Analysis

  • max time kernel
    136s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-05-2023 16:45

General

  • Target

    b9c6211f34ba33e9c759fdc57cd9785d90e72d87738d9a66b96bf17bcaa5db99.exe

  • Size

    770KB

  • MD5

    2ca68d65a58f5698ec51e3ce1d21e486

  • SHA1

    0d9660c2eeb22f1198ca9d6d4b4edd2350736e1b

  • SHA256

    b9c6211f34ba33e9c759fdc57cd9785d90e72d87738d9a66b96bf17bcaa5db99

  • SHA512

    ae3242c1cd9224622c508e4604ac162c5ad992e67f39607c89fbdfcf3aa6b5d70f951afaa4ea4e9268fa819e55b23f53feeae26ae90ff22742ab4aa625ee45d9

  • SSDEEP

    12288:uMrgy902v0roTgPffJFCLmMyPNG6XAHE/h0/Gh/okT/kwjsKQ:6yHTTg3fJFCLm+k/h0aDbRjs3

Malware Config

Extracted

Family

redline

Botnet

disa

C2

83.97.73.122:19062

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Extracted

Family

redline

Botnet

goga

C2

83.97.73.122:19062

Attributes
  • auth_value

    6d57dff6d3c42dddb8a76dc276b8467f

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9c6211f34ba33e9c759fdc57cd9785d90e72d87738d9a66b96bf17bcaa5db99.exe
    "C:\Users\Admin\AppData\Local\Temp\b9c6211f34ba33e9c759fdc57cd9785d90e72d87738d9a66b96bf17bcaa5db99.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3784
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4569131.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4569131.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4044
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2747457.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2747457.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4020
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1320277.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1320277.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2948
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3847435.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3847435.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2376
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5096
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9939498.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9939498.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4920
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4100
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metado.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:1136
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metado.exe" /P "Admin:N"&&CACLS "metado.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3308
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:4616
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metado.exe" /P "Admin:N"
                6⤵
                  PID:4868
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "metado.exe" /P "Admin:R" /E
                  6⤵
                    PID:3428
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:2140
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\a9e2a16078" /P "Admin:N"
                      6⤵
                        PID:4484
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:2796
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:3236
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5965279.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5965279.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:3148
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1988
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:2528
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:1512

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                Filesize

                226B

                MD5

                916851e072fbabc4796d8916c5131092

                SHA1

                d48a602229a690c512d5fdaf4c8d77547a88e7a2

                SHA256

                7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                SHA512

                07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5965279.exe

                Filesize

                314KB

                MD5

                e8200e4029533c1216c73223b44b0c83

                SHA1

                f0ea4280e498cc077116195014e2146500934f91

                SHA256

                4babd9a55d6e090f98813775d7224a39a94afd016c1606f7ef0e39fb3184c8fe

                SHA512

                dccbebebcbfba1d1a639031542fa3c3030356d19c821bf3d32baf75cc04b19e77a9fe334e9c38dfe2817d8728f3e96c9c88caf4c028faa15c9adea4a22ef6e01

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5965279.exe

                Filesize

                314KB

                MD5

                e8200e4029533c1216c73223b44b0c83

                SHA1

                f0ea4280e498cc077116195014e2146500934f91

                SHA256

                4babd9a55d6e090f98813775d7224a39a94afd016c1606f7ef0e39fb3184c8fe

                SHA512

                dccbebebcbfba1d1a639031542fa3c3030356d19c821bf3d32baf75cc04b19e77a9fe334e9c38dfe2817d8728f3e96c9c88caf4c028faa15c9adea4a22ef6e01

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4569131.exe

                Filesize

                449KB

                MD5

                c10a9fe61a6dbd915f0334fb1b545092

                SHA1

                751405bd711325b7d4632ea45c43c084775fa325

                SHA256

                c694a674226ee746e0c81df46330bef9c57a1863fafd08a77c934b90085806cc

                SHA512

                3fc25ddf8bc45a783a8253be7eef27f02f5d67964217bd920c82e698fcec2c1b9c5c82386895b663d1348e46962b3e1cb6fffc92831159f437654e8702509015

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4569131.exe

                Filesize

                449KB

                MD5

                c10a9fe61a6dbd915f0334fb1b545092

                SHA1

                751405bd711325b7d4632ea45c43c084775fa325

                SHA256

                c694a674226ee746e0c81df46330bef9c57a1863fafd08a77c934b90085806cc

                SHA512

                3fc25ddf8bc45a783a8253be7eef27f02f5d67964217bd920c82e698fcec2c1b9c5c82386895b663d1348e46962b3e1cb6fffc92831159f437654e8702509015

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9939498.exe

                Filesize

                206KB

                MD5

                c79acec945a7b5e3e62868b776066611

                SHA1

                4f27797e32e3a58d97142bebdc5a382a6651a04a

                SHA256

                6fc50e3aeee48b437a8f48176ea14b38f3a370b779df0660bd3c07f0d94937b0

                SHA512

                336f1bbec38c3dff8fd3f7efb567988db8e92e905fb42814148cd73d229345f386f646b23c31b1e5f9229fda88e1f32158ff5c531bf829bb7b07454d765da3ba

