Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 20:37
Static task
static1
Behavioral task
behavioral1
Sample
149ccd08547ea7712248e6bb43abf9adae70369ab7d74715ff1ee53a8684319c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
149ccd08547ea7712248e6bb43abf9adae70369ab7d74715ff1ee53a8684319c.exe
Resource
win10v2004-20230220-en
General
-
Target
149ccd08547ea7712248e6bb43abf9adae70369ab7d74715ff1ee53a8684319c.exe
-
Size
480KB
-
MD5
fccb196b90077409fa826ef20cbacda1
-
SHA1
efc861335a9442544f6b8b411a4c94d8f00ffb28
-
SHA256
149ccd08547ea7712248e6bb43abf9adae70369ab7d74715ff1ee53a8684319c
-
SHA512
9c79c1b97b9aefad38df6af9c0851042426c6be9a5b70c5bd89a8a5f88136c93a435b2383ce725e2869920690362b439beee46bc190b00077e655653422daa3e
-
SSDEEP
12288:bMrRy90tjRxu8Wx7wgkkbJzMgBuvT1IfQBzUhM4u2hhX:6y2Dnk1zVuZIfQRUCQhX
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/2372-186-0x0000000007650000-0x0000000007C68000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a4766856.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a4766856.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a4766856.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a4766856.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a4766856.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a4766856.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1976 v7777525.exe 940 a4766856.exe 2372 b0887288.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a4766856.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a4766856.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 149ccd08547ea7712248e6bb43abf9adae70369ab7d74715ff1ee53a8684319c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 149ccd08547ea7712248e6bb43abf9adae70369ab7d74715ff1ee53a8684319c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7777525.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7777525.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 940 a4766856.exe 940 a4766856.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 940 a4766856.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1264 wrote to memory of 1976 1264 149ccd08547ea7712248e6bb43abf9adae70369ab7d74715ff1ee53a8684319c.exe 84 PID 1264 wrote to memory of 1976 1264 149ccd08547ea7712248e6bb43abf9adae70369ab7d74715ff1ee53a8684319c.exe 84 PID 1264 wrote to memory of 1976 1264 149ccd08547ea7712248e6bb43abf9adae70369ab7d74715ff1ee53a8684319c.exe 84 PID 1976 wrote to memory of 940 1976 v7777525.exe 85 PID 1976 wrote to memory of 940 1976 v7777525.exe 85 PID 1976 wrote to memory of 940 1976 v7777525.exe 85 PID 1976 wrote to memory of 2372 1976 v7777525.exe 86 PID 1976 wrote to memory of 2372 1976 v7777525.exe 86 PID 1976 wrote to memory of 2372 1976 v7777525.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\149ccd08547ea7712248e6bb43abf9adae70369ab7d74715ff1ee53a8684319c.exe"C:\Users\Admin\AppData\Local\Temp\149ccd08547ea7712248e6bb43abf9adae70369ab7d74715ff1ee53a8684319c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7777525.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7777525.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4766856.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a4766856.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:940
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0887288.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b0887288.exe3⤵
- Executes dropped EXE
PID:2372
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD5e1a10c3333bbaf3b22b0d6cfc964b70c
SHA173a842e9cfcb81fb1d1566c2aa8add812bc5245d
SHA256c5b1ca8a87a208bfa31e1ae98baa0916ea3f580f209793104c7699c835c1df77
SHA512ed5aff460c065001746b61957aa35797e749508ba94bfe2b06a1b79d3bc76d7f746f8e9a685cc43e1bbc04c502a09bc15c5c7d4723225221ce4310b046af2c77
-
Filesize
308KB
MD5e1a10c3333bbaf3b22b0d6cfc964b70c
SHA173a842e9cfcb81fb1d1566c2aa8add812bc5245d
SHA256c5b1ca8a87a208bfa31e1ae98baa0916ea3f580f209793104c7699c835c1df77
SHA512ed5aff460c065001746b61957aa35797e749508ba94bfe2b06a1b79d3bc76d7f746f8e9a685cc43e1bbc04c502a09bc15c5c7d4723225221ce4310b046af2c77
-
Filesize
175KB
MD5bcc6bc6b94ec491efee242acb61dabe5
SHA13a3b6946d7004d52562d219799f4120ed043cea0
SHA2560cfebf7c842d9a42ec7a53e66b23ad9077cd4a17eac07d4e78889bfece5c81fc
SHA512d2b489094968cc1f81937a8ce4b0c406b3537897a3f72d544e775ba6ad0ab62c662a56714a9369ca663e8408a05bad3cc54a02d8a68fc3e153ee24f3b5741b4b
-
Filesize
175KB
MD5bcc6bc6b94ec491efee242acb61dabe5
SHA13a3b6946d7004d52562d219799f4120ed043cea0
SHA2560cfebf7c842d9a42ec7a53e66b23ad9077cd4a17eac07d4e78889bfece5c81fc
SHA512d2b489094968cc1f81937a8ce4b0c406b3537897a3f72d544e775ba6ad0ab62c662a56714a9369ca663e8408a05bad3cc54a02d8a68fc3e153ee24f3b5741b4b
-
Filesize
136KB
MD50385b3ad30119d3a75b047a99ba6f7f8
SHA1e8294992ac6b880c4a523b92bafe23d0a6e8836d
SHA25616ed4ea994a26cbbeb98ce1c55511ea62db625dfa56c16725398750dce9c4025
SHA5123764a3262dde5b4c4b328d2d0f3e1c08da3a7c5c411df6b5b8d97cd2b276632fb0a4e908dd1d37d81d163fc17cf1e1d4d19f01ff795f165ebab98bd382d4c971
-
Filesize
136KB
MD50385b3ad30119d3a75b047a99ba6f7f8
SHA1e8294992ac6b880c4a523b92bafe23d0a6e8836d
SHA25616ed4ea994a26cbbeb98ce1c55511ea62db625dfa56c16725398750dce9c4025
SHA5123764a3262dde5b4c4b328d2d0f3e1c08da3a7c5c411df6b5b8d97cd2b276632fb0a4e908dd1d37d81d163fc17cf1e1d4d19f01ff795f165ebab98bd382d4c971