Analysis

  • max time kernel
    97s
  • max time network
    135s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    26-05-2023 02:30

General

  • Target

    87407369b0a7986b7f658e4790a6d3c25af9bb92dab855ee74b03615e2ae9ad8.exe

  • Size

    768KB

  • MD5

    dac614ede68f425a7bb6b5a5d20c0ebf

  • SHA1

    164d82064c0785c18313cc58af730a193975ed9c

  • SHA256

    87407369b0a7986b7f658e4790a6d3c25af9bb92dab855ee74b03615e2ae9ad8

  • SHA512

    d8f41390dd59379d59c5657a8d502978fdbc2621075aed40941b12af961f107578f079b67144e3dddbac5f08fbc2649c5e33266b0a8b9d0fecfcbb9425b4396d

  • SSDEEP

    12288:+Mr1y90JXiT7NpjVg8wxGWHO5QpIiV2TSlczIoQVnCxAVEMAKBWSkBgTnMMtIW+p:7yKEbhmUWH8Q6622+ImJ8dkWTMM1+x3

Malware Config

Extracted

Family

redline

Botnet

dina

C2

83.97.73.122:19062

Attributes
  • auth_value

    4f77073adc624269de1bff760b9bc471

Extracted

Family

redline

Botnet

greg

C2

83.97.73.122:19062

Attributes
  • auth_value

    4c966a90781c6b4ab7f512d018696362

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\87407369b0a7986b7f658e4790a6d3c25af9bb92dab855ee74b03615e2ae9ad8.exe
    "C:\Users\Admin\AppData\Local\Temp\87407369b0a7986b7f658e4790a6d3c25af9bb92dab855ee74b03615e2ae9ad8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3476
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8722039.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8722039.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4048
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8578709.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8578709.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4116
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k7492887.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k7492887.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4236
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5100
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l1595805.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l1595805.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2928
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m9689039.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m9689039.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1504
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4776
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metado.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:3592
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metado.exe" /P "Admin:N"&&CACLS "metado.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4044
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:3852
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metado.exe" /P "Admin:N"
                6⤵
                  PID:4396
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "metado.exe" /P "Admin:R" /E
                  6⤵
                    PID:3468
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:3136
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\a9e2a16078" /P "Admin:N"
                      6⤵
                        PID:4964
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:3332
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:2108
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n8238516.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n8238516.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:4492
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3908
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:860
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:2096

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                Filesize

                226B

                MD5

                957779c42144282d8cd83192b8fbc7cf

                SHA1

                de83d08d2cca06b9ff3d1ef239d6b60b705d25fe

                SHA256

                0d7ca7ba65e2b465e4878e324ceab8f8981f5ec06dcf5bc32559a4467a9c7d51

                SHA512

                f1549c61b4f2906d13b2aabb74772c2bc826cd42373d7bb6c48cbb125d5aa2ec17617e6b5e67e8aae3bb5790cc831cdba48a45008ed01df4fba8be448cce39fd

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n8238516.exe

                Filesize

                322KB

                MD5

                6fa64a48369aec5f36b0c002cd09d600

                SHA1

                4080b0fcf83a145907ee71c761b53807144fddac

                SHA256

                16f4b6c83386e0d146436ecfea676292ce01d18aebd6ac2c5824bbdb0b96ae01

                SHA512

                9c698ccaeeee5cbc98c467b4afac0caf88483d69be8e95764f25202d6b035cc9763417c4f98774988996ef86c3cc28dc988b2f634b776e873057ea19f934c589

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n8238516.exe

                Filesize

                322KB

                MD5

                6fa64a48369aec5f36b0c002cd09d600

                SHA1

                4080b0fcf83a145907ee71c761b53807144fddac

                SHA256

                16f4b6c83386e0d146436ecfea676292ce01d18aebd6ac2c5824bbdb0b96ae01

                SHA512

                9c698ccaeeee5cbc98c467b4afac0caf88483d69be8e95764f25202d6b035cc9763417c4f98774988996ef86c3cc28dc988b2f634b776e873057ea19f934c589

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8722039.exe

                Filesize

                449KB

                MD5

                4851986446b01ecc38f2ec124819d776

                SHA1

                8f350c7a4256444f6b4757e8b47ff7b5ce7b6440

                SHA256

                359a215275026ab78b8a6a3c8281c2cab304cb82916ca1e15ec516e344d9ef96

                SHA512

                8d9e2536c2f698ac3c59fe4bcd88f6ac17568a9c1db39de235311bd92e32b32cae75b2fd126e0b6f6a71aac5fea782e80704dfb24bf5b7aea9c958cf6c700c52

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8722039.exe

                Filesize

                449KB

                MD5

                4851986446b01ecc38f2ec124819d776

                SHA1

                8f350c7a4256444f6b4757e8b47ff7b5ce7b6440

                SHA256

                359a215275026ab78b8a6a3c8281c2cab304cb82916ca1e15ec516e344d9ef96

                SHA512

                8d9e2536c2f698ac3c59fe4bcd88f6ac17568a9c1db39de235311bd92e32b32cae75b2fd126e0b6f6a71aac5fea782e80704dfb24bf5b7aea9c958cf6c700c52

