Analysis
-
max time kernel
185s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 20:56
Static task
static1
Behavioral task
behavioral1
Sample
217e59fa537a7f62998aedf9af921cfb3efbb73e194b63057e9d991e5d24fa94.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
217e59fa537a7f62998aedf9af921cfb3efbb73e194b63057e9d991e5d24fa94.exe
Resource
win10v2004-20230220-en
General
-
Target
217e59fa537a7f62998aedf9af921cfb3efbb73e194b63057e9d991e5d24fa94.exe
-
Size
697KB
-
MD5
ccd09a2e3ad2aa71700bce87a53907d1
-
SHA1
a8ca057a1dbf17645d9ffd8539bdbadaa90264c0
-
SHA256
217e59fa537a7f62998aedf9af921cfb3efbb73e194b63057e9d991e5d24fa94
-
SHA512
11a92812e45fbd31eb44782efb864c2ddb03ad556b858ac15d41c503080d6bcef228800bab3451557ba03560955dc42d405ac542a14940b75e9fb5845b133974
-
SSDEEP
12288:oy90VdXxVMkit8timG3L8X5q0CvAjM/j+LbzVEdhVh3B77yy40WBKN:oySXxL28tZG3AX5qiUjeHud9C01N
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4572-988-0x0000000009CB0000-0x000000000A2C8000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 01335641.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 01335641.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 01335641.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 01335641.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 01335641.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 01335641.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4304 un866013.exe 3892 01335641.exe 4572 rk708033.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 01335641.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 01335641.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 217e59fa537a7f62998aedf9af921cfb3efbb73e194b63057e9d991e5d24fa94.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 217e59fa537a7f62998aedf9af921cfb3efbb73e194b63057e9d991e5d24fa94.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un866013.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un866013.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3808 3892 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3892 01335641.exe 3892 01335641.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3892 01335641.exe Token: SeDebugPrivilege 4572 rk708033.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 852 wrote to memory of 4304 852 217e59fa537a7f62998aedf9af921cfb3efbb73e194b63057e9d991e5d24fa94.exe 81 PID 852 wrote to memory of 4304 852 217e59fa537a7f62998aedf9af921cfb3efbb73e194b63057e9d991e5d24fa94.exe 81 PID 852 wrote to memory of 4304 852 217e59fa537a7f62998aedf9af921cfb3efbb73e194b63057e9d991e5d24fa94.exe 81 PID 4304 wrote to memory of 3892 4304 un866013.exe 82 PID 4304 wrote to memory of 3892 4304 un866013.exe 82 PID 4304 wrote to memory of 3892 4304 un866013.exe 82 PID 4304 wrote to memory of 4572 4304 un866013.exe 85 PID 4304 wrote to memory of 4572 4304 un866013.exe 85 PID 4304 wrote to memory of 4572 4304 un866013.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\217e59fa537a7f62998aedf9af921cfb3efbb73e194b63057e9d991e5d24fa94.exe"C:\Users\Admin\AppData\Local\Temp\217e59fa537a7f62998aedf9af921cfb3efbb73e194b63057e9d991e5d24fa94.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un866013.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un866013.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\01335641.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\01335641.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3892 -s 11004⤵
- Program crash
PID:3808
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk708033.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk708033.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4572
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3892 -ip 38921⤵PID:5112
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
543KB
MD581f730feee5dd9508f8be7de54238eb3
SHA1fed3134f9eb0c4ceeed9d00a8e1797b7e4c91808
SHA2561a6221512e1105060b0fe840e7972263275c45ae7c0cd15d15e88ebff7d163fc
SHA51219e2b544908fe3855bd6a323d1db987f6767d9baea29aec64ee7682219ff4b09f0420c4470fe8c5b104e3e928c2e4e89c5721f564a13a5e768de9d5527226d25
-
Filesize
543KB
MD581f730feee5dd9508f8be7de54238eb3
SHA1fed3134f9eb0c4ceeed9d00a8e1797b7e4c91808
SHA2561a6221512e1105060b0fe840e7972263275c45ae7c0cd15d15e88ebff7d163fc
SHA51219e2b544908fe3855bd6a323d1db987f6767d9baea29aec64ee7682219ff4b09f0420c4470fe8c5b104e3e928c2e4e89c5721f564a13a5e768de9d5527226d25
-
Filesize
263KB
MD5803fab3ea3542682353259fedf2af36b
SHA1e542c15f278966a8e55a7aea01faf4f6a57791ea
SHA2569262917e1a245f1d97a25c4a6d6be0e88406daa24ee7784ee6a641880c24d02e
SHA512b162e7eef0e258145205c6c9de327ed5c5687f895c974861bd34d70a3f6329dd68364c2758032bf93bccbad7d8e7e27018ccc13cd9afbed66a72eeead6ff4fd3
-
Filesize
263KB
MD5803fab3ea3542682353259fedf2af36b
SHA1e542c15f278966a8e55a7aea01faf4f6a57791ea
SHA2569262917e1a245f1d97a25c4a6d6be0e88406daa24ee7784ee6a641880c24d02e
SHA512b162e7eef0e258145205c6c9de327ed5c5687f895c974861bd34d70a3f6329dd68364c2758032bf93bccbad7d8e7e27018ccc13cd9afbed66a72eeead6ff4fd3
-
Filesize
328KB
MD590044e473ee31e28629e72a94bc33a02
SHA1e481e14ceee1515b44ee2245e310a13f6b1e14f7
SHA256e3e4cd8a3cc055ed0a3423e3d5e71ea013a29c9b14a3200cdc4c6b51aa6961bc
SHA5128d12cea872264a778974c88ea3e4f84d76e973e46c25d6d5307c7464574873a3e98b13d1466c496fa09316a7a26fcd86887dc1c16d005ed895bfaec69c839b03
-
Filesize
328KB
MD590044e473ee31e28629e72a94bc33a02
SHA1e481e14ceee1515b44ee2245e310a13f6b1e14f7
SHA256e3e4cd8a3cc055ed0a3423e3d5e71ea013a29c9b14a3200cdc4c6b51aa6961bc
SHA5128d12cea872264a778974c88ea3e4f84d76e973e46c25d6d5307c7464574873a3e98b13d1466c496fa09316a7a26fcd86887dc1c16d005ed895bfaec69c839b03