Analysis
-
max time kernel
184s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 22:22
Static task
static1
Behavioral task
behavioral1
Sample
6ae57748482acc9905de34af00fe086639700828e91d12dc114b484a38b685cd.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6ae57748482acc9905de34af00fe086639700828e91d12dc114b484a38b685cd.exe
Resource
win10v2004-20230220-en
General
-
Target
6ae57748482acc9905de34af00fe086639700828e91d12dc114b484a38b685cd.exe
-
Size
752KB
-
MD5
068373078336a1f9de329e6552ef03cd
-
SHA1
c826d8e37bc346f08e276ee86d643bd7753e1f24
-
SHA256
6ae57748482acc9905de34af00fe086639700828e91d12dc114b484a38b685cd
-
SHA512
33e8b399832d452ea8045d37795dd7832a3748a4ecdb59a57139e2e119ea40bab33d95ba861c5aef1b701e8b517ed4b1efcef02bfe8b97379376a3bf40fcd267
-
SSDEEP
12288:3y90SFvqw0yS4vb66+8MJjVOsC4wQIeZjxdQC4WD6Vth+r/KiNz:3yTvqVXceBNVey/iCLCth+jKix
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/2904-990-0x00000000079D0000-0x0000000007FE8000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 02692585.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 02692585.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 02692585.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 02692585.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 02692585.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 02692585.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1924 un423781.exe 2072 02692585.exe 2904 rk175020.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 02692585.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 02692585.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6ae57748482acc9905de34af00fe086639700828e91d12dc114b484a38b685cd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6ae57748482acc9905de34af00fe086639700828e91d12dc114b484a38b685cd.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un423781.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un423781.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2072 02692585.exe 2072 02692585.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2072 02692585.exe Token: SeDebugPrivilege 2904 rk175020.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1064 wrote to memory of 1924 1064 6ae57748482acc9905de34af00fe086639700828e91d12dc114b484a38b685cd.exe 81 PID 1064 wrote to memory of 1924 1064 6ae57748482acc9905de34af00fe086639700828e91d12dc114b484a38b685cd.exe 81 PID 1064 wrote to memory of 1924 1064 6ae57748482acc9905de34af00fe086639700828e91d12dc114b484a38b685cd.exe 81 PID 1924 wrote to memory of 2072 1924 un423781.exe 82 PID 1924 wrote to memory of 2072 1924 un423781.exe 82 PID 1924 wrote to memory of 2072 1924 un423781.exe 82 PID 1924 wrote to memory of 2904 1924 un423781.exe 87 PID 1924 wrote to memory of 2904 1924 un423781.exe 87 PID 1924 wrote to memory of 2904 1924 un423781.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ae57748482acc9905de34af00fe086639700828e91d12dc114b484a38b685cd.exe"C:\Users\Admin\AppData\Local\Temp\6ae57748482acc9905de34af00fe086639700828e91d12dc114b484a38b685cd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un423781.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un423781.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\02692585.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\02692585.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk175020.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk175020.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
598KB
MD59cdd0c27c092631e914d4aa08ac164f0
SHA1f2ee93f6253a9a811d6a5e9cf680080c3c79ace5
SHA25661c34b052e79d00f5efefca8eb5c42a5fe1b1f8d4efb6733d2476bd630e56af7
SHA512dd64d0fd40271e8072115e7b882eb3eb500e479bc3cfe255534562c9186dfd09a99a98e887096937b114209cb36b33bdbb10b270f262b9aac66577ac741f2753
-
Filesize
598KB
MD59cdd0c27c092631e914d4aa08ac164f0
SHA1f2ee93f6253a9a811d6a5e9cf680080c3c79ace5
SHA25661c34b052e79d00f5efefca8eb5c42a5fe1b1f8d4efb6733d2476bd630e56af7
SHA512dd64d0fd40271e8072115e7b882eb3eb500e479bc3cfe255534562c9186dfd09a99a98e887096937b114209cb36b33bdbb10b270f262b9aac66577ac741f2753
-
Filesize
390KB
MD583782015280fc6704c298cc01f150a81
SHA1e5a257df1611e22e71a093c2d87bd6e366640dab
SHA25669121d52dd9352285c9aee21359e14ec35908174ee75d8865f3ae2ad31eff167
SHA51205ed702d95fb8fdc6c38e3eec174ff4e5e7a33d00218deced12ac0d6ae39b77391d09a939613339f9ee1b8bc9f5fda12d8be16a2d311c0275fe31159dae7c503
-
Filesize
390KB
MD583782015280fc6704c298cc01f150a81
SHA1e5a257df1611e22e71a093c2d87bd6e366640dab
SHA25669121d52dd9352285c9aee21359e14ec35908174ee75d8865f3ae2ad31eff167
SHA51205ed702d95fb8fdc6c38e3eec174ff4e5e7a33d00218deced12ac0d6ae39b77391d09a939613339f9ee1b8bc9f5fda12d8be16a2d311c0275fe31159dae7c503
-
Filesize
473KB
MD56bbbc4a0580b78dbdbf54f5a90a74ea8
SHA1a1c8fae1dbe8c796cff13a4f1f02200ecd69cb2c
SHA256d3b7ac7df8a490ab2e1c477e3be12ec1fb200fc6e9b44f8010d1646970c20e0f
SHA512b5506fb387b4e379ed48780158e11bf3575cb88cd87462d874f00f779df0742dbc8b44727196a58823d7fd4114ed138761f0e6fda96fd35d44e4ab16dfbe561e
-
Filesize
473KB
MD56bbbc4a0580b78dbdbf54f5a90a74ea8
SHA1a1c8fae1dbe8c796cff13a4f1f02200ecd69cb2c
SHA256d3b7ac7df8a490ab2e1c477e3be12ec1fb200fc6e9b44f8010d1646970c20e0f
SHA512b5506fb387b4e379ed48780158e11bf3575cb88cd87462d874f00f779df0742dbc8b44727196a58823d7fd4114ed138761f0e6fda96fd35d44e4ab16dfbe561e