Analysis

  • max time kernel
    55s
  • max time network
    60s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02/03/2023, 16:47

General

  • Target

    24ddcf292ae59a1165bfbbdb7a5be1ae36daeb5e9d7d4df29e8893b244a87ee4.exe

  • Size

    544KB

  • MD5

    d1ce70d9fd7231cff5eeb46e88baaafc

  • SHA1

    39e95b84e2f54eb52a95425eae7ca8154441868b

  • SHA256

    24ddcf292ae59a1165bfbbdb7a5be1ae36daeb5e9d7d4df29e8893b244a87ee4

  • SHA512

    afadb88041f1b2287c6878db9cd8f80ecdcd93df4d0adc74172ddb0c930cc1da26539161e4a74d88e6e01f4bd7f402e45dc3d15da017161ab19493de82dd3dfb

  • SSDEEP

    12288:JMrNy904G9Ia7HdRHAZjDabTud9uUsshR7n0KtUQBq8Gwpx:cyBBa7H/iDiTuDAsb02XGCx

Malware Config

Extracted

Family

redline

Botnet

stek

C2

melevv.eu:4162

Attributes
  • auth_value

    4205381daf6946b2df5fe3bc7eacc918

Extracted

Family

redline

Botnet

fomich

C2

melevv.eu:4162

Attributes
  • auth_value

    b018e52ac946001794d8b8c23e901859

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 36 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\24ddcf292ae59a1165bfbbdb7a5be1ae36daeb5e9d7d4df29e8893b244a87ee4.exe
    "C:\Users\Admin\AppData\Local\Temp\24ddcf292ae59a1165bfbbdb7a5be1ae36daeb5e9d7d4df29e8893b244a87ee4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3236
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vwz1091Kh.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vwz1091Kh.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4044
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw82il23ya75.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw82il23ya75.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4072
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tYn18xC40.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tYn18xC40.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4104
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uVb17Ox83.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uVb17Ox83.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:984

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uVb17Ox83.exe

          Filesize

          175KB

          MD5

          90bcdb588c85a4a7a946e31bbfd9072b

          SHA1

          f80e2eb41fe5df111cba0fed073442acacf50c2b

          SHA256

          7bb0d420d3d6b1406f0a312a6c12f76d191c05c3c71ede2690c853a41ec1a6e2

          SHA512

          dfdf9ab88ec04c05244a13eb6744cd869a47a8b034da93800c80f9a545d448c8ed3866d50612b9a3b484cd5516488e8fb4c2afad460932d1f948808ecc304607

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uVb17Ox83.exe

          Filesize

          175KB

          MD5

          90bcdb588c85a4a7a946e31bbfd9072b

          SHA1

          f80e2eb41fe5df111cba0fed073442acacf50c2b

          SHA256

          7bb0d420d3d6b1406f0a312a6c12f76d191c05c3c71ede2690c853a41ec1a6e2

          SHA512

          dfdf9ab88ec04c05244a13eb6744cd869a47a8b034da93800c80f9a545d448c8ed3866d50612b9a3b484cd5516488e8fb4c2afad460932d1f948808ecc304607

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vwz1091Kh.exe

          Filesize

          399KB

          MD5

          ec9b2c0848b3ef8ea2f0b3654d1b2003

          SHA1

          a8b61e0f98a1d0b7ae13adc01f22dbb698193f4d

          SHA256

          08ec417073e94a7e817a0b6412fa792841089cec1dafb723d5d679aa7daf2522

          SHA512

          544b3a12ecc2a4145b4984e1714fa0ed5ad35361f6b1a1022f687848c297a2fd7fdec84ef6ae6cadfab90a24d56fd2d3e532ace76d32bfa011754c41f55e6608

