Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 21:11
Static task
static1
Behavioral task
behavioral1
Sample
2f3e52216162db48e32a06954a8a8cd5df82b0d1fb27d5abaca81388801b359a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2f3e52216162db48e32a06954a8a8cd5df82b0d1fb27d5abaca81388801b359a.exe
Resource
win10v2004-20230220-en
General
-
Target
2f3e52216162db48e32a06954a8a8cd5df82b0d1fb27d5abaca81388801b359a.exe
-
Size
746KB
-
MD5
e4e716a0b8e190b6bb318178318f7421
-
SHA1
33bdbdb03c72eb11e02cc5b5477d1689c1948bd4
-
SHA256
2f3e52216162db48e32a06954a8a8cd5df82b0d1fb27d5abaca81388801b359a
-
SHA512
e33893b67926afd8fa7b6792832866b05b46bcbdac3ba3ce994083f4fff020d3ddb10fd95fc8c7fb9e944338fce9fa7e149a186fc29825717d986627a5eb00b6
-
SSDEEP
12288:Iy90Q1aVJmlvBnnyPcOL5WUMU7W0GUm5rvmh2R56sl248NPSJUdBllxknl78rn5:IyWVJmvhyPcw5/MU7WzfrG2/DcNPwG7Z
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4568-986-0x00000000078B0000-0x0000000007EC8000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 83730441.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 83730441.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 83730441.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 83730441.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 83730441.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 83730441.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1112 un285504.exe 2932 83730441.exe 4568 rk657419.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 83730441.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 83730441.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2f3e52216162db48e32a06954a8a8cd5df82b0d1fb27d5abaca81388801b359a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2f3e52216162db48e32a06954a8a8cd5df82b0d1fb27d5abaca81388801b359a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un285504.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un285504.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1336 2932 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2932 83730441.exe 2932 83730441.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2932 83730441.exe Token: SeDebugPrivilege 4568 rk657419.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2152 wrote to memory of 1112 2152 2f3e52216162db48e32a06954a8a8cd5df82b0d1fb27d5abaca81388801b359a.exe 84 PID 2152 wrote to memory of 1112 2152 2f3e52216162db48e32a06954a8a8cd5df82b0d1fb27d5abaca81388801b359a.exe 84 PID 2152 wrote to memory of 1112 2152 2f3e52216162db48e32a06954a8a8cd5df82b0d1fb27d5abaca81388801b359a.exe 84 PID 1112 wrote to memory of 2932 1112 un285504.exe 85 PID 1112 wrote to memory of 2932 1112 un285504.exe 85 PID 1112 wrote to memory of 2932 1112 un285504.exe 85 PID 1112 wrote to memory of 4568 1112 un285504.exe 88 PID 1112 wrote to memory of 4568 1112 un285504.exe 88 PID 1112 wrote to memory of 4568 1112 un285504.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f3e52216162db48e32a06954a8a8cd5df82b0d1fb27d5abaca81388801b359a.exe"C:\Users\Admin\AppData\Local\Temp\2f3e52216162db48e32a06954a8a8cd5df82b0d1fb27d5abaca81388801b359a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un285504.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un285504.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\83730441.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\83730441.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2932 -s 10804⤵
- Program crash
PID:1336
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk657419.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk657419.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4568
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2932 -ip 29321⤵PID:4652
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
592KB
MD5617d4f6291fa24b40dab8434bc664b43
SHA1bd0343d8172752ebb6848bfb8c4a7f4481fc4a55
SHA256acb568641e6a3667e281356cfd3cfc5deb59e8149731c0aad2a3f57299536636
SHA5124719d4db706dffa923a0a7dd9da0fcc5f0e358516faaefc8df856577536ed0a93e7327ab909a93d6eabbb79448f133918824acedb3d2a5dc0e73df27ecb62721
-
Filesize
592KB
MD5617d4f6291fa24b40dab8434bc664b43
SHA1bd0343d8172752ebb6848bfb8c4a7f4481fc4a55
SHA256acb568641e6a3667e281356cfd3cfc5deb59e8149731c0aad2a3f57299536636
SHA5124719d4db706dffa923a0a7dd9da0fcc5f0e358516faaefc8df856577536ed0a93e7327ab909a93d6eabbb79448f133918824acedb3d2a5dc0e73df27ecb62721
-
Filesize
377KB
MD590208df0ba58359e6bba0939e468f8a4
SHA170edf1c0f63f1f38a79cdec82d3774b38557d08d
SHA256708bdea7a0971be71738361cfec577ded2d659a8c42b4af2b1f2854373d9443e
SHA512a6d87ec8b1c59b46d376e4321326b29898a3cb4b447546a219739fc7224569f5d85fa6eaee1a64ff2fe72d8e5ac3b0778bef7f770c3b6881c61f9752beb594e9
-
Filesize
377KB
MD590208df0ba58359e6bba0939e468f8a4
SHA170edf1c0f63f1f38a79cdec82d3774b38557d08d
SHA256708bdea7a0971be71738361cfec577ded2d659a8c42b4af2b1f2854373d9443e
SHA512a6d87ec8b1c59b46d376e4321326b29898a3cb4b447546a219739fc7224569f5d85fa6eaee1a64ff2fe72d8e5ac3b0778bef7f770c3b6881c61f9752beb594e9
-
Filesize
459KB
MD5da79495f3cd15173f52c4c11aae2927a
SHA1a87aadedf50341f05abe3d8976722892fe80e103
SHA2563660799614d52d064260bb0bc2c8a2fddf71d5db2f6b79ac885413dc99bdeeb9
SHA512ffac1df415e677092710dbd443ce8aeeec03f677e5692705a7df7ef3602131fbbfd3ed389d7d5f786bc578abcf1d9bac81ea88891832e0a46eb0cda1a6643372
-
Filesize
459KB
MD5da79495f3cd15173f52c4c11aae2927a
SHA1a87aadedf50341f05abe3d8976722892fe80e103
SHA2563660799614d52d064260bb0bc2c8a2fddf71d5db2f6b79ac885413dc99bdeeb9
SHA512ffac1df415e677092710dbd443ce8aeeec03f677e5692705a7df7ef3602131fbbfd3ed389d7d5f786bc578abcf1d9bac81ea88891832e0a46eb0cda1a6643372