Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 20:26
Static task
static1
Behavioral task
behavioral1
Sample
0c83d34866f2e054f9a3ea83a151c7690912c7f4c23456b19f823731e792e644.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0c83d34866f2e054f9a3ea83a151c7690912c7f4c23456b19f823731e792e644.exe
Resource
win10v2004-20230220-en
General
-
Target
0c83d34866f2e054f9a3ea83a151c7690912c7f4c23456b19f823731e792e644.exe
-
Size
479KB
-
MD5
140b9e67950841c067eb2a8f8fe02202
-
SHA1
cf178a7343d98a11fc295259e0425f94abe34623
-
SHA256
0c83d34866f2e054f9a3ea83a151c7690912c7f4c23456b19f823731e792e644
-
SHA512
264c8591aec72531d268463ccf353c9402cf019f32c8cdbdc39645be93f5ac948bfe9cde2f5ff08762479e69a0f707c85cb8571d02dd7a8e42659e931005525f
-
SSDEEP
12288:nMr1y90pQ0iBaYdVuUi0jSz7krY3lfG793LkoNn:iy+xwVuDz3krYfo1Nn
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/728-184-0x00000000075E0000-0x0000000007BF8000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a7246049.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a7246049.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a7246049.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a7246049.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a7246049.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a7246049.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 3396 v2632185.exe 2204 a7246049.exe 728 b8064723.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a7246049.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a7246049.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0c83d34866f2e054f9a3ea83a151c7690912c7f4c23456b19f823731e792e644.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0c83d34866f2e054f9a3ea83a151c7690912c7f4c23456b19f823731e792e644.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v2632185.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v2632185.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2204 a7246049.exe 2204 a7246049.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2204 a7246049.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1320 wrote to memory of 3396 1320 0c83d34866f2e054f9a3ea83a151c7690912c7f4c23456b19f823731e792e644.exe 85 PID 1320 wrote to memory of 3396 1320 0c83d34866f2e054f9a3ea83a151c7690912c7f4c23456b19f823731e792e644.exe 85 PID 1320 wrote to memory of 3396 1320 0c83d34866f2e054f9a3ea83a151c7690912c7f4c23456b19f823731e792e644.exe 85 PID 3396 wrote to memory of 2204 3396 v2632185.exe 86 PID 3396 wrote to memory of 2204 3396 v2632185.exe 86 PID 3396 wrote to memory of 2204 3396 v2632185.exe 86 PID 3396 wrote to memory of 728 3396 v2632185.exe 88 PID 3396 wrote to memory of 728 3396 v2632185.exe 88 PID 3396 wrote to memory of 728 3396 v2632185.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c83d34866f2e054f9a3ea83a151c7690912c7f4c23456b19f823731e792e644.exe"C:\Users\Admin\AppData\Local\Temp\0c83d34866f2e054f9a3ea83a151c7690912c7f4c23456b19f823731e792e644.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2632185.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v2632185.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7246049.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a7246049.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2204
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b8064723.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b8064723.exe3⤵
- Executes dropped EXE
PID:728
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD54008520dcfd72d8702b37b1bb7b315e2
SHA1678e58514f491ffdbfc19f05b40b9e37f0ccdb37
SHA2564ce94f69982c5e74853264b37cb5fd8dd5be396b4d3d8cf83615328227a67abc
SHA512bf3134116bf2c36a64f07f25a390cd8c2230b40620df829c0b5d7fa5b4ea56e9ee2f2234843dcd6f9bd4f1d6d5899b03ea919061db4094727de3f1a8cddeae72
-
Filesize
307KB
MD54008520dcfd72d8702b37b1bb7b315e2
SHA1678e58514f491ffdbfc19f05b40b9e37f0ccdb37
SHA2564ce94f69982c5e74853264b37cb5fd8dd5be396b4d3d8cf83615328227a67abc
SHA512bf3134116bf2c36a64f07f25a390cd8c2230b40620df829c0b5d7fa5b4ea56e9ee2f2234843dcd6f9bd4f1d6d5899b03ea919061db4094727de3f1a8cddeae72
-
Filesize
175KB
MD59ea43a43f05412e93846db9dfce88ece
SHA1c38ed27bedb056a3bff94c72d781c9ff73e5d0e2
SHA2561bf268f59657e57973763ae7ef37b5ce310b808200782de92bf10933cb081f29
SHA5124f821e5ee7bc92dbc7f9fd74dfcdab09905baaff561702cac134d091711beab78a2b741f865cdae157e546963a102b65b6528f2e4b62e7e5c95b9a2070fd329f
-
Filesize
175KB
MD59ea43a43f05412e93846db9dfce88ece
SHA1c38ed27bedb056a3bff94c72d781c9ff73e5d0e2
SHA2561bf268f59657e57973763ae7ef37b5ce310b808200782de92bf10933cb081f29
SHA5124f821e5ee7bc92dbc7f9fd74dfcdab09905baaff561702cac134d091711beab78a2b741f865cdae157e546963a102b65b6528f2e4b62e7e5c95b9a2070fd329f
-
Filesize
136KB
MD5b1bb33212306a82fed180c6e3ee9d6a3
SHA17ad6e0c0a37014754fab46ed8f82f43824913d3c
SHA256d98b098c5bdcf8011bd44182d92249e6787fadc598216f96a8a0ad9cf84c81a9
SHA512f1786fff7fe68948bed9f1735511517c935051cba5372b79694a12476dfa711de3a10b15ed1cc2eaf2a2b0bb2d76b407a9eeaf692e8e47ce95aaea4a574317e2
-
Filesize
136KB
MD5b1bb33212306a82fed180c6e3ee9d6a3
SHA17ad6e0c0a37014754fab46ed8f82f43824913d3c
SHA256d98b098c5bdcf8011bd44182d92249e6787fadc598216f96a8a0ad9cf84c81a9
SHA512f1786fff7fe68948bed9f1735511517c935051cba5372b79694a12476dfa711de3a10b15ed1cc2eaf2a2b0bb2d76b407a9eeaf692e8e47ce95aaea4a574317e2