Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 20:27
Static task
static1
Behavioral task
behavioral1
Sample
f1a75f4157997d32b6e983571e161fc9e4a1d3560e28d13d73505b503645381f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f1a75f4157997d32b6e983571e161fc9e4a1d3560e28d13d73505b503645381f.exe
Resource
win10v2004-20230220-en
General
-
Target
f1a75f4157997d32b6e983571e161fc9e4a1d3560e28d13d73505b503645381f.exe
-
Size
690KB
-
MD5
1cc4c9a6f2548fc9013171a43f905145
-
SHA1
2005b7be2493fc4cae583c7c17cdcce4aaab18e6
-
SHA256
f1a75f4157997d32b6e983571e161fc9e4a1d3560e28d13d73505b503645381f
-
SHA512
5abc213ad1d557a25820296196112da9287ad1d5fdd0218b9fbf7b19b454785502457ed00b8536df6309e459e4e23e404f6e57d62e15116cc48d5685fa0ca108
-
SSDEEP
12288:Gy902Lsg+iywMHHCRvbHczVdsyJWXoOkHbuGDQkX8eE/UUh:Gybsg+GMnccYy4GbuGMkX8nh
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/112-986-0x0000000007520000-0x0000000007B38000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 47892940.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 47892940.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 47892940.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 47892940.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 47892940.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 47892940.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1584 un529960.exe 1936 47892940.exe 112 rk935178.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 47892940.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 47892940.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f1a75f4157997d32b6e983571e161fc9e4a1d3560e28d13d73505b503645381f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un529960.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un529960.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f1a75f4157997d32b6e983571e161fc9e4a1d3560e28d13d73505b503645381f.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 32 1936 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1936 47892940.exe 1936 47892940.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1936 47892940.exe Token: SeDebugPrivilege 112 rk935178.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2292 wrote to memory of 1584 2292 f1a75f4157997d32b6e983571e161fc9e4a1d3560e28d13d73505b503645381f.exe 81 PID 2292 wrote to memory of 1584 2292 f1a75f4157997d32b6e983571e161fc9e4a1d3560e28d13d73505b503645381f.exe 81 PID 2292 wrote to memory of 1584 2292 f1a75f4157997d32b6e983571e161fc9e4a1d3560e28d13d73505b503645381f.exe 81 PID 1584 wrote to memory of 1936 1584 un529960.exe 82 PID 1584 wrote to memory of 1936 1584 un529960.exe 82 PID 1584 wrote to memory of 1936 1584 un529960.exe 82 PID 1584 wrote to memory of 112 1584 un529960.exe 86 PID 1584 wrote to memory of 112 1584 un529960.exe 86 PID 1584 wrote to memory of 112 1584 un529960.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\f1a75f4157997d32b6e983571e161fc9e4a1d3560e28d13d73505b503645381f.exe"C:\Users\Admin\AppData\Local\Temp\f1a75f4157997d32b6e983571e161fc9e4a1d3560e28d13d73505b503645381f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un529960.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un529960.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\47892940.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\47892940.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 10844⤵
- Program crash
PID:32
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk935178.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk935178.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:112
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1936 -ip 19361⤵PID:1036
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD5e6b4b35623e61313efd7515dc1f56b15
SHA12f9ee71bf740c9b3b3c99a38e811d1ceaf462a18
SHA2566f81250dc520299f1daf2a3c875a72ce36635a640a70acf65fc6fe565638850e
SHA5121a89b81a666cb929cee763206903f6bfb1f423ac179adf47925764fd710f61799511b944e1f6f6bfbd4263decfb0ceaa5a8f175af4e12279f5053534fe550a19
-
Filesize
536KB
MD5e6b4b35623e61313efd7515dc1f56b15
SHA12f9ee71bf740c9b3b3c99a38e811d1ceaf462a18
SHA2566f81250dc520299f1daf2a3c875a72ce36635a640a70acf65fc6fe565638850e
SHA5121a89b81a666cb929cee763206903f6bfb1f423ac179adf47925764fd710f61799511b944e1f6f6bfbd4263decfb0ceaa5a8f175af4e12279f5053534fe550a19
-
Filesize
258KB
MD5a5878a357647e0e52cb5617bb5abcc72
SHA1dba6357f9af8c29a42d7c6f7e5c7c39fc4ed5ae0
SHA2568b670eeab81aa7e80b7790218a81286592a85654fe5b4d5004ca32253a9e6076
SHA5126d6a1747f06b8bc4b6b95d9ca47e5fb0b6efa9a984588fa5b0ea714a781ff89422bb7cb7be3c719ae8c70dfed8d321a5cfa13547c5c5b63f0245d16141fa9ecb
-
Filesize
258KB
MD5a5878a357647e0e52cb5617bb5abcc72
SHA1dba6357f9af8c29a42d7c6f7e5c7c39fc4ed5ae0
SHA2568b670eeab81aa7e80b7790218a81286592a85654fe5b4d5004ca32253a9e6076
SHA5126d6a1747f06b8bc4b6b95d9ca47e5fb0b6efa9a984588fa5b0ea714a781ff89422bb7cb7be3c719ae8c70dfed8d321a5cfa13547c5c5b63f0245d16141fa9ecb
-
Filesize
342KB
MD5f5192484593a4263b6a4591b64d44eaa
SHA1e15cad8ef519848aa0849dcfdea407d0f24b9008
SHA25650e715df7472c04284e42a11dc41b207eab96e46ed7fdad254a7e1fe37302c57
SHA5120bb875d6a7d17302d85fe19e807113814dbf48690f5cb31cc2800a1cc3b2c9ac974224de3b67e64d731cf288cfea7c399fa78613e41db7fa94c64240ab4efe95
-
Filesize
342KB
MD5f5192484593a4263b6a4591b64d44eaa
SHA1e15cad8ef519848aa0849dcfdea407d0f24b9008
SHA25650e715df7472c04284e42a11dc41b207eab96e46ed7fdad254a7e1fe37302c57
SHA5120bb875d6a7d17302d85fe19e807113814dbf48690f5cb31cc2800a1cc3b2c9ac974224de3b67e64d731cf288cfea7c399fa78613e41db7fa94c64240ab4efe95