Analysis
-
max time kernel
146s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 21:36
Static task
static1
Behavioral task
behavioral1
Sample
43940d0d2dbd9ace847a8479fa905e8f09f1aee3946ad73bea873ced1dc6f9c8.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
43940d0d2dbd9ace847a8479fa905e8f09f1aee3946ad73bea873ced1dc6f9c8.exe
Resource
win10v2004-20230220-en
General
-
Target
43940d0d2dbd9ace847a8479fa905e8f09f1aee3946ad73bea873ced1dc6f9c8.exe
-
Size
618KB
-
MD5
b30e0a4785cec3b257c3a9612a1dbfd8
-
SHA1
59d57ccb332c15293935f06e4988a99155d87560
-
SHA256
43940d0d2dbd9ace847a8479fa905e8f09f1aee3946ad73bea873ced1dc6f9c8
-
SHA512
b34dd92e1cede2324cd605a2178af853ac67994944f0e0c86a11f200a2afdfa57b1300409ae780c0b869dd4059b24d23e11746ff33258f91a5e20187ae9bc17c
-
SSDEEP
12288:My90XcOTvSjqiiF0gufvR5ebrBimueRcclNPiYtn3hWREeMKJzk4:MymcEvSiF0g3WOrt0RLJI4
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4052-949-0x00000000078B0000-0x0000000007EC8000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 76010441.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 76010441.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 76010441.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 76010441.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 76010441.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 76010441.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4696 st216657.exe 4656 76010441.exe 4052 kp234826.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 76010441.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 43940d0d2dbd9ace847a8479fa905e8f09f1aee3946ad73bea873ced1dc6f9c8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st216657.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st216657.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 43940d0d2dbd9ace847a8479fa905e8f09f1aee3946ad73bea873ced1dc6f9c8.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4656 76010441.exe 4656 76010441.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4656 76010441.exe Token: SeDebugPrivilege 4052 kp234826.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4796 wrote to memory of 4696 4796 43940d0d2dbd9ace847a8479fa905e8f09f1aee3946ad73bea873ced1dc6f9c8.exe 81 PID 4796 wrote to memory of 4696 4796 43940d0d2dbd9ace847a8479fa905e8f09f1aee3946ad73bea873ced1dc6f9c8.exe 81 PID 4796 wrote to memory of 4696 4796 43940d0d2dbd9ace847a8479fa905e8f09f1aee3946ad73bea873ced1dc6f9c8.exe 81 PID 4696 wrote to memory of 4656 4696 st216657.exe 82 PID 4696 wrote to memory of 4656 4696 st216657.exe 82 PID 4696 wrote to memory of 4052 4696 st216657.exe 85 PID 4696 wrote to memory of 4052 4696 st216657.exe 85 PID 4696 wrote to memory of 4052 4696 st216657.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\43940d0d2dbd9ace847a8479fa905e8f09f1aee3946ad73bea873ced1dc6f9c8.exe"C:\Users\Admin\AppData\Local\Temp\43940d0d2dbd9ace847a8479fa905e8f09f1aee3946ad73bea873ced1dc6f9c8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st216657.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st216657.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\76010441.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\76010441.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4656
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp234826.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp234826.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4052
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
464KB
MD5dead5e30314c5db6b9e2b6471617c204
SHA19fd5d83c5136f04dad8e93cf47386c2130855488
SHA2563ac090c6cdaef8653394314ee84df3dfc3bce3fdf8728b6dc04c8e1daf42cf94
SHA512f8256abd5a6f36fda2c1ff796ae5554ba765d322ffd81e4d1c5765819e7303db038749cbc8904536a5fa9a47f7565fd99ec4beba9efed8e191060282d1d74840
-
Filesize
464KB
MD5dead5e30314c5db6b9e2b6471617c204
SHA19fd5d83c5136f04dad8e93cf47386c2130855488
SHA2563ac090c6cdaef8653394314ee84df3dfc3bce3fdf8728b6dc04c8e1daf42cf94
SHA512f8256abd5a6f36fda2c1ff796ae5554ba765d322ffd81e4d1c5765819e7303db038749cbc8904536a5fa9a47f7565fd99ec4beba9efed8e191060282d1d74840
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
478KB
MD56f9be4dab4c81bd6c343cd714f048f0a
SHA1c1b8f6c68f3e4c07d436ccca5bb76f2c1845f276
SHA256ad267cd6a90902f0d2bfd5b3335d7d94ebf65bfa5b3a394296ba2be84aea50c5
SHA5124a351bde63028ed393f0d7e5161d1b146d1f99d7ba44a5b31c2c3f349bfe7153d591e14ba525698e9837adbec4d5859a5f0fc0d4770c2d63f2edc8278e73e82c
-
Filesize
478KB
MD56f9be4dab4c81bd6c343cd714f048f0a
SHA1c1b8f6c68f3e4c07d436ccca5bb76f2c1845f276
SHA256ad267cd6a90902f0d2bfd5b3335d7d94ebf65bfa5b3a394296ba2be84aea50c5
SHA5124a351bde63028ed393f0d7e5161d1b146d1f99d7ba44a5b31c2c3f349bfe7153d591e14ba525698e9837adbec4d5859a5f0fc0d4770c2d63f2edc8278e73e82c