Analysis
-
max time kernel
190s -
max time network
198s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 21:42
Static task
static1
Behavioral task
behavioral1
Sample
485f881d0d75b13ab0c029a282b8e6a1e95885b23f9a583542c9216cad9eba6b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
485f881d0d75b13ab0c029a282b8e6a1e95885b23f9a583542c9216cad9eba6b.exe
Resource
win10v2004-20230220-en
General
-
Target
485f881d0d75b13ab0c029a282b8e6a1e95885b23f9a583542c9216cad9eba6b.exe
-
Size
1014KB
-
MD5
f4f79566cafc95de47242858c0fc8cec
-
SHA1
23ef970c0d01b54c4cae269991f09e6c235a74af
-
SHA256
485f881d0d75b13ab0c029a282b8e6a1e95885b23f9a583542c9216cad9eba6b
-
SHA512
6969e79630e59d50508df3f26ba2447a3f22af824a86f8887d0b2851061f7770723b3069af400e7368848e2a342d35f9ab7115973df3a0ea2386fb1376cfc62a
-
SSDEEP
24576:fyIp80fg6PaCak5FvQLZrKL8QxNScqBQpmLrZLg:qb0fg+aJka1A/qBYmL
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3496-999-0x0000000007960000-0x0000000007F78000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 05321043.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 05321043.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 05321043.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 05321043.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 05321043.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 05321043.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 5112 za987152.exe 2184 za063106.exe 2120 05321043.exe 3496 w92Xg31.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 05321043.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 05321043.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za987152.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" za987152.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za063106.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" za063106.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 485f881d0d75b13ab0c029a282b8e6a1e95885b23f9a583542c9216cad9eba6b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 485f881d0d75b13ab0c029a282b8e6a1e95885b23f9a583542c9216cad9eba6b.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2120 05321043.exe 2120 05321043.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2120 05321043.exe Token: SeDebugPrivilege 3496 w92Xg31.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4476 wrote to memory of 5112 4476 485f881d0d75b13ab0c029a282b8e6a1e95885b23f9a583542c9216cad9eba6b.exe 82 PID 4476 wrote to memory of 5112 4476 485f881d0d75b13ab0c029a282b8e6a1e95885b23f9a583542c9216cad9eba6b.exe 82 PID 4476 wrote to memory of 5112 4476 485f881d0d75b13ab0c029a282b8e6a1e95885b23f9a583542c9216cad9eba6b.exe 82 PID 5112 wrote to memory of 2184 5112 za987152.exe 83 PID 5112 wrote to memory of 2184 5112 za987152.exe 83 PID 5112 wrote to memory of 2184 5112 za987152.exe 83 PID 2184 wrote to memory of 2120 2184 za063106.exe 84 PID 2184 wrote to memory of 2120 2184 za063106.exe 84 PID 2184 wrote to memory of 2120 2184 za063106.exe 84 PID 2184 wrote to memory of 3496 2184 za063106.exe 85 PID 2184 wrote to memory of 3496 2184 za063106.exe 85 PID 2184 wrote to memory of 3496 2184 za063106.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\485f881d0d75b13ab0c029a282b8e6a1e95885b23f9a583542c9216cad9eba6b.exe"C:\Users\Admin\AppData\Local\Temp\485f881d0d75b13ab0c029a282b8e6a1e95885b23f9a583542c9216cad9eba6b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za987152.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za987152.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za063106.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za063106.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\05321043.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\05321043.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2120
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w92Xg31.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w92Xg31.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3496
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
787KB
MD5ceae418f4f28b1b93016ba3b5de69005
SHA1cf1bc82190f0f1ebe8915236d785520b6b832007
SHA256607952e2255ef810fac4202013486f91508da64bedb161184f86eb6e2d5b3dc0
SHA512ab3731bfe9de7d1ab1771c7970d1da6f5ded8502b5b16dddbac6b90f9e3c9eca2d8d502e7bb17faff9e9887b58c7b5d56967d164e93d1e6f6d67ea568cfafb98
-
Filesize
787KB
MD5ceae418f4f28b1b93016ba3b5de69005
SHA1cf1bc82190f0f1ebe8915236d785520b6b832007
SHA256607952e2255ef810fac4202013486f91508da64bedb161184f86eb6e2d5b3dc0
SHA512ab3731bfe9de7d1ab1771c7970d1da6f5ded8502b5b16dddbac6b90f9e3c9eca2d8d502e7bb17faff9e9887b58c7b5d56967d164e93d1e6f6d67ea568cfafb98
-
Filesize
603KB
MD5ae570aa8e84f02b918b3d8ad1dad70a7
SHA14e6f7d878100358a8b714c53619333363b763fcc
SHA256441a837b4e3408f59969f6a2f1ba03e5301e2d4abb6192b11fa8b3ea2d08af6e
SHA5124b0526f8e861b583f7ba97f943759174904859fad8b5d20404be6e38629de02ff17664be8f8797f1da1a453dfed3b615b50b020042f2a02afd13f2d380d1a4dc
-
Filesize
603KB
MD5ae570aa8e84f02b918b3d8ad1dad70a7
SHA14e6f7d878100358a8b714c53619333363b763fcc
SHA256441a837b4e3408f59969f6a2f1ba03e5301e2d4abb6192b11fa8b3ea2d08af6e
SHA5124b0526f8e861b583f7ba97f943759174904859fad8b5d20404be6e38629de02ff17664be8f8797f1da1a453dfed3b615b50b020042f2a02afd13f2d380d1a4dc
-
Filesize
390KB
MD5ebce50193d65c46c287d3983bf301e5e
SHA1069c69f8bfac65370eb1dc57f60e44d91cb5b244
SHA2561d84c3f1503d67322557efbbd19d6a36de51efe10b2e4e06d2924820752dcd32
SHA5120fabcb66337d030cbb871e1cc817adf90dc18b6758311b4cf76709c65f910ce14f4552116fa483d3c4307a74ee7cf7d0f600ba7589fdb81dcf663d7405a33b12
-
Filesize
390KB
MD5ebce50193d65c46c287d3983bf301e5e
SHA1069c69f8bfac65370eb1dc57f60e44d91cb5b244
SHA2561d84c3f1503d67322557efbbd19d6a36de51efe10b2e4e06d2924820752dcd32
SHA5120fabcb66337d030cbb871e1cc817adf90dc18b6758311b4cf76709c65f910ce14f4552116fa483d3c4307a74ee7cf7d0f600ba7589fdb81dcf663d7405a33b12
-
Filesize
478KB
MD50b2b5335f2b1cee5ff6485861dcbd140
SHA1235c36d5855fa45f9bb08ded9865ec0fb1fcc4fc
SHA256ac74a16720217d1ab3e4db2d9baf2faeb7befe2485c2ab991d41ee561a6ab950
SHA5127a706e4a4340908fe628e618e3769e23be3e3a1ce8f31402542120a70e3ffa2dbdcb2fc909370e3ef74fa5a26b850b09082ce7d295a336b2740d97b1bb34be6b
-
Filesize
478KB
MD50b2b5335f2b1cee5ff6485861dcbd140
SHA1235c36d5855fa45f9bb08ded9865ec0fb1fcc4fc
SHA256ac74a16720217d1ab3e4db2d9baf2faeb7befe2485c2ab991d41ee561a6ab950
SHA5127a706e4a4340908fe628e618e3769e23be3e3a1ce8f31402542120a70e3ffa2dbdcb2fc909370e3ef74fa5a26b850b09082ce7d295a336b2740d97b1bb34be6b