Analysis

  • max time kernel
    98s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/03/2023, 19:07

General

  • Target

    aaf8c4990ad9baea9669e6f19cfc550399751c99fa52f14297b3baaf610bcd16.exe

  • Size

    546KB

  • MD5

    4cea6d0d48c69c8429393f2852610c2b

  • SHA1

    6270f55756242ac940bbe6faf2a7a76e0f99d14b

  • SHA256

    aaf8c4990ad9baea9669e6f19cfc550399751c99fa52f14297b3baaf610bcd16

  • SHA512

    ee14b83caf0994909aaaf30673eec5210de64f6f8e3062bfde29e1499b5b8fcc67033ae7fc9af80221151e950b8e1752eb8cff958737af54ce965280526bf2f7

  • SSDEEP

    12288:6Mray90+nU1VjIcZq6W8xiu5nu6bluhWDxN:wy/MVjnPxxLnu67

Malware Config

Extracted

Family

redline

Botnet

stek

C2

melevv.eu:4162

Attributes
  • auth_value

    4205381daf6946b2df5fe3bc7eacc918

Extracted

Family

redline

Botnet

fomich

C2

melevv.eu:4162

Attributes
  • auth_value

    b018e52ac946001794d8b8c23e901859

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aaf8c4990ad9baea9669e6f19cfc550399751c99fa52f14297b3baaf610bcd16.exe
    "C:\Users\Admin\AppData\Local\Temp\aaf8c4990ad9baea9669e6f19cfc550399751c99fa52f14297b3baaf610bcd16.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4304
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vol3829tx.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vol3829tx.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1804
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw51pI79Wd29.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw51pI79Wd29.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3796
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkz42hK66.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkz42hK66.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4596
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 1396
          4⤵
          • Program crash
          PID:2416
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uUz23Ji45.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uUz23Ji45.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3468
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4596 -ip 4596
    1⤵
      PID:852

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uUz23Ji45.exe

      Filesize

      175KB

      MD5

      616410b74e38ae308d706374be6098c0

      SHA1

      386d09f5990770bd0346a3d6ed59a56bb1daa4b8

      SHA256

      7ef52b208f7f0180606b0ee88d97b1de102c2ca049efb3ee7b81c680f1034025

      SHA512

      8ec8f0f9cbf1c6fbf85a2c5b20f58c59ee2ee42e8e2f5207499c5b907b0ec9b3cf9f09b969885ec896e5f50656b6b70e4fe6fbd005f71e2895883aac22e1625a

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uUz23Ji45.exe

      Filesize

      175KB

      MD5

      616410b74e38ae308d706374be6098c0

      SHA1

      386d09f5990770bd0346a3d6ed59a56bb1daa4b8

      SHA256

      7ef52b208f7f0180606b0ee88d97b1de102c2ca049efb3ee7b81c680f1034025

      SHA512

      8ec8f0f9cbf1c6fbf85a2c5b20f58c59ee2ee42e8e2f5207499c5b907b0ec9b3cf9f09b969885ec896e5f50656b6b70e4fe6fbd005f71e2895883aac22e1625a

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vol3829tx.exe

      Filesize

      401KB

      MD5

      7da48e63b69bff29237306e789c06b16

      SHA1

      5df2cf201e70da221c22c65d152c8042815fe3de

      SHA256

      cb996b516e4e4a720a6755cd71bc778d0a72941e83a087086ea03ac36e0dd0b1

      SHA512

      bf3191185c9921f0403d548a812dd4212c29451d80e397b81cede2a8b5d38065092221fc799d1a3fada17b3fa158e0b114267749fe1939b859d079510ec89abf

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vol3829tx.exe

      Filesize

      401KB

      MD5

      7da48e63b69bff29237306e789c06b16

      SHA1

      5df2cf201e70da221c22c65d152c8042815fe3de

      SHA256

      cb996b516e4e4a720a6755cd71bc778d0a72941e83a087086ea03ac36e0dd0b1

      SHA512

      bf3191185c9921f0403d548a812dd4212c29451d80e397b81cede2a8b5d38065092221fc799d1a3fada17b3fa158e0b114267749fe1939b859d079510ec89abf

