Analysis

  • max time kernel
    55s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02-03-2023 13:30

General

  • Target

    bd213d6c99b79116ecf2bc28a836463d5f5642de6883e37dda2d51d3536507b4.exe

  • Size

    550KB

  • MD5

    30303e76320135ca94980ed3b25b8649

  • SHA1

    57358799da5bec7fca6da58c5b144b10da41d40b

  • SHA256

    bd213d6c99b79116ecf2bc28a836463d5f5642de6883e37dda2d51d3536507b4

  • SHA512

    8e5996d7133f8acd9e5d130be7561f6f23f375b55ddedccdef0fe54ca27dc1c7096c3c3b34377f28745a191bedc60ebe97f1383c118f1d58da960fc2ebc9a5c2

  • SSDEEP

    12288:aMriy90tyFIKCYEoohV8bZkkMUYorrFWCfow:oyAyFzJohV8bZkYFBJ

Malware Config

Extracted

Family

redline

Botnet

stek

C2

melevv.eu:4162

Attributes
  • auth_value

    4205381daf6946b2df5fe3bc7eacc918

Extracted

Family

redline

Botnet

fomich

C2

melevv.eu:4162

Attributes
  • auth_value

    b018e52ac946001794d8b8c23e901859

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd213d6c99b79116ecf2bc28a836463d5f5642de6883e37dda2d51d3536507b4.exe
    "C:\Users\Admin\AppData\Local\Temp\bd213d6c99b79116ecf2bc28a836463d5f5642de6883e37dda2d51d3536507b4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4108
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vrf7570nc.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vrf7570nc.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:384
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw55ac70oA55.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw55ac70oA55.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4504
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tdc92xM63.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tdc92xM63.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4596
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ujS18Hs86.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ujS18Hs86.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3984

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ujS18Hs86.exe

    Filesize

    175KB

    MD5

    ca19cb3837f4d92d86c9efa527f0d874

    SHA1

    e9cf1e02b4b17730a39f384f1fcb85d2f0ce6141

    SHA256

    35a3313ecfd863df221ccb69aba7d57ea0049377bf22ab581e77af08e90a830e

    SHA512

    a4f09601d2be02b2e13322f6f4451cc59128ee6ee0831b4fa343120a60df1fa534cbe2ea8b4a9eef5a583f86c6a60b388ea4b93709cf8fe54bda6484f9932c9b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ujS18Hs86.exe

    Filesize

    175KB

    MD5

    ca19cb3837f4d92d86c9efa527f0d874

    SHA1

    e9cf1e02b4b17730a39f384f1fcb85d2f0ce6141

    SHA256

    35a3313ecfd863df221ccb69aba7d57ea0049377bf22ab581e77af08e90a830e

    SHA512

    a4f09601d2be02b2e13322f6f4451cc59128ee6ee0831b4fa343120a60df1fa534cbe2ea8b4a9eef5a583f86c6a60b388ea4b93709cf8fe54bda6484f9932c9b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vrf7570nc.exe

    Filesize

    405KB

    MD5

    5f0b25212d0249f16bcddf9e8f233fa3

    SHA1

    f9eafe171f090981a7c7a7f27e7d2006f48030d3

    SHA256

    0d63e052c4961688814974424ff498c31d11854df48f1c3fe852e6fcd84c2416

    SHA512

    9a2a7ad7a517605be05cbca32a1336deb18d5fe0e43f8b5c0b9dc506c05b61cb6dac9293eedf85cd17ae0b290d31aaeeaff258fddb34243aafabf9b46272d0bb

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vrf7570nc.exe

    Filesize

    405KB

    MD5

    5f0b25212d0249f16bcddf9e8f233fa3

    SHA1

    f9eafe171f090981a7c7a7f27e7d2006f48030d3

    SHA256

    0d63e052c4961688814974424ff498c31d11854df48f1c3fe852e6fcd84c2416

    SHA512

    9a2a7ad7a517605be05cbca32a1336deb18d5fe0e43f8b5c0b9dc506c05b61cb6dac9293eedf85cd17ae0b290d31aaeeaff258fddb34243aafabf9b46272d0bb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw55ac70oA55.exe

    Filesize

    17KB

    MD5

    ff5c4c55540eb4ce089299117cf18012

    SHA1

    8f61636b387d113af068642b518bb532a4df250c

    SHA256

    6759f2991e0c7121ca87c144ad098f93986bfe3f13defb03b0b242d3255126b7

    SHA512

    94e66b424ad7544f99d7f4dc4a028d3fffd3b5b07074cc670b536ba863f6c502b8ba5a35f471a23c3151bed0f20057351fe0de8aac57a7dd1202ac55008cdc07

