Analysis
-
max time kernel
145s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 19:09
Static task
static1
Behavioral task
behavioral1
Sample
b684daa3c34aa840255d46d1ba002519587e2704cca10f4aee8d8922c6860370.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
b684daa3c34aa840255d46d1ba002519587e2704cca10f4aee8d8922c6860370.exe
Resource
win10v2004-20230220-en
General
-
Target
b684daa3c34aa840255d46d1ba002519587e2704cca10f4aee8d8922c6860370.exe
-
Size
1.0MB
-
MD5
e8a38a7d4ced39ff3a03fa3899919492
-
SHA1
9422f5e17796ce68c30a58034cdd9123ae63efae
-
SHA256
b684daa3c34aa840255d46d1ba002519587e2704cca10f4aee8d8922c6860370
-
SHA512
d7681e83110fb36eed70143afa839058a71756be344e39cbed863795978d9ec9c05153942da88a1e66217ee99d7e2461ce5c01712851f33522212f1158ee7fa1
-
SSDEEP
24576:kykIlFn/PC+KMWgxQIoGjqcAaOuUAnHj82GZK1GvEw:zkIXn/P3KqxQKjp7nD8o1Gv
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3916-993-0x0000000007900000-0x0000000007F18000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 13356134.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 13356134.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 13356134.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 13356134.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 13356134.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 13356134.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 4216 za857528.exe 1972 za142039.exe 2216 13356134.exe 3916 w21Sw65.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 13356134.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 13356134.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce b684daa3c34aa840255d46d1ba002519587e2704cca10f4aee8d8922c6860370.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b684daa3c34aa840255d46d1ba002519587e2704cca10f4aee8d8922c6860370.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za857528.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" za857528.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za142039.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" za142039.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4204 2216 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2216 13356134.exe 2216 13356134.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2216 13356134.exe Token: SeDebugPrivilege 3916 w21Sw65.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2076 wrote to memory of 4216 2076 b684daa3c34aa840255d46d1ba002519587e2704cca10f4aee8d8922c6860370.exe 83 PID 2076 wrote to memory of 4216 2076 b684daa3c34aa840255d46d1ba002519587e2704cca10f4aee8d8922c6860370.exe 83 PID 2076 wrote to memory of 4216 2076 b684daa3c34aa840255d46d1ba002519587e2704cca10f4aee8d8922c6860370.exe 83 PID 4216 wrote to memory of 1972 4216 za857528.exe 84 PID 4216 wrote to memory of 1972 4216 za857528.exe 84 PID 4216 wrote to memory of 1972 4216 za857528.exe 84 PID 1972 wrote to memory of 2216 1972 za142039.exe 85 PID 1972 wrote to memory of 2216 1972 za142039.exe 85 PID 1972 wrote to memory of 2216 1972 za142039.exe 85 PID 1972 wrote to memory of 3916 1972 za142039.exe 95 PID 1972 wrote to memory of 3916 1972 za142039.exe 95 PID 1972 wrote to memory of 3916 1972 za142039.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\b684daa3c34aa840255d46d1ba002519587e2704cca10f4aee8d8922c6860370.exe"C:\Users\Admin\AppData\Local\Temp\b684daa3c34aa840255d46d1ba002519587e2704cca10f4aee8d8922c6860370.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za857528.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za857528.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za142039.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za142039.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\13356134.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\13356134.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 10805⤵
- Program crash
PID:4204
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w21Sw65.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w21Sw65.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3916
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2216 -ip 22161⤵PID:3076
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
774KB
MD5c425fa2c0d692d766cc133da247080a8
SHA1aded8fc55dd44bed8e1a1c376839f79dabcccf8e
SHA256f9fd664a3113b660286a3bac31f88e33c8933165e8c3b3c728b5195f257d3d59
SHA512ea73651f8ad379f6a765b281206ad65094e83453b4114a8b0ef61ea7645d8831e77919ad2a787c620b142e105ac01b8445747b43b436cd66f375cbb784aa637d
-
Filesize
774KB
MD5c425fa2c0d692d766cc133da247080a8
SHA1aded8fc55dd44bed8e1a1c376839f79dabcccf8e
SHA256f9fd664a3113b660286a3bac31f88e33c8933165e8c3b3c728b5195f257d3d59
SHA512ea73651f8ad379f6a765b281206ad65094e83453b4114a8b0ef61ea7645d8831e77919ad2a787c620b142e105ac01b8445747b43b436cd66f375cbb784aa637d
-
Filesize
592KB
MD5c4fb61a589d41bb40140ffc6df9eb4e3
SHA10d0348dafc3d451b2165e82a2de02f3f0724800a
SHA256de70984841daf6489c7275504d02ef78518432df5c0a6593a141c08dc8eb6002
SHA512876a20009fbe8a7ef51f14bc03e04faeb98b4b41c5381a721b959dfa3b1a7eeee3a96169c30c07d9c366d81f5247e1d7a94b86b369aca0c03e5ca384e0222724
-
Filesize
592KB
MD5c4fb61a589d41bb40140ffc6df9eb4e3
SHA10d0348dafc3d451b2165e82a2de02f3f0724800a
SHA256de70984841daf6489c7275504d02ef78518432df5c0a6593a141c08dc8eb6002
SHA512876a20009fbe8a7ef51f14bc03e04faeb98b4b41c5381a721b959dfa3b1a7eeee3a96169c30c07d9c366d81f5247e1d7a94b86b369aca0c03e5ca384e0222724
-
Filesize
376KB
MD50be4cbdedff8e963795332922708a279
SHA13aa8beff78ba9b7167e44a925c8d90f392a9016c
SHA2563a3c1508f8054ac086636a90827cf0e486ec4f7e516f8ab663dd2e04cff0ab00
SHA512f2824d78f5173dbfae4abd2b305991461ee319dfea2d7bb76e4f403b1c93763d5746599a17ad657c61cba4311f1d4961016515ce9b542278fcf3dceefd818c68
-
Filesize
376KB
MD50be4cbdedff8e963795332922708a279
SHA13aa8beff78ba9b7167e44a925c8d90f392a9016c
SHA2563a3c1508f8054ac086636a90827cf0e486ec4f7e516f8ab663dd2e04cff0ab00
SHA512f2824d78f5173dbfae4abd2b305991461ee319dfea2d7bb76e4f403b1c93763d5746599a17ad657c61cba4311f1d4961016515ce9b542278fcf3dceefd818c68
-
Filesize
459KB
MD524196892443a821ee2c506fe71864951
SHA1af38f3bb51a0ec56b34e3b7f812adf82588dada7
SHA256dcf7ce9a14c4e9250a0d591b298c6fa649bb62ca59f4bb5db2bf668a027e9b7e
SHA5120ebddc2ca7947010a3dd509ec57163ea9a8e891859a023fa7a8170afda58bd68c34b9f71c7fa6630686d2bb4489da3806417c83348a837f0433de932b97e57e8
-
Filesize
459KB
MD524196892443a821ee2c506fe71864951
SHA1af38f3bb51a0ec56b34e3b7f812adf82588dada7
SHA256dcf7ce9a14c4e9250a0d591b298c6fa649bb62ca59f4bb5db2bf668a027e9b7e
SHA5120ebddc2ca7947010a3dd509ec57163ea9a8e891859a023fa7a8170afda58bd68c34b9f71c7fa6630686d2bb4489da3806417c83348a837f0433de932b97e57e8