Analysis
-
max time kernel
146s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 18:41
Static task
static1
Behavioral task
behavioral1
Sample
9d5ccc8b4ddbec34e19d13aa8391f4f3d2c89e90036212cb6f862fb7d954d9db.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9d5ccc8b4ddbec34e19d13aa8391f4f3d2c89e90036212cb6f862fb7d954d9db.exe
Resource
win10v2004-20230220-en
General
-
Target
9d5ccc8b4ddbec34e19d13aa8391f4f3d2c89e90036212cb6f862fb7d954d9db.exe
-
Size
690KB
-
MD5
f8f94d9fc049a9ccc9be5e9fbdd3f1a9
-
SHA1
dc60384e67de7035339832e31d5139c41479ca26
-
SHA256
9d5ccc8b4ddbec34e19d13aa8391f4f3d2c89e90036212cb6f862fb7d954d9db
-
SHA512
67329f11acbf62bcde00353c26c2c593e982721184b2cea749bfa3289ecbb39804c4241b9f87568db0cf3505b9361062de5525de8081a70587a5933350510861
-
SSDEEP
12288:4y90L0U8VB5KOE0F6cSDKYyWIziAYom00qX2KmB194k17/Y:4yhU8VTKT0Ik2AY9g2KYDTjY
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3460-989-0x0000000007660000-0x0000000007C78000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 58392694.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 58392694.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 58392694.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 58392694.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 58392694.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 58392694.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 220 un720969.exe 1452 58392694.exe 3460 rk103705.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 58392694.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 58392694.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un720969.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un720969.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9d5ccc8b4ddbec34e19d13aa8391f4f3d2c89e90036212cb6f862fb7d954d9db.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9d5ccc8b4ddbec34e19d13aa8391f4f3d2c89e90036212cb6f862fb7d954d9db.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4652 1452 WerFault.exe 88 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1452 58392694.exe 1452 58392694.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1452 58392694.exe Token: SeDebugPrivilege 3460 rk103705.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1636 wrote to memory of 220 1636 9d5ccc8b4ddbec34e19d13aa8391f4f3d2c89e90036212cb6f862fb7d954d9db.exe 87 PID 1636 wrote to memory of 220 1636 9d5ccc8b4ddbec34e19d13aa8391f4f3d2c89e90036212cb6f862fb7d954d9db.exe 87 PID 1636 wrote to memory of 220 1636 9d5ccc8b4ddbec34e19d13aa8391f4f3d2c89e90036212cb6f862fb7d954d9db.exe 87 PID 220 wrote to memory of 1452 220 un720969.exe 88 PID 220 wrote to memory of 1452 220 un720969.exe 88 PID 220 wrote to memory of 1452 220 un720969.exe 88 PID 220 wrote to memory of 3460 220 un720969.exe 95 PID 220 wrote to memory of 3460 220 un720969.exe 95 PID 220 wrote to memory of 3460 220 un720969.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d5ccc8b4ddbec34e19d13aa8391f4f3d2c89e90036212cb6f862fb7d954d9db.exe"C:\Users\Admin\AppData\Local\Temp\9d5ccc8b4ddbec34e19d13aa8391f4f3d2c89e90036212cb6f862fb7d954d9db.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un720969.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un720969.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\58392694.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\58392694.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1452 -s 10804⤵
- Program crash
PID:4652
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk103705.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk103705.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3460
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1452 -ip 14521⤵PID:4564
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD5b17a5eb94041f4dde9825f8f2d378711
SHA17c05b63f81de92fd917e9b5a4eacdfd5dd7847ca
SHA256a5c8e5ac3f8bd5c9dc758ce436fc62e497c2ce941a8d02e2d5c44758e1295eb5
SHA512bd2240d5a476d588521cc8ff72fa8967c0f2a1852d7ab19eb30162e28bf55e99eb6949321be1e22b19685c7d92c8b9ff3295cf12a313aa95ca3d1182289ebcc8
-
Filesize
536KB
MD5b17a5eb94041f4dde9825f8f2d378711
SHA17c05b63f81de92fd917e9b5a4eacdfd5dd7847ca
SHA256a5c8e5ac3f8bd5c9dc758ce436fc62e497c2ce941a8d02e2d5c44758e1295eb5
SHA512bd2240d5a476d588521cc8ff72fa8967c0f2a1852d7ab19eb30162e28bf55e99eb6949321be1e22b19685c7d92c8b9ff3295cf12a313aa95ca3d1182289ebcc8
-
Filesize
259KB
MD50ffe894137924ea28e396ca5523d5f2f
SHA197569cea2cf7314150c6b499671ec93317e382a0
SHA256e04e03ddd14141abe3b7249f8885d1a9243c3981cae3b657e4196b15412f705a
SHA512893fad59d0f32eb8bd485ae1415c9a96e26953821314fc584cdafbd5cf09d40dcf89271a333d511f911ecad34465e8234da3474bb2b02863ed4f79b5dd3e44c3
-
Filesize
259KB
MD50ffe894137924ea28e396ca5523d5f2f
SHA197569cea2cf7314150c6b499671ec93317e382a0
SHA256e04e03ddd14141abe3b7249f8885d1a9243c3981cae3b657e4196b15412f705a
SHA512893fad59d0f32eb8bd485ae1415c9a96e26953821314fc584cdafbd5cf09d40dcf89271a333d511f911ecad34465e8234da3474bb2b02863ed4f79b5dd3e44c3
-
Filesize
341KB
MD503bd2aa6d7e42cbefe47d2255205f155
SHA153ca51eedb3c598b620d8f1aa479d928e0bb59b3
SHA25632a3acfacdb23aad64ce33a8ffc660b6a0285d0b3b1f8ebf147dcc5d35fa77b2
SHA51281afaacd9b76f41af5fb59bb3743fac53ecd75d88ad9a5e29eab58df396b457c88d1e5c322d183d58e9661b22b5be0621e8161f71fdfc049734d0ed8e7dcd00f
-
Filesize
341KB
MD503bd2aa6d7e42cbefe47d2255205f155
SHA153ca51eedb3c598b620d8f1aa479d928e0bb59b3
SHA25632a3acfacdb23aad64ce33a8ffc660b6a0285d0b3b1f8ebf147dcc5d35fa77b2
SHA51281afaacd9b76f41af5fb59bb3743fac53ecd75d88ad9a5e29eab58df396b457c88d1e5c322d183d58e9661b22b5be0621e8161f71fdfc049734d0ed8e7dcd00f