Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 21:58
Static task
static1
Behavioral task
behavioral1
Sample
54c625cb5cf2f413567f44dd52422943dfa393a4382968db8ad6b3a1b10a196d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
54c625cb5cf2f413567f44dd52422943dfa393a4382968db8ad6b3a1b10a196d.exe
Resource
win10v2004-20230220-en
General
-
Target
54c625cb5cf2f413567f44dd52422943dfa393a4382968db8ad6b3a1b10a196d.exe
-
Size
611KB
-
MD5
23b1984db98a385a8c939eac3dcd4263
-
SHA1
e8959f2ea8e53906570342ba32dfd44bb341adaf
-
SHA256
54c625cb5cf2f413567f44dd52422943dfa393a4382968db8ad6b3a1b10a196d
-
SHA512
c78373737b148b249c19d8efd4d9c82a5e854939f37b3a7291851853bd0a56fb9a57b01c2342bc703df43c316a770bfe7c4b468a02ad1d446c44fc7c3ded60fa
-
SSDEEP
12288:7y90UhD9XfR5E4YuEDFj22qXfS/NhUJCB7a074U:7yBd9vR5QuEDFj22qXfeB7/4U
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3924-950-0x00000000078D0000-0x0000000007EE8000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 93203102.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 93203102.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 93203102.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 93203102.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 93203102.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 93203102.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1328 st060246.exe 1508 93203102.exe 3924 kp164366.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 93203102.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 54c625cb5cf2f413567f44dd52422943dfa393a4382968db8ad6b3a1b10a196d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 54c625cb5cf2f413567f44dd52422943dfa393a4382968db8ad6b3a1b10a196d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st060246.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st060246.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1508 93203102.exe 1508 93203102.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1508 93203102.exe Token: SeDebugPrivilege 3924 kp164366.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2960 wrote to memory of 1328 2960 54c625cb5cf2f413567f44dd52422943dfa393a4382968db8ad6b3a1b10a196d.exe 83 PID 2960 wrote to memory of 1328 2960 54c625cb5cf2f413567f44dd52422943dfa393a4382968db8ad6b3a1b10a196d.exe 83 PID 2960 wrote to memory of 1328 2960 54c625cb5cf2f413567f44dd52422943dfa393a4382968db8ad6b3a1b10a196d.exe 83 PID 1328 wrote to memory of 1508 1328 st060246.exe 84 PID 1328 wrote to memory of 1508 1328 st060246.exe 84 PID 1328 wrote to memory of 3924 1328 st060246.exe 86 PID 1328 wrote to memory of 3924 1328 st060246.exe 86 PID 1328 wrote to memory of 3924 1328 st060246.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\54c625cb5cf2f413567f44dd52422943dfa393a4382968db8ad6b3a1b10a196d.exe"C:\Users\Admin\AppData\Local\Temp\54c625cb5cf2f413567f44dd52422943dfa393a4382968db8ad6b3a1b10a196d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st060246.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st060246.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\93203102.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\93203102.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp164366.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp164366.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3924
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
457KB
MD596babf04f3e88aaab55891abc607e0f2
SHA125ed740b7fb4a7726d4d1d81bf577cc02a5636f9
SHA2564dc89d502d6a9021d8f8eb29317d49d7b787527bec1299a558f9448f9644b2d2
SHA5129e423938163946865c40549735464dae869d59d73beb4739bd931b749888b54dfe7fac717a38b54a27cf2d9b178a28e237c333d46f42940b347b4972191f9a97
-
Filesize
457KB
MD596babf04f3e88aaab55891abc607e0f2
SHA125ed740b7fb4a7726d4d1d81bf577cc02a5636f9
SHA2564dc89d502d6a9021d8f8eb29317d49d7b787527bec1299a558f9448f9644b2d2
SHA5129e423938163946865c40549735464dae869d59d73beb4739bd931b749888b54dfe7fac717a38b54a27cf2d9b178a28e237c333d46f42940b347b4972191f9a97
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
459KB
MD5d934c1e545fb82aabadc3f0f1eddf935
SHA1be11adf7acaeef31f800c61a9366c96c4afba871
SHA256555394b9ed4bbedfac775b121dcb8222a8956fefe484646f0914107af25adbef
SHA51284cf744db80f2a2f73ef322dbc682be8da37fddeecf6d2f7a7bc97348af807529ff6c6e41d59c898d815811bb728c595880cda87c529cf07528c96f3ab769fe9
-
Filesize
459KB
MD5d934c1e545fb82aabadc3f0f1eddf935
SHA1be11adf7acaeef31f800c61a9366c96c4afba871
SHA256555394b9ed4bbedfac775b121dcb8222a8956fefe484646f0914107af25adbef
SHA51284cf744db80f2a2f73ef322dbc682be8da37fddeecf6d2f7a7bc97348af807529ff6c6e41d59c898d815811bb728c595880cda87c529cf07528c96f3ab769fe9