Analysis
-
max time kernel
187s -
max time network
192s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 18:52
Static task
static1
Behavioral task
behavioral1
Sample
a8ae002d95449f9c9c020cc8ede21d8263cf441e7e14f77b64ebc7698579c3e5.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
a8ae002d95449f9c9c020cc8ede21d8263cf441e7e14f77b64ebc7698579c3e5.exe
Resource
win10v2004-20230220-en
General
-
Target
a8ae002d95449f9c9c020cc8ede21d8263cf441e7e14f77b64ebc7698579c3e5.exe
-
Size
690KB
-
MD5
828c599fb8490b61e5c0e44d5a2fc5ec
-
SHA1
2c69618dff7a82123b36fa20326b3b245a6a2668
-
SHA256
a8ae002d95449f9c9c020cc8ede21d8263cf441e7e14f77b64ebc7698579c3e5
-
SHA512
2eb484e163870bbb0d7b190066e2708d3b6a38a88a7c4bbe5acf0f536d569bac8efda85035f11e84cbf049f8936db853e10575ac46521b885eaf59148962ab61
-
SSDEEP
12288:iy90oDlYm5Y1pwywDwBMIt6w0j2QSbOZ/czVmCcuLO8JpuGD0Sbr0B+:iy/emWhH5bq2QFcP/puG4Sf0o
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4116-992-0x00000000075D0000-0x0000000007BE8000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 18241926.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 18241926.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 18241926.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 18241926.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 18241926.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 18241926.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2580 un813170.exe 3132 18241926.exe 4116 rk627278.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 18241926.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 18241926.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce a8ae002d95449f9c9c020cc8ede21d8263cf441e7e14f77b64ebc7698579c3e5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a8ae002d95449f9c9c020cc8ede21d8263cf441e7e14f77b64ebc7698579c3e5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un813170.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un813170.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2956 3132 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3132 18241926.exe 3132 18241926.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3132 18241926.exe Token: SeDebugPrivilege 4116 rk627278.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4228 wrote to memory of 2580 4228 a8ae002d95449f9c9c020cc8ede21d8263cf441e7e14f77b64ebc7698579c3e5.exe 81 PID 4228 wrote to memory of 2580 4228 a8ae002d95449f9c9c020cc8ede21d8263cf441e7e14f77b64ebc7698579c3e5.exe 81 PID 4228 wrote to memory of 2580 4228 a8ae002d95449f9c9c020cc8ede21d8263cf441e7e14f77b64ebc7698579c3e5.exe 81 PID 2580 wrote to memory of 3132 2580 un813170.exe 82 PID 2580 wrote to memory of 3132 2580 un813170.exe 82 PID 2580 wrote to memory of 3132 2580 un813170.exe 82 PID 2580 wrote to memory of 4116 2580 un813170.exe 86 PID 2580 wrote to memory of 4116 2580 un813170.exe 86 PID 2580 wrote to memory of 4116 2580 un813170.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8ae002d95449f9c9c020cc8ede21d8263cf441e7e14f77b64ebc7698579c3e5.exe"C:\Users\Admin\AppData\Local\Temp\a8ae002d95449f9c9c020cc8ede21d8263cf441e7e14f77b64ebc7698579c3e5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un813170.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un813170.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\18241926.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\18241926.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3132 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3132 -s 10884⤵
- Program crash
PID:2956
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk627278.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk627278.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4116
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3132 -ip 31321⤵PID:4528
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD5474471a74e86569b7519d4074bf8359e
SHA1002c76d7359721961c183c8656fc09e0c43833c5
SHA25609ccdc884ab913ba7d2593164dc28e7b22a6f4599c1d4f14f2000173e9f5b3e1
SHA51266491d39a7b8bdc75dd05f97bdd7d5cf36ce6426f63ddd136332c607d5a07458e6d050d1cfbe14d0820b63a32bb029c2587848483ed077297321f9dd8faef34d
-
Filesize
536KB
MD5474471a74e86569b7519d4074bf8359e
SHA1002c76d7359721961c183c8656fc09e0c43833c5
SHA25609ccdc884ab913ba7d2593164dc28e7b22a6f4599c1d4f14f2000173e9f5b3e1
SHA51266491d39a7b8bdc75dd05f97bdd7d5cf36ce6426f63ddd136332c607d5a07458e6d050d1cfbe14d0820b63a32bb029c2587848483ed077297321f9dd8faef34d
-
Filesize
258KB
MD515544bdfde9480702881947f97f938e8
SHA1cf04c09f96c52a61c7a2004ed86cb7d0b95f167a
SHA2569b36c0b58bcac1190484ea1c27c87903f9c6a683dcd196e3a08906c414c63a76
SHA51203ad4349cefcd96f40eb7b9f5fb1b0857795ac6f080ebd7ccb3c24c1bcbe514e55940ff69ee25290d2d00cce1aecfcc7c871ebd773e8c350aa6abdbe265c1f79
-
Filesize
258KB
MD515544bdfde9480702881947f97f938e8
SHA1cf04c09f96c52a61c7a2004ed86cb7d0b95f167a
SHA2569b36c0b58bcac1190484ea1c27c87903f9c6a683dcd196e3a08906c414c63a76
SHA51203ad4349cefcd96f40eb7b9f5fb1b0857795ac6f080ebd7ccb3c24c1bcbe514e55940ff69ee25290d2d00cce1aecfcc7c871ebd773e8c350aa6abdbe265c1f79
-
Filesize
342KB
MD5318beeab2e1f981daa3cde68e16548ad
SHA131dc9f08d57d8a628f66b98563e210c25f1297b4
SHA256bc385492acc5c945bcf4c4f4efea9030f906a319075a01b6c492cd6041c502a3
SHA5123f04239764d0417b62f1e54dc06d3614f2b21a6de41ce364f562787d009e3572190ddfd8d7b06cb48a2006dbf75491f55ddda8ff9e76a461a6aaff6478234001
-
Filesize
342KB
MD5318beeab2e1f981daa3cde68e16548ad
SHA131dc9f08d57d8a628f66b98563e210c25f1297b4
SHA256bc385492acc5c945bcf4c4f4efea9030f906a319075a01b6c492cd6041c502a3
SHA5123f04239764d0417b62f1e54dc06d3614f2b21a6de41ce364f562787d009e3572190ddfd8d7b06cb48a2006dbf75491f55ddda8ff9e76a461a6aaff6478234001