Analysis
-
max time kernel
149s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 18:41
Static task
static1
Behavioral task
behavioral1
Sample
9d6d356cf995c731752fc56e5ed866550c0010c522f119b706d60e72cb469d32.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9d6d356cf995c731752fc56e5ed866550c0010c522f119b706d60e72cb469d32.exe
Resource
win10v2004-20230220-en
General
-
Target
9d6d356cf995c731752fc56e5ed866550c0010c522f119b706d60e72cb469d32.exe
-
Size
693KB
-
MD5
a88b7668feabe5693c36f50e174514bb
-
SHA1
57694cdea9b5c57949c52547976035166fb87cce
-
SHA256
9d6d356cf995c731752fc56e5ed866550c0010c522f119b706d60e72cb469d32
-
SHA512
774a6a86147adadacaf565b67539d2fd8e4ee435a8f56075ac705f66f6e71980d703fb9ffdfda460b45284f0944a1cf1120a194b51f0a77f561a278a917bb32a
-
SSDEEP
12288:Py90Isk/9Kdf0n0yUi4lo9WX1cIqlcwKKrzP6IhgZ8VNV7m/Nyeg:Pyvsd0nHr4Oy/yzzyANV7mljg
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3160-989-0x0000000009D40000-0x000000000A358000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 37996797.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 37996797.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 37996797.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 37996797.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 37996797.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 37996797.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2272 un733981.exe 2220 37996797.exe 3160 rk675113.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 37996797.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 37996797.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un733981.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9d6d356cf995c731752fc56e5ed866550c0010c522f119b706d60e72cb469d32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9d6d356cf995c731752fc56e5ed866550c0010c522f119b706d60e72cb469d32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un733981.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1996 2220 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2220 37996797.exe 2220 37996797.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2220 37996797.exe Token: SeDebugPrivilege 3160 rk675113.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4648 wrote to memory of 2272 4648 9d6d356cf995c731752fc56e5ed866550c0010c522f119b706d60e72cb469d32.exe 84 PID 4648 wrote to memory of 2272 4648 9d6d356cf995c731752fc56e5ed866550c0010c522f119b706d60e72cb469d32.exe 84 PID 4648 wrote to memory of 2272 4648 9d6d356cf995c731752fc56e5ed866550c0010c522f119b706d60e72cb469d32.exe 84 PID 2272 wrote to memory of 2220 2272 un733981.exe 86 PID 2272 wrote to memory of 2220 2272 un733981.exe 86 PID 2272 wrote to memory of 2220 2272 un733981.exe 86 PID 2272 wrote to memory of 3160 2272 un733981.exe 89 PID 2272 wrote to memory of 3160 2272 un733981.exe 89 PID 2272 wrote to memory of 3160 2272 un733981.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d6d356cf995c731752fc56e5ed866550c0010c522f119b706d60e72cb469d32.exe"C:\Users\Admin\AppData\Local\Temp\9d6d356cf995c731752fc56e5ed866550c0010c522f119b706d60e72cb469d32.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un733981.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un733981.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\37996797.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\37996797.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 10844⤵
- Program crash
PID:1996
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk675113.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk675113.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3160
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2220 -ip 22201⤵PID:4216
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
540KB
MD591a8787981de63db06eedc716dafc4eb
SHA1066bfaae3711318bf9d7800fb18771957449fee5
SHA256a05c3b24ad789d70f778518d0b734751184a0eaf575fb16b37f4dcea926490b5
SHA512a29825dd68459d05233ededc667090ad7c136918b479bebe701e0ad56fb57068c3610899d8b82f9d2466b28bf2d799d2385d41faf2d84b794997ceb571175f75
-
Filesize
540KB
MD591a8787981de63db06eedc716dafc4eb
SHA1066bfaae3711318bf9d7800fb18771957449fee5
SHA256a05c3b24ad789d70f778518d0b734751184a0eaf575fb16b37f4dcea926490b5
SHA512a29825dd68459d05233ededc667090ad7c136918b479bebe701e0ad56fb57068c3610899d8b82f9d2466b28bf2d799d2385d41faf2d84b794997ceb571175f75
-
Filesize
258KB
MD52833562e7aa9e6e66d9ad74bacbef8ef
SHA1a57630bcdaed38793c339f96da73aa56d385ac0c
SHA2567272cf513a5939b1b1442454d7e307bd89d8197137a2f636fc691126c2f1fdfa
SHA5127763cb4b4b264e985e0fe1cd4276706e65cea4b36a6b3da7724e0579fb079ded93395ca97732a637f262ab53d73bfceb5dd31e67941bb0fdb930fc92e212de1a
-
Filesize
258KB
MD52833562e7aa9e6e66d9ad74bacbef8ef
SHA1a57630bcdaed38793c339f96da73aa56d385ac0c
SHA2567272cf513a5939b1b1442454d7e307bd89d8197137a2f636fc691126c2f1fdfa
SHA5127763cb4b4b264e985e0fe1cd4276706e65cea4b36a6b3da7724e0579fb079ded93395ca97732a637f262ab53d73bfceb5dd31e67941bb0fdb930fc92e212de1a
-
Filesize
341KB
MD546695c44f10bfa53df436caf2c691b8e
SHA179b4057c2ab423e078cfd85634496427ae967d8f
SHA256f62d4d56dd0c7b03fbfe5a256601b73038a7ad4689c459dd9da61f54ac5658e9
SHA512201851d13cab0bcd1f8befacabd19e9b0c209e223a3e2c55acf9a869b19fc2972a952fbf2e7e7316ceb815927479f5e1d99c547d4fdd89f65d622909b0e47566
-
Filesize
341KB
MD546695c44f10bfa53df436caf2c691b8e
SHA179b4057c2ab423e078cfd85634496427ae967d8f
SHA256f62d4d56dd0c7b03fbfe5a256601b73038a7ad4689c459dd9da61f54ac5658e9
SHA512201851d13cab0bcd1f8befacabd19e9b0c209e223a3e2c55acf9a869b19fc2972a952fbf2e7e7316ceb815927479f5e1d99c547d4fdd89f65d622909b0e47566