Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 21:38
Static task
static1
Behavioral task
behavioral1
Sample
45b5ccd78ac1722cf3aac40c93bf85e31cbb7ded3402b34e18b212b889665470.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
45b5ccd78ac1722cf3aac40c93bf85e31cbb7ded3402b34e18b212b889665470.exe
Resource
win10v2004-20230220-en
General
-
Target
45b5ccd78ac1722cf3aac40c93bf85e31cbb7ded3402b34e18b212b889665470.exe
-
Size
687KB
-
MD5
05f75e2e73f49cc28dee712eaf0c7047
-
SHA1
725c38af3f25d963310768bf31c5f5fe0d644480
-
SHA256
45b5ccd78ac1722cf3aac40c93bf85e31cbb7ded3402b34e18b212b889665470
-
SHA512
1d0a60f581f47edf9bb0fb8607cea398a456c2aa65af22a4266eabd8e39ea4f322a1f6766f4111decc2d91527bd0378975e9de4a3d75788e64179251a228a104
-
SSDEEP
12288:Py90BtLECWtaHdjfeRz6fFryCSJplpVyDtRq0IBsuY3MN5c5oA/ZvRVssP/:PyPPk96z6f1Sblq9YsuYMjcpZpVz/
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4536-987-0x0000000009C60000-0x000000000A278000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 92897530.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 92897530.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 92897530.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 92897530.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 92897530.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 92897530.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 840 un362574.exe 1856 92897530.exe 4536 rk757986.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 92897530.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 92897530.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 45b5ccd78ac1722cf3aac40c93bf85e31cbb7ded3402b34e18b212b889665470.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 45b5ccd78ac1722cf3aac40c93bf85e31cbb7ded3402b34e18b212b889665470.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un362574.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un362574.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4832 1856 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1856 92897530.exe 1856 92897530.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1856 92897530.exe Token: SeDebugPrivilege 4536 rk757986.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4380 wrote to memory of 840 4380 45b5ccd78ac1722cf3aac40c93bf85e31cbb7ded3402b34e18b212b889665470.exe 83 PID 4380 wrote to memory of 840 4380 45b5ccd78ac1722cf3aac40c93bf85e31cbb7ded3402b34e18b212b889665470.exe 83 PID 4380 wrote to memory of 840 4380 45b5ccd78ac1722cf3aac40c93bf85e31cbb7ded3402b34e18b212b889665470.exe 83 PID 840 wrote to memory of 1856 840 un362574.exe 84 PID 840 wrote to memory of 1856 840 un362574.exe 84 PID 840 wrote to memory of 1856 840 un362574.exe 84 PID 840 wrote to memory of 4536 840 un362574.exe 88 PID 840 wrote to memory of 4536 840 un362574.exe 88 PID 840 wrote to memory of 4536 840 un362574.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\45b5ccd78ac1722cf3aac40c93bf85e31cbb7ded3402b34e18b212b889665470.exe"C:\Users\Admin\AppData\Local\Temp\45b5ccd78ac1722cf3aac40c93bf85e31cbb7ded3402b34e18b212b889665470.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un362574.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un362574.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\92897530.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\92897530.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1856 -s 10804⤵
- Program crash
PID:4832
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk757986.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk757986.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4536
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1856 -ip 18561⤵PID:3728
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
533KB
MD58944580a9f92b32832fce885672f3897
SHA1d261660ce95d378d2e60c7691d2b3923439216c5
SHA25631844d4c950a300b7dd4f53052825b229dfa487962a6bed6cf239791980b19d4
SHA512069bc796784e8c672869fa36414f4ac5b2df06f350de53e5a46c40993c6665199609f62f6a57eb144b67345a547ecc48d781206c099706e5c7171b1ea2bfe207
-
Filesize
533KB
MD58944580a9f92b32832fce885672f3897
SHA1d261660ce95d378d2e60c7691d2b3923439216c5
SHA25631844d4c950a300b7dd4f53052825b229dfa487962a6bed6cf239791980b19d4
SHA512069bc796784e8c672869fa36414f4ac5b2df06f350de53e5a46c40993c6665199609f62f6a57eb144b67345a547ecc48d781206c099706e5c7171b1ea2bfe207
-
Filesize
249KB
MD54da7e31f3ac9e53de402ae623fa22514
SHA1cf5962d6698e8adc2e26e6bf405c2c024983b97c
SHA256163f07b6521b73d7b0b04153463e4f888f36e9a073487cf8892961623425606d
SHA512c29fe0a1fb8ef4061824b54f672ec1daa26b498ce384a92e6d1c4608d079911e0cad10e11daedb4dcddaa92757a138d3962f4666f85f51ddda461e5b56eb9096
-
Filesize
249KB
MD54da7e31f3ac9e53de402ae623fa22514
SHA1cf5962d6698e8adc2e26e6bf405c2c024983b97c
SHA256163f07b6521b73d7b0b04153463e4f888f36e9a073487cf8892961623425606d
SHA512c29fe0a1fb8ef4061824b54f672ec1daa26b498ce384a92e6d1c4608d079911e0cad10e11daedb4dcddaa92757a138d3962f4666f85f51ddda461e5b56eb9096
-
Filesize
332KB
MD5f5ae8458fcae81ee61ac8aa173ebbe61
SHA152bcba266197852c875b52d99aff6e380c241b1e
SHA2560052aa4e2a33122a233030fec1a38a758f191eef616518e4ffae79ff5fc9e45c
SHA512397a5c16f756331ff65e34e021fad75db1be2475846abc8a44dba2d8ed4e40d7284f51adb42c05ab577ae815d61294cf9dfa8f356280df39f28f0daa34ee645e
-
Filesize
332KB
MD5f5ae8458fcae81ee61ac8aa173ebbe61
SHA152bcba266197852c875b52d99aff6e380c241b1e
SHA2560052aa4e2a33122a233030fec1a38a758f191eef616518e4ffae79ff5fc9e45c
SHA512397a5c16f756331ff65e34e021fad75db1be2475846abc8a44dba2d8ed4e40d7284f51adb42c05ab577ae815d61294cf9dfa8f356280df39f28f0daa34ee645e