Analysis
-
max time kernel
149s -
max time network
199s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 19:51
Static task
static1
Behavioral task
behavioral1
Sample
d5d1e22d50d0de3b37efb5fee5dab4d2214fd41674f9766da8522301541a003e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d5d1e22d50d0de3b37efb5fee5dab4d2214fd41674f9766da8522301541a003e.exe
Resource
win10v2004-20230220-en
General
-
Target
d5d1e22d50d0de3b37efb5fee5dab4d2214fd41674f9766da8522301541a003e.exe
-
Size
691KB
-
MD5
de474c4a6cfc7a36ea9d962210511065
-
SHA1
83c696b9d0947ac30246ee0275154bf370b6d36d
-
SHA256
d5d1e22d50d0de3b37efb5fee5dab4d2214fd41674f9766da8522301541a003e
-
SHA512
a54a13f91354e7bfa2cf345178384cdd2e74e3ac41df907b52fae14e8b81fc1796c2a6c14947c462d8757a00531730be2dd681503f4057dab0410a90b88a4be0
-
SSDEEP
12288:3y90z30/2An/rwPevtPbU14v0bVpVLRmqm/YMlQzuDe2Z7ijAANBknoXD2s:3yWo/Ig1bTYnRm5YMnq2tAN/2s
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4352-207-0x0000000007F70000-0x0000000008588000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 98494058.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 98494058.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 98494058.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 98494058.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 98494058.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 98494058.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 224 un410175.exe 1476 98494058.exe 3852 rk927631.exe 1500 rk927631.exe 4352 si282080.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 98494058.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 98494058.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d5d1e22d50d0de3b37efb5fee5dab4d2214fd41674f9766da8522301541a003e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d5d1e22d50d0de3b37efb5fee5dab4d2214fd41674f9766da8522301541a003e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un410175.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un410175.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3852 set thread context of 1500 3852 rk927631.exe 89 -
Program crash 1 IoCs
pid pid_target Process procid_target 3228 1476 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1476 98494058.exe 1476 98494058.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1476 98494058.exe Token: SeDebugPrivilege 1500 rk927631.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2044 wrote to memory of 224 2044 d5d1e22d50d0de3b37efb5fee5dab4d2214fd41674f9766da8522301541a003e.exe 83 PID 2044 wrote to memory of 224 2044 d5d1e22d50d0de3b37efb5fee5dab4d2214fd41674f9766da8522301541a003e.exe 83 PID 2044 wrote to memory of 224 2044 d5d1e22d50d0de3b37efb5fee5dab4d2214fd41674f9766da8522301541a003e.exe 83 PID 224 wrote to memory of 1476 224 un410175.exe 84 PID 224 wrote to memory of 1476 224 un410175.exe 84 PID 224 wrote to memory of 1476 224 un410175.exe 84 PID 224 wrote to memory of 3852 224 un410175.exe 88 PID 224 wrote to memory of 3852 224 un410175.exe 88 PID 224 wrote to memory of 3852 224 un410175.exe 88 PID 3852 wrote to memory of 1500 3852 rk927631.exe 89 PID 3852 wrote to memory of 1500 3852 rk927631.exe 89 PID 3852 wrote to memory of 1500 3852 rk927631.exe 89 PID 3852 wrote to memory of 1500 3852 rk927631.exe 89 PID 3852 wrote to memory of 1500 3852 rk927631.exe 89 PID 3852 wrote to memory of 1500 3852 rk927631.exe 89 PID 3852 wrote to memory of 1500 3852 rk927631.exe 89 PID 3852 wrote to memory of 1500 3852 rk927631.exe 89 PID 3852 wrote to memory of 1500 3852 rk927631.exe 89 PID 2044 wrote to memory of 4352 2044 d5d1e22d50d0de3b37efb5fee5dab4d2214fd41674f9766da8522301541a003e.exe 90 PID 2044 wrote to memory of 4352 2044 d5d1e22d50d0de3b37efb5fee5dab4d2214fd41674f9766da8522301541a003e.exe 90 PID 2044 wrote to memory of 4352 2044 d5d1e22d50d0de3b37efb5fee5dab4d2214fd41674f9766da8522301541a003e.