Analysis
-
max time kernel
189s -
max time network
203s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 19:37
Static task
static1
Behavioral task
behavioral1
Sample
cbf3f4ad9aa4c04a807f0d5354e387657cdc4cb5fe834b76e4f7aed79f48668a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
cbf3f4ad9aa4c04a807f0d5354e387657cdc4cb5fe834b76e4f7aed79f48668a.exe
Resource
win10v2004-20230220-en
General
-
Target
cbf3f4ad9aa4c04a807f0d5354e387657cdc4cb5fe834b76e4f7aed79f48668a.exe
-
Size
707KB
-
MD5
be984f5a48f5d1a41d0642589ce66a74
-
SHA1
adce4929ec3feb33d98577c22f8fb7e640a69115
-
SHA256
cbf3f4ad9aa4c04a807f0d5354e387657cdc4cb5fe834b76e4f7aed79f48668a
-
SHA512
f8a0e5725d0ebc720f0f867857f0e7fff10e410a9822a75ebee193e74f494341a32b40925cafa2273586591c2f58804982ec2b51d6be8c5ea0c1801b4f8f90ad
-
SSDEEP
12288:oy90RN1qsMOdo1MNFFaaPlcZgbTgQ/TTdnRUmJiSxAJmTfctYS4GQ:oyO1qsx0MRf9cZgbTLhRx92tYOQ
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1324-991-0x0000000009D50000-0x000000000A368000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 14336960.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 14336960.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 14336960.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 14336960.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 14336960.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 14336960.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1796 un233350.exe 4432 14336960.exe 1324 rk579539.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 14336960.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 14336960.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un233350.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un233350.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cbf3f4ad9aa4c04a807f0d5354e387657cdc4cb5fe834b76e4f7aed79f48668a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cbf3f4ad9aa4c04a807f0d5354e387657cdc4cb5fe834b76e4f7aed79f48668a.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1812 4432 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4432 14336960.exe 4432 14336960.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4432 14336960.exe Token: SeDebugPrivilege 1324 rk579539.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1512 wrote to memory of 1796 1512 cbf3f4ad9aa4c04a807f0d5354e387657cdc4cb5fe834b76e4f7aed79f48668a.exe 81 PID 1512 wrote to memory of 1796 1512 cbf3f4ad9aa4c04a807f0d5354e387657cdc4cb5fe834b76e4f7aed79f48668a.exe 81 PID 1512 wrote to memory of 1796 1512 cbf3f4ad9aa4c04a807f0d5354e387657cdc4cb5fe834b76e4f7aed79f48668a.exe 81 PID 1796 wrote to memory of 4432 1796 un233350.exe 82 PID 1796 wrote to memory of 4432 1796 un233350.exe 82 PID 1796 wrote to memory of 4432 1796 un233350.exe 82 PID 1796 wrote to memory of 1324 1796 un233350.exe 86 PID 1796 wrote to memory of 1324 1796 un233350.exe 86 PID 1796 wrote to memory of 1324 1796 un233350.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbf3f4ad9aa4c04a807f0d5354e387657cdc4cb5fe834b76e4f7aed79f48668a.exe"C:\Users\Admin\AppData\Local\Temp\cbf3f4ad9aa4c04a807f0d5354e387657cdc4cb5fe834b76e4f7aed79f48668a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un233350.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un233350.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\14336960.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\14336960.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4432 -s 10164⤵
- Program crash
PID:1812
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk579539.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk579539.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1324
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4432 -ip 44321⤵PID:3980
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
553KB
MD50bb9522c5c378737556d286e7df4778b
SHA102ac5517766abac08c06209d5db58ebfaf0ef950
SHA256f6b1bd64207786c36be158098b1bf2bc31a95c8b3e514ef1f40fa404408ef536
SHA5120be6de8fa40f88b1b9e9ab56e9153b7d6a09833b1769e601c8e6b5443981e42591e5aad37b9cef67e60f2c93570446a071d672d7cb14b71a13ffeef690e27b63
-
Filesize
553KB
MD50bb9522c5c378737556d286e7df4778b
SHA102ac5517766abac08c06209d5db58ebfaf0ef950
SHA256f6b1bd64207786c36be158098b1bf2bc31a95c8b3e514ef1f40fa404408ef536
SHA5120be6de8fa40f88b1b9e9ab56e9153b7d6a09833b1769e601c8e6b5443981e42591e5aad37b9cef67e60f2c93570446a071d672d7cb14b71a13ffeef690e27b63
-
Filesize
258KB
MD58ff41f40c7c8b23d5dd0ecb9a888a48c
SHA1c28f0da22bbee700d4b5e23c123e1935a7b52b68
SHA256eec0a44ea91176c893226eda20dd643afc88cd9d08406f206191bfdb71f36714
SHA512f673555d4ecd11662e26912114f70dd4b90012b6d51e6130a13607106b63ca044ca23daf51221db49072d7ba5e5bf9bf3cdac85a25b801cce4f867709889eabe
-
Filesize
258KB
MD58ff41f40c7c8b23d5dd0ecb9a888a48c
SHA1c28f0da22bbee700d4b5e23c123e1935a7b52b68
SHA256eec0a44ea91176c893226eda20dd643afc88cd9d08406f206191bfdb71f36714
SHA512f673555d4ecd11662e26912114f70dd4b90012b6d51e6130a13607106b63ca044ca23daf51221db49072d7ba5e5bf9bf3cdac85a25b801cce4f867709889eabe
-
Filesize
353KB
MD571a3bff7c6570a9d5003296521bc993b
SHA1a11b67ef1aa624797c57b9b5b16f044658a849a0
SHA256111a9e80a575667842d690bd56dae1b8e76d7cc37855722f229d26d6db154cbf
SHA512869447569cf1ae863645d44c83660003f851b2388f0e58eda861f49b4ee3d172f32536a0bfb077f802915ae47c43a10730ca03b4e17d938714f75190c2474f13
-
Filesize
353KB
MD571a3bff7c6570a9d5003296521bc993b
SHA1a11b67ef1aa624797c57b9b5b16f044658a849a0
SHA256111a9e80a575667842d690bd56dae1b8e76d7cc37855722f229d26d6db154cbf
SHA512869447569cf1ae863645d44c83660003f851b2388f0e58eda861f49b4ee3d172f32536a0bfb077f802915ae47c43a10730ca03b4e17d938714f75190c2474f13