Analysis
-
max time kernel
145s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 21:00
Static task
static1
Behavioral task
behavioral1
Sample
24465df7bf72f7bfcb9196921289a9847a9d043b6169b03b229fea61b58b4949.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
24465df7bf72f7bfcb9196921289a9847a9d043b6169b03b229fea61b58b4949.exe
Resource
win10v2004-20230220-en
General
-
Target
24465df7bf72f7bfcb9196921289a9847a9d043b6169b03b229fea61b58b4949.exe
-
Size
563KB
-
MD5
ee7b0804a110765bd6bc40ca5f7ed6c2
-
SHA1
957498c53385602e077e3b6d640f3c3ec2929ae3
-
SHA256
24465df7bf72f7bfcb9196921289a9847a9d043b6169b03b229fea61b58b4949
-
SHA512
36ebe2ced42db5be80879c2fadd6087533b60c316533fba794d2eeb92dc4c4f13fb5390c55efd794633a2825d32c2422990a53cc80252b419ce8bf5decea4bbc
-
SSDEEP
12288:my90ihQhQcn2Kce3bGCxbb7iSTdIvbmZtecA4xYGFTPDQm5XdZ:myJQWcke7hG3vYoGqGB0mhdZ
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4512-953-0x0000000009DD0000-0x000000000A3E8000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 46959834.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 46959834.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 46959834.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 46959834.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 46959834.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 46959834.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2380 st777454.exe 1892 46959834.exe 4512 kp513128.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 46959834.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 24465df7bf72f7bfcb9196921289a9847a9d043b6169b03b229fea61b58b4949.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 24465df7bf72f7bfcb9196921289a9847a9d043b6169b03b229fea61b58b4949.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st777454.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st777454.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1892 46959834.exe 1892 46959834.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1892 46959834.exe Token: SeDebugPrivilege 4512 kp513128.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4764 wrote to memory of 2380 4764 24465df7bf72f7bfcb9196921289a9847a9d043b6169b03b229fea61b58b4949.exe 48 PID 4764 wrote to memory of 2380 4764 24465df7bf72f7bfcb9196921289a9847a9d043b6169b03b229fea61b58b4949.exe 48 PID 4764 wrote to memory of 2380 4764 24465df7bf72f7bfcb9196921289a9847a9d043b6169b03b229fea61b58b4949.exe 48 PID 2380 wrote to memory of 1892 2380 st777454.exe 51 PID 2380 wrote to memory of 1892 2380 st777454.exe 51 PID 2380 wrote to memory of 4512 2380 st777454.exe 89 PID 2380 wrote to memory of 4512 2380 st777454.exe 89 PID 2380 wrote to memory of 4512 2380 st777454.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\24465df7bf72f7bfcb9196921289a9847a9d043b6169b03b229fea61b58b4949.exe"C:\Users\Admin\AppData\Local\Temp\24465df7bf72f7bfcb9196921289a9847a9d043b6169b03b229fea61b58b4949.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st777454.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st777454.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\46959834.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\46959834.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1892
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp513128.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp513128.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4512
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
409KB
MD52c1cfd61d9473836e3c82e9cc605a33d
SHA109aacd52650695c664f67b78435f846164fb15f4
SHA2568d52c0a02610beed6b275a752d126f34776c8fefeb050f6d94557bbd51e80f36
SHA512caf80d80b6620acd853ad3b6855e7b4d3988a94650523ccc031cfdfabfa708c5b11500160d7c09e08a3af4131f34242882ea9a17aa149d8245c27ce247d1010f
-
Filesize
409KB
MD52c1cfd61d9473836e3c82e9cc605a33d
SHA109aacd52650695c664f67b78435f846164fb15f4
SHA2568d52c0a02610beed6b275a752d126f34776c8fefeb050f6d94557bbd51e80f36
SHA512caf80d80b6620acd853ad3b6855e7b4d3988a94650523ccc031cfdfabfa708c5b11500160d7c09e08a3af4131f34242882ea9a17aa149d8245c27ce247d1010f
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
353KB
MD51559cf7a8a2959c21cdb502527851dc0
SHA1b25878d0e8ee8485d07aafc43dd44f49e4897594
SHA2560527b8f08a8bf4a43a818dccc0587265c04de3989fa463cf075b626c73952151
SHA51231f7dd7d98e3399eedd5b6cad08a7c00c2f84742e4a397b56b88c139610d709a27450867d3220ee8788f51be06ffa1c1def66ccd4802a0b25aa33bb5d9b3cf2f
-
Filesize
353KB
MD51559cf7a8a2959c21cdb502527851dc0
SHA1b25878d0e8ee8485d07aafc43dd44f49e4897594
SHA2560527b8f08a8bf4a43a818dccc0587265c04de3989fa463cf075b626c73952151
SHA51231f7dd7d98e3399eedd5b6cad08a7c00c2f84742e4a397b56b88c139610d709a27450867d3220ee8788f51be06ffa1c1def66ccd4802a0b25aa33bb5d9b3cf2f