Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 19:46
Static task
static1
Behavioral task
behavioral1
Sample
d167832211109205969ba2a2a353006ed6638d63891633c7b0f540312dc08653.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d167832211109205969ba2a2a353006ed6638d63891633c7b0f540312dc08653.exe
Resource
win10v2004-20230220-en
General
-
Target
d167832211109205969ba2a2a353006ed6638d63891633c7b0f540312dc08653.exe
-
Size
704KB
-
MD5
50488eb45e7e5af0aa57bc1ecbd85859
-
SHA1
5e4e7b29e159d986caeca3675aa4621371785db6
-
SHA256
d167832211109205969ba2a2a353006ed6638d63891633c7b0f540312dc08653
-
SHA512
1694dcf6aa402e99e81ecbb06b424356276af798f834818cd0494b2f0cd7ae94d530a6050eea7a9c8762825b95a9b2f7ff3f0ce3643280fbcec621ad9d340623
-
SSDEEP
12288:Ly90Yv/MW4VbNmR8CXCrI19vZqopAW4I1NzCK/Iz/MC4/KlgUhMZ:Ly1v/MRfmR8XI17qi1L/Ir1VgUhO
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4164-990-0x0000000009CC0000-0x000000000A2D8000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr621982.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr621982.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr621982.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr621982.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr621982.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr621982.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 3588 un059142.exe 1404 pr621982.exe 4164 qu576556.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr621982.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr621982.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d167832211109205969ba2a2a353006ed6638d63891633c7b0f540312dc08653.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d167832211109205969ba2a2a353006ed6638d63891633c7b0f540312dc08653.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un059142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un059142.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 116 1404 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1404 pr621982.exe 1404 pr621982.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1404 pr621982.exe Token: SeDebugPrivilege 4164 qu576556.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4868 wrote to memory of 3588 4868 d167832211109205969ba2a2a353006ed6638d63891633c7b0f540312dc08653.exe 84 PID 4868 wrote to memory of 3588 4868 d167832211109205969ba2a2a353006ed6638d63891633c7b0f540312dc08653.exe 84 PID 4868 wrote to memory of 3588 4868 d167832211109205969ba2a2a353006ed6638d63891633c7b0f540312dc08653.exe 84 PID 3588 wrote to memory of 1404 3588 un059142.exe 85 PID 3588 wrote to memory of 1404 3588 un059142.exe 85 PID 3588 wrote to memory of 1404 3588 un059142.exe 85 PID 3588 wrote to memory of 4164 3588 un059142.exe 93 PID 3588 wrote to memory of 4164 3588 un059142.exe 93 PID 3588 wrote to memory of 4164 3588 un059142.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\d167832211109205969ba2a2a353006ed6638d63891633c7b0f540312dc08653.exe"C:\Users\Admin\AppData\Local\Temp\d167832211109205969ba2a2a353006ed6638d63891633c7b0f540312dc08653.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un059142.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un059142.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr621982.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr621982.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1404 -s 10804⤵
- Program crash
PID:116
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu576556.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu576556.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4164
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1404 -ip 14041⤵PID:216
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
550KB
MD584580215f90feacd03d48d8fc2d6afc8
SHA1d83be9ffaf30530356bdc6eb451c9a6e70525713
SHA256be8b39b4b3308a0791f30e0ea01e7423828d46b7f31a0e71054f7be41f637a44
SHA5122430072b2275e51984015d2dab327f8d4a69d7d10f8455cae7362ef39e8cb3113d0a6fb2ce87583c29919706c227f65e6ecf0498318e0320174090f1ac5f4f2f
-
Filesize
550KB
MD584580215f90feacd03d48d8fc2d6afc8
SHA1d83be9ffaf30530356bdc6eb451c9a6e70525713
SHA256be8b39b4b3308a0791f30e0ea01e7423828d46b7f31a0e71054f7be41f637a44
SHA5122430072b2275e51984015d2dab327f8d4a69d7d10f8455cae7362ef39e8cb3113d0a6fb2ce87583c29919706c227f65e6ecf0498318e0320174090f1ac5f4f2f
-
Filesize
278KB
MD539985530de26edda1dc4b5f3a5ae7f20
SHA19723071acd8abdb8fff1e1630a774eb789cd9767
SHA256e21aca0a4b51ac03580c214e237dd28ad573b2692d8a0363c66d7fd76c4906b2
SHA512ba2f5519121670e55c315c7f671d36fc2ad0e0fb6171c1eff3f2909a1f0e825da940bc62faa6e5999b0f16577e66d4301de19774cb92b12f65a06cfa3aebb973
-
Filesize
278KB
MD539985530de26edda1dc4b5f3a5ae7f20
SHA19723071acd8abdb8fff1e1630a774eb789cd9767
SHA256e21aca0a4b51ac03580c214e237dd28ad573b2692d8a0363c66d7fd76c4906b2
SHA512ba2f5519121670e55c315c7f671d36fc2ad0e0fb6171c1eff3f2909a1f0e825da940bc62faa6e5999b0f16577e66d4301de19774cb92b12f65a06cfa3aebb973
-
Filesize
361KB
MD570c83f3ac70dc491046401d97b5b4128
SHA1ed3abe11e4999902721beba0bb5b31b2a6f9125b
SHA256cc4f4f36116a9fb5e2615ababbba1b487568f75be9aec0fca037c8d0c3db91f8
SHA51265349183ecacd3a5d9358e667e61563de33abcadd82c3973516790e881734b63c5d750bc9b9df0f0ad31d8bc293b977ca37c849f123487853179b6129aeb1d07
-
Filesize
361KB
MD570c83f3ac70dc491046401d97b5b4128
SHA1ed3abe11e4999902721beba0bb5b31b2a6f9125b
SHA256cc4f4f36116a9fb5e2615ababbba1b487568f75be9aec0fca037c8d0c3db91f8
SHA51265349183ecacd3a5d9358e667e61563de33abcadd82c3973516790e881734b63c5d750bc9b9df0f0ad31d8bc293b977ca37c849f123487853179b6129aeb1d07