Analysis

  • max time kernel
    53s
  • max time network
    70s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02-03-2023 17:57

General

  • Target

    8f0f232752001beb182fed4ab489361acd37c387b78810016ec023bf4c3d0848.exe

  • Size

    545KB

  • MD5

    b95e1c267494500dd59b3ec940b7a20e

  • SHA1

    5fb8abf7feff5af9551a2142c4a53d041c6c314d

  • SHA256

    8f0f232752001beb182fed4ab489361acd37c387b78810016ec023bf4c3d0848

  • SHA512

    e1e2ef6c0717c9c15c54e8f596badb06537be231391e2ca2f8a59b5c02a449afa559d3ba99f699398ad656530225d901f493740d6c9f928a71eae38745a1dcb7

  • SSDEEP

    12288:ZMrgy90E4flZC37orkQffklz2RIz/FXvWt21Gf3hw4:RyJGXrpdqZut21Ge4

Malware Config

Extracted

Family

redline

Botnet

stek

C2

melevv.eu:4162

Attributes
  • auth_value

    4205381daf6946b2df5fe3bc7eacc918

Extracted

Family

redline

Botnet

fomich

C2

melevv.eu:4162

Attributes
  • auth_value

    b018e52ac946001794d8b8c23e901859

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 37 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f0f232752001beb182fed4ab489361acd37c387b78810016ec023bf4c3d0848.exe
    "C:\Users\Admin\AppData\Local\Temp\8f0f232752001beb182fed4ab489361acd37c387b78810016ec023bf4c3d0848.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2568
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vSX8824vZ.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vSX8824vZ.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4436
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw79mp39bj71.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw79mp39bj71.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4864
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tAu42ye78.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tAu42ye78.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2144
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\usC87NH39.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\usC87NH39.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4324

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\usC87NH39.exe

    Filesize

    175KB

    MD5

    239bab56a39e11389163a311574fcb83

    SHA1

    e438df7d2b956c2bb0fd72d0b7b7c93b8f1d7741

    SHA256

    ee0a55cad662117b73bf560a668727a4417ca610890ca244a3d19a36d731f2c4

    SHA512

    85f535c073fe5d1e97d338109d5f49289b1a403f2bcdf38757cbd123e3ce125d31952d5cbe5fe61c418ca03dfc8147acea362d788cd28738591c9a68a4dbda78

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\usC87NH39.exe

    Filesize

    175KB

    MD5

    239bab56a39e11389163a311574fcb83

    SHA1

    e438df7d2b956c2bb0fd72d0b7b7c93b8f1d7741

    SHA256

    ee0a55cad662117b73bf560a668727a4417ca610890ca244a3d19a36d731f2c4

    SHA512

    85f535c073fe5d1e97d338109d5f49289b1a403f2bcdf38757cbd123e3ce125d31952d5cbe5fe61c418ca03dfc8147acea362d788cd28738591c9a68a4dbda78

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vSX8824vZ.exe

    Filesize

    401KB

    MD5

    37bbcf67e2e0ae02c3b4ff65de37d38d

    SHA1

    eedd1b3b14458ce31a4b34c9e333e65d70d6ba58

    SHA256

    7f100349094915e06b4d5cad5ac80970f27dff184e12a32bae252a8000a3a37f

    SHA512

    b25cb24dc4c3b872d05885240128833ff7586619e2af0f579a1732d349006a88047b2e1791abbe557462e81deeb3e5280a50642fd7d14cc93e0c4ae3e2cd09cc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vSX8824vZ.exe

    Filesize

    401KB

    MD5

    37bbcf67e2e0ae02c3b4ff65de37d38d

    SHA1

    eedd1b3b14458ce31a4b34c9e333e65d70d6ba58

    SHA256

    7f100349094915e06b4d5cad5ac80970f27dff184e12a32bae252a8000a3a37f

    SHA512

    b25cb24dc4c3b872d05885240128833ff7586619e2af0f579a1732d349006a88047b2e1791abbe557462e81deeb3e5280a50642fd7d14cc93e0c4ae3e2cd09cc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw79mp39bj71.exe

    Filesize

    17KB

    MD5

    aa94bd7dc613cb7e41acc7d4227966f8

    SHA1

    c9203b6606b1040b93a1d13ad1bfe0da1fa2c798

    SHA256

    e33f988c081977e02b0d054d91cf4187fc2772f6ac01abeef1bf6b5a8ddd8e2d

    SHA512

    fb2d7c5d6ccfb8f0b8adb1e4725f6f2ca8265cb98fe54ac4fed7b7786c2afadedd50ee7790c65e89eeb534e10fd3a9f4316600cd0cf4d5e4441bc0f7e0ac5365

