Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 21:57
Static task
static1
Behavioral task
behavioral1
Sample
543ab68b1c5fce8df32ebb02dcd900640cb27b668bfb625502cf08de87217362.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
543ab68b1c5fce8df32ebb02dcd900640cb27b668bfb625502cf08de87217362.exe
Resource
win10v2004-20230220-en
General
-
Target
543ab68b1c5fce8df32ebb02dcd900640cb27b668bfb625502cf08de87217362.exe
-
Size
690KB
-
MD5
f0c7cd4460a3b7348cfdc30280f86d83
-
SHA1
322bcd748f0d54ac2e17eb115ebd74d62b7d3f71
-
SHA256
543ab68b1c5fce8df32ebb02dcd900640cb27b668bfb625502cf08de87217362
-
SHA512
6493463afb574586411d80eda07a8ed0e99afc032c1477497fb175139617b894029a615f4f64408bec9bde1abbcb75ed6ec042de825623a977e6b7f6cd635989
-
SSDEEP
12288:zy90z7fXrWmm6RlMIQDgXxMIcRIO/QxDTT8WNzOvfV0f:zyaXrWL6Rl4sNcsxDTTxNSCf
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4088-991-0x0000000007560000-0x0000000007B78000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 99460676.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 99460676.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 99460676.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 99460676.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 99460676.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 99460676.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 5048 un404914.exe 2288 99460676.exe 4088 rk643771.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 99460676.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 99460676.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 543ab68b1c5fce8df32ebb02dcd900640cb27b668bfb625502cf08de87217362.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 543ab68b1c5fce8df32ebb02dcd900640cb27b668bfb625502cf08de87217362.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un404914.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un404914.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1392 2288 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2288 99460676.exe 2288 99460676.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2288 99460676.exe Token: SeDebugPrivilege 4088 rk643771.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1944 wrote to memory of 5048 1944 543ab68b1c5fce8df32ebb02dcd900640cb27b668bfb625502cf08de87217362.exe 86 PID 1944 wrote to memory of 5048 1944 543ab68b1c5fce8df32ebb02dcd900640cb27b668bfb625502cf08de87217362.exe 86 PID 1944 wrote to memory of 5048 1944 543ab68b1c5fce8df32ebb02dcd900640cb27b668bfb625502cf08de87217362.exe 86 PID 5048 wrote to memory of 2288 5048 un404914.exe 87 PID 5048 wrote to memory of 2288 5048 un404914.exe 87 PID 5048 wrote to memory of 2288 5048 un404914.exe 87 PID 5048 wrote to memory of 4088 5048 un404914.exe 90 PID 5048 wrote to memory of 4088 5048 un404914.exe 90 PID 5048 wrote to memory of 4088 5048 un404914.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\543ab68b1c5fce8df32ebb02dcd900640cb27b668bfb625502cf08de87217362.exe"C:\Users\Admin\AppData\Local\Temp\543ab68b1c5fce8df32ebb02dcd900640cb27b668bfb625502cf08de87217362.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un404914.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un404914.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\99460676.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\99460676.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 10804⤵
- Program crash
PID:1392
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk643771.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk643771.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4088
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2288 -ip 22881⤵PID:400
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD51fac8401900d1073942473422a13ce73
SHA12107b2442619d14db6d9402287b1af87da89e4fb
SHA256149b061432fb6ce4ad435e36826d9edbf42af2c10c6d9dd2ad3e917c0849acb6
SHA512db61da7aad22360dd360a3a0bedc3c83fe18c01f0e4432d16bf4bebe7656053e1e3cb4ea5089650dcd18eddb765acf21290317fadcd825c8b28396ed73dee865
-
Filesize
536KB
MD51fac8401900d1073942473422a13ce73
SHA12107b2442619d14db6d9402287b1af87da89e4fb
SHA256149b061432fb6ce4ad435e36826d9edbf42af2c10c6d9dd2ad3e917c0849acb6
SHA512db61da7aad22360dd360a3a0bedc3c83fe18c01f0e4432d16bf4bebe7656053e1e3cb4ea5089650dcd18eddb765acf21290317fadcd825c8b28396ed73dee865
-
Filesize
259KB
MD5f61893cc078c077e01b6d57875896e7b
SHA1c1a978f44fc0a97dab5dfb857c3e30b5d8371827
SHA256ec20e19320faf045b6e71036a8d7e9722ccb3bcc5ee64e0722e9eab22f14e1ad
SHA5122be84ddef93d499e23588617c4267b1488ccb7bb8fde5c85869bef120c91b1051fe666c28df4b466abc5e37159ef9d6adf0f17bb67540d3a0c0d7c1b82480bea
-
Filesize
259KB
MD5f61893cc078c077e01b6d57875896e7b
SHA1c1a978f44fc0a97dab5dfb857c3e30b5d8371827
SHA256ec20e19320faf045b6e71036a8d7e9722ccb3bcc5ee64e0722e9eab22f14e1ad
SHA5122be84ddef93d499e23588617c4267b1488ccb7bb8fde5c85869bef120c91b1051fe666c28df4b466abc5e37159ef9d6adf0f17bb67540d3a0c0d7c1b82480bea
-
Filesize
342KB
MD554788af31813c06410ee6f6096fe8bcd
SHA12d65f80e18c7b645c64f8cad06195fba7e20b834
SHA256a162e6edf7956289cda2bd07e1f15491beb15b7ef56c0f9bbae2ad5dd6200568
SHA5129a0a49e97e870810c9e2df28b52677b331f28eda9251e532548f3e7cdf079d2e15f304df17a9222bb27da90d5b011227def60ad17d2a605270b8041c93a25a38
-
Filesize
342KB
MD554788af31813c06410ee6f6096fe8bcd
SHA12d65f80e18c7b645c64f8cad06195fba7e20b834
SHA256a162e6edf7956289cda2bd07e1f15491beb15b7ef56c0f9bbae2ad5dd6200568
SHA5129a0a49e97e870810c9e2df28b52677b331f28eda9251e532548f3e7cdf079d2e15f304df17a9222bb27da90d5b011227def60ad17d2a605270b8041c93a25a38