Analysis
-
max time kernel
185s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 21:59
Static task
static1
Behavioral task
behavioral1
Sample
555f09b84080a59fdc30cc4445aad71519ee74d535852295ed270a25f6274287.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
555f09b84080a59fdc30cc4445aad71519ee74d535852295ed270a25f6274287.exe
Resource
win10v2004-20230220-en
General
-
Target
555f09b84080a59fdc30cc4445aad71519ee74d535852295ed270a25f6274287.exe
-
Size
1.4MB
-
MD5
4609e193fe7722c7a872d8dff7f4e6f8
-
SHA1
3bd638423b49dd8ab9b7b25114a2effd1f0b6f3c
-
SHA256
555f09b84080a59fdc30cc4445aad71519ee74d535852295ed270a25f6274287
-
SHA512
1e263e46d3061cfae976d0937aa5b3e60e032de854811d4a4e3d74fa172007cdd6183df3d89554132d5e2049ffb8554fc5cf9d9e0a68fc7146021e459c26d115
-
SSDEEP
24576:YyRDxazhpId6jnQuZTL0EgcVkPHfMghtXYbBkOEPVO3u4blpDX5ZLbkKF0c:fUpISnbJoEgcVCHdtXY955blpjwKF
Malware Config
Extracted
redline
maxbi
185.161.248.73:4164
-
auth_value
6aa7dba884fe45693dfa04c91440daef
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4180-217-0x00000000057C0000-0x0000000005DD8000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a65692848.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a65692848.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a65692848.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a65692848.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a65692848.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a65692848.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 2664 i67646873.exe 5040 i04371890.exe 340 i03537283.exe 2372 i43794111.exe 2736 a65692848.exe 4180 b65758189.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a65692848.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a65692848.exe -
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" i67646873.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce i04371890.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" i04371890.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" i03537283.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce i43794111.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 555f09b84080a59fdc30cc4445aad71519ee74d535852295ed270a25f6274287.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 555f09b84080a59fdc30cc4445aad71519ee74d535852295ed270a25f6274287.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" i43794111.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce i67646873.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce i03537283.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2056 2736 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2736 a65692848.exe 2736 a65692848.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2736 a65692848.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1520 wrote to memory of 2664 1520 555f09b84080a59fdc30cc4445aad71519ee74d535852295ed270a25f6274287.exe 77 PID 1520 wrote to memory of 2664 1520 555f09b84080a59fdc30cc4445aad71519ee74d535852295ed270a25f6274287.exe 77 PID 1520 wrote to memory of 2664 1520 555f09b84080a59fdc30cc4445aad71519ee74d535852295ed270a25f6274287.exe 77 PID 2664 wrote to memory of 5040 2664 i67646873.exe 78 PID 2664 wrote to memory of 5040 2664 i67646873.exe 78 PID 2664 wrote to memory of 5040 2664 i67646873.exe 78 PID 5040 wrote to memory of 340 5040 i04371890.exe 79 PID 5040 wrote to memory of 340 5040 i04371890.exe 79 PID 5040 wrote to memory of 340 5040 i04371890.exe 79 PID 340 wrote to memory of 2372 340 i03537283.exe 80 PID 340 wrote to memory of 2372 340 i03537283.exe 80 PID 340 wrote to memory of 2372 340 i03537283.exe 80 PID 2372 wrote to memory of 2736 2372 i43794111.exe 81 PID 2372 wrote to memory of 2736 2372 i43794111.exe 81 PID 2372 wrote to memory of 2736 2372 i43794111.exe 81 PID 2372 wrote to memory of 4180 2372 i43794111.exe 88 PID 2372 wrote to memory of 4180 2372 i43794111.exe 88 PID 2372 wrote to memory of 4180 2372 i43794111.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\555f09b84080a59fdc30cc4445aad71519ee74d535852295ed270a25f6274287.exe"C:\Users\Admin\AppData\Local\Temp\555f09b84080a59fdc30cc4445aad71519ee74d535852295ed270a25f6274287.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i67646873.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i67646873.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i04371890.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\i04371890.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i03537283.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\i03537283.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i43794111.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\i43794111.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a65692848.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a65692848.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2736 -s 10927⤵
