Analysis
-
max time kernel
148s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 21:19
Static task
static1
Behavioral task
behavioral1
Sample
35fb5f5b7888cd756ede29efa67886e0d2c460646dba646ec1be48c1971003d7.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
35fb5f5b7888cd756ede29efa67886e0d2c460646dba646ec1be48c1971003d7.exe
Resource
win10v2004-20230220-en
General
-
Target
35fb5f5b7888cd756ede29efa67886e0d2c460646dba646ec1be48c1971003d7.exe
-
Size
690KB
-
MD5
d59e31f538f8e328546a340674f8645c
-
SHA1
51b717cc1541c1b5a07d096e902e25b0b055a348
-
SHA256
35fb5f5b7888cd756ede29efa67886e0d2c460646dba646ec1be48c1971003d7
-
SHA512
077a22efd0319adcca4afcb213fa75f6ff78f8143d81a92861bbc6d6a23676bc362d124b6eaf8bf9ee1c18dde1d25f2f3849316908eb4fd059b50cdf2cadabaf
-
SSDEEP
12288:Ay90VnUFJk/ufMrRPvMhsofdkfRkVS63Mq0ZGhGJniNEmVu1ul6A/EyK:AyLk/uf8RPvGskGRkSJxZ4NoGRsyK
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4104-988-0x00000000075D0000-0x0000000007BE8000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 53309168.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 53309168.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 53309168.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 53309168.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 53309168.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 53309168.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 2192 un133688.exe 4516 53309168.exe 4104 rk197346.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 53309168.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 53309168.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 35fb5f5b7888cd756ede29efa67886e0d2c460646dba646ec1be48c1971003d7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un133688.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un133688.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 35fb5f5b7888cd756ede29efa67886e0d2c460646dba646ec1be48c1971003d7.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 224 4516 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4516 53309168.exe 4516 53309168.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4516 53309168.exe Token: SeDebugPrivilege 4104 rk197346.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2284 wrote to memory of 2192 2284 35fb5f5b7888cd756ede29efa67886e0d2c460646dba646ec1be48c1971003d7.exe 84 PID 2284 wrote to memory of 2192 2284 35fb5f5b7888cd756ede29efa67886e0d2c460646dba646ec1be48c1971003d7.exe 84 PID 2284 wrote to memory of 2192 2284 35fb5f5b7888cd756ede29efa67886e0d2c460646dba646ec1be48c1971003d7.exe 84 PID 2192 wrote to memory of 4516 2192 un133688.exe 85 PID 2192 wrote to memory of 4516 2192 un133688.exe 85 PID 2192 wrote to memory of 4516 2192 un133688.exe 85 PID 2192 wrote to memory of 4104 2192 un133688.exe 90 PID 2192 wrote to memory of 4104 2192 un133688.exe 90 PID 2192 wrote to memory of 4104 2192 un133688.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\35fb5f5b7888cd756ede29efa67886e0d2c460646dba646ec1be48c1971003d7.exe"C:\Users\Admin\AppData\Local\Temp\35fb5f5b7888cd756ede29efa67886e0d2c460646dba646ec1be48c1971003d7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un133688.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un133688.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\53309168.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\53309168.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4516 -s 10844⤵
- Program crash
PID:224
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk197346.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk197346.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4104
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4516 -ip 45161⤵PID:3740
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD59ec1f4ea7e0ea9b25522736ec8ae1317
SHA19cf02362d8f01465e2e0d8e713b05cc5888adfb5
SHA256fa0164d731494fae163726e74d78cba342a31e85fb1d4e5373651b931a0ba35a
SHA512e8093a3b544c903f0007747d80d153f8fac3c2b2aa5982ea23c793dcabbe4ca9bf0a3beff788918bbbc669ef9962d96d985ac749fa48753f6ed68e83fad39f7c
-
Filesize
536KB
MD59ec1f4ea7e0ea9b25522736ec8ae1317
SHA19cf02362d8f01465e2e0d8e713b05cc5888adfb5
SHA256fa0164d731494fae163726e74d78cba342a31e85fb1d4e5373651b931a0ba35a
SHA512e8093a3b544c903f0007747d80d153f8fac3c2b2aa5982ea23c793dcabbe4ca9bf0a3beff788918bbbc669ef9962d96d985ac749fa48753f6ed68e83fad39f7c
-
Filesize
258KB
MD5951edf838f3fd6f73ef7dfce34a4049c
SHA1ee4b00c87be6ceb851dc9f6569f31333b1afaa0b
SHA2562a139a1c47e26170ef6af3840bcbe99872eb4dcc2c02de836ab1fc1d8a869442
SHA51222d17a8bd0337e91a2c4fb6913cc29481f072c8a0ebf97ab95aae998207d327e765adb6a07bee44c765a77db2577a2d4285fe0cda134f526cd14c391aa4d0716
-
Filesize
258KB
MD5951edf838f3fd6f73ef7dfce34a4049c
SHA1ee4b00c87be6ceb851dc9f6569f31333b1afaa0b
SHA2562a139a1c47e26170ef6af3840bcbe99872eb4dcc2c02de836ab1fc1d8a869442
SHA51222d17a8bd0337e91a2c4fb6913cc29481f072c8a0ebf97ab95aae998207d327e765adb6a07bee44c765a77db2577a2d4285fe0cda134f526cd14c391aa4d0716
-
Filesize
341KB
MD5e1ac90120d52cc657eefb538d254c540
SHA173b764dc4e41f8fddecab6bf4c61b1b5251be666
SHA2566dfea7801190d7f8b2851d3980e62cfbe941b541e7e13c75ebb168fa4342acca
SHA5121832bc0223e7f0f30386be91af6e5e829156c9f6edb2554040d2893a9f7626e38c905bcd1d471ac5082fab46a298bf9e8dc564d8b0337ba4b8fd9117042eab81
-
Filesize
341KB
MD5e1ac90120d52cc657eefb538d254c540
SHA173b764dc4e41f8fddecab6bf4c61b1b5251be666
SHA2566dfea7801190d7f8b2851d3980e62cfbe941b541e7e13c75ebb168fa4342acca
SHA5121832bc0223e7f0f30386be91af6e5e829156c9f6edb2554040d2893a9f7626e38c905bcd1d471ac5082fab46a298bf9e8dc564d8b0337ba4b8fd9117042eab81