Analysis

  • max time kernel
    128s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/03/2023, 20:07

General

  • Target

    d59df8ca70d9790f2a75757e983465e937e61e4c9afacd1577da9fe6c8160e10.exe

  • Size

    686KB

  • MD5

    67d9f0211a140e7a8a9e87736687ffbc

  • SHA1

    6979718e1d98c34bc7f435b992f50d472530cbd0

  • SHA256

    d59df8ca70d9790f2a75757e983465e937e61e4c9afacd1577da9fe6c8160e10

  • SHA512

    0d1605ac7eb925c20bf48d6bba33d9daabdfadb0ab8f9372e3e037689c60d54284485640db284c2eeb1d79b4220e08d5119cf0f27abbe061da0f8d5d1b15be69

  • SSDEEP

    12288:eMrfy90zas6MV9HZW1EaPd8BnSFrw+Z/1BAqX+lGlGa94zAB:hyi6S9HZuEaPknCjbWqOlGlMzU

Malware Config

Extracted

Family

redline

Botnet

stek

C2

melevv.eu:4162

Attributes
  • auth_value

    4205381daf6946b2df5fe3bc7eacc918

Extracted

Family

redline

Botnet

fomich

C2

melevv.eu:4162

Attributes
  • auth_value

    b018e52ac946001794d8b8c23e901859

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d59df8ca70d9790f2a75757e983465e937e61e4c9afacd1577da9fe6c8160e10.exe
    "C:\Users\Admin\AppData\Local\Temp\d59df8ca70d9790f2a75757e983465e937e61e4c9afacd1577da9fe6c8160e10.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1904
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycKP13Tv39.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycKP13Tv39.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2828
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urBG01Ox29.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urBG01Ox29.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2396
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2396 -s 1076
          4⤵
          • Program crash
          PID:4100
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrcB50cH51.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrcB50cH51.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1436
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1436 -s 1408
          4⤵
          • Program crash
          PID:2336
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xugT63hb65.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xugT63hb65.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2244
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2396 -ip 2396
    1⤵
      PID:4180
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1436 -ip 1436
      1⤵
        PID:4980
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:3956

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xugT63hb65.exe

              Filesize

              175KB

              MD5

              0d997a20ce10bd11a3aae00e3eb59156

              SHA1

              b9b268dec0ca5612e12232e685a50894964ac996

              SHA256

              c8e5ac58578942e82efbd497af07a88b6f66238614021862196cdf9a88679ac7

              SHA512

              f2473949dd8de3404a6cad232653d947412a007c85a863146dadafce2c76929cd9727978dcb4e1bcbc84d93f242f6148ab5ea05b2511a91939080a6f02c45d62

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xugT63hb65.exe

              Filesize

              175KB

              MD5

              0d997a20ce10bd11a3aae00e3eb59156

              SHA1

              b9b268dec0ca5612e12232e685a50894964ac996

              SHA256

              c8e5ac58578942e82efbd497af07a88b6f66238614021862196cdf9a88679ac7

              SHA512

              f2473949dd8de3404a6cad232653d947412a007c85a863146dadafce2c76929cd9727978dcb4e1bcbc84d93f242f6148ab5ea05b2511a91939080a6f02c45d62

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycKP13Tv39.exe

              Filesize

              542KB

              MD5

              23d5fdce1acbfafc8a3cbfe602cdd3d0

              SHA1

              a2edb9ec53ff7a95c10b6f8ff6b200d2eb7ae807

              SHA256

              05556b79e22b1dbc5f1b2db291465be10f4ec10597d9eb0bfb0f503c9b21c40f

              SHA512

              a18f5401476ab15451b9cfe93453e2ff4d74136742b55c5b938b19c8361ada83e61e043cdf3658a63b7950bd54e69fa846988710093268d04dc9ce769e95bf82

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycKP13Tv39.exe

              Filesize

              542KB

              MD5

              23d5fdce1acbfafc8a3cbfe602cdd3d0

              SHA1

              a2edb9ec53ff7a95c10b6f8ff6b200d2eb7ae807

              SHA256

              05556b79e22b1dbc5f1b2db291465be10f4ec10597d9eb0bfb0f503c9b21c40f

              SHA512

              a18f5401476ab15451b9cfe93453e2ff4d74136742b55c5b938b19c8361ada83e61e043cdf3658a63b7950bd54e69fa846988710093268d04dc9ce769e95bf82