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw55ac70oA55.exe

    Filesize

    17KB

    MD5

    ff5c4c55540eb4ce089299117cf18012

    SHA1

    8f61636b387d113af068642b518bb532a4df250c

    SHA256

    6759f2991e0c7121ca87c144ad098f93986bfe3f13defb03b0b242d3255126b7

    SHA512

    94e66b424ad7544f99d7f4dc4a028d3fffd3b5b07074cc670b536ba863f6c502b8ba5a35f471a23c3151bed0f20057351fe0de8aac57a7dd1202ac55008cdc07

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tdc92xM63.exe

    Filesize

    387KB

    MD5

    114729e73998f8b36384a7c4cadcf3b0

    SHA1

    aca4ea52bbd204fa016311eb5e1f6ef9770f2362

    SHA256

    dbeeca1aaeaa247cb4a672c8741e578a235817831a080ce894a08d71a1bbb7fa

    SHA512

    4044a648270d77f84c822346d483fa32a39c24b3088a874a4d9e53584ed228e1a67c4c10654eb20209dc48339308d65c5c8bde33f26eb6e5d0741f354f24cc44

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tdc92xM63.exe

    Filesize

    387KB

    MD5

    114729e73998f8b36384a7c4cadcf3b0

    SHA1

    aca4ea52bbd204fa016311eb5e1f6ef9770f2362

    SHA256

    dbeeca1aaeaa247cb4a672c8741e578a235817831a080ce894a08d71a1bbb7fa

    SHA512

    4044a648270d77f84c822346d483fa32a39c24b3088a874a4d9e53584ed228e1a67c4c10654eb20209dc48339308d65c5c8bde33f26eb6e5d0741f354f24cc44