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m9689039.exe

                Filesize

                205KB

                MD5

                76d0d5bf120e26e7cee390ec3f0b24c0

                SHA1

                7d6298cdc6e44b376ccc85727d5c07710f9e2e04

                SHA256

                c3eebea3ebed794cba316677ee62ef7af1289a3263695e65c2675fe2a1d991cb

                SHA512

                4e4d7c0748ed14568e3cdfc5f220f172ab9514e9277fa66f5ab9417c5dcd88fb25699a8b6350eb985a3ded3bc1c7a0957e7a3922ac3ef90750a3c2ceec7358c4

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m9689039.exe

                Filesize

                205KB

                MD5

                76d0d5bf120e26e7cee390ec3f0b24c0

                SHA1

                7d6298cdc6e44b376ccc85727d5c07710f9e2e04

                SHA256

                c3eebea3ebed794cba316677ee62ef7af1289a3263695e65c2675fe2a1d991cb

                SHA512

                4e4d7c0748ed14568e3cdfc5f220f172ab9514e9277fa66f5ab9417c5dcd88fb25699a8b6350eb985a3ded3bc1c7a0957e7a3922ac3ef90750a3c2ceec7358c4

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8578709.exe

                Filesize

                277KB

                MD5

                4569c57633be23e2d21dd33e40839a8e

                SHA1

                454db1bb8fb353af477b86021c1852b6c4cb2849

                SHA256

                95d11281200a02ead225ad5cb784d908ef1529326af77f70eb775249a94638cd

                SHA512

                35935ee553d362d3e14995c257635f429c26b528700c71751c9c3158f82a1594745160901654212871a431255192e702e43749f3686c7d4da2ab3e0c9875928d

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y8578709.exe

                Filesize

                277KB

                MD5

                4569c57633be23e2d21dd33e40839a8e

                SHA1

                454db1bb8fb353af477b86021c1852b6c4cb2849

                SHA256

                95d11281200a02ead225ad5cb784d908ef1529326af77f70eb775249a94638cd

                SHA512

                35935ee553d362d3e14995c257635f429c26b528700c71751c9c3158f82a1594745160901654212871a431255192e702e43749f3686c7d4da2ab3e0c9875928d

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k7492887.exe

                Filesize

                188KB

                MD5

                643831d2b96503170f63674c45a4f84c

                SHA1

                5b9dabe2d0626de8789071aede0adbd540fedcff

                SHA256

                f12f8c7d5b62e19604fee4d4cdd15bc8a2ffd7633c0a7ed11e9a5be0c95e6c32

                SHA512

                d85b2d4aa5da215857abe13d9ad4589b0aacd1d61ca161ad8f6da44ce1177c8bbf24182385090332a42cd41644d3182dd39e4de2d5633cddf495de9aa88131c6

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k7492887.exe

                Filesize

                188KB

                MD5

                643831d2b96503170f63674c45a4f84c

                SHA1

                5b9dabe2d0626de8789071aede0adbd540fedcff

                SHA256

                f12f8c7d5b62e19604fee4d4cdd15bc8a2ffd7633c0a7ed11e9a5be0c95e6c32

                SHA512

                d85b2d4aa5da215857abe13d9ad4589b0aacd1d61ca161ad8f6da44ce1177c8bbf24182385090332a42cd41644d3182dd39e4de2d5633cddf495de9aa88131c6

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l1595805.exe

                Filesize

                146KB

                MD5

                85f68bff05a513a6e52512c4a52d6e45

                SHA1

                5f33345a015bbb2e33f7f016d39786639ee0333e

                SHA256

                b863e5740508b4dd87cc8b32f495f364e6dd6bc09d1efe56060d61ec0a654448

                SHA512

                82078d11eb17355d1e285898686aef11e6dd89616e868151e804bde8f9c68f6a5d93cd0d7b426c0edb2bf38016297cbf4ccbf0c88151e5f7c61d6a923d676f57

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l1595805.exe

                Filesize

                146KB

                MD5

                85f68bff05a513a6e52512c4a52d6e45

                SHA1

                5f33345a015bbb2e33f7f016d39786639ee0333e

                SHA256

                b863e5740508b4dd87cc8b32f495f364e6dd6bc09d1efe56060d61ec0a654448

                SHA512

                82078d11eb17355d1e285898686aef11e6dd89616e868151e804bde8f9c68f6a5d93cd0d7b426c0edb2bf38016297cbf4ccbf0c88151e5f7c61d6a923d676f57

