Analysis
-
max time kernel
141s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 20:19
Static task
static1
Behavioral task
behavioral1
Sample
074530f56e76ca5cecc69ae25ee1236b382b323392a71307f34e66340880bf3e.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
074530f56e76ca5cecc69ae25ee1236b382b323392a71307f34e66340880bf3e.exe
Resource
win10v2004-20230220-en
General
-
Target
074530f56e76ca5cecc69ae25ee1236b382b323392a71307f34e66340880bf3e.exe
-
Size
703KB
-
MD5
ceaf0ce3b0036d2e17a179a1eec7ddc0
-
SHA1
40367912bcfce0c977206a4070a79910e4703d31
-
SHA256
074530f56e76ca5cecc69ae25ee1236b382b323392a71307f34e66340880bf3e
-
SHA512
ea608b1108c33702c55342c005e7b5d200eb37e961159ac6476c0278a5f9ac2ecedfefec496e72715770948d556a1d0ccf15c1dd0f38305f1886c4885043c592
-
SSDEEP
12288:Zy90+2YJFXNbwRip07UYqLTec2VKtWI1zzC9MIznMqo/KbdtdGT:ZyXBw1UpL0KZ/MMIDp7dHGT
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/744-987-0x0000000009C70000-0x000000000A288000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr315516.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr315516.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr315516.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr315516.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr315516.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr315516.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 3068 un363612.exe 1348 pr315516.exe 744 qu134620.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr315516.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr315516.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 074530f56e76ca5cecc69ae25ee1236b382b323392a71307f34e66340880bf3e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 074530f56e76ca5cecc69ae25ee1236b382b323392a71307f34e66340880bf3e.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un363612.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un363612.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1272 1348 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1348 pr315516.exe 1348 pr315516.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1348 pr315516.exe Token: SeDebugPrivilege 744 qu134620.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4420 wrote to memory of 3068 4420 074530f56e76ca5cecc69ae25ee1236b382b323392a71307f34e66340880bf3e.exe 85 PID 4420 wrote to memory of 3068 4420 074530f56e76ca5cecc69ae25ee1236b382b323392a71307f34e66340880bf3e.exe 85 PID 4420 wrote to memory of 3068 4420 074530f56e76ca5cecc69ae25ee1236b382b323392a71307f34e66340880bf3e.exe 85 PID 3068 wrote to memory of 1348 3068 un363612.exe 86 PID 3068 wrote to memory of 1348 3068 un363612.exe 86 PID 3068 wrote to memory of 1348 3068 un363612.exe 86 PID 3068 wrote to memory of 744 3068 un363612.exe 92 PID 3068 wrote to memory of 744 3068 un363612.exe 92 PID 3068 wrote to memory of 744 3068 un363612.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\074530f56e76ca5cecc69ae25ee1236b382b323392a71307f34e66340880bf3e.exe"C:\Users\Admin\AppData\Local\Temp\074530f56e76ca5cecc69ae25ee1236b382b323392a71307f34e66340880bf3e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un363612.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un363612.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr315516.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr315516.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1348 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1348 -s 10804⤵
- Program crash
PID:1272
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu134620.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu134620.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:744
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1348 -ip 13481⤵PID:1012
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
549KB
MD5592280f75e4c1d6252c30fcd978b428b
SHA16590d2b253f55789079e2fcfedb2d2d0cf8ed919
SHA25635009834caa4936e938a0af163004a50ff15edf06d722a06c5429526f4349351
SHA512564eb8a927c6486ec0125900cc1b7d0eee27d3df31e7a779ee176d1588e527a018cc15de92831a9941ff0494624e907ec09bdb2a0c91289bc709c6a222900e29
-
Filesize
549KB
MD5592280f75e4c1d6252c30fcd978b428b
SHA16590d2b253f55789079e2fcfedb2d2d0cf8ed919
SHA25635009834caa4936e938a0af163004a50ff15edf06d722a06c5429526f4349351
SHA512564eb8a927c6486ec0125900cc1b7d0eee27d3df31e7a779ee176d1588e527a018cc15de92831a9941ff0494624e907ec09bdb2a0c91289bc709c6a222900e29
-
Filesize
278KB
MD5ea129ae4e2eec913a0abb8a1860e383d
SHA1cc11444a5348d0948ccfb353ddfc0199d4f79897
SHA256faecfb7874997a37e0096fe2b4434fbc333d96797b6fa70b69b9d260365dc752
SHA51288f2adbffa90bd21186c8818dab9e74884d401d7364c8c520e7884620ca9e24a403a1ca1f73c9d7ea2adbb33b0c3baf0fe6d35d8e134e2326449b06ba24d012a
-
Filesize
278KB
MD5ea129ae4e2eec913a0abb8a1860e383d
SHA1cc11444a5348d0948ccfb353ddfc0199d4f79897
SHA256faecfb7874997a37e0096fe2b4434fbc333d96797b6fa70b69b9d260365dc752
SHA51288f2adbffa90bd21186c8818dab9e74884d401d7364c8c520e7884620ca9e24a403a1ca1f73c9d7ea2adbb33b0c3baf0fe6d35d8e134e2326449b06ba24d012a
-
Filesize
361KB
MD5dbd9429a188264660be8c2063838216e
SHA10755dfb277703fc264026eedffa4d6ce2f211536
SHA2564fd3dfa285930f483efcc8694bbc41d006321540f053ff7b42a14d96ddd567a9
SHA51260aabab3d8fc5e7833c6f4317d5f10aa8435743ec42411bed0c6911d28eb499a39cd9a674d0b23689d84922c0e473020043be28e9fc22d70af24285c8cc7e513
-
Filesize
361KB
MD5dbd9429a188264660be8c2063838216e
SHA10755dfb277703fc264026eedffa4d6ce2f211536
SHA2564fd3dfa285930f483efcc8694bbc41d006321540f053ff7b42a14d96ddd567a9
SHA51260aabab3d8fc5e7833c6f4317d5f10aa8435743ec42411bed0c6911d28eb499a39cd9a674d0b23689d84922c0e473020043be28e9fc22d70af24285c8cc7e513