Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 20:37
Static task
static1
Behavioral task
behavioral1
Sample
14cb15bfc6c567225f9c19006ef79650eaf0622e5790317f7be2aae647f7e3cf.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
14cb15bfc6c567225f9c19006ef79650eaf0622e5790317f7be2aae647f7e3cf.exe
Resource
win10v2004-20230220-en
General
-
Target
14cb15bfc6c567225f9c19006ef79650eaf0622e5790317f7be2aae647f7e3cf.exe
-
Size
701KB
-
MD5
4bcaf8cdbef79b4dc47c3a4ee21da181
-
SHA1
d7baa68613ffa89f3e98ab6a1dbfbc091d8a1205
-
SHA256
14cb15bfc6c567225f9c19006ef79650eaf0622e5790317f7be2aae647f7e3cf
-
SHA512
3b3910178d40b6cdbf987b755121c1741984ac6dc2392493f4eeabafb0670c4e475fdcdcf3e8de8f65c31afdfd5db998c87e28d9969da36c49ca065af9c61020
-
SSDEEP
12288:Zy907uUizD6uPZRNT/x8FPclOhgVXb9jMpGiG8GJrGVRmBnBccqoXr:ZyYuFOuxRNTx8lcIhm9jVrGVRmBn2lU
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/2560-984-0x0000000009C60000-0x000000000A278000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 03177054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 03177054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 03177054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 03177054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 03177054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 03177054.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1540 un281626.exe 2128 03177054.exe 2560 rk806980.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 03177054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 03177054.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 14cb15bfc6c567225f9c19006ef79650eaf0622e5790317f7be2aae647f7e3cf.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un281626.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un281626.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 14cb15bfc6c567225f9c19006ef79650eaf0622e5790317f7be2aae647f7e3cf.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 984 2128 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2128 03177054.exe 2128 03177054.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2128 03177054.exe Token: SeDebugPrivilege 2560 rk806980.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1772 wrote to memory of 1540 1772 14cb15bfc6c567225f9c19006ef79650eaf0622e5790317f7be2aae647f7e3cf.exe 82 PID 1772 wrote to memory of 1540 1772 14cb15bfc6c567225f9c19006ef79650eaf0622e5790317f7be2aae647f7e3cf.exe 82 PID 1772 wrote to memory of 1540 1772 14cb15bfc6c567225f9c19006ef79650eaf0622e5790317f7be2aae647f7e3cf.exe 82 PID 1540 wrote to memory of 2128 1540 un281626.exe 83 PID 1540 wrote to memory of 2128 1540 un281626.exe 83 PID 1540 wrote to memory of 2128 1540 un281626.exe 83 PID 1540 wrote to memory of 2560 1540 un281626.exe 86 PID 1540 wrote to memory of 2560 1540 un281626.exe 86 PID 1540 wrote to memory of 2560 1540 un281626.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\14cb15bfc6c567225f9c19006ef79650eaf0622e5790317f7be2aae647f7e3cf.exe"C:\Users\Admin\AppData\Local\Temp\14cb15bfc6c567225f9c19006ef79650eaf0622e5790317f7be2aae647f7e3cf.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un281626.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un281626.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\03177054.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\03177054.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2128 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2128 -s 10964⤵
- Program crash
PID:984
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk806980.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk806980.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2128 -ip 21281⤵PID:4160
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
547KB
MD51e999155a42215ce3561ee98e7582615
SHA1b443ee2cc1793e498082ba4575a004821fba7e8a
SHA2560324fc7bd08b96423553594ba2861ba48e04137caa9db72426fe4b0d9c177f93
SHA5121a9564236fdc5feb8be10df2d2268d3e4ca613d418b5b32c44ae3ab0d27c7d869ba7e737f4cc650cc951bdfacf7a4273860bc5600cee03c9b3c66058e5c467da
-
Filesize
547KB
MD51e999155a42215ce3561ee98e7582615
SHA1b443ee2cc1793e498082ba4575a004821fba7e8a
SHA2560324fc7bd08b96423553594ba2861ba48e04137caa9db72426fe4b0d9c177f93
SHA5121a9564236fdc5feb8be10df2d2268d3e4ca613d418b5b32c44ae3ab0d27c7d869ba7e737f4cc650cc951bdfacf7a4273860bc5600cee03c9b3c66058e5c467da
-
Filesize
269KB
MD5b30cc80e434c5d0eb23678030f2e0702
SHA1477560df97c9fc157325dee019702a68c4888590
SHA2569ff7a9af2f80a21591310728682b34630f69bbf35298385530ca44f1b2800304
SHA5128e1c46f4f91db98fdd6fc5828756e156f203979b19469e618bd3db3d356eef16d7022b4960c7d5127d173e58869c6cf904c6560e04a9b1f834be5efe4d936539
-
Filesize
269KB
MD5b30cc80e434c5d0eb23678030f2e0702
SHA1477560df97c9fc157325dee019702a68c4888590
SHA2569ff7a9af2f80a21591310728682b34630f69bbf35298385530ca44f1b2800304
SHA5128e1c46f4f91db98fdd6fc5828756e156f203979b19469e618bd3db3d356eef16d7022b4960c7d5127d173e58869c6cf904c6560e04a9b1f834be5efe4d936539
-
Filesize
353KB
MD5b0052a48f062ef5922a4914ac648b8d7
SHA186f04d8d805c989bc22a0772336d968a1ecb4708
SHA25658469f8da41f284cc3880bfb129a6aa4ae485bc2659759b0565954648aac20e9
SHA51284b24e3410e9f02a5d532c0c2d79afa6aae13c85100c4c192443f96ab3e8bc8d6991d6e087cd0a0e7b24714889a873502557dc9677f64303711c36f6aef14acb
-
Filesize
353KB
MD5b0052a48f062ef5922a4914ac648b8d7
SHA186f04d8d805c989bc22a0772336d968a1ecb4708
SHA25658469f8da41f284cc3880bfb129a6aa4ae485bc2659759b0565954648aac20e9
SHA51284b24e3410e9f02a5d532c0c2d79afa6aae13c85100c4c192443f96ab3e8bc8d6991d6e087cd0a0e7b24714889a873502557dc9677f64303711c36f6aef14acb