Analysis
-
max time kernel
163s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 18:28
Static task
static1
Behavioral task
behavioral1
Sample
64bc5be8e323b038ba78d702390c12aa4ddfa3f34afd515a61ede1833a2741a8.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
64bc5be8e323b038ba78d702390c12aa4ddfa3f34afd515a61ede1833a2741a8.exe
Resource
win10v2004-20230220-en
General
-
Target
64bc5be8e323b038ba78d702390c12aa4ddfa3f34afd515a61ede1833a2741a8.exe
-
Size
587KB
-
MD5
fbf537cc0ac02ea7aa7aa5bc0671863f
-
SHA1
884c98ee8b72763589a0d806da6d678710993943
-
SHA256
64bc5be8e323b038ba78d702390c12aa4ddfa3f34afd515a61ede1833a2741a8
-
SHA512
6314170c1df6c87aa8731dd1eb553e8a5e21b547273bbb0c3cee40d4da5391f201c753057e7f4c15e7a06a0bb0f485bfa213b44a01085a7899d730e0d9f3d605
-
SSDEEP
12288:uMrFy90yalWUP2uJvwRLIrMfccbPLACo34kbe:zyAzPnaRL7fVbPU1C
Malware Config
Extracted
redline
daris
217.196.96.56:4138
-
auth_value
3491f24ae0250969cd45ce4b3fe77549
Signatures
-
Detects Redline Stealer samples 3 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1300-148-0x000000000AB90000-0x000000000B1A8000-memory.dmp redline_stealer behavioral2/memory/1300-156-0x000000000B220000-0x000000000B286000-memory.dmp redline_stealer behavioral2/memory/1300-158-0x000000000B7C0000-0x000000000B982000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h4420459.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h4420459.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h4420459.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h4420459.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h4420459.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h4420459.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 376 x4303588.exe 1300 g3417661.exe 2608 h4420459.exe 4340 i4804153.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h4420459.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h4420459.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 64bc5be8e323b038ba78d702390c12aa4ddfa3f34afd515a61ede1833a2741a8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 64bc5be8e323b038ba78d702390c12aa4ddfa3f34afd515a61ede1833a2741a8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce x4303588.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x4303588.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash 1 IoCs
pid pid_target Process procid_target 2304 2608 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1300 g3417661.exe 1300 g3417661.exe 2608 h4420459.exe 2608 h4420459.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1300 g3417661.exe Token: SeDebugPrivilege 2608 h4420459.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1128 wrote to memory of 376 1128 64bc5be8e323b038ba78d702390c12aa4ddfa3f34afd515a61ede1833a2741a8.exe 82 PID 1128 wrote to memory of 376 1128 64bc5be8e323b038ba78d702390c12aa4ddfa3f34afd515a61ede1833a2741a8.exe 82 PID 1128 wrote to memory of 376 1128 64bc5be8e323b038ba78d702390c12aa4ddfa3f34afd515a61ede1833a2741a8.exe 82 PID 376 wrote to memory of 1300 376 x4303588.exe 83 PID 376 wrote to memory of 1300 376 x4303588.exe 83 PID 376 wrote to memory of 1300 376 x4303588.exe 83 PID 376 wrote to memory of 2608 376 x4303588.exe 89 PID 376 wrote to memory of 2608 376 x4303588.exe 89 PID 376 wrote to memory of 2608 376 x4303588.exe 89 PID 1128 wrote to memory of 4340 1128 64bc5be8e323b038ba78d702390c12aa4ddfa3f34afd515a61ede1833a2741a8.exe 96 PID 1128 wrote to memory of 4340 1128 64bc5be8e323b038ba78d702390c12aa4ddfa3f34afd515a61ede1833a2741a8.exe 96 PID 1128 wrote to memory of 4340 1128 64bc5be8e323b038ba78d702390c12aa4ddfa3f34afd515a61ede1833a2741a8.