Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 20:37
Static task
static1
Behavioral task
behavioral1
Sample
14c014a731fdd8a83dd94d9bea96ee4ec90110b61bf574ca0d85ea8a459dc894.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
14c014a731fdd8a83dd94d9bea96ee4ec90110b61bf574ca0d85ea8a459dc894.exe
Resource
win10v2004-20230220-en
General
-
Target
14c014a731fdd8a83dd94d9bea96ee4ec90110b61bf574ca0d85ea8a459dc894.exe
-
Size
934KB
-
MD5
dbf4acfacacd0e8aa1c6dc4129cca0cc
-
SHA1
1926bda614072d902345418681344cd797a956ee
-
SHA256
14c014a731fdd8a83dd94d9bea96ee4ec90110b61bf574ca0d85ea8a459dc894
-
SHA512
62dc85016ac7ec8562f619f2189937815df9b073b37b755b78d5a2fdfec69bd0a70e44b30de420ac55bee90de6a25d6cb7885382d888d2864b01d3ee3511f480
-
SSDEEP
24576:YyDOF/X7QoNE/YhQzS3RB8yQ+EAuhde3BUxLZ3Aq:fDOFDhReyQX9hdeRUnQ
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/2284-994-0x0000000009C90000-0x000000000A2A8000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 36703384.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 36703384.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 36703384.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 36703384.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 36703384.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 36703384.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 4 IoCs
pid Process 3832 za264663.exe 3812 za029542.exe 3884 36703384.exe 2284 w30bV66.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 36703384.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 36703384.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za029542.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" za029542.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 14c014a731fdd8a83dd94d9bea96ee4ec90110b61bf574ca0d85ea8a459dc894.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 14c014a731fdd8a83dd94d9bea96ee4ec90110b61bf574ca0d85ea8a459dc894.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce za264663.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" za264663.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 408 3884 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3884 36703384.exe 3884 36703384.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3884 36703384.exe Token: SeDebugPrivilege 2284 w30bV66.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1656 wrote to memory of 3832 1656 14c014a731fdd8a83dd94d9bea96ee4ec90110b61bf574ca0d85ea8a459dc894.exe 79 PID 1656 wrote to memory of 3832 1656 14c014a731fdd8a83dd94d9bea96ee4ec90110b61bf574ca0d85ea8a459dc894.exe 79 PID 1656 wrote to memory of 3832 1656 14c014a731fdd8a83dd94d9bea96ee4ec90110b61bf574ca0d85ea8a459dc894.exe 79 PID 3832 wrote to memory of 3812 3832 za264663.exe 80 PID 3832 wrote to memory of 3812 3832 za264663.exe 80 PID 3832 wrote to memory of 3812 3832 za264663.exe 80 PID 3812 wrote to memory of 3884 3812 za029542.exe 81 PID 3812 wrote to memory of 3884 3812 za029542.exe 81 PID 3812 wrote to memory of 3884 3812 za029542.exe 81 PID 3812 wrote to memory of 2284 3812 za029542.exe 90 PID 3812 wrote to memory of 2284 3812 za029542.exe 90 PID 3812 wrote to memory of 2284 3812 za029542.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\14c014a731fdd8a83dd94d9bea96ee4ec90110b61bf574ca0d85ea8a459dc894.exe"C:\Users\Admin\AppData\Local\Temp\14c014a731fdd8a83dd94d9bea96ee4ec90110b61bf574ca0d85ea8a459dc894.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za264663.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\za264663.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za029542.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\za029542.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\36703384.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\36703384.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3884 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3884 -s 10845⤵
- Program crash
PID:408
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w30bV66.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w30bV66.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3884 -ip 38841⤵PID:2020
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
724KB
MD5fab6a442657019ecea3664314936e8e9
SHA1a5da078b0f7585901e724f20cc0f1eca31c99ccb
SHA256fc3900c2ccbda9c7418d9548051f62ee765571cab9ab8679e131ef6779add500
SHA512232fc1fd90cf9437060362082f59b2bbb01ed777392066fb8746b46fcfc60cd0d5919c97e503c72ad2c30897ce17f957ab286edc3bae5344adcfb89eccb28480
-
Filesize
724KB
MD5fab6a442657019ecea3664314936e8e9
SHA1a5da078b0f7585901e724f20cc0f1eca31c99ccb
SHA256fc3900c2ccbda9c7418d9548051f62ee765571cab9ab8679e131ef6779add500
SHA512232fc1fd90cf9437060362082f59b2bbb01ed777392066fb8746b46fcfc60cd0d5919c97e503c72ad2c30897ce17f957ab286edc3bae5344adcfb89eccb28480
-
Filesize
541KB
MD5355bcec3757353c815a6f961b660a4e0
SHA1ade54e30b2ae71618210b5ed4ef94a62bc80ddec
SHA25674884e777674726a74a5f9061c9a01d3e4516a98ef0b75de4a77153bc31819b4
SHA512642d96088be4964c23c0942262465ee8f65e804d8b1baecfc4ce8784d4e0ea2b84029ab5cd43ac42a889f2690251cb662f8e437f3172f0aecb6b1e25e5b38896
-
Filesize
541KB
MD5355bcec3757353c815a6f961b660a4e0
SHA1ade54e30b2ae71618210b5ed4ef94a62bc80ddec
SHA25674884e777674726a74a5f9061c9a01d3e4516a98ef0b75de4a77153bc31819b4
SHA512642d96088be4964c23c0942262465ee8f65e804d8b1baecfc4ce8784d4e0ea2b84029ab5cd43ac42a889f2690251cb662f8e437f3172f0aecb6b1e25e5b38896
-
Filesize
258KB
MD5d44dfa01de18ab6572818f6151ee017b
SHA1e7ab692485dee0ce27579420d2ff97a61360e8e3
SHA256684f90be7d17abc59c57fb22a31b1614907b107deb44fc9ea57252fc4debbb21
SHA51285444dafb11a80e558115bc8f4f7cda0ad303bde8ab5e36f1a764a72aff627281cac8836ddda36b1d7b0ba5f2b90a712130f02113820c13ef4067ae224b7fa3c
-
Filesize
258KB
MD5d44dfa01de18ab6572818f6151ee017b
SHA1e7ab692485dee0ce27579420d2ff97a61360e8e3
SHA256684f90be7d17abc59c57fb22a31b1614907b107deb44fc9ea57252fc4debbb21
SHA51285444dafb11a80e558115bc8f4f7cda0ad303bde8ab5e36f1a764a72aff627281cac8836ddda36b1d7b0ba5f2b90a712130f02113820c13ef4067ae224b7fa3c
-
Filesize
340KB
MD50569136335e389f62f451edbfd5af910
SHA105a64e53ceade81474587198edb1741b16e2c4e9
SHA2560cc620a683c41b52a7a7cb720823f718dac02a0c91ac74d8b82253ed74db9a67
SHA512f0edc84c591ce53dfcee6a0a7dd3cb6ba91c034aadbce4f255a67b096bf86ebb465c7dc80a4cd79fe76dfee026213c1bcafba21534b0da366da6ecc8bd0a7030
-
Filesize
340KB
MD50569136335e389f62f451edbfd5af910
SHA105a64e53ceade81474587198edb1741b16e2c4e9
SHA2560cc620a683c41b52a7a7cb720823f718dac02a0c91ac74d8b82253ed74db9a67
SHA512f0edc84c591ce53dfcee6a0a7dd3cb6ba91c034aadbce4f255a67b096bf86ebb465c7dc80a4cd79fe76dfee026213c1bcafba21534b0da366da6ecc8bd0a7030