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw79mp39bj71.exe

    Filesize

    17KB

    MD5

    aa94bd7dc613cb7e41acc7d4227966f8

    SHA1

    c9203b6606b1040b93a1d13ad1bfe0da1fa2c798

    SHA256

    e33f988c081977e02b0d054d91cf4187fc2772f6ac01abeef1bf6b5a8ddd8e2d

    SHA512

    fb2d7c5d6ccfb8f0b8adb1e4725f6f2ca8265cb98fe54ac4fed7b7786c2afadedd50ee7790c65e89eeb534e10fd3a9f4316600cd0cf4d5e4441bc0f7e0ac5365

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tAu42ye78.exe

    Filesize

    377KB

    MD5

    a9bb941524fc5973d45dad1da3e23d17

    SHA1

    357a2a768bbec255880067c4a774ca2d4bee0588

    SHA256

    e2e687091711d776f73e3877ee7020f8ed6472855af0db8ee6f5ea796fc34659

    SHA512

    4beab17e28078481420dfdf5425a6829695cdfdf50c1231c509654bdcaf21d6de21f12ee44b4cbe9c3b555bed3a91542b2dc37b25b2d093e03af9941723d9256

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tAu42ye78.exe

    Filesize

    377KB

    MD5

    a9bb941524fc5973d45dad1da3e23d17

    SHA1

    357a2a768bbec255880067c4a774ca2d4bee0588

    SHA256

    e2e687091711d776f73e3877ee7020f8ed6472855af0db8ee6f5ea796fc34659

    SHA512

    4beab17e28078481420dfdf5425a6829695cdfdf50c1231c509654bdcaf21d6de21f12ee44b4cbe9c3b555bed3a91542b2dc37b25b2d093e03af9941723d9256

