Analysis
-
max time kernel
154s -
max time network
193s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-05-2023 19:22
Static task
static1
Behavioral task
behavioral1
Sample
f8b710fd89739236ff2b961d47b738df7ac02f9f47e2b20247656acbda2fae1a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f8b710fd89739236ff2b961d47b738df7ac02f9f47e2b20247656acbda2fae1a.exe
Resource
win10v2004-20230220-en
General
-
Target
f8b710fd89739236ff2b961d47b738df7ac02f9f47e2b20247656acbda2fae1a.exe
-
Size
694KB
-
MD5
3f92a310c625725ac14eede0651791ce
-
SHA1
1a1ae6715f2bce5a2dd6236bd80b4614ff6645d7
-
SHA256
f8b710fd89739236ff2b961d47b738df7ac02f9f47e2b20247656acbda2fae1a
-
SHA512
f9a75a89c8e7182ef07392fcb8cc677317754a9456e080927bb7b24b7d2af64fa9f579e6f30c84fca618261138e52abad807dc8a650ce63bb5109c52a82754c6
-
SSDEEP
12288:Qy90pEPoPLLYhdxCmRM6eHwpFTK0gF8Lbc7Sd+1WK6FL18bZK6A+M9p9:QysFLYkKM1oFXgFH4y6FL18bZ5i9X
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4296-988-0x0000000009D70000-0x000000000A388000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 23561019.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 23561019.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 23561019.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 23561019.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 23561019.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 23561019.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2656 un111140.exe 1648 23561019.exe 4296 rk745928.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 23561019.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 23561019.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un111140.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un111140.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f8b710fd89739236ff2b961d47b738df7ac02f9f47e2b20247656acbda2fae1a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f8b710fd89739236ff2b961d47b738df7ac02f9f47e2b20247656acbda2fae1a.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4864 1648 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1648 23561019.exe 1648 23561019.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1648 23561019.exe Token: SeDebugPrivilege 4296 rk745928.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2656 2204 f8b710fd89739236ff2b961d47b738df7ac02f9f47e2b20247656acbda2fae1a.exe 82 PID 2204 wrote to memory of 2656 2204 f8b710fd89739236ff2b961d47b738df7ac02f9f47e2b20247656acbda2fae1a.exe 82 PID 2204 wrote to memory of 2656 2204 f8b710fd89739236ff2b961d47b738df7ac02f9f47e2b20247656acbda2fae1a.exe 82 PID 2656 wrote to memory of 1648 2656 un111140.exe 83 PID 2656 wrote to memory of 1648 2656 un111140.exe 83 PID 2656 wrote to memory of 1648 2656 un111140.exe 83 PID 2656 wrote to memory of 4296 2656 un111140.exe 88 PID 2656 wrote to memory of 4296 2656 un111140.exe 88 PID 2656 wrote to memory of 4296 2656 un111140.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8b710fd89739236ff2b961d47b738df7ac02f9f47e2b20247656acbda2fae1a.exe"C:\Users\Admin\AppData\Local\Temp\f8b710fd89739236ff2b961d47b738df7ac02f9f47e2b20247656acbda2fae1a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un111140.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un111140.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\23561019.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\23561019.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1648 -s 10804⤵
- Program crash
PID:4864
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk745928.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk745928.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4296
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1648 -ip 16481⤵PID:4396
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
540KB
MD5763c0cf6e9bdadedd86ddc78e9cd7612
SHA1c6fe2d0dfd91f8f6e9adb96f3ec3e4a847c26cd9
SHA25641023780cd24f27a497f27f2f136433e2dad3b30317e3cef1f17d065abb34393
SHA5128612076ca8f475092f855b445775cf5c9a10df6703a68c622d2de1eb5a40471c3a044739d96fa2807529579ee977883981c843a91e3cbf39587719b7f40c86a0
-
Filesize
540KB
MD5763c0cf6e9bdadedd86ddc78e9cd7612
SHA1c6fe2d0dfd91f8f6e9adb96f3ec3e4a847c26cd9
SHA25641023780cd24f27a497f27f2f136433e2dad3b30317e3cef1f17d065abb34393
SHA5128612076ca8f475092f855b445775cf5c9a10df6703a68c622d2de1eb5a40471c3a044739d96fa2807529579ee977883981c843a91e3cbf39587719b7f40c86a0
-
Filesize
258KB
MD531439707cd9747de3c3ad168ebcb569e
SHA185eb92b27fbe0742718edae49526d1bb58f8b401
SHA256c86ed48735060e60338996e5649af34fb821649f1a1a32952e060d18d36e7f47
SHA512cb9a39dabfea77d7e9a9c62ca7bd9c9cf824285880587982134fac54780bbb960af07350f2cb98cc915f44720e8fba6e291c29a77c214ec731de64a2fffa0089
-
Filesize
258KB
MD531439707cd9747de3c3ad168ebcb569e
SHA185eb92b27fbe0742718edae49526d1bb58f8b401
SHA256c86ed48735060e60338996e5649af34fb821649f1a1a32952e060d18d36e7f47
SHA512cb9a39dabfea77d7e9a9c62ca7bd9c9cf824285880587982134fac54780bbb960af07350f2cb98cc915f44720e8fba6e291c29a77c214ec731de64a2fffa0089
-
Filesize
340KB
MD5e19a5a4d663ce2893b10b3c896eb6c01
SHA1388b010b7c9bd73f8359ce10dea990dd7dc901ac
SHA25684f663b65c5dd96bdd2634115bc8dd36482dd2cb9329a62fe9e624669e1f52ab
SHA51254ef96e634dabbc55162ac214e7066bd46744ae823a9825bcd7dbdf691de027a2a25f3f74182a26f6bf79f6295425ade3ab467cc9dc6c10720e13f63fcc7de62
-
Filesize
340KB
MD5e19a5a4d663ce2893b10b3c896eb6c01
SHA1388b010b7c9bd73f8359ce10dea990dd7dc901ac
SHA25684f663b65c5dd96bdd2634115bc8dd36482dd2cb9329a62fe9e624669e1f52ab
SHA51254ef96e634dabbc55162ac214e7066bd46744ae823a9825bcd7dbdf691de027a2a25f3f74182a26f6bf79f6295425ade3ab467cc9dc6c10720e13f63fcc7de62