Analysis
-
max time kernel
166s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 22:33
Static task
static1
Behavioral task
behavioral1
Sample
00a6816b344c7bf30a8e9300930df900bb32c229df33d62812c2970d204d3a57.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
00a6816b344c7bf30a8e9300930df900bb32c229df33d62812c2970d204d3a57.exe
Resource
win10v2004-20230220-en
General
-
Target
00a6816b344c7bf30a8e9300930df900bb32c229df33d62812c2970d204d3a57.exe
-
Size
618KB
-
MD5
295d5772c302628a05e9026c7bbab161
-
SHA1
46b796a4d43e11b7e95d6ce372f4fa0c6dc6eef1
-
SHA256
00a6816b344c7bf30a8e9300930df900bb32c229df33d62812c2970d204d3a57
-
SHA512
a8797ba5919158203d2990bf0faad1d4fbd84329f98b9a64dde13bcfb528b608f69b878c85400e0285fcdf53f1158496b30d23c1771f4e8a675568d8277ec937
-
SSDEEP
12288:Ay90RUkSWNTQBzeCjKjCE5EsKqTw2eP+TeWss4Du0PvGu:AykUiNTGeCrKEsKqTwbCi5uAGu
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4108-950-0x0000000007AA0000-0x00000000080B8000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 75344210.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 75344210.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 75344210.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 75344210.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 75344210.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 75344210.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 960 st930138.exe 916 75344210.exe 4108 kp212862.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 75344210.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 00a6816b344c7bf30a8e9300930df900bb32c229df33d62812c2970d204d3a57.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st930138.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st930138.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 00a6816b344c7bf30a8e9300930df900bb32c229df33d62812c2970d204d3a57.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 916 75344210.exe 916 75344210.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 916 75344210.exe Token: SeDebugPrivilege 4108 kp212862.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1076 wrote to memory of 960 1076 00a6816b344c7bf30a8e9300930df900bb32c229df33d62812c2970d204d3a57.exe 82 PID 1076 wrote to memory of 960 1076 00a6816b344c7bf30a8e9300930df900bb32c229df33d62812c2970d204d3a57.exe 82 PID 1076 wrote to memory of 960 1076 00a6816b344c7bf30a8e9300930df900bb32c229df33d62812c2970d204d3a57.exe 82 PID 960 wrote to memory of 916 960 st930138.exe 83 PID 960 wrote to memory of 916 960 st930138.exe 83 PID 960 wrote to memory of 4108 960 st930138.exe 85 PID 960 wrote to memory of 4108 960 st930138.exe 85 PID 960 wrote to memory of 4108 960 st930138.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\00a6816b344c7bf30a8e9300930df900bb32c229df33d62812c2970d204d3a57.exe"C:\Users\Admin\AppData\Local\Temp\00a6816b344c7bf30a8e9300930df900bb32c229df33d62812c2970d204d3a57.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st930138.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st930138.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\75344210.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\75344210.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:916
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp212862.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp212862.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4108
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
463KB
MD56202ef004ec42e072c57cf11dfbe45cc
SHA1ba31d2b4c41040109005160e751495eed4383f9d
SHA2562801b04b43766c7b1584883db10174c71c7f164f35ecf34094c827e666274753
SHA51267579fb3cd8d52bf28053e8ab241171f6a80895d945f2d668dde9c8b1082ce54432938b02f971226f12a527a2d4da0d24cb94628916e04c4854e903f3c869c4c
-
Filesize
463KB
MD56202ef004ec42e072c57cf11dfbe45cc
SHA1ba31d2b4c41040109005160e751495eed4383f9d
SHA2562801b04b43766c7b1584883db10174c71c7f164f35ecf34094c827e666274753
SHA51267579fb3cd8d52bf28053e8ab241171f6a80895d945f2d668dde9c8b1082ce54432938b02f971226f12a527a2d4da0d24cb94628916e04c4854e903f3c869c4c
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
473KB
MD5f8e1b82fd7d1161c101b673733694192
SHA16501c9c6e0d635503d99e17140e522f17f2ccbdb
SHA256f89bb8bb57617d9b93b534489900320a6057928c08d14c756a2ec915f68a134f
SHA512c8c0ca5ffd5081734156e2ea4fed3fabbb1c3cc4efcee38d77c5b78381c6981ffb6c02000aabae5965d2ee15d1ddcc519b7e496d654e872c681be8f585f8a8f1
-
Filesize
473KB
MD5f8e1b82fd7d1161c101b673733694192
SHA16501c9c6e0d635503d99e17140e522f17f2ccbdb
SHA256f89bb8bb57617d9b93b534489900320a6057928c08d14c756a2ec915f68a134f
SHA512c8c0ca5ffd5081734156e2ea4fed3fabbb1c3cc4efcee38d77c5b78381c6981ffb6c02000aabae5965d2ee15d1ddcc519b7e496d654e872c681be8f585f8a8f1