Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 21:03
Static task
static1
Behavioral task
behavioral1
Sample
27af3faa9b75e9348cb64f222e12763155ef194b7ba10de66a0445594e1eebf3.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
27af3faa9b75e9348cb64f222e12763155ef194b7ba10de66a0445594e1eebf3.exe
Resource
win10v2004-20230220-en
General
-
Target
27af3faa9b75e9348cb64f222e12763155ef194b7ba10de66a0445594e1eebf3.exe
-
Size
491KB
-
MD5
84a2c8c45478367a9461bd236b88e561
-
SHA1
4e752eaf0d3cd5b1a32571901f4d586802941767
-
SHA256
27af3faa9b75e9348cb64f222e12763155ef194b7ba10de66a0445594e1eebf3
-
SHA512
1da02b574e1afc8f3539ab3b5b13a262e3eb64adc4db7b0b2b4b1f2369cd78340a721a01ffccdf592cd39d11f0f7a71a616dd29fb4511540f8af955a2b8c0765
-
SSDEEP
12288:rMrqy90kcjOLe2jfDhzU+IrOQXJ3agqPn6z0L:dyvceewbhg+fQAf6z0L
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/2600-185-0x0000000007F30000-0x0000000008548000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" o4327791.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" o4327791.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" o4327791.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection o4327791.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" o4327791.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" o4327791.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 536 z0114916.exe 652 o4327791.exe 2600 r6053242.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features o4327791.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" o4327791.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 27af3faa9b75e9348cb64f222e12763155ef194b7ba10de66a0445594e1eebf3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 27af3faa9b75e9348cb64f222e12763155ef194b7ba10de66a0445594e1eebf3.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z0114916.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z0114916.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 652 o4327791.exe 652 o4327791.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 652 o4327791.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4912 wrote to memory of 536 4912 27af3faa9b75e9348cb64f222e12763155ef194b7ba10de66a0445594e1eebf3.exe 85 PID 4912 wrote to memory of 536 4912 27af3faa9b75e9348cb64f222e12763155ef194b7ba10de66a0445594e1eebf3.exe 85 PID 4912 wrote to memory of 536 4912 27af3faa9b75e9348cb64f222e12763155ef194b7ba10de66a0445594e1eebf3.exe 85 PID 536 wrote to memory of 652 536 z0114916.exe 86 PID 536 wrote to memory of 652 536 z0114916.exe 86 PID 536 wrote to memory of 652 536 z0114916.exe 86 PID 536 wrote to memory of 2600 536 z0114916.exe 91 PID 536 wrote to memory of 2600 536 z0114916.exe 91 PID 536 wrote to memory of 2600 536 z0114916.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\27af3faa9b75e9348cb64f222e12763155ef194b7ba10de66a0445594e1eebf3.exe"C:\Users\Admin\AppData\Local\Temp\27af3faa9b75e9348cb64f222e12763155ef194b7ba10de66a0445594e1eebf3.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0114916.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z0114916.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o4327791.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o4327791.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:652
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6053242.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6053242.exe3⤵
- Executes dropped EXE
PID:2600
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
308KB
MD5cbb2d096c787f9d0512e8948843db742
SHA10d7e910f5d8ed6f6fe185227f34c985afa42bb84
SHA256d4b7eecdfbb27049cf6b8dc882d0f1c5c804a5ebe413f1f3825fce45f36a5401
SHA5125e8f0dc0096bc97bd2317e5d6075cc49c63dfde7b0f89106f2abb202e63703b3043985af2f025fe6edf348393d1d212d40ba8c54501838295204937575dd7317
-
Filesize
308KB
MD5cbb2d096c787f9d0512e8948843db742
SHA10d7e910f5d8ed6f6fe185227f34c985afa42bb84
SHA256d4b7eecdfbb27049cf6b8dc882d0f1c5c804a5ebe413f1f3825fce45f36a5401
SHA5125e8f0dc0096bc97bd2317e5d6075cc49c63dfde7b0f89106f2abb202e63703b3043985af2f025fe6edf348393d1d212d40ba8c54501838295204937575dd7317
-
Filesize
175KB
MD58becd60a08b9425130bf835604bc736e
SHA153b7ef74326db3591a6504b4da064b1a3b1331ff
SHA25673922bdaed94181ebc42c730e20a862c90e979a5356251ed5dc971415f705a7c
SHA512fac94d050c9113eb20a9b2aeda59b2e22e9ce776ccf6319800c00aeeecaea4e5225d6642d4c6ce31194844a330eec018586b81393cf0278fb739b0a4a4696a23
-
Filesize
175KB
MD58becd60a08b9425130bf835604bc736e
SHA153b7ef74326db3591a6504b4da064b1a3b1331ff
SHA25673922bdaed94181ebc42c730e20a862c90e979a5356251ed5dc971415f705a7c
SHA512fac94d050c9113eb20a9b2aeda59b2e22e9ce776ccf6319800c00aeeecaea4e5225d6642d4c6ce31194844a330eec018586b81393cf0278fb739b0a4a4696a23
-
Filesize
136KB
MD5e6b3415e635e27f7971ba49e6e6ac500
SHA16c8897aefaf1c9cbdf0b7d5e8384a1d286cc3d1b
SHA256585d2658fa3dfa87d7062e5c5703bca99526d8b91e035716b6e2960bdc1ea6d9
SHA512583fbee0c3395aa94a59b0befb61b6cecc2dc3bf83350f163e98767c6346b48161293a8eab4533aa05a480aadd99b881a9999379d646532a11ab9b31038e0776
-
Filesize
136KB
MD5e6b3415e635e27f7971ba49e6e6ac500
SHA16c8897aefaf1c9cbdf0b7d5e8384a1d286cc3d1b
SHA256585d2658fa3dfa87d7062e5c5703bca99526d8b91e035716b6e2960bdc1ea6d9
SHA512583fbee0c3395aa94a59b0befb61b6cecc2dc3bf83350f163e98767c6346b48161293a8eab4533aa05a480aadd99b881a9999379d646532a11ab9b31038e0776