Analysis
-
max time kernel
151s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 21:51
Static task
static1
Behavioral task
behavioral1
Sample
4f6727e86addd48855bb2cf5a392a2349a512d4d7daaa79747a152d02e967a94.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4f6727e86addd48855bb2cf5a392a2349a512d4d7daaa79747a152d02e967a94.exe
Resource
win10v2004-20230220-en
General
-
Target
4f6727e86addd48855bb2cf5a392a2349a512d4d7daaa79747a152d02e967a94.exe
-
Size
480KB
-
MD5
18429e1455814d91116c6823d52994fc
-
SHA1
2401319267ab2856d0bf5b58f8c5cbe39636e7e3
-
SHA256
4f6727e86addd48855bb2cf5a392a2349a512d4d7daaa79747a152d02e967a94
-
SHA512
8a7ee7588a3a1eb90cf43bdbf232dab1acce7d8692c261cceb2333d336862fcb3bad794b4ff6e6b31bce81292dd44c42441e598489c22349555fb3b258bed064
-
SSDEEP
12288:5Mrny907BKE1n8uxNbszrrOzjdN0PdvWDMrimi:eycBPV8uxNAz+ox+ki
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/628-186-0x0000000008070000-0x0000000008688000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a3205754.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a3205754.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a3205754.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a3205754.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a3205754.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a3205754.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2116 v1835862.exe 4844 a3205754.exe 628 b4659357.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a3205754.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a3205754.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4f6727e86addd48855bb2cf5a392a2349a512d4d7daaa79747a152d02e967a94.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4f6727e86addd48855bb2cf5a392a2349a512d4d7daaa79747a152d02e967a94.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v1835862.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v1835862.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4844 a3205754.exe 4844 a3205754.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4844 a3205754.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3920 wrote to memory of 2116 3920 4f6727e86addd48855bb2cf5a392a2349a512d4d7daaa79747a152d02e967a94.exe 83 PID 3920 wrote to memory of 2116 3920 4f6727e86addd48855bb2cf5a392a2349a512d4d7daaa79747a152d02e967a94.exe 83 PID 3920 wrote to memory of 2116 3920 4f6727e86addd48855bb2cf5a392a2349a512d4d7daaa79747a152d02e967a94.exe 83 PID 2116 wrote to memory of 4844 2116 v1835862.exe 84 PID 2116 wrote to memory of 4844 2116 v1835862.exe 84 PID 2116 wrote to memory of 4844 2116 v1835862.exe 84 PID 2116 wrote to memory of 628 2116 v1835862.exe 87 PID 2116 wrote to memory of 628 2116 v1835862.exe 87 PID 2116 wrote to memory of 628 2116 v1835862.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f6727e86addd48855bb2cf5a392a2349a512d4d7daaa79747a152d02e967a94.exe"C:\Users\Admin\AppData\Local\Temp\4f6727e86addd48855bb2cf5a392a2349a512d4d7daaa79747a152d02e967a94.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1835862.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1835862.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a3205754.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a3205754.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4844
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b4659357.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b4659357.exe3⤵
- Executes dropped EXE
PID:628
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD5e1c4b113792ff6dc7a97a0386443efbd
SHA1d130ead6183a417bbf689bd0d8c8e8555485e0dc
SHA256fa4fbc329db878e4b114c09689f8a3683741364847ce245a50c1ffda7b5d2e16
SHA51220025612317a4e394b3c40e5d0b991d576eec487f8e6c1a9ba073c30cd7080df954251b9db4a994450b01a64da6dcd0d02a7a02a41258d299a7b4737ce8ed1d9
-
Filesize
308KB
MD5e1c4b113792ff6dc7a97a0386443efbd
SHA1d130ead6183a417bbf689bd0d8c8e8555485e0dc
SHA256fa4fbc329db878e4b114c09689f8a3683741364847ce245a50c1ffda7b5d2e16
SHA51220025612317a4e394b3c40e5d0b991d576eec487f8e6c1a9ba073c30cd7080df954251b9db4a994450b01a64da6dcd0d02a7a02a41258d299a7b4737ce8ed1d9
-
Filesize
175KB
MD574992d395f5eecdce6a6a5b8aaf66a46
SHA165073574e06982396cd264c5f0898d8632a2707b
SHA256a36eae5358307ba061bcf351be91a55d2747609835a54dedc92d5db8d71fdf13
SHA5126816df01cc280509d5803e0ec8cd36be3bec4c77eeafa4473f0cb78598ce83158a35002a293eda9534133d8079fa954751c3fd7e2b786c91319e632d56a8e1aa
-
Filesize
175KB
MD574992d395f5eecdce6a6a5b8aaf66a46
SHA165073574e06982396cd264c5f0898d8632a2707b
SHA256a36eae5358307ba061bcf351be91a55d2747609835a54dedc92d5db8d71fdf13
SHA5126816df01cc280509d5803e0ec8cd36be3bec4c77eeafa4473f0cb78598ce83158a35002a293eda9534133d8079fa954751c3fd7e2b786c91319e632d56a8e1aa
-
Filesize
136KB
MD58ccbf43e056898c8d5101da2cf11a00e
SHA10b600ecee4acb5dd768672ed267d468d34ea20ae
SHA256cd9b4b1d6bbf6189efc57ec5f2ddad5cbea967783ab37653a907fd3d1e8fd61e
SHA51267f80ee91f61912758ad4bcacfdbde141b98f9922ae80201bccc65328335b374d42bfc86b73a03497e0b479b14b6945faef0ba137a341bf25f325b1e6f68d782
-
Filesize
136KB
MD58ccbf43e056898c8d5101da2cf11a00e
SHA10b600ecee4acb5dd768672ed267d468d34ea20ae
SHA256cd9b4b1d6bbf6189efc57ec5f2ddad5cbea967783ab37653a907fd3d1e8fd61e
SHA51267f80ee91f61912758ad4bcacfdbde141b98f9922ae80201bccc65328335b374d42bfc86b73a03497e0b479b14b6945faef0ba137a341bf25f325b1e6f68d782