Analysis
-
max time kernel
200s -
max time network
222s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 20:52
Static task
static1
Behavioral task
behavioral1
Sample
1fa21bad70fb9eba5f1dd16b39fae60326de473cec6956232984b3ad675f32c7.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1fa21bad70fb9eba5f1dd16b39fae60326de473cec6956232984b3ad675f32c7.exe
Resource
win10v2004-20230220-en
General
-
Target
1fa21bad70fb9eba5f1dd16b39fae60326de473cec6956232984b3ad675f32c7.exe
-
Size
707KB
-
MD5
982a5fdc6779e4491d9a42aced94632d
-
SHA1
e4b5f1b040df9232e9a1210ba19df9684b4af431
-
SHA256
1fa21bad70fb9eba5f1dd16b39fae60326de473cec6956232984b3ad675f32c7
-
SHA512
dd5876ab60345c2654011c15b5b3956f4c2cbe83bbd0bcce7ee75d978d1ab237bd0a05e8c34907e94b88c52211b4cb75260a8e5577c797c5d5793f42939e0be4
-
SSDEEP
12288:Jy90R4cYuZUSZinTLlcNfgXxGk0STEn3OmYOIDA6kk/Ee4rY:JykvZUSZinTxcNfghGDV3CHYkEE
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3532-993-0x0000000009D20000-0x000000000A338000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 93344822.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 93344822.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 93344822.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 93344822.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 93344822.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 93344822.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1308 un214049.exe 940 93344822.exe 3532 rk207501.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 93344822.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 93344822.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1fa21bad70fb9eba5f1dd16b39fae60326de473cec6956232984b3ad675f32c7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1fa21bad70fb9eba5f1dd16b39fae60326de473cec6956232984b3ad675f32c7.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un214049.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un214049.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 724 940 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 940 93344822.exe 940 93344822.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 940 93344822.exe Token: SeDebugPrivilege 3532 rk207501.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4304 wrote to memory of 1308 4304 1fa21bad70fb9eba5f1dd16b39fae60326de473cec6956232984b3ad675f32c7.exe 82 PID 4304 wrote to memory of 1308 4304 1fa21bad70fb9eba5f1dd16b39fae60326de473cec6956232984b3ad675f32c7.exe 82 PID 4304 wrote to memory of 1308 4304 1fa21bad70fb9eba5f1dd16b39fae60326de473cec6956232984b3ad675f32c7.exe 82 PID 1308 wrote to memory of 940 1308 un214049.exe 83 PID 1308 wrote to memory of 940 1308 un214049.exe 83 PID 1308 wrote to memory of 940 1308 un214049.exe 83 PID 1308 wrote to memory of 3532 1308 un214049.exe 88 PID 1308 wrote to memory of 3532 1308 un214049.exe 88 PID 1308 wrote to memory of 3532 1308 un214049.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fa21bad70fb9eba5f1dd16b39fae60326de473cec6956232984b3ad675f32c7.exe"C:\Users\Admin\AppData\Local\Temp\1fa21bad70fb9eba5f1dd16b39fae60326de473cec6956232984b3ad675f32c7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un214049.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un214049.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\93344822.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\93344822.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 940 -s 10884⤵
- Program crash
PID:724
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk207501.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk207501.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3532
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 940 -ip 9401⤵PID:4936
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
553KB
MD5e4328d9300ec5d28249e6e0ba3f30eb9
SHA123bcd416b481f881b53d85acb88b81014d031c7a
SHA256c2ddfa10209cd315f346f058484a14a6ee9bc32ebb62a4dc6db6c2b8d9fb5c95
SHA51220badb971ec5eb25fbb75e60fc5cbc727071e06b98fd53e9caed99b8be594ddf09243559a62db4c382f430f99a88d11ea844a9af1ab39de353d068eb4067b065
-
Filesize
553KB
MD5e4328d9300ec5d28249e6e0ba3f30eb9
SHA123bcd416b481f881b53d85acb88b81014d031c7a
SHA256c2ddfa10209cd315f346f058484a14a6ee9bc32ebb62a4dc6db6c2b8d9fb5c95
SHA51220badb971ec5eb25fbb75e60fc5cbc727071e06b98fd53e9caed99b8be594ddf09243559a62db4c382f430f99a88d11ea844a9af1ab39de353d068eb4067b065
-
Filesize
258KB
MD5db910f874c102d6882343c7a16532084
SHA17a3077123f3f7bfd4d1754f1183cac8990f5183d
SHA25629c26c29278d863002e1f57a191befb69955e43f39025d44e36bec6584d6fe24
SHA5129d900b17e69eb55dd9273b76176bd391d47c52277f8308b26ee28f13c9fb9039c5a2d206f1c3eb2ef524ac1bdfc19016d10b0c88b4f777316a0ee0710a044399
-
Filesize
258KB
MD5db910f874c102d6882343c7a16532084
SHA17a3077123f3f7bfd4d1754f1183cac8990f5183d
SHA25629c26c29278d863002e1f57a191befb69955e43f39025d44e36bec6584d6fe24
SHA5129d900b17e69eb55dd9273b76176bd391d47c52277f8308b26ee28f13c9fb9039c5a2d206f1c3eb2ef524ac1bdfc19016d10b0c88b4f777316a0ee0710a044399
-
Filesize
353KB
MD5a64d14f9bf215515c2456977b98a1d98
SHA1ed65b121fef2b10ab434f87e7e96ab3e3ca78057
SHA256004efb3b0aef0991604cf845f8bcb0dafc6afded7aa607cc5c8627397c84232f
SHA512d08bd84b9a776081921486538dd147064898c31d1d0f20b076da85c6f7aeb4b8c21cd3e7dd5d083bd18a98bdaca89d2a7c897f69bfb5bd9bc61cee07aab16d6d
-
Filesize
353KB
MD5a64d14f9bf215515c2456977b98a1d98
SHA1ed65b121fef2b10ab434f87e7e96ab3e3ca78057
SHA256004efb3b0aef0991604cf845f8bcb0dafc6afded7aa607cc5c8627397c84232f
SHA512d08bd84b9a776081921486538dd147064898c31d1d0f20b076da85c6f7aeb4b8c21cd3e7dd5d083bd18a98bdaca89d2a7c897f69bfb5bd9bc61cee07aab16d6d