Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05-05-2023 20:10
Static task
static1
Behavioral task
behavioral1
Sample
e42696c7c9b453a4eadcd3525546e52e8cdca1428b6756dd4da81accaa6727b9.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e42696c7c9b453a4eadcd3525546e52e8cdca1428b6756dd4da81accaa6727b9.exe
Resource
win10v2004-20230220-en
General
-
Target
e42696c7c9b453a4eadcd3525546e52e8cdca1428b6756dd4da81accaa6727b9.exe
-
Size
697KB
-
MD5
ce672596a28d6809f004a6715e937c80
-
SHA1
768df5b999c2175ce5f2608d4726877b4d4f1658
-
SHA256
e42696c7c9b453a4eadcd3525546e52e8cdca1428b6756dd4da81accaa6727b9
-
SHA512
7919c0dbe1b38679dde534cd4f4de38233552969393016cd69399694ab00adf56257f0821eaa54837e48399e39dfeeb379ee41fffd37929a2c97a3c27c27b1da
-
SSDEEP
12288:Ny90U5ZNVavsxieCHnQLGZbal4fDZBH1K4x2r8Mgj0Pz8xd:Ny/nNVavAd0QLGnlBVK4xA8Mgje8xd
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1944-989-0x0000000009C90000-0x000000000A2A8000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 08930235.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 08930235.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 08930235.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 08930235.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 08930235.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 08930235.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1844 un948306.exe 1236 08930235.exe 1944 rk406481.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 08930235.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 08930235.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e42696c7c9b453a4eadcd3525546e52e8cdca1428b6756dd4da81accaa6727b9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e42696c7c9b453a4eadcd3525546e52e8cdca1428b6756dd4da81accaa6727b9.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un948306.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un948306.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4480 1236 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1236 08930235.exe 1236 08930235.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1236 08930235.exe Token: SeDebugPrivilege 1944 rk406481.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4104 wrote to memory of 1844 4104 e42696c7c9b453a4eadcd3525546e52e8cdca1428b6756dd4da81accaa6727b9.exe 84 PID 4104 wrote to memory of 1844 4104 e42696c7c9b453a4eadcd3525546e52e8cdca1428b6756dd4da81accaa6727b9.exe 84 PID 4104 wrote to memory of 1844 4104 e42696c7c9b453a4eadcd3525546e52e8cdca1428b6756dd4da81accaa6727b9.exe 84 PID 1844 wrote to memory of 1236 1844 un948306.exe 85 PID 1844 wrote to memory of 1236 1844 un948306.exe 85 PID 1844 wrote to memory of 1236 1844 un948306.exe 85 PID 1844 wrote to memory of 1944 1844 un948306.exe 88 PID 1844 wrote to memory of 1944 1844 un948306.exe 88 PID 1844 wrote to memory of 1944 1844 un948306.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\e42696c7c9b453a4eadcd3525546e52e8cdca1428b6756dd4da81accaa6727b9.exe"C:\Users\Admin\AppData\Local\Temp\e42696c7c9b453a4eadcd3525546e52e8cdca1428b6756dd4da81accaa6727b9.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un948306.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un948306.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\08930235.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\08930235.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1236 -s 10804⤵
- Program crash
PID:4480
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk406481.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk406481.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1236 -ip 12361⤵PID:1412
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
543KB
MD5587903a5d4fe4394817b546d07bbdfff
SHA1bc747674392d8731c1186ddc29054c5d193ad573
SHA256b74a29181a07edfa3fc6b4f172f4f2725186d9cb4587971e3f78c6b40e1bad9b
SHA5120856de5cde56d50d9a0b0c06e5f141494bbda0d1ec27c2f4490071ac07171fc0d66fdb61ec16e1dd2621c69873a367067b6a56293d3c66f940cc3bfaa5c3dae8
-
Filesize
543KB
MD5587903a5d4fe4394817b546d07bbdfff
SHA1bc747674392d8731c1186ddc29054c5d193ad573
SHA256b74a29181a07edfa3fc6b4f172f4f2725186d9cb4587971e3f78c6b40e1bad9b
SHA5120856de5cde56d50d9a0b0c06e5f141494bbda0d1ec27c2f4490071ac07171fc0d66fdb61ec16e1dd2621c69873a367067b6a56293d3c66f940cc3bfaa5c3dae8
-
Filesize
265KB
MD5d4506eafc71cf445f86b3abfc937c798
SHA1ce9d4dd42dd059b71086ede74a33352b9a11d6a0
SHA25644adf9fd9f771c7f1ad7273f87a8dbebb5d6666ebb50d58b1b1416f31d0dd08f
SHA512507b777eee9112dd99650bb264c11b1b529e9b735c631e335fa3a8c2dd861d71287c970f2bc7484ab9e840b8e78d4a879a3efc2c448bb1e4dd2ee876cadc37e1
-
Filesize
265KB
MD5d4506eafc71cf445f86b3abfc937c798
SHA1ce9d4dd42dd059b71086ede74a33352b9a11d6a0
SHA25644adf9fd9f771c7f1ad7273f87a8dbebb5d6666ebb50d58b1b1416f31d0dd08f
SHA512507b777eee9112dd99650bb264c11b1b529e9b735c631e335fa3a8c2dd861d71287c970f2bc7484ab9e840b8e78d4a879a3efc2c448bb1e4dd2ee876cadc37e1
-
Filesize
347KB
MD5612a62dc14bd801993e6f3d48f38b999
SHA15e8859e444a131878032e0d2b1985da22fa4f442
SHA256c835cdc2325c1c7d9ed802e93761f5990646eda19737080d35b1e1cffc0866b1
SHA512d35414ae25d8bbf7f8dcbb1b7823559d7049cc708530cd1b7f17e7bcca28cd2aa60e9b963e05b7670c01ec80b0bff3c980fa94d4109864aa449fc2edd6d66aa5
-
Filesize
347KB
MD5612a62dc14bd801993e6f3d48f38b999
SHA15e8859e444a131878032e0d2b1985da22fa4f442
SHA256c835cdc2325c1c7d9ed802e93761f5990646eda19737080d35b1e1cffc0866b1
SHA512d35414ae25d8bbf7f8dcbb1b7823559d7049cc708530cd1b7f17e7bcca28cd2aa60e9b963e05b7670c01ec80b0bff3c980fa94d4109864aa449fc2edd6d66aa5