- Program crash
PID:2056
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b65758189.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b65758189.exe6⤵
- Executes dropped EXE
PID:4180
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2736 -ip 27361⤵PID:4324
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5d7d45881310b25abbc62aaf2efd2d708
SHA15c15f914094c4fa606364a17277042a438062093
SHA256ef6337fe0f19bb31beb4c9cd391a3aca184bddc0d08851fb4192a1014f1d9f24
SHA51229126e7bfaf4452db4611d8a9b54afceed7b8fa6f81c84bc2810f5ae5871d5a1e5e9de196cb7978a4f9b75413a6311b86b32c874275cbfb8c8d27cefc2662c6d
-
Filesize
1.2MB
MD5d7d45881310b25abbc62aaf2efd2d708
SHA15c15f914094c4fa606364a17277042a438062093
SHA256ef6337fe0f19bb31beb4c9cd391a3aca184bddc0d08851fb4192a1014f1d9f24
SHA51229126e7bfaf4452db4611d8a9b54afceed7b8fa6f81c84bc2810f5ae5871d5a1e5e9de196cb7978a4f9b75413a6311b86b32c874275cbfb8c8d27cefc2662c6d
-
Filesize
1.1MB
MD5b9384672fe1b4f3a7e9adb352d154691
SHA1c1db9a2d41abd2554bd45a3ecdb067e38e99e28a
SHA256ad13c600998862c936c886f2b07c30e67bf71bb2d1fdfad52858e2eef6d1adb5
SHA512d912b8a814d27ebd3c919de633ca05f18fcb0fbca9e248f39a34d992afae3a2116e1850521c2d31a950453f78569542ea2dff480b38f7746f63f54f4da5eadbd
-
Filesize
1.1MB
MD5b9384672fe1b4f3a7e9adb352d154691
SHA1c1db9a2d41abd2554bd45a3ecdb067e38e99e28a
SHA256ad13c600998862c936c886f2b07c30e67bf71bb2d1fdfad52858e2eef6d1adb5
SHA512d912b8a814d27ebd3c919de633ca05f18fcb0fbca9e248f39a34d992afae3a2116e1850521c2d31a950453f78569542ea2dff480b38f7746f63f54f4da5eadbd
-
Filesize
644KB
MD506bce206b21570cf56228ed2467b501c
SHA113ab697827ee3f26a75bd0368526cfa933acfbcb
SHA256b2ad465b00e5bb7c6a369868c164de95c14270cb20982581629719a439be86bb
SHA512d1eea6b231d6e799f223f41476585d4437ee5fc2ab762ea2db4cb132231d2fb6f3bf12e1a0790a8d6c285827850a5c7f90923f3de9b1e0a1f2e8f761bba544cb
-
Filesize
644KB
MD506bce206b21570cf56228ed2467b501c
SHA113ab697827ee3f26a75bd0368526cfa933acfbcb
SHA256b2ad465b00e5bb7c6a369868c164de95c14270cb20982581629719a439be86bb
SHA512d1eea6b231d6e799f223f41476585d4437ee5fc2ab762ea2db4cb132231d2fb6f3bf12e1a0790a8d6c285827850a5c7f90923f3de9b1e0a1f2e8f761bba544cb
-
Filesize
385KB
MD5e0291881a875fe7e1ba97ddbcddb7c91
SHA1ca5eeabe1d0bff47a26edb21c7aa01ee3af293a4
SHA256fd548d9807169259f7ca512beeb1a38ac3da9a4d5de6df882780a459a3dc8c0e
SHA512863460c70ea397f06af273cdae5e159138946fba6d5593c89f2bd8ec942b9a7d6f3f239d7b8bbd0f8b7fc362370cce4a97798f9cb4d173f369a880ec1a77c9c7
-
Filesize
385KB
MD5e0291881a875fe7e1ba97ddbcddb7c91
SHA1ca5eeabe1d0bff47a26edb21c7aa01ee3af293a4
SHA256fd548d9807169259f7ca512beeb1a38ac3da9a4d5de6df882780a459a3dc8c0e
SHA512863460c70ea397f06af273cdae5e159138946fba6d5593c89f2bd8ec942b9a7d6f3f239d7b8bbd0f8b7fc362370cce4a97798f9cb4d173f369a880ec1a77c9c7
-
Filesize
294KB
MD5e05470c84484b430c60ce33e9bb26219
SHA1b88da6f58327aae3b544d20f8ec04dcf18c7cbd6
SHA256aa061f1096ff17738e46eb6d21e784719238e839f0d170f05ea959799b2eeaa5
SHA512c078d832f291cd1066c4f5476ec4e7d769e84d5f7a81605f1262b07423e23d78930aaebaf163ff29fab2019c61d620a55850be606964a7006b91b0f39ae80c90
-
Filesize
294KB
MD5e05470c84484b430c60ce33e9bb26219
SHA1b88da6f58327aae3b544d20f8ec04dcf18c7cbd6
SHA256aa061f1096ff17738e46eb6d21e784719238e839f0d170f05ea959799b2eeaa5
SHA512c078d832f291cd1066c4f5476ec4e7d769e84d5f7a81605f1262b07423e23d78930aaebaf163ff29fab2019c61d620a55850be606964a7006b91b0f39ae80c90
-
Filesize
168KB
MD5174b94edefccf9e918a5fd08ead4bc54
SHA1f48e9ef0a72cf96349d0b6f6001f9ddc9217da60
SHA25648651666b0610ae63461c12713b380fb1404da3824abdaf26c142b1af31216db
SHA51285b5299b5af01129e2d509da25868a4ea320a396d4c7f6c682f880bbb3fa76b7da81846de2bb942d4ab876a6766f247a62d1031768e68d149928960e239b8994
-
Filesize
168KB
MD5174b94edefccf9e918a5fd08ead4bc54
SHA1f48e9ef0a72cf96349d0b6f6001f9ddc9217da60
SHA25648651666b0610ae63461c12713b380fb1404da3824abdaf26c142b1af31216db
SHA51285b5299b5af01129e2d509da25868a4ea320a396d4c7f6c682f880bbb3fa76b7da81846de2bb942d4ab876a6766f247a62d1031768e68d149928960e239b8994