Analysis
-
max time kernel
154s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 21:52
Static task
static1
Behavioral task
behavioral1
Sample
50409bbf2696d231f352a1a1c517196f9030e0f4e8b9a3698141a838b81bd78b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
50409bbf2696d231f352a1a1c517196f9030e0f4e8b9a3698141a838b81bd78b.exe
Resource
win10v2004-20230220-en
General
-
Target
50409bbf2696d231f352a1a1c517196f9030e0f4e8b9a3698141a838b81bd78b.exe
-
Size
690KB
-
MD5
2db13383df88cddde2b8d7a2f9e9378a
-
SHA1
9a482506a699339250c832fc3636697040a7b77f
-
SHA256
50409bbf2696d231f352a1a1c517196f9030e0f4e8b9a3698141a838b81bd78b
-
SHA512
00fbe2a8b74bfec01cd9997d624a9ab89fdc5bdecbe63c0277aeaff57ad9ed547e82d8cb975576b0f20d2fe58c5d05c7a247fc7f83a4d711d0a1bd169bf1dee3
-
SSDEEP
12288:/y90uQpuxOE4ELPcPj3jqkfRkVP1Jr+s9P+LMGXniNom2k+lrIVR:/yEsJhoTjqGRuSsoONHUra
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/2044-990-0x0000000007570000-0x0000000007B88000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 04730777.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 04730777.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 04730777.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 04730777.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 04730777.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 04730777.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4884 un738470.exe 4160 04730777.exe 2044 rk837966.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 04730777.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 04730777.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un738470.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un738470.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 50409bbf2696d231f352a1a1c517196f9030e0f4e8b9a3698141a838b81bd78b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 50409bbf2696d231f352a1a1c517196f9030e0f4e8b9a3698141a838b81bd78b.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2524 4160 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4160 04730777.exe 4160 04730777.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4160 04730777.exe Token: SeDebugPrivilege 2044 rk837966.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1956 wrote to memory of 4884 1956 50409bbf2696d231f352a1a1c517196f9030e0f4e8b9a3698141a838b81bd78b.exe 84 PID 1956 wrote to memory of 4884 1956 50409bbf2696d231f352a1a1c517196f9030e0f4e8b9a3698141a838b81bd78b.exe 84 PID 1956 wrote to memory of 4884 1956 50409bbf2696d231f352a1a1c517196f9030e0f4e8b9a3698141a838b81bd78b.exe 84 PID 4884 wrote to memory of 4160 4884 un738470.exe 85 PID 4884 wrote to memory of 4160 4884 un738470.exe 85 PID 4884 wrote to memory of 4160 4884 un738470.exe 85 PID 4884 wrote to memory of 2044 4884 un738470.exe 95 PID 4884 wrote to memory of 2044 4884 un738470.exe 95 PID 4884 wrote to memory of 2044 4884 un738470.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\50409bbf2696d231f352a1a1c517196f9030e0f4e8b9a3698141a838b81bd78b.exe"C:\Users\Admin\AppData\Local\Temp\50409bbf2696d231f352a1a1c517196f9030e0f4e8b9a3698141a838b81bd78b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un738470.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un738470.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\04730777.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\04730777.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 10044⤵
- Program crash
PID:2524
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk837966.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk837966.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4160 -ip 41601⤵PID:2124
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD539a2ae7955df9d9f31dd64f4a2658ad6
SHA1c1739805734774871582917e465e65134ba500ef
SHA256a9f98f2b765d3adbed9ac08b80da1edc11f5733d6793f640e5ea9cda812c4e8c
SHA512a1afee22fa3f5836e4a331043dcb50af1f0a9508baf1bc427fef1d69781d367546fa24a9d56f1912abe54891e7e5ab3b491256d100b415565c66e1f6c14ebdb8
-
Filesize
536KB
MD539a2ae7955df9d9f31dd64f4a2658ad6
SHA1c1739805734774871582917e465e65134ba500ef
SHA256a9f98f2b765d3adbed9ac08b80da1edc11f5733d6793f640e5ea9cda812c4e8c
SHA512a1afee22fa3f5836e4a331043dcb50af1f0a9508baf1bc427fef1d69781d367546fa24a9d56f1912abe54891e7e5ab3b491256d100b415565c66e1f6c14ebdb8
-
Filesize
258KB
MD5b5fdf24a9e7eaf585c081960b8240458
SHA18b17be5797391c97909b9622ddcd1486193cab55
SHA256fbb53a4cd704ff34b81b9def0da4e6b014fb90b0b56a61f151c30bee002b7bda
SHA512765e9774df21fac1b58cdfa00d189800e03c7e7be62e033d52be1b356ce488040e14b1fb9e0e3f3ca484b1c0fc841e467de624befbd343e0df7ee73b3a7503b1
-
Filesize
258KB
MD5b5fdf24a9e7eaf585c081960b8240458
SHA18b17be5797391c97909b9622ddcd1486193cab55
SHA256fbb53a4cd704ff34b81b9def0da4e6b014fb90b0b56a61f151c30bee002b7bda
SHA512765e9774df21fac1b58cdfa00d189800e03c7e7be62e033d52be1b356ce488040e14b1fb9e0e3f3ca484b1c0fc841e467de624befbd343e0df7ee73b3a7503b1
-
Filesize
341KB
MD5061550f87d822e0717a1ca8f0e4b3ef0
SHA1df757e025f786db975891a92a5bc70f96275c47d
SHA2569782370baea374f43a3df3491babbe10b4421cbeca3d2c475957e1da9d26a529
SHA5124970becb8ce833f27285fc4dcbcada69ceb2f81937b3a598fb786a4d643897043d565d41e3b3f2ae69ca751da1416bd66db46d206cf317cad75db95ceb32bc30
-
Filesize
341KB
MD5061550f87d822e0717a1ca8f0e4b3ef0
SHA1df757e025f786db975891a92a5bc70f96275c47d
SHA2569782370baea374f43a3df3491babbe10b4421cbeca3d2c475957e1da9d26a529
SHA5124970becb8ce833f27285fc4dcbcada69ceb2f81937b3a598fb786a4d643897043d565d41e3b3f2ae69ca751da1416bd66db46d206cf317cad75db95ceb32bc30