Analysis
-
max time kernel
144s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 18:58
Static task
static1
Behavioral task
behavioral1
Sample
adb8a516de9049b30c71a7fa8c22ea5fe5aad3d935163dae41d45133eb775db2.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
adb8a516de9049b30c71a7fa8c22ea5fe5aad3d935163dae41d45133eb775db2.exe
Resource
win10v2004-20230220-en
General
-
Target
adb8a516de9049b30c71a7fa8c22ea5fe5aad3d935163dae41d45133eb775db2.exe
-
Size
695KB
-
MD5
c55521c1467176dbdcaf2bd72ad83d11
-
SHA1
3a30a341b20248a4b5a48a02d83d501b79264c5a
-
SHA256
adb8a516de9049b30c71a7fa8c22ea5fe5aad3d935163dae41d45133eb775db2
-
SHA512
f93e75618cc90e592e6ca5c8871084e81518f0aca592c27b514fde7b92a053b79dfa63429a2f01c17d3054f1eabe1afac06584bbb46a2bf7a040e4bb0351f4e1
-
SSDEEP
12288:Ky90PpS6bt+3NzXfTbTlVSDHE+54BCUj5vleu2KdWrkei:KyUS3NzXrbJVSDr4BCU7WKdFei
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/632-987-0x0000000009C40000-0x000000000A258000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 28300973.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 28300973.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 28300973.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 28300973.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 28300973.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 28300973.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2396 un620182.exe 1276 28300973.exe 632 rk252687.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 28300973.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 28300973.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce adb8a516de9049b30c71a7fa8c22ea5fe5aad3d935163dae41d45133eb775db2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" adb8a516de9049b30c71a7fa8c22ea5fe5aad3d935163dae41d45133eb775db2.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un620182.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un620182.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3148 1276 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1276 28300973.exe 1276 28300973.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1276 28300973.exe Token: SeDebugPrivilege 632 rk252687.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4792 wrote to memory of 2396 4792 adb8a516de9049b30c71a7fa8c22ea5fe5aad3d935163dae41d45133eb775db2.exe 84 PID 4792 wrote to memory of 2396 4792 adb8a516de9049b30c71a7fa8c22ea5fe5aad3d935163dae41d45133eb775db2.exe 84 PID 4792 wrote to memory of 2396 4792 adb8a516de9049b30c71a7fa8c22ea5fe5aad3d935163dae41d45133eb775db2.exe 84 PID 2396 wrote to memory of 1276 2396 un620182.exe 85 PID 2396 wrote to memory of 1276 2396 un620182.exe 85 PID 2396 wrote to memory of 1276 2396 un620182.exe 85 PID 2396 wrote to memory of 632 2396 un620182.exe 89 PID 2396 wrote to memory of 632 2396 un620182.exe 89 PID 2396 wrote to memory of 632 2396 un620182.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\adb8a516de9049b30c71a7fa8c22ea5fe5aad3d935163dae41d45133eb775db2.exe"C:\Users\Admin\AppData\Local\Temp\adb8a516de9049b30c71a7fa8c22ea5fe5aad3d935163dae41d45133eb775db2.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un620182.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un620182.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\28300973.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\28300973.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1276 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1276 -s 10124⤵
- Program crash
PID:3148
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk252687.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk252687.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:632
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1276 -ip 12761⤵PID:4336
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
541KB
MD543c7fef1784e5689affd3acf0e66311e
SHA1314178ba12fec3e36a17a0bf0a7a81badc2e91b2
SHA256ac19365be88b6887e08796079d4ed7a1dbe490ff009982537724ced5cfff1b70
SHA512a83f77779963ac81aa5050412c5919ceaabdbb7fe105982f7fb2add5b42c3092694feda9bdff4afbf4c6ec51be1f5ff8971a6004a03fb6195b355ab9dc4bc46a
-
Filesize
541KB
MD543c7fef1784e5689affd3acf0e66311e
SHA1314178ba12fec3e36a17a0bf0a7a81badc2e91b2
SHA256ac19365be88b6887e08796079d4ed7a1dbe490ff009982537724ced5cfff1b70
SHA512a83f77779963ac81aa5050412c5919ceaabdbb7fe105982f7fb2add5b42c3092694feda9bdff4afbf4c6ec51be1f5ff8971a6004a03fb6195b355ab9dc4bc46a
-
Filesize
257KB
MD5d5f97e5be9b0acc9bbe4b3a64fdbd2b8
SHA1f1801712a5d8845011fe7ea78837508477b04557
SHA256c3eff1a2308a9a230d725850489923d7ceb406715bcb70aa3510196aeae2364c
SHA5129023bd8d20f35849074fdcf9fb1291bf282d7e5d971d7cd62b9780de1c2e9b84c81284878b83c0de8234280fde95645cf30d1abd242512ffe472863c3ea81858
-
Filesize
257KB
MD5d5f97e5be9b0acc9bbe4b3a64fdbd2b8
SHA1f1801712a5d8845011fe7ea78837508477b04557
SHA256c3eff1a2308a9a230d725850489923d7ceb406715bcb70aa3510196aeae2364c
SHA5129023bd8d20f35849074fdcf9fb1291bf282d7e5d971d7cd62b9780de1c2e9b84c81284878b83c0de8234280fde95645cf30d1abd242512ffe472863c3ea81858
-
Filesize
340KB
MD547188fe98539153b5ac77be5203a7bf0
SHA176e4eb46c1ab67297a0bf1f5a32d6480c47e3c4a
SHA2561a9034682c12255f29e36f8417ac92c1905431ec775621b93b21466192c5b913
SHA512098a0a0dbe356271992fc59e32550fa09f6d13969fb017eebffac73012f6e9db67c75d64e7edd7004d112903e6e53eafbc2b7842c74eb9ed5d2e7216c901fbc1
-
Filesize
340KB
MD547188fe98539153b5ac77be5203a7bf0
SHA176e4eb46c1ab67297a0bf1f5a32d6480c47e3c4a
SHA2561a9034682c12255f29e36f8417ac92c1905431ec775621b93b21466192c5b913
SHA512098a0a0dbe356271992fc59e32550fa09f6d13969fb017eebffac73012f6e9db67c75d64e7edd7004d112903e6e53eafbc2b7842c74eb9ed5d2e7216c901fbc1