Analysis
-
max time kernel
158s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 20:22
Static task
static1
Behavioral task
behavioral1
Sample
08f52ef6d31d21399983ed9f3d4b61a0b31678a18d5072489e29720270e242d0.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
08f52ef6d31d21399983ed9f3d4b61a0b31678a18d5072489e29720270e242d0.exe
Resource
win10v2004-20230220-en
General
-
Target
08f52ef6d31d21399983ed9f3d4b61a0b31678a18d5072489e29720270e242d0.exe
-
Size
1000KB
-
MD5
cd6e7fcf01ebb32e41313ff32b488628
-
SHA1
ac5b3bf16b94b54e8668e7262be11915dc94e5cd
-
SHA256
08f52ef6d31d21399983ed9f3d4b61a0b31678a18d5072489e29720270e242d0
-
SHA512
89eed4fb07f8320e6399e1727ab46070500efd43370c3b4288cce68b3e4dadf3641983a2e0c4e32e3117651dd1d71254d3e9f25a9aa6371ff58b27815b196b76
-
SSDEEP
24576:Oy6VN3VgyY7YqSl5aPEOpOKcTpAlqi1Xf:deleBYy7OPVAlz
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/2564-996-0x0000000007900000-0x0000000007F18000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 165835548.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 165835548.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 165835548.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 165835548.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 165835548.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 165835548.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 2936 HH254542.exe 1660 Op020596.exe 3328 165835548.exe 2564 299074086.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 165835548.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 165835548.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 08f52ef6d31d21399983ed9f3d4b61a0b31678a18d5072489e29720270e242d0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 08f52ef6d31d21399983ed9f3d4b61a0b31678a18d5072489e29720270e242d0.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce HH254542.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" HH254542.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce Op020596.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Op020596.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3328 165835548.exe 3328 165835548.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3328 165835548.exe Token: SeDebugPrivilege 2564 299074086.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1316 wrote to memory of 2936 1316 08f52ef6d31d21399983ed9f3d4b61a0b31678a18d5072489e29720270e242d0.exe 83 PID 1316 wrote to memory of 2936 1316 08f52ef6d31d21399983ed9f3d4b61a0b31678a18d5072489e29720270e242d0.exe 83 PID 1316 wrote to memory of 2936 1316 08f52ef6d31d21399983ed9f3d4b61a0b31678a18d5072489e29720270e242d0.exe 83 PID 2936 wrote to memory of 1660 2936 HH254542.exe 84 PID 2936 wrote to memory of 1660 2936 HH254542.exe 84 PID 2936 wrote to memory of 1660 2936 HH254542.exe 84 PID 1660 wrote to memory of 3328 1660 Op020596.exe 85 PID 1660 wrote to memory of 3328 1660 Op020596.exe 85 PID 1660 wrote to memory of 3328 1660 Op020596.exe 85 PID 1660 wrote to memory of 2564 1660 Op020596.exe 90 PID 1660 wrote to memory of 2564 1660 Op020596.exe 90 PID 1660 wrote to memory of 2564 1660 Op020596.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\08f52ef6d31d21399983ed9f3d4b61a0b31678a18d5072489e29720270e242d0.exe"C:\Users\Admin\AppData\Local\Temp\08f52ef6d31d21399983ed9f3d4b61a0b31678a18d5072489e29720270e242d0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HH254542.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HH254542.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Op020596.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Op020596.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\165835548.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\165835548.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3328
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\299074086.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\299074086.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
769KB
MD59671b3c1105c4117e29b7468fc6431c1
SHA1dca156517d87db261bc53594e85f6d23a18b3b80
SHA2561782de8af8a4bd8fe42626090112e016fe146c1edf7291d1e3197d6251f2b9fc
SHA512b57ef8adf814755940bd86125b8e657c8a9caa6f535ed6d615b7b38c90976a526a4df96c9bb4a3933dc7634213437a7b79067c3fb237eb5cbb625cb4428ef0f2
-
Filesize
769KB
MD59671b3c1105c4117e29b7468fc6431c1
SHA1dca156517d87db261bc53594e85f6d23a18b3b80
SHA2561782de8af8a4bd8fe42626090112e016fe146c1edf7291d1e3197d6251f2b9fc
SHA512b57ef8adf814755940bd86125b8e657c8a9caa6f535ed6d615b7b38c90976a526a4df96c9bb4a3933dc7634213437a7b79067c3fb237eb5cbb625cb4428ef0f2
-
Filesize
598KB
MD5be667352ff2c244fff64ca6db7fa2a17
SHA1c608133003e68567c9ae7df88d2a53ea2ade7061
SHA256566d58079b349129311abf4e3d368f150c73ec76b9ac661870fc1e177ff3380a
SHA512e996923587bdfc0f804d25648f27e6f9c7cae43d6c88999beefabd4098c9787a3f1a543fbbe5249b1e0933c3b317f2dddd7701177fe01f388ec2b2b78aa2176a
-
Filesize
598KB
MD5be667352ff2c244fff64ca6db7fa2a17
SHA1c608133003e68567c9ae7df88d2a53ea2ade7061
SHA256566d58079b349129311abf4e3d368f150c73ec76b9ac661870fc1e177ff3380a
SHA512e996923587bdfc0f804d25648f27e6f9c7cae43d6c88999beefabd4098c9787a3f1a543fbbe5249b1e0933c3b317f2dddd7701177fe01f388ec2b2b78aa2176a
-
Filesize
390KB
MD59c820f25d450d5b02d8bd967c6859e62
SHA18e4bc3f9ee69393599bd725776606018d3c3d12a
SHA256ee19ee3ebc970b3c9490d66ae5447f138d13eee7afb8e3f1aed260e2a9da51f0
SHA512088b82f97bba894a4eec851af5530d977cbe05f8dc1bf2f7503f05120c5d1c0114785026b603668c58127c96ec92271d1764b9df3ab8adfd3b30df2d6850bac9
-
Filesize
390KB
MD59c820f25d450d5b02d8bd967c6859e62
SHA18e4bc3f9ee69393599bd725776606018d3c3d12a
SHA256ee19ee3ebc970b3c9490d66ae5447f138d13eee7afb8e3f1aed260e2a9da51f0
SHA512088b82f97bba894a4eec851af5530d977cbe05f8dc1bf2f7503f05120c5d1c0114785026b603668c58127c96ec92271d1764b9df3ab8adfd3b30df2d6850bac9
-
Filesize
473KB
MD53fee90cccbad5c44578b763ae975c7f1
SHA15b6d3e0c48ab23f6f9c790679bf571ed9b9b5378
SHA256f127f59cdb523878ba10470a5e6845ecdf124dfa7bd1b9b6d00ea82538ea10f6
SHA5121853f43caea58507d7ffede9f8678fb20649f0a9b1313f70dfbeebf62a6a26fb60e42baeadac884d147729ec6def5b8a85db52df11e35309c4734f513f676a8a
-
Filesize
473KB
MD53fee90cccbad5c44578b763ae975c7f1
SHA15b6d3e0c48ab23f6f9c790679bf571ed9b9b5378
SHA256f127f59cdb523878ba10470a5e6845ecdf124dfa7bd1b9b6d00ea82538ea10f6
SHA5121853f43caea58507d7ffede9f8678fb20649f0a9b1313f70dfbeebf62a6a26fb60e42baeadac884d147729ec6def5b8a85db52df11e35309c4734f513f676a8a