Analysis
-
max time kernel
188s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 21:48
Static task
static1
Behavioral task
behavioral1
Sample
4da11aceb3c22460e9eff2a5047cf101ac2571633fb5243426f7f86e6a32cbee.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4da11aceb3c22460e9eff2a5047cf101ac2571633fb5243426f7f86e6a32cbee.exe
Resource
win10v2004-20230220-en
General
-
Target
4da11aceb3c22460e9eff2a5047cf101ac2571633fb5243426f7f86e6a32cbee.exe
-
Size
563KB
-
MD5
2f877ed8bad79a84e0e0787ad36d04df
-
SHA1
c14ae1944d0559ddb7183eb890c051eb08d6910d
-
SHA256
4da11aceb3c22460e9eff2a5047cf101ac2571633fb5243426f7f86e6a32cbee
-
SHA512
c29e0c426f5722e7419abfbaf16c3c5c792d2ee4d0c3511bde0ec70c99e5583ffde5994e626302f2d3ae1e149c947aa573a693d61baebfc7412dfffaaeeae844
-
SSDEEP
12288:ty90OlkqWBIBVsxE1E9o9wiR5pSXBQ8pX3q2sy:tyvjWusO1LwAPh8pX3z9
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/208-956-0x0000000009C50000-0x000000000A268000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 09571225.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 09571225.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 09571225.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 09571225.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 09571225.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 09571225.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 3640 st683303.exe 2312 09571225.exe 208 kp874925.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 09571225.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4da11aceb3c22460e9eff2a5047cf101ac2571633fb5243426f7f86e6a32cbee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4da11aceb3c22460e9eff2a5047cf101ac2571633fb5243426f7f86e6a32cbee.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st683303.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st683303.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2312 09571225.exe 2312 09571225.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2312 09571225.exe Token: SeDebugPrivilege 208 kp874925.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3572 wrote to memory of 3640 3572 4da11aceb3c22460e9eff2a5047cf101ac2571633fb5243426f7f86e6a32cbee.exe 81 PID 3572 wrote to memory of 3640 3572 4da11aceb3c22460e9eff2a5047cf101ac2571633fb5243426f7f86e6a32cbee.exe 81 PID 3572 wrote to memory of 3640 3572 4da11aceb3c22460e9eff2a5047cf101ac2571633fb5243426f7f86e6a32cbee.exe 81 PID 3640 wrote to memory of 2312 3640 st683303.exe 82 PID 3640 wrote to memory of 2312 3640 st683303.exe 82 PID 3640 wrote to memory of 208 3640 st683303.exe 83 PID 3640 wrote to memory of 208 3640 st683303.exe 83 PID 3640 wrote to memory of 208 3640 st683303.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\4da11aceb3c22460e9eff2a5047cf101ac2571633fb5243426f7f86e6a32cbee.exe"C:\Users\Admin\AppData\Local\Temp\4da11aceb3c22460e9eff2a5047cf101ac2571633fb5243426f7f86e6a32cbee.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st683303.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st683303.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\09571225.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\09571225.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2312
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp874925.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp874925.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:208
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
409KB
MD529050559266711a75a662eb7c9542134
SHA11aa89065b10e9cc52f49012864afc5386109e705
SHA2568a493bc131cbb6d99fa280df973339125f99c532c759736ae826e95c1db35e93
SHA512bbe66666d331a473398dd3748f7fea06ec5a381cbf4de9aafdce9a736a5f8997fd3f72b6cb1d8cd03530671ee809b371ea24ac81487785043e45eade0a8202b0
-
Filesize
409KB
MD529050559266711a75a662eb7c9542134
SHA11aa89065b10e9cc52f49012864afc5386109e705
SHA2568a493bc131cbb6d99fa280df973339125f99c532c759736ae826e95c1db35e93
SHA512bbe66666d331a473398dd3748f7fea06ec5a381cbf4de9aafdce9a736a5f8997fd3f72b6cb1d8cd03530671ee809b371ea24ac81487785043e45eade0a8202b0
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
353KB
MD5bca4ad35ce17633e5dc77685c068ecb3
SHA1e4f295cf2b8147f12ca85cc0d12080093e0477fb
SHA256e29b7e453fb1062f3dd8116e84c2c7cc41d6b652c569dc5ba0523eddcf455d7b
SHA512fa00e327915cd5395a0a63709926699f5d90cf3f27e763d3238ff1e75bdcce9068b3b0a386a8b9a7cbe1a7e71ce7ce1d4b89b44ba75693b126ea1e63e1f74553
-
Filesize
353KB
MD5bca4ad35ce17633e5dc77685c068ecb3
SHA1e4f295cf2b8147f12ca85cc0d12080093e0477fb
SHA256e29b7e453fb1062f3dd8116e84c2c7cc41d6b652c569dc5ba0523eddcf455d7b
SHA512fa00e327915cd5395a0a63709926699f5d90cf3f27e763d3238ff1e75bdcce9068b3b0a386a8b9a7cbe1a7e71ce7ce1d4b89b44ba75693b126ea1e63e1f74553