Analysis
-
max time kernel
183s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 19:54
Static task
static1
Behavioral task
behavioral1
Sample
d87f19cf81ca9d0c25e45a56110d417d7252d95ac50bc26dde7192aa0251c6bb.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d87f19cf81ca9d0c25e45a56110d417d7252d95ac50bc26dde7192aa0251c6bb.exe
Resource
win10v2004-20230220-en
General
-
Target
d87f19cf81ca9d0c25e45a56110d417d7252d95ac50bc26dde7192aa0251c6bb.exe
-
Size
1001KB
-
MD5
271c98dbb8b5d6123e331ffbdebdaf93
-
SHA1
ac65817e425800c4bf824c5666c4e9e73afb6e3f
-
SHA256
d87f19cf81ca9d0c25e45a56110d417d7252d95ac50bc26dde7192aa0251c6bb
-
SHA512
3591f4c73ac8bf18e5abc01aabbdfa5a1a9d039de38c18e2ca06d240493f5418823b727728c7527c041a6085fee854f57b7bc5322ff7267b3f5e2677bc610de5
-
SSDEEP
24576:9yVFX9UTSkaVewTF2MwQelhsVE0d2GBbwsBCot:YVFXu8ZTF2MLEI2cb
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4584-996-0x00000000079B0000-0x0000000007FC8000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 03812737.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 03812737.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 03812737.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 03812737.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 03812737.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 03812737.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 5020 za451175.exe 1084 za361494.exe 3472 03812737.exe 4584 w62Nj98.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 03812737.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 03812737.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" za361494.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d87f19cf81ca9d0c25e45a56110d417d7252d95ac50bc26dde7192aa0251c6bb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d87f19cf81ca9d0c25e45a56110d417d7252d95ac50bc26dde7192aa0251c6bb.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za451175.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" za451175.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za361494.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1696 3472 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3472 03812737.exe 3472 03812737.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3472 03812737.exe Token: SeDebugPrivilege 4584 w62Nj98.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3788 wrote to memory of 5020 3788 d87f19cf81ca9d0c25e45a56110d417d7252d95ac50bc26dde7192aa0251c6bb.exe 80 PID 3788 wrote to memory of 5020 3788 d87f19cf81ca9d0c25e45a56110d417d7252d95ac50bc26dde7192aa0251c6bb.exe 80 PID 3788 wrote to memory of 5020 3788 d87f19cf81ca9d0c25e45a56110d417d7252d95ac50bc26dde7192aa0251c6bb.exe 80 PID 5020 wrote to memory of 1084 5020 za451175.exe 81 PID 5020 wrote to memory of 1084 5020 za451175.exe 81 PID 5020 wrote to memory of 1084 5020 za451175.exe 81 PID 1084 wrote to memory of 3472 1084 za361494.exe 82 PID 1084 wrote to memory of 3472 1084 za361494.exe 82 PID 1084 wrote to memory of 3472 1084 za361494.exe 82 PID 1084 wrote to memory of 4584 1084 za361494.exe 86 PID 1084 wrote to memory of 4584 1084 za361494.exe 86 PID 1084 wrote to memory of 4584 1084 za361494.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\d87f19cf81ca9d0c25e45a56110d417d7252d95ac50bc26dde7192aa0251c6bb.exe"C:\Users\Admin\AppData\Local\Temp\d87f19cf81ca9d0c25e45a56110d417d7252d95ac50bc26dde7192aa0251c6bb.