Analysis
-
max time kernel
151s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 22:24
Static task
static1
Behavioral task
behavioral1
Sample
6ca05235a5946b540c8e7b8339d938a176dce2f7ec5a1b0ba44519a160333311.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6ca05235a5946b540c8e7b8339d938a176dce2f7ec5a1b0ba44519a160333311.exe
Resource
win10v2004-20230220-en
General
-
Target
6ca05235a5946b540c8e7b8339d938a176dce2f7ec5a1b0ba44519a160333311.exe
-
Size
1.2MB
-
MD5
b94d24de15f1cf31b109174df8e371da
-
SHA1
3f12cb41f677dca63e7ce3159054972ee593e8f4
-
SHA256
6ca05235a5946b540c8e7b8339d938a176dce2f7ec5a1b0ba44519a160333311
-
SHA512
cbcbb04fd28079686729b40c571f45bf93e98ffc2b0b39eec8d6ad31397c11853f3004bdf531d9ca7f968b8f2d2d10a0070375ef998020d2249a4f394dc9e17f
-
SSDEEP
24576:Lyk0MQzaPp60qBb2V4FIBqW5bdVCwyiqOkGc+SLtfhP1knMnjt8:+kPyaV4uqAbDyWkt3hh6nSt
Malware Config
Extracted
redline
lofa
185.161.248.73:4164
-
auth_value
3442ba767c6a30cde747101942f34a3a
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1180-201-0x000000000A7F0000-0x000000000AE08000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection s67606871.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" s67606871.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" s67606871.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" s67606871.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" s67606871.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" s67606871.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 1560 z05894032.exe 3464 z86207961.exe 228 z28328276.exe 4436 s67606871.exe 1180 t37746663.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features s67606871.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" s67606871.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6ca05235a5946b540c8e7b8339d938a176dce2f7ec5a1b0ba44519a160333311.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6ca05235a5946b540c8e7b8339d938a176dce2f7ec5a1b0ba44519a160333311.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z05894032.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z05894032.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z86207961.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z86207961.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z28328276.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z28328276.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4436 s67606871.exe 4436 s67606871.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4436 s67606871.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1944 wrote to memory of 1560 1944 6ca05235a5946b540c8e7b8339d938a176dce2f7ec5a1b0ba44519a160333311.exe 83 PID 1944 wrote to memory of 1560 1944 6ca05235a5946b540c8e7b8339d938a176dce2f7ec5a1b0ba44519a160333311.exe 83 PID 1944 wrote to memory of 1560 1944 6ca05235a5946b540c8e7b8339d938a176dce2f7ec5a1b0ba44519a160333311.exe 83 PID 1560 wrote to memory of 3464 1560 z05894032.exe 84 PID 1560 wrote to memory of 3464 1560 z05894032.exe 84 PID 1560 wrote to memory of 3464 1560 z05894032.exe 84 PID 3464 wrote to memory of 228 3464 z86207961.exe 85 PID 3464 wrote to memory of 228 3464 z86207961.exe 85 PID 3464 wrote to memory of 228 3464 z86207961.exe 85 PID 228 wrote to memory of 4436 228 z28328276.exe 86 PID 228 wrote to memory of 4436 228 z28328276.exe 86 PID 228 wrote to memory of 4436 228 z28328276.exe 86 PID 228 wrote to memory of 1180 228 z28328276.exe 87 PID 228 wrote to memory of 1180 228 z28328276.exe 87 PID 228 wrote to memory of 1180 228 z28328276.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ca05235a5946b540c8e7b8339d938a176dce2f7ec5a1b0ba44519a160333311.exe"C:\Users\Admin\AppData\Local\Temp\6ca05235a5946b540c8e7b8339d938a176dce2f7ec5a1b0ba44519a160333311.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z05894032.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z05894032.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z86207961.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z86207961.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z28328276.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z28328276.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s67606871.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s67606871.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4436
