Analysis
-
max time kernel
149s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 21:02
Static task
static1
Behavioral task
behavioral1
Sample
2707f3bff6ab5ef89ca8b4df2d3cae768c42eb0c61228655569de035d9fb3266.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2707f3bff6ab5ef89ca8b4df2d3cae768c42eb0c61228655569de035d9fb3266.exe
Resource
win10v2004-20230220-en
General
-
Target
2707f3bff6ab5ef89ca8b4df2d3cae768c42eb0c61228655569de035d9fb3266.exe
-
Size
707KB
-
MD5
c2b033fff954e57061a06eb7ae38ead8
-
SHA1
6afa16395c0cc95e6f183cfa9faa92d135bce6e9
-
SHA256
2707f3bff6ab5ef89ca8b4df2d3cae768c42eb0c61228655569de035d9fb3266
-
SHA512
8d7831d24b06f2a2b0244eae3d5b10a9bba655f4d060820f2419140bd0031e364bc73562c43a4e8b6d4147f126afef2133c8cdcf3079e1cf8751cd631cf89fe9
-
SSDEEP
12288:Gy90RwcqSU4MuOIv9Ek+P48pUe3/XnQTdnfsmPXuGAeva+d:GymwcJU4MuOYEk+P48pUu/Xn8ff+KS+d
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/2260-989-0x0000000009CA0000-0x000000000A2B8000-memory.dmp redline_stealer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 78159387.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 78159387.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 78159387.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 78159387.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 78159387.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 78159387.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 5100 un909829.exe 3424 78159387.exe 2260 rk565461.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 78159387.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 78159387.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2707f3bff6ab5ef89ca8b4df2d3cae768c42eb0c61228655569de035d9fb3266.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2707f3bff6ab5ef89ca8b4df2d3cae768c42eb0c61228655569de035d9fb3266.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un909829.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un909829.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2548 3424 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3424 78159387.exe 3424 78159387.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3424 78159387.exe Token: SeDebugPrivilege 2260 rk565461.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3868 wrote to memory of 5100 3868 2707f3bff6ab5ef89ca8b4df2d3cae768c42eb0c61228655569de035d9fb3266.exe 86 PID 3868 wrote to memory of 5100 3868 2707f3bff6ab5ef89ca8b4df2d3cae768c42eb0c61228655569de035d9fb3266.exe 86 PID 3868 wrote to memory of 5100 3868 2707f3bff6ab5ef89ca8b4df2d3cae768c42eb0c61228655569de035d9fb3266.exe 86 PID 5100 wrote to memory of 3424 5100 un909829.exe 87 PID 5100 wrote to memory of 3424 5100 un909829.exe 87 PID 5100 wrote to memory of 3424 5100 un909829.exe 87 PID 5100 wrote to memory of 2260 5100 un909829.exe 92 PID 5100 wrote to memory of 2260 5100 un909829.exe 92 PID 5100 wrote to memory of 2260 5100 un909829.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2707f3bff6ab5ef89ca8b4df2d3cae768c42eb0c61228655569de035d9fb3266.exe"C:\Users\Admin\AppData\Local\Temp\2707f3bff6ab5ef89ca8b4df2d3cae768c42eb0c61228655569de035d9fb3266.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un909829.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un909829.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\78159387.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\78159387.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 10284⤵
- Program crash
PID:2548
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk565461.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk565461.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3424 -ip 34241⤵PID:2848
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
553KB
MD593f608355df5536207b41691c39cf0d8
SHA12efc395b8025fef12dc2c7966e01f4670e6b6201
SHA256fa59a28316f08648f77ac3bbb48c5be5230fd9a4cad2e209507546ed14b996f1
SHA51245b3305f8b7d8f1896a38af0ebefd1d1add0839744cc6c305a91898b412d54f888d1f2e48a41df17e7a650b06a0f9b83e41b92ec14c6056850e132d7667bcd2a
-
Filesize
553KB
MD593f608355df5536207b41691c39cf0d8
SHA12efc395b8025fef12dc2c7966e01f4670e6b6201
SHA256fa59a28316f08648f77ac3bbb48c5be5230fd9a4cad2e209507546ed14b996f1
SHA51245b3305f8b7d8f1896a38af0ebefd1d1add0839744cc6c305a91898b412d54f888d1f2e48a41df17e7a650b06a0f9b83e41b92ec14c6056850e132d7667bcd2a
-
Filesize
258KB
MD544254e9fb092e7da5dbb88568a0e36cd
SHA11269f8a6453095ed30d1fe75a93c66c585ed2b36
SHA256d7ff5bf6fe82db98bbafe378e8989ffa7c05dae5e015e75fcc2d26b9f4613c5b
SHA512356ed9e7def52a7f4e82f258b0bf4b9dfa37e87138796c504500fdc8d92da6d4843d580d34608363f03406d5afa33d6d1a6059797a490402622454ac839ed93a
-
Filesize
258KB
MD544254e9fb092e7da5dbb88568a0e36cd
SHA11269f8a6453095ed30d1fe75a93c66c585ed2b36
SHA256d7ff5bf6fe82db98bbafe378e8989ffa7c05dae5e015e75fcc2d26b9f4613c5b
SHA512356ed9e7def52a7f4e82f258b0bf4b9dfa37e87138796c504500fdc8d92da6d4843d580d34608363f03406d5afa33d6d1a6059797a490402622454ac839ed93a
-
Filesize
353KB
MD5c219d1e502ab0d9c27e15c77e4344311
SHA144dce4de25104f6f42fe7c62b7ccd3589a4300b5
SHA25636fb341150dce0b8a4d06f4e3ac5b6c2b2757788df8688156e0945f13fcec086
SHA51250b486f23bb984f32bb75001b1b73cd67d2a275beb1bad64fb5888beadd1c38739e1fe53fc342a497cc02dea7f1beeef127d79663fe09316c949dbef143c4b32
-
Filesize
353KB
MD5c219d1e502ab0d9c27e15c77e4344311
SHA144dce4de25104f6f42fe7c62b7ccd3589a4300b5
SHA25636fb341150dce0b8a4d06f4e3ac5b6c2b2757788df8688156e0945f13fcec086
SHA51250b486f23bb984f32bb75001b1b73cd67d2a275beb1bad64fb5888beadd1c38739e1fe53fc342a497cc02dea7f1beeef127d79663fe09316c949dbef143c4b32