ac8683563ed
SHA256680307999368a50af38452eea760f7748d1740046b8653d6fa036df321774fc3
SHA5125eb44e4a6363baebd4842851e1eec5a0b09913b93f93914732cec6d225a814e741f3ed0729479f251dace6b68bbc375f4e1182b8603a93b1a217184ab7ebb1b8
-
Filesize
781KB
MD599c9a2bf4700a390fbbd5c3cb80187ff
SHA14ca59ed616f895f81be69cec43ec1ac8683563ed
SHA256680307999368a50af38452eea760f7748d1740046b8653d6fa036df321774fc3
SHA5125eb44e4a6363baebd4842851e1eec5a0b09913b93f93914732cec6d225a814e741f3ed0729479f251dace6b68bbc375f4e1182b8603a93b1a217184ab7ebb1b8
-
Filesize
522KB
MD53c766f3934aa8493f4ded0ff78ae2eac
SHA1c92cfe3632e5828f459c479bf95302b7d7e8c0d4
SHA25622293adb26e21eafd80820bcdc35034796aacf1fa069890cf2d44c9056c338c0
SHA512747ca5fdaad4fa16861e1dd73bee51e63cd926fbc417f08354f8a89891c643f135bf26814a465771b605c921d5275481cf32fa72655489968d7a6152848d939b
-
Filesize
522KB
MD53c766f3934aa8493f4ded0ff78ae2eac
SHA1c92cfe3632e5828f459c479bf95302b7d7e8c0d4
SHA25622293adb26e21eafd80820bcdc35034796aacf1fa069890cf2d44c9056c338c0
SHA512747ca5fdaad4fa16861e1dd73bee51e63cd926fbc417f08354f8a89891c643f135bf26814a465771b605c921d5275481cf32fa72655489968d7a6152848d939b
-
Filesize
582KB
MD574488419d2cbc53efac89dd1de83db0c
SHA14cd8e825f0ecaf0991a4a91847cbe800743bf00a
SHA256bf1233501e5aab411a3c50748f3b0281b6d5bd198f4b965edad6a6cac95d2cd3
SHA512037d044cd5437a3e17c6dc4a563f7d4a28865b64a219d1231f5500bc28c4ffe84c5a65c7bdfcabcf8f3dd3368fd05ca4284706a9e946427dbd9cd905406b71e0
-
Filesize
582KB
MD574488419d2cbc53efac89dd1de83db0c
SHA14cd8e825f0ecaf0991a4a91847cbe800743bf00a
SHA256bf1233501e5aab411a3c50748f3b0281b6d5bd198f4b965edad6a6cac95d2cd3
SHA512037d044cd5437a3e17c6dc4a563f7d4a28865b64a219d1231f5500bc28c4ffe84c5a65c7bdfcabcf8f3dd3368fd05ca4284706a9e946427dbd9cd905406b71e0
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf