Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 21:02
Static task
static1
Behavioral task
behavioral1
Sample
269abe57e67654fa1a97d65396fa841de0481432bb7f18037db3862b4458e232.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
269abe57e67654fa1a97d65396fa841de0481432bb7f18037db3862b4458e232.exe
Resource
win10v2004-20230220-en
General
-
Target
269abe57e67654fa1a97d65396fa841de0481432bb7f18037db3862b4458e232.exe
-
Size
479KB
-
MD5
2dd3dcc10f7006763fb2751b0fa6f454
-
SHA1
484bfeb780722165db13052795e2f4422f828707
-
SHA256
269abe57e67654fa1a97d65396fa841de0481432bb7f18037db3862b4458e232
-
SHA512
79a78376652972730c83e57444a167953a45d749a1ddb141d4e68ad043fff56f5e1e633d7592c4a4280ce540706059cd007812434a1d50afea1ef9564785da3a
-
SSDEEP
6144:Kzy+bnr+rp0yN90QETpsOMm2Vn+UwCj0FOUEjCgnbEQ/PIz2QUJ9tVVv3SJV:VMrry90bpMMC0OAgnbE01Qu9rVvAV
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4164-187-0x0000000007900000-0x0000000007F18000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a0859051.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a0859051.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a0859051.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a0859051.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a0859051.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a0859051.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 3052 v7184437.exe 1484 a0859051.exe 4164 b8913035.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a0859051.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a0859051.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce v7184437.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7184437.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 269abe57e67654fa1a97d65396fa841de0481432bb7f18037db3862b4458e232.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 269abe57e67654fa1a97d65396fa841de0481432bb7f18037db3862b4458e232.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1484 a0859051.exe 1484 a0859051.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1484 a0859051.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 636 wrote to memory of 3052 636 269abe57e67654fa1a97d65396fa841de0481432bb7f18037db3862b4458e232.exe 84 PID 636 wrote to memory of 3052 636 269abe57e67654fa1a97d65396fa841de0481432bb7f18037db3862b4458e232.exe 84 PID 636 wrote to memory of 3052 636 269abe57e67654fa1a97d65396fa841de0481432bb7f18037db3862b4458e232.exe 84 PID 3052 wrote to memory of 1484 3052 v7184437.exe 85 PID 3052 wrote to memory of 1484 3052 v7184437.exe 85 PID 3052 wrote to memory of 1484 3052 v7184437.exe 85 PID 3052 wrote to memory of 4164 3052 v7184437.exe 90 PID 3052 wrote to memory of 4164 3052 v7184437.exe 90 PID 3052 wrote to memory of 4164 3052 v7184437.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\269abe57e67654fa1a97d65396fa841de0481432bb7f18037db3862b4458e232.exe"C:\Users\Admin\AppData\Local\Temp\269abe57e67654fa1a97d65396fa841de0481432bb7f18037db3862b4458e232.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7184437.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7184437.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a0859051.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\a0859051.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1484
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b8913035.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\b8913035.exe3⤵
- Executes dropped EXE
PID:4164
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD525d205eb0b4d50be87dea2d3043ee936
SHA19d8d1271e22b8f12614db71e18a43ed1a6918b4b
SHA2562a7ea5826deab8afb1383512f6ee928d5eb7bcf7ce8e0a660816f2b474fac726
SHA512f14082b9a6ddcc6cedb524cdb4f64feebc97a90fffc8f844932d376324964b7ee3dd8180430221a7bceb1619282e512e564bd8bed41a9f5e5101b2e56e4c3c2d
-
Filesize
307KB
MD525d205eb0b4d50be87dea2d3043ee936
SHA19d8d1271e22b8f12614db71e18a43ed1a6918b4b
SHA2562a7ea5826deab8afb1383512f6ee928d5eb7bcf7ce8e0a660816f2b474fac726
SHA512f14082b9a6ddcc6cedb524cdb4f64feebc97a90fffc8f844932d376324964b7ee3dd8180430221a7bceb1619282e512e564bd8bed41a9f5e5101b2e56e4c3c2d
-
Filesize
175KB
MD5d59b989253d9bd505567328d127ce588
SHA17f2bc6f370f00d2364c50ed6037eff706f64d5c5
SHA256b5a92e6994f0db8057eaa987df7bf5e1dace2f834d26672ef78b70620f6812cc
SHA512bcc947bbc66c63da11439aec57b08e7aa6e92c9278d83d523d41a0a13129711d9e609a195526e69b504a9079af880a90cfa4ed01aa920d9295851d8f7ad2d189
-
Filesize
175KB
MD5d59b989253d9bd505567328d127ce588
SHA17f2bc6f370f00d2364c50ed6037eff706f64d5c5
SHA256b5a92e6994f0db8057eaa987df7bf5e1dace2f834d26672ef78b70620f6812cc
SHA512bcc947bbc66c63da11439aec57b08e7aa6e92c9278d83d523d41a0a13129711d9e609a195526e69b504a9079af880a90cfa4ed01aa920d9295851d8f7ad2d189
-
Filesize
136KB
MD531fc937fffe039390eec038ac8e953d7
SHA1bad83a487f89adf0daf13140d0f7956e26d81a83
SHA256da0047fc3c24596e35d37015285c4c6467ab25a7fa17b5d7663e2f8c3b4d7087
SHA512b4137c7aeb7067d62002ac8dca0ff647a7f25c6f57457ed1a9971b855400718b9388b6a69fd2fecf22cdcb3ebe28ea1fe4da98f848bcc230fa196c8363f42fd3
-
Filesize
136KB
MD531fc937fffe039390eec038ac8e953d7
SHA1bad83a487f89adf0daf13140d0f7956e26d81a83
SHA256da0047fc3c24596e35d37015285c4c6467ab25a7fa17b5d7663e2f8c3b4d7087
SHA512b4137c7aeb7067d62002ac8dca0ff647a7f25c6f57457ed1a9971b855400718b9388b6a69fd2fecf22cdcb3ebe28ea1fe4da98f848bcc230fa196c8363f42fd3