Analysis
-
max time kernel
201s -
max time network
206s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 19:09
Static task
static1
Behavioral task
behavioral1
Sample
b679418ae771b1052717ff2abed4836bd1c1ff20a3396697304e508c85c9f4f8.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b679418ae771b1052717ff2abed4836bd1c1ff20a3396697304e508c85c9f4f8.exe
Resource
win10v2004-20230220-en
General
-
Target
b679418ae771b1052717ff2abed4836bd1c1ff20a3396697304e508c85c9f4f8.exe
-
Size
690KB
-
MD5
f3d76114bb3d37f07092c2065af67b9e
-
SHA1
8bfe88e9f2a49d883b43b62930bd64fd7291eec0
-
SHA256
b679418ae771b1052717ff2abed4836bd1c1ff20a3396697304e508c85c9f4f8
-
SHA512
4cd3f7e315d677390d35dd2fe9da721db87853abbd0a911d97070519eb9b285b72ff622da27b4ec939b4b6bfd059546c3dd2ea8d156f0ec6230ad5415cf32211
-
SSDEEP
12288:2y90MFhE0jMyvXQHOUaYGw4r3DExQByzZIJbQBXaq41EMbrLyrNb6RfTYCWygxx:2yPBMEQbay4bDEhzZqgaQMb3yrNb6RTm
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3900-989-0x00000000075E0000-0x0000000007BF8000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 47738677.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 47738677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 47738677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 47738677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 47738677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 47738677.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2844 un303104.exe 3840 47738677.exe 3900 rk667911.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 47738677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 47738677.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un303104.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un303104.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b679418ae771b1052717ff2abed4836bd1c1ff20a3396697304e508c85c9f4f8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b679418ae771b1052717ff2abed4836bd1c1ff20a3396697304e508c85c9f4f8.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1116 3840 WerFault.exe 79 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3840 47738677.exe 3840 47738677.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3840 47738677.exe Token: SeDebugPrivilege 3900 rk667911.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 736 wrote to memory of 2844 736 b679418ae771b1052717ff2abed4836bd1c1ff20a3396697304e508c85c9f4f8.exe 78 PID 736 wrote to memory of 2844 736 b679418ae771b1052717ff2abed4836bd1c1ff20a3396697304e508c85c9f4f8.exe 78 PID 736 wrote to memory of 2844 736 b679418ae771b1052717ff2abed4836bd1c1ff20a3396697304e508c85c9f4f8.exe 78 PID 2844 wrote to memory of 3840 2844 un303104.exe 79 PID 2844 wrote to memory of 3840 2844 un303104.exe 79 PID 2844 wrote to memory of 3840 2844 un303104.exe 79 PID 2844 wrote to memory of 3900 2844 un303104.exe 83 PID 2844 wrote to memory of 3900 2844 un303104.exe 83 PID 2844 wrote to memory of 3900 2844 un303104.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\b679418ae771b1052717ff2abed4836bd1c1ff20a3396697304e508c85c9f4f8.exe"C:\Users\Admin\AppData\Local\Temp\b679418ae771b1052717ff2abed4836bd1c1ff20a3396697304e508c85c9f4f8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un303104.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un303104.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\47738677.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\47738677.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3840 -s 10844⤵
- Program crash
PID:1116
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk667911.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk667911.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3900
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3840 -ip 38401⤵PID:2420
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD5d67b01a4f6a9f71498dea3f4cb75af96
SHA1aca861f0945ff570a36266c8a273c4d2e2cdc7be
SHA256686bc71c4f6934ef3e485d4b159ecb219188e001fdd49b2799845b23ed762d8b
SHA5120436fd680fd39549a8ee0341a6aee7a1adca382a6596978421bab10d1131996e04a8b2c4858cab353b8407974ffaefceb344e98d36cdc1a7ab823d572253da15
-
Filesize
536KB
MD5d67b01a4f6a9f71498dea3f4cb75af96
SHA1aca861f0945ff570a36266c8a273c4d2e2cdc7be
SHA256686bc71c4f6934ef3e485d4b159ecb219188e001fdd49b2799845b23ed762d8b
SHA5120436fd680fd39549a8ee0341a6aee7a1adca382a6596978421bab10d1131996e04a8b2c4858cab353b8407974ffaefceb344e98d36cdc1a7ab823d572253da15
-
Filesize
259KB
MD5a6b1b652fa34cd189d4703f3f45287ac
SHA11face5536f7834054e0d79a276d1e24e95fba4fd
SHA2563c7da38d33869080b83fdf5a49edbfd031034da8848242c8b8dfd0dcdf3ff910
SHA5124e326c4531abffbfaa32e8686579246fd07bef1faa253ea29d18f85d932745c94a7e03e0acfb523cb018f74bf23a6e93d3696b82e7203e1eac5383b42caa25e8
-
Filesize
259KB
MD5a6b1b652fa34cd189d4703f3f45287ac
SHA11face5536f7834054e0d79a276d1e24e95fba4fd
SHA2563c7da38d33869080b83fdf5a49edbfd031034da8848242c8b8dfd0dcdf3ff910
SHA5124e326c4531abffbfaa32e8686579246fd07bef1faa253ea29d18f85d932745c94a7e03e0acfb523cb018f74bf23a6e93d3696b82e7203e1eac5383b42caa25e8
-
Filesize
341KB
MD576331c95647aefe4de939f6c7fc1de13
SHA15496a07d4c48414c8f0c3d9256967178f0f0a203
SHA256f858f6e16f3ef0caf2102404e02f0573809b0385fe13fd903bd54de3cbd03022
SHA5120012bd11c847a84466e09cff190c380fe22fafc09333223ec976a355f931192acac00e80fe01995679bc87346202d6efcfd4b130b2ac7517649e8502fc0fe506
-
Filesize
341KB
MD576331c95647aefe4de939f6c7fc1de13
SHA15496a07d4c48414c8f0c3d9256967178f0f0a203
SHA256f858f6e16f3ef0caf2102404e02f0573809b0385fe13fd903bd54de3cbd03022
SHA5120012bd11c847a84466e09cff190c380fe22fafc09333223ec976a355f931192acac00e80fe01995679bc87346202d6efcfd4b130b2ac7517649e8502fc0fe506