Analysis
-
max time kernel
162s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 21:10
Static task
static1
Behavioral task
behavioral1
Sample
2ec094aeca5937179eec1109d2812a04496c099ff93bc40dd2def1e42c23584d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2ec094aeca5937179eec1109d2812a04496c099ff93bc40dd2def1e42c23584d.exe
Resource
win10v2004-20230220-en
General
-
Target
2ec094aeca5937179eec1109d2812a04496c099ff93bc40dd2def1e42c23584d.exe
-
Size
479KB
-
MD5
dee8b6a9f99bdf28422241cb30b8357d
-
SHA1
754309ac37afcefe91caf5c89b6514bd79077b30
-
SHA256
2ec094aeca5937179eec1109d2812a04496c099ff93bc40dd2def1e42c23584d
-
SHA512
c7f7d9e5cfecf18a5cc880e38a40e7492ead02983be8b20fa3282d9524f71266c559c12c3c926f70140b779b94cc36dc116855be568a50c7922a2799747e5f27
-
SSDEEP
12288:5MrHy90w7fudhar668T5MkLYQbtQHQ8Ipmb:iyDbF5GXtQGpe
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/2500-187-0x0000000007880000-0x0000000007E98000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k7989297.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k7989297.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k7989297.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k7989297.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k7989297.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k7989297.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1084 y4222001.exe 2120 k7989297.exe 2500 l1976792.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k7989297.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k7989297.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2ec094aeca5937179eec1109d2812a04496c099ff93bc40dd2def1e42c23584d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2ec094aeca5937179eec1109d2812a04496c099ff93bc40dd2def1e42c23584d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y4222001.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y4222001.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2120 k7989297.exe 2120 k7989297.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2120 k7989297.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 684 wrote to memory of 1084 684 2ec094aeca5937179eec1109d2812a04496c099ff93bc40dd2def1e42c23584d.exe 81 PID 684 wrote to memory of 1084 684 2ec094aeca5937179eec1109d2812a04496c099ff93bc40dd2def1e42c23584d.exe 81 PID 684 wrote to memory of 1084 684 2ec094aeca5937179eec1109d2812a04496c099ff93bc40dd2def1e42c23584d.exe 81 PID 1084 wrote to memory of 2120 1084 y4222001.exe 82 PID 1084 wrote to memory of 2120 1084 y4222001.exe 82 PID 1084 wrote to memory of 2120 1084 y4222001.exe 82 PID 1084 wrote to memory of 2500 1084 y4222001.exe 84 PID 1084 wrote to memory of 2500 1084 y4222001.exe 84 PID 1084 wrote to memory of 2500 1084 y4222001.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ec094aeca5937179eec1109d2812a04496c099ff93bc40dd2def1e42c23584d.exe"C:\Users\Admin\AppData\Local\Temp\2ec094aeca5937179eec1109d2812a04496c099ff93bc40dd2def1e42c23584d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4222001.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4222001.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7989297.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k7989297.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2120
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1976792.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l1976792.exe3⤵
- Executes dropped EXE
PID:2500
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD525b0602e64cc84c548ba4c27b89462da
SHA1beb50d19284a5b31034585ea04616f4063868d7b
SHA2563a0a9b1632235b610d6bfdaf6938430c79110a54435bb8a5ec1ff46c44af2aec
SHA512fc8bf775441617a34672187b643b56dd1f6ecac5e620b124a4b68e3a051be304fbc459ecc63da46b9513f488b766b1453cf83d904d0b4eb15218a2b3f38aa37b
-
Filesize
307KB
MD525b0602e64cc84c548ba4c27b89462da
SHA1beb50d19284a5b31034585ea04616f4063868d7b
SHA2563a0a9b1632235b610d6bfdaf6938430c79110a54435bb8a5ec1ff46c44af2aec
SHA512fc8bf775441617a34672187b643b56dd1f6ecac5e620b124a4b68e3a051be304fbc459ecc63da46b9513f488b766b1453cf83d904d0b4eb15218a2b3f38aa37b
-
Filesize
175KB
MD5fda920f5cd1710449bb17f0e59949de0
SHA15f35959e05af960abaa26c684bf2444b17a5eb2c
SHA256ad69096d600237c6d92916b6872433a7273be7551cc7afff8b25eece300c8dff
SHA512a5db2e7db5336045b1c24d142c4fe0962d5495fc32083a17b75d7576766285bc0dc670d850d714c5634c095aa962887e64ec0e5a09c7936838aa04cd95a6b1d3
-
Filesize
175KB
MD5fda920f5cd1710449bb17f0e59949de0
SHA15f35959e05af960abaa26c684bf2444b17a5eb2c
SHA256ad69096d600237c6d92916b6872433a7273be7551cc7afff8b25eece300c8dff
SHA512a5db2e7db5336045b1c24d142c4fe0962d5495fc32083a17b75d7576766285bc0dc670d850d714c5634c095aa962887e64ec0e5a09c7936838aa04cd95a6b1d3
-
Filesize
136KB
MD52c8f22138c22578c91191d470b1a9b59
SHA1a895010432b20340c085ad7a760741b73e0aefa4
SHA256b0cf78b0c171fcc200face4d80fcaca53455892654b6e122b04f3c586a0d6f0b
SHA512478bb86c35af5ea5d190f569561a8eeadeec9d09ef93ce73a4cf198d7c48c21f06ae7962def4a47b1c16e728434596bd2292aaeebd22e552a2db4140b76e5aad
-
Filesize
136KB
MD52c8f22138c22578c91191d470b1a9b59
SHA1a895010432b20340c085ad7a760741b73e0aefa4
SHA256b0cf78b0c171fcc200face4d80fcaca53455892654b6e122b04f3c586a0d6f0b
SHA512478bb86c35af5ea5d190f569561a8eeadeec9d09ef93ce73a4cf198d7c48c21f06ae7962def4a47b1c16e728434596bd2292aaeebd22e552a2db4140b76e5aad