Analysis
-
max time kernel
152s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 19:06
Static task
static1
Behavioral task
behavioral1
Sample
b33ee453ad2fd964e46e27535fd1c448194779fd9494d005a31d567cd0f052a8.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b33ee453ad2fd964e46e27535fd1c448194779fd9494d005a31d567cd0f052a8.exe
Resource
win10v2004-20230220-en
General
-
Target
b33ee453ad2fd964e46e27535fd1c448194779fd9494d005a31d567cd0f052a8.exe
-
Size
694KB
-
MD5
be12f1a25da41af9cd01116262da9152
-
SHA1
24a217701b079ce45c4f21af34b68098919457a4
-
SHA256
b33ee453ad2fd964e46e27535fd1c448194779fd9494d005a31d567cd0f052a8
-
SHA512
eea5ba356b47e966573772ab21a475732b33b218146e145ad2e186d1c5ccb8dcf4acca93ca7e3bec33ec1a729449796fc038147c98c6a35a93560af14fa9f269
-
SSDEEP
12288:Cy90e8MgWttzPJcKFJHIbdzDafkJ1YVK1gmOQ3ZRhu0Hq0iD5e7jw4cMYuPZ:Cy0W/z+iRIZzDaMJD+mOsj7Tue7jwzz0
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4288-988-0x0000000009D20000-0x000000000A338000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 48651618.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 48651618.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 48651618.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 48651618.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 48651618.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 48651618.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2724 un903501.exe 60 48651618.exe 4288 rk219844.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 48651618.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 48651618.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un903501.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b33ee453ad2fd964e46e27535fd1c448194779fd9494d005a31d567cd0f052a8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b33ee453ad2fd964e46e27535fd1c448194779fd9494d005a31d567cd0f052a8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un903501.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3748 60 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 60 48651618.exe 60 48651618.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 60 48651618.exe Token: SeDebugPrivilege 4288 rk219844.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1316 wrote to memory of 2724 1316 b33ee453ad2fd964e46e27535fd1c448194779fd9494d005a31d567cd0f052a8.exe 83 PID 1316 wrote to memory of 2724 1316 b33ee453ad2fd964e46e27535fd1c448194779fd9494d005a31d567cd0f052a8.exe 83 PID 1316 wrote to memory of 2724 1316 b33ee453ad2fd964e46e27535fd1c448194779fd9494d005a31d567cd0f052a8.exe 83 PID 2724 wrote to memory of 60 2724 un903501.exe 84 PID 2724 wrote to memory of 60 2724 un903501.exe 84 PID 2724 wrote to memory of 60 2724 un903501.exe 84 PID 2724 wrote to memory of 4288 2724 un903501.exe 95 PID 2724 wrote to memory of 4288 2724 un903501.exe 95 PID 2724 wrote to memory of 4288 2724 un903501.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\b33ee453ad2fd964e46e27535fd1c448194779fd9494d005a31d567cd0f052a8.exe"C:\Users\Admin\AppData\Local\Temp\b33ee453ad2fd964e46e27535fd1c448194779fd9494d005a31d567cd0f052a8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un903501.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un903501.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\48651618.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\48651618.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:60 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 60 -s 10844⤵
- Program crash
PID:3748
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk219844.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk219844.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4288
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 60 -ip 601⤵PID:4620
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
540KB
MD592251c7d83df52b7062a134ae10b1567
SHA181b94f489d659f570ca13771112121efd492d976
SHA256eb55f36fde1d9ac8302443cc47cef4f1584b144771265d3840da1a8f19e841bb
SHA5120f3b79dafd5f9b20298c923dbf9e45d2b77b157c6b73b10a117e0f0964c133d5a40db7aeb4b3888f53cbf8842bf5890c2a9f5a9c73aee9d6bcbe906f6ecf0633
-
Filesize
540KB
MD592251c7d83df52b7062a134ae10b1567
SHA181b94f489d659f570ca13771112121efd492d976
SHA256eb55f36fde1d9ac8302443cc47cef4f1584b144771265d3840da1a8f19e841bb
SHA5120f3b79dafd5f9b20298c923dbf9e45d2b77b157c6b73b10a117e0f0964c133d5a40db7aeb4b3888f53cbf8842bf5890c2a9f5a9c73aee9d6bcbe906f6ecf0633
-
Filesize
264KB
MD51d37a9350af96f84499f78213563da4c
SHA190fea2b6ab19cd27f3ef52476e5f31f21b2347ee
SHA256ca49127e2a33d65c81aad0ef86d763abd7c665a7ff3883cc1b7430d0c4ca36a3
SHA512bb4487e3f1861acccee14ddfe5c7b2bf0580f7552905fcfdeb29b00dea6eadbe42aca2f5fb735c788c006d6322e3cc7231e22be70f2488155914c702ca9d51f6
-
Filesize
264KB
MD51d37a9350af96f84499f78213563da4c
SHA190fea2b6ab19cd27f3ef52476e5f31f21b2347ee
SHA256ca49127e2a33d65c81aad0ef86d763abd7c665a7ff3883cc1b7430d0c4ca36a3
SHA512bb4487e3f1861acccee14ddfe5c7b2bf0580f7552905fcfdeb29b00dea6eadbe42aca2f5fb735c788c006d6322e3cc7231e22be70f2488155914c702ca9d51f6
-
Filesize
348KB
MD51084a9bd05558047d820b11e971a3d9c
SHA15df23c1c9986fbcf12116a23e71a1977155be30d
SHA2566c70a632789265ce4c5183784e7369583c7994f46289ad51b6775bc5974d3008
SHA512370d1223c7869088573984cc72378b0e0f07128a8f474b617ca4dadae87a064ab6fbe3c08dacf388b98cd68e18bbacb7d03e8aaf2e3411347cd6cddd3b12c3d8
-
Filesize
348KB
MD51084a9bd05558047d820b11e971a3d9c
SHA15df23c1c9986fbcf12116a23e71a1977155be30d
SHA2566c70a632789265ce4c5183784e7369583c7994f46289ad51b6775bc5974d3008
SHA512370d1223c7869088573984cc72378b0e0f07128a8f474b617ca4dadae87a064ab6fbe3c08dacf388b98cd68e18bbacb7d03e8aaf2e3411347cd6cddd3b12c3d8