  • memory/3984-1072-0x0000000000F30000-0x0000000000F62000-memory.dmp

    Filesize

    200KB

  • memory/3984-1073-0x0000000005AC0000-0x0000000005AD0000-memory.dmp

    Filesize

    64KB

  • memory/3984-1074-0x0000000005970000-0x00000000059BB000-memory.dmp

    Filesize

    300KB

  • memory/4504-133-0x00000000001E0000-0x00000000001EA000-memory.dmp

    Filesize

    40KB

  • memory/4596-173-0x00000000049F0000-0x0000000004A2E000-memory.dmp

    Filesize

    248KB

  • memory/4596-187-0x00000000049F0000-0x0000000004A2E000-memory.dmp

    Filesize

    248KB

  • memory/4596-141-0x00000000049F0000-0x0000000004A34000-memory.dmp

    Filesize

    272KB

  • memory/4596-142-0x0000000002CA0000-0x0000000002CEB000-memory.dmp

    Filesize

    300KB

  • memory/4596-144-0x0000000002F90000-0x0000000002FA0000-memory.dmp

    Filesize

    64KB

  • memory/4596-145-0x0000000002F90000-0x0000000002FA0000-memory.dmp

    Filesize

    64KB

  • memory/4596-146-0x00000000049F0000-0x0000000004A2E000-memory.dmp

    Filesize

    248KB

  • memory/4596-147-0x00000000049F0000-0x0000000004A2E000-memory.dmp

    Filesize

    248KB

  • memory/4596-149-0x00000000049F0000-0x0000000004A2E000-memory.dmp

    Filesize

    248KB

  • memory/4596-151-0x00000000049F0000-0x0000000004A2E000-memory.dmp

    Filesize

    248KB

  • memory/4596-153-0x00000000049F0000-0x0000000004A2E000-memory.dmp

    Filesize

    248KB

  • memory/4596-155-0x00000000049F0000-0x0000000004A2E000-memory.dmp

    Filesize

    248KB

  • memory/4596-157-0x00000000049F0000-0x0000000004A2E000-memory.dmp

    Filesize

    248KB

  • memory/4596-159-0x00000000049F0000-0x0000000004A2E000-memory.dmp

    Filesize

    248KB

  • memory/4596-161-0x00000000049F0000-0x0000000004A2E000-memory.dmp

    Filesize

    248KB

  • memory/4596-163-0x00000000049F0000-0x0000000004A2E000-memory.dmp

    Filesize

    248KB

  • memory/4596-165-0x00000000049F0000-0x0000000004A2E000-memory.dmp

    Filesize

    248KB

  • memory/4596-167-0x00000000049F0000-0x0000000004A2E000-memory.dmp

    Filesize

    248KB

  • memory/4596-169-0x00000000049F0000-0x0000000004A2E000-memory.dmp

    Filesize

    248KB

  • memory/4596-171-0x00000000049F0000-0x0000000004A2E000-memory.dmp

    Filesize

    248KB

  • memory/4596-140-0x00000000073A0000-0x000000000789E000-memory.dmp

    Filesize

    5.0MB

  • memory/4596-177-0x00000000049F0000-0x0000000004A2E000-memory.dmp

    Filesize

    248KB

  • memory/4596-175-0x00000000049F0000-0x0000000004A2E000-memory.dmp

    Filesize

    248KB

  • memory/4596-179-0x00000000049F0000-0x0000000004A2E000-memory.dmp

    Filesize

    248KB

  • memory/4596-181-0x00000000049F0000-0x0000000004A2E000-memory.dmp

    Filesize

    248KB

  • memory/4596-183-0x00000000049F0000-0x0000000004A2E000-memory.dmp

    Filesize

    248KB

  • memory/4596-185-0x00000000049F0000-0x0000000004A2E000-memory.dmp

    Filesize

    248KB

  • memory/4596-143-0x0000000002F90000-0x0000000002FA0000-memory.dmp

    Filesize

    64KB

  • memory/4596-189-0x00000000049F0000-0x0000000004A2E000-memory.dmp

    Filesize

    248KB

  • memory/4596-191-0x00000000049F0000-0x0000000004A2E000-memory.dmp

    Filesize

    248KB

  • memory/4596-193-0x00000000049F0000-0x0000000004A2E000-memory.dmp

    Filesize

    248KB

  • memory/4596-195-0x00000000049F0000-0x0000000004A2E000-memory.dmp

    Filesize

    248KB

  • memory/4596-197-0x00000000049F0000-0x0000000004A2E000-memory.dmp

    Filesize

    248KB

  • memory/4596-199-0x00000000049F0000-0x0000000004A2E000-memory.dmp

    Filesize

    248KB

  • memory/4596-201-0x00000000049F0000-0x0000000004A2E000-memory.dmp

    Filesize

    248KB

  • memory/4596-203-0x00000000049F0000-0x0000000004A2E000-memory.dmp

    Filesize

    248KB

  • memory/4596-205-0x00000000049F0000-0x0000000004A2E000-memory.dmp

    Filesize

    248KB

  • memory/4596-207-0x00000000049F0000-0x0000000004A2E000-memory.dmp

    Filesize

    248KB

  • memory/4596-209-0x00000000049F0000-0x0000000004A2E000-memory.dmp

    Filesize

    248KB

  • memory/4596-1052-0x0000000007EB0000-0x00000000084B6000-memory.dmp

    Filesize

    6.0MB

  • memory/4596-1053-0x00000000078A0000-0x00000000079AA000-memory.dmp

    Filesize

    1.0MB

  • memory/4596-1054-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/4596-1055-0x0000000004C50000-0x0000000004C8E000-memory.dmp

    Filesize

    248KB

  • memory/4596-1056-0x0000000004EB0000-0x0000000004EFB000-memory.dmp

    Filesize

    300KB

  • memory/4596-1057-0x0000000002F90000-0x0000000002FA0000-memory.dmp

    Filesize

    64KB

  • memory/4596-1059-0x0000000007BB0000-0x0000000007C42000-memory.dmp

    Filesize

    584KB

  • memory/4596-1060-0x0000000007C50000-0x0000000007CB6000-memory.dmp

    Filesize

    408KB

  • memory/4596-1061-0x0000000002F90000-0x0000000002FA0000-memory.dmp

    Filesize

    64KB

  • memory/4596-1062-0x0000000008A60000-0x0000000008C22000-memory.dmp

    Filesize

    1.8MB

  • memory/4596-139-0x0000000004850000-0x0000000004896000-memory.dmp

    Filesize

    280KB

  • memory/4596-1063-0x0000000008C40000-0x000000000916C000-memory.dmp

    Filesize

    5.2MB

  • memory/4596-1064-0x00000000092B0000-0x0000000009326000-memory.dmp

    Filesize

    472KB

  • memory/4596-1065-0x0000000009330000-0x0000000009380000-memory.dmp

    Filesize

    320KB

  • memory/4596-1066-0x0000000002F90000-0x0000000002FA0000-memory.dmp

    Filesize

    64KB