Analysis
-
max time kernel
141s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 21:16
Static task
static1
Behavioral task
behavioral1
Sample
33f38a17cb2bca07f67cdabed30c8ef264bfbf5a73e5c7ead9882de42c2e489a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
33f38a17cb2bca07f67cdabed30c8ef264bfbf5a73e5c7ead9882de42c2e489a.exe
Resource
win10v2004-20230220-en
General
-
Target
33f38a17cb2bca07f67cdabed30c8ef264bfbf5a73e5c7ead9882de42c2e489a.exe
-
Size
701KB
-
MD5
243456c830cbe264025309d40192fdfd
-
SHA1
0211a08db62e814a81ae6000e6d106e93371335e
-
SHA256
33f38a17cb2bca07f67cdabed30c8ef264bfbf5a73e5c7ead9882de42c2e489a
-
SHA512
5303d2d6629704b9eea961b43ce92a2da3a191055d510dc93fcba251dabf461b71c6f8383f01cf81fd25e666774aa3046545d84cfee3c53980dd2ca0fa9ebaa6
-
SSDEEP
12288:iy909Vl56+rkrV/jriBpr3FDDjiDD+m5boAwXthlGiArHzPRiBCf5sPY:iyiTdgVuBpZDuDD+m5EAwoJzPRiBCRsg
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/2668-985-0x0000000009C60000-0x000000000A278000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 31151928.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 31151928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 31151928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 31151928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 31151928.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 31151928.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2808 un611357.exe 4928 31151928.exe 2668 rk613042.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 31151928.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 31151928.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 33f38a17cb2bca07f67cdabed30c8ef264bfbf5a73e5c7ead9882de42c2e489a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 33f38a17cb2bca07f67cdabed30c8ef264bfbf5a73e5c7ead9882de42c2e489a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un611357.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un611357.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3204 4928 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4928 31151928.exe 4928 31151928.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4928 31151928.exe Token: SeDebugPrivilege 2668 rk613042.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2808 2548 33f38a17cb2bca07f67cdabed30c8ef264bfbf5a73e5c7ead9882de42c2e489a.exe 86 PID 2548 wrote to memory of 2808 2548 33f38a17cb2bca07f67cdabed30c8ef264bfbf5a73e5c7ead9882de42c2e489a.exe 86 PID 2548 wrote to memory of 2808 2548 33f38a17cb2bca07f67cdabed30c8ef264bfbf5a73e5c7ead9882de42c2e489a.exe 86 PID 2808 wrote to memory of 4928 2808 un611357.exe 87 PID 2808 wrote to memory of 4928 2808 un611357.exe 87 PID 2808 wrote to memory of 4928 2808 un611357.exe 87 PID 2808 wrote to memory of 2668 2808 un611357.exe 97 PID 2808 wrote to memory of 2668 2808 un611357.exe 97 PID 2808 wrote to memory of 2668 2808 un611357.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\33f38a17cb2bca07f67cdabed30c8ef264bfbf5a73e5c7ead9882de42c2e489a.exe"C:\Users\Admin\AppData\Local\Temp\33f38a17cb2bca07f67cdabed30c8ef264bfbf5a73e5c7ead9882de42c2e489a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un611357.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un611357.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\31151928.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\31151928.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 10844⤵
- Program crash
PID:3204
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk613042.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk613042.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4928 -ip 49281⤵PID:3880
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
547KB
MD58dc485b769c5e0680d72419d2b568f19
SHA12c51522b756d0f4a5a93427c4701314682d34a34
SHA2563342ad3abb0a858f8edeed019594bb3b05d6829439b4e9ecf8e3567c51629e87
SHA5120d600949ff6a02c51d48e0b5ce02dfca66c3cfeeb11575987be3461bde682a01dce7d8a2f62b2618fc6b1683fae4d08cc82bc909f3c0d1a05147a5553a00f5b5
-
Filesize
547KB
MD58dc485b769c5e0680d72419d2b568f19
SHA12c51522b756d0f4a5a93427c4701314682d34a34
SHA2563342ad3abb0a858f8edeed019594bb3b05d6829439b4e9ecf8e3567c51629e87
SHA5120d600949ff6a02c51d48e0b5ce02dfca66c3cfeeb11575987be3461bde682a01dce7d8a2f62b2618fc6b1683fae4d08cc82bc909f3c0d1a05147a5553a00f5b5
-
Filesize
269KB
MD51654ae14cb472a918c89e1501fa4fff6
SHA12b0a6dbee5fc721b601428f45820c9dbb04b583d
SHA25676dbce94cd332414cb9f7acd36ad001fd73f630bdcc52705ee1c31d80ec4ecbb
SHA51265d00d17ca4249cca70ac64e3861817a6970fd2aec11180f57bc2cf09f0f4848d967d56e25f74b289099393978d2cbe92b00fbeb84d1951af13fa50bb9c60674
-
Filesize
269KB
MD51654ae14cb472a918c89e1501fa4fff6
SHA12b0a6dbee5fc721b601428f45820c9dbb04b583d
SHA25676dbce94cd332414cb9f7acd36ad001fd73f630bdcc52705ee1c31d80ec4ecbb
SHA51265d00d17ca4249cca70ac64e3861817a6970fd2aec11180f57bc2cf09f0f4848d967d56e25f74b289099393978d2cbe92b00fbeb84d1951af13fa50bb9c60674
-
Filesize
353KB
MD5c8aa4148478bd90aa2efd94ac27b46be
SHA1bc4f4ed76b9500261e46244f3f530480c8e172c1
SHA256cf6fcc0f32a9ea206c72a17a98a9c6b3835090dd35c65b9755c7d863473cb05b
SHA512da54b393a687c43829c847040fa17284c39b5e4dfca8f4062bfa2a2dc5870cffdb9201fee67c03ff7b630e04fca5894bae4f5625815c649bb85e14f21bbc1cc2
-
Filesize
353KB
MD5c8aa4148478bd90aa2efd94ac27b46be
SHA1bc4f4ed76b9500261e46244f3f530480c8e172c1
SHA256cf6fcc0f32a9ea206c72a17a98a9c6b3835090dd35c65b9755c7d863473cb05b
SHA512da54b393a687c43829c847040fa17284c39b5e4dfca8f4062bfa2a2dc5870cffdb9201fee67c03ff7b630e04fca5894bae4f5625815c649bb85e14f21bbc1cc2