Analysis
-
max time kernel
195s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 20:26
Static task
static1
Behavioral task
behavioral1
Sample
f0d9e8e84dd1cbacf3a23b81ffa23a164e715b8ff927eb397fbef9ea274bfbce.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f0d9e8e84dd1cbacf3a23b81ffa23a164e715b8ff927eb397fbef9ea274bfbce.exe
Resource
win10v2004-20230220-en
General
-
Target
f0d9e8e84dd1cbacf3a23b81ffa23a164e715b8ff927eb397fbef9ea274bfbce.exe
-
Size
690KB
-
MD5
09025499c63f7419746a1035850ae347
-
SHA1
13920294b6e6ef99bc274a39852e7dd115cc4802
-
SHA256
f0d9e8e84dd1cbacf3a23b81ffa23a164e715b8ff927eb397fbef9ea274bfbce
-
SHA512
ef13dfb639a1bf217e22202d615c181675291d87d97a43d266297720bfdeac2032b964b18bbd9598da0719f525e2598734ee8ae601745c6704e5760a3faeddc0
-
SSDEEP
12288:fy90SKDMixo3QF7smczVMi2OyuN8bxO0gfuGD++Gwqyf18R:fyVTRQF7smc0HefuGK+GwqyfOR
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1556-994-0x0000000007560000-0x0000000007B78000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 69203128.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 69203128.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 69203128.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 69203128.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 69203128.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 69203128.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4480 un376352.exe 4760 69203128.exe 1556 rk428479.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 69203128.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 69203128.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f0d9e8e84dd1cbacf3a23b81ffa23a164e715b8ff927eb397fbef9ea274bfbce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f0d9e8e84dd1cbacf3a23b81ffa23a164e715b8ff927eb397fbef9ea274bfbce.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un376352.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un376352.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2160 4760 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4760 69203128.exe 4760 69203128.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4760 69203128.exe Token: SeDebugPrivilege 1556 rk428479.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4872 wrote to memory of 4480 4872 f0d9e8e84dd1cbacf3a23b81ffa23a164e715b8ff927eb397fbef9ea274bfbce.exe 80 PID 4872 wrote to memory of 4480 4872 f0d9e8e84dd1cbacf3a23b81ffa23a164e715b8ff927eb397fbef9ea274bfbce.exe 80 PID 4872 wrote to memory of 4480 4872 f0d9e8e84dd1cbacf3a23b81ffa23a164e715b8ff927eb397fbef9ea274bfbce.exe 80 PID 4480 wrote to memory of 4760 4480 un376352.exe 81 PID 4480 wrote to memory of 4760 4480 un376352.exe 81 PID 4480 wrote to memory of 4760 4480 un376352.exe 81 PID 4480 wrote to memory of 1556 4480 un376352.exe 86 PID 4480 wrote to memory of 1556 4480 un376352.exe 86 PID 4480 wrote to memory of 1556 4480 un376352.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\f0d9e8e84dd1cbacf3a23b81ffa23a164e715b8ff927eb397fbef9ea274bfbce.exe"C:\Users\Admin\AppData\Local\Temp\f0d9e8e84dd1cbacf3a23b81ffa23a164e715b8ff927eb397fbef9ea274bfbce.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un376352.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un376352.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\69203128.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\69203128.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 10884⤵
- Program crash
PID:2160
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk428479.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk428479.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4760 -ip 47601⤵PID:2224
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD570288529f95ea94bfd681024b2f6acd8
SHA1dfd9fff1ddb0da7c10cd31331be6b42d51b80df6
SHA256ad6ab654f3bbdfa3a48efb5554be5f1557a974a978e077d5342d4ef0559347d6
SHA512ea673cd187f7d567eae067112e1de1ff626d4b9548e1833a09475eef251898153d084cd232d6f58bddca55199f81b42b8fccca87931333eca64d424a08ed85b8
-
Filesize
536KB
MD570288529f95ea94bfd681024b2f6acd8
SHA1dfd9fff1ddb0da7c10cd31331be6b42d51b80df6
SHA256ad6ab654f3bbdfa3a48efb5554be5f1557a974a978e077d5342d4ef0559347d6
SHA512ea673cd187f7d567eae067112e1de1ff626d4b9548e1833a09475eef251898153d084cd232d6f58bddca55199f81b42b8fccca87931333eca64d424a08ed85b8
-
Filesize
258KB
MD5fd12dc63bd30f6dfe04a427e79523489
SHA1c9fbae5ed201a4f30cb6b2a07d66fd8e532f6c6c
SHA25601ea723d5dce22735e0c56c1baa35a08a696bc57d093bd7b151d9e98b674efa5
SHA5127aaf2ddb92f95d0635b33f36f8179d64015fa038db3be6c12e35603e0da8b84994135e1bf729eaa7ec22a7b5145d7c9315513b6b27b5e3e5c2ea7015e76a7d85
-
Filesize
258KB
MD5fd12dc63bd30f6dfe04a427e79523489
SHA1c9fbae5ed201a4f30cb6b2a07d66fd8e532f6c6c
SHA25601ea723d5dce22735e0c56c1baa35a08a696bc57d093bd7b151d9e98b674efa5
SHA5127aaf2ddb92f95d0635b33f36f8179d64015fa038db3be6c12e35603e0da8b84994135e1bf729eaa7ec22a7b5145d7c9315513b6b27b5e3e5c2ea7015e76a7d85
-
Filesize
342KB
MD58e3c653bf2a5674ee012632164f821e0
SHA16d75cdbcef87bda4828a1d98a86f2fb4b4d629ef
SHA25641110acbe7025a6a1b4c9826fd35fa2162824804e5c96e8cef0752fccde3607c
SHA5120c672b2f26790e70278d9cc91b121aad0468062980328b542f7ea9da99ee0b00612984fc6640d4f771676a58532e6e93ec09554743d6273bd44e6a718e2749db
-
Filesize
342KB
MD58e3c653bf2a5674ee012632164f821e0
SHA16d75cdbcef87bda4828a1d98a86f2fb4b4d629ef
SHA25641110acbe7025a6a1b4c9826fd35fa2162824804e5c96e8cef0752fccde3607c
SHA5120c672b2f26790e70278d9cc91b121aad0468062980328b542f7ea9da99ee0b00612984fc6640d4f771676a58532e6e93ec09554743d6273bd44e6a718e2749db