Analysis
-
max time kernel
167s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 20:57
Static task
static1
Behavioral task
behavioral1
Sample
2224d6cbc1233e0be24153d7b212d81ebdf3eee819a9ea8e09d602e09a260d5f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2224d6cbc1233e0be24153d7b212d81ebdf3eee819a9ea8e09d602e09a260d5f.exe
Resource
win10v2004-20230220-en
General
-
Target
2224d6cbc1233e0be24153d7b212d81ebdf3eee819a9ea8e09d602e09a260d5f.exe
-
Size
480KB
-
MD5
519301c745b78a9b27c3620839c4dc25
-
SHA1
54d1688440863627f00cf2b8d620068af8ff6bb5
-
SHA256
2224d6cbc1233e0be24153d7b212d81ebdf3eee819a9ea8e09d602e09a260d5f
-
SHA512
1154cda79c5301e45ece1f0d05ae7ff4f0e59635dd9583e109e1e44f3217d7c7c82aa07c069d5b9d69a34e752a87e49c203d85fd33d534931aabbffb9bc514a6
-
SSDEEP
12288:eMruy90k4sAbC+WwRzoNPrXYDSOqTd1e7BryIx:EyzECSRmDXYDIqd
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/2904-187-0x00000000073D0000-0x00000000079E8000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" k2248148.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" k2248148.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" k2248148.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" k2248148.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" k2248148.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection k2248148.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1964 y0607496.exe 3240 k2248148.exe 2904 l6672654.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features k2248148.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" k2248148.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2224d6cbc1233e0be24153d7b212d81ebdf3eee819a9ea8e09d602e09a260d5f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2224d6cbc1233e0be24153d7b212d81ebdf3eee819a9ea8e09d602e09a260d5f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce y0607496.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" y0607496.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3240 k2248148.exe 3240 k2248148.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3240 k2248148.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1160 wrote to memory of 1964 1160 2224d6cbc1233e0be24153d7b212d81ebdf3eee819a9ea8e09d602e09a260d5f.exe 82 PID 1160 wrote to memory of 1964 1160 2224d6cbc1233e0be24153d7b212d81ebdf3eee819a9ea8e09d602e09a260d5f.exe 82 PID 1160 wrote to memory of 1964 1160 2224d6cbc1233e0be24153d7b212d81ebdf3eee819a9ea8e09d602e09a260d5f.exe 82 PID 1964 wrote to memory of 3240 1964 y0607496.exe 84 PID 1964 wrote to memory of 3240 1964 y0607496.exe 84 PID 1964 wrote to memory of 3240 1964 y0607496.exe 84 PID 1964 wrote to memory of 2904 1964 y0607496.exe 91 PID 1964 wrote to memory of 2904 1964 y0607496.exe 91 PID 1964 wrote to memory of 2904 1964 y0607496.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\2224d6cbc1233e0be24153d7b212d81ebdf3eee819a9ea8e09d602e09a260d5f.exe"C:\Users\Admin\AppData\Local\Temp\2224d6cbc1233e0be24153d7b212d81ebdf3eee819a9ea8e09d602e09a260d5f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0607496.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y0607496.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2248148.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\k2248148.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3240
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6672654.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\l6672654.exe3⤵
- Executes dropped EXE
PID:2904
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD5f1b1006f1e04a34e7e510ad6b6441c21
SHA1c2f6118bfc5e7c823459bcdc31c82e7d14a70705
SHA256bb1be270c22eba30602226986794ab110169566be7b269a43532e83a1a02f9e3
SHA51259cd45474957ab9a27a5b3e250b839fb42f51f74758a721980448d026428efc7a4c63a3d0cb4e4b42871576a3769efdc2e8bb7432e9e46d2e552f1f7a0487622
-
Filesize
308KB
MD5f1b1006f1e04a34e7e510ad6b6441c21
SHA1c2f6118bfc5e7c823459bcdc31c82e7d14a70705
SHA256bb1be270c22eba30602226986794ab110169566be7b269a43532e83a1a02f9e3
SHA51259cd45474957ab9a27a5b3e250b839fb42f51f74758a721980448d026428efc7a4c63a3d0cb4e4b42871576a3769efdc2e8bb7432e9e46d2e552f1f7a0487622
-
Filesize
175KB
MD51dbc3d6a2ef324246e320b33123836a7
SHA1287c814ce172fc1a68eb32e180d6ff0c89f0177d
SHA2568679d35e35d01f95411418601f142fda63495b8cbe166ddccaa93d8d35720982
SHA5123a2a446df0196fbd1a26fe95aba6e5a6c02c214656ec808bf5f458fe30f7e30d0c81c25dae0a242d9c688ce5f07aa0c584d7e56af8b366fef9671b6eeee7dcbf
-
Filesize
175KB
MD51dbc3d6a2ef324246e320b33123836a7
SHA1287c814ce172fc1a68eb32e180d6ff0c89f0177d
SHA2568679d35e35d01f95411418601f142fda63495b8cbe166ddccaa93d8d35720982
SHA5123a2a446df0196fbd1a26fe95aba6e5a6c02c214656ec808bf5f458fe30f7e30d0c81c25dae0a242d9c688ce5f07aa0c584d7e56af8b366fef9671b6eeee7dcbf
-
Filesize
136KB
MD54d3d7ecfecb99f35ea7f03bfeae9f012
SHA12a72d5acc5c959f39e51a853b1e7963783029050
SHA256d1b390062d5418aa0afcd8fe161a66e3cca12d8417f52e02b7b6ee4ef819b1de
SHA512fdbb96196e72f004f76983a00ec37a4d76902a7d30bcc7b2f8b60791c82d674506e0ded63da1ee09295b68a1fb29947e38a876bfc4d1554a8b4acbd7f4c8f148
-
Filesize
136KB
MD54d3d7ecfecb99f35ea7f03bfeae9f012
SHA12a72d5acc5c959f39e51a853b1e7963783029050
SHA256d1b390062d5418aa0afcd8fe161a66e3cca12d8417f52e02b7b6ee4ef819b1de
SHA512fdbb96196e72f004f76983a00ec37a4d76902a7d30bcc7b2f8b60791c82d674506e0ded63da1ee09295b68a1fb29947e38a876bfc4d1554a8b4acbd7f4c8f148