Analysis
-
max time kernel
158s -
max time network
206s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 22:36
Static task
static1
Behavioral task
behavioral1
Sample
02538a6a91b4bbb6054af995ce8dab7c50e79450da1bbca2ae239c5f9ff1572b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
02538a6a91b4bbb6054af995ce8dab7c50e79450da1bbca2ae239c5f9ff1572b.exe
Resource
win10v2004-20230220-en
General
-
Target
02538a6a91b4bbb6054af995ce8dab7c50e79450da1bbca2ae239c5f9ff1572b.exe
-
Size
706KB
-
MD5
75dc29b7bc1537145083daa16636089d
-
SHA1
29e314003354eb8457a47900cd71579f04308774
-
SHA256
02538a6a91b4bbb6054af995ce8dab7c50e79450da1bbca2ae239c5f9ff1572b
-
SHA512
4c8e9fb2097b5047a79ce44577dc22800a53bd1e0bcbbc3d513cd8a422ed066934959133120a540d232660e728373c623ee9f461711b88926eb00d422f4afcb6
-
SSDEEP
12288:3y90hPqwv5flb6KtlIcb5LmfrdZDu1Gw/VpGMcpBv8OFTn1dqu7VJePv5Wnk5MR:3yqPNfjF11GjMIJRw3v6A
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3772-990-0x0000000009C80000-0x000000000A298000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr122364.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr122364.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr122364.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr122364.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr122364.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr122364.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 636 un079420.exe 2384 pr122364.exe 3772 qu750681.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr122364.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr122364.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 02538a6a91b4bbb6054af995ce8dab7c50e79450da1bbca2ae239c5f9ff1572b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 02538a6a91b4bbb6054af995ce8dab7c50e79450da1bbca2ae239c5f9ff1572b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un079420.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un079420.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2408 2384 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2384 pr122364.exe 2384 pr122364.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2384 pr122364.exe Token: SeDebugPrivilege 3772 qu750681.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3328 wrote to memory of 636 3328 02538a6a91b4bbb6054af995ce8dab7c50e79450da1bbca2ae239c5f9ff1572b.exe 80 PID 3328 wrote to memory of 636 3328 02538a6a91b4bbb6054af995ce8dab7c50e79450da1bbca2ae239c5f9ff1572b.exe 80 PID 3328 wrote to memory of 636 3328 02538a6a91b4bbb6054af995ce8dab7c50e79450da1bbca2ae239c5f9ff1572b.exe 80 PID 636 wrote to memory of 2384 636 un079420.exe 81 PID 636 wrote to memory of 2384 636 un079420.exe 81 PID 636 wrote to memory of 2384 636 un079420.exe 81 PID 636 wrote to memory of 3772 636 un079420.exe 86 PID 636 wrote to memory of 3772 636 un079420.exe 86 PID 636 wrote to memory of 3772 636 un079420.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\02538a6a91b4bbb6054af995ce8dab7c50e79450da1bbca2ae239c5f9ff1572b.exe"C:\Users\Admin\AppData\Local\Temp\02538a6a91b4bbb6054af995ce8dab7c50e79450da1bbca2ae239c5f9ff1572b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un079420.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un079420.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr122364.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr122364.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 10924⤵
- Program crash
PID:2408
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu750681.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu750681.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3772
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2384 -ip 23841⤵PID:2332
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
552KB
MD5670072e65944069d2f3109f53ba9c862
SHA109c08262ec764fee5b74373a65f2b8940b082fdc
SHA2569be89ff88b4e845a7a86cae86b2be03a78747bed615efa6d8992b395f0c8e43a
SHA5124990430129545fb9aec362447bd39205e95b3f8a9db4714cc316a500d1829ada5ad7f1becae7802566e4a588386af479f92120531737ae0b6e598d16667596ba
-
Filesize
552KB
MD5670072e65944069d2f3109f53ba9c862
SHA109c08262ec764fee5b74373a65f2b8940b082fdc
SHA2569be89ff88b4e845a7a86cae86b2be03a78747bed615efa6d8992b395f0c8e43a
SHA5124990430129545fb9aec362447bd39205e95b3f8a9db4714cc316a500d1829ada5ad7f1becae7802566e4a588386af479f92120531737ae0b6e598d16667596ba
-
Filesize
283KB
MD501d01b55d062e3748c431aa3f5dad536
SHA1a709d8f7d643642ebcb0daa3d5a2c4fd66281d77
SHA2567438fe3a52edd21474bae824c49c797ad051de55936e3fca5115123625800ca2
SHA5123ebdc00a250978034d7fac1afae7847806a2ae9d352870228a3f918453f11a16a834aa6dbf6c91be006190dd78bbe7c70e0413a400c0596f955b7c5dbcc16a76
-
Filesize
283KB
MD501d01b55d062e3748c431aa3f5dad536
SHA1a709d8f7d643642ebcb0daa3d5a2c4fd66281d77
SHA2567438fe3a52edd21474bae824c49c797ad051de55936e3fca5115123625800ca2
SHA5123ebdc00a250978034d7fac1afae7847806a2ae9d352870228a3f918453f11a16a834aa6dbf6c91be006190dd78bbe7c70e0413a400c0596f955b7c5dbcc16a76
-
Filesize
353KB
MD59050d75efee117cd41ff76058fd9de4a
SHA125ca9d65fd29d63807ae441e893fc9dfab42f879
SHA256bad01384accc2056793241206eaa43563649463cbd2a08d9104c7d2a823fcf88
SHA51266a17a57e827c7be2fb91c39c034fbfd30231fdb810ed049e6f26e99d701d2519f66eb5b8e190dd87c9bdd38546d427d8339c2ab20480b0c99fba0e0f1be9137
-
Filesize
353KB
MD59050d75efee117cd41ff76058fd9de4a
SHA125ca9d65fd29d63807ae441e893fc9dfab42f879
SHA256bad01384accc2056793241206eaa43563649463cbd2a08d9104c7d2a823fcf88
SHA51266a17a57e827c7be2fb91c39c034fbfd30231fdb810ed049e6f26e99d701d2519f66eb5b8e190dd87c9bdd38546d427d8339c2ab20480b0c99fba0e0f1be9137