Analysis
-
max time kernel
181s -
max time network
207s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 22:02
Static task
static1
Behavioral task
behavioral1
Sample
58040f3feee721fff6e6fc62e986a6462f9ad8485a5d29d463e9869a7c232319.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
58040f3feee721fff6e6fc62e986a6462f9ad8485a5d29d463e9869a7c232319.exe
Resource
win10v2004-20230220-en
General
-
Target
58040f3feee721fff6e6fc62e986a6462f9ad8485a5d29d463e9869a7c232319.exe
-
Size
480KB
-
MD5
fd7bbd313416dfe87fddad9c104bf4bc
-
SHA1
cb81658f3475838486ae2dfb32e08a4ca32f7bec
-
SHA256
58040f3feee721fff6e6fc62e986a6462f9ad8485a5d29d463e9869a7c232319
-
SHA512
ac1f7001f766a6e65701c74e2ea70d22a959a93f829962ede5bf474259b72150934b6137b145cdccd40a5d543ff4adc32f697b3d10bfde983d144edac3143078
-
SSDEEP
6144:KVy+bnr+Ip0yN90QEFHs4lKeE9eps3N4x5tOMIxRIFTUtP+0l6+0yDflnib/JBkq:bMrUy90k4lKBTi5kMbTUFl6Afln6/E+
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3824-186-0x00000000081F0000-0x0000000008808000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k7815453.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k7815453.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k7815453.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k7815453.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k7815453.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k7815453.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2512 y7850969.exe 1716 k7815453.exe 3824 l3237088.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k7815453.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k7815453.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 58040f3feee721fff6e6fc62e986a6462f9ad8485a5d29d463e9869a7c232319.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 58040f3feee721fff6e6fc62e986a6462f9ad8485a5d29d463e9869a7c232319.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y7850969.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y7850969.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1716 k7815453.exe 1716 k7815453.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1716 k7815453.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 628 wrote to memory of 2512 628 58040f3feee721fff6e6fc62e986a6462f9ad8485a5d29d463e9869a7c232319.exe 82 PID 628 wrote to memory of 2512 628 58040f3feee721fff6e6fc62e986a6462f9ad8485a5d29d463e9869a7c232319.exe 82 PID 628 wrote to memory of 2512 628 58040f3feee721fff6e6fc62e986a6462f9ad8485a5d29d463e9869a7c232319.exe 82 PID 2512 wrote to memory of 1716 2512 y7850969.exe 83 PID 2512 wrote to memory of 1716 2512 y7850969.exe 83 PID 2512 wrote to memory of 1716 2512 y7850969.exe 83 PID 2512 wrote to memory of 3824 2512 y7850969.exe 84 PID 2512 wrote to memory of 3824 2512 y7850969.exe 84 PID 2512 wrote to memory of 3824 2512 y7850969.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\58040f3feee721fff6e6fc62e986a6462f9ad8485a5d29d463e9869a7c232319.exe"C:\Users\Admin\AppData\Local\Temp\58040f3feee721fff6e6fc62e986a6462f9ad8485a5d29d463e9869a7c232319.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7850969.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y7850969.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7815453.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7815453.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1716
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l3237088.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l3237088.exe3⤵
- Executes dropped EXE
PID:3824
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD5be27fd153053198b678edf35064169a7
SHA11b0876ebc7226743b7878ec2f3e57e52f5f1e138
SHA2561a056863a81f40724c27ee77d5432a43c60526009c1292fce4556e75a5e5c148
SHA5126a4f4037422010a055ad8ec1652d7e14c40daea1dcd98ec46fb66c1325bf7e0ce766ad3291ce28107b2506b84f84fb3945c90ec66c4f0b8631ebad3ff12adcfe
-
Filesize
308KB
MD5be27fd153053198b678edf35064169a7
SHA11b0876ebc7226743b7878ec2f3e57e52f5f1e138
SHA2561a056863a81f40724c27ee77d5432a43c60526009c1292fce4556e75a5e5c148
SHA5126a4f4037422010a055ad8ec1652d7e14c40daea1dcd98ec46fb66c1325bf7e0ce766ad3291ce28107b2506b84f84fb3945c90ec66c4f0b8631ebad3ff12adcfe
-
Filesize
175KB
MD5f1ac76a6bbf434763908e06abf8cb5fc
SHA13e96465ed99d15efe9996a1a0248c429882eec88
SHA2564923c187145b1e822a3beb7868166ed43e159b13ae3d89606e7d3019b418c8b3
SHA512c504dae1999c7c65d5e55597146bd278f89d080d9d07debdc9f493c8fbc3ff0d3c261660e07ea666b1837a0df3bbfd38b1107e4680313ddbd94fe28e78534049
-
Filesize
175KB
MD5f1ac76a6bbf434763908e06abf8cb5fc
SHA13e96465ed99d15efe9996a1a0248c429882eec88
SHA2564923c187145b1e822a3beb7868166ed43e159b13ae3d89606e7d3019b418c8b3
SHA512c504dae1999c7c65d5e55597146bd278f89d080d9d07debdc9f493c8fbc3ff0d3c261660e07ea666b1837a0df3bbfd38b1107e4680313ddbd94fe28e78534049
-
Filesize
136KB
MD52fdd14078cf0d9e61417f82476797cfe
SHA1bd5c98b60c515eb68aa4be41d32f5107f9f206e3
SHA2561953a613971ced35646f9c7f9dab8190419377555c449227658b6c45b394f9c4
SHA5124511453fabfd015290f152868e0b5629a98f9f45d36995b8fd09fd3dd539c14a5c5cdabbd8c5d872b128c4caadde004c1f68bfbeeec22ed50b2a5ab423f7e3b0
-
Filesize
136KB
MD52fdd14078cf0d9e61417f82476797cfe
SHA1bd5c98b60c515eb68aa4be41d32f5107f9f206e3
SHA2561953a613971ced35646f9c7f9dab8190419377555c449227658b6c45b394f9c4
SHA5124511453fabfd015290f152868e0b5629a98f9f45d36995b8fd09fd3dd539c14a5c5cdabbd8c5d872b128c4caadde004c1f68bfbeeec22ed50b2a5ab423f7e3b0