Analysis
-
max time kernel
151s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 19:55
Static task
static1
Behavioral task
behavioral1
Sample
d961f62a7c2812b7433a62a2442f922227cef301b2bf1ee7197b8bf6bf4ae323.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d961f62a7c2812b7433a62a2442f922227cef301b2bf1ee7197b8bf6bf4ae323.exe
Resource
win10v2004-20230220-en
General
-
Target
d961f62a7c2812b7433a62a2442f922227cef301b2bf1ee7197b8bf6bf4ae323.exe
-
Size
690KB
-
MD5
8320300b31c72556cab425788ab73f7e
-
SHA1
c563d003e2ccb37c1bd13270dea77ff209ac7b50
-
SHA256
d961f62a7c2812b7433a62a2442f922227cef301b2bf1ee7197b8bf6bf4ae323
-
SHA512
acd9f3ddc1352969cf739f6955d2b12398c31c7d5a8dae848f68b00d43f6838fb196c8ef18a1679b94674620732274438d8bd444deb2fc2a45f96af153ea129b
-
SSDEEP
12288:ky90uHaBS+qXUgicSNKkL+JiD0xsV2Bm2bdQ0b8pYM:kyhWHL+JL82BX1kx
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1048-986-0x0000000007540000-0x0000000007B58000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 58474897.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 58474897.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 58474897.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 58474897.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 58474897.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 58474897.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2280 un173034.exe 2016 58474897.exe 1048 rk218827.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 58474897.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 58474897.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un173034.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un173034.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d961f62a7c2812b7433a62a2442f922227cef301b2bf1ee7197b8bf6bf4ae323.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d961f62a7c2812b7433a62a2442f922227cef301b2bf1ee7197b8bf6bf4ae323.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2504 2016 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2016 58474897.exe 2016 58474897.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2016 58474897.exe Token: SeDebugPrivilege 1048 rk218827.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4052 wrote to memory of 2280 4052 d961f62a7c2812b7433a62a2442f922227cef301b2bf1ee7197b8bf6bf4ae323.exe 84 PID 4052 wrote to memory of 2280 4052 d961f62a7c2812b7433a62a2442f922227cef301b2bf1ee7197b8bf6bf4ae323.exe 84 PID 4052 wrote to memory of 2280 4052 d961f62a7c2812b7433a62a2442f922227cef301b2bf1ee7197b8bf6bf4ae323.exe 84 PID 2280 wrote to memory of 2016 2280 un173034.exe 85 PID 2280 wrote to memory of 2016 2280 un173034.exe 85 PID 2280 wrote to memory of 2016 2280 un173034.exe 85 PID 2280 wrote to memory of 1048 2280 un173034.exe 95 PID 2280 wrote to memory of 1048 2280 un173034.exe 95 PID 2280 wrote to memory of 1048 2280 un173034.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\d961f62a7c2812b7433a62a2442f922227cef301b2bf1ee7197b8bf6bf4ae323.exe"C:\Users\Admin\AppData\Local\Temp\d961f62a7c2812b7433a62a2442f922227cef301b2bf1ee7197b8bf6bf4ae323.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un173034.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un173034.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\58474897.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\58474897.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2016 -s 10804⤵
- Program crash
PID:2504
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk218827.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk218827.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1048
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2016 -ip 20161⤵PID:4884
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD5c86910286351094e5e10c4354aa873b2
SHA18996bd39ab8b08b75491590a9b1e20cb6644e7f4
SHA25652df465bb17447f004e48f2dd80153aa9f6d67d3eae229d5cf271041c66a4900
SHA5128584c3e4d3bf674bce7c9ffb1e93aad41ec2759911666229725f75f26d1b7359167ba01d1a70b56b267913e6f65ce2e0aafd645ab1cfda570ce031ceb5da0ace
-
Filesize
536KB
MD5c86910286351094e5e10c4354aa873b2
SHA18996bd39ab8b08b75491590a9b1e20cb6644e7f4
SHA25652df465bb17447f004e48f2dd80153aa9f6d67d3eae229d5cf271041c66a4900
SHA5128584c3e4d3bf674bce7c9ffb1e93aad41ec2759911666229725f75f26d1b7359167ba01d1a70b56b267913e6f65ce2e0aafd645ab1cfda570ce031ceb5da0ace
-
Filesize
259KB
MD54146a237141d33bea474084696f2e1fb
SHA1673a290ae35af834a6ff97f450f8b2652dab7ac5
SHA256745df8d9e8eac5ac531c323dcd3face5d71c2e1e1fb38aea53dc39af53578c5f
SHA5123e79342c3fe776c76e28f612de68f30c5d1c4890bea2bb9fc917f38870967c8b61f546bf23a427866a1f967385b71349b1c1355d7f3fda2ec71d3da3d8976973
-
Filesize
259KB
MD54146a237141d33bea474084696f2e1fb
SHA1673a290ae35af834a6ff97f450f8b2652dab7ac5
SHA256745df8d9e8eac5ac531c323dcd3face5d71c2e1e1fb38aea53dc39af53578c5f
SHA5123e79342c3fe776c76e28f612de68f30c5d1c4890bea2bb9fc917f38870967c8b61f546bf23a427866a1f967385b71349b1c1355d7f3fda2ec71d3da3d8976973
-
Filesize
341KB
MD567cdf99d3aef20061914bbe800a5dc20
SHA168ed836031f10d060adf6990d192c5909ad7491d
SHA256a00b24c5f5c4dbfb5ffe70cced5ce7d9fc0cfbba71b3eea1f83116c2893ba937
SHA512b9fedb4e3f7e2ae6d1df7db2ea8a0feb44f4149a746747502f428536b4f2fc1cfbd88fe69ae54762234d39b4b72cbaa387d368affc4fb759a7c5761c7859ef62
-
Filesize
341KB
MD567cdf99d3aef20061914bbe800a5dc20
SHA168ed836031f10d060adf6990d192c5909ad7491d
SHA256a00b24c5f5c4dbfb5ffe70cced5ce7d9fc0cfbba71b3eea1f83116c2893ba937
SHA512b9fedb4e3f7e2ae6d1df7db2ea8a0feb44f4149a746747502f428536b4f2fc1cfbd88fe69ae54762234d39b4b72cbaa387d368affc4fb759a7c5761c7859ef62