Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 21:42
Static task
static1
Behavioral task
behavioral1
Sample
48b8d126b248ad586458a97e93d265aa886bab9cf9dbd290f9854782d1812e6a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
48b8d126b248ad586458a97e93d265aa886bab9cf9dbd290f9854782d1812e6a.exe
Resource
win10v2004-20230220-en
General
-
Target
48b8d126b248ad586458a97e93d265aa886bab9cf9dbd290f9854782d1812e6a.exe
-
Size
696KB
-
MD5
f6c7c39a5fa47f15d419d7333fa8e430
-
SHA1
4951675310d368a4b529196d56100aaccde9d604
-
SHA256
48b8d126b248ad586458a97e93d265aa886bab9cf9dbd290f9854782d1812e6a
-
SHA512
25c487c7c91c193f6a095e41c0a8f58d8f5199c7aedd2ab5338483c71f81e6b7ed993beb3a47761261d83a367bce7b691ad07df3a9b8e7335199993cb8fe3b7f
-
SSDEEP
12288:Vy90T/D2lTyX0d5+7zHeZ2P3mUFIEHxBq8dLljHigOsqfLL2G:Vy+/D2li0f+/73mUFhRBq8HT47
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1300-987-0x0000000009CD0000-0x000000000A2E8000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 31732495.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 31732495.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 31732495.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 31732495.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 31732495.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 31732495.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4292 un315558.exe 3076 31732495.exe 1300 rk465141.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 31732495.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 31732495.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un315558.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 48b8d126b248ad586458a97e93d265aa886bab9cf9dbd290f9854782d1812e6a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 48b8d126b248ad586458a97e93d265aa886bab9cf9dbd290f9854782d1812e6a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un315558.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 212 3076 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3076 31732495.exe 3076 31732495.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3076 31732495.exe Token: SeDebugPrivilege 1300 rk465141.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1980 wrote to memory of 4292 1980 48b8d126b248ad586458a97e93d265aa886bab9cf9dbd290f9854782d1812e6a.exe 84 PID 1980 wrote to memory of 4292 1980 48b8d126b248ad586458a97e93d265aa886bab9cf9dbd290f9854782d1812e6a.exe 84 PID 1980 wrote to memory of 4292 1980 48b8d126b248ad586458a97e93d265aa886bab9cf9dbd290f9854782d1812e6a.exe 84 PID 4292 wrote to memory of 3076 4292 un315558.exe 85 PID 4292 wrote to memory of 3076 4292 un315558.exe 85 PID 4292 wrote to memory of 3076 4292 un315558.exe 85 PID 4292 wrote to memory of 1300 4292 un315558.exe 88 PID 4292 wrote to memory of 1300 4292 un315558.exe 88 PID 4292 wrote to memory of 1300 4292 un315558.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\48b8d126b248ad586458a97e93d265aa886bab9cf9dbd290f9854782d1812e6a.exe"C:\Users\Admin\AppData\Local\Temp\48b8d126b248ad586458a97e93d265aa886bab9cf9dbd290f9854782d1812e6a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un315558.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un315558.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\31732495.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\31732495.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3076 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3076 -s 10964⤵
- Program crash
PID:212
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk465141.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk465141.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1300
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3076 -ip 30761⤵PID:3412
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
542KB
MD525ed5843372463206c53dc42394ab7c4
SHA10789e3474641e9b7880a3a9ab4e86888b2460be1
SHA2565fa2aa3eead6875aa0c95d752e78a941b02f9fa69b7925a601fbb360be2d6a15
SHA512a38630447e255c26d3bec32e6aa4d74057e615bce427752d592f9900cbc8d0568be66671b7748f2ef12d6e96162fe7e9f228ac9661775413d01a2e0128a3f536
-
Filesize
542KB
MD525ed5843372463206c53dc42394ab7c4
SHA10789e3474641e9b7880a3a9ab4e86888b2460be1
SHA2565fa2aa3eead6875aa0c95d752e78a941b02f9fa69b7925a601fbb360be2d6a15
SHA512a38630447e255c26d3bec32e6aa4d74057e615bce427752d592f9900cbc8d0568be66671b7748f2ef12d6e96162fe7e9f228ac9661775413d01a2e0128a3f536
-
Filesize
263KB
MD500fa75c2a80ed33678169b6533dd76df
SHA18f4fad961c740e7fc69fe0f2250a6e97bd11de8d
SHA2566c6c5d831b74cd054d3198f99c8476958750568b49fa0ed0f80235c08503926e
SHA512d90f2332d578e72a7588ebcae7f0beeb393c9464e3ebda25f6a06e3c28a96b2651de72e8a83167721928cd2c9e3f0f71828f799b7cedb4960920fbf6393524e9
-
Filesize
263KB
MD500fa75c2a80ed33678169b6533dd76df
SHA18f4fad961c740e7fc69fe0f2250a6e97bd11de8d
SHA2566c6c5d831b74cd054d3198f99c8476958750568b49fa0ed0f80235c08503926e
SHA512d90f2332d578e72a7588ebcae7f0beeb393c9464e3ebda25f6a06e3c28a96b2651de72e8a83167721928cd2c9e3f0f71828f799b7cedb4960920fbf6393524e9
-
Filesize
328KB
MD504928267b0443d2e60b1f71474b82d76
SHA10781094c83c1f02a1e3376fdd8a4870a7fe94cde
SHA2561da83bad9bb8304d142435f50fc7447c3af10f6a8ab6a3eb8844cac90df7dfb8
SHA5126518abd2d1373a2ee69e90404745460c530ea6430a418c59b4056ea319d2ccfa9bdbdbb3d5f8b483446f0fbaed2f7cfa3869f9229e160241a94f3fc537427ee6
-
Filesize
328KB
MD504928267b0443d2e60b1f71474b82d76
SHA10781094c83c1f02a1e3376fdd8a4870a7fe94cde
SHA2561da83bad9bb8304d142435f50fc7447c3af10f6a8ab6a3eb8844cac90df7dfb8
SHA5126518abd2d1373a2ee69e90404745460c530ea6430a418c59b4056ea319d2ccfa9bdbdbb3d5f8b483446f0fbaed2f7cfa3869f9229e160241a94f3fc537427ee6