Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 19:40
Static task
static1
Behavioral task
behavioral1
Sample
cd76a2f90473dae4a54925032783ba222535ae7c981a2672989cf3964cbc29c8.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
cd76a2f90473dae4a54925032783ba222535ae7c981a2672989cf3964cbc29c8.exe
Resource
win10v2004-20230220-en
General
-
Target
cd76a2f90473dae4a54925032783ba222535ae7c981a2672989cf3964cbc29c8.exe
-
Size
701KB
-
MD5
e76f6bf34e41c01ab28e7c9da86d0a0a
-
SHA1
70c0594b7abb241cacb2d7abe75725a6957f06ba
-
SHA256
cd76a2f90473dae4a54925032783ba222535ae7c981a2672989cf3964cbc29c8
-
SHA512
31fa1068a7b1ba84f7a7bdd7d38fddc38a893209e775c95e6325ab5be8c7993c2c29568fd569e78d0e68a66dfb1031317e91ae95f4058fd09f648ab728aebe53
-
SSDEEP
12288:Ay90eWTbXxZXbZnUSLUPkEWDOMqpTfR3+GhKzVpARuB6q2E3BLimrny8V:AyxgXxZX1n/LDEWDOfJIpARuB6Y
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/724-987-0x0000000009C50000-0x000000000A268000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 91905041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 91905041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 91905041.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 91905041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 91905041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 91905041.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1536 un038927.exe 1164 91905041.exe 724 rk315025.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 91905041.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 91905041.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce cd76a2f90473dae4a54925032783ba222535ae7c981a2672989cf3964cbc29c8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cd76a2f90473dae4a54925032783ba222535ae7c981a2672989cf3964cbc29c8.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un038927.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un038927.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4124 1164 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1164 91905041.exe 1164 91905041.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1164 91905041.exe Token: SeDebugPrivilege 724 rk315025.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4444 wrote to memory of 1536 4444 cd76a2f90473dae4a54925032783ba222535ae7c981a2672989cf3964cbc29c8.exe 84 PID 4444 wrote to memory of 1536 4444 cd76a2f90473dae4a54925032783ba222535ae7c981a2672989cf3964cbc29c8.exe 84 PID 4444 wrote to memory of 1536 4444 cd76a2f90473dae4a54925032783ba222535ae7c981a2672989cf3964cbc29c8.exe 84 PID 1536 wrote to memory of 1164 1536 un038927.exe 85 PID 1536 wrote to memory of 1164 1536 un038927.exe 85 PID 1536 wrote to memory of 1164 1536 un038927.exe 85 PID 1536 wrote to memory of 724 1536 un038927.exe 92 PID 1536 wrote to memory of 724 1536 un038927.exe 92 PID 1536 wrote to memory of 724 1536 un038927.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd76a2f90473dae4a54925032783ba222535ae7c981a2672989cf3964cbc29c8.exe"C:\Users\Admin\AppData\Local\Temp\cd76a2f90473dae4a54925032783ba222535ae7c981a2672989cf3964cbc29c8.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un038927.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un038927.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\91905041.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\91905041.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1164 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1164 -s 10844⤵
- Program crash
PID:4124
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk315025.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk315025.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:724
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1164 -ip 11641⤵PID:3192
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
547KB
MD5d1c141d7d363fd009940fd6b3cce6d64
SHA1b20606df5cb4d9ddf955eba229f3ae54342e19ab
SHA25649484fe66a47dde6ef4041bd087e96b4f0a1617014fac9d50734d52f05a69ba7
SHA512bc87705991f101625324b9fa1a85491d526aa2cb97b0eed658cc5328b275e4f2b22b416bd820e7aef718baee8cae7a7f097e4f24c284f211e31e39690d24b3a0
-
Filesize
547KB
MD5d1c141d7d363fd009940fd6b3cce6d64
SHA1b20606df5cb4d9ddf955eba229f3ae54342e19ab
SHA25649484fe66a47dde6ef4041bd087e96b4f0a1617014fac9d50734d52f05a69ba7
SHA512bc87705991f101625324b9fa1a85491d526aa2cb97b0eed658cc5328b275e4f2b22b416bd820e7aef718baee8cae7a7f097e4f24c284f211e31e39690d24b3a0
-
Filesize
269KB
MD512c7bcdf1a87bc1c994793f4ab83895e
SHA10d9d01d056d232e4f903fcc8e4ccc687a5ada59d
SHA256b5ec2d3fb48c7fed056509f9cd37f3334d4d0574231d28333edf3c71687e9aa3
SHA5129515f7270681ffe21fd465c505d0d05de594292a43d35f4e4dba91961da2f5d911ea29cdf31846858e460b2070e1a56871e88712cab5e71bcb5e4520b7016dcd
-
Filesize
269KB
MD512c7bcdf1a87bc1c994793f4ab83895e
SHA10d9d01d056d232e4f903fcc8e4ccc687a5ada59d
SHA256b5ec2d3fb48c7fed056509f9cd37f3334d4d0574231d28333edf3c71687e9aa3
SHA5129515f7270681ffe21fd465c505d0d05de594292a43d35f4e4dba91961da2f5d911ea29cdf31846858e460b2070e1a56871e88712cab5e71bcb5e4520b7016dcd
-
Filesize
353KB
MD5522c4ca06d3787fbb376fe56bc2b5931
SHA13fc1428257f6ec47716fe0ae22054f135aaa4d5f
SHA2565c8b5b6abac933b35292d512ade991c92e01608025087a10fd2110f9153ebb25
SHA512713ee4e6f291155b2b02f11131a6778e99dcbd11aa2603d9f333f4bdb07dec0d0396f510d92d29dcc59eaef6b005282f14936838485f532192c57f0722949d7d
-
Filesize
353KB
MD5522c4ca06d3787fbb376fe56bc2b5931
SHA13fc1428257f6ec47716fe0ae22054f135aaa4d5f
SHA2565c8b5b6abac933b35292d512ade991c92e01608025087a10fd2110f9153ebb25
SHA512713ee4e6f291155b2b02f11131a6778e99dcbd11aa2603d9f333f4bdb07dec0d0396f510d92d29dcc59eaef6b005282f14936838485f532192c57f0722949d7d