  • memory/2144-136-0x0000000002BD0000-0x0000000002C1B000-memory.dmp

    Filesize

    300KB

  • memory/2144-137-0x0000000004C70000-0x0000000004CB6000-memory.dmp

    Filesize

    280KB

  • memory/2144-138-0x0000000007410000-0x000000000790E000-memory.dmp

    Filesize

    5.0MB

  • memory/2144-139-0x0000000004E30000-0x0000000004E74000-memory.dmp

    Filesize

    272KB

  • memory/2144-140-0x0000000004E30000-0x0000000004E6E000-memory.dmp

    Filesize

    248KB

  • memory/2144-141-0x0000000004E30000-0x0000000004E6E000-memory.dmp

    Filesize

    248KB

  • memory/2144-143-0x0000000004E30000-0x0000000004E6E000-memory.dmp

    Filesize

    248KB

  • memory/2144-145-0x0000000004E30000-0x0000000004E6E000-memory.dmp

    Filesize

    248KB

  • memory/2144-147-0x0000000004E30000-0x0000000004E6E000-memory.dmp

    Filesize

    248KB

  • memory/2144-149-0x0000000004E30000-0x0000000004E6E000-memory.dmp

    Filesize

    248KB

  • memory/2144-151-0x0000000004E30000-0x0000000004E6E000-memory.dmp

    Filesize

    248KB

  • memory/2144-153-0x0000000004E30000-0x0000000004E6E000-memory.dmp

    Filesize

    248KB

  • memory/2144-155-0x0000000004E30000-0x0000000004E6E000-memory.dmp

    Filesize

    248KB

  • memory/2144-157-0x0000000004E30000-0x0000000004E6E000-memory.dmp

    Filesize

    248KB

  • memory/2144-159-0x0000000004E30000-0x0000000004E6E000-memory.dmp

    Filesize

    248KB

  • memory/2144-161-0x0000000004E30000-0x0000000004E6E000-memory.dmp

    Filesize

    248KB

  • memory/2144-163-0x0000000004E30000-0x0000000004E6E000-memory.dmp

    Filesize

    248KB

  • memory/2144-165-0x0000000004E30000-0x0000000004E6E000-memory.dmp

    Filesize

    248KB

  • memory/2144-167-0x0000000004E30000-0x0000000004E6E000-memory.dmp

    Filesize

    248KB

  • memory/2144-169-0x0000000004E30000-0x0000000004E6E000-memory.dmp

    Filesize

    248KB

  • memory/2144-171-0x0000000004E30000-0x0000000004E6E000-memory.dmp

    Filesize

    248KB

  • memory/2144-173-0x0000000007400000-0x0000000007410000-memory.dmp

    Filesize

    64KB

  • memory/2144-174-0x0000000004E30000-0x0000000004E6E000-memory.dmp

    Filesize

    248KB

  • memory/2144-175-0x0000000007400000-0x0000000007410000-memory.dmp

    Filesize

    64KB

  • memory/2144-177-0x0000000007400000-0x0000000007410000-memory.dmp

    Filesize

    64KB

  • memory/2144-180-0x0000000004E30000-0x0000000004E6E000-memory.dmp

    Filesize

    248KB

  • memory/2144-178-0x0000000004E30000-0x0000000004E6E000-memory.dmp

    Filesize

    248KB

  • memory/2144-182-0x0000000004E30000-0x0000000004E6E000-memory.dmp

    Filesize

    248KB

  • memory/2144-184-0x0000000004E30000-0x0000000004E6E000-memory.dmp

    Filesize

    248KB

  • memory/2144-186-0x0000000004E30000-0x0000000004E6E000-memory.dmp

    Filesize

    248KB

  • memory/2144-188-0x0000000004E30000-0x0000000004E6E000-memory.dmp

    Filesize

    248KB

  • memory/2144-190-0x0000000004E30000-0x0000000004E6E000-memory.dmp

    Filesize

    248KB

  • memory/2144-192-0x0000000004E30000-0x0000000004E6E000-memory.dmp

    Filesize

    248KB

  • memory/2144-194-0x0000000004E30000-0x0000000004E6E000-memory.dmp

    Filesize

    248KB

  • memory/2144-196-0x0000000004E30000-0x0000000004E6E000-memory.dmp

    Filesize

    248KB

  • memory/2144-198-0x0000000004E30000-0x0000000004E6E000-memory.dmp

    Filesize

    248KB

  • memory/2144-200-0x0000000004E30000-0x0000000004E6E000-memory.dmp

    Filesize

    248KB

  • memory/2144-202-0x0000000004E30000-0x0000000004E6E000-memory.dmp

    Filesize

    248KB

  • memory/2144-204-0x0000000004E30000-0x0000000004E6E000-memory.dmp

    Filesize

    248KB

  • memory/2144-206-0x0000000004E30000-0x0000000004E6E000-memory.dmp

    Filesize

    248KB

  • memory/2144-1049-0x0000000007F20000-0x0000000008526000-memory.dmp

    Filesize

    6.0MB

  • memory/2144-1050-0x0000000007270000-0x000000000737A000-memory.dmp

    Filesize

    1.0MB

  • memory/2144-1051-0x0000000007390000-0x00000000073A2000-memory.dmp

    Filesize

    72KB

  • memory/2144-1052-0x00000000073B0000-0x00000000073EE000-memory.dmp

    Filesize

    248KB

  • memory/2144-1053-0x0000000007A10000-0x0000000007A5B000-memory.dmp

    Filesize

    300KB

  • memory/2144-1054-0x0000000007400000-0x0000000007410000-memory.dmp

    Filesize

    64KB

  • memory/2144-1055-0x0000000007BB0000-0x0000000007C16000-memory.dmp

    Filesize

    408KB

  • memory/2144-1057-0x0000000008890000-0x0000000008922000-memory.dmp

    Filesize

    584KB

  • memory/2144-1058-0x0000000007400000-0x0000000007410000-memory.dmp

    Filesize

    64KB

  • memory/2144-1059-0x0000000007400000-0x0000000007410000-memory.dmp

    Filesize

    64KB

  • memory/2144-1060-0x0000000007400000-0x0000000007410000-memory.dmp

    Filesize

    64KB

  • memory/2144-1061-0x0000000008B70000-0x0000000008BE6000-memory.dmp

    Filesize

    472KB

  • memory/2144-1062-0x0000000008C10000-0x0000000008C60000-memory.dmp

    Filesize

    320KB

  • memory/2144-1063-0x0000000008C90000-0x0000000008E52000-memory.dmp

    Filesize

    1.8MB

  • memory/2144-1064-0x0000000008E60000-0x000000000938C000-memory.dmp

    Filesize

    5.2MB

  • memory/2144-1065-0x0000000007400000-0x0000000007410000-memory.dmp

    Filesize

    64KB

  • memory/4324-1071-0x0000000000760000-0x0000000000792000-memory.dmp

    Filesize

    200KB

  • memory/4324-1072-0x00000000051A0000-0x00000000051EB000-memory.dmp

    Filesize

    300KB

  • memory/4324-1073-0x0000000005300000-0x0000000005310000-memory.dmp

    Filesize

    64KB

  • memory/4324-1074-0x0000000005300000-0x0000000005310000-memory.dmp

    Filesize

    64KB

  • memory/4864-130-0x0000000000ED0000-0x0000000000EDA000-memory.dmp

    Filesize

    40KB