Analysis
-
max time kernel
157s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 21:35
Static task
static1
Behavioral task
behavioral1
Sample
4303d04a946734723b946d660fe4006880d6b088d7b573289bafe66d0bbd787d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4303d04a946734723b946d660fe4006880d6b088d7b573289bafe66d0bbd787d.exe
Resource
win10v2004-20230220-en
General
-
Target
4303d04a946734723b946d660fe4006880d6b088d7b573289bafe66d0bbd787d.exe
-
Size
747KB
-
MD5
e98ec7a8ec64df9a42fbe22c7c441fa8
-
SHA1
4d487c60d7e64b08cc28ff9dc3ad719bb870dc3c
-
SHA256
4303d04a946734723b946d660fe4006880d6b088d7b573289bafe66d0bbd787d
-
SHA512
9af8df4894db7086e88b609d5681ba0233cd5ec0d677dcc0d77bd2186e3afbbca752a3fb4bcbf4ef915cdd49ad71616355e8488a3dcc2c5fbfa44f8ebe59dc0b
-
SSDEEP
12288:vy90Qbde6OAXQvEu05q6bCSaUmh7pyawKWU9Ur7TqRUyCi:vyXoE95qSv+7/yTq1Ci
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4492-996-0x00000000078B0000-0x0000000007EC8000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 95478020.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 95478020.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 95478020.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 95478020.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 95478020.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 95478020.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1616 un650476.exe 3456 95478020.exe 4492 rk481565.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 95478020.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 95478020.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 4303d04a946734723b946d660fe4006880d6b088d7b573289bafe66d0bbd787d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4303d04a946734723b946d660fe4006880d6b088d7b573289bafe66d0bbd787d.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un650476.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un650476.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1104 3456 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3456 95478020.exe 3456 95478020.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3456 95478020.exe Token: SeDebugPrivilege 4492 rk481565.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3564 wrote to memory of 1616 3564 4303d04a946734723b946d660fe4006880d6b088d7b573289bafe66d0bbd787d.exe 84 PID 3564 wrote to memory of 1616 3564 4303d04a946734723b946d660fe4006880d6b088d7b573289bafe66d0bbd787d.exe 84 PID 3564 wrote to memory of 1616 3564 4303d04a946734723b946d660fe4006880d6b088d7b573289bafe66d0bbd787d.exe 84 PID 1616 wrote to memory of 3456 1616 un650476.exe 85 PID 1616 wrote to memory of 3456 1616 un650476.exe 85 PID 1616 wrote to memory of 3456 1616 un650476.exe 85 PID 1616 wrote to memory of 4492 1616 un650476.exe 90 PID 1616 wrote to memory of 4492 1616 un650476.exe 90 PID 1616 wrote to memory of 4492 1616 un650476.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\4303d04a946734723b946d660fe4006880d6b088d7b573289bafe66d0bbd787d.exe"C:\Users\Admin\AppData\Local\Temp\4303d04a946734723b946d660fe4006880d6b088d7b573289bafe66d0bbd787d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un650476.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un650476.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\95478020.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\95478020.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3456 -s 2364⤵
- Program crash
PID:1104
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk481565.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk481565.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4492
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3456 -ip 34561⤵PID:3856
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5946315dd9d1081f780642b371226eab0
SHA10e3725a53a44d2dde7767791406161ce14ab054c
SHA2562e487294bb4cf571aa979adf9892784e184b3824c0f8c2ce33bdb3c51bcfa054
SHA5128cb800e240c5b776c01d90e9d60420d6d7267745057ae369167863368826baa9ab2540e9ba769f086310c02155181d6686d35ec3d8398ed5bd2fc66373cbea3a
-
Filesize
593KB
MD5946315dd9d1081f780642b371226eab0
SHA10e3725a53a44d2dde7767791406161ce14ab054c
SHA2562e487294bb4cf571aa979adf9892784e184b3824c0f8c2ce33bdb3c51bcfa054
SHA5128cb800e240c5b776c01d90e9d60420d6d7267745057ae369167863368826baa9ab2540e9ba769f086310c02155181d6686d35ec3d8398ed5bd2fc66373cbea3a
-
Filesize
377KB
MD507dc6fe6f7351ff67a1fd0e6bfbd51e3
SHA1a1881c8f03bb323408b4a5b46cb41e435b7037b2
SHA256a6b8e0b91961b03bfd7ffd9f60e18c5286eb67b3661dca0157e5a870ea7904e0
SHA512d57798978cc2393f71c14b7cac5100c16002fa8368b3d241736b3a6c81926938f4b75e0b5c9536f48e269c5bef5b274f36b66de3e9e169a5d6a5b99c250376bd
-
Filesize
377KB
MD507dc6fe6f7351ff67a1fd0e6bfbd51e3
SHA1a1881c8f03bb323408b4a5b46cb41e435b7037b2
SHA256a6b8e0b91961b03bfd7ffd9f60e18c5286eb67b3661dca0157e5a870ea7904e0
SHA512d57798978cc2393f71c14b7cac5100c16002fa8368b3d241736b3a6c81926938f4b75e0b5c9536f48e269c5bef5b274f36b66de3e9e169a5d6a5b99c250376bd
-
Filesize
460KB
MD5ea7a7e86eebd76d894a80466ddea56a5
SHA17063f6ec517966e63a485f8a386d7e05f1ab48fa
SHA256cb0349d7f2f388159c26592429b39d78b636f7e28691cb53465e4ceb6cdd4016
SHA5123cb4256c263f177dba7f341783c28985a71b5f220a1eb02df8c9611faedc36366723f2629036d27c157bce5f9d9ff941fa7c288961e0500e0966369c9dafaa54
-
Filesize
460KB
MD5ea7a7e86eebd76d894a80466ddea56a5
SHA17063f6ec517966e63a485f8a386d7e05f1ab48fa
SHA256cb0349d7f2f388159c26592429b39d78b636f7e28691cb53465e4ceb6cdd4016
SHA5123cb4256c263f177dba7f341783c28985a71b5f220a1eb02df8c9611faedc36366723f2629036d27c157bce5f9d9ff941fa7c288961e0500e0966369c9dafaa54