Analysis

  • max time kernel
    145s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-03-2023 17:42

General

  • Target

    c96602cd266993e42a3a65537ca6529b33a51e6b0dcb5aea75f756cba31d1566.exe

  • Size

    684KB

  • MD5

    03c6b140f41c0bab065f254dbd7ac6ea

  • SHA1

    db7c0a1e5dfd924abc24f42b189ed2ac067fcdf9

  • SHA256

    c96602cd266993e42a3a65537ca6529b33a51e6b0dcb5aea75f756cba31d1566

  • SHA512

    93b03f49f9841be660234b78ff2e91ae4024c0622df2c766aa120971d8f688256a87baaa847ca0a0e1acfb537654be3919a51f845deedb3f537fe4ead0e36d3b

  • SSDEEP

    12288:YMr4y907Qod/T7cJ9oBIRK2TVfUsVrFykWvymWJkCgWqF/Xe:gysQYTMK27ZJkr5O

Malware Config

Extracted

Family

redline

Botnet

stek

C2

melevv.eu:4162

Attributes
  • auth_value

    4205381daf6946b2df5fe3bc7eacc918

Extracted

Family

redline

Botnet

fomich

C2

melevv.eu:4162

Attributes
  • auth_value

    b018e52ac946001794d8b8c23e901859

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c96602cd266993e42a3a65537ca6529b33a51e6b0dcb5aea75f756cba31d1566.exe
    "C:\Users\Admin\AppData\Local\Temp\c96602cd266993e42a3a65537ca6529b33a51e6b0dcb5aea75f756cba31d1566.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycGw19Qs38.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycGw19Qs38.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2840
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urFW04GQ13.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urFW04GQ13.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4648
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4648 -s 1008
          4⤵
          • Program crash
          PID:2800
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wriB60fy69.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wriB60fy69.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5008
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 2100
          4⤵
          • Program crash
          PID:1944
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xutP82Sx39.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xutP82Sx39.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3624
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4648 -ip 4648
    1⤵
      PID:1228
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 5008 -ip 5008
      1⤵
        PID:1056

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xutP82Sx39.exe

        Filesize

        175KB

        MD5

        8b1bc075a69a9adb33d053da69e9a48c

        SHA1

        d87015fdadef59dc91e386693e263cd5fc6fed3b

        SHA256

        989b2073934c76146a0cdcdf5e8af76623e9e6d571530dd45601decac1eed038

        SHA512

        1fe694440d4ff05d2fbf2c978cc36256e523d36534c1f37afc19278e94d2e1c390a425169c0aac87f348a9d684e424de72b448215c1da4ef9deb23cc7eb214c7

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xutP82Sx39.exe

        Filesize

        175KB

        MD5

        8b1bc075a69a9adb33d053da69e9a48c

        SHA1

        d87015fdadef59dc91e386693e263cd5fc6fed3b

        SHA256

        989b2073934c76146a0cdcdf5e8af76623e9e6d571530dd45601decac1eed038

        SHA512

        1fe694440d4ff05d2fbf2c978cc36256e523d36534c1f37afc19278e94d2e1c390a425169c0aac87f348a9d684e424de72b448215c1da4ef9deb23cc7eb214c7

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycGw19Qs38.exe

        Filesize

        540KB

        MD5

        f14c810e685ae5f9623133fc0f21c2dc

        SHA1

        00b1f11c640e2c9ff1145ac77198b3e919bb6943

        SHA256

        af67f9ce95337d197113dcea1dd9bda7b9f0531d36c1b7205e43db3d449d1a75

        SHA512

        18a2584193df834829bc8117bcab2cb5ac29dc2087c69846091223dd4b3ae3e61757157f7c9c9c29e113f1feef1d3eea5165ab14d3fd767fb2fbece37161b0fb

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycGw19Qs38.exe

        Filesize

        540KB

        MD5

        f14c810e685ae5f9623133fc0f21c2dc

        SHA1

        00b1f11c640e2c9ff1145ac77198b3e919bb6943

        SHA256

        af67f9ce95337d197113dcea1dd9bda7b9f0531d36c1b7205e43db3d449d1a75

        SHA512

        18a2584193df834829bc8117bcab2cb5ac29dc2087c69846091223dd4b3ae3e61757157f7c9c9c29e113f1feef1d3eea5165ab14d3fd767fb2fbece37161b0fb

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urFW04GQ13.exe

        Filesize

        319KB

        MD5

        d66666c84435499c7ff17a7899997658

        SHA1

        b4714a70e2c3054eab6687df28d086708fce4489

        SHA256

        92c01f94cb7694542fca697168dd658c8dce53633421e047924ba239dae68023

        SHA512

        bae8889189fcd9e0800f1fbb188adeb8ac54e136386c80800792b66e69db04aaf0ea527ad6282725b3b985a20d03d94a70b6bea16fc90b2270f66c84b4f6d07c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urFW04GQ13.exe

