Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 22:30
Static task
static1
Behavioral task
behavioral1
Sample
71287ed5b3163dd0fecdb5623edd316f94cc0b5e9e604f68bf35bb581bff80a5.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
71287ed5b3163dd0fecdb5623edd316f94cc0b5e9e604f68bf35bb581bff80a5.exe
Resource
win10v2004-20230220-en
General
-
Target
71287ed5b3163dd0fecdb5623edd316f94cc0b5e9e604f68bf35bb581bff80a5.exe
-
Size
612KB
-
MD5
f827a03f24723149ecb1a859b4e61355
-
SHA1
6432965f52c3b78be5e6b611c2febd10f02f05dc
-
SHA256
71287ed5b3163dd0fecdb5623edd316f94cc0b5e9e604f68bf35bb581bff80a5
-
SHA512
3466f29570865d029a2436328a96670ac398c529882109c95742300525ed2f4a03428e9eb80c36e55caba48accc4e8e025d6573df2187303a560d5f83ab7edcb
-
SSDEEP
6144:cep0yN90QEQfL1zLrokL2KQ6ES5rGHVwQarorw6Uf6BUwHWYFjHNw51OPpKv6wbO:ky90sXYS5K1wQdi6Wsxtw5qOzUisYA
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1940-949-0x00000000078E0000-0x0000000007EF8000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 09381920.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 09381920.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 09381920.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 09381920.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 09381920.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 09381920.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4332 st098505.exe 5016 09381920.exe 1940 kp054112.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 09381920.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 71287ed5b3163dd0fecdb5623edd316f94cc0b5e9e604f68bf35bb581bff80a5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 71287ed5b3163dd0fecdb5623edd316f94cc0b5e9e604f68bf35bb581bff80a5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st098505.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st098505.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5016 09381920.exe 5016 09381920.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5016 09381920.exe Token: SeDebugPrivilege 1940 kp054112.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4464 wrote to memory of 4332 4464 71287ed5b3163dd0fecdb5623edd316f94cc0b5e9e604f68bf35bb581bff80a5.exe 83 PID 4464 wrote to memory of 4332 4464 71287ed5b3163dd0fecdb5623edd316f94cc0b5e9e604f68bf35bb581bff80a5.exe 83 PID 4464 wrote to memory of 4332 4464 71287ed5b3163dd0fecdb5623edd316f94cc0b5e9e604f68bf35bb581bff80a5.exe 83 PID 4332 wrote to memory of 5016 4332 st098505.exe 84 PID 4332 wrote to memory of 5016 4332 st098505.exe 84 PID 4332 wrote to memory of 1940 4332 st098505.exe 85 PID 4332 wrote to memory of 1940 4332 st098505.exe 85 PID 4332 wrote to memory of 1940 4332 st098505.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\71287ed5b3163dd0fecdb5623edd316f94cc0b5e9e604f68bf35bb581bff80a5.exe"C:\Users\Admin\AppData\Local\Temp\71287ed5b3163dd0fecdb5623edd316f94cc0b5e9e604f68bf35bb581bff80a5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st098505.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st098505.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\09381920.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\09381920.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5016
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp054112.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp054112.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
458KB
MD519f35c2d7bdd4909b8b85ee631549d7e
SHA111c1dc2fa7d908f92c2e84527f7a450ccd5c8c55
SHA256bb0fa75e6091c17ece9ceb551d5eb746e6d90a222e5d18fa690677c7d79abd1e
SHA5127e5b8be3f61bc9b57d8677c49d086590ae94d8c45a6a9df0d5f3b66037991fd301262c0f0a74aa623ffbc58465709cf8de440ff1ba4bcb153d61a60d6ea031ed
-
Filesize
458KB
MD519f35c2d7bdd4909b8b85ee631549d7e
SHA111c1dc2fa7d908f92c2e84527f7a450ccd5c8c55
SHA256bb0fa75e6091c17ece9ceb551d5eb746e6d90a222e5d18fa690677c7d79abd1e
SHA5127e5b8be3f61bc9b57d8677c49d086590ae94d8c45a6a9df0d5f3b66037991fd301262c0f0a74aa623ffbc58465709cf8de440ff1ba4bcb153d61a60d6ea031ed
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
460KB
MD5478f684cafc742f941c549c4f61eb24d
SHA1511bf273d8c21808ebd268817f6a38671d480587
SHA2565d93ad7212c9d0a9e83df4112827750e46fff87394cd4daa4d1edfab1089c0be
SHA512bde538e033796eb97211d96234d285f05bd107ceddac4f8f52dd3b97c546954b390861566f3a0fe146bfbdd2fcedeb0a962e207a4299c96a5ae1747f50445df4
-
Filesize
460KB
MD5478f684cafc742f941c549c4f61eb24d
SHA1511bf273d8c21808ebd268817f6a38671d480587
SHA2565d93ad7212c9d0a9e83df4112827750e46fff87394cd4daa4d1edfab1089c0be
SHA512bde538e033796eb97211d96234d285f05bd107ceddac4f8f52dd3b97c546954b390861566f3a0fe146bfbdd2fcedeb0a962e207a4299c96a5ae1747f50445df4