Analysis
-
max time kernel
229s -
max time network
269s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 22:21
Static task
static1
Behavioral task
behavioral1
Sample
6960d843f1b47db7aa8e3b46cff8d727229559383285bc37ccf50497a7297f9f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6960d843f1b47db7aa8e3b46cff8d727229559383285bc37ccf50497a7297f9f.exe
Resource
win10v2004-20230221-en
General
-
Target
6960d843f1b47db7aa8e3b46cff8d727229559383285bc37ccf50497a7297f9f.exe
-
Size
376KB
-
MD5
fee5d8de36086d28eb03276a1978abdc
-
SHA1
54f80385cf49e04c2342355dd61f2847fb2fa835
-
SHA256
6960d843f1b47db7aa8e3b46cff8d727229559383285bc37ccf50497a7297f9f
-
SHA512
db189ff85fee462fad7eccbaaa471567cf5b6621ae5258afc7d7afbaddb3874abc90b4179305617ddd9e53112724495fbf73ec63f6ead0f307dfc0c6b092a8ee
-
SSDEEP
6144:KCy+bnr+cp0yN90QE0wPQy7RkLafdkp4DljuVKG0Ml3s17It/YLzCdGpvnn5bXYV:OMroy902wPzl2aC4DljhMI7I1Uuen57+
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/2576-153-0x00000000074E0000-0x0000000007AF8000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a8596614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a8596614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a8596614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a8596614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a8596614.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a8596614.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4672 v1219371.exe 396 a8596614.exe 2576 b9157152.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" a8596614.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6960d843f1b47db7aa8e3b46cff8d727229559383285bc37ccf50497a7297f9f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6960d843f1b47db7aa8e3b46cff8d727229559383285bc37ccf50497a7297f9f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1219371.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v1219371.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 396 a8596614.exe 396 a8596614.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 396 a8596614.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1780 wrote to memory of 4672 1780 6960d843f1b47db7aa8e3b46cff8d727229559383285bc37ccf50497a7297f9f.exe 79 PID 1780 wrote to memory of 4672 1780 6960d843f1b47db7aa8e3b46cff8d727229559383285bc37ccf50497a7297f9f.exe 79 PID 1780 wrote to memory of 4672 1780 6960d843f1b47db7aa8e3b46cff8d727229559383285bc37ccf50497a7297f9f.exe 79 PID 4672 wrote to memory of 396 4672 v1219371.exe 80 PID 4672 wrote to memory of 396 4672 v1219371.exe 80 PID 4672 wrote to memory of 2576 4672 v1219371.exe 81 PID 4672 wrote to memory of 2576 4672 v1219371.exe 81 PID 4672 wrote to memory of 2576 4672 v1219371.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\6960d843f1b47db7aa8e3b46cff8d727229559383285bc37ccf50497a7297f9f.exe"C:\Users\Admin\AppData\Local\Temp\6960d843f1b47db7aa8e3b46cff8d727229559383285bc37ccf50497a7297f9f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1219371.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1219371.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a8596614.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a8596614.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:396
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b9157152.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b9157152.exe3⤵
- Executes dropped EXE
PID:2576
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD52bdc865ccc8f04ebc456dfd023c3ba97
SHA1c9827414b1bdc60364d7eabd6815eb7e1680506f
SHA2568ab7895076c7af35d79f84036fab6d645f72d296a90be9106bac61ba297cfdc5
SHA512679918b71b56bde2f3dd4521a97a2f17d1b6e1e5c05263174913d31e32dd0952f96d8b48643800f7a79d697ad0c81393eca572c1602952923f0b867ceab6141e
-
Filesize
204KB
MD52bdc865ccc8f04ebc456dfd023c3ba97
SHA1c9827414b1bdc60364d7eabd6815eb7e1680506f
SHA2568ab7895076c7af35d79f84036fab6d645f72d296a90be9106bac61ba297cfdc5
SHA512679918b71b56bde2f3dd4521a97a2f17d1b6e1e5c05263174913d31e32dd0952f96d8b48643800f7a79d697ad0c81393eca572c1602952923f0b867ceab6141e
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
136KB
MD530d0ee0947be55272def37f502e40d83
SHA167dec087565870ddbba362f33bc909491d56f0d7
SHA256876c00366d8cdda682030628307cbcbd8a90ffc831cb0176173207b36bf28514
SHA5120b98ba7648398642441894a970d889d0d4769317531473def2decb847bdb9472b0b3671f96126ad7ad023d4a434cbcef8da7c8663df718dcf6ee3557874ad284
-
Filesize
136KB
MD530d0ee0947be55272def37f502e40d83
SHA167dec087565870ddbba362f33bc909491d56f0d7
SHA256876c00366d8cdda682030628307cbcbd8a90ffc831cb0176173207b36bf28514
SHA5120b98ba7648398642441894a970d889d0d4769317531473def2decb847bdb9472b0b3671f96126ad7ad023d4a434cbcef8da7c8663df718dcf6ee3557874ad284