        Filesize

        319KB

        MD5

        d66666c84435499c7ff17a7899997658

        SHA1

        b4714a70e2c3054eab6687df28d086708fce4489

        SHA256

        92c01f94cb7694542fca697168dd658c8dce53633421e047924ba239dae68023

        SHA512

        bae8889189fcd9e0800f1fbb188adeb8ac54e136386c80800792b66e69db04aaf0ea527ad6282725b3b985a20d03d94a70b6bea16fc90b2270f66c84b4f6d07c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wriB60fy69.exe

        Filesize

        377KB

        MD5

        a9bb941524fc5973d45dad1da3e23d17

        SHA1

        357a2a768bbec255880067c4a774ca2d4bee0588

        SHA256

        e2e687091711d776f73e3877ee7020f8ed6472855af0db8ee6f5ea796fc34659

        SHA512

        4beab17e28078481420dfdf5425a6829695cdfdf50c1231c509654bdcaf21d6de21f12ee44b4cbe9c3b555bed3a91542b2dc37b25b2d093e03af9941723d9256

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wriB60fy69.exe

        Filesize

        377KB

        MD5

        a9bb941524fc5973d45dad1da3e23d17

        SHA1

        357a2a768bbec255880067c4a774ca2d4bee0588

        SHA256

        e2e687091711d776f73e3877ee7020f8ed6472855af0db8ee6f5ea796fc34659

        SHA512

        4beab17e28078481420dfdf5425a6829695cdfdf50c1231c509654bdcaf21d6de21f12ee44b4cbe9c3b555bed3a91542b2dc37b25b2d093e03af9941723d9256

