Analysis
-
max time kernel
253s -
max time network
329s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 21:55
Static task
static1
Behavioral task
behavioral1
Sample
52387ccf1edb1a80d1c15873e3f3ac88c79a4fd8d5429956417124526e1a0cc4.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
52387ccf1edb1a80d1c15873e3f3ac88c79a4fd8d5429956417124526e1a0cc4.exe
Resource
win10v2004-20230221-en
General
-
Target
52387ccf1edb1a80d1c15873e3f3ac88c79a4fd8d5429956417124526e1a0cc4.exe
-
Size
480KB
-
MD5
20d04c1821001d935d8ab428d07f5b3f
-
SHA1
a0f3de5c6fd5a77f69b2968f06658b53ed4c8496
-
SHA256
52387ccf1edb1a80d1c15873e3f3ac88c79a4fd8d5429956417124526e1a0cc4
-
SHA512
3f4fe8241d327aa6d000641aef14848564e9a23ea8e178fc77832a334d484f709241b2fb701cb3d0ebd7e287b62c209b181260eaf71767f92b989732434e169a
-
SSDEEP
12288:7Mrmy90FSy38Te3E2PBa2lcg7jBe3/HI:RycpDfb2/HI
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3032-186-0x0000000007740000-0x0000000007D58000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k5630612.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k5630612.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k5630612.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k5630612.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k5630612.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k5630612.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4988 y4958066.exe 3452 k5630612.exe 3032 l1751665.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k5630612.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k5630612.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 52387ccf1edb1a80d1c15873e3f3ac88c79a4fd8d5429956417124526e1a0cc4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 52387ccf1edb1a80d1c15873e3f3ac88c79a4fd8d5429956417124526e1a0cc4.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y4958066.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y4958066.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3452 k5630612.exe 3452 k5630612.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3452 k5630612.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 956 wrote to memory of 4988 956 52387ccf1edb1a80d1c15873e3f3ac88c79a4fd8d5429956417124526e1a0cc4.exe 80 PID 956 wrote to memory of 4988 956 52387ccf1edb1a80d1c15873e3f3ac88c79a4fd8d5429956417124526e1a0cc4.exe 80 PID 956 wrote to memory of 4988 956 52387ccf1edb1a80d1c15873e3f3ac88c79a4fd8d5429956417124526e1a0cc4.exe 80 PID 4988 wrote to memory of 3452 4988 y4958066.exe 81 PID 4988 wrote to memory of 3452 4988 y4958066.exe 81 PID 4988 wrote to memory of 3452 4988 y4958066.exe 81 PID 4988 wrote to memory of 3032 4988 y4958066.exe 83 PID 4988 wrote to memory of 3032 4988 y4958066.exe 83 PID 4988 wrote to memory of 3032 4988 y4958066.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\52387ccf1edb1a80d1c15873e3f3ac88c79a4fd8d5429956417124526e1a0cc4.exe"C:\Users\Admin\AppData\Local\Temp\52387ccf1edb1a80d1c15873e3f3ac88c79a4fd8d5429956417124526e1a0cc4.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4958066.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4958066.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5630612.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k5630612.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3452
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1751665.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1751665.exe3⤵
- Executes dropped EXE
PID:3032
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD5eb2321f22fccc87d94be2a78f9fb55d4
SHA17312e0b8d91b6fef143210018e197f37d88cdb02
SHA256c04ece41160b6a5d5ae7720dd860b06ed8b10bff489d0622397cddb0f148fec0
SHA512d8e46ec7eb047ae3a2c488e66a124e7a5641509c12c1c939b7dfa1fffb77eb3f4903d79cf5f6aadb1d046d683a17a3313bfd853917a8011a7f82a4efd11141d6
-
Filesize
308KB
MD5eb2321f22fccc87d94be2a78f9fb55d4
SHA17312e0b8d91b6fef143210018e197f37d88cdb02
SHA256c04ece41160b6a5d5ae7720dd860b06ed8b10bff489d0622397cddb0f148fec0
SHA512d8e46ec7eb047ae3a2c488e66a124e7a5641509c12c1c939b7dfa1fffb77eb3f4903d79cf5f6aadb1d046d683a17a3313bfd853917a8011a7f82a4efd11141d6
-
Filesize
175KB
MD521f8954889b59e6afc4dbf41c37bf0b8
SHA1e7d042d8bd2004849223c8a879aa0c8314d270bd
SHA256e543c867903a75f0332d482dc6f1e93c420e60af702f2874eda18d129486ace9
SHA5129c6020cbf8a39eaf89190681304cc78131394096ed6de5343e640d72bfd4106094096bea5cb9720781bbc7f40ecc4cc3bb1a4f540623268e03960ed2623755fa
-
Filesize
175KB
MD521f8954889b59e6afc4dbf41c37bf0b8
SHA1e7d042d8bd2004849223c8a879aa0c8314d270bd
SHA256e543c867903a75f0332d482dc6f1e93c420e60af702f2874eda18d129486ace9
SHA5129c6020cbf8a39eaf89190681304cc78131394096ed6de5343e640d72bfd4106094096bea5cb9720781bbc7f40ecc4cc3bb1a4f540623268e03960ed2623755fa
-
Filesize
136KB
MD58634c9d171196625c56c8491c34654ea
SHA1a53a484bad479aa59671be81c7109c5b58c43919
SHA25648703068e8f7ac6cf57fdbdf7c2d2272be457ffcfb168bce785ed5ea6ea087f4
SHA5125436b2c4cc147f7bae0e25dda9456d261bbe5293493b58e0c266106dbb7aa4c12a9aa95207bf32c4acac3a66144200f138ae02e68a66de7e3a297f9e29f254bd
-
Filesize
136KB
MD58634c9d171196625c56c8491c34654ea
SHA1a53a484bad479aa59671be81c7109c5b58c43919
SHA25648703068e8f7ac6cf57fdbdf7c2d2272be457ffcfb168bce785ed5ea6ea087f4
SHA5125436b2c4cc147f7bae0e25dda9456d261bbe5293493b58e0c266106dbb7aa4c12a9aa95207bf32c4acac3a66144200f138ae02e68a66de7e3a297f9e29f254bd