Analysis
-
max time kernel
206s -
max time network
220s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 20:26
Static task
static1
Behavioral task
behavioral1
Sample
0c856bc151f53b3820a5abfe6930fdf0dd51bfacfdf2e0d8e3dd20a81d0a8602.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
0c856bc151f53b3820a5abfe6930fdf0dd51bfacfdf2e0d8e3dd20a81d0a8602.exe
Resource
win10v2004-20230220-en
General
-
Target
0c856bc151f53b3820a5abfe6930fdf0dd51bfacfdf2e0d8e3dd20a81d0a8602.exe
-
Size
747KB
-
MD5
62bc21d38cb8d88dfbb6fe0b75996112
-
SHA1
a1ba0d14f3a99126ff5fb3b03c240045c2fa2530
-
SHA256
0c856bc151f53b3820a5abfe6930fdf0dd51bfacfdf2e0d8e3dd20a81d0a8602
-
SHA512
e955310da1432294e573e97b52d801f1e572bbd0618e0d0c56bf6aa7084c6627397b65a2bd1cd3895beaca51ae30a3af178d8a2bc0f20ef2aee62cbb31561bfc
-
SSDEEP
12288:Oy90D2l0aLw2muR5et/rZIzraNV9SZks15JMhMO9pOBtGW5+PbnmYsqnoSk3:Oy62l0O1N7eRrZI+NV9gkkTCGGWoPKL/
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4592-994-0x00000000078F0000-0x0000000007F08000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 43937270.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 43937270.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 43937270.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 43937270.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 43937270.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 43937270.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4480 un207680.exe 3136 43937270.exe 4592 rk361195.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 43937270.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 43937270.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 0c856bc151f53b3820a5abfe6930fdf0dd51bfacfdf2e0d8e3dd20a81d0a8602.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0c856bc151f53b3820a5abfe6930fdf0dd51bfacfdf2e0d8e3dd20a81d0a8602.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un207680.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un207680.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3460 3136 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3136 43937270.exe 3136 43937270.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3136 43937270.exe Token: SeDebugPrivilege 4592 rk361195.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 624 wrote to memory of 4480 624 0c856bc151f53b3820a5abfe6930fdf0dd51bfacfdf2e0d8e3dd20a81d0a8602.exe 81 PID 624 wrote to memory of 4480 624 0c856bc151f53b3820a5abfe6930fdf0dd51bfacfdf2e0d8e3dd20a81d0a8602.exe 81 PID 624 wrote to memory of 4480 624 0c856bc151f53b3820a5abfe6930fdf0dd51bfacfdf2e0d8e3dd20a81d0a8602.exe 81 PID 4480 wrote to memory of 3136 4480 un207680.exe 82 PID 4480 wrote to memory of 3136 4480 un207680.exe 82 PID 4480 wrote to memory of 3136 4480 un207680.exe 82 PID 4480 wrote to memory of 4592 4480 un207680.exe 86 PID 4480 wrote to memory of 4592 4480 un207680.exe 86 PID 4480 wrote to memory of 4592 4480 un207680.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c856bc151f53b3820a5abfe6930fdf0dd51bfacfdf2e0d8e3dd20a81d0a8602.exe"C:\Users\Admin\AppData\Local\Temp\0c856bc151f53b3820a5abfe6930fdf0dd51bfacfdf2e0d8e3dd20a81d0a8602.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un207680.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un207680.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\43937270.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\43937270.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3136 -s 10964⤵
- Program crash
PID:3460
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk361195.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk361195.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4592
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3136 -ip 31361⤵PID:3284
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
592KB
MD57e06c6606179c6e4df60051c629b6633
SHA189b1ff71e07783b42ad06695a1a61e65e99ff7eb
SHA25646c4de730bb3dbf89799a9b33df5a2189f657daed837839082bbd7a3879adc85
SHA5123e7155921c993cd27f10110371fab3eab1a765247ec68e89017132fe736a99926a5cf68b1c19b9c6d4000cc813cf2cb91ad7f65c2d076ffb63a68678790013dd
-
Filesize
592KB
MD57e06c6606179c6e4df60051c629b6633
SHA189b1ff71e07783b42ad06695a1a61e65e99ff7eb
SHA25646c4de730bb3dbf89799a9b33df5a2189f657daed837839082bbd7a3879adc85
SHA5123e7155921c993cd27f10110371fab3eab1a765247ec68e89017132fe736a99926a5cf68b1c19b9c6d4000cc813cf2cb91ad7f65c2d076ffb63a68678790013dd
-
Filesize
376KB
MD5faeb38832b5eae79f0d50678583c39b5
SHA1e19f9d07954e2e173c1978052bd3ba0413b657b6
SHA2560dfad5a02c60162ee562ff54cb0da87a44a8589549bfaf9fc2befc38647e3798
SHA512098b4112423176aa88269e22e13553c0e74da1d5ad9dd941eb7d966bf7743969d9222b80a468d44a1d155e35edfdf00bc275cea396d7b1501f64cdf111b4a27b
-
Filesize
376KB
MD5faeb38832b5eae79f0d50678583c39b5
SHA1e19f9d07954e2e173c1978052bd3ba0413b657b6
SHA2560dfad5a02c60162ee562ff54cb0da87a44a8589549bfaf9fc2befc38647e3798
SHA512098b4112423176aa88269e22e13553c0e74da1d5ad9dd941eb7d966bf7743969d9222b80a468d44a1d155e35edfdf00bc275cea396d7b1501f64cdf111b4a27b
-
Filesize
459KB
MD55743d32bf7d508faf5505e600991cc87
SHA1ef0da1f6da8627ac9d4a2b879ac2bdaedb46cb94
SHA25649251de25e33b48ae6dfaa235009db1ea8d83a3d16506e5a832a42c4f2835ae4
SHA512b8ca74ad57ad61685c43e4c8a1c1946811cf44fc41691cb15f14c3f08398aa3ff37b75fb525ea3318a924d8d7dc6b5ec264971dd4015942fc52695c41588f5fa
-
Filesize
459KB
MD55743d32bf7d508faf5505e600991cc87
SHA1ef0da1f6da8627ac9d4a2b879ac2bdaedb46cb94
SHA25649251de25e33b48ae6dfaa235009db1ea8d83a3d16506e5a832a42c4f2835ae4
SHA512b8ca74ad57ad61685c43e4c8a1c1946811cf44fc41691cb15f14c3f08398aa3ff37b75fb525ea3318a924d8d7dc6b5ec264971dd4015942fc52695c41588f5fa