Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 21:06
Static task
static1
Behavioral task
behavioral1
Sample
2b051da3e85dd7282cb14c109b38ec2aa59f49b38dccce3f2df8ea7f2d2b5bf0.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2b051da3e85dd7282cb14c109b38ec2aa59f49b38dccce3f2df8ea7f2d2b5bf0.exe
Resource
win10v2004-20230220-en
General
-
Target
2b051da3e85dd7282cb14c109b38ec2aa59f49b38dccce3f2df8ea7f2d2b5bf0.exe
-
Size
703KB
-
MD5
e6b0986c3c6a04e37445de2e25f8d183
-
SHA1
0a986bc894a06e89d25972b6bb1f1d8e257200e9
-
SHA256
2b051da3e85dd7282cb14c109b38ec2aa59f49b38dccce3f2df8ea7f2d2b5bf0
-
SHA512
d938d3988a513d776a2c7821dedd9b5c045d247d66a003105d5301f5b845dabec322b8480ee8674ce9606e2438ad25b172792c4d65ed26aa8ea9bc4f8c6f4f12
-
SSDEEP
12288:4y90xp6D9qKuBTP+KPBsGiUwR6lTZNc80gbKFRa:4yip49qJ7rPyPQlU80uKFRa
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4268-981-0x00000000079A0000-0x0000000007FB8000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 35140954.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 35140954.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 35140954.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 35140954.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 35140954.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 35140954.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1672 st554982.exe 608 35140954.exe 4268 kp460122.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 35140954.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 35140954.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce st554982.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" st554982.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2b051da3e85dd7282cb14c109b38ec2aa59f49b38dccce3f2df8ea7f2d2b5bf0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2b051da3e85dd7282cb14c109b38ec2aa59f49b38dccce3f2df8ea7f2d2b5bf0.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 608 35140954.exe 608 35140954.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 608 35140954.exe Token: SeDebugPrivilege 4268 kp460122.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1080 wrote to memory of 1672 1080 2b051da3e85dd7282cb14c109b38ec2aa59f49b38dccce3f2df8ea7f2d2b5bf0.exe 81 PID 1080 wrote to memory of 1672 1080 2b051da3e85dd7282cb14c109b38ec2aa59f49b38dccce3f2df8ea7f2d2b5bf0.exe 81 PID 1080 wrote to memory of 1672 1080 2b051da3e85dd7282cb14c109b38ec2aa59f49b38dccce3f2df8ea7f2d2b5bf0.exe 81 PID 1672 wrote to memory of 608 1672 st554982.exe 82 PID 1672 wrote to memory of 608 1672 st554982.exe 82 PID 1672 wrote to memory of 608 1672 st554982.exe 82 PID 1672 wrote to memory of 4268 1672 st554982.exe 85 PID 1672 wrote to memory of 4268 1672 st554982.exe 85 PID 1672 wrote to memory of 4268 1672 st554982.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b051da3e85dd7282cb14c109b38ec2aa59f49b38dccce3f2df8ea7f2d2b5bf0.exe"C:\Users\Admin\AppData\Local\Temp\2b051da3e85dd7282cb14c109b38ec2aa59f49b38dccce3f2df8ea7f2d2b5bf0.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st554982.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\st554982.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\35140954.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\35140954.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:608
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp460122.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp460122.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4268
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
548KB
MD53b685e5cae491e45259ad79b6b813a9a
SHA1cce9b34ac7839bf3cebce5f41bfab65f2c65f44f
SHA256872786a69e556193e2c98e5cfed5939083384121a43411aa20ba112f9dea4905
SHA51290e8c1ebc53d400dcd55e285c9381de328b24ccf1de484c82f5598cb3d865084803df5502f9f0cd7103865abf77db2c0298c27884c6053032ce9d223de90f880
-
Filesize
548KB
MD53b685e5cae491e45259ad79b6b813a9a
SHA1cce9b34ac7839bf3cebce5f41bfab65f2c65f44f
SHA256872786a69e556193e2c98e5cfed5939083384121a43411aa20ba112f9dea4905
SHA51290e8c1ebc53d400dcd55e285c9381de328b24ccf1de484c82f5598cb3d865084803df5502f9f0cd7103865abf77db2c0298c27884c6053032ce9d223de90f880
-
Filesize
176KB
MD5abcd70ee1821a352d705af95275d18e1
SHA12455d60565f2100c7e90fa8b3d9167f219ce3c8e
SHA2566c6b5b24fa6d27c5729cc8ec8b6573763bcde0e32ed63108590d7b8abb660a41
SHA512dc1edf2a06f92af668607d8a9aa105e714980c835523d09fd0ea41db72540712ac01429ea024bfef19b795896ff241f5b59f4e0faa9d02af91a1b3fc0e56203c
-
Filesize
176KB
MD5abcd70ee1821a352d705af95275d18e1
SHA12455d60565f2100c7e90fa8b3d9167f219ce3c8e
SHA2566c6b5b24fa6d27c5729cc8ec8b6573763bcde0e32ed63108590d7b8abb660a41
SHA512dc1edf2a06f92af668607d8a9aa105e714980c835523d09fd0ea41db72540712ac01429ea024bfef19b795896ff241f5b59f4e0faa9d02af91a1b3fc0e56203c
-
Filesize
460KB
MD5daf776a788c642b50fded1dea0483e00
SHA17281997b82a9edae144a2bce9997ae84170cb642
SHA256f21d246d314510f61fb7f2d1f39da938054c6a40cf9d2e7f758c53cadb3ad96b
SHA512320278bb85840bbcaa35bb215d39cd53edc5807a6f51bacebb18294c76b856e693d9cd6328c83e81bcf4eb40b516eee422566175fe7f33f3242fc3df40975403
-
Filesize
460KB
MD5daf776a788c642b50fded1dea0483e00
SHA17281997b82a9edae144a2bce9997ae84170cb642
SHA256f21d246d314510f61fb7f2d1f39da938054c6a40cf9d2e7f758c53cadb3ad96b
SHA512320278bb85840bbcaa35bb215d39cd53edc5807a6f51bacebb18294c76b856e693d9cd6328c83e81bcf4eb40b516eee422566175fe7f33f3242fc3df40975403