Analysis
-
max time kernel
151s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 21:11
Static task
static1
Behavioral task
behavioral1
Sample
2f0184c1013972c162b90ea399d08c1908118e4a608e24100f48d721afb6d299.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2f0184c1013972c162b90ea399d08c1908118e4a608e24100f48d721afb6d299.exe
Resource
win10v2004-20230220-en
General
-
Target
2f0184c1013972c162b90ea399d08c1908118e4a608e24100f48d721afb6d299.exe
-
Size
491KB
-
MD5
3c07d743f301e377087fc16a83ea5eca
-
SHA1
84c157463b41d899b5d8c5915bba659f21085e8f
-
SHA256
2f0184c1013972c162b90ea399d08c1908118e4a608e24100f48d721afb6d299
-
SHA512
af55343775fd2c0a13d2cd5918a4b378f374bfbda462bb0884020ee77c88862dc9cb99cf2e2f86e3343230a876edf790cc56d8c967dea204ab01ce9332e39568
-
SSDEEP
12288:rMr0y90nDTzWcLBu/QFJtpj7G0OszWen/cl4J:fyI7Wc4/8vtGnsKe/cCJ
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/5088-187-0x0000000007420000-0x0000000007A38000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o2156166.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o2156166.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o2156166.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o2156166.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o2156166.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o2156166.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2036 z1498699.exe 2232 o2156166.exe 5088 r1647201.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o2156166.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o2156166.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z1498699.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z1498699.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2f0184c1013972c162b90ea399d08c1908118e4a608e24100f48d721afb6d299.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2f0184c1013972c162b90ea399d08c1908118e4a608e24100f48d721afb6d299.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2232 o2156166.exe 2232 o2156166.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2232 o2156166.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4104 wrote to memory of 2036 4104 2f0184c1013972c162b90ea399d08c1908118e4a608e24100f48d721afb6d299.exe 86 PID 4104 wrote to memory of 2036 4104 2f0184c1013972c162b90ea399d08c1908118e4a608e24100f48d721afb6d299.exe 86 PID 4104 wrote to memory of 2036 4104 2f0184c1013972c162b90ea399d08c1908118e4a608e24100f48d721afb6d299.exe 86 PID 2036 wrote to memory of 2232 2036 z1498699.exe 87 PID 2036 wrote to memory of 2232 2036 z1498699.exe 87 PID 2036 wrote to memory of 2232 2036 z1498699.exe 87 PID 2036 wrote to memory of 5088 2036 z1498699.exe 89 PID 2036 wrote to memory of 5088 2036 z1498699.exe 89 PID 2036 wrote to memory of 5088 2036 z1498699.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f0184c1013972c162b90ea399d08c1908118e4a608e24100f48d721afb6d299.exe"C:\Users\Admin\AppData\Local\Temp\2f0184c1013972c162b90ea399d08c1908118e4a608e24100f48d721afb6d299.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1498699.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1498699.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o2156166.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o2156166.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2232
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1647201.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1647201.exe3⤵
- Executes dropped EXE
PID:5088
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD5120cb6b63ec201c65eee6ae01bf2d334
SHA19d7e90edd100b0359a9ff738c3ba2c733aada844
SHA25651b9f6f5428de7c6e039306882f04124b3aaf296f7d363aae7190b6d8315a3bb
SHA5127a7cf5e43706016e478707dac236bf4ce84680ad1c4f1442fcd0268fa52cb540c4cca97623ede449c43b053c19b7a2d5be5da552f67d51c152d3c75c0247d4b4
-
Filesize
308KB
MD5120cb6b63ec201c65eee6ae01bf2d334
SHA19d7e90edd100b0359a9ff738c3ba2c733aada844
SHA25651b9f6f5428de7c6e039306882f04124b3aaf296f7d363aae7190b6d8315a3bb
SHA5127a7cf5e43706016e478707dac236bf4ce84680ad1c4f1442fcd0268fa52cb540c4cca97623ede449c43b053c19b7a2d5be5da552f67d51c152d3c75c0247d4b4
-
Filesize
175KB
MD582c821cff366ee1bee7461002ddb2197
SHA134c4c194c10cf1f154eaf623d9bb0ae49bd1b0b0
SHA2561b113e613e27e64b4ab614365041edfa0e74817c0956b8ba4ef68e5acfb1e90b
SHA51285cf469db62a33c1b465f236420ca7d53b969b776d4642138227e130b6521c4ce34dd5e3b71c9d36966138e9d11aa704495e78be2c8dc57600ec9161b9e23de4
-
Filesize
175KB
MD582c821cff366ee1bee7461002ddb2197
SHA134c4c194c10cf1f154eaf623d9bb0ae49bd1b0b0
SHA2561b113e613e27e64b4ab614365041edfa0e74817c0956b8ba4ef68e5acfb1e90b
SHA51285cf469db62a33c1b465f236420ca7d53b969b776d4642138227e130b6521c4ce34dd5e3b71c9d36966138e9d11aa704495e78be2c8dc57600ec9161b9e23de4
-
Filesize
136KB
MD5af1ea0c7b2734c4733e37525fb5cb8bc
SHA1165de7c6fe1d81c4fb3c93df87b3e62818138386
SHA25693e5fc64c47913925684084d1169663de896efa952816d9d736bee59bfffc4b4
SHA512abaaf76ef4834237d685e4a6b555a28b9d57770072f528ee5f2e2493eefdeeeb587b4d860287d427fe072bcae78de0ab3b9b71f436338c5cd72ebdd93a7a3086
-
Filesize
136KB
MD5af1ea0c7b2734c4733e37525fb5cb8bc
SHA1165de7c6fe1d81c4fb3c93df87b3e62818138386
SHA25693e5fc64c47913925684084d1169663de896efa952816d9d736bee59bfffc4b4
SHA512abaaf76ef4834237d685e4a6b555a28b9d57770072f528ee5f2e2493eefdeeeb587b4d860287d427fe072bcae78de0ab3b9b71f436338c5cd72ebdd93a7a3086