Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 21:32
Static task
static1
Behavioral task
behavioral1
Sample
409bec3a7ade14b4afde539d6bbbe36d9c3aaff2796da953cc96ff37f7e8f57c.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
409bec3a7ade14b4afde539d6bbbe36d9c3aaff2796da953cc96ff37f7e8f57c.exe
Resource
win10v2004-20230220-en
General
-
Target
409bec3a7ade14b4afde539d6bbbe36d9c3aaff2796da953cc96ff37f7e8f57c.exe
-
Size
690KB
-
MD5
bedec3f68e81c94687011bd42826fa30
-
SHA1
d9330ea0651fe8dc507bf875731226e23e20aecd
-
SHA256
409bec3a7ade14b4afde539d6bbbe36d9c3aaff2796da953cc96ff37f7e8f57c
-
SHA512
40c632f546d9d6170cbecbbed902edd499a4629802a6f8bece11c0cdad2abf82882ea57c1a11e9553fbde7d791ab3ae98fb613c410ebaf9cc04425dd28968c63
-
SSDEEP
12288:Py90w95D1XSpkeYUA4LHfMI7Bwh74ZQIJoM00yK12VB9Kl2CiEMjiJEV:Pyx5pckeYUA4LfnKhLPMTyS2+diZ+K
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1864-988-0x0000000007560000-0x0000000007B78000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 14404211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 14404211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 14404211.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 14404211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 14404211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 14404211.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 5104 un551109.exe 1168 14404211.exe 1864 rk063711.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 14404211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 14404211.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 409bec3a7ade14b4afde539d6bbbe36d9c3aaff2796da953cc96ff37f7e8f57c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 409bec3a7ade14b4afde539d6bbbe36d9c3aaff2796da953cc96ff37f7e8f57c.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un551109.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un551109.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 5072 1168 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1168 14404211.exe 1168 14404211.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1168 14404211.exe Token: SeDebugPrivilege 1864 rk063711.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4972 wrote to memory of 5104 4972 409bec3a7ade14b4afde539d6bbbe36d9c3aaff2796da953cc96ff37f7e8f57c.exe 84 PID 4972 wrote to memory of 5104 4972 409bec3a7ade14b4afde539d6bbbe36d9c3aaff2796da953cc96ff37f7e8f57c.exe 84 PID 4972 wrote to memory of 5104 4972 409bec3a7ade14b4afde539d6bbbe36d9c3aaff2796da953cc96ff37f7e8f57c.exe 84 PID 5104 wrote to memory of 1168 5104 un551109.exe 85 PID 5104 wrote to memory of 1168 5104 un551109.exe 85 PID 5104 wrote to memory of 1168 5104 un551109.exe 85 PID 5104 wrote to memory of 1864 5104 un551109.exe 89 PID 5104 wrote to memory of 1864 5104 un551109.exe 89 PID 5104 wrote to memory of 1864 5104 un551109.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\409bec3a7ade14b4afde539d6bbbe36d9c3aaff2796da953cc96ff37f7e8f57c.exe"C:\Users\Admin\AppData\Local\Temp\409bec3a7ade14b4afde539d6bbbe36d9c3aaff2796da953cc96ff37f7e8f57c.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un551109.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un551109.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\14404211.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\14404211.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1168 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 10044⤵
- Program crash
PID:5072
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk063711.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk063711.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1864
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1168 -ip 11681⤵PID:3112
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD591f383cb9a29abec482915613fd6524d
SHA162a3388432be26273ed153f9684d7ecb68b1dd71
SHA2562183963b41cb70e603ee380c0db667ec550769dd92f30ffcce5df5f9fa90cbda
SHA512828363c661c3e8bb6abb210788a9acbde4b733e65947d5d01c96afb951c91ad35d6cb31512eabea4c12a92369ddb494573282ca81324f51809a3e835b1bcaf0c
-
Filesize
536KB
MD591f383cb9a29abec482915613fd6524d
SHA162a3388432be26273ed153f9684d7ecb68b1dd71
SHA2562183963b41cb70e603ee380c0db667ec550769dd92f30ffcce5df5f9fa90cbda
SHA512828363c661c3e8bb6abb210788a9acbde4b733e65947d5d01c96afb951c91ad35d6cb31512eabea4c12a92369ddb494573282ca81324f51809a3e835b1bcaf0c
-
Filesize
259KB
MD528946ab545213bc4d521c744fd29fbf4
SHA1d983b5e4c30b55373df177351d6e2cafb85ed5f3
SHA256f28abe3b44179871d7f9983e5b2977bd9069922317bc9cf8cb15e8a1ee699daa
SHA512e82bf04f4617937f556641672af9dbf058491d16b7197ec08f852b10e7a9a613ac39dcf455bd7600cadde107c82112c847b1fd5bce3ac35f47799e9be4892f31
-
Filesize
259KB
MD528946ab545213bc4d521c744fd29fbf4
SHA1d983b5e4c30b55373df177351d6e2cafb85ed5f3
SHA256f28abe3b44179871d7f9983e5b2977bd9069922317bc9cf8cb15e8a1ee699daa
SHA512e82bf04f4617937f556641672af9dbf058491d16b7197ec08f852b10e7a9a613ac39dcf455bd7600cadde107c82112c847b1fd5bce3ac35f47799e9be4892f31
-
Filesize
341KB
MD5511371d6be0a0826c6e4eed3915d5f3d
SHA1e5d1538059bdd1c3e369dfa7f0f389f45530bf94
SHA256817419070ca2f2c7a519edf84ca99fde60523e34bae2b412c973d306105ece1a
SHA512961f4d1ec010c8833dfb0f4499425cc4279ab95534c072133f4caad6dd7811769a8334f0371c4c5d1b4d85095c32db4fb1ef62994c09f638a45d7d4e5f8bb7f0
-
Filesize
341KB
MD5511371d6be0a0826c6e4eed3915d5f3d
SHA1e5d1538059bdd1c3e369dfa7f0f389f45530bf94
SHA256817419070ca2f2c7a519edf84ca99fde60523e34bae2b412c973d306105ece1a
SHA512961f4d1ec010c8833dfb0f4499425cc4279ab95534c072133f4caad6dd7811769a8334f0371c4c5d1b4d85095c32db4fb1ef62994c09f638a45d7d4e5f8bb7f0