Analysis
-
max time kernel
147s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 21:33
Static task
static1
Behavioral task
behavioral1
Sample
410ff1c9a3e4f80ee94beb099a83cec62120e7f112afb14483762e7a54c17e5c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
410ff1c9a3e4f80ee94beb099a83cec62120e7f112afb14483762e7a54c17e5c.exe
Resource
win10v2004-20230220-en
General
-
Target
410ff1c9a3e4f80ee94beb099a83cec62120e7f112afb14483762e7a54c17e5c.exe
-
Size
694KB
-
MD5
b050121b8d0590893174d1ed7bac78be
-
SHA1
e20c2d8cc424e0e90b64bd56c83983202ec40e4c
-
SHA256
410ff1c9a3e4f80ee94beb099a83cec62120e7f112afb14483762e7a54c17e5c
-
SHA512
7005762d69a026573ee15148ece619409217d1bcdd5e4d4a72d460e8acb81a9581994ffcac8ff1ff44690520198977867f6b0221e8b38fa206c8574ebf44a897
-
SSDEEP
12288:gy90lyvACCyR46ZL+IwMkMoLx3RjWEz7wa8qqsclYk:gyZ4pyR46L+ukfd31Ws7Es0Yk
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1504-990-0x0000000009D70000-0x000000000A388000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 45418577.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 45418577.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 45418577.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 45418577.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 45418577.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 45418577.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1396 un204091.exe 2436 45418577.exe 1504 rk756052.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 45418577.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 45418577.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 410ff1c9a3e4f80ee94beb099a83cec62120e7f112afb14483762e7a54c17e5c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un204091.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un204091.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 410ff1c9a3e4f80ee94beb099a83cec62120e7f112afb14483762e7a54c17e5c.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4624 2436 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2436 45418577.exe 2436 45418577.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2436 45418577.exe Token: SeDebugPrivilege 1504 rk756052.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4232 wrote to memory of 1396 4232 410ff1c9a3e4f80ee94beb099a83cec62120e7f112afb14483762e7a54c17e5c.exe 84 PID 4232 wrote to memory of 1396 4232 410ff1c9a3e4f80ee94beb099a83cec62120e7f112afb14483762e7a54c17e5c.exe 84 PID 4232 wrote to memory of 1396 4232 410ff1c9a3e4f80ee94beb099a83cec62120e7f112afb14483762e7a54c17e5c.exe 84 PID 1396 wrote to memory of 2436 1396 un204091.exe 85 PID 1396 wrote to memory of 2436 1396 un204091.exe 85 PID 1396 wrote to memory of 2436 1396 un204091.exe 85 PID 1396 wrote to memory of 1504 1396 un204091.exe 90 PID 1396 wrote to memory of 1504 1396 un204091.exe 90 PID 1396 wrote to memory of 1504 1396 un204091.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\410ff1c9a3e4f80ee94beb099a83cec62120e7f112afb14483762e7a54c17e5c.exe"C:\Users\Admin\AppData\Local\Temp\410ff1c9a3e4f80ee94beb099a83cec62120e7f112afb14483762e7a54c17e5c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un204091.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un204091.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\45418577.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\45418577.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2436 -s 10284⤵
- Program crash
PID:4624
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk756052.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk756052.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2436 -ip 24361⤵PID:4572
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
540KB
MD5f0f6437b295c4efe00064ed1ff4de26d
SHA191906b2e7594b3218daf83cd57f0372599efe02c
SHA256772f4d6aae21db25eed0a5ca6a4c7ac89522a87b9431402c3fe37deaafe91e71
SHA512404809c6bfea8579f7de715ee7846545676b33a0e119ca0abd0825f156e1c82e892a83c061a1f8ed491450ff35cb7dcd02f528d4998b83e0d92c1dad85ca9c49
-
Filesize
540KB
MD5f0f6437b295c4efe00064ed1ff4de26d
SHA191906b2e7594b3218daf83cd57f0372599efe02c
SHA256772f4d6aae21db25eed0a5ca6a4c7ac89522a87b9431402c3fe37deaafe91e71
SHA512404809c6bfea8579f7de715ee7846545676b33a0e119ca0abd0825f156e1c82e892a83c061a1f8ed491450ff35cb7dcd02f528d4998b83e0d92c1dad85ca9c49
-
Filesize
258KB
MD57936d826c83b985c0c0c2747b943a5c7
SHA1e180f244b5d8523f63702311df89d8ddf6ddcdaf
SHA256f0630acc9c36a7148fbeff75dd39b929d2501be6e6db7b05b55f6c303e0a1d2e
SHA51287a46178853ac939643b8293a07a604b0753906e6083db88a53a1358bb5bdddf61c3a8d98117c58cdd29ebb6886f7eba5731baf06c7eb1615090d0d981f59d10
-
Filesize
258KB
MD57936d826c83b985c0c0c2747b943a5c7
SHA1e180f244b5d8523f63702311df89d8ddf6ddcdaf
SHA256f0630acc9c36a7148fbeff75dd39b929d2501be6e6db7b05b55f6c303e0a1d2e
SHA51287a46178853ac939643b8293a07a604b0753906e6083db88a53a1358bb5bdddf61c3a8d98117c58cdd29ebb6886f7eba5731baf06c7eb1615090d0d981f59d10
-
Filesize
340KB
MD58e2a92da82d5e81b863f69b39eea2b0a
SHA13a3107b308e197cd7e06ad2c86b9f8fe7dfc707d
SHA256700c7983b0b19fc32f501b2e20554c4e00ecf84a66a067f1cbd18a3b4749052e
SHA5126fd2c3477baf86759bc915c9557f95dbd1363ea3102933ddc2ed43613b18591724fee4c7d6caa1aa12b7c4fb2ccd1b3b8fc221a472b00dd0fc2e6364249b349e
-
Filesize
340KB
MD58e2a92da82d5e81b863f69b39eea2b0a
SHA13a3107b308e197cd7e06ad2c86b9f8fe7dfc707d
SHA256700c7983b0b19fc32f501b2e20554c4e00ecf84a66a067f1cbd18a3b4749052e
SHA5126fd2c3477baf86759bc915c9557f95dbd1363ea3102933ddc2ed43613b18591724fee4c7d6caa1aa12b7c4fb2ccd1b3b8fc221a472b00dd0fc2e6364249b349e