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5d1e22d50d0de3b37efb5fee5dab4d2214fd41674f9766da8522301541a003e.exe"C:\Users\Admin\AppData\Local\Temp\d5d1e22d50d0de3b37efb5fee5dab4d2214fd41674f9766da8522301541a003e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un410175.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un410175.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\98494058.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\98494058.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1476 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1476 -s 10204⤵
- Program crash
PID:3228
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk927631.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk927631.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk927631.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk927631.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si282080.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si282080.exe2⤵
- Executes dropped EXE
PID:4352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1476 -ip 14761⤵PID:2804
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5e1c805d3cefe221689da30b8a2d944f2
SHA1a9a94fd89ed22c2a127c81f6e57f822eae1d9f26
SHA25632023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a
SHA5127801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7
-
Filesize
136KB
MD5e1c805d3cefe221689da30b8a2d944f2
SHA1a9a94fd89ed22c2a127c81f6e57f822eae1d9f26
SHA25632023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a
SHA5127801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7
-
Filesize
537KB
MD5a32942f3405606c46ca059e20bba0986
SHA19488b600ba950eb76b248c98f01daa0a41ac5438
SHA256bf9065956448e79697ed8145cde8034123d31b07eca87314b79576ffd238fb11
SHA51230715d90cf8ed9d4a838c431b26e5090ec33d14eda5773ae470a2be876478d64be1b96a2b7b3672639b4588cf1901905fbfc086531c5de35e88d46efa46cbc59
-
Filesize
537KB
MD5a32942f3405606c46ca059e20bba0986
SHA19488b600ba950eb76b248c98f01daa0a41ac5438
SHA256bf9065956448e79697ed8145cde8034123d31b07eca87314b79576ffd238fb11
SHA51230715d90cf8ed9d4a838c431b26e5090ec33d14eda5773ae470a2be876478d64be1b96a2b7b3672639b4588cf1901905fbfc086531c5de35e88d46efa46cbc59
-
Filesize
259KB
MD57bac2e7d745908af9967d4c65ca4c251
SHA194ceba13a42226e840220315581a3b2ef5cf3d27
SHA256c246290bd1107dae37cdd1c1692a765916ce0d90fe1e93efa7658275f19c3936
SHA512228585d08bafc53e6b0d8bbab00f1e202890eaf3562de7d01339d36bc8c3f3da31ec67c4cded629d6a281b6abcac30152cd5effef150659b5c01f2ff2e5f3304
-
Filesize
259KB
MD57bac2e7d745908af9967d4c65ca4c251
SHA194ceba13a42226e840220315581a3b2ef5cf3d27
SHA256c246290bd1107dae37cdd1c1692a765916ce0d90fe1e93efa7658275f19c3936
SHA512228585d08bafc53e6b0d8bbab00f1e202890eaf3562de7d01339d36bc8c3f3da31ec67c4cded629d6a281b6abcac30152cd5effef150659b5c01f2ff2e5f3304
-
Filesize
342KB
MD56b24d9de5f9545bbac9474a09a5041ab
SHA12091a68baa5e507d1a1d13859589918098149403
SHA256c0e6a9d30e8674d3500dad599a5d49a8bd45569dd6011778791f17952811c398
SHA512d232dfaaf1f3c880cdcb22539bbf02be56c8d7d8fcccb3816c8277567dbe41b751b0f939411e8117cfc05760b876d32ac387b88e690c8563812466ed786bf7a2
-
Filesize
342KB
MD56b24d9de5f9545bbac9474a09a5041ab
SHA12091a68baa5e507d1a1d13859589918098149403
SHA256c0e6a9d30e8674d3500dad599a5d49a8bd45569dd6011778791f17952811c398
SHA512d232dfaaf1f3c880cdcb22539bbf02be56c8d7d8fcccb3816c8277567dbe41b751b0f939411e8117cfc05760b876d32ac387b88e690c8563812466ed786bf7a2
-
Filesize
342KB
MD56b24d9de5f9545bbac9474a09a5041ab
SHA12091a68baa5e507d1a1d13859589918098149403
SHA256c0e6a9d30e8674d3500dad599a5d49a8bd45569dd6011778791f17952811c398
SHA512d232dfaaf1f3c880cdcb22539bbf02be56c8d7d8fcccb3816c8277567dbe41b751b0f939411e8117cfc05760b876d32ac387b88e690c8563812466ed786bf7a2