Analysis
-
max time kernel
156s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 21:55
Static task
static1
Behavioral task
behavioral1
Sample
524efa1755ea4a0943a65c9ab219615a42ddcd98db30881cc711f43141a1f637.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
524efa1755ea4a0943a65c9ab219615a42ddcd98db30881cc711f43141a1f637.exe
Resource
win10v2004-20230220-en
General
-
Target
524efa1755ea4a0943a65c9ab219615a42ddcd98db30881cc711f43141a1f637.exe
-
Size
563KB
-
MD5
0df69b84cf491c9dd1ad5fa1252359e8
-
SHA1
907666573a5c8cde25bf66bd63069474f8adf2de
-
SHA256
524efa1755ea4a0943a65c9ab219615a42ddcd98db30881cc711f43141a1f637
-
SHA512
d9573e5a080b6956b12bd2570466a2b483e12a775339ce33efdf754feeb2d3e7415b0b88bff5aae72dd6c4e37137e6e1bb83620a8724f96badf3038ccfe57de9
-
SSDEEP
12288:0y90gokXwihVMxruS0ojPI27kwVkgTl1j9t:0yBYiIBnjAPwagZ1jD
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1480-949-0x0000000009CA0000-0x000000000A2B8000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 52094437.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 52094437.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 52094437.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 52094437.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 52094437.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 52094437.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4504 st146648.exe 1052 52094437.exe 1480 kp356710.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 52094437.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 524efa1755ea4a0943a65c9ab219615a42ddcd98db30881cc711f43141a1f637.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 524efa1755ea4a0943a65c9ab219615a42ddcd98db30881cc711f43141a1f637.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st146648.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st146648.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1052 52094437.exe 1052 52094437.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1052 52094437.exe Token: SeDebugPrivilege 1480 kp356710.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4376 wrote to memory of 4504 4376 524efa1755ea4a0943a65c9ab219615a42ddcd98db30881cc711f43141a1f637.exe 83 PID 4376 wrote to memory of 4504 4376 524efa1755ea4a0943a65c9ab219615a42ddcd98db30881cc711f43141a1f637.exe 83 PID 4376 wrote to memory of 4504 4376 524efa1755ea4a0943a65c9ab219615a42ddcd98db30881cc711f43141a1f637.exe 83 PID 4504 wrote to memory of 1052 4504 st146648.exe 85 PID 4504 wrote to memory of 1052 4504 st146648.exe 85 PID 4504 wrote to memory of 1480 4504 st146648.exe 86 PID 4504 wrote to memory of 1480 4504 st146648.exe 86 PID 4504 wrote to memory of 1480 4504 st146648.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\524efa1755ea4a0943a65c9ab219615a42ddcd98db30881cc711f43141a1f637.exe"C:\Users\Admin\AppData\Local\Temp\524efa1755ea4a0943a65c9ab219615a42ddcd98db30881cc711f43141a1f637.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st146648.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st146648.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\52094437.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\52094437.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp356710.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp356710.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1480
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD5668cbbf8ad14d4513c6e767ac62b0756
SHA1d09d798ebd5e1e46f6cf551e3df10027a4ee357b
SHA256d949b643ea0fbb66d38b2d318425d8a62cedaff6275c24930150780d6391a162
SHA5124240c0fea565fcf370c27faf4ce0a3292a0a4b65c17c1eb2fa4928df25f7dc678d8bd25208768ae5fc9a221492c9a836a1487d56eead7ada0e411439d4db468e
-
Filesize
408KB
MD5668cbbf8ad14d4513c6e767ac62b0756
SHA1d09d798ebd5e1e46f6cf551e3df10027a4ee357b
SHA256d949b643ea0fbb66d38b2d318425d8a62cedaff6275c24930150780d6391a162
SHA5124240c0fea565fcf370c27faf4ce0a3292a0a4b65c17c1eb2fa4928df25f7dc678d8bd25208768ae5fc9a221492c9a836a1487d56eead7ada0e411439d4db468e
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
360KB
MD5a11d29f537cc6f8b1be33e9331ae6962
SHA18a3b7896cd6b506045fd030cbec8f2cc3297700c
SHA25633b26f55858c227f4f015350197c953a358612e84551ba7e6b67a8bb383e986a
SHA512f5bc2cc511b316ba925a5aab747de57219fc5f73a45bedd69874aca211cae20e95270233e1c8c23b0c296a9262fd88188e07edc99ef0874c4dacb8f30ad2b6bb
-
Filesize
360KB
MD5a11d29f537cc6f8b1be33e9331ae6962
SHA18a3b7896cd6b506045fd030cbec8f2cc3297700c
SHA25633b26f55858c227f4f015350197c953a358612e84551ba7e6b67a8bb383e986a
SHA512f5bc2cc511b316ba925a5aab747de57219fc5f73a45bedd69874aca211cae20e95270233e1c8c23b0c296a9262fd88188e07edc99ef0874c4dacb8f30ad2b6bb