Analysis
-
max time kernel
153s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 21:36
Static task
static1
Behavioral task
behavioral1
Sample
436b7c58821bd0e30ba1a9ffb0c87946280e61340b6b837985b8bbcd5419f1df.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
436b7c58821bd0e30ba1a9ffb0c87946280e61340b6b837985b8bbcd5419f1df.exe
Resource
win10v2004-20230220-en
General
-
Target
436b7c58821bd0e30ba1a9ffb0c87946280e61340b6b837985b8bbcd5419f1df.exe
-
Size
704KB
-
MD5
c18320aee784ea07a6dce8ae2fdce5c1
-
SHA1
49c2fb1f129d377c7b774b2fa3dd8d5e99cfa939
-
SHA256
436b7c58821bd0e30ba1a9ffb0c87946280e61340b6b837985b8bbcd5419f1df
-
SHA512
97163d698fa5013006e7f3593e5b4e09e409778218631616f8554dc72b5b783478060b99cadcfd03c7567b2a3a2ffaf75ef14dc4a3a54b9600f690ab387fa662
-
SSDEEP
12288:fy90gfeRw3ZvxRX8ps2H06rIsVhwq13AuI15zC+LIzjM1C/nVM8I4IguO:fy9feW3ZZRX8morIkKU3AHBfLIfS016O
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4460-988-0x0000000009D30000-0x000000000A348000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr259975.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr259975.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr259975.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr259975.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr259975.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr259975.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4404 un405951.exe 3644 pr259975.exe 4460 qu084990.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr259975.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr259975.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 436b7c58821bd0e30ba1a9ffb0c87946280e61340b6b837985b8bbcd5419f1df.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 436b7c58821bd0e30ba1a9ffb0c87946280e61340b6b837985b8bbcd5419f1df.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un405951.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un405951.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3096 3644 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3644 pr259975.exe 3644 pr259975.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3644 pr259975.exe Token: SeDebugPrivilege 4460 qu084990.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4388 wrote to memory of 4404 4388 436b7c58821bd0e30ba1a9ffb0c87946280e61340b6b837985b8bbcd5419f1df.exe 83 PID 4388 wrote to memory of 4404 4388 436b7c58821bd0e30ba1a9ffb0c87946280e61340b6b837985b8bbcd5419f1df.exe 83 PID 4388 wrote to memory of 4404 4388 436b7c58821bd0e30ba1a9ffb0c87946280e61340b6b837985b8bbcd5419f1df.exe 83 PID 4404 wrote to memory of 3644 4404 un405951.exe 84 PID 4404 wrote to memory of 3644 4404 un405951.exe 84 PID 4404 wrote to memory of 3644 4404 un405951.exe 84 PID 4404 wrote to memory of 4460 4404 un405951.exe 89 PID 4404 wrote to memory of 4460 4404 un405951.exe 89 PID 4404 wrote to memory of 4460 4404 un405951.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\436b7c58821bd0e30ba1a9ffb0c87946280e61340b6b837985b8bbcd5419f1df.exe"C:\Users\Admin\AppData\Local\Temp\436b7c58821bd0e30ba1a9ffb0c87946280e61340b6b837985b8bbcd5419f1df.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un405951.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un405951.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr259975.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr259975.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3644 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 10884⤵
- Program crash
PID:3096
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu084990.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu084990.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 3644 -ip 36441⤵PID:1540
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
550KB
MD5438bc8dfeb2b6098c50c606c5ca5037e
SHA118250bc70611e52ba4fa906de1cb5584f9f60b66
SHA25663ae5ab1b76064e05bbc606cdf3033ce683ef6e03baa3a5deeea2692523a34f6
SHA5120171123670653ec13b4794684fa78c12b623a12f529589f076311821441a3b8f52a3df51b33f0a74b697d8643417323e6dff9e034ec9db17afcb2fd414b08b09
-
Filesize
550KB
MD5438bc8dfeb2b6098c50c606c5ca5037e
SHA118250bc70611e52ba4fa906de1cb5584f9f60b66
SHA25663ae5ab1b76064e05bbc606cdf3033ce683ef6e03baa3a5deeea2692523a34f6
SHA5120171123670653ec13b4794684fa78c12b623a12f529589f076311821441a3b8f52a3df51b33f0a74b697d8643417323e6dff9e034ec9db17afcb2fd414b08b09
-
Filesize
278KB
MD5165e9c1a00ef7838f5f3613f16d79773
SHA188ab28abd57d9debd05ca8d6a54c68048b1f27d7
SHA2564d0fe47dcc49e85a913cad1f25466ff55fa89cd7ba9c320e0721ca482dca92fa
SHA5126cd6743954a1cf7473796937bb1a79d0b5b22172c724c577a3132d16c217f6d305930c97fd16514aedff1c08af0354d3260ae74232b7a4a47746f5cc09f07204
-
Filesize
278KB
MD5165e9c1a00ef7838f5f3613f16d79773
SHA188ab28abd57d9debd05ca8d6a54c68048b1f27d7
SHA2564d0fe47dcc49e85a913cad1f25466ff55fa89cd7ba9c320e0721ca482dca92fa
SHA5126cd6743954a1cf7473796937bb1a79d0b5b22172c724c577a3132d16c217f6d305930c97fd16514aedff1c08af0354d3260ae74232b7a4a47746f5cc09f07204
-
Filesize
361KB
MD59e5668b179ca1e394171fd60747b43f9
SHA1aa7bc4756335b0abe46955e13fe916a47d81128f
SHA25673ecdc5b7c56a6526301645c9db51e710e7293619cb507eb639c00c7fe66cf07
SHA512e653eaaff60f856527a7ebb54d81d9bb44b34a8db02169d77b71b24e3311bdad15dcbacb691556fc11fc9c6b2c0466a889a16fdd829684ae8e81b98dea7322a7
-
Filesize
361KB
MD59e5668b179ca1e394171fd60747b43f9
SHA1aa7bc4756335b0abe46955e13fe916a47d81128f
SHA25673ecdc5b7c56a6526301645c9db51e710e7293619cb507eb639c00c7fe66cf07
SHA512e653eaaff60f856527a7ebb54d81d9bb44b34a8db02169d77b71b24e3311bdad15dcbacb691556fc11fc9c6b2c0466a889a16fdd829684ae8e81b98dea7322a7