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw51pI79Wd29.exe

      Filesize

      17KB

      MD5

      235d46ef0afa5922d96531b7343712f4

      SHA1

      0172ba9b6e89e90f5dd30b946cba42b57cd3979c

      SHA256

      d9844d3a572866a6bdbf3422e6ec90205ab49171d8d5045929366849f8ec8db9

      SHA512

      e49dc7227d05103e638be13a7285c483236b75f332012874eefa2cdde3c23250e98b4a6b3fdac0996174577060d403bb84426eb677cddcfb422a059b224b73c2

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw51pI79Wd29.exe

      Filesize

      17KB

      MD5

      235d46ef0afa5922d96531b7343712f4

      SHA1

      0172ba9b6e89e90f5dd30b946cba42b57cd3979c

      SHA256

      d9844d3a572866a6bdbf3422e6ec90205ab49171d8d5045929366849f8ec8db9

      SHA512

      e49dc7227d05103e638be13a7285c483236b75f332012874eefa2cdde3c23250e98b4a6b3fdac0996174577060d403bb84426eb677cddcfb422a059b224b73c2

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkz42hK66.exe

      Filesize

      377KB

      MD5

      f1ee2f9260487ebcd921054e948b7c77

      SHA1

      653a941f90804cc68f78db483e0c0e559b1eefb7

      SHA256

      53d391e42f7a8a701906e246d5ed87be400f65f779e4689a448d0497adaf8df9

      SHA512

      ece3849635baa6ef692dec38f3415d566f6419ffb4854043c60708578f748a3f2112360e3794d9e3f5a64e8feaf26b6f0a17efcd852d009d3a7063cde9895222

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tkz42hK66.exe

      Filesize

      377KB

      MD5

      f1ee2f9260487ebcd921054e948b7c77

      SHA1

      653a941f90804cc68f78db483e0c0e559b1eefb7

      SHA256

      53d391e42f7a8a701906e246d5ed87be400f65f779e4689a448d0497adaf8df9

      SHA512

      ece3849635baa6ef692dec38f3415d566f6419ffb4854043c60708578f748a3f2112360e3794d9e3f5a64e8feaf26b6f0a17efcd852d009d3a7063cde9895222

