Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-05-2023 18:57
Static task
static1
Behavioral task
behavioral1
Sample
e8eec87b6c7ea6d8b996090c06d1ffcfcabcd0354b6f72d8e7c38650d399ef22.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e8eec87b6c7ea6d8b996090c06d1ffcfcabcd0354b6f72d8e7c38650d399ef22.exe
Resource
win10v2004-20230220-en
General
-
Target
e8eec87b6c7ea6d8b996090c06d1ffcfcabcd0354b6f72d8e7c38650d399ef22.exe
-
Size
696KB
-
MD5
f0f50e2c40c682e19ec5e88731e2bfa3
-
SHA1
b625ae79275c8be15da07be9165c2a681d2780ff
-
SHA256
e8eec87b6c7ea6d8b996090c06d1ffcfcabcd0354b6f72d8e7c38650d399ef22
-
SHA512
af0b981caf50f55d7e794cae47141154212b001cc440963b884e33916924a4cb41c7f5b6599c9c6d280b6ee6e01aea9cf17e6328369a19067ff5e481bea3cf81
-
SSDEEP
12288:Fy90FtccbLr90zP0ZfuT0O3HuTUHqxQ9ZRhugHF0iDBe7cuSpC8P:FyYV340luluTUKxGj5Sie7cukC8P
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/464-989-0x0000000009C90000-0x000000000A2A8000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 87099849.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 87099849.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 87099849.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 87099849.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 87099849.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 87099849.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2380 un628275.exe 1488 87099849.exe 464 rk636247.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 87099849.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 87099849.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e8eec87b6c7ea6d8b996090c06d1ffcfcabcd0354b6f72d8e7c38650d399ef22.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e8eec87b6c7ea6d8b996090c06d1ffcfcabcd0354b6f72d8e7c38650d399ef22.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un628275.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un628275.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4864 1488 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1488 87099849.exe 1488 87099849.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1488 87099849.exe Token: SeDebugPrivilege 464 rk636247.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4764 wrote to memory of 2380 4764 e8eec87b6c7ea6d8b996090c06d1ffcfcabcd0354b6f72d8e7c38650d399ef22.exe 82 PID 4764 wrote to memory of 2380 4764 e8eec87b6c7ea6d8b996090c06d1ffcfcabcd0354b6f72d8e7c38650d399ef22.exe 82 PID 4764 wrote to memory of 2380 4764 e8eec87b6c7ea6d8b996090c06d1ffcfcabcd0354b6f72d8e7c38650d399ef22.exe 82 PID 2380 wrote to memory of 1488 2380 un628275.exe 83 PID 2380 wrote to memory of 1488 2380 un628275.exe 83 PID 2380 wrote to memory of 1488 2380 un628275.exe 83 PID 2380 wrote to memory of 464 2380 un628275.exe 94 PID 2380 wrote to memory of 464 2380 un628275.exe 94 PID 2380 wrote to memory of 464 2380 un628275.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8eec87b6c7ea6d8b996090c06d1ffcfcabcd0354b6f72d8e7c38650d399ef22.exe"C:\Users\Admin\AppData\Local\Temp\e8eec87b6c7ea6d8b996090c06d1ffcfcabcd0354b6f72d8e7c38650d399ef22.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un628275.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un628275.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\87099849.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\87099849.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 10764⤵
- Program crash
PID:4864
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk636247.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk636247.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:464
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1488 -ip 14881⤵PID:3312
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
542KB
MD53379afee3f67a2ee639d579b0382d107
SHA15b4a91b4571456af5b9b3931aecbc5ad7d995828
SHA256e447d9ebc8208a356f8b35d899ab7df113e85bb8d134f54a98d06386f1515dfa
SHA5121be4cf9017df933f43634a8ff8222ec219fb25a498b6492ecbc790477acc7d0387a6dd484e80add3bb9e022c1ef777194ef103f93eb453274c128e6994904e9b
-
Filesize
542KB
MD53379afee3f67a2ee639d579b0382d107
SHA15b4a91b4571456af5b9b3931aecbc5ad7d995828
SHA256e447d9ebc8208a356f8b35d899ab7df113e85bb8d134f54a98d06386f1515dfa
SHA5121be4cf9017df933f43634a8ff8222ec219fb25a498b6492ecbc790477acc7d0387a6dd484e80add3bb9e022c1ef777194ef103f93eb453274c128e6994904e9b
-
Filesize
264KB
MD552c7287c2f659aa09cd6ca9f5594fa37
SHA1da2bd76eab0f689b2d12e3be10f829e5d5da7689
SHA2565386cef87a0f96faa104b84205764203b6252e4ee61a12450edb5298b78bb829
SHA5129cbc8d9d14176c0a65e519fbe97c919a7f0c8bba67eb4cfa4f1a9f7cbe80a64092f7961a9f9b620d62de67eac0f2a1dfad488ac912ba11c959e87b8fe9f4d07d
-
Filesize
264KB
MD552c7287c2f659aa09cd6ca9f5594fa37
SHA1da2bd76eab0f689b2d12e3be10f829e5d5da7689
SHA2565386cef87a0f96faa104b84205764203b6252e4ee61a12450edb5298b78bb829
SHA5129cbc8d9d14176c0a65e519fbe97c919a7f0c8bba67eb4cfa4f1a9f7cbe80a64092f7961a9f9b620d62de67eac0f2a1dfad488ac912ba11c959e87b8fe9f4d07d
-
Filesize
348KB
MD51974a519304d8f7f273f363a5a7243da
SHA17794a0108a71ff22d1ebc56991b1f264d863d6ec
SHA256428729b8ec5d6b76b5b3fb943f92dc08d22266c7e05ca33ce5dcbd463ca224f7
SHA512c67b038e2ee3ca5ff9d1a89fffd2c77d925ca02829d9da6975fc1581004d3b35fefc03af1b29db4534210b3c2e63455bb73488762ce61a2fd5fb5cf8d49766a8
-
Filesize
348KB
MD51974a519304d8f7f273f363a5a7243da
SHA17794a0108a71ff22d1ebc56991b1f264d863d6ec
SHA256428729b8ec5d6b76b5b3fb943f92dc08d22266c7e05ca33ce5dcbd463ca224f7
SHA512c67b038e2ee3ca5ff9d1a89fffd2c77d925ca02829d9da6975fc1581004d3b35fefc03af1b29db4534210b3c2e63455bb73488762ce61a2fd5fb5cf8d49766a8