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urBG01Ox29.exe

              Filesize

              318KB

              MD5

              6bf70eb1f13bb5f9dc61eef7d7016664

              SHA1

              704a3f23de746bf164ca205f1b03a9ee2c752877

              SHA256

              e11eb0b06cc9a208a2de0a01f190bfae2f0484e84a68a4d822731c9bc92abce0

              SHA512

              2846e76f2ac6cfa272c87e77bd5579133585654e5c1725aaf471209d04ff6749a4ab02f4180a66af637cba0e6a5468bce0a957ff1ac7d8a0f1698fa12f750b4f

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urBG01Ox29.exe

              Filesize

              318KB

              MD5

              6bf70eb1f13bb5f9dc61eef7d7016664

              SHA1

              704a3f23de746bf164ca205f1b03a9ee2c752877

              SHA256

              e11eb0b06cc9a208a2de0a01f190bfae2f0484e84a68a4d822731c9bc92abce0

              SHA512

              2846e76f2ac6cfa272c87e77bd5579133585654e5c1725aaf471209d04ff6749a4ab02f4180a66af637cba0e6a5468bce0a957ff1ac7d8a0f1698fa12f750b4f

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrcB50cH51.exe

              Filesize

              376KB

              MD5

              d59f82338e5d937f8762de73d2fe5bfd

              SHA1

              405e65a38c7677eaed8a28a9b9ef72a0ad7bdacb

              SHA256

              138b6143c345a24a8f866d24f461d19ce4c9ed06204f12eb4d09207baff6ebf1

              SHA512

              bf1cfe667b92ecdfd20625a50245e2640ddcc7f0320ae842b28ebd9e48582a437ed68360745d997d0cb5064926b84ec7de4450bf9f3d89692ea5f1ddf4775e75

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrcB50cH51.exe

              Filesize

              376KB

              MD5

              d59f82338e5d937f8762de73d2fe5bfd

              SHA1

              405e65a38c7677eaed8a28a9b9ef72a0ad7bdacb

              SHA256

              138b6143c345a24a8f866d24f461d19ce4c9ed06204f12eb4d09207baff6ebf1

              SHA512

              bf1cfe667b92ecdfd20625a50245e2640ddcc7f0320ae842b28ebd9e48582a437ed68360745d997d0cb5064926b84ec7de4450bf9f3d89692ea5f1ddf4775e75

