Analysis

  • max time kernel
    51s
  • max time network
    53s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02/03/2023, 13:01

General

  • Target

    dc7aa7cc3a4ac710d5a2955c78ee831867e520044fcab6d353631745acbe49d7.exe

  • Size

    685KB

  • MD5

    ec1878ab95fa853e8492d3ce88ca8390

  • SHA1

    f8fd8309baae950868cb85134bfaf729cf3fcdc8

  • SHA256

    dc7aa7cc3a4ac710d5a2955c78ee831867e520044fcab6d353631745acbe49d7

  • SHA512

    9c3b926d7639029f0e11e38862b3db93d6b48bce6f7f5ea0d7ef0da149c38576c5e61f5764969a991f75a9ea2db2fb04fc8103c5fe645abd7c7c6c43124a4ab0

  • SSDEEP

    12288:YMrpy90TsHs0iKOk+adDz9l5U5Lx4DEIVB7nSjxNi8:hyNr5dlak3VB7nSjPi8

Malware Config

Extracted

Family

redline

Botnet

stek

C2

melevv.eu:4162

Attributes
  • auth_value

    4205381daf6946b2df5fe3bc7eacc918

Extracted

Family

redline

Botnet

fomich

C2

melevv.eu:4162

Attributes
  • auth_value

    b018e52ac946001794d8b8c23e901859

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dc7aa7cc3a4ac710d5a2955c78ee831867e520044fcab6d353631745acbe49d7.exe
    "C:\Users\Admin\AppData\Local\Temp\dc7aa7cc3a4ac710d5a2955c78ee831867e520044fcab6d353631745acbe49d7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3632
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vgr5451dV.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vgr5451dV.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4228
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw29Py41WF46.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw29Py41WF46.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3652
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tVj60fA00.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tVj60fA00.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4736
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uDC78pr68.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uDC78pr68.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1176

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uDC78pr68.exe

    Filesize

    175KB

    MD5

    72b86ac862798c930a94e69c4dbeabe2

    SHA1

    e44051080056c89d0cb67170c5cc296c95b71660

    SHA256

    1a1802a3519f48f878618343728cda034cc04673357c411cc8073e7b386a3d8a

    SHA512

    f155d1d71650689b5c9d3370f8134fbb645fd4ce0186dab347055014e174512e0f9321ceddacfa881d5317f8612178a7eecb310c612832757f80d86534906ea8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uDC78pr68.exe

    Filesize

    175KB

    MD5

    72b86ac862798c930a94e69c4dbeabe2

    SHA1

    e44051080056c89d0cb67170c5cc296c95b71660

    SHA256

    1a1802a3519f48f878618343728cda034cc04673357c411cc8073e7b386a3d8a

    SHA512

    f155d1d71650689b5c9d3370f8134fbb645fd4ce0186dab347055014e174512e0f9321ceddacfa881d5317f8612178a7eecb310c612832757f80d86534906ea8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vgr5451dV.exe

    Filesize

    541KB

    MD5

    7aa1b433364613d478fc26cf3925b1e9

    SHA1

    edcc0b3433e8ac8f441b3ab98a08d2ade4842a6e

    SHA256

    c23f9bfd9affb51e9cb8cad86aa7dc624346b6c9890c7a19ebe06231e47aea79

    SHA512

    3b2297c550f173ceb9393d2d9524ca1960c48b403f27e8d6e664d0ef7c8a1f1c681d237c5d4cb824f82d7db2f97a992688b6b28ca02eedd5332b6ead406bee4a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vgr5451dV.exe

    Filesize

    541KB

    MD5

    7aa1b433364613d478fc26cf3925b1e9

    SHA1

    edcc0b3433e8ac8f441b3ab98a08d2ade4842a6e

    SHA256

    c23f9bfd9affb51e9cb8cad86aa7dc624346b6c9890c7a19ebe06231e47aea79

    SHA512

    3b2297c550f173ceb9393d2d9524ca1960c48b403f27e8d6e664d0ef7c8a1f1c681d237c5d4cb824f82d7db2f97a992688b6b28ca02eedd5332b6ead406bee4a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw29Py41WF46.exe

    Filesize

    322KB

    MD5

    95d870b20fd753bfc45f87e159f3ec33

    SHA1

    c416f81fd8185abdff6c8161e5c7ebafac082a14

    SHA256

    21999b0890343195296b6f9092c12370103d4601ab3d6e4a0c3c16e02874c294

    SHA512

    621a06f070c8665feb000d09fbd5a69dc1bd77cf5e85ca0b4c6b52207421d78659e8e773e425dbeded24112c49f6a5896e79771d497904debfcb11a8e92e63c3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw29Py41WF46.exe