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t37746663.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t37746663.exe5⤵
- Executes dropped EXE
PID:1180
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
977KB
MD504de40623dd0ce381ed27575884834cb
SHA15eebc868e63da036aeac1779be24d1beef285b7c
SHA25694232f9f6e4fa6683282417a4793bef39a6417e96603eda55036723fa070ede6
SHA512fbb8c1d95f71bd1c26d98332776e4a8e3ae612bbe74ac9752e5d99721dc6e2fc8356703503d2b9d81d4321b3e53ff13701891c2dc3613f69593d4df712b1a82f
-
Filesize
977KB
MD504de40623dd0ce381ed27575884834cb
SHA15eebc868e63da036aeac1779be24d1beef285b7c
SHA25694232f9f6e4fa6683282417a4793bef39a6417e96603eda55036723fa070ede6
SHA512fbb8c1d95f71bd1c26d98332776e4a8e3ae612bbe74ac9752e5d99721dc6e2fc8356703503d2b9d81d4321b3e53ff13701891c2dc3613f69593d4df712b1a82f
-
Filesize
794KB
MD57694cbbb02e29dd6f3945a5d4c035d18
SHA1530e6fbb8e89736f0ede289fad4b28b030d7bc72
SHA256f7a938d64ba2b0e0f16f48751c60e27ea35c303c63d75e5b409ec12d44fb9150
SHA512d0ce8a9cb6f8fb09a1c07d513b27704328608ca5e3a1ccb97d19de20c9b918ff00bec838ca3ae4c8c92c905fa97f0f4b588fa7b029024bdd23d068476e42cb5e
-
Filesize
794KB
MD57694cbbb02e29dd6f3945a5d4c035d18
SHA1530e6fbb8e89736f0ede289fad4b28b030d7bc72
SHA256f7a938d64ba2b0e0f16f48751c60e27ea35c303c63d75e5b409ec12d44fb9150
SHA512d0ce8a9cb6f8fb09a1c07d513b27704328608ca5e3a1ccb97d19de20c9b918ff00bec838ca3ae4c8c92c905fa97f0f4b588fa7b029024bdd23d068476e42cb5e
-
Filesize
310KB
MD581def50961ebdec65b76d932ad50600d
SHA16afd8ed856379c515e56422e2ac5fd9536034c88
SHA2562ea9817dafcbf917ed5abcee3f9e75db9628b8225633cbf7bc8e372964a5d228
SHA5127de0bffe1c94a5edeeed3b63bdae85f8e56ba6a703527cb43cce1ce9ec9c023b2d2f1b2488faa6d91bff1c596c6b3f3fc130b970e1e663ab6ed8de08bdbb2ac5
-
Filesize
310KB
MD581def50961ebdec65b76d932ad50600d
SHA16afd8ed856379c515e56422e2ac5fd9536034c88
SHA2562ea9817dafcbf917ed5abcee3f9e75db9628b8225633cbf7bc8e372964a5d228
SHA5127de0bffe1c94a5edeeed3b63bdae85f8e56ba6a703527cb43cce1ce9ec9c023b2d2f1b2488faa6d91bff1c596c6b3f3fc130b970e1e663ab6ed8de08bdbb2ac5
-
Filesize
175KB
MD5799abaf220aeac856052b7e370c01fd9
SHA1c938b4abd36adc778bb8eb6832f383645dcac1c7
SHA256ccfd4a99fed9713ff690462cd7b66c0db838167af50c24888ae08259152e8165
SHA51219f93623d5b50f027d883b8f8cddd8b70327a374f40728ef75084378de5198c3ace70772cbd68a2f092832ab79b876aff947e797b1c40c4256e479df11bf7fac
-
Filesize
175KB
MD5799abaf220aeac856052b7e370c01fd9
SHA1c938b4abd36adc778bb8eb6832f383645dcac1c7
SHA256ccfd4a99fed9713ff690462cd7b66c0db838167af50c24888ae08259152e8165
SHA51219f93623d5b50f027d883b8f8cddd8b70327a374f40728ef75084378de5198c3ace70772cbd68a2f092832ab79b876aff947e797b1c40c4256e479df11bf7fac
-
Filesize
168KB
MD575491ec66930fe16dd62ffc67f8dc1db
SHA117826b39c6fb40e47a2ae32130b260e86c40fb9f
SHA25655e6980eb39e875b0b31021232a01ff132f8294a96143aa717374fa30c6000c1
SHA51244596978db46bcb3ddc52ab441738fa5f27498da44db9a9c1ed630fadd99cbd76673e48acd54990149eaa8fbdf59662992289f8b63049055eef12110c36d378e
-
Filesize
168KB
MD575491ec66930fe16dd62ffc67f8dc1db
SHA117826b39c6fb40e47a2ae32130b260e86c40fb9f
SHA25655e6980eb39e875b0b31021232a01ff132f8294a96143aa717374fa30c6000c1
SHA51244596978db46bcb3ddc52ab441738fa5f27498da44db9a9c1ed630fadd99cbd76673e48acd54990149eaa8fbdf59662992289f8b63049055eef12110c36d378e