Analysis
-
max time kernel
151s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 19:03
Static task
static1
Behavioral task
behavioral1
Sample
b10022b08b58c6b61a664f09454b46761c9ed32566e041c68f1770c93d277eae.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b10022b08b58c6b61a664f09454b46761c9ed32566e041c68f1770c93d277eae.exe
Resource
win10v2004-20230220-en
General
-
Target
b10022b08b58c6b61a664f09454b46761c9ed32566e041c68f1770c93d277eae.exe
-
Size
694KB
-
MD5
c60c4a001ba4efc0aa692545796f8a6b
-
SHA1
c9f03196f34962d25fe257fee95b91b4c2d32cc1
-
SHA256
b10022b08b58c6b61a664f09454b46761c9ed32566e041c68f1770c93d277eae
-
SHA512
50109304b71eef128ea4e2ae8d03e23e782c060daf7623051336ace713b5054d8300ab4847022dafee65269567cb5ad850bdce02ab358c69eeb98fb243a1cb4e
-
SSDEEP
12288:Oy905DsvczTwF8wlDUiz9DtLvF2Hjx+cqRaEIA9CEW+Y0gf4ZRr4oG42bF3:OymF/28iBDT2DkcqLjCEC0i4ZRr4R421
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4832-995-0x0000000009C70000-0x000000000A288000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 07477955.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 07477955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 07477955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 07477955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 07477955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 07477955.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1404 un930583.exe 4328 07477955.exe 4832 rk462201.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 07477955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 07477955.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b10022b08b58c6b61a664f09454b46761c9ed32566e041c68f1770c93d277eae.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un930583.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un930583.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b10022b08b58c6b61a664f09454b46761c9ed32566e041c68f1770c93d277eae.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3044 4328 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4328 07477955.exe 4328 07477955.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4328 07477955.exe Token: SeDebugPrivilege 4832 rk462201.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3548 wrote to memory of 1404 3548 b10022b08b58c6b61a664f09454b46761c9ed32566e041c68f1770c93d277eae.exe 82 PID 3548 wrote to memory of 1404 3548 b10022b08b58c6b61a664f09454b46761c9ed32566e041c68f1770c93d277eae.exe 82 PID 3548 wrote to memory of 1404 3548 b10022b08b58c6b61a664f09454b46761c9ed32566e041c68f1770c93d277eae.exe 82 PID 1404 wrote to memory of 4328 1404 un930583.exe 83 PID 1404 wrote to memory of 4328 1404 un930583.exe 83 PID 1404 wrote to memory of 4328 1404 un930583.exe 83 PID 1404 wrote to memory of 4832 1404 un930583.exe 88 PID 1404 wrote to memory of 4832 1404 un930583.exe 88 PID 1404 wrote to memory of 4832 1404 un930583.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\b10022b08b58c6b61a664f09454b46761c9ed32566e041c68f1770c93d277eae.exe"C:\Users\Admin\AppData\Local\Temp\b10022b08b58c6b61a664f09454b46761c9ed32566e041c68f1770c93d277eae.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un930583.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un930583.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\07477955.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\07477955.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4328 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4328 -s 10884⤵
- Program crash
PID:3044
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk462201.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk462201.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4328 -ip 43281⤵PID:4468
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
540KB
MD53cffb8f6c3980cae0101e1d8a2c6afcc
SHA12076ed903cd3644b96112790dd83dac874617615
SHA2562b698ab8c23c0719f0c2210d55dccb2ff62a97c9fa71029865f99c6eb52a9c71
SHA51291dc3b9665732ec532720b8292c62f99ed4146318edf8d1a429f0ddcc84c5cdcc52a36f43bfef0b2ce3daada76cad17f5c7d35dc82ed5d2998d1b8058a595f80
-
Filesize
540KB
MD53cffb8f6c3980cae0101e1d8a2c6afcc
SHA12076ed903cd3644b96112790dd83dac874617615
SHA2562b698ab8c23c0719f0c2210d55dccb2ff62a97c9fa71029865f99c6eb52a9c71
SHA51291dc3b9665732ec532720b8292c62f99ed4146318edf8d1a429f0ddcc84c5cdcc52a36f43bfef0b2ce3daada76cad17f5c7d35dc82ed5d2998d1b8058a595f80
-
Filesize
258KB
MD51e1457e485c744c5dd87670b455fbf26
SHA18adf8f94c3bf2eaa4936b27b5bc1bc032cb32414
SHA2568d4c82b5d6dd0efbc325ebb2f85b03b973ebcd936dc716fa8fd4c2ac8fdf1e26
SHA512df7ce2d41db0ff4773013136168b3e3cdaa9040286b8a5118eb45a116b11924d7bdc7366f51416ee2635339c1b6b30f0b6df1d0fe512a731f846e4ff61dabee4
-
Filesize
258KB
MD51e1457e485c744c5dd87670b455fbf26
SHA18adf8f94c3bf2eaa4936b27b5bc1bc032cb32414
SHA2568d4c82b5d6dd0efbc325ebb2f85b03b973ebcd936dc716fa8fd4c2ac8fdf1e26
SHA512df7ce2d41db0ff4773013136168b3e3cdaa9040286b8a5118eb45a116b11924d7bdc7366f51416ee2635339c1b6b30f0b6df1d0fe512a731f846e4ff61dabee4
-
Filesize
341KB
MD5c86bf5aa6613ead87fc3ddc69445de6d
SHA1f31f971df8ff70e4a6f02d573fe302b3fd73fbb3
SHA25605c74c05b42bc775eb69ce955acf3a99a2b82d78f52df01a9f36ce1f0ff5bcd7
SHA512c9555ca4cf3d541838bb37026ef7f7f4bd7fddb917eb3f64e623298044520b81cb292a4777ab580d12bcdfd927d91dd0bd463707a6a01db6ca221a5c6b2044b8
-
Filesize
341KB
MD5c86bf5aa6613ead87fc3ddc69445de6d
SHA1f31f971df8ff70e4a6f02d573fe302b3fd73fbb3
SHA25605c74c05b42bc775eb69ce955acf3a99a2b82d78f52df01a9f36ce1f0ff5bcd7
SHA512c9555ca4cf3d541838bb37026ef7f7f4bd7fddb917eb3f64e623298044520b81cb292a4777ab580d12bcdfd927d91dd0bd463707a6a01db6ca221a5c6b2044b8