Analysis
-
max time kernel
151s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 21:51
Static task
static1
Behavioral task
behavioral1
Sample
4f7670aa1fd00b54572185e6b900a710af7b7eea7e2ec2198cadc0b87c112aa2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4f7670aa1fd00b54572185e6b900a710af7b7eea7e2ec2198cadc0b87c112aa2.exe
Resource
win10v2004-20230220-en
General
-
Target
4f7670aa1fd00b54572185e6b900a710af7b7eea7e2ec2198cadc0b87c112aa2.exe
-
Size
1.2MB
-
MD5
94a0bdd076d07a95d8cbe616ddfc4d9f
-
SHA1
c558eb8d29d5a70cbeada7a2fe24983a33020ef3
-
SHA256
4f7670aa1fd00b54572185e6b900a710af7b7eea7e2ec2198cadc0b87c112aa2
-
SHA512
7ede6e107172e19bdd48437ac460fad809c970435439fb98a597677726cdf744c743f5a919534588fc1d37fd93c8cd371c745b0fe35fe60a763abdf1d05a04a0
-
SSDEEP
24576:hy2ByZcE5sNSeUMDK3P+kHGoMi4neMze9Hr9r4MyXa9fulZvv2CuQ:UKG15sEeFm/7HGtnI9L3huzv2p
Malware Config
Extracted
redline
lisa
185.161.248.73:4164
-
auth_value
c2dc311db9820012377b054447d37949
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/2376-200-0x000000000A4D0000-0x000000000AAE8000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" s41434207.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" s41434207.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection s41434207.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" s41434207.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" s41434207.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" s41434207.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 1356 z93380882.exe 2272 z82302301.exe 448 z47624718.exe 1580 s41434207.exe 2376 t69353951.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features s41434207.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" s41434207.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z93380882.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z93380882.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z82302301.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z82302301.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z47624718.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z47624718.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4f7670aa1fd00b54572185e6b900a710af7b7eea7e2ec2198cadc0b87c112aa2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4f7670aa1fd00b54572185e6b900a710af7b7eea7e2ec2198cadc0b87c112aa2.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1580 s41434207.exe 1580 s41434207.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1580 s41434207.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 860 wrote to memory of 1356 860 4f7670aa1fd00b54572185e6b900a710af7b7eea7e2ec2198cadc0b87c112aa2.exe 82 PID 860 wrote to memory of 1356 860 4f7670aa1fd00b54572185e6b900a710af7b7eea7e2ec2198cadc0b87c112aa2.exe 82 PID 860 wrote to memory of 1356 860 4f7670aa1fd00b54572185e6b900a710af7b7eea7e2ec2198cadc0b87c112aa2.exe 82 PID 1356 wrote to memory of 2272 1356 z93380882.exe 83 PID 1356 wrote to memory of 2272 1356 z93380882.exe 83 PID 1356 wrote to memory of 2272 1356 z93380882.exe 83 PID 2272 wrote to memory of 448 2272 z82302301.exe 84 PID 2272 wrote to memory of 448 2272 z82302301.exe 84 PID 2272 wrote to memory of 448 2272 z82302301.exe 84 PID 448 wrote to memory of 1580 448 z47624718.exe 85 PID 448 wrote to memory of 1580 448 z47624718.exe 85 PID 448 wrote to memory of 1580 448 z47624718.exe 85 PID 448 wrote to memory of 2376 448 z47624718.exe 88 PID 448 wrote to memory of 2376 448 z47624718.exe 88 PID 448 wrote to memory of 2376 448 z47624718.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f7670aa1fd00b54572185e6b900a710af7b7eea7e2ec2198cadc0b87c112aa2.exe"C:\Users\Admin\AppData\Local\Temp\4f7670aa1fd00b54572185e6b900a710af7b7eea7e2ec2198cadc0b87c112aa2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z93380882.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z93380882.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z82302301.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z82302301.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z47624718.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z47624718.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s41434207.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s41434207.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1580
