Analysis
-
max time kernel
154s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 22:36
Static task
static1
Behavioral task
behavioral1
Sample
02cc98ab134907f9f213b896df4c76f0ec13d3cf7ed1c43c5d7dd4e7d74d208f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
02cc98ab134907f9f213b896df4c76f0ec13d3cf7ed1c43c5d7dd4e7d74d208f.exe
Resource
win10v2004-20230220-en
General
-
Target
02cc98ab134907f9f213b896df4c76f0ec13d3cf7ed1c43c5d7dd4e7d74d208f.exe
-
Size
694KB
-
MD5
594b93570942ef9472202b28e7ea7785
-
SHA1
64f406f6b5537fb331239551bb36ac79fa137d8c
-
SHA256
02cc98ab134907f9f213b896df4c76f0ec13d3cf7ed1c43c5d7dd4e7d74d208f
-
SHA512
041438bf5798d20436802307bdf8e1706911ed5018533a64c30a145b6f1b5869000bfcb85d1f5f31a03413068aac5cd0337f2844cc96ae45c292c60cace1c746
-
SSDEEP
12288:ay90Qyc9gsBFoN5hNr8H6nNwrqJENJ0ttzFfYEhGW2Al0rQksAFK:aylys4N5hZ8H6nNwrqVfZJVksAs
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4468-988-0x0000000009D40000-0x000000000A358000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 40385170.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 40385170.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 40385170.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 40385170.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 40385170.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 40385170.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2112 un184689.exe 3668 40385170.exe 4468 rk175101.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 40385170.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 40385170.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 02cc98ab134907f9f213b896df4c76f0ec13d3cf7ed1c43c5d7dd4e7d74d208f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 02cc98ab134907f9f213b896df4c76f0ec13d3cf7ed1c43c5d7dd4e7d74d208f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un184689.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un184689.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1684 3668 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3668 40385170.exe 3668 40385170.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3668 40385170.exe Token: SeDebugPrivilege 4468 rk175101.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4232 wrote to memory of 2112 4232 02cc98ab134907f9f213b896df4c76f0ec13d3cf7ed1c43c5d7dd4e7d74d208f.exe 82 PID 4232 wrote to memory of 2112 4232 02cc98ab134907f9f213b896df4c76f0ec13d3cf7ed1c43c5d7dd4e7d74d208f.exe 82 PID 4232 wrote to memory of 2112 4232 02cc98ab134907f9f213b896df4c76f0ec13d3cf7ed1c43c5d7dd4e7d74d208f.exe 82 PID 2112 wrote to memory of 3668 2112 un184689.exe 83 PID 2112 wrote to memory of 3668 2112 un184689.exe 83 PID 2112 wrote to memory of 3668 2112 un184689.exe 83 PID 2112 wrote to memory of 4468 2112 un184689.exe 94 PID 2112 wrote to memory of 4468 2112 un184689.exe 94 PID 2112 wrote to memory of 4468 2112 un184689.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\02cc98ab134907f9f213b896df4c76f0ec13d3cf7ed1c43c5d7dd4e7d74d208f.exe"C:\Users\Admin\AppData\Local\Temp\02cc98ab134907f9f213b896df4c76f0ec13d3cf7ed1c43c5d7dd4e7d74d208f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un184689.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un184689.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\40385170.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\40385170.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3668 -s 10804⤵
- Program crash
PID:1684
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk175101.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk175101.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3668 -ip 36681⤵PID:2808
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
540KB
MD5d68ea20494b63ccdca5075042cec03f8
SHA10842ccf80088d0c947e6eb9191dab6fc36d9c6fc
SHA2568a87f6f1bd26be23b9c35fd4e0d083fa90e410c2c17bbf79a135059b109f28a6
SHA5128837d6764bf2e02a98a3374c5a2dd73a1154855e30e405cd29789ccbb607f4c2c5c1993fd115736669e69c8f9ab8ece1ece6ccd14af39e1f3a01e136b514ebba
-
Filesize
540KB
MD5d68ea20494b63ccdca5075042cec03f8
SHA10842ccf80088d0c947e6eb9191dab6fc36d9c6fc
SHA2568a87f6f1bd26be23b9c35fd4e0d083fa90e410c2c17bbf79a135059b109f28a6
SHA5128837d6764bf2e02a98a3374c5a2dd73a1154855e30e405cd29789ccbb607f4c2c5c1993fd115736669e69c8f9ab8ece1ece6ccd14af39e1f3a01e136b514ebba
-
Filesize
258KB
MD55bddbcd19ff1bca149c82169710eedfb
SHA14045de7391b73951aceb446c2b40172fcc315b3d
SHA2562f7ff1b8942210b59999fa7b862a727ee7c97c3d4d87383b148ea413c5ac8111
SHA5122fde2273533a7f431da82477c6af7178a80c4bd91e1e605256cd28d65bebda3b1fcf6c91d90b797b7e16d1db779f7af7b98676612ddd16111784e27a52bebf39
-
Filesize
258KB
MD55bddbcd19ff1bca149c82169710eedfb
SHA14045de7391b73951aceb446c2b40172fcc315b3d
SHA2562f7ff1b8942210b59999fa7b862a727ee7c97c3d4d87383b148ea413c5ac8111
SHA5122fde2273533a7f431da82477c6af7178a80c4bd91e1e605256cd28d65bebda3b1fcf6c91d90b797b7e16d1db779f7af7b98676612ddd16111784e27a52bebf39
-
Filesize
340KB
MD57fd53e7cecbb67cdffc47bda79edcca3
SHA114bcc42cb14be6f68953da0521998ae3e75cb5d8
SHA256aba322347f989ac1f3f3773a5234c01d78e5d215842a56c701c13b66d1cdf420
SHA512f783a660038834d086eef9903a05e418d402e3a7813daec96d33cbbd621ec3356defa210f2864b0f6dfac47cf925f1b82ef5989321d41ab5cb4eaf069b00f558
-
Filesize
340KB
MD57fd53e7cecbb67cdffc47bda79edcca3
SHA114bcc42cb14be6f68953da0521998ae3e75cb5d8
SHA256aba322347f989ac1f3f3773a5234c01d78e5d215842a56c701c13b66d1cdf420
SHA512f783a660038834d086eef9903a05e418d402e3a7813daec96d33cbbd621ec3356defa210f2864b0f6dfac47cf925f1b82ef5989321d41ab5cb4eaf069b00f558