Analysis
-
max time kernel
147s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 20:10
Static task
static1
Behavioral task
behavioral1
Sample
019b76da6b9ccbf4c3934669ef671db5abb6e079beadb6af8ce181490447afaa.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
019b76da6b9ccbf4c3934669ef671db5abb6e079beadb6af8ce181490447afaa.exe
Resource
win10v2004-20230220-en
General
-
Target
019b76da6b9ccbf4c3934669ef671db5abb6e079beadb6af8ce181490447afaa.exe
-
Size
689KB
-
MD5
142d27ea7ab5ab4a5ed11664f5f38b40
-
SHA1
3aaf5c6aa9dcbe6b6a5dabc092bfcc18dc439457
-
SHA256
019b76da6b9ccbf4c3934669ef671db5abb6e079beadb6af8ce181490447afaa
-
SHA512
d5c7e33949c6ee07cccb02a80008e6e6e7bc6f1e4af6ece10b2062584c02910844d220966996c8884515315f43b7f5ad9c4764a7222d6bc482e3933d06e37a7b
-
SSDEEP
12288:0y90qQQj+Tz6edLdYGw4rQ7ExQBdzZIJbQ/17gQl+OFbrLbr6j67LTpUM43FAF:0y0QWHdLdy487EizZqG17gQZFb3br6js
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4100-988-0x0000000007650000-0x0000000007C68000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 51749761.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 51749761.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 51749761.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 51749761.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 51749761.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 51749761.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1428 un231618.exe 2292 51749761.exe 4100 rk751446.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 51749761.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 51749761.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un231618.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un231618.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 019b76da6b9ccbf4c3934669ef671db5abb6e079beadb6af8ce181490447afaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 019b76da6b9ccbf4c3934669ef671db5abb6e079beadb6af8ce181490447afaa.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4572 2292 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2292 51749761.exe 2292 51749761.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2292 51749761.exe Token: SeDebugPrivilege 4100 rk751446.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2184 wrote to memory of 1428 2184 019b76da6b9ccbf4c3934669ef671db5abb6e079beadb6af8ce181490447afaa.exe 83 PID 2184 wrote to memory of 1428 2184 019b76da6b9ccbf4c3934669ef671db5abb6e079beadb6af8ce181490447afaa.exe 83 PID 2184 wrote to memory of 1428 2184 019b76da6b9ccbf4c3934669ef671db5abb6e079beadb6af8ce181490447afaa.exe 83 PID 1428 wrote to memory of 2292 1428 un231618.exe 84 PID 1428 wrote to memory of 2292 1428 un231618.exe 84 PID 1428 wrote to memory of 2292 1428 un231618.exe 84 PID 1428 wrote to memory of 4100 1428 un231618.exe 88 PID 1428 wrote to memory of 4100 1428 un231618.exe 88 PID 1428 wrote to memory of 4100 1428 un231618.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\019b76da6b9ccbf4c3934669ef671db5abb6e079beadb6af8ce181490447afaa.exe"C:\Users\Admin\AppData\Local\Temp\019b76da6b9ccbf4c3934669ef671db5abb6e079beadb6af8ce181490447afaa.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un231618.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un231618.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\51749761.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\51749761.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2292 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 11004⤵
- Program crash
PID:4572
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk751446.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk751446.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4100
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2292 -ip 22921⤵PID:1324
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD513ed61a9ee566c847e8ce2fa3a115669
SHA1d00d782eecc722b74c5d6a98fe4d0a9faf27ff2a
SHA2568386a8a5bc46556ce1cae3d95984e62070f4c38c9abeedf8fcf59c5b4ce3c78d
SHA51260932caed18f5b6536dba022224c9c624d5ac9ec7a613632267b73f3a972d5992d9a18258956eb5fd24127e424bb0716f196c3c5b288162618c4c73c839a002b
-
Filesize
536KB
MD513ed61a9ee566c847e8ce2fa3a115669
SHA1d00d782eecc722b74c5d6a98fe4d0a9faf27ff2a
SHA2568386a8a5bc46556ce1cae3d95984e62070f4c38c9abeedf8fcf59c5b4ce3c78d
SHA51260932caed18f5b6536dba022224c9c624d5ac9ec7a613632267b73f3a972d5992d9a18258956eb5fd24127e424bb0716f196c3c5b288162618c4c73c839a002b
-
Filesize
259KB
MD568c156ad0a5c61b27570c007695b2893
SHA178d14907756cd6ccac0a953ec9af7073c36eddb8
SHA2568874c20715be3c5cf4d6ba3ba18b3249f838c4385f69457a1a63705b3cc571c3
SHA512c3f9944406477703c14ecea338a9e32c7ddab9e978e719b9d548a4ca2c746ebb5887715a9ac23bb3285a5af3abf7d5e349f809be008edf45609ccc8ebc8f970d
-
Filesize
259KB
MD568c156ad0a5c61b27570c007695b2893
SHA178d14907756cd6ccac0a953ec9af7073c36eddb8
SHA2568874c20715be3c5cf4d6ba3ba18b3249f838c4385f69457a1a63705b3cc571c3
SHA512c3f9944406477703c14ecea338a9e32c7ddab9e978e719b9d548a4ca2c746ebb5887715a9ac23bb3285a5af3abf7d5e349f809be008edf45609ccc8ebc8f970d
-
Filesize
341KB
MD5ece6636e4bea2f2c09da6464d05744d9
SHA191fe9a92d46ebdc3827c22866c333a80255f74ef
SHA256e61656c0f7ae84299f16483372cc09ded3b58681829920d1e4e2277b3d9e03ab
SHA512f85d0b4fa0aacde2a0f1890775524d3c364fddf991a254bfb918c08dcb43cfc645346bc7bfca19c1ba234c161a77113b4b69948a16852b61bf72538e3e6669d2
-
Filesize
341KB
MD5ece6636e4bea2f2c09da6464d05744d9
SHA191fe9a92d46ebdc3827c22866c333a80255f74ef
SHA256e61656c0f7ae84299f16483372cc09ded3b58681829920d1e4e2277b3d9e03ab
SHA512f85d0b4fa0aacde2a0f1890775524d3c364fddf991a254bfb918c08dcb43cfc645346bc7bfca19c1ba234c161a77113b4b69948a16852b61bf72538e3e6669d2