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\64bc5be8e323b038ba78d702390c12aa4ddfa3f34afd515a61ede1833a2741a8.exe"C:\Users\Admin\AppData\Local\Temp\64bc5be8e323b038ba78d702390c12aa4ddfa3f34afd515a61ede1833a2741a8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4303588.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4303588.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g3417661.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g3417661.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1300
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4420459.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4420459.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 10804⤵
- Program crash
PID:2304
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4804153.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i4804153.exe2⤵
- Executes dropped EXE
PID:4340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2608 -ip 26081⤵PID:2788
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD58f4271cf884d6c986dcd73839f96c8e0
SHA16c8a1beec6cd4244f40a6133865f98f8e8212bda
SHA256bff491fefd7678904fbe47e3e6c81f0241ecb815e289ba13fad56dd08288a391
SHA512ac0ab89519ca512b747901b4ba6e8cb74afb253f8fb50f09fe95bcc83379098495deab0519d16d610e1ba138f11912864b379d3fa20008a10fe492949fd3dd40
-
Filesize
206KB
MD58f4271cf884d6c986dcd73839f96c8e0
SHA16c8a1beec6cd4244f40a6133865f98f8e8212bda
SHA256bff491fefd7678904fbe47e3e6c81f0241ecb815e289ba13fad56dd08288a391
SHA512ac0ab89519ca512b747901b4ba6e8cb74afb253f8fb50f09fe95bcc83379098495deab0519d16d610e1ba138f11912864b379d3fa20008a10fe492949fd3dd40
-
Filesize
415KB
MD5915fcb35636259d992d2f7ef9fcebb95
SHA12e287a37d666b17d2e1b9239ab1886e7369722d6
SHA256f68e7c63eb35dce768c40fb46373fa3b82413b60e122c87a3ad88ced90962117
SHA51240babfb691f0726313ceb34230643460918460b6befbf881d56362456606a8b46e36285b17b3d7abb3c39a0e1aa4f592ff01d8f60a520d8997324789c28c9127
-
Filesize
415KB
MD5915fcb35636259d992d2f7ef9fcebb95
SHA12e287a37d666b17d2e1b9239ab1886e7369722d6
SHA256f68e7c63eb35dce768c40fb46373fa3b82413b60e122c87a3ad88ced90962117
SHA51240babfb691f0726313ceb34230643460918460b6befbf881d56362456606a8b46e36285b17b3d7abb3c39a0e1aa4f592ff01d8f60a520d8997324789c28c9127
-
Filesize
168KB
MD5d5bc897b3c8fbf83a9a64b506bc743b3
SHA1463bb03a82f519fd6f157c72cea3e76aa680feb5
SHA256764eba4637d61e2fcab9b7e2aa0e9b5769573e1eced13c8790b92eedd6024bf5
SHA512b2872327ed2f7b32fdef26948940bcd38f878baf92efad9db41dd733e86875ff48e63a8858c6f7e89cdb4d73862b1f5b9272b0477b1316d227e0b03b703b0773
-
Filesize
168KB
MD5d5bc897b3c8fbf83a9a64b506bc743b3
SHA1463bb03a82f519fd6f157c72cea3e76aa680feb5
SHA256764eba4637d61e2fcab9b7e2aa0e9b5769573e1eced13c8790b92eedd6024bf5
SHA512b2872327ed2f7b32fdef26948940bcd38f878baf92efad9db41dd733e86875ff48e63a8858c6f7e89cdb4d73862b1f5b9272b0477b1316d227e0b03b703b0773
-
Filesize
360KB
MD5b58dad15f13abfc7f917d442fbe1a9b0
SHA1672dfe5fb8c0d488637e37dff3a4e96427293dee
SHA256814953835079a07dedc6cfc8916980d0c3c0d6c4a5c2374a044f5be9bb3546ae
SHA5124a62d110ae056fef4de8765df7890625a2f99a5fff9acc06f9f9896fa2224878f9473f5d4a9e646b5f3d2366e84dde145bcdb54e62e6eabae71e824ce80c6d84
-
Filesize
360KB
MD5b58dad15f13abfc7f917d442fbe1a9b0
SHA1672dfe5fb8c0d488637e37dff3a4e96427293dee
SHA256814953835079a07dedc6cfc8916980d0c3c0d6c4a5c2374a044f5be9bb3546ae
SHA5124a62d110ae056fef4de8765df7890625a2f99a5fff9acc06f9f9896fa2224878f9473f5d4a9e646b5f3d2366e84dde145bcdb54e62e6eabae71e824ce80c6d84