Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 21:22
Static task
static1
Behavioral task
behavioral1
Sample
390f9b7bd6f5035522f64194b9fd686112b281d880e9a529e969fe743893422f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
390f9b7bd6f5035522f64194b9fd686112b281d880e9a529e969fe743893422f.exe
Resource
win10v2004-20230220-en
General
-
Target
390f9b7bd6f5035522f64194b9fd686112b281d880e9a529e969fe743893422f.exe
-
Size
924KB
-
MD5
a08f2ffc86f7670670ea8ce061979071
-
SHA1
2a880260e0164a2e3c5ff3e8761dae3c660810da
-
SHA256
390f9b7bd6f5035522f64194b9fd686112b281d880e9a529e969fe743893422f
-
SHA512
cb21af0ea4e9d61329d3a2014c8e9b8b93e1a81e7f751ce6e0a11f85f3926f4d5165f95dfaaa1129cfe2c555d10bb4208b0ae30e06ab133e4585bf4479e4f1c6
-
SSDEEP
24576:0y+q6hxpBqjNKXbxFcZOVSG4S/THHzb2e3KweRX:D+X/XqJUf4G4ITHH+UKbR
Malware Config
Extracted
redline
lupa
217.196.96.56:4138
-
auth_value
fcb02fce9bc10c56a9841d56974bd7b8
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/2056-206-0x000000000A7B0000-0x000000000ADC8000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" N00106~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection N00106~1.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" N00106~1.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" N00106~1.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" N00106~1.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" N00106~1.EXE -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 5 IoCs
pid Process 4960 Z46483~1.EXE 5064 Z76077~1.EXE 1472 Z70744~1.EXE 4780 N00106~1.EXE 2056 O96686~1.EXE -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features N00106~1.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" N00106~1.EXE -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Z76077~1.EXE Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce Z70744~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Z70744~1.EXE Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 390f9b7bd6f5035522f64194b9fd686112b281d880e9a529e969fe743893422f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 390f9b7bd6f5035522f64194b9fd686112b281d880e9a529e969fe743893422f.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce Z46483~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Z46483~1.EXE Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce Z76077~1.EXE -
Program crash 1 IoCs
pid pid_target Process procid_target 2052 4780 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4780 N00106~1.EXE 4780 N00106~1.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4780 N00106~1.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2820 wrote to memory of 4960 2820 390f9b7bd6f5035522f64194b9fd686112b281d880e9a529e969fe743893422f.exe 82 PID 2820 wrote to memory of 4960 2820 390f9b7bd6f5035522f64194b9fd686112b281d880e9a529e969fe743893422f.exe 82 PID 2820 wrote to memory of 4960 2820 390f9b7bd6f5035522f64194b9fd686112b281d880e9a529e969fe743893422f.exe 82 PID 4960 wrote to memory of 5064 4960 Z46483~1.EXE 83 PID 4960 wrote to memory of 5064 4960 Z46483~1.EXE 83 PID 4960 wrote to memory of 5064 4960 Z46483~1.EXE 83 PID 5064 wrote to memory of 1472 5064 Z76077~1.EXE 84 PID 5064 wrote to memory of 1472 5064 Z76077~1.EXE 84 PID 5064 wrote to memory of 1472 5064 Z76077~1.EXE 84 PID 1472 wrote to memory of 4780 1472 Z70744~1.EXE 85 PID 1472 wrote to memory of 4780 1472 Z70744~1.EXE 85 PID 1472 wrote to memory of 4780 1472 Z70744~1.EXE 85 PID 1472 wrote to memory of 2056 1472 Z70744~1.EXE 89 PID 1472 wrote to memory of 2056 1472 Z70744~1.EXE 89 PID 1472 wrote to memory of 2056 1472 Z70744~1.EXE 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\390f9b7bd6f5035522f64194b9fd686112b281d880e9a529e969fe743893422f.exe"C:\Users\Admin\AppData\Local\Temp\390f9b7bd6f5035522f64194b9fd686112b281d880e9a529e969fe743893422f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Z46483~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Z46483~1.EXE2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Z76077~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Z76077~1.EXE3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Z70744~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Z70744~1.EXE4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\N00106~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\N00106~1.EXE5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 10886⤵