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vwz1091Kh.exe

          Filesize

          399KB

          MD5

          ec9b2c0848b3ef8ea2f0b3654d1b2003

          SHA1

          a8b61e0f98a1d0b7ae13adc01f22dbb698193f4d

          SHA256

          08ec417073e94a7e817a0b6412fa792841089cec1dafb723d5d679aa7daf2522

          SHA512

          544b3a12ecc2a4145b4984e1714fa0ed5ad35361f6b1a1022f687848c297a2fd7fdec84ef6ae6cadfab90a24d56fd2d3e532ace76d32bfa011754c41f55e6608

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw82il23ya75.exe

          Filesize

          17KB

          MD5

          d88cdefae327de8bfe30a58525250d66

          SHA1

          9a25f05267dd47e1be72367f52c1751814a59a97

          SHA256

          07f1a0f0280d93d9116487c061c2ea35831ea4d3d1ce0aa35a1f5004c352be8f

          SHA512

          88d3d906d98f30bd7bef830440692662d8ad5b339b664d51c1827227409575c55ea20064a92571d2ae9a461629cd60aed3f90a9a51a375a26b0c8c57b69e0927

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw82il23ya75.exe

          Filesize

          17KB

          MD5

          d88cdefae327de8bfe30a58525250d66

          SHA1

          9a25f05267dd47e1be72367f52c1751814a59a97

          SHA256

          07f1a0f0280d93d9116487c061c2ea35831ea4d3d1ce0aa35a1f5004c352be8f

          SHA512

          88d3d906d98f30bd7bef830440692662d8ad5b339b664d51c1827227409575c55ea20064a92571d2ae9a461629cd60aed3f90a9a51a375a26b0c8c57b69e0927

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tYn18xC40.exe

          Filesize

          308KB

          MD5

          9deb98e21d80840ff993f7170b1340c6

          SHA1

          c079fb7d92f9c5937beabfb214e395d44857b547

          SHA256

          0e322b46c3f8f35ba9c4ee94971e715a813122f2ada84754e3da7789f995e2cc

          SHA512

          f975d294bccd1627c3845fe3ce49f94244805d3c06abac0a390c0d4263de71d89d14502bd97a6ba7a848bacc4571f18d879bf02f70044e312732a8548d0acaf4

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tYn18xC40.exe

          Filesize

          308KB

          MD5

          9deb98e21d80840ff993f7170b1340c6

          SHA1

          c079fb7d92f9c5937beabfb214e395d44857b547

          SHA256

          0e322b46c3f8f35ba9c4ee94971e715a813122f2ada84754e3da7789f995e2cc

          SHA512

          f975d294bccd1627c3845fe3ce49f94244805d3c06abac0a390c0d4263de71d89d14502bd97a6ba7a848bacc4571f18d879bf02f70044e312732a8548d0acaf4

