Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 22:29
Static task
static1
Behavioral task
behavioral1
Sample
707a4a5849b9a08d47a4225eafb62a72b07c70422d27d1dc0eabe029878c9069.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
707a4a5849b9a08d47a4225eafb62a72b07c70422d27d1dc0eabe029878c9069.exe
Resource
win10v2004-20230220-en
General
-
Target
707a4a5849b9a08d47a4225eafb62a72b07c70422d27d1dc0eabe029878c9069.exe
-
Size
690KB
-
MD5
3505c8ad496e8c4f508394f746584699
-
SHA1
c9248c34a7f9d3569b296829b236afc91084b532
-
SHA256
707a4a5849b9a08d47a4225eafb62a72b07c70422d27d1dc0eabe029878c9069
-
SHA512
78099402e60dd94ce843368aa2d1f10d0f216b66e7a20d089d8a20e92dc62e2b1e6bea667349e72c13f19d844a4c07061c5ab37909e9bb08817e125d1d3343ec
-
SSDEEP
12288:py90eqFt3sojvYDNf1bQdACIl74cJw/22VBn1l1Ci9qCR4p0MB+nMYDBwjj:py2L8uyTbQdACIlbwe2DYik9p0MELqX
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1196-986-0x0000000007540000-0x0000000007B58000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 14119056.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 14119056.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 14119056.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 14119056.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 14119056.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 14119056.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 3328 un665397.exe 4828 14119056.exe 1196 rk980250.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 14119056.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 14119056.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un665397.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 707a4a5849b9a08d47a4225eafb62a72b07c70422d27d1dc0eabe029878c9069.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 707a4a5849b9a08d47a4225eafb62a72b07c70422d27d1dc0eabe029878c9069.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un665397.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1760 4828 WerFault.exe 89 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4828 14119056.exe 4828 14119056.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4828 14119056.exe Token: SeDebugPrivilege 1196 rk980250.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4476 wrote to memory of 3328 4476 707a4a5849b9a08d47a4225eafb62a72b07c70422d27d1dc0eabe029878c9069.exe 88 PID 4476 wrote to memory of 3328 4476 707a4a5849b9a08d47a4225eafb62a72b07c70422d27d1dc0eabe029878c9069.exe 88 PID 4476 wrote to memory of 3328 4476 707a4a5849b9a08d47a4225eafb62a72b07c70422d27d1dc0eabe029878c9069.exe 88 PID 3328 wrote to memory of 4828 3328 un665397.exe 89 PID 3328 wrote to memory of 4828 3328 un665397.exe 89 PID 3328 wrote to memory of 4828 3328 un665397.exe 89 PID 3328 wrote to memory of 1196 3328 un665397.exe 92 PID 3328 wrote to memory of 1196 3328 un665397.exe 92 PID 3328 wrote to memory of 1196 3328 un665397.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\707a4a5849b9a08d47a4225eafb62a72b07c70422d27d1dc0eabe029878c9069.exe"C:\Users\Admin\AppData\Local\Temp\707a4a5849b9a08d47a4225eafb62a72b07c70422d27d1dc0eabe029878c9069.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un665397.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un665397.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\14119056.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\14119056.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 10924⤵
- Program crash
PID:1760
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk980250.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk980250.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1196
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4828 -ip 48281⤵PID:400
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD5a0505808eb99741df72ce31edac252ab
SHA1a855d9af5f7e093ed4e814166e0a3e156d76e90f
SHA2560c3b4839efcd4a0e03d184af9339d4691d247cc4e54729f27c0b6e6207c365c6
SHA512b8a797ff04cea8c774b5ebdd197b2e41b73b8f00e4285f3f65d4bdaaf50a9fff342877232db84c94102ceeaef89924f142b77c0efc83ff3afb996a8b6bf75409
-
Filesize
536KB
MD5a0505808eb99741df72ce31edac252ab
SHA1a855d9af5f7e093ed4e814166e0a3e156d76e90f
SHA2560c3b4839efcd4a0e03d184af9339d4691d247cc4e54729f27c0b6e6207c365c6
SHA512b8a797ff04cea8c774b5ebdd197b2e41b73b8f00e4285f3f65d4bdaaf50a9fff342877232db84c94102ceeaef89924f142b77c0efc83ff3afb996a8b6bf75409
-
Filesize
259KB
MD55e6db10f9cb98737663c3a79827c3ab4
SHA19dbc66c31507b5994a3213dfef049181b65269b6
SHA2561a11b0ea9724066aaf61dda7c30aeb75a0cf677792ba9258713f9a4fec8efa1f
SHA5126c62dc7776e6e7d39870392f0c84f752bf5064e7245a7aa43aabca50ac4cdf84b96efdb998fcb72f0e1aa3794488b76e2155f8bebfaf5ee73545c5ae91933ab4
-
Filesize
259KB
MD55e6db10f9cb98737663c3a79827c3ab4
SHA19dbc66c31507b5994a3213dfef049181b65269b6
SHA2561a11b0ea9724066aaf61dda7c30aeb75a0cf677792ba9258713f9a4fec8efa1f
SHA5126c62dc7776e6e7d39870392f0c84f752bf5064e7245a7aa43aabca50ac4cdf84b96efdb998fcb72f0e1aa3794488b76e2155f8bebfaf5ee73545c5ae91933ab4
-
Filesize
341KB
MD5bbd8e6c31f5f5ebf9b157b5bfc4139a7
SHA18bda37c5db5119bc5d5f702c8a5e15d76bede147
SHA25605ff2cd9f4f21d62a9c854e0798c00e854904cc0a73baefad6d479d951071461
SHA5124312ead056a0009ee09b8ea39b8a37287b6c3d74394e9514bf28506e2c12e40e008f04ca3c8774f33137c7c8c14dabd09f72fb9c183127d44dbd1d7b90360bc1
-
Filesize
341KB
MD5bbd8e6c31f5f5ebf9b157b5bfc4139a7
SHA18bda37c5db5119bc5d5f702c8a5e15d76bede147
SHA25605ff2cd9f4f21d62a9c854e0798c00e854904cc0a73baefad6d479d951071461
SHA5124312ead056a0009ee09b8ea39b8a37287b6c3d74394e9514bf28506e2c12e40e008f04ca3c8774f33137c7c8c14dabd09f72fb9c183127d44dbd1d7b90360bc1