Analysis
-
max time kernel
137s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 21:06
Static task
static1
Behavioral task
behavioral1
Sample
2aac5886264489958ec9d7ab130039e6bfdbb3eabd87c8cbdb38d1d50b18ab67.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2aac5886264489958ec9d7ab130039e6bfdbb3eabd87c8cbdb38d1d50b18ab67.exe
Resource
win10v2004-20230220-en
General
-
Target
2aac5886264489958ec9d7ab130039e6bfdbb3eabd87c8cbdb38d1d50b18ab67.exe
-
Size
1.2MB
-
MD5
bce9070fb44c7900e69a9f6fcedfcf0c
-
SHA1
73bbb68fdaf457ee47ea58cff8da939a4e7f50dd
-
SHA256
2aac5886264489958ec9d7ab130039e6bfdbb3eabd87c8cbdb38d1d50b18ab67
-
SHA512
7869c5d84bfb88956e55d53c42f1180faed6f8f98f36b0bee2a17122c61c4cb6606147e0a832b9897e2cc9abfeb98d3c94397320f52a2b69a4131c61f3f442f6
-
SSDEEP
24576:dy8+yG0chEaYcRMvGOnuGsvcSLeui3iPffUWTbXJ9Ct19IWkE3pV:48ghWCCTsjdEcbi9NkIp
Malware Config
Extracted
redline
luser
185.161.248.73:4164
-
auth_value
cf14a84de9a3b6b7b8981202f3b616fb
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1144-207-0x000000000A4C0000-0x000000000AAD8000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" s78074264.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" s78074264.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" s78074264.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" s78074264.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" s78074264.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection s78074264.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 1520 z66582782.exe 3980 z81798106.exe 1448 z34856069.exe 3800 s78074264.exe 1144 t32697815.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features s78074264.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" s78074264.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2aac5886264489958ec9d7ab130039e6bfdbb3eabd87c8cbdb38d1d50b18ab67.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z66582782.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z66582782.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z81798106.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z81798106.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z34856069.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z34856069.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2aac5886264489958ec9d7ab130039e6bfdbb3eabd87c8cbdb38d1d50b18ab67.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2072 3800 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3800 s78074264.exe 3800 s78074264.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3800 s78074264.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1432 wrote to memory of 1520 1432 2aac5886264489958ec9d7ab130039e6bfdbb3eabd87c8cbdb38d1d50b18ab67.exe 82 PID 1432 wrote to memory of 1520 1432 2aac5886264489958ec9d7ab130039e6bfdbb3eabd87c8cbdb38d1d50b18ab67.exe 82 PID 1432 wrote to memory of 1520 1432 2aac5886264489958ec9d7ab130039e6bfdbb3eabd87c8cbdb38d1d50b18ab67.exe 82 PID 1520 wrote to memory of 3980 1520 z66582782.exe 83 PID 1520 wrote to memory of 3980 1520 z66582782.exe 83 PID 1520 wrote to memory of 3980 1520 z66582782.exe 83 PID 3980 wrote to memory of 1448 3980 z81798106.exe 84 PID 3980 wrote to memory of 1448 3980 z81798106.exe 84 PID 3980 wrote to memory of 1448 3980 z81798106.exe 84 PID 1448 wrote to memory of 3800 1448 z34856069.exe 85 PID 1448 wrote to memory of 3800 1448 z34856069.exe 85 PID 1448 wrote to memory of 3800 1448 z34856069.exe 85 PID 1448 wrote to memory of 1144 1448 z34856069.exe 89 PID 1448 wrote to memory of 1144 1448 z34856069.exe 89 PID 1448 wrote to memory of 1144 1448 z34856069.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2aac5886264489958ec9d7ab130039e6bfdbb3eabd87c8cbdb38d1d50b18ab67.exe"C:\Users\Admin\AppData\Local\Temp\2aac5886264489958ec9d7ab130039e6bfdbb3eabd87c8cbdb38d1d50b18ab67.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z66582782.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z66582782.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z81798106.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z81798106.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z34856069.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z34856069.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s78074264.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s78074264.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 10806⤵
