Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/05/2023, 18:47
Static task
static1
Behavioral task
behavioral1
Sample
dee3ff932456ceea743e52df91bad5c2f6171f2c8c27c9b83e718fa4eeffd733.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
dee3ff932456ceea743e52df91bad5c2f6171f2c8c27c9b83e718fa4eeffd733.exe
Resource
win10v2004-20230220-en
General
-
Target
dee3ff932456ceea743e52df91bad5c2f6171f2c8c27c9b83e718fa4eeffd733.exe
-
Size
697KB
-
MD5
8fb1d874c6af69f9a563592847334934
-
SHA1
f7bb188241c0808bc16d264c667da4449d281b0d
-
SHA256
dee3ff932456ceea743e52df91bad5c2f6171f2c8c27c9b83e718fa4eeffd733
-
SHA512
65fd4774832d6e50ab95514e7de439102da3c5adb6ff66e5c29de16e37e27bfcb4e365d381b34b1730fe6c75fea577ecc39e167e025d35be743bc1dc4709869b
-
SSDEEP
12288:gy90Qvr/Ui+UH4NVw5iOAD1kCD+Ar9/kSTQYvOmX26CAn4s:gy1Yf7NVcCRj+ArlkmvxFP4s
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3364-987-0x0000000009CA0000-0x000000000A2B8000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 49503633.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 49503633.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 49503633.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 49503633.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 49503633.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 49503633.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2824 za648816.exe 2856 49503633.exe 3364 w81af33.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 49503633.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 49503633.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dee3ff932456ceea743e52df91bad5c2f6171f2c8c27c9b83e718fa4eeffd733.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za648816.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" za648816.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dee3ff932456ceea743e52df91bad5c2f6171f2c8c27c9b83e718fa4eeffd733.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 884 2856 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2856 49503633.exe 2856 49503633.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2856 49503633.exe Token: SeDebugPrivilege 3364 w81af33.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4324 wrote to memory of 2824 4324 dee3ff932456ceea743e52df91bad5c2f6171f2c8c27c9b83e718fa4eeffd733.exe 83 PID 4324 wrote to memory of 2824 4324 dee3ff932456ceea743e52df91bad5c2f6171f2c8c27c9b83e718fa4eeffd733.exe 83 PID 4324 wrote to memory of 2824 4324 dee3ff932456ceea743e52df91bad5c2f6171f2c8c27c9b83e718fa4eeffd733.exe 83 PID 2824 wrote to memory of 2856 2824 za648816.exe 84 PID 2824 wrote to memory of 2856 2824 za648816.exe 84 PID 2824 wrote to memory of 2856 2824 za648816.exe 84 PID 2824 wrote to memory of 3364 2824 za648816.exe 94 PID 2824 wrote to memory of 3364 2824 za648816.exe 94 PID 2824 wrote to memory of 3364 2824 za648816.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\dee3ff932456ceea743e52df91bad5c2f6171f2c8c27c9b83e718fa4eeffd733.exe"C:\Users\Admin\AppData\Local\Temp\dee3ff932456ceea743e52df91bad5c2f6171f2c8c27c9b83e718fa4eeffd733.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za648816.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za648816.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\49503633.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\49503633.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2856 -s 10804⤵
- Program crash
PID:884
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\w81af33.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\w81af33.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3364
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2856 -ip 28561⤵PID:1524
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
546KB
MD5d2c3ef6acf4a54ca9128ad2c8b622ff2
SHA1ec514b0697a05212634dce524cb2ac84323db4c8
SHA256ebaf927e7bc6fc927d414c594faeb0591e9811a2a3e235067d733bb51a0ccceb
SHA512db13a333e71a7b6c99f9df967ea5a505fe0a9e66a7cf7dd9d8b25eb52099d3612a5ebc93ad025d6d7fefa29bfb73fbe4985aa4de1fc33268087bf9f2b39daf5c
-
Filesize
546KB
MD5d2c3ef6acf4a54ca9128ad2c8b622ff2
SHA1ec514b0697a05212634dce524cb2ac84323db4c8
SHA256ebaf927e7bc6fc927d414c594faeb0591e9811a2a3e235067d733bb51a0ccceb
SHA512db13a333e71a7b6c99f9df967ea5a505fe0a9e66a7cf7dd9d8b25eb52099d3612a5ebc93ad025d6d7fefa29bfb73fbe4985aa4de1fc33268087bf9f2b39daf5c
-
Filesize
269KB
MD5931314dbdc497393e8dd7a7845d2ce3e
SHA13701995be1fc29ae88eca1cefcb62711f1bccbf5
SHA25623c53c1495e7d3c5552efc61c8e0e35c2bec7e127b97a72a8715c0b870e2eccc
SHA512c2523880eaa24edd2eea6e495c9f1b04124ad9dc94587b0f511df31625ae25ad682fe044e0ddf728706596dbeb7ea5b5e2ee3bf892aca52ef2ab29300ec8d3ab
-
Filesize
269KB
MD5931314dbdc497393e8dd7a7845d2ce3e
SHA13701995be1fc29ae88eca1cefcb62711f1bccbf5
SHA25623c53c1495e7d3c5552efc61c8e0e35c2bec7e127b97a72a8715c0b870e2eccc
SHA512c2523880eaa24edd2eea6e495c9f1b04124ad9dc94587b0f511df31625ae25ad682fe044e0ddf728706596dbeb7ea5b5e2ee3bf892aca52ef2ab29300ec8d3ab
-
Filesize
353KB
MD50b0fde03585070fb12dc9fd4cea2429a
SHA1b7f873286a8283f51edaa0add18b2845909cbb3a
SHA25684b5ee9a88e8a1edb55d46af53ae3db445287de22033b4044de26a94c1349915
SHA512c1bc7a7723952ab1fb2e44e347633a6e9435712bf38619ed29c24241f014daa430d528f36ae550399085a265e74b70cfc39fdc9ce190231a4cc39f60e5ea7a19
-
Filesize
353KB
MD50b0fde03585070fb12dc9fd4cea2429a
SHA1b7f873286a8283f51edaa0add18b2845909cbb3a
SHA25684b5ee9a88e8a1edb55d46af53ae3db445287de22033b4044de26a94c1349915
SHA512c1bc7a7723952ab1fb2e44e347633a6e9435712bf38619ed29c24241f014daa430d528f36ae550399085a265e74b70cfc39fdc9ce190231a4cc39f60e5ea7a19