Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 22:26
Static task
static1
Behavioral task
behavioral1
Sample
6e96748d1f93f53406b975d4bbc6b8cda351204932ab2473f802c644697fa80f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6e96748d1f93f53406b975d4bbc6b8cda351204932ab2473f802c644697fa80f.exe
Resource
win10v2004-20230220-en
General
-
Target
6e96748d1f93f53406b975d4bbc6b8cda351204932ab2473f802c644697fa80f.exe
-
Size
1.2MB
-
MD5
8b3eaa8f14c275b452d084531f34af6d
-
SHA1
bdb7c22cfa3a753bf28a5b17f11f851bb124466a
-
SHA256
6e96748d1f93f53406b975d4bbc6b8cda351204932ab2473f802c644697fa80f
-
SHA512
48502bb5ff66ab287bc0f583cfb77767a9e56341c1b0b840599d09b59dccbb7a5c98575bd9c4007d66a4660e47b90992e58d6f206db29bf88d96efdabe09a075
-
SSDEEP
24576:eyZdtOhCiWtF36eIwAl3JNs+4q172lZeA6khRxXxZMbedItcPTx7/eCUWFq:tv+ClfDAj4VTeAPhRtfxCc7Z/ew
Malware Config
Extracted
redline
lakio
217.196.96.56:4138
-
auth_value
5a2372e90cce274157a245c74afe9d6e
Signatures
-
Detects Redline Stealer samples 2 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3472-205-0x000000000AA40000-0x000000000B058000-memory.dmp redline_stealer behavioral2/memory/3472-208-0x0000000005090000-0x00000000050A0000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection n1478062.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" n1478062.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" n1478062.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" n1478062.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" n1478062.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" n1478062.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 1828 z5695676.exe 764 z5016329.exe 3744 z4192400.exe 4076 n1478062.exe 3472 o2295037.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features n1478062.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" n1478062.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6e96748d1f93f53406b975d4bbc6b8cda351204932ab2473f802c644697fa80f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z5695676.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z5695676.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z5016329.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z5016329.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z4192400.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z4192400.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6e96748d1f93f53406b975d4bbc6b8cda351204932ab2473f802c644697fa80f.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1608 4076 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4076 n1478062.exe 4076 n1478062.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4076 n1478062.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 5036 wrote to memory of 1828 5036 6e96748d1f93f53406b975d4bbc6b8cda351204932ab2473f802c644697fa80f.exe 84 PID 5036 wrote to memory of 1828 5036 6e96748d1f93f53406b975d4bbc6b8cda351204932ab2473f802c644697fa80f.exe 84 PID 5036 wrote to memory of 1828 5036 6e96748d1f93f53406b975d4bbc6b8cda351204932ab2473f802c644697fa80f.exe 84 PID 1828 wrote to memory of 764 1828 z5695676.exe 85 PID 1828 wrote to memory of 764 1828 z5695676.exe 85 PID 1828 wrote to memory of 764 1828 z5695676.exe 85 PID 764 wrote to memory of 3744 764 z5016329.exe 86 PID 764 wrote to memory of 3744 764 z5016329.exe 86 PID 764 wrote to memory of 3744 764 z5016329.exe 86 PID 3744 wrote to memory of 4076 3744 z4192400.exe 87 PID 3744 wrote to memory of 4076 3744 z4192400.exe 87 PID 3744 wrote to memory of 4076 3744 z4192400.exe 87 PID 3744 wrote to memory of 3472 3744 z4192400.exe 93 PID 3744 wrote to memory of 3472 3744 z4192400.exe 93 PID 3744 wrote to memory of 3472 3744 z4192400.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e96748d1f93f53406b975d4bbc6b8cda351204932ab2473f802c644697fa80f.exe"C:\Users\Admin\AppData\Local\Temp\6e96748d1f93f53406b975d4bbc6b8cda351204932ab2473f802c644697fa80f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5695676.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5695676.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5016329.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z5016329.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4192400.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z4192400.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n1478062.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n1478062.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4076 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4076 -s 10806⤵
