Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 22:44
Static task
static1
Behavioral task
behavioral1
Sample
0715d4780f10de781cb3f914eee9407bfb8123695ca5ab89649cc23f39deeb20.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0715d4780f10de781cb3f914eee9407bfb8123695ca5ab89649cc23f39deeb20.exe
Resource
win10v2004-20230220-en
General
-
Target
0715d4780f10de781cb3f914eee9407bfb8123695ca5ab89649cc23f39deeb20.exe
-
Size
966KB
-
MD5
0577d37fce6009336863c78e6f9f4b6e
-
SHA1
23fe9400b25a4ab2c077b3a19a6ad1f13f160ec7
-
SHA256
0715d4780f10de781cb3f914eee9407bfb8123695ca5ab89649cc23f39deeb20
-
SHA512
89ddeb724ec49f7200de3ced19d905d679337d606951bf70d3777f12e54a5b84f265fd1eb68b5099ab916f761b9fd8dfdcabb4d04d8feba01bee86ec7dda747d
-
SSDEEP
12288:oy90rf0WEwrEJXC+c/aPblP0p6H+9TQWd8vtuCrto3dr8mC8c025ZED0HuJP+LXo:oyFWE/xeGJnxzfyr84cB+OX1A4o5AE
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/2860-994-0x0000000009D20000-0x000000000A338000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr296962.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr296962.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr296962.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr296962.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr296962.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr296962.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 1040 un864061.exe 3748 un289695.exe 2248 pr296962.exe 2860 qu460922.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr296962.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr296962.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0715d4780f10de781cb3f914eee9407bfb8123695ca5ab89649cc23f39deeb20.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un864061.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un864061.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un289695.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un289695.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0715d4780f10de781cb3f914eee9407bfb8123695ca5ab89649cc23f39deeb20.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1932 2248 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2248 pr296962.exe 2248 pr296962.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2248 pr296962.exe Token: SeDebugPrivilege 2860 qu460922.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 772 wrote to memory of 1040 772 0715d4780f10de781cb3f914eee9407bfb8123695ca5ab89649cc23f39deeb20.exe 88 PID 772 wrote to memory of 1040 772 0715d4780f10de781cb3f914eee9407bfb8123695ca5ab89649cc23f39deeb20.exe 88 PID 772 wrote to memory of 1040 772 0715d4780f10de781cb3f914eee9407bfb8123695ca5ab89649cc23f39deeb20.exe 88 PID 1040 wrote to memory of 3748 1040 un864061.exe 89 PID 1040 wrote to memory of 3748 1040 un864061.exe 89 PID 1040 wrote to memory of 3748 1040 un864061.exe 89 PID 3748 wrote to memory of 2248 3748 un289695.exe 90 PID 3748 wrote to memory of 2248 3748 un289695.exe 90 PID 3748 wrote to memory of 2248 3748 un289695.exe 90 PID 3748 wrote to memory of 2860 3748 un289695.exe 100 PID 3748 wrote to memory of 2860 3748 un289695.exe 100 PID 3748 wrote to memory of 2860 3748 un289695.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\0715d4780f10de781cb3f914eee9407bfb8123695ca5ab89649cc23f39deeb20.exe"C:\Users\Admin\AppData\Local\Temp\0715d4780f10de781cb3f914eee9407bfb8123695ca5ab89649cc23f39deeb20.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un864061.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un864061.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un289695.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un289695.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr296962.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr296962.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2248 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2248 -s 10365⤵
- Program crash
PID:1932
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu460922.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu460922.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2860
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2248 -ip 22481⤵PID:3292
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
706KB
MD5fcc9d9303a73b18d073eb4b6d5c27bd4
SHA14237ac5bc2355fc46a1f35a70d0273b5229d4ffe
SHA256f003fd6d521fbff6e62caed4e4f711fd3b22c1046caff7c59128f97224200031
SHA512b3f2519c1b4ecfaf491061ff58efeab9611fd35b386d570eb296babd822a44419c2ec5e86004376cd882a833daea4c81cee595cda54b36827c62fe7081eb60d8
-
Filesize
706KB
MD5fcc9d9303a73b18d073eb4b6d5c27bd4
SHA14237ac5bc2355fc46a1f35a70d0273b5229d4ffe
SHA256f003fd6d521fbff6e62caed4e4f711fd3b22c1046caff7c59128f97224200031
SHA512b3f2519c1b4ecfaf491061ff58efeab9611fd35b386d570eb296babd822a44419c2ec5e86004376cd882a833daea4c81cee595cda54b36827c62fe7081eb60d8
-
Filesize
552KB
MD55c63ec066717d0f3ad1fc38428dd9fcb
SHA1045897da15bb504752f8f45e25961a6d3f4f599e
SHA256a0e7f1b8775b297ee5f5f1e5d53bd0106d3f76a544e2f96b8c1f6e866b15d5c8
SHA5129212d1c47d23f83d7f78660d8b3c16808e00262b004601c7f576602324ffc01f062ec213a6830a3a1e307326329be840785db25619fd10f00c6b15913ebc23b3
-
Filesize
552KB
MD55c63ec066717d0f3ad1fc38428dd9fcb
SHA1045897da15bb504752f8f45e25961a6d3f4f599e
SHA256a0e7f1b8775b297ee5f5f1e5d53bd0106d3f76a544e2f96b8c1f6e866b15d5c8
SHA5129212d1c47d23f83d7f78660d8b3c16808e00262b004601c7f576602324ffc01f062ec213a6830a3a1e307326329be840785db25619fd10f00c6b15913ebc23b3
-
Filesize
299KB
MD5c84683a274d99cc645007df85509c064
SHA12e2afcbf4f3e439cf8f2e37bed0f0aed1977df58
SHA256d4d906cd8786db867e41045efc5925e18d556b9ad7c025f2ffd3bc128e25d204
SHA512e80a264232b2b3fe521b30e482794c7fe46ab0a6974f6f44be2aff7a5da1a97eab6789b508508cd4e8a34434bf4469884d4068ba86f1d77c7f4b4f27f9039431
-
Filesize
299KB
MD5c84683a274d99cc645007df85509c064
SHA12e2afcbf4f3e439cf8f2e37bed0f0aed1977df58
SHA256d4d906cd8786db867e41045efc5925e18d556b9ad7c025f2ffd3bc128e25d204
SHA512e80a264232b2b3fe521b30e482794c7fe46ab0a6974f6f44be2aff7a5da1a97eab6789b508508cd4e8a34434bf4469884d4068ba86f1d77c7f4b4f27f9039431
-
Filesize
382KB
MD576277ef0dc11080cf5c36242d1d9aa2f
SHA1a21615d638ffa7002f5249af0c8846b13f6ed357
SHA25639fdfbf63597fb3b390600d04da77b747402394d4aee3641b78e4d1f68bd0da4
SHA5128af3cf7bdea7c7a38aaf96c179c1bd5d1193e7d6fca80e2411335c6a5b42ea1ac9f32831a518ab5b2d389565b8f74cc90d64d4c6b11e3e3b006d038c28ed627e
-
Filesize
382KB
MD576277ef0dc11080cf5c36242d1d9aa2f
SHA1a21615d638ffa7002f5249af0c8846b13f6ed357
SHA25639fdfbf63597fb3b390600d04da77b747402394d4aee3641b78e4d1f68bd0da4
SHA5128af3cf7bdea7c7a38aaf96c179c1bd5d1193e7d6fca80e2411335c6a5b42ea1ac9f32831a518ab5b2d389565b8f74cc90d64d4c6b11e3e3b006d038c28ed627e