Analysis
-
max time kernel
181s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 21:33
Static task
static1
Behavioral task
behavioral1
Sample
417b79f779ad971f8046fa12cfa764fbba9058eebfa1392bee3145f09ab8127f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
417b79f779ad971f8046fa12cfa764fbba9058eebfa1392bee3145f09ab8127f.exe
Resource
win10v2004-20230220-en
General
-
Target
417b79f779ad971f8046fa12cfa764fbba9058eebfa1392bee3145f09ab8127f.exe
-
Size
687KB
-
MD5
368aeae2615e04206a681ae23c2261f3
-
SHA1
699d81f3dc94f143a70a842f4fb2d72f1b70317f
-
SHA256
417b79f779ad971f8046fa12cfa764fbba9058eebfa1392bee3145f09ab8127f
-
SHA512
6c3800ed3c19e6d930c3860c7d2c33dd89c96d991862d6a6d33f4765386f44b065ebaacc793a5b926db845ec05a3e85b083a7166ce537d5a3abb347926168c07
-
SSDEEP
12288:By90Dts40uRElGYihKjF/yCSQiGW2MCBkKQhuY67J5g1h9/0vz/CwD:By2s/u+GXEj1SB4MCrQhux7fgV0VD
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3748-986-0x0000000009D40000-0x000000000A358000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 77017595.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 77017595.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 77017595.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 77017595.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 77017595.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 77017595.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4608 un207151.exe 4372 77017595.exe 3748 rk024429.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 77017595.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 77017595.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 417b79f779ad971f8046fa12cfa764fbba9058eebfa1392bee3145f09ab8127f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 417b79f779ad971f8046fa12cfa764fbba9058eebfa1392bee3145f09ab8127f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un207151.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un207151.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4332 4372 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4372 77017595.exe 4372 77017595.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4372 77017595.exe Token: SeDebugPrivilege 3748 rk024429.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 868 wrote to memory of 4608 868 417b79f779ad971f8046fa12cfa764fbba9058eebfa1392bee3145f09ab8127f.exe 81 PID 868 wrote to memory of 4608 868 417b79f779ad971f8046fa12cfa764fbba9058eebfa1392bee3145f09ab8127f.exe 81 PID 868 wrote to memory of 4608 868 417b79f779ad971f8046fa12cfa764fbba9058eebfa1392bee3145f09ab8127f.exe 81 PID 4608 wrote to memory of 4372 4608 un207151.exe 82 PID 4608 wrote to memory of 4372 4608 un207151.exe 82 PID 4608 wrote to memory of 4372 4608 un207151.exe 82 PID 4608 wrote to memory of 3748 4608 un207151.exe 85 PID 4608 wrote to memory of 3748 4608 un207151.exe 85 PID 4608 wrote to memory of 3748 4608 un207151.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\417b79f779ad971f8046fa12cfa764fbba9058eebfa1392bee3145f09ab8127f.exe"C:\Users\Admin\AppData\Local\Temp\417b79f779ad971f8046fa12cfa764fbba9058eebfa1392bee3145f09ab8127f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un207151.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un207151.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\77017595.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\77017595.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4372 -s 11004⤵
- Program crash
PID:4332
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk024429.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk024429.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3748
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4372 -ip 43721⤵PID:1704
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
533KB
MD5250a87f319f17b2131259f5d09b4e634
SHA12d0a958c580e7ab690c4514c1924b8fc8d1b2afd
SHA25659c26d5d1f7d6630549eb2ce771fdda2da1e7905a686742f5ea2fcad28f0ca1a
SHA512aa0825ed72d5dab3e33cd2a0e16147c7daa87cc623577ad18f15938c649c9e22bfde36427829597de9b35f00ace7af022ccece8ef154d8ccec3781a1d967e13c
-
Filesize
533KB
MD5250a87f319f17b2131259f5d09b4e634
SHA12d0a958c580e7ab690c4514c1924b8fc8d1b2afd
SHA25659c26d5d1f7d6630549eb2ce771fdda2da1e7905a686742f5ea2fcad28f0ca1a
SHA512aa0825ed72d5dab3e33cd2a0e16147c7daa87cc623577ad18f15938c649c9e22bfde36427829597de9b35f00ace7af022ccece8ef154d8ccec3781a1d967e13c
-
Filesize
249KB
MD52456620741866590a7e6eda7da890903
SHA136bdeb0817699bc77b2a4bc2079bace8a6e8258f
SHA2563271d6ef8386011ca04fec7cd84c01efc91fa95e6b54551eb5e8bf8c12747d31
SHA512c7f7c4699187fb318c899afc17831ee062d51d5900a4e06653d22fce1bdd4687e98bc30d9a684d0096a744ae0257a1eadac4242dc74c1ef6c30dbb25bf7ff71a
-
Filesize
249KB
MD52456620741866590a7e6eda7da890903
SHA136bdeb0817699bc77b2a4bc2079bace8a6e8258f
SHA2563271d6ef8386011ca04fec7cd84c01efc91fa95e6b54551eb5e8bf8c12747d31
SHA512c7f7c4699187fb318c899afc17831ee062d51d5900a4e06653d22fce1bdd4687e98bc30d9a684d0096a744ae0257a1eadac4242dc74c1ef6c30dbb25bf7ff71a
-
Filesize
332KB
MD535d55ca228efd1b0a0a973c71717abc9
SHA11fa49ff50e1b83bdad6a54cee87ea1bc6fbf1546
SHA2564ee14db05f35df1980245c4e0834eeefa0f1972d36f9a150d20ba464d4f084bc
SHA51296fb42f7ce5cfba67858333c51d1dc1ed7615c55dcd08135140bad6430e39742a98352bae9ec9ca95997588aa6b8f8d7954e2d10b55f951e1242fe39d64b1346
-
Filesize
332KB
MD535d55ca228efd1b0a0a973c71717abc9
SHA11fa49ff50e1b83bdad6a54cee87ea1bc6fbf1546
SHA2564ee14db05f35df1980245c4e0834eeefa0f1972d36f9a150d20ba464d4f084bc
SHA51296fb42f7ce5cfba67858333c51d1dc1ed7615c55dcd08135140bad6430e39742a98352bae9ec9ca95997588aa6b8f8d7954e2d10b55f951e1242fe39d64b1346