    Filesize

    322KB

    MD5

    95d870b20fd753bfc45f87e159f3ec33

    SHA1

    c416f81fd8185abdff6c8161e5c7ebafac082a14

    SHA256

    21999b0890343195296b6f9092c12370103d4601ab3d6e4a0c3c16e02874c294

    SHA512

    621a06f070c8665feb000d09fbd5a69dc1bd77cf5e85ca0b4c6b52207421d78659e8e773e425dbeded24112c49f6a5896e79771d497904debfcb11a8e92e63c3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tVj60fA00.exe

    Filesize

    380KB

    MD5

    b1259a88ce10925af0c6d1c40a31829e

    SHA1

    8169392a9eb86360263d5a8b241fe47fa7719c9d

    SHA256

    6b9cf72989af9b41d085fecd764f3e4ce04fcf9a68e4703168b26ae5bf0ec833

    SHA512

    af0e1c6df58239b5e0e52b5cc648b3102eee78eaee71dc0a3ae27c54a2d9d5ae23bfac446144a2a28a6c676411f4efa2cf3f4f82e83cfc2775a129e7e795e00f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tVj60fA00.exe

    Filesize

    380KB

    MD5

    b1259a88ce10925af0c6d1c40a31829e

    SHA1

    8169392a9eb86360263d5a8b241fe47fa7719c9d

    SHA256

    6b9cf72989af9b41d085fecd764f3e4ce04fcf9a68e4703168b26ae5bf0ec833

    SHA512

    af0e1c6df58239b5e0e52b5cc648b3102eee78eaee71dc0a3ae27c54a2d9d5ae23bfac446144a2a28a6c676411f4efa2cf3f4f82e83cfc2775a129e7e795e00f

  • memory/1176-1117-0x00000000004E0000-0x0000000000512000-memory.dmp

    Filesize

    200KB

  • memory/1176-1118-0x0000000004F20000-0x0000000004F6B000-memory.dmp

    Filesize

    300KB

  • memory/1176-1119-0x0000000005020000-0x0000000005030000-memory.dmp

    Filesize

    64KB

  • memory/3652-146-0x0000000004960000-0x0000000004972000-memory.dmp

    Filesize

    72KB

  • memory/3652-158-0x0000000004960000-0x0000000004972000-memory.dmp

    Filesize

    72KB

  • memory/3652-140-0x0000000004B10000-0x0000000004B20000-memory.dmp

    Filesize

    64KB

  • memory/3652-141-0x00000000073E0000-0x00000000078DE000-memory.dmp

    Filesize

    5.0MB

  • memory/3652-142-0x0000000004960000-0x0000000004978000-memory.dmp

    Filesize

    96KB

  • memory/3652-143-0x0000000004960000-0x0000000004972000-memory.dmp

    Filesize

    72KB

  • memory/3652-144-0x0000000004960000-0x0000000004972000-memory.dmp

    Filesize

    72KB

  • memory/3652-138-0x0000000004B10000-0x0000000004B20000-memory.dmp

    Filesize

    64KB

  • memory/3652-148-0x0000000004960000-0x0000000004972000-memory.dmp

    Filesize

    72KB

  • memory/3652-150-0x0000000004960000-0x0000000004972000-memory.dmp

    Filesize

    72KB

  • memory/3652-152-0x0000000004960000-0x0000000004972000-memory.dmp

    Filesize

    72KB

  • memory/3652-154-0x0000000004960000-0x0000000004972000-memory.dmp

    Filesize

    72KB

  • memory/3652-156-0x0000000004960000-0x0000000004972000-memory.dmp

    Filesize

    72KB

  • memory/3652-139-0x0000000004B10000-0x0000000004B20000-memory.dmp

    Filesize

    64KB

  • memory/3652-160-0x0000000004960000-0x0000000004972000-memory.dmp

    Filesize

    72KB

  • memory/3652-162-0x0000000004960000-0x0000000004972000-memory.dmp

    Filesize

    72KB

  • memory/3652-164-0x0000000004960000-0x0000000004972000-memory.dmp

    Filesize

    72KB

  • memory/3652-166-0x0000000004960000-0x0000000004972000-memory.dmp

    Filesize

    72KB

  • memory/3652-168-0x0000000004960000-0x0000000004972000-memory.dmp

    Filesize

    72KB

  • memory/3652-170-0x0000000004960000-0x0000000004972000-memory.dmp

    Filesize

    72KB

  • memory/3652-171-0x0000000000400000-0x0000000002BBE000-memory.dmp

    Filesize

    39.7MB

  • memory/3652-172-0x0000000004B10000-0x0000000004B20000-memory.dmp

    Filesize

    64KB

  • memory/3652-174-0x0000000000400000-0x0000000002BBE000-memory.dmp

    Filesize

    39.7MB

  • memory/3652-137-0x0000000004700000-0x000000000471A000-memory.dmp

    Filesize

    104KB

  • memory/3652-136-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4736-183-0x00000000076C0000-0x00000000076FE000-memory.dmp

