Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
586926590816e4fce4fe9b693c2d6a7a5568757c31d1a6e7c65542cab3af5944.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
586926590816e4fce4fe9b693c2d6a7a5568757c31d1a6e7c65542cab3af5944.exe
Resource
win10v2004-20230220-en
General
-
Target
586926590816e4fce4fe9b693c2d6a7a5568757c31d1a6e7c65542cab3af5944.exe
-
Size
701KB
-
MD5
4e70e4ab8dfa362e587d47ac0f75dfa0
-
SHA1
502fd6e4fb7bc50476afc1454286a78eb71fe3f6
-
SHA256
586926590816e4fce4fe9b693c2d6a7a5568757c31d1a6e7c65542cab3af5944
-
SHA512
95f8ff98fb4a4dfe0324ad6bbcd0b5daf0b6c12916425c917d712f614213f9cd917b9f6d51ff74ce597c466d8f51382fc6c1963da511b1da60dfd4278cf0ad36
-
SSDEEP
12288:hy90ZQHuMnGnIQ/mmMpm8G/p9CGtO/PXTRkBnPnzbFs:hyvrGrmtpmLf+XTRkBnPFs
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4680-990-0x0000000009C70000-0x000000000A288000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 77452539.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 77452539.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 77452539.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 77452539.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 77452539.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 77452539.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4480 un373758.exe 4176 77452539.exe 4680 rk111030.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 77452539.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 77452539.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 586926590816e4fce4fe9b693c2d6a7a5568757c31d1a6e7c65542cab3af5944.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 586926590816e4fce4fe9b693c2d6a7a5568757c31d1a6e7c65542cab3af5944.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un373758.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un373758.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3000 4176 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4176 77452539.exe 4176 77452539.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4176 77452539.exe Token: SeDebugPrivilege 4680 rk111030.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3736 wrote to memory of 4480 3736 586926590816e4fce4fe9b693c2d6a7a5568757c31d1a6e7c65542cab3af5944.exe 84 PID 3736 wrote to memory of 4480 3736 586926590816e4fce4fe9b693c2d6a7a5568757c31d1a6e7c65542cab3af5944.exe 84 PID 3736 wrote to memory of 4480 3736 586926590816e4fce4fe9b693c2d6a7a5568757c31d1a6e7c65542cab3af5944.exe 84 PID 4480 wrote to memory of 4176 4480 un373758.exe 85 PID 4480 wrote to memory of 4176 4480 un373758.exe 85 PID 4480 wrote to memory of 4176 4480 un373758.exe 85 PID 4480 wrote to memory of 4680 4480 un373758.exe 94 PID 4480 wrote to memory of 4680 4480 un373758.exe 94 PID 4480 wrote to memory of 4680 4480 un373758.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\586926590816e4fce4fe9b693c2d6a7a5568757c31d1a6e7c65542cab3af5944.exe"C:\Users\Admin\AppData\Local\Temp\586926590816e4fce4fe9b693c2d6a7a5568757c31d1a6e7c65542cab3af5944.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un373758.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un373758.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\77452539.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\77452539.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4176 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 10844⤵
- Program crash
PID:3000
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk111030.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk111030.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4680
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4176 -ip 41761⤵PID:3032
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
547KB
MD51f84f8a740e63cf658a045f52665b471
SHA1a3087590f756c5ba47b587b55254295d0fedfa14
SHA256298da2da9970d620ab5217a22b8865f3108867e4b6106c786185dd1d71558971
SHA512e43ef7658ca66f44beb78f081bd3046c3355c415fe370332feedb7e8597e7c3f14d6279055a41c0b5704d70ac8d2fe639e387596921dc13bc55ab6d506d78b94
-
Filesize
547KB
MD51f84f8a740e63cf658a045f52665b471
SHA1a3087590f756c5ba47b587b55254295d0fedfa14
SHA256298da2da9970d620ab5217a22b8865f3108867e4b6106c786185dd1d71558971
SHA512e43ef7658ca66f44beb78f081bd3046c3355c415fe370332feedb7e8597e7c3f14d6279055a41c0b5704d70ac8d2fe639e387596921dc13bc55ab6d506d78b94
-
Filesize
269KB
MD51e6c3306c728b4418f1a2f5517863957
SHA1da7b3faf292c251fc4d42051da10affa3e4277a2
SHA2567b8ed9d7a76c1c021d3831d772a7968c874d7cca43fd9244e1d5f7159b8cbfe2
SHA512b1a6e2a219d7584133253bda4c670b7a30ce054037b8c4048fba7389c82d76e4cc69bddbcf7a1134562f1bea6159f5da16c3db9118e7378145b180299464a57d
-
Filesize
269KB
MD51e6c3306c728b4418f1a2f5517863957
SHA1da7b3faf292c251fc4d42051da10affa3e4277a2
SHA2567b8ed9d7a76c1c021d3831d772a7968c874d7cca43fd9244e1d5f7159b8cbfe2
SHA512b1a6e2a219d7584133253bda4c670b7a30ce054037b8c4048fba7389c82d76e4cc69bddbcf7a1134562f1bea6159f5da16c3db9118e7378145b180299464a57d
-
Filesize
353KB
MD5b63da7600a15580eb7c52143c334a5fc
SHA18d6423ea20595392fcdaa3010d5481f9659bbb6a
SHA256ceaf09c3e8b49842125ad0924cb413367c096e7bff7ff1ce3c5a418be37b8d21
SHA512be01d7930bc41f910827a0b6a778c2ffc3e556236a56281d6001c7b75aae1748e314ea1bf67f18b1a09aea742f073d01f7de85d21059a3ac61fd17cf1cdeaea2
-
Filesize
353KB
MD5b63da7600a15580eb7c52143c334a5fc
SHA18d6423ea20595392fcdaa3010d5481f9659bbb6a
SHA256ceaf09c3e8b49842125ad0924cb413367c096e7bff7ff1ce3c5a418be37b8d21
SHA512be01d7930bc41f910827a0b6a778c2ffc3e556236a56281d6001c7b75aae1748e314ea1bf67f18b1a09aea742f073d01f7de85d21059a3ac61fd17cf1cdeaea2