Analysis
-
max time kernel
150s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2023, 21:07
Static task
static1
Behavioral task
behavioral1
Sample
2b3cd8cd7d635a951a431e9103148680f75dd0a97e633e3071104d7ac85bcd46.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2b3cd8cd7d635a951a431e9103148680f75dd0a97e633e3071104d7ac85bcd46.exe
Resource
win10v2004-20230220-en
General
-
Target
2b3cd8cd7d635a951a431e9103148680f75dd0a97e633e3071104d7ac85bcd46.exe
-
Size
747KB
-
MD5
60c58d962b09b00dce5028f2c31be740
-
SHA1
806737d4cba25e7a56e660227ccdf691cc6f7762
-
SHA256
2b3cd8cd7d635a951a431e9103148680f75dd0a97e633e3071104d7ac85bcd46
-
SHA512
a0b18fcd898a1c15169fd3476be2549455aa0c4d6de4246e84be1e3871592bd7f4f2e0526d331c1d4d732369b38ac2ae797570551d595d2cdfe8b791deedd5aa
-
SSDEEP
12288:Oy901gJ/tuoC06phk1xRMZ6vmzSjyHxbUS65B5/HfRihWdedRm91DuOvXcCvgGT:Oy4Q/txClHk1IHzcyHdcvfR0HHmDtXcg
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4876-989-0x00000000079D0000-0x0000000007FE8000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 81108454.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 81108454.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 81108454.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 81108454.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 81108454.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 81108454.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1144 un873475.exe 4304 81108454.exe 4876 rk600204.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 81108454.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 81108454.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 2b3cd8cd7d635a951a431e9103148680f75dd0a97e633e3071104d7ac85bcd46.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2b3cd8cd7d635a951a431e9103148680f75dd0a97e633e3071104d7ac85bcd46.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un873475.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un873475.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3120 4304 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4304 81108454.exe 4304 81108454.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4304 81108454.exe Token: SeDebugPrivilege 4876 rk600204.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 840 wrote to memory of 1144 840 2b3cd8cd7d635a951a431e9103148680f75dd0a97e633e3071104d7ac85bcd46.exe 85 PID 840 wrote to memory of 1144 840 2b3cd8cd7d635a951a431e9103148680f75dd0a97e633e3071104d7ac85bcd46.exe 85 PID 840 wrote to memory of 1144 840 2b3cd8cd7d635a951a431e9103148680f75dd0a97e633e3071104d7ac85bcd46.exe 85 PID 1144 wrote to memory of 4304 1144 un873475.exe 86 PID 1144 wrote to memory of 4304 1144 un873475.exe 86 PID 1144 wrote to memory of 4304 1144 un873475.exe 86 PID 1144 wrote to memory of 4876 1144 un873475.exe 89 PID 1144 wrote to memory of 4876 1144 un873475.exe 89 PID 1144 wrote to memory of 4876 1144 un873475.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b3cd8cd7d635a951a431e9103148680f75dd0a97e633e3071104d7ac85bcd46.exe"C:\Users\Admin\AppData\Local\Temp\2b3cd8cd7d635a951a431e9103148680f75dd0a97e633e3071104d7ac85bcd46.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un873475.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un873475.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\81108454.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\81108454.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4304 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 10844⤵
- Program crash
PID:3120
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk600204.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk600204.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4304 -ip 43041⤵PID:2180
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5d0ef41b2789cdc96648febe145a22493
SHA1de5874296cbe6faef007c2595d1340404335e7bf
SHA25671471b48af43f0af63f41a66b056c3c98efd1ee3a91019d84dbca1a10c5927d6
SHA5125f9e3d01a87d5d075623bf08b210fa4d76b2e9d661549393ef3a80943592dbd4d34e2e6d78ed56be220208e1c6e574a275dc78c145ff52da8d0a135fa4585c40
-
Filesize
593KB
MD5d0ef41b2789cdc96648febe145a22493
SHA1de5874296cbe6faef007c2595d1340404335e7bf
SHA25671471b48af43f0af63f41a66b056c3c98efd1ee3a91019d84dbca1a10c5927d6
SHA5125f9e3d01a87d5d075623bf08b210fa4d76b2e9d661549393ef3a80943592dbd4d34e2e6d78ed56be220208e1c6e574a275dc78c145ff52da8d0a135fa4585c40
-
Filesize
378KB
MD567995580b5320b89096e59f37dda5a83
SHA104fe88a5c238dc1aca63ff596eba398a8664c838
SHA256e3671c5f94edaf17c8eaa227380481d5bcc5b9027d78a3a4d39dc040d31bac8b
SHA51283a973e32657782b2b5f2f1f530a852de57fd8e682b2d48037d1c435d1425fcc03d6384745371069816c679f5289f35bc717d5bfbc416ca2e055ebb1c657d110
-
Filesize
378KB
MD567995580b5320b89096e59f37dda5a83
SHA104fe88a5c238dc1aca63ff596eba398a8664c838
SHA256e3671c5f94edaf17c8eaa227380481d5bcc5b9027d78a3a4d39dc040d31bac8b
SHA51283a973e32657782b2b5f2f1f530a852de57fd8e682b2d48037d1c435d1425fcc03d6384745371069816c679f5289f35bc717d5bfbc416ca2e055ebb1c657d110
-
Filesize
460KB
MD5cf3f2ca9b47fb4b242c079983d6cbca6
SHA1c72902ffcabf7ae75bfc82a0020b5f1e5631adb3
SHA2562c946a7a92401ddd97b0427630bfd59f02e8a0b2ea97c79ca5f36e923193f7a8
SHA51248b344184af622c29e58a7b9507726cc15d020f871391058cdecf52915c167a9207c934c66477f8d66f9ef3ad505cb3437af5404e0655a5ee8964f571184d155
-
Filesize
460KB
MD5cf3f2ca9b47fb4b242c079983d6cbca6
SHA1c72902ffcabf7ae75bfc82a0020b5f1e5631adb3
SHA2562c946a7a92401ddd97b0427630bfd59f02e8a0b2ea97c79ca5f36e923193f7a8
SHA51248b344184af622c29e58a7b9507726cc15d020f871391058cdecf52915c167a9207c934c66477f8d66f9ef3ad505cb3437af5404e0655a5ee8964f571184d155