- Program crash
PID:2072
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t32697815.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\t32697815.exe5⤵
- Executes dropped EXE
PID:1144
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3800 -ip 38001⤵PID:3264
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5be1beae42a178396ba81a8fc257df775
SHA1a2cf2e985a1ecfd6c1e1fbe35d5647c20bc5f383
SHA256c9e3becc0071f8061a34ce341bf26071674bdd9657fac75f208d67871ff77912
SHA51208ce14efaaa8f6cc4adc17139cb53a7489bff4f5513a603287f18e83f1fbd29f200306b59b7e6e01039f3a3c9179e21746e897971f5b15e9dcf03f87b4e1cb24
-
Filesize
1.0MB
MD5be1beae42a178396ba81a8fc257df775
SHA1a2cf2e985a1ecfd6c1e1fbe35d5647c20bc5f383
SHA256c9e3becc0071f8061a34ce341bf26071674bdd9657fac75f208d67871ff77912
SHA51208ce14efaaa8f6cc4adc17139cb53a7489bff4f5513a603287f18e83f1fbd29f200306b59b7e6e01039f3a3c9179e21746e897971f5b15e9dcf03f87b4e1cb24
-
Filesize
850KB
MD56773def544564eb1afcc2e66d982d501
SHA159b096e3aa980447e461a0eff2188d5660bb68c7
SHA2565bc84cc2fc945f96bf4802435661e42d13542dc029ce5022028173debb13d546
SHA51218f2ed0103d0f7ef7572023b3991d4a511ab9e6f28c4e8a85ab4b505611168329c1cf84670f1396b6bb1e94dde3ab31c61957115ebbffe50f41bb70ec845df9b
-
Filesize
850KB
MD56773def544564eb1afcc2e66d982d501
SHA159b096e3aa980447e461a0eff2188d5660bb68c7
SHA2565bc84cc2fc945f96bf4802435661e42d13542dc029ce5022028173debb13d546
SHA51218f2ed0103d0f7ef7572023b3991d4a511ab9e6f28c4e8a85ab4b505611168329c1cf84670f1396b6bb1e94dde3ab31c61957115ebbffe50f41bb70ec845df9b
-
Filesize
385KB
MD5e0f62d1199bfcfc2634a0d68ea47b2ef
SHA1724cc1a1567b763c6b4b8c6eccb86277e8bdf269
SHA256549db5ed5557a1389f5043ffa54b5dee191582b71a50102623f843966fcf1beb
SHA512e26a2f875c9ea67e2bc86d69ab6137adc5f35111489e88d3e343741199cb133117fd1c36b12531b67d15d457394966373bc26843a16a45215be59f34a4b3b7d0
-
Filesize
385KB
MD5e0f62d1199bfcfc2634a0d68ea47b2ef
SHA1724cc1a1567b763c6b4b8c6eccb86277e8bdf269
SHA256549db5ed5557a1389f5043ffa54b5dee191582b71a50102623f843966fcf1beb
SHA512e26a2f875c9ea67e2bc86d69ab6137adc5f35111489e88d3e343741199cb133117fd1c36b12531b67d15d457394966373bc26843a16a45215be59f34a4b3b7d0
-
Filesize
294KB
MD5499e94fc5686e5f79abbd112ff93ebca
SHA12399b2a909bb96e4962403333d0a241e6bfb1c36
SHA2563907ee2c3ec179271fb28741277ea347dda1b51c6bfeab8eedb6f79196f7ab9c
SHA512f5dce1b0fdf767a85b8fa3eef8112c34657b6aaf1e0ed1a48ab2fe0b5ad7938cd9af3141ed35e7c211872579483d382e4a3cf87976ce0178991579358d7b53ba
-
Filesize
294KB
MD5499e94fc5686e5f79abbd112ff93ebca
SHA12399b2a909bb96e4962403333d0a241e6bfb1c36
SHA2563907ee2c3ec179271fb28741277ea347dda1b51c6bfeab8eedb6f79196f7ab9c
SHA512f5dce1b0fdf767a85b8fa3eef8112c34657b6aaf1e0ed1a48ab2fe0b5ad7938cd9af3141ed35e7c211872579483d382e4a3cf87976ce0178991579358d7b53ba
-
Filesize
168KB
MD58a5654c4bd466d48ccd8d6c191271c85
SHA1fa1ec0c9c2f3ba232e030128f19aab8b6155eb30
SHA25676c7416f4fb2a061d280d3dfd60578a5f76b88e25d355d9c7aa56d0482a5d9a3
SHA5129edd613c051786f3c7aed97ebe4742cc32caba3d75f9a5917842523f230ef2375c425f8dce77f5ea25b66fde4355ad328d580b8ba3de63bcb61a3fc5baf97f17
-
Filesize
168KB
MD58a5654c4bd466d48ccd8d6c191271c85
SHA1fa1ec0c9c2f3ba232e030128f19aab8b6155eb30
SHA25676c7416f4fb2a061d280d3dfd60578a5f76b88e25d355d9c7aa56d0482a5d9a3
SHA5129edd613c051786f3c7aed97ebe4742cc32caba3d75f9a5917842523f230ef2375c425f8dce77f5ea25b66fde4355ad328d580b8ba3de63bcb61a3fc5baf97f17