Analysis
-
max time kernel
144s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 21:00
Static task
static1
Behavioral task
behavioral1
Sample
25127fae13cfd4f55168c66f0aeb2258c02fe9b21178d81b76b48ac9f880c784.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
25127fae13cfd4f55168c66f0aeb2258c02fe9b21178d81b76b48ac9f880c784.exe
Resource
win10v2004-20230220-en
General
-
Target
25127fae13cfd4f55168c66f0aeb2258c02fe9b21178d81b76b48ac9f880c784.exe
-
Size
695KB
-
MD5
8eddcf66ae93f064ceac58f02e666bbd
-
SHA1
3356865d0eb3ba1c9144844839eefe75b1da1ed9
-
SHA256
25127fae13cfd4f55168c66f0aeb2258c02fe9b21178d81b76b48ac9f880c784
-
SHA512
7ba7170f2d3e31f0b7a4866defcb3e4e830fc246aa1c4555c912b6b89509fcae2576ba68bd9ca46ff234ceaf0035ce98dc0428f39b6a86470b4f0f57bb3dd719
-
SSDEEP
12288:Fy907D25SxS/FelSftk1AfrnOLKNL1sqlniZVdUN0cRIbPAHBt00i9OcP3:FyWy5CSk4ftoPLKR1sqlsdUeTbei9nP3
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4408-991-0x0000000009C40000-0x000000000A258000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 27455554.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 27455554.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 27455554.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 27455554.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 27455554.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 27455554.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4428 un835840.exe 2652 27455554.exe 4408 rk599322.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 27455554.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 27455554.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 25127fae13cfd4f55168c66f0aeb2258c02fe9b21178d81b76b48ac9f880c784.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 25127fae13cfd4f55168c66f0aeb2258c02fe9b21178d81b76b48ac9f880c784.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un835840.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un835840.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 224 2652 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2652 27455554.exe 2652 27455554.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2652 27455554.exe Token: SeDebugPrivilege 4408 rk599322.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3484 wrote to memory of 4428 3484 25127fae13cfd4f55168c66f0aeb2258c02fe9b21178d81b76b48ac9f880c784.exe 84 PID 3484 wrote to memory of 4428 3484 25127fae13cfd4f55168c66f0aeb2258c02fe9b21178d81b76b48ac9f880c784.exe 84 PID 3484 wrote to memory of 4428 3484 25127fae13cfd4f55168c66f0aeb2258c02fe9b21178d81b76b48ac9f880c784.exe 84 PID 4428 wrote to memory of 2652 4428 un835840.exe 85 PID 4428 wrote to memory of 2652 4428 un835840.exe 85 PID 4428 wrote to memory of 2652 4428 un835840.exe 85 PID 4428 wrote to memory of 4408 4428 un835840.exe 88 PID 4428 wrote to memory of 4408 4428 un835840.exe 88 PID 4428 wrote to memory of 4408 4428 un835840.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\25127fae13cfd4f55168c66f0aeb2258c02fe9b21178d81b76b48ac9f880c784.exe"C:\Users\Admin\AppData\Local\Temp\25127fae13cfd4f55168c66f0aeb2258c02fe9b21178d81b76b48ac9f880c784.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un835840.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un835840.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\27455554.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\27455554.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 10844⤵
- Program crash
PID:224
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk599322.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk599322.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4408
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2652 -ip 26521⤵PID:4036
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
541KB
MD5fe2bf6b3129111ec059d3c4a576f93b5
SHA13bf6a03d2136a50d48738d6de3e3d00ff624f4a1
SHA256595afbecf659756834868be4aa8eb5e36341d73885ff0baa7ba47fb589231305
SHA5120f9c61e0e9ddfe05a0915e23522a8d07bb30224a56ab8fc06638aa568ae690aa179feece6c86ff339bf87a1a054456a7d43b3ecf539f4a7ff0d2f02a8b37828c
-
Filesize
541KB
MD5fe2bf6b3129111ec059d3c4a576f93b5
SHA13bf6a03d2136a50d48738d6de3e3d00ff624f4a1
SHA256595afbecf659756834868be4aa8eb5e36341d73885ff0baa7ba47fb589231305
SHA5120f9c61e0e9ddfe05a0915e23522a8d07bb30224a56ab8fc06638aa568ae690aa179feece6c86ff339bf87a1a054456a7d43b3ecf539f4a7ff0d2f02a8b37828c
-
Filesize
258KB
MD52757490ee89555e38e27164927cd7d7d
SHA149467f22230ea794c9f3bbbeb487c4b5a48a656d
SHA2563c8fbada537a1d5e231556bc57fff71b609a43d948fc58cd3707b0c1c2bf777d
SHA5121c8d15800513bea1982473b15061aeef9575d0acc58b8b4e18b9400314c7581f74201c727b6f19bea4e890fd9b0a5640d7a227a5fa7dde22cb7871c9b0ab1058
-
Filesize
258KB
MD52757490ee89555e38e27164927cd7d7d
SHA149467f22230ea794c9f3bbbeb487c4b5a48a656d
SHA2563c8fbada537a1d5e231556bc57fff71b609a43d948fc58cd3707b0c1c2bf777d
SHA5121c8d15800513bea1982473b15061aeef9575d0acc58b8b4e18b9400314c7581f74201c727b6f19bea4e890fd9b0a5640d7a227a5fa7dde22cb7871c9b0ab1058
-
Filesize
341KB
MD50e72b9bf5ac504dbf52f139554dd4748
SHA17b2b1301e9f4863da193b764c8a4fbbf0dcff40b
SHA256ccd02e85a163c8c4f619aea954b321ad157df5939979f126e254cf04d0da06c0
SHA5127759b36fdfd98c811958e5efd52ed9cce2602bbe297be67e068050b36cee967a16c2fa29fca72c3249dc96f845a98aac0f5d8f4795b504aec6f6b1c39afa5307
-
Filesize
341KB
MD50e72b9bf5ac504dbf52f139554dd4748
SHA17b2b1301e9f4863da193b764c8a4fbbf0dcff40b
SHA256ccd02e85a163c8c4f619aea954b321ad157df5939979f126e254cf04d0da06c0
SHA5127759b36fdfd98c811958e5efd52ed9cce2602bbe297be67e068050b36cee967a16c2fa29fca72c3249dc96f845a98aac0f5d8f4795b504aec6f6b1c39afa5307