- Program crash
PID:2052
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\O96686~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\O96686~1.EXE5⤵
- Executes dropped EXE
PID:2056
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4780 -ip 47801⤵PID:5052
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
770KB
MD5124b9362ebb36eb8490872424f27f70d
SHA1099fe6cd4b4fcccf2c4dde868f28d465350d5c19
SHA25637b81cbcd0b2f211b58148139786dc7e063013eda0644f16345ac23d5d5b3354
SHA51260bc61f166513239b482c7ee3875baa6403da299df151ec8601dec77a8ead62897a24a296374d38533b8c0cf7a6f3b83835de7950db2c555b797d3db761d69da
-
Filesize
770KB
MD5124b9362ebb36eb8490872424f27f70d
SHA1099fe6cd4b4fcccf2c4dde868f28d465350d5c19
SHA25637b81cbcd0b2f211b58148139786dc7e063013eda0644f16345ac23d5d5b3354
SHA51260bc61f166513239b482c7ee3875baa6403da299df151ec8601dec77a8ead62897a24a296374d38533b8c0cf7a6f3b83835de7950db2c555b797d3db761d69da
-
Filesize
586KB
MD5a4af42261726ef73993ca90cdce7a1c0
SHA18387ae412657e616fb8310c9349168c37d38c268
SHA2569d0fc56758a2d65c6efbf54120b37c2d13fe265a955a3c15dddb37d7369c5ce2
SHA5127c2210e68f6366eade452aa8cd81581d490f09f6e33802c639dc6c0688a807e80b4f44203bcd9d4c2e0e189b5f2026432fb82546f87662984f876dd87451e30b
-
Filesize
586KB
MD5a4af42261726ef73993ca90cdce7a1c0
SHA18387ae412657e616fb8310c9349168c37d38c268
SHA2569d0fc56758a2d65c6efbf54120b37c2d13fe265a955a3c15dddb37d7369c5ce2
SHA5127c2210e68f6366eade452aa8cd81581d490f09f6e33802c639dc6c0688a807e80b4f44203bcd9d4c2e0e189b5f2026432fb82546f87662984f876dd87451e30b
-
Filesize
383KB
MD57a273e1d18d9be30778426c68a83e827
SHA1d9fe1a95a7763d98d20568a2feecc0aa06172580
SHA25634be13d8ff1db891e244c80860bbeab17ff911aeb30ecba83cd0674f8d578a9e
SHA512b374bc05a0f52925621d767e7963b3057f6e8e8d144e7bbbba414b6133444eff4864b4082261a24ddfd9f1c88ed9438f5e3c5464d9ee5faa930d61d13fc45aa5
-
Filesize
383KB
MD57a273e1d18d9be30778426c68a83e827
SHA1d9fe1a95a7763d98d20568a2feecc0aa06172580
SHA25634be13d8ff1db891e244c80860bbeab17ff911aeb30ecba83cd0674f8d578a9e
SHA512b374bc05a0f52925621d767e7963b3057f6e8e8d144e7bbbba414b6133444eff4864b4082261a24ddfd9f1c88ed9438f5e3c5464d9ee5faa930d61d13fc45aa5
-
Filesize
283KB
MD57ca8ef8c5820a938ca4aae8a057c1bc9
SHA1351718a888f1a2df4f49b7f923b0490b9c8b2a37
SHA256146f269525131f6339d995af715bbe1f248eda7c3cd1d31ace4fcd8c70ec7a5c
SHA51225f6c80f8357b1cec2973a414d7c934429026f7dbc4287bcf7e9650ef7932723d801a88de6a19ac8d9592e9097597ac528f1f9752edb4ce5fd46bfd756a184df
-
Filesize
283KB
MD57ca8ef8c5820a938ca4aae8a057c1bc9
SHA1351718a888f1a2df4f49b7f923b0490b9c8b2a37
SHA256146f269525131f6339d995af715bbe1f248eda7c3cd1d31ace4fcd8c70ec7a5c
SHA51225f6c80f8357b1cec2973a414d7c934429026f7dbc4287bcf7e9650ef7932723d801a88de6a19ac8d9592e9097597ac528f1f9752edb4ce5fd46bfd756a184df
-
Filesize
168KB
MD576b5ac1a6d46691e9e3285ee375256a3
SHA1ad896f69fc1a6e78acabe430a3214a5c3cff7ee6
SHA25674cd8495b9e48ea9a60ff2a4bcb018c66ff5993edb8fbd238ffa825a8964f408
SHA512cd2e63f4f184a55855ae862053c6f813e11826bb38d3b4e2a13bba1679a4154f39670449e528da7c505f2bae79020e9eaa4287ba0d536a0b64ca1b0ba3c79841
-
Filesize
168KB
MD576b5ac1a6d46691e9e3285ee375256a3
SHA1ad896f69fc1a6e78acabe430a3214a5c3cff7ee6
SHA25674cd8495b9e48ea9a60ff2a4bcb018c66ff5993edb8fbd238ffa825a8964f408
SHA512cd2e63f4f184a55855ae862053c6f813e11826bb38d3b4e2a13bba1679a4154f39670449e528da7c505f2bae79020e9eaa4287ba0d536a0b64ca1b0ba3c79841
-
Filesize
168KB
MD576b5ac1a6d46691e9e3285ee375256a3
SHA1ad896f69fc1a6e78acabe430a3214a5c3cff7ee6
SHA25674cd8495b9e48ea9a60ff2a4bcb018c66ff5993edb8fbd238ffa825a8964f408
SHA512cd2e63f4f184a55855ae862053c6f813e11826bb38d3b4e2a13bba1679a4154f39670449e528da7c505f2bae79020e9eaa4287ba0d536a0b64ca1b0ba3c79841