    • memory/3468-1085-0x0000000000350000-0x0000000000382000-memory.dmp

      Filesize

      200KB

    • memory/3468-1086-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

      Filesize

      64KB

    • memory/3796-147-0x0000000000740000-0x000000000074A000-memory.dmp

      Filesize

      40KB

    • memory/4596-191-0x0000000004DD0000-0x0000000004E0E000-memory.dmp

      Filesize

      248KB

    • memory/4596-201-0x0000000004DD0000-0x0000000004E0E000-memory.dmp

      Filesize

      248KB

    • memory/4596-155-0x0000000007420000-0x00000000079C4000-memory.dmp

      Filesize

      5.6MB

    • memory/4596-156-0x0000000004DD0000-0x0000000004E0E000-memory.dmp

      Filesize

      248KB

    • memory/4596-159-0x0000000004DD0000-0x0000000004E0E000-memory.dmp

      Filesize

      248KB

    • memory/4596-157-0x0000000004DD0000-0x0000000004E0E000-memory.dmp

      Filesize

      248KB

    • memory/4596-161-0x0000000004DD0000-0x0000000004E0E000-memory.dmp

      Filesize

      248KB

    • memory/4596-163-0x0000000004DD0000-0x0000000004E0E000-memory.dmp

      Filesize

      248KB

    • memory/4596-165-0x0000000004DD0000-0x0000000004E0E000-memory.dmp

      Filesize

      248KB

    • memory/4596-167-0x0000000004DD0000-0x0000000004E0E000-memory.dmp

      Filesize

      248KB

    • memory/4596-169-0x0000000004DD0000-0x0000000004E0E000-memory.dmp

      Filesize

      248KB

    • memory/4596-171-0x0000000004DD0000-0x0000000004E0E000-memory.dmp

      Filesize

      248KB

    • memory/4596-173-0x0000000004DD0000-0x0000000004E0E000-memory.dmp

      Filesize

      248KB

    • memory/4596-175-0x0000000004DD0000-0x0000000004E0E000-memory.dmp

      Filesize

      248KB

    • memory/4596-177-0x0000000004DD0000-0x0000000004E0E000-memory.dmp

      Filesize

      248KB

    • memory/4596-179-0x0000000004DD0000-0x0000000004E0E000-memory.dmp

      Filesize

      248KB

    • memory/4596-181-0x0000000004DD0000-0x0000000004E0E000-memory.dmp

      Filesize

      248KB

    • memory/4596-183-0x0000000004DD0000-0x0000000004E0E000-memory.dmp

      Filesize

      248KB

    • memory/4596-185-0x0000000004DD0000-0x0000000004E0E000-memory.dmp

      Filesize

      248KB

    • memory/4596-187-0x0000000004DD0000-0x0000000004E0E000-memory.dmp

      Filesize

      248KB

    • memory/4596-189-0x0000000004DD0000-0x0000000004E0E000-memory.dmp

      Filesize

      248KB

    • memory/4596-153-0x0000000002CA0000-0x0000000002CEB000-memory.dmp

      Filesize

      300KB

    • memory/4596-193-0x0000000004DD0000-0x0000000004E0E000-memory.dmp

      Filesize

      248KB

    • memory/4596-195-0x0000000004DD0000-0x0000000004E0E000-memory.dmp

      Filesize

      248KB

    • memory/4596-197-0x0000000004DD0000-0x0000000004E0E000-memory.dmp

      Filesize

      248KB

    • memory/4596-199-0x0000000004800000-0x0000000004810000-memory.dmp

      Filesize

      64KB

    • memory/4596-200-0x0000000004800000-0x0000000004810000-memory.dmp

      Filesize

      64KB

    • memory/4596-154-0x0000000004800000-0x0000000004810000-memory.dmp

      Filesize

      64KB

    • memory/4596-203-0x0000000004DD0000-0x0000000004E0E000-memory.dmp

      Filesize

      248KB

    • memory/4596-205-0x0000000004DD0000-0x0000000004E0E000-memory.dmp

      Filesize

      248KB

    • memory/4596-207-0x0000000004DD0000-0x0000000004E0E000-memory.dmp

      Filesize

      248KB

    • memory/4596-209-0x0000000004DD0000-0x0000000004E0E000-memory.dmp

      Filesize

      248KB

    • memory/4596-211-0x0000000004DD0000-0x0000000004E0E000-memory.dmp

      Filesize

      248KB

    • memory/4596-213-0x0000000004DD0000-0x0000000004E0E000-memory.dmp

      Filesize

      248KB

    • memory/4596-215-0x0000000004DD0000-0x0000000004E0E000-memory.dmp

      Filesize

      248KB

    • memory/4596-217-0x0000000004DD0000-0x0000000004E0E000-memory.dmp

      Filesize

      248KB

    • memory/4596-219-0x0000000004DD0000-0x0000000004E0E000-memory.dmp

      Filesize

      248KB

    • memory/4596-221-0x0000000004DD0000-0x0000000004E0E000-memory.dmp

      Filesize

      248KB

    • memory/4596-1064-0x00000000079D0000-0x0000000007FE8000-memory.dmp

      Filesize

      6.1MB

    • memory/4596-1065-0x0000000007FF0000-0x00000000080FA000-memory.dmp

      Filesize

      1.0MB

    • memory/4596-1066-0x0000000008100000-0x0000000008112000-memory.dmp

      Filesize

      72KB

    • memory/4596-1067-0x0000000004800000-0x0000000004810000-memory.dmp

      Filesize

      64KB

    • memory/4596-1068-0x0000000008120000-0x000000000815C000-memory.dmp

      Filesize

      240KB

    • memory/4596-1069-0x0000000008410000-0x0000000008476000-memory.dmp

      Filesize

      408KB

    • memory/4596-1070-0x0000000008AE0000-0x0000000008B72000-memory.dmp

      Filesize

      584KB

    • memory/4596-1072-0x0000000004800000-0x0000000004810000-memory.dmp

      Filesize

      64KB

    • memory/4596-1073-0x0000000004800000-0x0000000004810000-memory.dmp

      Filesize

      64KB

    • memory/4596-1074-0x0000000004800000-0x0000000004810000-memory.dmp

      Filesize

      64KB

    • memory/4596-1075-0x0000000008E00000-0x0000000008E76000-memory.dmp

      Filesize

      472KB

    • memory/4596-1076-0x0000000008EA0000-0x0000000008EF0000-memory.dmp

      Filesize

      320KB

    • memory/4596-1077-0x0000000004800000-0x0000000004810000-memory.dmp

      Filesize

      64KB

    • memory/4596-1078-0x0000000008F10000-0x00000000090D2000-memory.dmp

      Filesize

      1.8MB

    • memory/4596-1079-0x00000000090E0000-0x000000000960C000-memory.dmp

      Filesize

      5.2MB