- Program crash
PID:1608
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o2295037.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o2295037.exe5⤵
- Executes dropped EXE
PID:3472
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4076 -ip 40761⤵PID:856
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD53200663462e997348e6633d13748234a
SHA131286a020ccf58eb73b18cfceb85a7c3e41f8ec8
SHA25690f887da49cf4ae3a6c1163bfc0e07497ad643f37b0038fe7c6aebc4e25c1a2f
SHA5120a1b745bde2ed4a521926c53a892b2377d7cb7919ae79116d6dad4fc835fadaa51ee2c87f2756e5fc247bc091700908705debc05dcbae2a1359a255605d089ea
-
Filesize
1.0MB
MD53200663462e997348e6633d13748234a
SHA131286a020ccf58eb73b18cfceb85a7c3e41f8ec8
SHA25690f887da49cf4ae3a6c1163bfc0e07497ad643f37b0038fe7c6aebc4e25c1a2f
SHA5120a1b745bde2ed4a521926c53a892b2377d7cb7919ae79116d6dad4fc835fadaa51ee2c87f2756e5fc247bc091700908705debc05dcbae2a1359a255605d089ea
-
Filesize
597KB
MD5d7ac91a0d75bb955232365c1a31b29a0
SHA1f283c9067aeb94215f0cb18da0e15ff9935628f2
SHA25648db151fc353c74fc9ce35abbd373744d282db2c6d5c87c04f581393f8b43aa7
SHA51296cb8b98f4ced160c4646dd5844c49622a3784c8486c543f8bebc831b3eb87d0be94877f72f26a9809aa896c8062a9d7b69b8d9742cb56baa1e9e367a4053700
-
Filesize
597KB
MD5d7ac91a0d75bb955232365c1a31b29a0
SHA1f283c9067aeb94215f0cb18da0e15ff9935628f2
SHA25648db151fc353c74fc9ce35abbd373744d282db2c6d5c87c04f581393f8b43aa7
SHA51296cb8b98f4ced160c4646dd5844c49622a3784c8486c543f8bebc831b3eb87d0be94877f72f26a9809aa896c8062a9d7b69b8d9742cb56baa1e9e367a4053700
-
Filesize
393KB
MD5ec4da8217b74e0d0be3e036bc900480d
SHA1c5f6b4b4085c037c4e907e2e22f025838affc5d6
SHA2563e5bfbd1903a464e1f4a529a1c5d286d728dea26de90cff7d06dd5ef517f4784
SHA512e11a7d4aa8d4c925d07f3c1abd064d5086feb52667a53c1c88fa96b59baf5a122f51722e2d8d65ec5abb07319a7958e3d441b49a3ab9645167c6b592edcc577e
-
Filesize
393KB
MD5ec4da8217b74e0d0be3e036bc900480d
SHA1c5f6b4b4085c037c4e907e2e22f025838affc5d6
SHA2563e5bfbd1903a464e1f4a529a1c5d286d728dea26de90cff7d06dd5ef517f4784
SHA512e11a7d4aa8d4c925d07f3c1abd064d5086feb52667a53c1c88fa96b59baf5a122f51722e2d8d65ec5abb07319a7958e3d441b49a3ab9645167c6b592edcc577e
-
Filesize
315KB
MD593b2849d3616cae91aa194d4a444cbc5
SHA18d863c6fd33844674faf9107e4c7fe46b8fe28f0
SHA25680ba299d2c9a29f1fd19eb946b8c8151d24053e32b885886583afa7aec9102ed
SHA5121ba88b450a6238100b51de1e77130fc7c7a8fda4cc39c7153d93f13425856aeaabc2c1561e77b29dbd829c9c1bf13c3c177a687d5c42f634ecbce78793fea038
-
Filesize
315KB
MD593b2849d3616cae91aa194d4a444cbc5
SHA18d863c6fd33844674faf9107e4c7fe46b8fe28f0
SHA25680ba299d2c9a29f1fd19eb946b8c8151d24053e32b885886583afa7aec9102ed
SHA5121ba88b450a6238100b51de1e77130fc7c7a8fda4cc39c7153d93f13425856aeaabc2c1561e77b29dbd829c9c1bf13c3c177a687d5c42f634ecbce78793fea038
-
Filesize
168KB
MD55b914f9078cd5be1a32b580f6e90fad5
SHA1265c67d0268949d90406ed2d6b2083c4cf91fdba
SHA2565839e3842f5f2dcf9f7a4b0af16a1d602c2dc43bbd5226199d0785c5be7509b8
SHA512b9274e5f343a43bbd3563b1b8a2c9e7a537333fb5f5be8173f1d13a90b1866357dc9efdbad7f3cf127f30de2732038df8348ca5c41d4d4c5a6634533248be628
-
Filesize
168KB
MD55b914f9078cd5be1a32b580f6e90fad5
SHA1265c67d0268949d90406ed2d6b2083c4cf91fdba
SHA2565839e3842f5f2dcf9f7a4b0af16a1d602c2dc43bbd5226199d0785c5be7509b8
SHA512b9274e5f343a43bbd3563b1b8a2c9e7a537333fb5f5be8173f1d13a90b1866357dc9efdbad7f3cf127f30de2732038df8348ca5c41d4d4c5a6634533248be628