Analysis
-
max time kernel
141s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 22:44
Static task
static1
Behavioral task
behavioral1
Sample
070632abba4a80ed2f56473b2bda4c2865c095673aa47f09b7d15611e1bd0f10.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
070632abba4a80ed2f56473b2bda4c2865c095673aa47f09b7d15611e1bd0f10.exe
Resource
win10v2004-20230220-en
General
-
Target
070632abba4a80ed2f56473b2bda4c2865c095673aa47f09b7d15611e1bd0f10.exe
-
Size
690KB
-
MD5
7d3e77b531fa906c491afb739756564e
-
SHA1
c3efa185e85308bdbdff907f2e6c9ca504a5f0e5
-
SHA256
070632abba4a80ed2f56473b2bda4c2865c095673aa47f09b7d15611e1bd0f10
-
SHA512
3c846accbc29b857c9a5ae996f1d2d35e36448aeab8e0e20bf53b269e52c0272b9c9af266e6831b82b48272ef8d95a99a4291533013404c722b72199edddd155
-
SSDEEP
12288:fy90H1RzuQ2zRpvwGrHg1/wioK2oL0y0sHD2nm9T5Wu2mHxb:fyyyQAfvVEFw9K2oLNj2nsT5WuHHxb
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/2912-985-0x0000000007640000-0x0000000007C58000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 42068703.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 42068703.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 42068703.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 42068703.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 42068703.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 42068703.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1292 un355417.exe 2088 42068703.exe 2912 rk446965.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 42068703.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 42068703.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un355417.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un355417.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 070632abba4a80ed2f56473b2bda4c2865c095673aa47f09b7d15611e1bd0f10.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 070632abba4a80ed2f56473b2bda4c2865c095673aa47f09b7d15611e1bd0f10.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 736 2088 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2088 42068703.exe 2088 42068703.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2088 42068703.exe Token: SeDebugPrivilege 2912 rk446965.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5072 wrote to memory of 1292 5072 070632abba4a80ed2f56473b2bda4c2865c095673aa47f09b7d15611e1bd0f10.exe 82 PID 5072 wrote to memory of 1292 5072 070632abba4a80ed2f56473b2bda4c2865c095673aa47f09b7d15611e1bd0f10.exe 82 PID 5072 wrote to memory of 1292 5072 070632abba4a80ed2f56473b2bda4c2865c095673aa47f09b7d15611e1bd0f10.exe 82 PID 1292 wrote to memory of 2088 1292 un355417.exe 83 PID 1292 wrote to memory of 2088 1292 un355417.exe 83 PID 1292 wrote to memory of 2088 1292 un355417.exe 83 PID 1292 wrote to memory of 2912 1292 un355417.exe 87 PID 1292 wrote to memory of 2912 1292 un355417.exe 87 PID 1292 wrote to memory of 2912 1292 un355417.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\070632abba4a80ed2f56473b2bda4c2865c095673aa47f09b7d15611e1bd0f10.exe"C:\Users\Admin\AppData\Local\Temp\070632abba4a80ed2f56473b2bda4c2865c095673aa47f09b7d15611e1bd0f10.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un355417.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un355417.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\42068703.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\42068703.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 10164⤵
- Program crash
PID:736
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk446965.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk446965.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2088 -ip 20881⤵PID:4012
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD5492146f1c10e0110c3232e556a66d5ef
SHA139b74e8d9a5cec0a7bc613d1649bcecc0e1382ad
SHA256052e944b1b6fc35951ab32af01e0aace8406e6dcc253b6ef3d080b4757576b0d
SHA512df8dc8f14b4228e6a7a8c7434534ccc711b46c8710acc774507399da4f3e3fad5edc28ce299a9294e201f0f04ef79d12b095801e0dd2524e8d03b4853cb463a0
-
Filesize
536KB
MD5492146f1c10e0110c3232e556a66d5ef
SHA139b74e8d9a5cec0a7bc613d1649bcecc0e1382ad
SHA256052e944b1b6fc35951ab32af01e0aace8406e6dcc253b6ef3d080b4757576b0d
SHA512df8dc8f14b4228e6a7a8c7434534ccc711b46c8710acc774507399da4f3e3fad5edc28ce299a9294e201f0f04ef79d12b095801e0dd2524e8d03b4853cb463a0
-
Filesize
259KB
MD56464efb10e8de22c45fb1a68de531d89
SHA13dda413055918f372363f3fe262dd0a6af4cb0aa
SHA2569df94038effc7c846346d2380a7865c0e36b4fa4ddf91be5c56282bc295596f1
SHA512932f533e93351c8be7b98f88a3508a759085696ca897296ece9da624e04e0d6642df2e9c206ac1513c30b6339b5d54fd459dae5445768014c709c9de6123bfb9
-
Filesize
259KB
MD56464efb10e8de22c45fb1a68de531d89
SHA13dda413055918f372363f3fe262dd0a6af4cb0aa
SHA2569df94038effc7c846346d2380a7865c0e36b4fa4ddf91be5c56282bc295596f1
SHA512932f533e93351c8be7b98f88a3508a759085696ca897296ece9da624e04e0d6642df2e9c206ac1513c30b6339b5d54fd459dae5445768014c709c9de6123bfb9
-
Filesize
341KB
MD531e0512f93413fbf567f1efed7809bd9
SHA127a67baede2f40e092a0b97f909e6995215b70a8
SHA2561cb932428ea6656fd7f05803e92992c47581f499f9bca0ea301558d466d1c7e6
SHA512ad726b48a9b5332cdd096046c576b719cba08318369b127db46e92231d216932fa34a4d17d19619d055315b6242f9a6e5f4975ed8bda68631cffe515050f6562
-
Filesize
341KB
MD531e0512f93413fbf567f1efed7809bd9
SHA127a67baede2f40e092a0b97f909e6995215b70a8
SHA2561cb932428ea6656fd7f05803e92992c47581f499f9bca0ea301558d466d1c7e6
SHA512ad726b48a9b5332cdd096046c576b719cba08318369b127db46e92231d216932fa34a4d17d19619d055315b6242f9a6e5f4975ed8bda68631cffe515050f6562