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                205KB

                MD5

                76d0d5bf120e26e7cee390ec3f0b24c0

                SHA1

                7d6298cdc6e44b376ccc85727d5c07710f9e2e04

                SHA256

                c3eebea3ebed794cba316677ee62ef7af1289a3263695e65c2675fe2a1d991cb

                SHA512

                4e4d7c0748ed14568e3cdfc5f220f172ab9514e9277fa66f5ab9417c5dcd88fb25699a8b6350eb985a3ded3bc1c7a0957e7a3922ac3ef90750a3c2ceec7358c4

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                205KB

                MD5

                76d0d5bf120e26e7cee390ec3f0b24c0

                SHA1

                7d6298cdc6e44b376ccc85727d5c07710f9e2e04

                SHA256

                c3eebea3ebed794cba316677ee62ef7af1289a3263695e65c2675fe2a1d991cb

                SHA512

                4e4d7c0748ed14568e3cdfc5f220f172ab9514e9277fa66f5ab9417c5dcd88fb25699a8b6350eb985a3ded3bc1c7a0957e7a3922ac3ef90750a3c2ceec7358c4

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                205KB

                MD5

                76d0d5bf120e26e7cee390ec3f0b24c0

                SHA1

                7d6298cdc6e44b376ccc85727d5c07710f9e2e04

                SHA256

                c3eebea3ebed794cba316677ee62ef7af1289a3263695e65c2675fe2a1d991cb

                SHA512

                4e4d7c0748ed14568e3cdfc5f220f172ab9514e9277fa66f5ab9417c5dcd88fb25699a8b6350eb985a3ded3bc1c7a0957e7a3922ac3ef90750a3c2ceec7358c4

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                205KB

                MD5

                76d0d5bf120e26e7cee390ec3f0b24c0

                SHA1

                7d6298cdc6e44b376ccc85727d5c07710f9e2e04

                SHA256

                c3eebea3ebed794cba316677ee62ef7af1289a3263695e65c2675fe2a1d991cb

                SHA512

                4e4d7c0748ed14568e3cdfc5f220f172ab9514e9277fa66f5ab9417c5dcd88fb25699a8b6350eb985a3ded3bc1c7a0957e7a3922ac3ef90750a3c2ceec7358c4

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                205KB

                MD5

                76d0d5bf120e26e7cee390ec3f0b24c0

                SHA1

                7d6298cdc6e44b376ccc85727d5c07710f9e2e04

                SHA256

                c3eebea3ebed794cba316677ee62ef7af1289a3263695e65c2675fe2a1d991cb

                SHA512

                4e4d7c0748ed14568e3cdfc5f220f172ab9514e9277fa66f5ab9417c5dcd88fb25699a8b6350eb985a3ded3bc1c7a0957e7a3922ac3ef90750a3c2ceec7358c4

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • memory/2928-151-0x0000000005120000-0x0000000005726000-memory.dmp

                Filesize

                6.0MB

              • memory/2928-155-0x0000000004D70000-0x0000000004DBB000-memory.dmp

                Filesize

                300KB

              • memory/2928-185-0x0000000004F20000-0x0000000004F30000-memory.dmp

                Filesize

                64KB

              • memory/2928-184-0x0000000006420000-0x00000000065E2000-memory.dmp

                Filesize

                1.8MB

              • memory/2928-169-0x0000000005C80000-0x0000000005CD0000-memory.dmp

                Filesize

                320KB

              • memory/2928-168-0x00000000061D0000-0x0000000006246000-memory.dmp

                Filesize

                472KB

              • memory/2928-167-0x0000000005030000-0x0000000005096000-memory.dmp

                Filesize

                408KB

              • memory/2928-166-0x0000000005CD0000-0x00000000061CE000-memory.dmp

                Filesize

                5.0MB

              • memory/2928-165-0x0000000005730000-0x00000000057C2000-memory.dmp

                Filesize

                584KB

              • memory/2928-150-0x0000000000340000-0x000000000036A000-memory.dmp

                Filesize

                168KB

              • memory/2928-156-0x0000000004F20000-0x0000000004F30000-memory.dmp

                Filesize

                64KB

              • memory/2928-152-0x0000000004C60000-0x0000000004D6A000-memory.dmp

                Filesize

                1.0MB

              • memory/2928-153-0x0000000004B90000-0x0000000004BA2000-memory.dmp

                Filesize

                72KB

              • memory/2928-186-0x0000000006B20000-0x000000000704C000-memory.dmp

                Filesize

                5.2MB

              • memory/2928-154-0x0000000004BF0000-0x0000000004C2E000-memory.dmp

                Filesize

                248KB

              • memory/3908-216-0x0000000009620000-0x0000000009630000-memory.dmp

                Filesize

                64KB

              • memory/3908-211-0x0000000009460000-0x00000000094AB000-memory.dmp

                Filesize

                300KB

              • memory/3908-202-0x0000000000400000-0x000000000042A000-memory.dmp

                Filesize

                168KB

              • memory/5100-139-0x0000000000400000-0x000000000040A000-memory.dmp

                Filesize

                40KB