Analysis
-
max time kernel
196s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 19:59
Static task
static1
Behavioral task
behavioral1
Sample
dc1fe88b850316faa04de4a0fe7dcfc4be4fff47653c80448484e0c8e118f81b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
dc1fe88b850316faa04de4a0fe7dcfc4be4fff47653c80448484e0c8e118f81b.exe
Resource
win10v2004-20230220-en
General
-
Target
dc1fe88b850316faa04de4a0fe7dcfc4be4fff47653c80448484e0c8e118f81b.exe
-
Size
690KB
-
MD5
be24f4e10108b443e7a42ea938abac43
-
SHA1
841ab6d568523bf683d433450ddc96f2b714f98d
-
SHA256
dc1fe88b850316faa04de4a0fe7dcfc4be4fff47653c80448484e0c8e118f81b
-
SHA512
7676342a039ab89ae81e334db81619b4ec46d0fa445ced96bbc8c94097e0aba779ecddae757aeed3c6a650fc2639858b1cf246e2e45096612e66ca6bad19ffa1
-
SSDEEP
12288:ry90Drt9LsJckfRk8kC1VCgGJniN+m5G6Bx1IAJGL:rykKJcGRFCsNy6xvQ
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1696-991-0x0000000007500000-0x0000000007B18000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 12294416.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 12294416.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 12294416.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 12294416.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 12294416.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 12294416.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1988 un703295.exe 2976 12294416.exe 1696 rk685701.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 12294416.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 12294416.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un703295.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce dc1fe88b850316faa04de4a0fe7dcfc4be4fff47653c80448484e0c8e118f81b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dc1fe88b850316faa04de4a0fe7dcfc4be4fff47653c80448484e0c8e118f81b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un703295.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3048 2976 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2976 12294416.exe 2976 12294416.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2976 12294416.exe Token: SeDebugPrivilege 1696 rk685701.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3780 wrote to memory of 1988 3780 dc1fe88b850316faa04de4a0fe7dcfc4be4fff47653c80448484e0c8e118f81b.exe 82 PID 3780 wrote to memory of 1988 3780 dc1fe88b850316faa04de4a0fe7dcfc4be4fff47653c80448484e0c8e118f81b.exe 82 PID 3780 wrote to memory of 1988 3780 dc1fe88b850316faa04de4a0fe7dcfc4be4fff47653c80448484e0c8e118f81b.exe 82 PID 1988 wrote to memory of 2976 1988 un703295.exe 83 PID 1988 wrote to memory of 2976 1988 un703295.exe 83 PID 1988 wrote to memory of 2976 1988 un703295.exe 83 PID 1988 wrote to memory of 1696 1988 un703295.exe 87 PID 1988 wrote to memory of 1696 1988 un703295.exe 87 PID 1988 wrote to memory of 1696 1988 un703295.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc1fe88b850316faa04de4a0fe7dcfc4be4fff47653c80448484e0c8e118f81b.exe"C:\Users\Admin\AppData\Local\Temp\dc1fe88b850316faa04de4a0fe7dcfc4be4fff47653c80448484e0c8e118f81b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un703295.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un703295.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\12294416.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\12294416.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2976 -s 10884⤵
- Program crash
PID:3048
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk685701.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk685701.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2976 -ip 29761⤵PID:1176
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD5bb9a9f4f3f933fd27d9b9019178dadd8
SHA1e38441299c00c47c791af59ae505231bcca16183
SHA2566f8fbf44017c466b209e5ff042e9839670cbd812108919a931d7c520ae558454
SHA5127d8fff8af1c1475b1979dcb632446b192fb856ca272c75622fc8415cfd3a08d46a34b745c4531ab44655617617cad0851030d8d2337307c78b41d28acc9056c6
-
Filesize
536KB
MD5bb9a9f4f3f933fd27d9b9019178dadd8
SHA1e38441299c00c47c791af59ae505231bcca16183
SHA2566f8fbf44017c466b209e5ff042e9839670cbd812108919a931d7c520ae558454
SHA5127d8fff8af1c1475b1979dcb632446b192fb856ca272c75622fc8415cfd3a08d46a34b745c4531ab44655617617cad0851030d8d2337307c78b41d28acc9056c6
-
Filesize
258KB
MD5666a8e72ecbcba74b1d2c16daf2eb070
SHA1ff58cdbd5342bd4c5b0d2532c271eb4860ff90b3
SHA256a0b49bf484c00026edbdb883d9e44a8fc6653c8c0a1df37cb368c6b72f71b60b
SHA512bfb6966dc7a10f40d9a018dccc5c34b81cac4a73783b1dd581399c154fa235f2bee395c3665b30e245d96179298b24ea0364d5d4771c1a35de3957f20cda197e
-
Filesize
258KB
MD5666a8e72ecbcba74b1d2c16daf2eb070
SHA1ff58cdbd5342bd4c5b0d2532c271eb4860ff90b3
SHA256a0b49bf484c00026edbdb883d9e44a8fc6653c8c0a1df37cb368c6b72f71b60b
SHA512bfb6966dc7a10f40d9a018dccc5c34b81cac4a73783b1dd581399c154fa235f2bee395c3665b30e245d96179298b24ea0364d5d4771c1a35de3957f20cda197e
-
Filesize
341KB
MD5a195519ebbd4dfc1e6e51e65a322ee57
SHA16156a150abc37da2ba093e02519d6cc754e40a38
SHA2568bdb9d5b28e5a8b1c6c276e96da39bf66bf7a237a363c265e01fbda4169e7f95
SHA5122b9b260e17365c2a626b8ede3df20eba4cd3cee3575922dc777288f6e8f2d840b38bffabc92cc06d8912c3f2607604430ce2ecb96f95e01d96971d0391c0b253
-
Filesize
341KB
MD5a195519ebbd4dfc1e6e51e65a322ee57
SHA16156a150abc37da2ba093e02519d6cc754e40a38
SHA2568bdb9d5b28e5a8b1c6c276e96da39bf66bf7a237a363c265e01fbda4169e7f95
SHA5122b9b260e17365c2a626b8ede3df20eba4cd3cee3575922dc777288f6e8f2d840b38bffabc92cc06d8912c3f2607604430ce2ecb96f95e01d96971d0391c0b253