Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 20:44
Static task
static1
Behavioral task
behavioral1
Sample
1a01b86226a33ca6502a9ef2c6b467c11549055e1e6572b8d7616f6f7ed8ebe9.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1a01b86226a33ca6502a9ef2c6b467c11549055e1e6572b8d7616f6f7ed8ebe9.exe
Resource
win10v2004-20230220-en
General
-
Target
1a01b86226a33ca6502a9ef2c6b467c11549055e1e6572b8d7616f6f7ed8ebe9.exe
-
Size
479KB
-
MD5
0bf9633fe4699fab685c096a13b64469
-
SHA1
c747ab729af36f006b7a655ef177f0b0267569f7
-
SHA256
1a01b86226a33ca6502a9ef2c6b467c11549055e1e6572b8d7616f6f7ed8ebe9
-
SHA512
34bf6e103381301b24d210ad04a88e8618fd3c75a8e33f2e27ad11176d9213bc8d21b7c308bddd844f3044594a4db3a01a09f86a62fa469b99ed7d6d6abd36b3
-
SSDEEP
12288:IMrYy90bXlYVOMy2e6I0snSbtDKwDMwEG:Qynq907bZKwD5
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3052-184-0x0000000007560000-0x0000000007B78000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k9129989.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k9129989.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k9129989.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k9129989.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k9129989.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k9129989.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 3800 y1449400.exe 4340 k9129989.exe 3052 l5746999.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k9129989.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k9129989.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1a01b86226a33ca6502a9ef2c6b467c11549055e1e6572b8d7616f6f7ed8ebe9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1a01b86226a33ca6502a9ef2c6b467c11549055e1e6572b8d7616f6f7ed8ebe9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y1449400.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y1449400.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4340 k9129989.exe 4340 k9129989.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4340 k9129989.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1248 wrote to memory of 3800 1248 1a01b86226a33ca6502a9ef2c6b467c11549055e1e6572b8d7616f6f7ed8ebe9.exe 85 PID 1248 wrote to memory of 3800 1248 1a01b86226a33ca6502a9ef2c6b467c11549055e1e6572b8d7616f6f7ed8ebe9.exe 85 PID 1248 wrote to memory of 3800 1248 1a01b86226a33ca6502a9ef2c6b467c11549055e1e6572b8d7616f6f7ed8ebe9.exe 85 PID 3800 wrote to memory of 4340 3800 y1449400.exe 86 PID 3800 wrote to memory of 4340 3800 y1449400.exe 86 PID 3800 wrote to memory of 4340 3800 y1449400.exe 86 PID 3800 wrote to memory of 3052 3800 y1449400.exe 87 PID 3800 wrote to memory of 3052 3800 y1449400.exe 87 PID 3800 wrote to memory of 3052 3800 y1449400.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a01b86226a33ca6502a9ef2c6b467c11549055e1e6572b8d7616f6f7ed8ebe9.exe"C:\Users\Admin\AppData\Local\Temp\1a01b86226a33ca6502a9ef2c6b467c11549055e1e6572b8d7616f6f7ed8ebe9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1449400.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y1449400.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9129989.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k9129989.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4340
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l5746999.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l5746999.exe3⤵
- Executes dropped EXE
PID:3052
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD540992800b7e61dcfcd1f667b87015990
SHA1248e01f7783f661e768e00be6292e4602559787f
SHA256ae1647388a4eb08248a3af3a164a875915db27cc33edbf241a4e13539d8b3120
SHA51252f5e224aef912523c2a4cb020032ac79c771ce91b2165e694fb5cf7ddbe210363b2cb879d772b2dc870a7af5803fbea6491cffe5ba7c3d50175667368aaf57d
-
Filesize
307KB
MD540992800b7e61dcfcd1f667b87015990
SHA1248e01f7783f661e768e00be6292e4602559787f
SHA256ae1647388a4eb08248a3af3a164a875915db27cc33edbf241a4e13539d8b3120
SHA51252f5e224aef912523c2a4cb020032ac79c771ce91b2165e694fb5cf7ddbe210363b2cb879d772b2dc870a7af5803fbea6491cffe5ba7c3d50175667368aaf57d
-
Filesize
175KB
MD5f4e3132283fcd34ed6e7f21bf5e641b9
SHA180ea2447ee16e6c7326fb0f67388919c0e329c47
SHA25608e70c5a08fece90f52519e77d9421e91142a857d1544a9aad8eb4b989130486
SHA512b2490422edf470c78087f069b0375420725f4598ca47a56d6dc70b5b59612bce794c62a8dda9f4911583d7e69c3e3a947f8bc8cc46d659993f25c5307563f68d
-
Filesize
175KB
MD5f4e3132283fcd34ed6e7f21bf5e641b9
SHA180ea2447ee16e6c7326fb0f67388919c0e329c47
SHA25608e70c5a08fece90f52519e77d9421e91142a857d1544a9aad8eb4b989130486
SHA512b2490422edf470c78087f069b0375420725f4598ca47a56d6dc70b5b59612bce794c62a8dda9f4911583d7e69c3e3a947f8bc8cc46d659993f25c5307563f68d
-
Filesize
136KB
MD5585fd3da28d25dff65873210715afc82
SHA15f3f0c24ddafa8000d24d1dad504bf66f478e9b8
SHA256ae960adfd49163ec6518c780127144d33d08bb9edc209adcafdaf09acc568eea
SHA512118aae36c3bb0866ff139f0079f56acb80c391fa9e44ba25f74da3418ff8d3b4b5e4f1e40584c2c147e30b71d92759005f154ce6a8078effbcadee80d238c65c
-
Filesize
136KB
MD5585fd3da28d25dff65873210715afc82
SHA15f3f0c24ddafa8000d24d1dad504bf66f478e9b8
SHA256ae960adfd49163ec6518c780127144d33d08bb9edc209adcafdaf09acc568eea
SHA512118aae36c3bb0866ff139f0079f56acb80c391fa9e44ba25f74da3418ff8d3b4b5e4f1e40584c2c147e30b71d92759005f154ce6a8078effbcadee80d238c65c