Analysis
-
max time kernel
152s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 22:04
Static task
static1
Behavioral task
behavioral1
Sample
5a2eec63c40c3a7485f35dc85268e4348a771db7d1cd24ae186651234856918b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5a2eec63c40c3a7485f35dc85268e4348a771db7d1cd24ae186651234856918b.exe
Resource
win10v2004-20230220-en
General
-
Target
5a2eec63c40c3a7485f35dc85268e4348a771db7d1cd24ae186651234856918b.exe
-
Size
1.5MB
-
MD5
cd8d70c5beedaaa383ce1e5e4f83f4c8
-
SHA1
c9c2c8843989aa08e82620a842c5c9f5b05d3017
-
SHA256
5a2eec63c40c3a7485f35dc85268e4348a771db7d1cd24ae186651234856918b
-
SHA512
845f8a273c69578d69309ba7201000983da6064204a6ad514b5943e1209cae7aa0dcc76bf3d5553d1e84003950ef99c38b75f25a7cac0ff4785c4aa2aa3baa74
-
SSDEEP
49152:y2g/5qe6Z/Gm0AoctbcnAZ081HKtSpyM:iRqecGRA9t3Z1kSpy
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1892-218-0x0000000007E80000-0x0000000008498000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a5165963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a5165963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a5165963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a5165963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a5165963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a5165963.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 6 IoCs
pid Process 4592 v3821992.exe 1444 v7764490.exe 2664 v3331307.exe 428 v4056674.exe 2108 a5165963.exe 1892 b8604920.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a5165963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a5165963.exe -
Adds Run key to start application 2 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7764490.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v7764490.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v3331307.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v4056674.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" v4056674.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5a2eec63c40c3a7485f35dc85268e4348a771db7d1cd24ae186651234856918b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v3821992.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3331307.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 5a2eec63c40c3a7485f35dc85268e4348a771db7d1cd24ae186651234856918b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v3821992.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4176 2108 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2108 a5165963.exe 2108 a5165963.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2108 a5165963.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1536 wrote to memory of 4592 1536 5a2eec63c40c3a7485f35dc85268e4348a771db7d1cd24ae186651234856918b.exe 84 PID 1536 wrote to memory of 4592 1536 5a2eec63c40c3a7485f35dc85268e4348a771db7d1cd24ae186651234856918b.exe 84 PID 1536 wrote to memory of 4592 1536 5a2eec63c40c3a7485f35dc85268e4348a771db7d1cd24ae186651234856918b.exe 84 PID 4592 wrote to memory of 1444 4592 v3821992.exe 85 PID 4592 wrote to memory of 1444 4592 v3821992.exe 85 PID 4592 wrote to memory of 1444 4592 v3821992.exe 85 PID 1444 wrote to memory of 2664 1444 v7764490.exe 86 PID 1444 wrote to memory of 2664 1444 v7764490.exe 86 PID 1444 wrote to memory of 2664 1444 v7764490.exe 86 PID 2664 wrote to memory of 428 2664 v3331307.exe 87 PID 2664 wrote to memory of 428 2664 v3331307.exe 87 PID 2664 wrote to memory of 428 2664 v3331307.exe 87 PID 428 wrote to memory of 2108 428 v4056674.exe 88 PID 428 wrote to memory of 2108 428 v4056674.exe 88 PID 428 wrote to memory of 2108 428 v4056674.exe 88 PID 428 wrote to memory of 1892 428 v4056674.exe 93 PID 428 wrote to memory of 1892 428 v4056674.exe 93 PID 428 wrote to memory of 1892 428 v4056674.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a2eec63c40c3a7485f35dc85268e4348a771db7d1cd24ae186651234856918b.exe"C:\Users\Admin\AppData\Local\Temp\5a2eec63c40c3a7485f35dc85268e4348a771db7d1cd24ae186651234856918b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3821992.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v3821992.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7764490.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7764490.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3331307.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v3331307.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4056674.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v4056674.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5165963.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\a5165963.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 10887⤵
