Analysis
-
max time kernel
152s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2023 07:46
Static task
static1
Behavioral task
behavioral1
Sample
e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe
Resource
win10v2004-20230220-en
General
-
Target
e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe
-
Size
706KB
-
MD5
a57eaa069601c17aff489167c2a819e5
-
SHA1
d9087bc4e79264a8a47324c0a373f3a101c083ee
-
SHA256
e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a
-
SHA512
8cd870ca8dd9a5b1fca449d7e960efefd6428f8f71cb7112224a0b2701d2660d97661c208a4438a4423770fb897f8d786797ed42f6691fc72e199d7a47a51657
-
SSDEEP
12288:jy90TiPXDCcW9nLRnB3tcCHzU8j8y+Sr2dg2EoyzPqOzUpNdXtlWRKjp8S:jyQgE9nNB3Nw8WSr2ZTyhzcdXtAcjp8S
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/4600-987-0x0000000009CB0000-0x000000000A2C8000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr352157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr352157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr352157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr352157.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr352157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr352157.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4968 un460721.exe 1088 pr352157.exe 4600 qu619011.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr352157.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr352157.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un460721.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un460721.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 228 1088 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1088 pr352157.exe 1088 pr352157.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1088 pr352157.exe Token: SeDebugPrivilege 4600 qu619011.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3596 wrote to memory of 4968 3596 e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe 83 PID 3596 wrote to memory of 4968 3596 e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe 83 PID 3596 wrote to memory of 4968 3596 e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe 83 PID 4968 wrote to memory of 1088 4968 un460721.exe 84 PID 4968 wrote to memory of 1088 4968 un460721.exe 84 PID 4968 wrote to memory of 1088 4968 un460721.exe 84 PID 4968 wrote to memory of 4600 4968 un460721.exe 87 PID 4968 wrote to memory of 4600 4968 un460721.exe 87 PID 4968 wrote to memory of 4600 4968 un460721.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe"C:\Users\Admin\AppData\Local\Temp\e1c3391775dc831ab8c0372a21e935272adb2834b88855bd49a945680340907a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un460721.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un460721.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr352157.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr352157.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1088 -s 10964⤵
- Program crash
PID:228
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu619011.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu619011.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4600
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1088 -ip 10881⤵PID:2300
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
551KB
MD5a4c8943c5d021f12d17f93c6328328c4
SHA168ea049990962d746b6a536ed674e1566c44ead3
SHA256baf59f967c98b99115168a74d1516e332573078399aff17ae49c1df8974db623
SHA512269c3aa7c3588303d1157a98de77a67fad3fac50f80241778977f965c0ba1cec961f69368ecb7f77a1f3c621e04e5d70bbec4477d3c9f1f1c31d3264882d8657
-
Filesize
551KB
MD5a4c8943c5d021f12d17f93c6328328c4
SHA168ea049990962d746b6a536ed674e1566c44ead3
SHA256baf59f967c98b99115168a74d1516e332573078399aff17ae49c1df8974db623
SHA512269c3aa7c3588303d1157a98de77a67fad3fac50f80241778977f965c0ba1cec961f69368ecb7f77a1f3c621e04e5d70bbec4477d3c9f1f1c31d3264882d8657
-
Filesize
286KB
MD5a3c21d10a14315f68dc2329de4977403
SHA14a3fc4564ecbec45ff388773a5ddad89280b26b7
SHA256382f2509df79a2fa34653bd0f9763971b0b4bc2bcb5142b9b1034b03a95fbed9
SHA5122ad2b31d462d0faf34027a896dbd9ceaef2febb133b4df932dd9db1007c177c9fa5cc8506b7f6c6bb9a88b410201661c8479adc8be85eff93ee1ba724922efbd
-
Filesize
286KB
MD5a3c21d10a14315f68dc2329de4977403
SHA14a3fc4564ecbec45ff388773a5ddad89280b26b7
SHA256382f2509df79a2fa34653bd0f9763971b0b4bc2bcb5142b9b1034b03a95fbed9
SHA5122ad2b31d462d0faf34027a896dbd9ceaef2febb133b4df932dd9db1007c177c9fa5cc8506b7f6c6bb9a88b410201661c8479adc8be85eff93ee1ba724922efbd
-
Filesize
369KB
MD54b4514014cf7f85a6bc70736dac74ab5
SHA1f1804216e8fbb186c377195b6afe78c1cb7266f1
SHA256a2e1a1f6f4635554a4d5dc9741f612d25284338d5ef80e43d609f722881886ad
SHA5123154e109f747fd30bb745a4236c1dc384e9a51a3ed90a2837cf39abed3cff9c3e6010e840a3834fe6dd6438c713e60e670028e82b8ec55e2576624463da377c0
-
Filesize
369KB
MD54b4514014cf7f85a6bc70736dac74ab5
SHA1f1804216e8fbb186c377195b6afe78c1cb7266f1
SHA256a2e1a1f6f4635554a4d5dc9741f612d25284338d5ef80e43d609f722881886ad
SHA5123154e109f747fd30bb745a4236c1dc384e9a51a3ed90a2837cf39abed3cff9c3e6010e840a3834fe6dd6438c713e60e670028e82b8ec55e2576624463da377c0