Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 21:26
Static task
static1
Behavioral task
behavioral1
Sample
3b853f65024e01f4f79d4f3df711fd9cca77f330d729844a1416667520fd7a69.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3b853f65024e01f4f79d4f3df711fd9cca77f330d729844a1416667520fd7a69.exe
Resource
win10v2004-20230220-en
General
-
Target
3b853f65024e01f4f79d4f3df711fd9cca77f330d729844a1416667520fd7a69.exe
-
Size
1.1MB
-
MD5
ceed9926c5bf5710aee782849b97a673
-
SHA1
a8d1d01daa24a5f5cb8a2852766ccd60f7a4bd60
-
SHA256
3b853f65024e01f4f79d4f3df711fd9cca77f330d729844a1416667520fd7a69
-
SHA512
aa44a2586006ba3ced0a07168ccbf6d94b1cd9cb75a747f173d6e3806a12f7aef9522cee024e57b9b33dccb6f3313fd5dc106c21f44544a17951b08d9685d0a4
-
SSDEEP
24576:Sy3mYAinZqbzOZNBz5CG1xhNPgaprYlzov+Pi7dbl63Kq+ec:5ruOPBAG1xj4apclAzdbls
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4176-996-0x0000000007920000-0x0000000007F38000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 57164204.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 57164204.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 57164204.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 57164204.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 57164204.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 57164204.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 4388 za787097.exe 2144 za209146.exe 408 57164204.exe 4176 w11QU73.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 57164204.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 57164204.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3b853f65024e01f4f79d4f3df711fd9cca77f330d729844a1416667520fd7a69.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3b853f65024e01f4f79d4f3df711fd9cca77f330d729844a1416667520fd7a69.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za787097.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" za787097.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za209146.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" za209146.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3172 408 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 408 57164204.exe 408 57164204.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 408 57164204.exe Token: SeDebugPrivilege 4176 w11QU73.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1200 wrote to memory of 4388 1200 3b853f65024e01f4f79d4f3df711fd9cca77f330d729844a1416667520fd7a69.exe 81 PID 1200 wrote to memory of 4388 1200 3b853f65024e01f4f79d4f3df711fd9cca77f330d729844a1416667520fd7a69.exe 81 PID 1200 wrote to memory of 4388 1200 3b853f65024e01f4f79d4f3df711fd9cca77f330d729844a1416667520fd7a69.exe 81 PID 4388 wrote to memory of 2144 4388 za787097.exe 82 PID 4388 wrote to memory of 2144 4388 za787097.exe 82 PID 4388 wrote to memory of 2144 4388 za787097.exe 82 PID 2144 wrote to memory of 408 2144 za209146.exe 83 PID 2144 wrote to memory of 408 2144 za209146.exe 83 PID 2144 wrote to memory of 408 2144 za209146.exe 83 PID 2144 wrote to memory of 4176 2144 za209146.exe 90 PID 2144 wrote to memory of 4176 2144 za209146.exe 90 PID 2144 wrote to memory of 4176 2144 za209146.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b853f65024e01f4f79d4f3df711fd9cca77f330d729844a1416667520fd7a69.exe"C:\Users\Admin\AppData\Local\Temp\3b853f65024e01f4f79d4f3df711fd9cca77f330d729844a1416667520fd7a69.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za787097.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za787097.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za209146.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za209146.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\57164204.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\57164204.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 408 -s 10845⤵
- Program crash
PID:3172
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w11QU73.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w11QU73.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4176
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 408 -ip 4081⤵PID:3836
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
775KB
MD57bf1fa1fc25a717976a1d527a44d0073
SHA1a9c415a807dd9ff9a5a2aa49d22575b0d5f6f4ae
SHA25698f2fbae8209149262382c3c28be9d1a0577df40434b71dee24ace2223d4940d
SHA512e924d74b20cc205a3291a537776566c71d91f3dbe4d7f17025927ebb6cfc17f89223785267c792b33e4a3085f7468bcea69cea902f02fe8d076454ca21dde435
-
Filesize
775KB
MD57bf1fa1fc25a717976a1d527a44d0073
SHA1a9c415a807dd9ff9a5a2aa49d22575b0d5f6f4ae
SHA25698f2fbae8209149262382c3c28be9d1a0577df40434b71dee24ace2223d4940d
SHA512e924d74b20cc205a3291a537776566c71d91f3dbe4d7f17025927ebb6cfc17f89223785267c792b33e4a3085f7468bcea69cea902f02fe8d076454ca21dde435
-
Filesize
593KB
MD5158b6da2018cec07e393e84809d93e25
SHA144eba44c2a339363bde1d8156bf25c6be69ca61a
SHA256d9faba8a8e5d66f96c89d119c9c0733a8bc915171e78027268cf7f028cc5c4bc
SHA5123c146b045490beba66f0f1f2a232b267435f68117b6235713874260ccf65e1a2562f6a63f48fb7318c552acde7fe48ee4847b2938b97871f95d8cef401eacbff
-
Filesize
593KB
MD5158b6da2018cec07e393e84809d93e25
SHA144eba44c2a339363bde1d8156bf25c6be69ca61a
SHA256d9faba8a8e5d66f96c89d119c9c0733a8bc915171e78027268cf7f028cc5c4bc
SHA5123c146b045490beba66f0f1f2a232b267435f68117b6235713874260ccf65e1a2562f6a63f48fb7318c552acde7fe48ee4847b2938b97871f95d8cef401eacbff
-
Filesize
377KB
MD5b87944d4e4208098315a7961f3617e44
SHA15cfd58eb2016c645593f6fc5f027932bc097d049
SHA25602d4fa840e5225dc03c23188247faed6351ffc8b7abfa38b3ef84383ecd6c336
SHA512a84462642dcf91334c81dfb38a03f4bff751d4731d308fd9f2a3bc9a1f5b8c49f85760f316af328f15b3103e2f2c2d8f7e88be1347384559784f929ee771d5f1
-
Filesize
377KB
MD5b87944d4e4208098315a7961f3617e44
SHA15cfd58eb2016c645593f6fc5f027932bc097d049
SHA25602d4fa840e5225dc03c23188247faed6351ffc8b7abfa38b3ef84383ecd6c336
SHA512a84462642dcf91334c81dfb38a03f4bff751d4731d308fd9f2a3bc9a1f5b8c49f85760f316af328f15b3103e2f2c2d8f7e88be1347384559784f929ee771d5f1
-
Filesize
459KB
MD5c18ce635d6d9106610d11398b938e462
SHA1c5c1ee545a2145920711b10ddf89e93c9c833483
SHA2565ff013f7fdf8466b0601f38b95111b2fa9963ddac705a00cface3cbfa1d7f069
SHA51266ba9ed6bd3a2755e848debe785f19db1187ccd3c11a05c87ae0d875dcf01b79b2377f01b6421996a246516809e78cdaa4d919f39c67f719f70e80c2223d0a9d
-
Filesize
459KB
MD5c18ce635d6d9106610d11398b938e462
SHA1c5c1ee545a2145920711b10ddf89e93c9c833483
SHA2565ff013f7fdf8466b0601f38b95111b2fa9963ddac705a00cface3cbfa1d7f069
SHA51266ba9ed6bd3a2755e848debe785f19db1187ccd3c11a05c87ae0d875dcf01b79b2377f01b6421996a246516809e78cdaa4d919f39c67f719f70e80c2223d0a9d