Analysis
-
max time kernel
153s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 22:28
Static task
static1
Behavioral task
behavioral1
Sample
6fbec7f117b792d37196d140ec801d0da997aca7776f555bcc9f72bb7f90677b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
6fbec7f117b792d37196d140ec801d0da997aca7776f555bcc9f72bb7f90677b.exe
Resource
win10v2004-20230220-en
General
-
Target
6fbec7f117b792d37196d140ec801d0da997aca7776f555bcc9f72bb7f90677b.exe
-
Size
674KB
-
MD5
f0db961e5964d66acff85a2a83fb2305
-
SHA1
3e2d99147e9153bdd18670839d897e9aedd633ca
-
SHA256
6fbec7f117b792d37196d140ec801d0da997aca7776f555bcc9f72bb7f90677b
-
SHA512
00afc8a319fb75975d57f678da3c33858c9ad936b36d0723cae3e3eeed33cffe44cdcc4d0a2487a50035c4de378b5c18ca329d3c25b1c7a9fadc4fe4631bd143
-
SSDEEP
12288:Dy905boP0avqFRh1DP4eehNE2gcvhIcvUriomkvwDozsvJHWMZoY+hU:DymoPdvQJDP/ehNE2gcvq4Wv9wAsvJH/
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/220-987-0x00000000075E0000-0x0000000007BF8000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 33913897.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 33913897.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 33913897.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 33913897.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 33913897.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 33913897.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 3132 st874250.exe 2976 33913897.exe 220 kp804953.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 33913897.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 33913897.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st874250.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 6fbec7f117b792d37196d140ec801d0da997aca7776f555bcc9f72bb7f90677b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6fbec7f117b792d37196d140ec801d0da997aca7776f555bcc9f72bb7f90677b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st874250.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2976 33913897.exe 2976 33913897.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2976 33913897.exe Token: SeDebugPrivilege 220 kp804953.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1456 wrote to memory of 3132 1456 6fbec7f117b792d37196d140ec801d0da997aca7776f555bcc9f72bb7f90677b.exe 86 PID 1456 wrote to memory of 3132 1456 6fbec7f117b792d37196d140ec801d0da997aca7776f555bcc9f72bb7f90677b.exe 86 PID 1456 wrote to memory of 3132 1456 6fbec7f117b792d37196d140ec801d0da997aca7776f555bcc9f72bb7f90677b.exe 86 PID 3132 wrote to memory of 2976 3132 st874250.exe 87 PID 3132 wrote to memory of 2976 3132 st874250.exe 87 PID 3132 wrote to memory of 2976 3132 st874250.exe 87 PID 3132 wrote to memory of 220 3132 st874250.exe 88 PID 3132 wrote to memory of 220 3132 st874250.exe 88 PID 3132 wrote to memory of 220 3132 st874250.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fbec7f117b792d37196d140ec801d0da997aca7776f555bcc9f72bb7f90677b.exe"C:\Users\Admin\AppData\Local\Temp\6fbec7f117b792d37196d140ec801d0da997aca7776f555bcc9f72bb7f90677b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st874250.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st874250.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\33913897.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\33913897.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp804953.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp804953.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:220
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
520KB
MD5b9653abfdc77729f81a3fae32ff431a6
SHA16bf2e0e4e40cab121e4c4eb8947dca50f4759466
SHA25606b7115a3710e17f0d2108347a2d99a671b055f11e718a7f91e9ec95fcf6ae3c
SHA5125625d78dc300d820a3fa9fee172ed65d869f2f7c09205aecde1f2e7d470fd4c281da7e29ad86296f748f04152c148a1057f7c0db2328596fcdac422291702ffc
-
Filesize
520KB
MD5b9653abfdc77729f81a3fae32ff431a6
SHA16bf2e0e4e40cab121e4c4eb8947dca50f4759466
SHA25606b7115a3710e17f0d2108347a2d99a671b055f11e718a7f91e9ec95fcf6ae3c
SHA5125625d78dc300d820a3fa9fee172ed65d869f2f7c09205aecde1f2e7d470fd4c281da7e29ad86296f748f04152c148a1057f7c0db2328596fcdac422291702ffc
-
Filesize
175KB
MD5589e3c1408637af1404797442d75e828
SHA1ee6c5a572e6c7f547e6075e22eb56ae1f34d3f98
SHA256e4e5c922fc14096d64d8ff600d9669c83e5938a61ac78b582874a4087dfd9b84
SHA5122b0c31973768dd8d446b8fea5aee7cf85e66c1256dd515f26799284a9ea33aafeae3e9850ef79ae4106f2244279cc9ac3a5d3d7d78e03e7982d0e3e3a87f3d04
-
Filesize
175KB
MD5589e3c1408637af1404797442d75e828
SHA1ee6c5a572e6c7f547e6075e22eb56ae1f34d3f98
SHA256e4e5c922fc14096d64d8ff600d9669c83e5938a61ac78b582874a4087dfd9b84
SHA5122b0c31973768dd8d446b8fea5aee7cf85e66c1256dd515f26799284a9ea33aafeae3e9850ef79ae4106f2244279cc9ac3a5d3d7d78e03e7982d0e3e3a87f3d04
-
Filesize
415KB
MD582f478920dd5dfd994243645f80f6105
SHA11fa84909fa4b41b0ad4abb22cb303123d7b9a2b2
SHA256c6f23a17ec0a2346e611c5eab9a60b8461d4b441e3159f1538fcec7d90c8f6f0
SHA512dd32d533b8ec8e13b2a8cda95944890b88e1cd1ed636e51322cd55ecbe96abf314046792f41cc813fea881422034e14fcd7445cc14bf009d725d6466e9fc2a3a
-
Filesize
415KB
MD582f478920dd5dfd994243645f80f6105
SHA11fa84909fa4b41b0ad4abb22cb303123d7b9a2b2
SHA256c6f23a17ec0a2346e611c5eab9a60b8461d4b441e3159f1538fcec7d90c8f6f0
SHA512dd32d533b8ec8e13b2a8cda95944890b88e1cd1ed636e51322cd55ecbe96abf314046792f41cc813fea881422034e14fcd7445cc14bf009d725d6466e9fc2a3a