Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 21:03
Static task
static1
Behavioral task
behavioral1
Sample
27e4f8794a314a7ac3f101da0e8ba14f8ee0b38948368b85aae62d05acc3a454.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
27e4f8794a314a7ac3f101da0e8ba14f8ee0b38948368b85aae62d05acc3a454.exe
Resource
win10v2004-20230220-en
General
-
Target
27e4f8794a314a7ac3f101da0e8ba14f8ee0b38948368b85aae62d05acc3a454.exe
-
Size
747KB
-
MD5
3cd5d2cf329bc1b94eb0732b5bc23620
-
SHA1
8cfe85ca320953e3121a1465b8e11dc9b6204ac1
-
SHA256
27e4f8794a314a7ac3f101da0e8ba14f8ee0b38948368b85aae62d05acc3a454
-
SHA512
6ee29e95e444db8f1b4c0eef28f6c1b038121687771b9ec128c5816d41a5d5762d505b8035691161388b4931d1eb367615b6f7d2487fecd88b01ad0683ea2559
-
SSDEEP
12288:Oy90ns2ZtHDoGxQ7l1QITsTsDL9fu17LuIkbeqsO6/eydKAMFV:OyXEt7KlfsTsNQ3uIK6/emKZFV
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/3600-989-0x0000000007980000-0x0000000007F98000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 55867618.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 55867618.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 55867618.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 55867618.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 55867618.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 55867618.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 3192 un193270.exe 4668 55867618.exe 3600 rk704847.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 55867618.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 55867618.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 27e4f8794a314a7ac3f101da0e8ba14f8ee0b38948368b85aae62d05acc3a454.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 27e4f8794a314a7ac3f101da0e8ba14f8ee0b38948368b85aae62d05acc3a454.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un193270.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un193270.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2332 4668 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4668 55867618.exe 4668 55867618.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4668 55867618.exe Token: SeDebugPrivilege 3600 rk704847.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4208 wrote to memory of 3192 4208 27e4f8794a314a7ac3f101da0e8ba14f8ee0b38948368b85aae62d05acc3a454.exe 85 PID 4208 wrote to memory of 3192 4208 27e4f8794a314a7ac3f101da0e8ba14f8ee0b38948368b85aae62d05acc3a454.exe 85 PID 4208 wrote to memory of 3192 4208 27e4f8794a314a7ac3f101da0e8ba14f8ee0b38948368b85aae62d05acc3a454.exe 85 PID 3192 wrote to memory of 4668 3192 un193270.exe 86 PID 3192 wrote to memory of 4668 3192 un193270.exe 86 PID 3192 wrote to memory of 4668 3192 un193270.exe 86 PID 3192 wrote to memory of 3600 3192 un193270.exe 90 PID 3192 wrote to memory of 3600 3192 un193270.exe 90 PID 3192 wrote to memory of 3600 3192 un193270.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\27e4f8794a314a7ac3f101da0e8ba14f8ee0b38948368b85aae62d05acc3a454.exe"C:\Users\Admin\AppData\Local\Temp\27e4f8794a314a7ac3f101da0e8ba14f8ee0b38948368b85aae62d05acc3a454.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un193270.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un193270.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\55867618.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\55867618.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4668 -s 10924⤵
- Program crash
PID:2332
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk704847.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk704847.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3600
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4668 -ip 46681⤵PID:4408
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
592KB
MD51dd95166b52168e09bcfb0e619d0e8eb
SHA1988c3dd0a087152131fa10566ee5237fb5fe2778
SHA2565c3c8469a0f412b6e4a46d090632f3d743280e31486e69820f6ac5a9ab3e43f2
SHA51221e8c0d90de7b8333b5c5040f991d280db86ab9e150a4d6bd8e074e26aaaed9df6bd5477aa36891d34fc90053b0ede09098e383beb7ed9290f4d8f224d174a93
-
Filesize
592KB
MD51dd95166b52168e09bcfb0e619d0e8eb
SHA1988c3dd0a087152131fa10566ee5237fb5fe2778
SHA2565c3c8469a0f412b6e4a46d090632f3d743280e31486e69820f6ac5a9ab3e43f2
SHA51221e8c0d90de7b8333b5c5040f991d280db86ab9e150a4d6bd8e074e26aaaed9df6bd5477aa36891d34fc90053b0ede09098e383beb7ed9290f4d8f224d174a93
-
Filesize
376KB
MD5a886bb4c21a7743eefc39b5f5722d772
SHA1aa48751135f1a8a50f09ba389969c783ff57e60c
SHA2562f5247045de446a6fb459669c65552fcf9a17e1610fc5b5107fd8cbe1e4670ed
SHA512dbe0f48a431859e29e52f80ce9126e269b1debbad675c8e59423fe090ac8e9fd151c23b384e345ac3e197d4e57249d50fc042268a6a4b45c8394d44eaa6bb554
-
Filesize
376KB
MD5a886bb4c21a7743eefc39b5f5722d772
SHA1aa48751135f1a8a50f09ba389969c783ff57e60c
SHA2562f5247045de446a6fb459669c65552fcf9a17e1610fc5b5107fd8cbe1e4670ed
SHA512dbe0f48a431859e29e52f80ce9126e269b1debbad675c8e59423fe090ac8e9fd151c23b384e345ac3e197d4e57249d50fc042268a6a4b45c8394d44eaa6bb554
-
Filesize
459KB
MD5362a0e40ba1a10e900dc0da89f03685e
SHA1c3fa8fcbd4e943dc9a4433afa1cc47679813df45
SHA25685137c02c9dbf2f4cf0a63afc81ebfce394c2e3bc59c60a926940d7163b29c7f
SHA5128585a383fbe706216b44f95fb356f7b146233ca8bcc0f51893e40d5156ac3a0a85cf3ccf7c775a2d300a5c9813a265ea3422560d97e92c8fd7d5d11f9a6f5d99
-
Filesize
459KB
MD5362a0e40ba1a10e900dc0da89f03685e
SHA1c3fa8fcbd4e943dc9a4433afa1cc47679813df45
SHA25685137c02c9dbf2f4cf0a63afc81ebfce394c2e3bc59c60a926940d7163b29c7f
SHA5128585a383fbe706216b44f95fb356f7b146233ca8bcc0f51893e40d5156ac3a0a85cf3ccf7c775a2d300a5c9813a265ea3422560d97e92c8fd7d5d11f9a6f5d99