Analysis
-
max time kernel
152s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 19:03
Static task
static1
Behavioral task
behavioral1
Sample
b0aa21cba7e2469b90c60df9e8763b58dd4f359ffb4d7319dd9c65dc1ce0ac75.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b0aa21cba7e2469b90c60df9e8763b58dd4f359ffb4d7319dd9c65dc1ce0ac75.exe
Resource
win10v2004-20230220-en
General
-
Target
b0aa21cba7e2469b90c60df9e8763b58dd4f359ffb4d7319dd9c65dc1ce0ac75.exe
-
Size
696KB
-
MD5
46c5d415ae900547c67e46d2c5b10e99
-
SHA1
4265c640004d22544e23733190a47f20c424af64
-
SHA256
b0aa21cba7e2469b90c60df9e8763b58dd4f359ffb4d7319dd9c65dc1ce0ac75
-
SHA512
329fff8777f25c0cf604b80859f93afa1ba2deb422cb7d8f3df1a8ba3c6c6ec9fb7978f1f0d5dc85720d4e26e7e0e53a2f04901cbaac7363b140e6164ec2014d
-
SSDEEP
12288:y/y90HghzsWWrh0ArHiRKksjQFxr8UFdMM9e6Z52PBb0c/:gyNhwWWrZ4KoFxYUFHougPBYc/
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4936-986-0x0000000009CC0000-0x000000000A2D8000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 61497159.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 61497159.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 61497159.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 61497159.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 61497159.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 61497159.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4476 un882836.exe 1008 61497159.exe 4936 rk460060.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 61497159.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 61497159.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b0aa21cba7e2469b90c60df9e8763b58dd4f359ffb4d7319dd9c65dc1ce0ac75.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b0aa21cba7e2469b90c60df9e8763b58dd4f359ffb4d7319dd9c65dc1ce0ac75.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un882836.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un882836.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4364 1008 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1008 61497159.exe 1008 61497159.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1008 61497159.exe Token: SeDebugPrivilege 4936 rk460060.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1172 wrote to memory of 4476 1172 b0aa21cba7e2469b90c60df9e8763b58dd4f359ffb4d7319dd9c65dc1ce0ac75.exe 89 PID 1172 wrote to memory of 4476 1172 b0aa21cba7e2469b90c60df9e8763b58dd4f359ffb4d7319dd9c65dc1ce0ac75.exe 89 PID 1172 wrote to memory of 4476 1172 b0aa21cba7e2469b90c60df9e8763b58dd4f359ffb4d7319dd9c65dc1ce0ac75.exe 89 PID 4476 wrote to memory of 1008 4476 un882836.exe 90 PID 4476 wrote to memory of 1008 4476 un882836.exe 90 PID 4476 wrote to memory of 1008 4476 un882836.exe 90 PID 4476 wrote to memory of 4936 4476 un882836.exe 100 PID 4476 wrote to memory of 4936 4476 un882836.exe 100 PID 4476 wrote to memory of 4936 4476 un882836.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0aa21cba7e2469b90c60df9e8763b58dd4f359ffb4d7319dd9c65dc1ce0ac75.exe"C:\Users\Admin\AppData\Local\Temp\b0aa21cba7e2469b90c60df9e8763b58dd4f359ffb4d7319dd9c65dc1ce0ac75.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un882836.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un882836.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\61497159.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\61497159.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1008 -s 10964⤵
- Program crash
PID:4364
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk460060.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk460060.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4936
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1008 -ip 10081⤵PID:3964
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
542KB
MD5acd518c7fc1539c9e2ab7d9222a0317a
SHA1bd305922855413ce3a5bcf66976c1fed64f94b08
SHA256dfdf3a0d0f49b07349ae9ac748d44682875a2bca57bc75b4efa47d0d0de6367f
SHA5129e22d67a59912fea9b4a9e237653c3605fb39cd74a53e474607e0a559b87006b51c1511235e78f5e34dddcba618c1083259a57330388cc86160fb2df5e4b70f0
-
Filesize
542KB
MD5acd518c7fc1539c9e2ab7d9222a0317a
SHA1bd305922855413ce3a5bcf66976c1fed64f94b08
SHA256dfdf3a0d0f49b07349ae9ac748d44682875a2bca57bc75b4efa47d0d0de6367f
SHA5129e22d67a59912fea9b4a9e237653c3605fb39cd74a53e474607e0a559b87006b51c1511235e78f5e34dddcba618c1083259a57330388cc86160fb2df5e4b70f0
-
Filesize
263KB
MD58aa0057da72dbc4de69388395d30f7bf
SHA150d2b3aee624feaab7b78831291e695416b88fc6
SHA256aa51dfcd6bc031142d0433c52cce2a53d92292ca027a87cb820016a585574049
SHA512b9bb645c24d2d7288415953624ad89ac61aa62da4fb8900d1228e30edcc73d76d908958bf56364eaa8058327b52d5464e0ff2c0b16a0e4a976007b3b9c1b286e
-
Filesize
263KB
MD58aa0057da72dbc4de69388395d30f7bf
SHA150d2b3aee624feaab7b78831291e695416b88fc6
SHA256aa51dfcd6bc031142d0433c52cce2a53d92292ca027a87cb820016a585574049
SHA512b9bb645c24d2d7288415953624ad89ac61aa62da4fb8900d1228e30edcc73d76d908958bf56364eaa8058327b52d5464e0ff2c0b16a0e4a976007b3b9c1b286e
-
Filesize
328KB
MD54badfb5e978c89ea1d82ee094ed1925c
SHA1bbd5d4c46e95e5c86463e17cb0f1058cc2eb5bff
SHA2568f330296fcca3d208f94b4cbb008d8f79309b08b110735abe15731881f2520ff
SHA51267731f85df6070abbab22331b36c3c29746c7083fb00deb1611655c17dfda40638bf7048b95d8092d9b46996a0124fa4efdb7154ec27a5d5a09c87690c8ecd4a
-
Filesize
328KB
MD54badfb5e978c89ea1d82ee094ed1925c
SHA1bbd5d4c46e95e5c86463e17cb0f1058cc2eb5bff
SHA2568f330296fcca3d208f94b4cbb008d8f79309b08b110735abe15731881f2520ff
SHA51267731f85df6070abbab22331b36c3c29746c7083fb00deb1611655c17dfda40638bf7048b95d8092d9b46996a0124fa4efdb7154ec27a5d5a09c87690c8ecd4a