Analysis
-
max time kernel
154s -
max time network
206s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2023, 20:39
Static task
static1
Behavioral task
behavioral1
Sample
fed450e41edba81aed38a86c9c53514083134a494a53532c3ddc3e626e221ed1.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
fed450e41edba81aed38a86c9c53514083134a494a53532c3ddc3e626e221ed1.exe
Resource
win10v2004-20230220-en
General
-
Target
fed450e41edba81aed38a86c9c53514083134a494a53532c3ddc3e626e221ed1.exe
-
Size
694KB
-
MD5
bbaafbdb443496e35fae1651a1f5fd7e
-
SHA1
b9dd0d0c99b28f3609ec1e971bef53246bfdd767
-
SHA256
fed450e41edba81aed38a86c9c53514083134a494a53532c3ddc3e626e221ed1
-
SHA512
41d53c8b322f661fd8955774826d3537596cbe8a5eb03b60bb7410b24d07cb5bdd7eb7eeb3d9ba0341f730cf30680d764d5d6569ec84ff151b213b2fdf25dcee
-
SSDEEP
12288:5y902CwHfsR4s9R+VwpFTsmgw76ZbGdsXnfWw6FW18bEKiA+ih51q+6M5OuK:5ykwg4s9REoFdgUeNj6FW18bEB4xo
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/772-992-0x0000000009D20000-0x000000000A338000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 33577360.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 33577360.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 33577360.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 33577360.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 33577360.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 33577360.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 3148 un032897.exe 2060 33577360.exe 772 rk569024.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 33577360.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 33577360.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un032897.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un032897.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce fed450e41edba81aed38a86c9c53514083134a494a53532c3ddc3e626e221ed1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fed450e41edba81aed38a86c9c53514083134a494a53532c3ddc3e626e221ed1.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 5044 2060 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2060 33577360.exe 2060 33577360.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2060 33577360.exe Token: SeDebugPrivilege 772 rk569024.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 872 wrote to memory of 3148 872 fed450e41edba81aed38a86c9c53514083134a494a53532c3ddc3e626e221ed1.exe 81 PID 872 wrote to memory of 3148 872 fed450e41edba81aed38a86c9c53514083134a494a53532c3ddc3e626e221ed1.exe 81 PID 872 wrote to memory of 3148 872 fed450e41edba81aed38a86c9c53514083134a494a53532c3ddc3e626e221ed1.exe 81 PID 3148 wrote to memory of 2060 3148 un032897.exe 82 PID 3148 wrote to memory of 2060 3148 un032897.exe 82 PID 3148 wrote to memory of 2060 3148 un032897.exe 82 PID 3148 wrote to memory of 772 3148 un032897.exe 88 PID 3148 wrote to memory of 772 3148 un032897.exe 88 PID 3148 wrote to memory of 772 3148 un032897.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\fed450e41edba81aed38a86c9c53514083134a494a53532c3ddc3e626e221ed1.exe"C:\Users\Admin\AppData\Local\Temp\fed450e41edba81aed38a86c9c53514083134a494a53532c3ddc3e626e221ed1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un032897.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un032897.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\33577360.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\33577360.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 10844⤵
- Program crash
PID:5044
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk569024.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk569024.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:772
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2060 -ip 20601⤵PID:1916
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
540KB
MD5c156a62fe0ef7df4b6e986070262af4c
SHA1ec9f458e7c26973722e79afc3043f728db6b7ac0
SHA256c85da4a16efe22776b66252456a5f1c378cd77b22b5d7bebedc18e8afab740d8
SHA5124dbef0330f60473afdec82e762fd9fed55bff145ba30c4c036ca39b25574516a81789c9a61a2100d61182ad0b7ef75b912f878fe6c09776460235c6c34eb4a79
-
Filesize
540KB
MD5c156a62fe0ef7df4b6e986070262af4c
SHA1ec9f458e7c26973722e79afc3043f728db6b7ac0
SHA256c85da4a16efe22776b66252456a5f1c378cd77b22b5d7bebedc18e8afab740d8
SHA5124dbef0330f60473afdec82e762fd9fed55bff145ba30c4c036ca39b25574516a81789c9a61a2100d61182ad0b7ef75b912f878fe6c09776460235c6c34eb4a79
-
Filesize
258KB
MD54c378860a298115bec7e20da39925ff0
SHA1605bf99cc00454555a1e0093fad96af9ae788154
SHA2566af9b081f3cc15e15814a7b156a40a75d5e9201219b3d6ec4732d6818cc522dc
SHA5122a462f0f04946557329e7ca5c366735d1a90df87c0c7cb60b1d4d1ab23c67e77f81e7e1a882cc175657a9744ebd4f0d00d51e905dbdb1d20c3bf214ec5b808df
-
Filesize
258KB
MD54c378860a298115bec7e20da39925ff0
SHA1605bf99cc00454555a1e0093fad96af9ae788154
SHA2566af9b081f3cc15e15814a7b156a40a75d5e9201219b3d6ec4732d6818cc522dc
SHA5122a462f0f04946557329e7ca5c366735d1a90df87c0c7cb60b1d4d1ab23c67e77f81e7e1a882cc175657a9744ebd4f0d00d51e905dbdb1d20c3bf214ec5b808df
-
Filesize
340KB
MD53f66de8927a238963a26b00e5f1e7353
SHA118dbfe339dae4a938473656ca67b105d16aab779
SHA2562f50eee00cf4205d6e069de43d6f2ea689f5f023357dda174be5a4e04fe2c609
SHA51298151cae1b76bf3ef44124034b43bbc7576b9fb58225aeddc3d52f4230008863f35db98f2a4dd23ff602e01c5c6aa11ba1145ed7c96f8eedd41078f40f2a7b14
-
Filesize
340KB
MD53f66de8927a238963a26b00e5f1e7353
SHA118dbfe339dae4a938473656ca67b105d16aab779
SHA2562f50eee00cf4205d6e069de43d6f2ea689f5f023357dda174be5a4e04fe2c609
SHA51298151cae1b76bf3ef44124034b43bbc7576b9fb58225aeddc3d52f4230008863f35db98f2a4dd23ff602e01c5c6aa11ba1145ed7c96f8eedd41078f40f2a7b14