      • memory/3624-1120-0x0000000000610000-0x0000000000642000-memory.dmp

        Filesize

        200KB

      • memory/3624-1121-0x0000000005220000-0x0000000005230000-memory.dmp

        Filesize

        64KB

      • memory/3624-1122-0x0000000005220000-0x0000000005230000-memory.dmp

        Filesize

        64KB

      • memory/4648-156-0x0000000007120000-0x0000000007132000-memory.dmp

        Filesize

        72KB

      • memory/4648-168-0x0000000007120000-0x0000000007132000-memory.dmp

        Filesize

        72KB

      • memory/4648-152-0x00000000071B0000-0x0000000007754000-memory.dmp

        Filesize

        5.6MB

      • memory/4648-153-0x0000000007120000-0x0000000007132000-memory.dmp

        Filesize

        72KB

      • memory/4648-154-0x0000000007120000-0x0000000007132000-memory.dmp

        Filesize

        72KB

      • memory/4648-150-0x00000000071A0000-0x00000000071B0000-memory.dmp

        Filesize

        64KB

      • memory/4648-158-0x0000000007120000-0x0000000007132000-memory.dmp

        Filesize

        72KB

      • memory/4648-160-0x0000000007120000-0x0000000007132000-memory.dmp

        Filesize

        72KB

      • memory/4648-164-0x0000000007120000-0x0000000007132000-memory.dmp

        Filesize

        72KB

      • memory/4648-162-0x0000000007120000-0x0000000007132000-memory.dmp

        Filesize

        72KB

      • memory/4648-166-0x0000000007120000-0x0000000007132000-memory.dmp

        Filesize

        72KB

      • memory/4648-151-0x00000000071A0000-0x00000000071B0000-memory.dmp

        Filesize

        64KB

      • memory/4648-170-0x0000000007120000-0x0000000007132000-memory.dmp

        Filesize

        72KB

      • memory/4648-172-0x0000000007120000-0x0000000007132000-memory.dmp

        Filesize

        72KB

      • memory/4648-174-0x0000000007120000-0x0000000007132000-memory.dmp

        Filesize

        72KB

      • memory/4648-176-0x0000000007120000-0x0000000007132000-memory.dmp

        Filesize

        72KB

      • memory/4648-178-0x0000000007120000-0x0000000007132000-memory.dmp

        Filesize

        72KB

      • memory/4648-180-0x0000000007120000-0x0000000007132000-memory.dmp

        Filesize

        72KB

      • memory/4648-181-0x0000000000400000-0x0000000002BBD000-memory.dmp

        Filesize

        39.7MB

      • memory/4648-182-0x00000000071A0000-0x00000000071B0000-memory.dmp

        Filesize

        64KB

      • memory/4648-184-0x0000000000400000-0x0000000002BBD000-memory.dmp

        Filesize

        39.7MB

      • memory/4648-149-0x00000000071A0000-0x00000000071B0000-memory.dmp

        Filesize

        64KB

      • memory/4648-148-0x0000000002C90000-0x0000000002CBD000-memory.dmp

        Filesize

        180KB

      • memory/5008-193-0x0000000007200000-0x0000000007210000-memory.dmp

        Filesize

        64KB

      • memory/5008-226-0x00000000071B0000-0x00000000071EE000-memory.dmp

        Filesize

        248KB

      • memory/5008-190-0x00000000071B0000-0x00000000071EE000-memory.dmp

        Filesize

        248KB

      • memory/5008-189-0x0000000002BD0000-0x0000000002C1B000-memory.dmp

        Filesize

        300KB

      • memory/5008-196-0x00000000071B0000-0x00000000071EE000-memory.dmp

        Filesize

        248KB

      • memory/5008-200-0x00000000071B0000-0x00000000071EE000-memory.dmp

        Filesize

        248KB

      • memory/5008-198-0x00000000071B0000-0x00000000071EE000-memory.dmp

        Filesize

        248KB

      • memory/5008-202-0x00000000071B0000-0x00000000071EE000-memory.dmp

        Filesize

        248KB

      • memory/5008-204-0x00000000071B0000-0x00000000071EE000-memory.dmp

        Filesize

        248KB

      • memory/5008-206-0x00000000071B0000-0x00000000071EE000-memory.dmp

        Filesize

        248KB

      • memory/5008-208-0x00000000071B0000-0x00000000071EE000-memory.dmp

        Filesize

        248KB

      • memory/5008-210-0x00000000071B0000-0x00000000071EE000-memory.dmp

        Filesize

        248KB

      • memory/5008-212-0x00000000071B0000-0x00000000071EE000-memory.dmp

        Filesize

        248KB

      • memory/5008-214-0x00000000071B0000-0x00000000071EE000-memory.dmp

        Filesize

        248KB

      • memory/5008-216-0x00000000071B0000-0x00000000071EE000-memory.dmp

        Filesize

        248KB

      • memory/5008-218-0x00000000071B0000-0x00000000071EE000-memory.dmp

        Filesize

        248KB

      • memory/5008-220-0x00000000071B0000-0x00000000071EE000-memory.dmp

        Filesize

        248KB

      • memory/5008-222-0x00000000071B0000-0x00000000071EE000-memory.dmp

        Filesize

        248KB

      • memory/5008-224-0x00000000071B0000-0x00000000071EE000-memory.dmp

        Filesize

        248KB

      • memory/5008-195-0x0000000007200000-0x0000000007210000-memory.dmp

        Filesize

        64KB

      • memory/5008-1099-0x0000000007910000-0x0000000007F28000-memory.dmp

        Filesize

        6.1MB

      • memory/5008-1100-0x0000000007FB0000-0x00000000080BA000-memory.dmp

        Filesize

        1.0MB

      • memory/5008-1101-0x00000000080F0000-0x0000000008102000-memory.dmp

        Filesize

        72KB

      • memory/5008-1102-0x0000000008110000-0x000000000814C000-memory.dmp

        Filesize

        240KB

      • memory/5008-1103-0x0000000007200000-0x0000000007210000-memory.dmp

        Filesize

        64KB

      • memory/5008-1105-0x0000000007200000-0x0000000007210000-memory.dmp

        Filesize

        64KB

      • memory/5008-1106-0x0000000007200000-0x0000000007210000-memory.dmp

        Filesize

        64KB

      • memory/5008-1107-0x0000000007200000-0x0000000007210000-memory.dmp

        Filesize

        64KB

      • memory/5008-1108-0x0000000008410000-0x00000000084A2000-memory.dmp

        Filesize

        584KB

      • memory/5008-1109-0x00000000084B0000-0x0000000008516000-memory.dmp

        Filesize

        408KB

      • memory/5008-1110-0x0000000008CA0000-0x0000000008D16000-memory.dmp

        Filesize

        472KB

      • memory/5008-1111-0x0000000008D30000-0x0000000008D80000-memory.dmp

        Filesize

        320KB

      • memory/5008-192-0x00000000071B0000-0x00000000071EE000-memory.dmp

        Filesize

        248KB

      • memory/5008-191-0x0000000007200000-0x0000000007210000-memory.dmp

        Filesize

        64KB

      • memory/5008-1112-0x0000000008F00000-0x00000000090C2000-memory.dmp

        Filesize

        1.8MB

      • memory/5008-1113-0x00000000090D0000-0x00000000095FC000-memory.dmp

        Filesize

        5.2MB

      • memory/5008-1114-0x0000000007200000-0x0000000007210000-memory.dmp

        Filesize

        64KB