Analysis
-
max time kernel
151s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-05-2023 19:18
Static task
static1
Behavioral task
behavioral1
Sample
f3878e3193c9cf4f56105966f1bba82ab5ffa81cb0117b3b9102e4ae405c037b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f3878e3193c9cf4f56105966f1bba82ab5ffa81cb0117b3b9102e4ae405c037b.exe
Resource
win10v2004-20230220-en
General
-
Target
f3878e3193c9cf4f56105966f1bba82ab5ffa81cb0117b3b9102e4ae405c037b.exe
-
Size
693KB
-
MD5
4b9e25f182a3ec7a379c101134ce7320
-
SHA1
5eb756750abe820c9565b489e8ac90b20c06f233
-
SHA256
f3878e3193c9cf4f56105966f1bba82ab5ffa81cb0117b3b9102e4ae405c037b
-
SHA512
24090aed61e9b7c319b400366c4876ddaa25587eed14ab04a66603cc16b6b5d637f638f22b1c77d3648690118c773afae40b94e0c94ef6c7be62facab506f240
-
SSDEEP
12288:Yy90D9PUZ3I0XPZAhrOyQJwSkcEJ2tvtwreXYUKCoWz6FW18bzK9A+LAFnC:YyQY7BAhCxccNtvtyeoU/J6FW18bzSxz
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/2772-987-0x0000000009C40000-0x000000000A258000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 65745420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 65745420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 65745420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 65745420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 65745420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 65745420.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4424 un767156.exe 3660 65745420.exe 2772 rk469979.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 65745420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 65745420.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f3878e3193c9cf4f56105966f1bba82ab5ffa81cb0117b3b9102e4ae405c037b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f3878e3193c9cf4f56105966f1bba82ab5ffa81cb0117b3b9102e4ae405c037b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un767156.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un767156.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2060 3660 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3660 65745420.exe 3660 65745420.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3660 65745420.exe Token: SeDebugPrivilege 2772 rk469979.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1372 wrote to memory of 4424 1372 f3878e3193c9cf4f56105966f1bba82ab5ffa81cb0117b3b9102e4ae405c037b.exe 83 PID 1372 wrote to memory of 4424 1372 f3878e3193c9cf4f56105966f1bba82ab5ffa81cb0117b3b9102e4ae405c037b.exe 83 PID 1372 wrote to memory of 4424 1372 f3878e3193c9cf4f56105966f1bba82ab5ffa81cb0117b3b9102e4ae405c037b.exe 83 PID 4424 wrote to memory of 3660 4424 un767156.exe 84 PID 4424 wrote to memory of 3660 4424 un767156.exe 84 PID 4424 wrote to memory of 3660 4424 un767156.exe 84 PID 4424 wrote to memory of 2772 4424 un767156.exe 93 PID 4424 wrote to memory of 2772 4424 un767156.exe 93 PID 4424 wrote to memory of 2772 4424 un767156.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3878e3193c9cf4f56105966f1bba82ab5ffa81cb0117b3b9102e4ae405c037b.exe"C:\Users\Admin\AppData\Local\Temp\f3878e3193c9cf4f56105966f1bba82ab5ffa81cb0117b3b9102e4ae405c037b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un767156.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un767156.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\65745420.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\65745420.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 10964⤵
- Program crash
PID:2060
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk469979.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk469979.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3660 -ip 36601⤵PID:2704
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
540KB
MD5e7013ba8775cc855b3e16226989c0e96
SHA1e0a77ced0e2d33194346bb83f1755c1c3d7a8e7f
SHA2567356ea11a956704246ec5cb9f852e9bed8123f1e68ba6d80e6c064b4183aebec
SHA512be664dd23061e7cdafb3b169cfda5250b1f180dfbfc82e7c409ec542494379c5430156e011c5fc65866d5ca8649d4b663d36608c06f0f5f350417f1b60991e55
-
Filesize
540KB
MD5e7013ba8775cc855b3e16226989c0e96
SHA1e0a77ced0e2d33194346bb83f1755c1c3d7a8e7f
SHA2567356ea11a956704246ec5cb9f852e9bed8123f1e68ba6d80e6c064b4183aebec
SHA512be664dd23061e7cdafb3b169cfda5250b1f180dfbfc82e7c409ec542494379c5430156e011c5fc65866d5ca8649d4b663d36608c06f0f5f350417f1b60991e55
-
Filesize
258KB
MD563fad0828043cd7e27373613053c89be
SHA14c5bb83fde449f75dff5dc3996f67c96f0eeb655
SHA2569d8d3b9a06e0e3970220b454d58a30c75cba2913f2f7385d766b19d985235922
SHA5122984c26096ada19b72dffc66aebdefed1723f09f1c806914e6930c10ecae01f565339b29b888899d4e1e5de0a9791e767ac959029daaf10ca77c2ef3d848df5b
-
Filesize
258KB
MD563fad0828043cd7e27373613053c89be
SHA14c5bb83fde449f75dff5dc3996f67c96f0eeb655
SHA2569d8d3b9a06e0e3970220b454d58a30c75cba2913f2f7385d766b19d985235922
SHA5122984c26096ada19b72dffc66aebdefed1723f09f1c806914e6930c10ecae01f565339b29b888899d4e1e5de0a9791e767ac959029daaf10ca77c2ef3d848df5b
-
Filesize
340KB
MD57d89039aa8848f728d64988feb89abc9
SHA16344a11b85b889f69b9cceadedb8921909654fc6
SHA256b620eb337f466925899eec924e2381f77381cf95c1f4727b8a16126f17e6dc97
SHA512c1c9983802b93ff4b8323cff71719cfeff00f8728c36223bf81b1364ae0d6ffb11397bf97c2e875bfd2cab550cf1fa64959b653c12665b94dbdf640f067752eb
-
Filesize
340KB
MD57d89039aa8848f728d64988feb89abc9
SHA16344a11b85b889f69b9cceadedb8921909654fc6
SHA256b620eb337f466925899eec924e2381f77381cf95c1f4727b8a16126f17e6dc97
SHA512c1c9983802b93ff4b8323cff71719cfeff00f8728c36223bf81b1364ae0d6ffb11397bf97c2e875bfd2cab550cf1fa64959b653c12665b94dbdf640f067752eb