Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 20:20
Static task
static1
Behavioral task
behavioral1
Sample
07da23b9aa46368ec03210670782e8fe34bc733ba6184c69bc0fa98a8cd2d338.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
07da23b9aa46368ec03210670782e8fe34bc733ba6184c69bc0fa98a8cd2d338.exe
Resource
win10v2004-20230220-en
General
-
Target
07da23b9aa46368ec03210670782e8fe34bc733ba6184c69bc0fa98a8cd2d338.exe
-
Size
998KB
-
MD5
36b259cc7f82e5771bfc00fd2d94b885
-
SHA1
0fbf7c4f6caafd33c6ef1844b7a239499e35ef00
-
SHA256
07da23b9aa46368ec03210670782e8fe34bc733ba6184c69bc0fa98a8cd2d338
-
SHA512
790a2d876eba3ae2dfaca21710f06b526a83980abd3afbf9bbaafa9e70bbcea47e7b489a48e5676cc7e7bef2fdd6a109435ed9481a681c153fd7e59fefeeb9c5
-
SSDEEP
24576:hyLgsllIlL7nKOGLSwLnc0SIGwErHCbytD70:ULgsizAS6c0jGwHbYD
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4116-999-0x0000000007990000-0x0000000007FA8000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 184357238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 184357238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 184357238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 184357238.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 184357238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 184357238.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1904 ZR363723.exe 4476 AN544097.exe 3396 184357238.exe 4116 277149504.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 184357238.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 184357238.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 07da23b9aa46368ec03210670782e8fe34bc733ba6184c69bc0fa98a8cd2d338.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 07da23b9aa46368ec03210670782e8fe34bc733ba6184c69bc0fa98a8cd2d338.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce ZR363723.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ZR363723.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce AN544097.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" AN544097.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3396 184357238.exe 3396 184357238.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3396 184357238.exe Token: SeDebugPrivilege 4116 277149504.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4536 wrote to memory of 1904 4536 07da23b9aa46368ec03210670782e8fe34bc733ba6184c69bc0fa98a8cd2d338.exe 85 PID 4536 wrote to memory of 1904 4536 07da23b9aa46368ec03210670782e8fe34bc733ba6184c69bc0fa98a8cd2d338.exe 85 PID 4536 wrote to memory of 1904 4536 07da23b9aa46368ec03210670782e8fe34bc733ba6184c69bc0fa98a8cd2d338.exe 85 PID 1904 wrote to memory of 4476 1904 ZR363723.exe 86 PID 1904 wrote to memory of 4476 1904 ZR363723.exe 86 PID 1904 wrote to memory of 4476 1904 ZR363723.exe 86 PID 4476 wrote to memory of 3396 4476 AN544097.exe 87 PID 4476 wrote to memory of 3396 4476 AN544097.exe 87 PID 4476 wrote to memory of 3396 4476 AN544097.exe 87 PID 4476 wrote to memory of 4116 4476 AN544097.exe 89 PID 4476 wrote to memory of 4116 4476 AN544097.exe 89 PID 4476 wrote to memory of 4116 4476 AN544097.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\07da23b9aa46368ec03210670782e8fe34bc733ba6184c69bc0fa98a8cd2d338.exe"C:\Users\Admin\AppData\Local\Temp\07da23b9aa46368ec03210670782e8fe34bc733ba6184c69bc0fa98a8cd2d338.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ZR363723.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ZR363723.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\AN544097.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\AN544097.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\184357238.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\184357238.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3396
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\277149504.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\277149504.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4116
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
769KB
MD50f81b9f80c1229c1074db19b197765c2
SHA1b250f1d525856e613fbc86f364f25243b03fdce6
SHA2565dc84e93463d5eb0eb6d318d8e60ade985e3def735f2846b5bb4f3988f9e14c7
SHA5121653599ca1b763120389301aa5d75dca6ff2a3bc1e67570b5d35a111ff0f5c9f71695ac109772526aa8a2b20ad8032c34ef6649d52a21f3624dcf19b075a9f6d
-
Filesize
769KB
MD50f81b9f80c1229c1074db19b197765c2
SHA1b250f1d525856e613fbc86f364f25243b03fdce6
SHA2565dc84e93463d5eb0eb6d318d8e60ade985e3def735f2846b5bb4f3988f9e14c7
SHA5121653599ca1b763120389301aa5d75dca6ff2a3bc1e67570b5d35a111ff0f5c9f71695ac109772526aa8a2b20ad8032c34ef6649d52a21f3624dcf19b075a9f6d
-
Filesize
597KB
MD5e66eac9328ed6d89e106c5ae7fb8328b
SHA178ef242df2b5bf034729f6768543f7e6817f0351
SHA256862d2aa4bee82bd43aa8906240db0a440d4e929c8be80f0bf1de838014bbb92e
SHA512d53841efd0b8b7bd89b4fc9dfe93e51b9c0469790942249eaf1ba851c52e36a874fb5788f527a8b404cf639e8447e6414dfe09a73856689935f90ccd66da3ed3
-
Filesize
597KB
MD5e66eac9328ed6d89e106c5ae7fb8328b
SHA178ef242df2b5bf034729f6768543f7e6817f0351
SHA256862d2aa4bee82bd43aa8906240db0a440d4e929c8be80f0bf1de838014bbb92e
SHA512d53841efd0b8b7bd89b4fc9dfe93e51b9c0469790942249eaf1ba851c52e36a874fb5788f527a8b404cf639e8447e6414dfe09a73856689935f90ccd66da3ed3
-
Filesize
390KB
MD57cda122d869d11f7c91fe6d606b02747
SHA1ecb87c79b46b997df7e44843a6e0e260aa78a4e7
SHA256d39fbd1875109df5f99ccd3498e534d596e5ea78f8b585ad57958187bf7afff1
SHA512373b7630e51aeca33a844b7aa8013ca5bf8ada992bba64f7e5e9321dad6b8dae0504be517a5c9fb019be90efd6aa11b0b9ec0527682ad54d9ea1097eb7060de7
-
Filesize
390KB
MD57cda122d869d11f7c91fe6d606b02747
SHA1ecb87c79b46b997df7e44843a6e0e260aa78a4e7
SHA256d39fbd1875109df5f99ccd3498e534d596e5ea78f8b585ad57958187bf7afff1
SHA512373b7630e51aeca33a844b7aa8013ca5bf8ada992bba64f7e5e9321dad6b8dae0504be517a5c9fb019be90efd6aa11b0b9ec0527682ad54d9ea1097eb7060de7
-
Filesize
473KB
MD59a2e8b3986286a2f77e7d9d40f0d6951
SHA1896f348bd33d486ce270e297b88d5e4de480aff1
SHA256a8c4bb37fe1948144330f6245ddb4a0fc37ce85eca660be6dbd15faa7509c260
SHA512f43d26afa879292d0efbd0206e480347251b8361c7e0a4a453dad09166d9098dc23694a03c11f16d8b310ad5b6327382ab2e7cda2bcca1d5fe403ea1037fe261
-
Filesize
473KB
MD59a2e8b3986286a2f77e7d9d40f0d6951
SHA1896f348bd33d486ce270e297b88d5e4de480aff1
SHA256a8c4bb37fe1948144330f6245ddb4a0fc37ce85eca660be6dbd15faa7509c260
SHA512f43d26afa879292d0efbd0206e480347251b8361c7e0a4a453dad09166d9098dc23694a03c11f16d8b310ad5b6327382ab2e7cda2bcca1d5fe403ea1037fe261