Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 20:28
Static task
static1
Behavioral task
behavioral1
Sample
f2f68f672b62fc65e343afea6c3e49a2cd43905904eb68de308fcc3bc6d8e3ec.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f2f68f672b62fc65e343afea6c3e49a2cd43905904eb68de308fcc3bc6d8e3ec.exe
Resource
win10v2004-20230220-en
General
-
Target
f2f68f672b62fc65e343afea6c3e49a2cd43905904eb68de308fcc3bc6d8e3ec.exe
-
Size
695KB
-
MD5
48fd845cfc42eb2c4dc4cb03c23b27c8
-
SHA1
3dc94ca3d3de1979949d0440cdc8103cff8064c6
-
SHA256
f2f68f672b62fc65e343afea6c3e49a2cd43905904eb68de308fcc3bc6d8e3ec
-
SHA512
fe3ee9eae6f79dbedea2d4ad6796d678bdae181a6be06c92876d7fc29de6359d907ae330d48727575ae26ea6129f83b5fc3996b04b000e38509f5a64a440af4d
-
SSDEEP
12288:cy90kUn4MnLH7mFrehcUXUdun1Jr2Kix3xTHQq8sXowQDySyUdJOvmxQAE:cyBUnlnTaVehc23nqBxhTHQ1s4wQ7Aog
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3456-989-0x0000000009D70000-0x000000000A388000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 62353108.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 62353108.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 62353108.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 62353108.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 62353108.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 62353108.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1564 un624240.exe 3880 62353108.exe 3456 rk268966.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 62353108.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 62353108.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un624240.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce f2f68f672b62fc65e343afea6c3e49a2cd43905904eb68de308fcc3bc6d8e3ec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f2f68f672b62fc65e343afea6c3e49a2cd43905904eb68de308fcc3bc6d8e3ec.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un624240.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2404 3880 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3880 62353108.exe 3880 62353108.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3880 62353108.exe Token: SeDebugPrivilege 3456 rk268966.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2152 wrote to memory of 1564 2152 f2f68f672b62fc65e343afea6c3e49a2cd43905904eb68de308fcc3bc6d8e3ec.exe 84 PID 2152 wrote to memory of 1564 2152 f2f68f672b62fc65e343afea6c3e49a2cd43905904eb68de308fcc3bc6d8e3ec.exe 84 PID 2152 wrote to memory of 1564 2152 f2f68f672b62fc65e343afea6c3e49a2cd43905904eb68de308fcc3bc6d8e3ec.exe 84 PID 1564 wrote to memory of 3880 1564 un624240.exe 85 PID 1564 wrote to memory of 3880 1564 un624240.exe 85 PID 1564 wrote to memory of 3880 1564 un624240.exe 85 PID 1564 wrote to memory of 3456 1564 un624240.exe 89 PID 1564 wrote to memory of 3456 1564 un624240.exe 89 PID 1564 wrote to memory of 3456 1564 un624240.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2f68f672b62fc65e343afea6c3e49a2cd43905904eb68de308fcc3bc6d8e3ec.exe"C:\Users\Admin\AppData\Local\Temp\f2f68f672b62fc65e343afea6c3e49a2cd43905904eb68de308fcc3bc6d8e3ec.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un624240.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un624240.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\62353108.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\62353108.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3880 -s 10804⤵
- Program crash
PID:2404
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk268966.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk268966.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3456
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3880 -ip 38801⤵PID:1324
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
541KB
MD58164882881ededdf303d24ac9bb0324e
SHA1d0d4beffc960cdc16706f8702597a7979794d0c4
SHA25670a4131cd81bf886f1c34d81ab8c61197bc6b38017145cd584c412da74c78d2b
SHA512aaad4fa2ad278f66d1aba044ab1e0dc852c1fadf99f93dfb32f63072ffb1594ff4351dbe9a87e0194705675a81312a08c50e2dc5c6c00851b3f5cfb1e1f19a54
-
Filesize
541KB
MD58164882881ededdf303d24ac9bb0324e
SHA1d0d4beffc960cdc16706f8702597a7979794d0c4
SHA25670a4131cd81bf886f1c34d81ab8c61197bc6b38017145cd584c412da74c78d2b
SHA512aaad4fa2ad278f66d1aba044ab1e0dc852c1fadf99f93dfb32f63072ffb1594ff4351dbe9a87e0194705675a81312a08c50e2dc5c6c00851b3f5cfb1e1f19a54
-
Filesize
258KB
MD5c671d754003666106ee51a7020e62adb
SHA16c05148cf75558a82598fd8357c86ed6bdcc9063
SHA2561bd5d6df4d767ec3f59248526cb7efb4389f55ff56fe622f84c2ce05baf75d26
SHA5125f8f93f7d830903688790182667955bbec924d36c1f732ca86bc2c4e7f8dffa0724de2e9df432924b685c1e13a64343c8cf7e080f44cc5f9bf3d0bcca6dc550b
-
Filesize
258KB
MD5c671d754003666106ee51a7020e62adb
SHA16c05148cf75558a82598fd8357c86ed6bdcc9063
SHA2561bd5d6df4d767ec3f59248526cb7efb4389f55ff56fe622f84c2ce05baf75d26
SHA5125f8f93f7d830903688790182667955bbec924d36c1f732ca86bc2c4e7f8dffa0724de2e9df432924b685c1e13a64343c8cf7e080f44cc5f9bf3d0bcca6dc550b
-
Filesize
340KB
MD5b383cd533b43586dcabf78c4407c2c75
SHA17dd51a068af50c5887d0cf3f5fda4c029c50aea5
SHA25631d8b295af54119bf497aff31d29d7fb63ebc7cc93834ff84524b68c86fdffff
SHA51250e3024c047e1945ecd8ccec19a6865dde0d9fc6a7dccdba15848170c1dea69955de21e6d0c4b17209edbc395d522a689a1b79a106739cb83658be11cd1b6cea
-
Filesize
340KB
MD5b383cd533b43586dcabf78c4407c2c75
SHA17dd51a068af50c5887d0cf3f5fda4c029c50aea5
SHA25631d8b295af54119bf497aff31d29d7fb63ebc7cc93834ff84524b68c86fdffff
SHA51250e3024c047e1945ecd8ccec19a6865dde0d9fc6a7dccdba15848170c1dea69955de21e6d0c4b17209edbc395d522a689a1b79a106739cb83658be11cd1b6cea