Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 21:04
Static task
static1
Behavioral task
behavioral1
Sample
28894603bef7ddd0d4e6f4f4e15645cf2f32191478f8f89531eeed8f178d5a62.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
28894603bef7ddd0d4e6f4f4e15645cf2f32191478f8f89531eeed8f178d5a62.exe
Resource
win10v2004-20230220-en
General
-
Target
28894603bef7ddd0d4e6f4f4e15645cf2f32191478f8f89531eeed8f178d5a62.exe
-
Size
619KB
-
MD5
6ec82d3ee8d7a8c48ec11f1c187fd273
-
SHA1
b47121e5a46015dd901f6e5d9c1669f418e3ff9c
-
SHA256
28894603bef7ddd0d4e6f4f4e15645cf2f32191478f8f89531eeed8f178d5a62
-
SHA512
1eba0590485ea03e06d7edbdf6a7cd4a7b96b210a822d7535ae327150ae79b8f887b4a980ff722395d3f072159dd7c7a8c6cad9c4f6021bf4465fa0c6a58c76b
-
SSDEEP
12288:Fy90SlKTBhPStWFO5hfcWft17710jxHvoNSlNRyGu:FyITPP/OwWft1fcloNSlNRJu
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/116-952-0x00000000078F0000-0x0000000007F08000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 04934028.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 04934028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 04934028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 04934028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 04934028.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 04934028.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 3832 st969001.exe 840 04934028.exe 116 kp848914.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" 04934028.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st969001.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 28894603bef7ddd0d4e6f4f4e15645cf2f32191478f8f89531eeed8f178d5a62.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 28894603bef7ddd0d4e6f4f4e15645cf2f32191478f8f89531eeed8f178d5a62.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st969001.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 840 04934028.exe 840 04934028.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 840 04934028.exe Token: SeDebugPrivilege 116 kp848914.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2368 wrote to memory of 3832 2368 28894603bef7ddd0d4e6f4f4e15645cf2f32191478f8f89531eeed8f178d5a62.exe 83 PID 2368 wrote to memory of 3832 2368 28894603bef7ddd0d4e6f4f4e15645cf2f32191478f8f89531eeed8f178d5a62.exe 83 PID 2368 wrote to memory of 3832 2368 28894603bef7ddd0d4e6f4f4e15645cf2f32191478f8f89531eeed8f178d5a62.exe 83 PID 3832 wrote to memory of 840 3832 st969001.exe 84 PID 3832 wrote to memory of 840 3832 st969001.exe 84 PID 3832 wrote to memory of 116 3832 st969001.exe 87 PID 3832 wrote to memory of 116 3832 st969001.exe 87 PID 3832 wrote to memory of 116 3832 st969001.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\28894603bef7ddd0d4e6f4f4e15645cf2f32191478f8f89531eeed8f178d5a62.exe"C:\Users\Admin\AppData\Local\Temp\28894603bef7ddd0d4e6f4f4e15645cf2f32191478f8f89531eeed8f178d5a62.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st969001.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st969001.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\04934028.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\04934028.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:840
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp848914.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp848914.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:116
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
464KB
MD55e50833596b50fec069dce33a1d10a3c
SHA1976127ac9dfd6053d806b928325be0fb785dd005
SHA256dc546b6a8b179e562e638450b1ff34567b3e2bf5958526ea3b9f6cac1b5e60b2
SHA5129d7e5e260876299ae30de62c73de7a22a7bce373d1c6c5dc2e3de12215b7f0e914e36851dce2288d5066bdac2500ac6b0432a5a2c08a256902b3a16a1d5f54fd
-
Filesize
464KB
MD55e50833596b50fec069dce33a1d10a3c
SHA1976127ac9dfd6053d806b928325be0fb785dd005
SHA256dc546b6a8b179e562e638450b1ff34567b3e2bf5958526ea3b9f6cac1b5e60b2
SHA5129d7e5e260876299ae30de62c73de7a22a7bce373d1c6c5dc2e3de12215b7f0e914e36851dce2288d5066bdac2500ac6b0432a5a2c08a256902b3a16a1d5f54fd
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
478KB
MD506e8aeb87cc90857db16b1f4bfcd93f6
SHA136f70df2ccaa831e076d53eddced40821ca7eb42
SHA256484e0f73b97eb167c131307c1f3e0e3da0a23337411065f5b05022315b35a7d7
SHA5120f2c29855d854fb0be719d30e764b27face60b014f5485001626424842a4b5c8425fa3ef20d9c112651f0379e45959b2ec80663e02646845c50730d3db73d8d8
-
Filesize
478KB
MD506e8aeb87cc90857db16b1f4bfcd93f6
SHA136f70df2ccaa831e076d53eddced40821ca7eb42
SHA256484e0f73b97eb167c131307c1f3e0e3da0a23337411065f5b05022315b35a7d7
SHA5120f2c29855d854fb0be719d30e764b27face60b014f5485001626424842a4b5c8425fa3ef20d9c112651f0379e45959b2ec80663e02646845c50730d3db73d8d8