Analysis
-
max time kernel
164s -
max time network
209s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 21:25
Static task
static1
Behavioral task
behavioral1
Sample
3add8d9e8db10e1e547bf649ab685d9d941e17541164aa7d7971aa96bfe1caa5.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
3add8d9e8db10e1e547bf649ab685d9d941e17541164aa7d7971aa96bfe1caa5.exe
Resource
win10v2004-20230220-en
General
-
Target
3add8d9e8db10e1e547bf649ab685d9d941e17541164aa7d7971aa96bfe1caa5.exe
-
Size
745KB
-
MD5
8dc8dad544993e3ce28c5a379f65a8e5
-
SHA1
03a2e886652196d81d43481341b8ee60e4403ae2
-
SHA256
3add8d9e8db10e1e547bf649ab685d9d941e17541164aa7d7971aa96bfe1caa5
-
SHA512
ea3d05c1ee6cda020597e120d2c257c9f42ae6564358ffacae2ba79afa0a8da0ebe6372e269d9eb976d5e46c73eaefe194ff95273cc3dbed893ce5b2bc052b5a
-
SSDEEP
12288:wy90oDrRbVCeywfCk91G54VQhkt8qsh5QHYtAfJ9XwBt/XubQSpIWDL+Z:wyplgeywKk9854VQhk8qsvQHYQQ/XyWN
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1356-993-0x00000000078C0000-0x0000000007ED8000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 11742726.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 11742726.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 11742726.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 11742726.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 11742726.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 11742726.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4584 un978554.exe 3632 11742726.exe 1356 rk714837.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 11742726.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 11742726.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 3add8d9e8db10e1e547bf649ab685d9d941e17541164aa7d7971aa96bfe1caa5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3add8d9e8db10e1e547bf649ab685d9d941e17541164aa7d7971aa96bfe1caa5.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un978554.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un978554.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1876 3632 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3632 11742726.exe 3632 11742726.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3632 11742726.exe Token: SeDebugPrivilege 1356 rk714837.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 872 wrote to memory of 4584 872 3add8d9e8db10e1e547bf649ab685d9d941e17541164aa7d7971aa96bfe1caa5.exe 80 PID 872 wrote to memory of 4584 872 3add8d9e8db10e1e547bf649ab685d9d941e17541164aa7d7971aa96bfe1caa5.exe 80 PID 872 wrote to memory of 4584 872 3add8d9e8db10e1e547bf649ab685d9d941e17541164aa7d7971aa96bfe1caa5.exe 80 PID 4584 wrote to memory of 3632 4584 un978554.exe 81 PID 4584 wrote to memory of 3632 4584 un978554.exe 81 PID 4584 wrote to memory of 3632 4584 un978554.exe 81 PID 4584 wrote to memory of 1356 4584 un978554.exe 87 PID 4584 wrote to memory of 1356 4584 un978554.exe 87 PID 4584 wrote to memory of 1356 4584 un978554.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\3add8d9e8db10e1e547bf649ab685d9d941e17541164aa7d7971aa96bfe1caa5.exe"C:\Users\Admin\AppData\Local\Temp\3add8d9e8db10e1e547bf649ab685d9d941e17541164aa7d7971aa96bfe1caa5.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un978554.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un978554.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\11742726.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\11742726.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 10964⤵
- Program crash
PID:1876
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk714837.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk714837.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1356
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3632 -ip 36321⤵PID:772
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
591KB
MD5a17e007dd6048c2c02a022137e4cc030
SHA1bc6bba3b02954745ed5fa3327f376cbaf0daaee3
SHA25634a3927796f663617157287c5620a1346ecef9c3d941467c2f2575995fa53fb3
SHA512c5442af76a381d77505263151637996bdd0a0c738e87edca294f704bb1ca3ab6722b315b47f4b68f358ac1bf343b8f001908932ffee1a09c4cf77196c19e04cb
-
Filesize
591KB
MD5a17e007dd6048c2c02a022137e4cc030
SHA1bc6bba3b02954745ed5fa3327f376cbaf0daaee3
SHA25634a3927796f663617157287c5620a1346ecef9c3d941467c2f2575995fa53fb3
SHA512c5442af76a381d77505263151637996bdd0a0c738e87edca294f704bb1ca3ab6722b315b47f4b68f358ac1bf343b8f001908932ffee1a09c4cf77196c19e04cb
-
Filesize
376KB
MD5ef9e2aa133f0d5a4b21b1f13b8a8162c
SHA1a4e6ddbee8b0c2f6464e0403551300508530167e
SHA256f057847f0283e9231c3511cfe7e5dd52c749a34507364dd4f7a08e3e22650ecf
SHA512f0c76340a67e1f3f954b0a0250daa34e054a66ec486890305a715a2d0dcd63f3f61998035763dbd3f6f6212eb882e21297ff5747876df31f69f157fa81574e58
-
Filesize
376KB
MD5ef9e2aa133f0d5a4b21b1f13b8a8162c
SHA1a4e6ddbee8b0c2f6464e0403551300508530167e
SHA256f057847f0283e9231c3511cfe7e5dd52c749a34507364dd4f7a08e3e22650ecf
SHA512f0c76340a67e1f3f954b0a0250daa34e054a66ec486890305a715a2d0dcd63f3f61998035763dbd3f6f6212eb882e21297ff5747876df31f69f157fa81574e58
-
Filesize
459KB
MD5993167dbb4417b2b3c57345f8d892939
SHA1e23ae38f684d3255ee13d27c50d5ec417b2073ae
SHA25640826115610828c394244667d6fa0fac3b3026860b8ba263dabdf2066cd0e1c1
SHA5127c160fe03a1bf5224bc0891c23efeb68d266cd83f21b9f83435664cb5f822441cec29057bc80de461cc6f8c090dd1384818341cf68c8978133efb80d935902dd
-
Filesize
459KB
MD5993167dbb4417b2b3c57345f8d892939
SHA1e23ae38f684d3255ee13d27c50d5ec417b2073ae
SHA25640826115610828c394244667d6fa0fac3b3026860b8ba263dabdf2066cd0e1c1
SHA5127c160fe03a1bf5224bc0891c23efeb68d266cd83f21b9f83435664cb5f822441cec29057bc80de461cc6f8c090dd1384818341cf68c8978133efb80d935902dd