    Filesize

    248KB

  • memory/4736-214-0x00000000076C0000-0x00000000076FE000-memory.dmp

    Filesize

    248KB

  • memory/4736-181-0x00000000076C0000-0x0000000007704000-memory.dmp

    Filesize

    272KB

  • memory/4736-185-0x00000000076C0000-0x00000000076FE000-memory.dmp

    Filesize

    248KB

  • memory/4736-187-0x00000000076C0000-0x00000000076FE000-memory.dmp

    Filesize

    248KB

  • memory/4736-189-0x00000000076C0000-0x00000000076FE000-memory.dmp

    Filesize

    248KB

  • memory/4736-191-0x00000000076C0000-0x00000000076FE000-memory.dmp

    Filesize

    248KB

  • memory/4736-193-0x00000000076C0000-0x00000000076FE000-memory.dmp

    Filesize

    248KB

  • memory/4736-196-0x00000000076C0000-0x00000000076FE000-memory.dmp

    Filesize

    248KB

  • memory/4736-197-0x00000000071B0000-0x00000000071C0000-memory.dmp

    Filesize

    64KB

  • memory/4736-195-0x00000000071B0000-0x00000000071C0000-memory.dmp

    Filesize

    64KB

  • memory/4736-200-0x00000000076C0000-0x00000000076FE000-memory.dmp

    Filesize

    248KB

  • memory/4736-199-0x00000000071B0000-0x00000000071C0000-memory.dmp

    Filesize

    64KB

  • memory/4736-202-0x00000000076C0000-0x00000000076FE000-memory.dmp

    Filesize

    248KB

  • memory/4736-204-0x00000000076C0000-0x00000000076FE000-memory.dmp

    Filesize

    248KB

  • memory/4736-206-0x00000000076C0000-0x00000000076FE000-memory.dmp

    Filesize

    248KB

  • memory/4736-208-0x00000000076C0000-0x00000000076FE000-memory.dmp

    Filesize

    248KB

  • memory/4736-210-0x00000000076C0000-0x00000000076FE000-memory.dmp

    Filesize

    248KB

  • memory/4736-212-0x00000000076C0000-0x00000000076FE000-memory.dmp

    Filesize

    248KB

  • memory/4736-182-0x00000000076C0000-0x00000000076FE000-memory.dmp

    Filesize

    248KB

  • memory/4736-216-0x00000000076C0000-0x00000000076FE000-memory.dmp

    Filesize

    248KB

  • memory/4736-218-0x00000000076C0000-0x00000000076FE000-memory.dmp

    Filesize

    248KB

  • memory/4736-1091-0x0000000007700000-0x0000000007D06000-memory.dmp

    Filesize

    6.0MB

  • memory/4736-1092-0x0000000007D70000-0x0000000007E7A000-memory.dmp

    Filesize

    1.0MB

  • memory/4736-1093-0x0000000007EB0000-0x0000000007EC2000-memory.dmp

    Filesize

    72KB

  • memory/4736-1094-0x00000000071B0000-0x00000000071C0000-memory.dmp

    Filesize

    64KB

  • memory/4736-1095-0x0000000007ED0000-0x0000000007F0E000-memory.dmp

    Filesize

    248KB

  • memory/4736-1096-0x0000000008020000-0x000000000806B000-memory.dmp

    Filesize

    300KB

  • memory/4736-1098-0x00000000071B0000-0x00000000071C0000-memory.dmp

    Filesize

    64KB

  • memory/4736-1099-0x00000000071B0000-0x00000000071C0000-memory.dmp

    Filesize

    64KB

  • memory/4736-1100-0x00000000071B0000-0x00000000071C0000-memory.dmp

    Filesize

    64KB

  • memory/4736-1101-0x00000000081C0000-0x0000000008226000-memory.dmp

    Filesize

    408KB

  • memory/4736-1102-0x0000000008890000-0x0000000008922000-memory.dmp

    Filesize

    584KB

  • memory/4736-1103-0x00000000071B0000-0x00000000071C0000-memory.dmp

    Filesize

    64KB

  • memory/4736-1104-0x0000000008B70000-0x0000000008BE6000-memory.dmp

    Filesize

    472KB

  • memory/4736-179-0x0000000002CE0000-0x0000000002D2B000-memory.dmp

    Filesize

    300KB

  • memory/4736-180-0x0000000004860000-0x00000000048A6000-memory.dmp

    Filesize

    280KB

  • memory/4736-1105-0x0000000008C00000-0x0000000008C50000-memory.dmp

    Filesize

    320KB

  • memory/4736-1106-0x0000000008DD0000-0x0000000008F92000-memory.dmp

    Filesize

    1.8MB

  • memory/4736-1107-0x0000000008FA0000-0x00000000094CC000-memory.dmp

    Filesize

    5.2MB