- Program crash
PID:4176
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8604920.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\b8604920.exe6⤵
- Executes dropped EXE
PID:1892
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2108 -ip 21081⤵PID:1820
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5f822d983fb8d5eeeb09aa7aaa63d3dd6
SHA11e39c7256bb6cbb5dcb8a8eaa9d6912a051f86ab
SHA2569507c9b8ec18c1c72bfd38f6e1373cf8d262717a8de5b53bb6cefcb40a819f2f
SHA51290929b375484e327065e8c5811e66d4be36b42f6c65321b710b50ce8025a968dfc76645ecd8ca0e2781f78fca22031eb390abfe63a09f46a47b3ba2a393ca941
-
Filesize
1.4MB
MD5f822d983fb8d5eeeb09aa7aaa63d3dd6
SHA11e39c7256bb6cbb5dcb8a8eaa9d6912a051f86ab
SHA2569507c9b8ec18c1c72bfd38f6e1373cf8d262717a8de5b53bb6cefcb40a819f2f
SHA51290929b375484e327065e8c5811e66d4be36b42f6c65321b710b50ce8025a968dfc76645ecd8ca0e2781f78fca22031eb390abfe63a09f46a47b3ba2a393ca941
-
Filesize
913KB
MD56b184f137865f85441b0273eb7aab58f
SHA1554762329dc07b4afb2e3be2795768eaf730b671
SHA256dd41faefa4bdd2e630ac49c2456bf2d80cb39cece63a8161758259403b44e797
SHA512d41073e1b6a476a7a0f3fdbe971def8ed9ad3a63d00321590f5e59482ff56229d7e4bd9af08c8fe2252ebac19a31b8290e30927576202d388af38bfe0cabce28
-
Filesize
913KB
MD56b184f137865f85441b0273eb7aab58f
SHA1554762329dc07b4afb2e3be2795768eaf730b671
SHA256dd41faefa4bdd2e630ac49c2456bf2d80cb39cece63a8161758259403b44e797
SHA512d41073e1b6a476a7a0f3fdbe971def8ed9ad3a63d00321590f5e59482ff56229d7e4bd9af08c8fe2252ebac19a31b8290e30927576202d388af38bfe0cabce28
-
Filesize
708KB
MD525e2ad6ae3156ff3c7af8007664be71f
SHA109fba2760a3b9ea36d4e8774df196b1e3a85c52a
SHA256ce580df8980a31f0f4ec6a61c4175143810f53ff80d1d27a6674436a346ce1c8
SHA51202545d7bdd37a6ceabae5326423cbb64afdccfedcc7323e5b1061f05edc821267a9976fc068588a40ced00b337e898947957b39c521365e8d8c02532c19ed463
-
Filesize
708KB
MD525e2ad6ae3156ff3c7af8007664be71f
SHA109fba2760a3b9ea36d4e8774df196b1e3a85c52a
SHA256ce580df8980a31f0f4ec6a61c4175143810f53ff80d1d27a6674436a346ce1c8
SHA51202545d7bdd37a6ceabae5326423cbb64afdccfedcc7323e5b1061f05edc821267a9976fc068588a40ced00b337e898947957b39c521365e8d8c02532c19ed463
-
Filesize
417KB
MD5df7e7caebd25603336b4919e067a9795
SHA135ee8daf3edf494cf788b877b19b485a8f3e2995
SHA2567483b350f14e2f1718c435fb2f7baa1ebba9df26cbd85b2f125427f0e332dd9f
SHA51297f73f703e84ae247caa9a99d5e4904d6296e18fb50204d2d2341ce307dac81318169670432078d4af6595b3dc60bbc1982e918e12088ac10a5856de3c39a37b
-
Filesize
417KB
MD5df7e7caebd25603336b4919e067a9795
SHA135ee8daf3edf494cf788b877b19b485a8f3e2995
SHA2567483b350f14e2f1718c435fb2f7baa1ebba9df26cbd85b2f125427f0e332dd9f
SHA51297f73f703e84ae247caa9a99d5e4904d6296e18fb50204d2d2341ce307dac81318169670432078d4af6595b3dc60bbc1982e918e12088ac10a5856de3c39a37b
-
Filesize
360KB
MD5850acd9685df3ad087d239b7589b9e09
SHA1a62073d24105aa31eceb5c9eba828a1bcac57d12
SHA2566fa7e000b535e61110e940cd2a5d92bd15af01d2c680beae227081304d5d2b1f
SHA512c36dc4751ce0bee6f92eec4ded085ae611cbe7ccb3763a09f31ff8cfe8d85cb49cf7fee16186e701ae9515bcb2796f9c4a258951570f070948f67166dcf7d786
-
Filesize
360KB
MD5850acd9685df3ad087d239b7589b9e09
SHA1a62073d24105aa31eceb5c9eba828a1bcac57d12
SHA2566fa7e000b535e61110e940cd2a5d92bd15af01d2c680beae227081304d5d2b1f
SHA512c36dc4751ce0bee6f92eec4ded085ae611cbe7ccb3763a09f31ff8cfe8d85cb49cf7fee16186e701ae9515bcb2796f9c4a258951570f070948f67166dcf7d786
-
Filesize
136KB
MD5f7c6c79b6bdbf59944b371f4c4b88329
SHA106f43e28d739abfb5a739d9abcb8480d4e4ba4e9
SHA25694a8f2714321247d02e8540620ae797b69e5991aa83d040f4fdb53048fc41ea7
SHA5125ae92c27019e63c6eb752031b3958dcb333242295b9e65b44d27d401e4670a6767b3980845a7ed58410bfcdbc3e0b4135f281758525b900ba7664127b1967e4b
-
Filesize
136KB
MD5f7c6c79b6bdbf59944b371f4c4b88329
SHA106f43e28d739abfb5a739d9abcb8480d4e4ba4e9
SHA25694a8f2714321247d02e8540620ae797b69e5991aa83d040f4fdb53048fc41ea7
SHA5125ae92c27019e63c6eb752031b3958dcb333242295b9e65b44d27d401e4670a6767b3980845a7ed58410bfcdbc3e0b4135f281758525b900ba7664127b1967e4b