Analysis
-
max time kernel
153s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 20:25
Static task
static1
Behavioral task
behavioral1
Sample
0b83073508a39544984653c8717b40850ffb532ed8ec59168a0c96cc5edcdd20.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0b83073508a39544984653c8717b40850ffb532ed8ec59168a0c96cc5edcdd20.exe
Resource
win10v2004-20230220-en
General
-
Target
0b83073508a39544984653c8717b40850ffb532ed8ec59168a0c96cc5edcdd20.exe
-
Size
491KB
-
MD5
597b4b838319f027f20f025559f30e5d
-
SHA1
a3078083ef1910a13e16de1bed9c871834c948dc
-
SHA256
0b83073508a39544984653c8717b40850ffb532ed8ec59168a0c96cc5edcdd20
-
SHA512
c95bc7599c4c222a55c4d93f6df9fc375836bdbe27c294729e2898e577032a0340dc90c83af87a74d5720709f5ca0c241cfe3e37812145ff5eb1b195090cfbe4
-
SSDEEP
12288:tMruy90eGuEz/wm1tv1qbVz0/fRDgTEL7:3ydLEHtwJzD+
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1736-187-0x00000000076F0000-0x0000000007D08000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o0994209.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o0994209.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o0994209.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o0994209.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o0994209.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o0994209.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 5092 z8705940.exe 632 o0994209.exe 1736 r6639824.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o0994209.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o0994209.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0b83073508a39544984653c8717b40850ffb532ed8ec59168a0c96cc5edcdd20.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0b83073508a39544984653c8717b40850ffb532ed8ec59168a0c96cc5edcdd20.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z8705940.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z8705940.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 632 o0994209.exe 632 o0994209.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 632 o0994209.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1792 wrote to memory of 5092 1792 0b83073508a39544984653c8717b40850ffb532ed8ec59168a0c96cc5edcdd20.exe 83 PID 1792 wrote to memory of 5092 1792 0b83073508a39544984653c8717b40850ffb532ed8ec59168a0c96cc5edcdd20.exe 83 PID 1792 wrote to memory of 5092 1792 0b83073508a39544984653c8717b40850ffb532ed8ec59168a0c96cc5edcdd20.exe 83 PID 5092 wrote to memory of 632 5092 z8705940.exe 84 PID 5092 wrote to memory of 632 5092 z8705940.exe 84 PID 5092 wrote to memory of 632 5092 z8705940.exe 84 PID 5092 wrote to memory of 1736 5092 z8705940.exe 91 PID 5092 wrote to memory of 1736 5092 z8705940.exe 91 PID 5092 wrote to memory of 1736 5092 z8705940.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b83073508a39544984653c8717b40850ffb532ed8ec59168a0c96cc5edcdd20.exe"C:\Users\Admin\AppData\Local\Temp\0b83073508a39544984653c8717b40850ffb532ed8ec59168a0c96cc5edcdd20.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8705940.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8705940.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o0994209.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o0994209.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:632
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6639824.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6639824.exe3⤵
- Executes dropped EXE
PID:1736
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD57d2d138358c84fb5587578e21074e416
SHA1ce1abe8c72b49bc2ec28687f4a44e570b1974087
SHA2569d0c772b915eda42df185843a6d6c2751c4a39324b7f875ba57ea5b84fe77027
SHA512ddac13963f15e76ae4a200b15c5051591c81122e3cd7b97e1dd26e55855e881eecdeb1c4eecf7c249d4500d16cc379e3a3e4f006ba1b7c023eb3bcd1c327050e
-
Filesize
308KB
MD57d2d138358c84fb5587578e21074e416
SHA1ce1abe8c72b49bc2ec28687f4a44e570b1974087
SHA2569d0c772b915eda42df185843a6d6c2751c4a39324b7f875ba57ea5b84fe77027
SHA512ddac13963f15e76ae4a200b15c5051591c81122e3cd7b97e1dd26e55855e881eecdeb1c4eecf7c249d4500d16cc379e3a3e4f006ba1b7c023eb3bcd1c327050e
-
Filesize
175KB
MD5db829c8dd899785f96718cbb0a48cc1b
SHA13f1874a3a4d630284677556745ba915b6b3a155a
SHA256ceb1e61c144d1494eaff1a298bd5c079ca6b3133bc17e6915b28ba08a7b58722
SHA512f35b39f9e0f8ad85982ef6ed43556cfaceeeecd77eb030a5c678eafa4d1ba655789f3b91e5c5fac901473957fd3e481c407c5fde339bc3f0d4b29fcde985bde7
-
Filesize
175KB
MD5db829c8dd899785f96718cbb0a48cc1b
SHA13f1874a3a4d630284677556745ba915b6b3a155a
SHA256ceb1e61c144d1494eaff1a298bd5c079ca6b3133bc17e6915b28ba08a7b58722
SHA512f35b39f9e0f8ad85982ef6ed43556cfaceeeecd77eb030a5c678eafa4d1ba655789f3b91e5c5fac901473957fd3e481c407c5fde339bc3f0d4b29fcde985bde7
-
Filesize
136KB
MD516ec4c51933e98f547b6e2de67b28ea1
SHA198db49013388b4eba2341a917d3c97070ed4c72a
SHA256b513886896aa7a82b4de8d5f15e80c5b3b543a121d951f617c4fb5d7eb9c3478
SHA5125a138cdd167a8b7f2923c777e434bf5a44f9c35aba136d8f1e345d4d88edc3b6cdfb9ac4bc772d8165f02f953d90295a965f3902e7d8738612f88e1d025cd3f4
-
Filesize
136KB
MD516ec4c51933e98f547b6e2de67b28ea1
SHA198db49013388b4eba2341a917d3c97070ed4c72a
SHA256b513886896aa7a82b4de8d5f15e80c5b3b543a121d951f617c4fb5d7eb9c3478
SHA5125a138cdd167a8b7f2923c777e434bf5a44f9c35aba136d8f1e345d4d88edc3b6cdfb9ac4bc772d8165f02f953d90295a965f3902e7d8738612f88e1d025cd3f4