            • memory/1436-1102-0x0000000007E80000-0x0000000007F8A000-memory.dmp

              Filesize

              1.0MB

            • memory/1436-1103-0x0000000007FB0000-0x0000000007FC2000-memory.dmp

              Filesize

              72KB

            • memory/1436-1116-0x0000000008FB0000-0x00000000094DC000-memory.dmp

              Filesize

              5.2MB

            • memory/1436-1115-0x00000000072A0000-0x00000000072B0000-memory.dmp

              Filesize

              64KB

            • memory/1436-1114-0x0000000008DE0000-0x0000000008FA2000-memory.dmp

              Filesize

              1.8MB

            • memory/1436-1113-0x0000000008B10000-0x0000000008B60000-memory.dmp

              Filesize

              320KB

            • memory/1436-1112-0x0000000008A90000-0x0000000008B06000-memory.dmp

              Filesize

              472KB

            • memory/1436-1111-0x00000000072A0000-0x00000000072B0000-memory.dmp

              Filesize

              64KB

            • memory/1436-1110-0x00000000072A0000-0x00000000072B0000-memory.dmp

              Filesize

              64KB

            • memory/1436-1109-0x00000000072A0000-0x00000000072B0000-memory.dmp

              Filesize

              64KB

            • memory/1436-1108-0x0000000008370000-0x00000000083D6000-memory.dmp

              Filesize

              408KB

            • memory/1436-1107-0x00000000082D0000-0x0000000008362000-memory.dmp

              Filesize

              584KB

            • memory/1436-1105-0x00000000072A0000-0x00000000072B0000-memory.dmp

              Filesize

              64KB

            • memory/1436-1104-0x0000000007FD0000-0x000000000800C000-memory.dmp

              Filesize

              240KB

            • memory/1436-200-0x00000000071A0000-0x00000000071DE000-memory.dmp

              Filesize

              248KB

            • memory/1436-1101-0x0000000007860000-0x0000000007E78000-memory.dmp

              Filesize

              6.1MB

            • memory/1436-228-0x00000000071A0000-0x00000000071DE000-memory.dmp

              Filesize

              248KB

            • memory/1436-226-0x00000000071A0000-0x00000000071DE000-memory.dmp

              Filesize

              248KB

            • memory/1436-224-0x00000000071A0000-0x00000000071DE000-memory.dmp

              Filesize

              248KB

            • memory/1436-222-0x00000000071A0000-0x00000000071DE000-memory.dmp

              Filesize

              248KB

            • memory/1436-204-0x00000000071A0000-0x00000000071DE000-memory.dmp

              Filesize

              248KB

            • memory/1436-218-0x00000000071A0000-0x00000000071DE000-memory.dmp

              Filesize

              248KB

            • memory/1436-216-0x00000000071A0000-0x00000000071DE000-memory.dmp

              Filesize

              248KB

            • memory/1436-191-0x0000000002CA0000-0x0000000002CEB000-memory.dmp

              Filesize

              300KB

            • memory/1436-192-0x00000000072A0000-0x00000000072B0000-memory.dmp

              Filesize

              64KB

            • memory/1436-196-0x00000000071A0000-0x00000000071DE000-memory.dmp

              Filesize

              248KB

            • memory/1436-195-0x00000000072A0000-0x00000000072B0000-memory.dmp

              Filesize

              64KB

            • memory/1436-193-0x00000000072A0000-0x00000000072B0000-memory.dmp

              Filesize

              64KB

            • memory/1436-194-0x00000000071A0000-0x00000000071DE000-memory.dmp

              Filesize

              248KB

            • memory/1436-198-0x00000000071A0000-0x00000000071DE000-memory.dmp

              Filesize

              248KB

            • memory/1436-214-0x00000000071A0000-0x00000000071DE000-memory.dmp

              Filesize

              248KB

            • memory/1436-206-0x00000000071A0000-0x00000000071DE000-memory.dmp

              Filesize

              248KB

            • memory/1436-220-0x00000000071A0000-0x00000000071DE000-memory.dmp

              Filesize

              248KB

            • memory/1436-202-0x00000000071A0000-0x00000000071DE000-memory.dmp

              Filesize

              248KB

            • memory/1436-208-0x00000000071A0000-0x00000000071DE000-memory.dmp

              Filesize

              248KB

            • memory/1436-210-0x00000000071A0000-0x00000000071DE000-memory.dmp

              Filesize

              248KB

            • memory/1436-212-0x00000000071A0000-0x00000000071DE000-memory.dmp

              Filesize

              248KB

            • memory/2244-1122-0x0000000000B00000-0x0000000000B32000-memory.dmp

              Filesize

              200KB

            • memory/2244-1123-0x0000000005710000-0x0000000005720000-memory.dmp

              Filesize

              64KB

            • memory/2396-157-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/2396-149-0x0000000007390000-0x0000000007934000-memory.dmp

              Filesize

              5.6MB

            • memory/2396-185-0x0000000007380000-0x0000000007390000-memory.dmp

              Filesize

              64KB

            • memory/2396-184-0x0000000007380000-0x0000000007390000-memory.dmp

              Filesize

              64KB

            • memory/2396-183-0x0000000007380000-0x0000000007390000-memory.dmp

              Filesize

              64KB

            • memory/2396-181-0x0000000000400000-0x0000000002BBD000-memory.dmp

              Filesize

              39.7MB

            • memory/2396-180-0x0000000007380000-0x0000000007390000-memory.dmp

              Filesize

              64KB

            • memory/2396-150-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/2396-179-0x0000000007380000-0x0000000007390000-memory.dmp

              Filesize

              64KB

            • memory/2396-155-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/2396-178-0x0000000007380000-0x0000000007390000-memory.dmp

              Filesize

              64KB

            • memory/2396-186-0x0000000000400000-0x0000000002BBD000-memory.dmp

              Filesize

              39.7MB

            • memory/2396-175-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/2396-169-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/2396-173-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/2396-167-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/2396-165-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/2396-163-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/2396-161-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/2396-159-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/2396-177-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/2396-171-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/2396-148-0x0000000002BC0000-0x0000000002BED000-memory.dmp

              Filesize

              180KB

            • memory/2396-153-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/2396-151-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB