Analysis
-
max time kernel
159s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 20:00
Static task
static1
Behavioral task
behavioral1
Sample
dd08112ba8942c14db848019368ed40d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
dd08112ba8942c14db848019368ed40d.exe
Resource
win10v2004-20230220-en
General
-
Target
dd08112ba8942c14db848019368ed40d.exe
-
Size
696KB
-
MD5
dd08112ba8942c14db848019368ed40d
-
SHA1
2db5fdb287e16201a4d7612e5593acffff0a0848
-
SHA256
101e6d28a5cb1216e2700a4236cb81df4a7e422e404c80bfb86462bdfef78ba9
-
SHA512
7287a333f257190d4b1d1948671fbb3d76051209fce222d46d137bbac38f650ae2251f945415234cd8b1ce64e7f14b3a9529664887ec2c8fa293b60a9337cb6c
-
SSDEEP
12288:ty904sMhGxdVU0uugGGx/qsvi8NU15z/kkxW6Yn0:tyi9wNDBqs68Ni5z/kK/Yn0
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/796-987-0x0000000009CC0000-0x000000000A2D8000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 97782074.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 97782074.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 97782074.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 97782074.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 97782074.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 97782074.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1356 un737002.exe 2552 97782074.exe 796 rk680629.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 97782074.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 97782074.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dd08112ba8942c14db848019368ed40d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dd08112ba8942c14db848019368ed40d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un737002.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un737002.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3912 2552 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2552 97782074.exe 2552 97782074.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2552 97782074.exe Token: SeDebugPrivilege 796 rk680629.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4272 wrote to memory of 1356 4272 dd08112ba8942c14db848019368ed40d.exe 82 PID 4272 wrote to memory of 1356 4272 dd08112ba8942c14db848019368ed40d.exe 82 PID 4272 wrote to memory of 1356 4272 dd08112ba8942c14db848019368ed40d.exe 82 PID 1356 wrote to memory of 2552 1356 un737002.exe 83 PID 1356 wrote to memory of 2552 1356 un737002.exe 83 PID 1356 wrote to memory of 2552 1356 un737002.exe 83 PID 1356 wrote to memory of 796 1356 un737002.exe 88 PID 1356 wrote to memory of 796 1356 un737002.exe 88 PID 1356 wrote to memory of 796 1356 un737002.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd08112ba8942c14db848019368ed40d.exe"C:\Users\Admin\AppData\Local\Temp\dd08112ba8942c14db848019368ed40d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un737002.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un737002.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\97782074.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\97782074.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 10804⤵
- Program crash
PID:3912
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk680629.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk680629.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:796
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2552 -ip 25521⤵PID:1292
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
542KB
MD533ed1c1c974634369710a79f39fbcf7c
SHA113235a75e2e3c835e37b28d01f675c1f668ae3fc
SHA25603a1d70d56346a9145f854e2a615a0688a110a6aefbf9b907d57890361b73e79
SHA5125f87e96bbc50515dc0f2177d9e400a5f615776b53124666fb43b8715a9b88d7ca1b635b434c5f3d86800702e351f4700b1c87b09535e7507ad385afe24c129d9
-
Filesize
542KB
MD533ed1c1c974634369710a79f39fbcf7c
SHA113235a75e2e3c835e37b28d01f675c1f668ae3fc
SHA25603a1d70d56346a9145f854e2a615a0688a110a6aefbf9b907d57890361b73e79
SHA5125f87e96bbc50515dc0f2177d9e400a5f615776b53124666fb43b8715a9b88d7ca1b635b434c5f3d86800702e351f4700b1c87b09535e7507ad385afe24c129d9
-
Filesize
258KB
MD55c4441fa274f4e1338f5337f5dfe7610
SHA144e7a06668230575ffc14153712df3c341ceafe5
SHA256ad4b12e1eda665409c95a9f9120b5706258cdcb53590ce7e9b1ab6d7702dfc27
SHA512135ea509043f8215050c3d7d96701e85e6740cf697f14f24fbdb2c4309bd917ab930ea137141e0a8d1a14a28cd1fc364adfa7990f8c760c03e7a3e5f42d19481
-
Filesize
258KB
MD55c4441fa274f4e1338f5337f5dfe7610
SHA144e7a06668230575ffc14153712df3c341ceafe5
SHA256ad4b12e1eda665409c95a9f9120b5706258cdcb53590ce7e9b1ab6d7702dfc27
SHA512135ea509043f8215050c3d7d96701e85e6740cf697f14f24fbdb2c4309bd917ab930ea137141e0a8d1a14a28cd1fc364adfa7990f8c760c03e7a3e5f42d19481
-
Filesize
340KB
MD52755880412919bf5b1bb139a47efb455
SHA199666a60a44c82c33430caaad2507b3d9fd18a27
SHA256c0919163526f44e905a26d8bd85f21d9f7011c77baf5ae7cd2e29af6b12559cf
SHA51255c8fe0c4ab715accf8600374867db6cbf52df01164e86705743687a2b9d90968a0383e501c1650af781d9add039dec9563626d0df4673bd1a5ed3be322832a6
-
Filesize
340KB
MD52755880412919bf5b1bb139a47efb455
SHA199666a60a44c82c33430caaad2507b3d9fd18a27
SHA256c0919163526f44e905a26d8bd85f21d9f7011c77baf5ae7cd2e29af6b12559cf
SHA51255c8fe0c4ab715accf8600374867db6cbf52df01164e86705743687a2b9d90968a0383e501c1650af781d9add039dec9563626d0df4673bd1a5ed3be322832a6