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t69353951.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t69353951.exe5⤵
- Executes dropped EXE
PID:2376
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
958KB
MD5988d67b6dceca1792056de6cf02d68d1
SHA1a1629da6e3c8cf6c436aeec55d59ddff24ae58c0
SHA2563c9016b3a6282977bd4bad2e8607c3dedf1a65c2231d244882c9b94e708f678a
SHA51290ffa2a52250b0db95289da04b304b7f467a7b0a15e89cf956e5edfac275832117831bf6104612cee35aad4c22719006c06e94e2f932c523f5a824b56ea4c8e5
-
Filesize
958KB
MD5988d67b6dceca1792056de6cf02d68d1
SHA1a1629da6e3c8cf6c436aeec55d59ddff24ae58c0
SHA2563c9016b3a6282977bd4bad2e8607c3dedf1a65c2231d244882c9b94e708f678a
SHA51290ffa2a52250b0db95289da04b304b7f467a7b0a15e89cf956e5edfac275832117831bf6104612cee35aad4c22719006c06e94e2f932c523f5a824b56ea4c8e5
-
Filesize
775KB
MD5d2bb50d60a1bae1642451a6eecb1b480
SHA1c94c54a75223b3b64b70aa6307d2d56b6be14a8e
SHA25686f52ee81d9afeee3f0a0793b7609f4c282ac44265a6cffadb07457b0381cfeb
SHA5122bf40d3d2389720895d5ca094745976a08e9d9593794c281eb5a0a22dadcd37685d957f914a907a15fb76046ca3626ac0e545b7c83e56d342e9bfd58796a1718
-
Filesize
775KB
MD5d2bb50d60a1bae1642451a6eecb1b480
SHA1c94c54a75223b3b64b70aa6307d2d56b6be14a8e
SHA25686f52ee81d9afeee3f0a0793b7609f4c282ac44265a6cffadb07457b0381cfeb
SHA5122bf40d3d2389720895d5ca094745976a08e9d9593794c281eb5a0a22dadcd37685d957f914a907a15fb76046ca3626ac0e545b7c83e56d342e9bfd58796a1718
-
Filesize
310KB
MD593a45a6bd3ff7cd27cbe126cef4c181a
SHA107e57b974f35ad99d808ec38c7f50cfa4f60d416
SHA256f6403e7352cf1bb9d5e5fad15467d529f7f520ce30b1230776e1bd3ca24ddb85
SHA512eba851d562f565b9b87ebcf8b72b152d69be78871885818c7f54141c42c4d37a1f7061710803be9600918d887b9af90279917824c54ff47dcea4f2f83e3a62f4
-
Filesize
310KB
MD593a45a6bd3ff7cd27cbe126cef4c181a
SHA107e57b974f35ad99d808ec38c7f50cfa4f60d416
SHA256f6403e7352cf1bb9d5e5fad15467d529f7f520ce30b1230776e1bd3ca24ddb85
SHA512eba851d562f565b9b87ebcf8b72b152d69be78871885818c7f54141c42c4d37a1f7061710803be9600918d887b9af90279917824c54ff47dcea4f2f83e3a62f4
-
Filesize
177KB
MD59b675da1b2f5cca050a0f0cc347ef174
SHA1036d510726e242a0438833cef94567530e5ee86f
SHA25694663a4913d28e901a795a2c3d35f52bbd2543c2e8f3eabd6c2ecc90d1547c91
SHA5129b6eb5d18fccc3d66e6cbbf22b0d73c796f64d0587841e85e4984d17b5b8e106f39b58b84b72fbc9c1c1480efc596d8b74b22bf2f6f79af82af80a3ab45cef59
-
Filesize
177KB
MD59b675da1b2f5cca050a0f0cc347ef174
SHA1036d510726e242a0438833cef94567530e5ee86f
SHA25694663a4913d28e901a795a2c3d35f52bbd2543c2e8f3eabd6c2ecc90d1547c91
SHA5129b6eb5d18fccc3d66e6cbbf22b0d73c796f64d0587841e85e4984d17b5b8e106f39b58b84b72fbc9c1c1480efc596d8b74b22bf2f6f79af82af80a3ab45cef59
-
Filesize
168KB
MD5106ff54e574d7e0d303b77724d1bcacd
SHA1954e788ba88062a176338a9be2736d0324383270
SHA25648be919dd21d075852054eed8ef7cf59b6ecfb090660873bed83ec9766f71869
SHA5128e4ce46fc607e421219133b404a3c7e2e99ed676d9490178d5a2e7cfb28583b5a8ccacb8c62f9c2185f810fdffe0aa82e9888e33a84e8be508ffd37cf668a680
-
Filesize
168KB
MD5106ff54e574d7e0d303b77724d1bcacd
SHA1954e788ba88062a176338a9be2736d0324383270
SHA25648be919dd21d075852054eed8ef7cf59b6ecfb090660873bed83ec9766f71869
SHA5128e4ce46fc607e421219133b404a3c7e2e99ed676d9490178d5a2e7cfb28583b5a8ccacb8c62f9c2185f810fdffe0aa82e9888e33a84e8be508ffd37cf668a680