Resubmissions
29-10-2024 14:06
241029-regnlawcqp 1029-10-2024 12:53
241029-p4zvcsvhqp 1007-05-2023 04:57
230507-fldpqshh67 10Analysis
-
max time kernel
146s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2023 04:57
Static task
static1
Behavioral task
behavioral1
Sample
9b7ba8dd0178eee5df00dcee5be7694514faead9a273fb3fd7bc6d532d750e66.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9b7ba8dd0178eee5df00dcee5be7694514faead9a273fb3fd7bc6d532d750e66.exe
Resource
win10v2004-20230220-en
General
-
Target
9b7ba8dd0178eee5df00dcee5be7694514faead9a273fb3fd7bc6d532d750e66.exe
-
Size
746KB
-
MD5
7c3dda2c9904ba420260b3489e2ef165
-
SHA1
c5ce5096c8d8175ff522ee68d1a68b8cea926c2d
-
SHA256
9b7ba8dd0178eee5df00dcee5be7694514faead9a273fb3fd7bc6d532d750e66
-
SHA512
2f10af6e5d497478f47813322d039012467c43d4bba12fe30b5a42a472379c9daa62529c73657d77886c5b8fcaab9cae959e5264124cec750091b0d9a237febd
-
SSDEEP
12288:Sy90N8arEZ38DLXqXNNsbiuQ4sbrXfUcXfSqXtXVtCX3b73xzR:Sy48arEJYLa9eenX8cXfVSb7/
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/1072-989-0x0000000007A10000-0x0000000008028000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 55874308.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 55874308.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 55874308.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 55874308.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 55874308.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 55874308.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 1240 un721028.exe 1836 55874308.exe 1072 rk367654.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 55874308.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 55874308.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un721028.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 9b7ba8dd0178eee5df00dcee5be7694514faead9a273fb3fd7bc6d532d750e66.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9b7ba8dd0178eee5df00dcee5be7694514faead9a273fb3fd7bc6d532d750e66.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un721028.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4972 1836 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1836 55874308.exe 1836 55874308.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1836 55874308.exe Token: SeDebugPrivilege 1072 rk367654.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1412 wrote to memory of 1240 1412 9b7ba8dd0178eee5df00dcee5be7694514faead9a273fb3fd7bc6d532d750e66.exe 84 PID 1412 wrote to memory of 1240 1412 9b7ba8dd0178eee5df00dcee5be7694514faead9a273fb3fd7bc6d532d750e66.exe 84 PID 1412 wrote to memory of 1240 1412 9b7ba8dd0178eee5df00dcee5be7694514faead9a273fb3fd7bc6d532d750e66.exe 84 PID 1240 wrote to memory of 1836 1240 un721028.exe 85 PID 1240 wrote to memory of 1836 1240 un721028.exe 85 PID 1240 wrote to memory of 1836 1240 un721028.exe 85 PID 1240 wrote to memory of 1072 1240 un721028.exe 89 PID 1240 wrote to memory of 1072 1240 un721028.exe 89 PID 1240 wrote to memory of 1072 1240 un721028.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b7ba8dd0178eee5df00dcee5be7694514faead9a273fb3fd7bc6d532d750e66.exe"C:\Users\Admin\AppData\Local\Temp\9b7ba8dd0178eee5df00dcee5be7694514faead9a273fb3fd7bc6d532d750e66.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un721028.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un721028.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\55874308.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\55874308.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1836 -s 10844⤵
- Program crash
PID:4972
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk367654.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk367654.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1072
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1836 -ip 18361⤵PID:412
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
591KB
MD5f39e96db71b850be0e8113dff1c58e96
SHA123a5a923212d5dba4e79a32d29a53e981ab15b21
SHA256512a02378458eb8745bf6bdbc1eee575b557651072d935c96746f01c3eb30f7f
SHA5122be9713d582dd079188c08ca9ec60c596e55f70ede81893d0a30add859687aae7e522fde85ea005c24eab6bc8587a31b57fd1b5a7fc8303a904406b8f15ea31f
-
Filesize
591KB
MD5f39e96db71b850be0e8113dff1c58e96
SHA123a5a923212d5dba4e79a32d29a53e981ab15b21
SHA256512a02378458eb8745bf6bdbc1eee575b557651072d935c96746f01c3eb30f7f
SHA5122be9713d582dd079188c08ca9ec60c596e55f70ede81893d0a30add859687aae7e522fde85ea005c24eab6bc8587a31b57fd1b5a7fc8303a904406b8f15ea31f
-
Filesize
376KB
MD5bfe8737b256d0abd4bd9b86dd51cf2d2
SHA191906151c3d615497a2685a1c2dfb8398a7524cb
SHA2563dea26076cd2848c5544006f5d3d06b5d7b369c0a594f50b3175c805587756f8
SHA512b581ab6ae61ceb4ad38b1888032fc53d4c972a97839096eb1b44a760377fc4eab12fb4b5fc2cb51d611355843e1f412631677e427c420b9e75cb2351e368cea9
-
Filesize
376KB
MD5bfe8737b256d0abd4bd9b86dd51cf2d2
SHA191906151c3d615497a2685a1c2dfb8398a7524cb
SHA2563dea26076cd2848c5544006f5d3d06b5d7b369c0a594f50b3175c805587756f8
SHA512b581ab6ae61ceb4ad38b1888032fc53d4c972a97839096eb1b44a760377fc4eab12fb4b5fc2cb51d611355843e1f412631677e427c420b9e75cb2351e368cea9
-
Filesize
459KB
MD5d041b732253fef6c275a1f5c490447ed
SHA115caa238a29b75ea279ef08684558f89145741cf
SHA256f938c49409d99ce839e8b5de672c5a972c8348f96935b4ca7f73414e1bd406f1
SHA512c044332361d1e8788882beddd5d4113c5147c87b39b80791bbe1328b14c6a5b9a5b211c049802798ae474f8082281556469f636ebc2ab078dd25eba36f68f440
-
Filesize
459KB
MD5d041b732253fef6c275a1f5c490447ed
SHA115caa238a29b75ea279ef08684558f89145741cf
SHA256f938c49409d99ce839e8b5de672c5a972c8348f96935b4ca7f73414e1bd406f1
SHA512c044332361d1e8788882beddd5d4113c5147c87b39b80791bbe1328b14c6a5b9a5b211c049802798ae474f8082281556469f636ebc2ab078dd25eba36f68f440