Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 22:10
Static task
static1
Behavioral task
behavioral1
Sample
60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39.exe
Resource
win10v2004-20230220-en
General
-
Target
60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39.exe
-
Size
691KB
-
MD5
7c3275409a3c421c4c64c84557d0369e
-
SHA1
040731069fd061021fd8b3a0cb0531eed1824492
-
SHA256
60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39
-
SHA512
0e12ae1e1c7c8a3bd040ab215d6a4129898b8a356981a68e808bed17ad101c821bba6fcc5a1295d2b89a2fde2282542b633f062ea309b578268d24a47da0ab80
-
SSDEEP
12288:Dy90PWUJi5+BLKRv4AdCYcmrIlzyesue2Q7wVgANBZSSr4b5PKq:DyQWZyk4XtJyxt2iANeSkb5Pd
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4432-241-0x0000000007920000-0x0000000007F38000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 16087329.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 16087329.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 16087329.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 16087329.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 16087329.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 16087329.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 2752 un851024.exe 3132 16087329.exe 4056 rk984009.exe 4436 rk984009.exe 4432 si636532.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 16087329.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 16087329.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un851024.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un851024.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4056 set thread context of 4436 4056 rk984009.exe 90 -
Program crash 1 IoCs
pid pid_target Process procid_target 4620 3132 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3132 16087329.exe 3132 16087329.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3132 16087329.exe Token: SeDebugPrivilege 4436 rk984009.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1484 wrote to memory of 2752 1484 60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39.exe 84 PID 1484 wrote to memory of 2752 1484 60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39.exe 84 PID 1484 wrote to memory of 2752 1484 60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39.exe 84 PID 2752 wrote to memory of 3132 2752 un851024.exe 85 PID 2752 wrote to memory of 3132 2752 un851024.exe 85 PID 2752 wrote to memory of 3132 2752 un851024.exe 85 PID 2752 wrote to memory of 4056 2752 un851024.exe 89 PID 2752 wrote to memory of 4056 2752 un851024.exe 89 PID 2752 wrote to memory of 4056 2752 un851024.exe 89 PID 4056 wrote to memory of 4436 4056 rk984009.exe 90 PID 4056 wrote to memory of 4436 4056 rk984009.exe 90 PID 4056 wrote to memory of 4436 4056 rk984009.exe 90 PID 4056 wrote to memory of 4436 4056 rk984009.exe 90 PID 4056 wrote to memory of 4436 4056 rk984009.exe 90 PID 4056 wrote to memory of 4436 4056 rk984009.exe 90 PID 4056 wrote to memory of 4436 4056 rk984009.exe 90 PID 4056 wrote to memory of 4436 4056 rk984009.exe 90 PID 4056 wrote to memory of 4436 4056 rk984009.exe 90 PID 1484 wrote to memory of 4432 1484 60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39.exe 91 PID 1484 wrote to memory of 4432 1484 60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39.exe 91 PID 1484 wrote to memory of 4432 1484 60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39.exe"C:\Users\Admin\AppData\Local\Temp\60030ecc6b5fd606c7f00bdbceb76de28a8f554e6ab1836fc3f58d86d7ad8b39.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un851024.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un851024.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\16087329.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\16087329.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3132 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3132 -s 10884⤵
- Program crash
PID:4620
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk984009.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk984009.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk984009.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk984009.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4436
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si636532.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si636532.exe2⤵
- Executes dropped EXE
PID:4432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3132 -ip 31321⤵PID:3640
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5e1c805d3cefe221689da30b8a2d944f2
SHA1a9a94fd89ed22c2a127c81f6e57f822eae1d9f26
SHA25632023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a
SHA5127801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7
-
Filesize
136KB
MD5e1c805d3cefe221689da30b8a2d944f2
SHA1a9a94fd89ed22c2a127c81f6e57f822eae1d9f26
SHA25632023b065401cf468d0088e334ad60bf12afc3d552030a6a3500e74500de735a
SHA5127801b1432717a8105f7f255d7387eaffa264eddf74e6b782776d548f9dbb82b5223c7412df3cbc8e91cc63988e2e04a8160280f697e93d0fa5d056dc183252e7
-
Filesize
537KB
MD5923dd840d11ad83a7b8a0aa0ec580bd9
SHA1998c072ba8715c67129b0d4c2e47402b316778ab
SHA2562ee4de028dbab8107c78417ed2820c7938a19b036a4ac19ffe323b4bf121f8f2
SHA512487e6e25cc437077e42f3c138f216d5956e8d26152d03bda268f6afe606be64585dd39f45dbbd117ad3a6aeb027466a77b1203b9d2291a5c8c3e1e99c6f62a15
-
Filesize
537KB
MD5923dd840d11ad83a7b8a0aa0ec580bd9
SHA1998c072ba8715c67129b0d4c2e47402b316778ab
SHA2562ee4de028dbab8107c78417ed2820c7938a19b036a4ac19ffe323b4bf121f8f2
SHA512487e6e25cc437077e42f3c138f216d5956e8d26152d03bda268f6afe606be64585dd39f45dbbd117ad3a6aeb027466a77b1203b9d2291a5c8c3e1e99c6f62a15
-
Filesize
259KB
MD5e316c2de777d55b98eb76fa4b278de7f
SHA111cac13b2850abeef8d1d359f24fb7865173f6dd
SHA256bc3e53579b9cde6683fa8d45c6e62e53c6c337e9f0f44ff7808ab58474060c17
SHA512ef9c8ea766877b8ae7413d17d565a6a43af6f641fe8e344a0036cd8eb0ac060a3a98c7ce7aa21ffdd7242b4b44d187ab64e966d7af4e50db58bc64d21d6e4104
-
Filesize
259KB
MD5e316c2de777d55b98eb76fa4b278de7f
SHA111cac13b2850abeef8d1d359f24fb7865173f6dd
SHA256bc3e53579b9cde6683fa8d45c6e62e53c6c337e9f0f44ff7808ab58474060c17
SHA512ef9c8ea766877b8ae7413d17d565a6a43af6f641fe8e344a0036cd8eb0ac060a3a98c7ce7aa21ffdd7242b4b44d187ab64e966d7af4e50db58bc64d21d6e4104
-
Filesize
342KB
MD5bf70b37bcbd0f719e03a982c6c588d77
SHA132a932047845ebe2a8a2b22d48dc2af192a18d91
SHA25617ed923cb1e879ec89be82253dbfda9a6d14d4f1272706bd340f589df2874279
SHA51227e03eabf35e3c507fb943b4953e1919c386ef986683d81e650a0dda5185907eb032e1acb3fa493f8e768b36439ddf61e2cfea76979d001c4986a609f588e0bd
-
Filesize
342KB
MD5bf70b37bcbd0f719e03a982c6c588d77
SHA132a932047845ebe2a8a2b22d48dc2af192a18d91
SHA25617ed923cb1e879ec89be82253dbfda9a6d14d4f1272706bd340f589df2874279
SHA51227e03eabf35e3c507fb943b4953e1919c386ef986683d81e650a0dda5185907eb032e1acb3fa493f8e768b36439ddf61e2cfea76979d001c4986a609f588e0bd
-
Filesize
342KB
MD5bf70b37bcbd0f719e03a982c6c588d77
SHA132a932047845ebe2a8a2b22d48dc2af192a18d91
SHA25617ed923cb1e879ec89be82253dbfda9a6d14d4f1272706bd340f589df2874279
SHA51227e03eabf35e3c507fb943b4953e1919c386ef986683d81e650a0dda5185907eb032e1acb3fa493f8e768b36439ddf61e2cfea76979d001c4986a609f588e0bd