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za451175.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za451175.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za361494.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za361494.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\03812737.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\03812737.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3472 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3472 -s 10925⤵
- Program crash
PID:1696
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w62Nj98.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w62Nj98.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4584
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 3472 -ip 34721⤵PID:3440
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
781KB
MD548c4c4476d0957a2341918d6f960a9b7
SHA19e47d1885490bff7197bd89ea49a85d73128ade4
SHA256e8eeb2ebab63e6b60ac55310601036381229c9578272e290bc218311950f78c6
SHA512f903473fc8e073e85073415a6507def8e3fca36a1170a2fc33e8aada07683cd1fafc3ad179ae4e9a68fdcc3e0cc97a8bd495d6e33f30bc54299714fe7a09f35d
-
Filesize
781KB
MD548c4c4476d0957a2341918d6f960a9b7
SHA19e47d1885490bff7197bd89ea49a85d73128ade4
SHA256e8eeb2ebab63e6b60ac55310601036381229c9578272e290bc218311950f78c6
SHA512f903473fc8e073e85073415a6507def8e3fca36a1170a2fc33e8aada07683cd1fafc3ad179ae4e9a68fdcc3e0cc97a8bd495d6e33f30bc54299714fe7a09f35d
-
Filesize
598KB
MD5c3b5096315f97e16cc440b532945308b
SHA1f9c38dc676231abe176c61445ee536d471ac2cc5
SHA25695f810626cb1c4307a9e32747b8d8b0231703504fff1237a930b75fefa82fd92
SHA51211ad6751b09139f2fc71bfc95c9b4242539a09065a42b2aa73a3fb08e3eb06c95e39726c2df115b94d9447e40a3495db46c1a20978b99e0a6a7429034852a644
-
Filesize
598KB
MD5c3b5096315f97e16cc440b532945308b
SHA1f9c38dc676231abe176c61445ee536d471ac2cc5
SHA25695f810626cb1c4307a9e32747b8d8b0231703504fff1237a930b75fefa82fd92
SHA51211ad6751b09139f2fc71bfc95c9b4242539a09065a42b2aa73a3fb08e3eb06c95e39726c2df115b94d9447e40a3495db46c1a20978b99e0a6a7429034852a644
-
Filesize
395KB
MD518f410f1df37a398ef353262202cbf24
SHA138960e2c4b98cffe3ade6c590ebcbc134df99cca
SHA2567a4dc6d7a6d6478115aa8a70e049c4505fe7ff64a7496ecacb21429b49ae5ff7
SHA5121435144965f85f71a73b9531d11730c1e4fbe7eff72b3d63f1a1d76fe0ae2812e40ff56ad2fe26dfbbaeb837cfc3e3eb0908f216ee2cb6947f3a0a6c919b2a5a
-
Filesize
395KB
MD518f410f1df37a398ef353262202cbf24
SHA138960e2c4b98cffe3ade6c590ebcbc134df99cca
SHA2567a4dc6d7a6d6478115aa8a70e049c4505fe7ff64a7496ecacb21429b49ae5ff7
SHA5121435144965f85f71a73b9531d11730c1e4fbe7eff72b3d63f1a1d76fe0ae2812e40ff56ad2fe26dfbbaeb837cfc3e3eb0908f216ee2cb6947f3a0a6c919b2a5a
-
Filesize
478KB
MD53f77b1718f21f408e089f9de3ee1a5ad
SHA1d0fec9c47f21e008e106487ea880e6b7563f0b7d
SHA25689690ffdefb7f4c4c5588b285fe3f4b7282824ca9c6d96254c86d37e0f4a09c3
SHA5127fad86f919adb2cb3579e11bbf7788ff92fcbaf824b159240984486fb52b0b784b7fbc46dc6404b904e53046b32ab608810b0c84c6106206f02c353a40efedae
-
Filesize
478KB
MD53f77b1718f21f408e089f9de3ee1a5ad
SHA1d0fec9c47f21e008e106487ea880e6b7563f0b7d
SHA25689690ffdefb7f4c4c5588b285fe3f4b7282824ca9c6d96254c86d37e0f4a09c3
SHA5127fad86f919adb2cb3579e11bbf7788ff92fcbaf824b159240984486fb52b0b784b7fbc46dc6404b904e53046b32ab608810b0c84c6106206f02c353a40efedae