        • memory/984-1072-0x0000000000130000-0x0000000000162000-memory.dmp

          Filesize

          200KB

        • memory/984-1073-0x0000000004B70000-0x0000000004BBB000-memory.dmp

          Filesize

          300KB

        • memory/984-1074-0x0000000004D20000-0x0000000004D30000-memory.dmp

          Filesize

          64KB

        • memory/4072-131-0x00000000000B0000-0x00000000000BA000-memory.dmp

          Filesize

          40KB

        • memory/4104-175-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

          Filesize

          248KB

        • memory/4104-185-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

          Filesize

          248KB

        • memory/4104-140-0x0000000004BA0000-0x0000000004BE4000-memory.dmp

          Filesize

          272KB

        • memory/4104-141-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

          Filesize

          248KB

        • memory/4104-142-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

          Filesize

          248KB

        • memory/4104-144-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

          Filesize

          248KB

        • memory/4104-146-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

          Filesize

          248KB

        • memory/4104-148-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

          Filesize

          248KB

        • memory/4104-150-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

          Filesize

          248KB

        • memory/4104-152-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

          Filesize

          248KB

        • memory/4104-154-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

          Filesize

          248KB

        • memory/4104-156-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

          Filesize

          248KB

        • memory/4104-159-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

          Filesize

          248KB

        • memory/4104-160-0x0000000004D40000-0x0000000004D50000-memory.dmp

          Filesize

          64KB

        • memory/4104-158-0x0000000004D40000-0x0000000004D50000-memory.dmp

          Filesize

          64KB

        • memory/4104-163-0x0000000004D40000-0x0000000004D50000-memory.dmp

          Filesize

          64KB

        • memory/4104-165-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

          Filesize

          248KB

        • memory/4104-162-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

          Filesize

          248KB

        • memory/4104-167-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

          Filesize

          248KB

        • memory/4104-169-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

          Filesize

          248KB

        • memory/4104-171-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

          Filesize

          248KB

        • memory/4104-173-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

          Filesize

          248KB

        • memory/4104-138-0x0000000002330000-0x0000000002376000-memory.dmp

          Filesize

          280KB

        • memory/4104-177-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

          Filesize

          248KB

        • memory/4104-179-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

          Filesize

          248KB

        • memory/4104-181-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

          Filesize

          248KB

        • memory/4104-183-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

          Filesize

          248KB

        • memory/4104-139-0x0000000004D50000-0x000000000524E000-memory.dmp

          Filesize

          5.0MB

        • memory/4104-187-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

          Filesize

          248KB

        • memory/4104-189-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

          Filesize

          248KB

        • memory/4104-191-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

          Filesize

          248KB

        • memory/4104-193-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

          Filesize

          248KB

        • memory/4104-195-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

          Filesize

          248KB

        • memory/4104-197-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

          Filesize

          248KB

        • memory/4104-199-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

          Filesize

          248KB

        • memory/4104-201-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

          Filesize

          248KB

        • memory/4104-203-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

          Filesize

          248KB

        • memory/4104-205-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

          Filesize

          248KB

        • memory/4104-207-0x0000000004BA0000-0x0000000004BDE000-memory.dmp

          Filesize

          248KB

        • memory/4104-1050-0x0000000005960000-0x0000000005F66000-memory.dmp

          Filesize

          6.0MB

        • memory/4104-1051-0x0000000005350000-0x000000000545A000-memory.dmp

          Filesize

          1.0MB

        • memory/4104-1052-0x0000000004D20000-0x0000000004D32000-memory.dmp

          Filesize

          72KB

        • memory/4104-1053-0x0000000005460000-0x000000000549E000-memory.dmp

          Filesize

          248KB

        • memory/4104-1054-0x00000000055B0000-0x00000000055FB000-memory.dmp

          Filesize

          300KB

        • memory/4104-1055-0x0000000004D40000-0x0000000004D50000-memory.dmp

          Filesize

          64KB

        • memory/4104-1057-0x0000000005750000-0x00000000057E2000-memory.dmp

          Filesize

          584KB

        • memory/4104-1058-0x00000000057F0000-0x0000000005856000-memory.dmp

          Filesize

          408KB

        • memory/4104-1059-0x00000000064D0000-0x0000000006546000-memory.dmp

          Filesize

          472KB

        • memory/4104-1060-0x0000000006560000-0x00000000065B0000-memory.dmp

          Filesize

          320KB

        • memory/4104-1061-0x0000000004D40000-0x0000000004D50000-memory.dmp

          Filesize

          64KB

        • memory/4104-1062-0x0000000004D40000-0x0000000004D50000-memory.dmp

          Filesize

          64KB

        • memory/4104-137-0x0000000001FE0000-0x000000000202B000-memory.dmp

          Filesize

          300KB

        • memory/4104-1063-0x0000000004D40000-0x0000000004D50000-memory.dmp

          Filesize

          64KB

        • memory/4104-1064-0x00000000065E0000-0x00000000067A2000-memory.dmp

          Filesize

          1.8MB

        • memory/4104-1065-0x00000000067C0000-0x0000000006CEC000-memory.dmp

          Filesize

          5.2MB

        • memory/4104-1066-0x0000000004D40000-0x0000000004D50000-memory.dmp

          Filesize

          64KB