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9939498.exe

                Filesize

                206KB

                MD5

                c79acec945a7b5e3e62868b776066611

                SHA1

                4f27797e32e3a58d97142bebdc5a382a6651a04a

                SHA256

                6fc50e3aeee48b437a8f48176ea14b38f3a370b779df0660bd3c07f0d94937b0

                SHA512

                336f1bbec38c3dff8fd3f7efb567988db8e92e905fb42814148cd73d229345f386f646b23c31b1e5f9229fda88e1f32158ff5c531bf829bb7b07454d765da3ba

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2747457.exe

                Filesize

                277KB

                MD5

                f489aed4c65f018430eb90bb6ba6bde2

                SHA1

                bdbb3927cfd566f4c03c8cf18ec16e2dba07c156

                SHA256

                02310d94123646e932dca6c0eafb54b14a0b6fef1da44aaeec1b718a9cb04691

                SHA512

                a8984493c6f2ea60901f42cf038e91375053468d2451a2590e9b75eaf70dee4735bffa0a084cb139a3bf8916b7eba7fd2cb49f39da07e382c67cc99e0e089621

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2747457.exe

                Filesize

                277KB

                MD5

                f489aed4c65f018430eb90bb6ba6bde2

                SHA1

                bdbb3927cfd566f4c03c8cf18ec16e2dba07c156

                SHA256

                02310d94123646e932dca6c0eafb54b14a0b6fef1da44aaeec1b718a9cb04691

                SHA512

                a8984493c6f2ea60901f42cf038e91375053468d2451a2590e9b75eaf70dee4735bffa0a084cb139a3bf8916b7eba7fd2cb49f39da07e382c67cc99e0e089621

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1320277.exe

                Filesize

                145KB

                MD5

                9a914fd98b7d36f5ef4f3b45274bdc63

                SHA1

                2847efdfba4a1d82e862f1da3f643008dd7f6126

                SHA256

                59f3acbd2674f09afd06877d24e90b79d7aaef62599efe0a23acb7e6d6542ad2

                SHA512

                d98568d3d3acc3aafb98f7b97d0fec52f010cf89c9eedfcf9b7969ebe6aaba5998a6d535f30313f9e1298c7a94152fb0f8edaace9a86fabc9bfd8658af211e80

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1320277.exe

                Filesize

                145KB

                MD5

                9a914fd98b7d36f5ef4f3b45274bdc63

                SHA1

                2847efdfba4a1d82e862f1da3f643008dd7f6126

                SHA256

                59f3acbd2674f09afd06877d24e90b79d7aaef62599efe0a23acb7e6d6542ad2

                SHA512

                d98568d3d3acc3aafb98f7b97d0fec52f010cf89c9eedfcf9b7969ebe6aaba5998a6d535f30313f9e1298c7a94152fb0f8edaace9a86fabc9bfd8658af211e80

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3847435.exe

                Filesize

                180KB

                MD5

                2b5085c5ae69c814097928c1cf25eae4

                SHA1

                75472528a0e26ec33a85d2d890c14b84474835ad

                SHA256

                0f53c1c65a8aa250258a2f5c0ae15f5213d2cada03ab0b785f82378c5efcef7e

                SHA512

                8f92c46134d36ca697fa557b1ce8744719cf61e9c67782a0934e2e683d52bd6c08c725579e9c526fb7e230cb23adfe4ea9082ed04cf3b77f8ecc3d4674413906

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3847435.exe

                Filesize

                180KB

                MD5

                2b5085c5ae69c814097928c1cf25eae4

                SHA1

                75472528a0e26ec33a85d2d890c14b84474835ad

                SHA256

                0f53c1c65a8aa250258a2f5c0ae15f5213d2cada03ab0b785f82378c5efcef7e

                SHA512

                8f92c46134d36ca697fa557b1ce8744719cf61e9c67782a0934e2e683d52bd6c08c725579e9c526fb7e230cb23adfe4ea9082ed04cf3b77f8ecc3d4674413906

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                206KB

                MD5

                c79acec945a7b5e3e62868b776066611

                SHA1

                4f27797e32e3a58d97142bebdc5a382a6651a04a

                SHA256

                6fc50e3aeee48b437a8f48176ea14b38f3a370b779df0660bd3c07f0d94937b0

                SHA512

                336f1bbec38c3dff8fd3f7efb567988db8e92e905fb42814148cd73d229345f386f646b23c31b1e5f9229fda88e1f32158ff5c531bf829bb7b07454d765da3ba

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                206KB

                MD5

                c79acec945a7b5e3e62868b776066611

                SHA1

                4f27797e32e3a58d97142bebdc5a382a6651a04a

                SHA256

                6fc50e3aeee48b437a8f48176ea14b38f3a370b779df0660bd3c07f0d94937b0

                SHA512

                336f1bbec38c3dff8fd3f7efb567988db8e92e905fb42814148cd73d229345f386f646b23c31b1e5f9229fda88e1f32158ff5c531bf829bb7b07454d765da3ba

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                206KB

                MD5

                c79acec945a7b5e3e62868b776066611

                SHA1

                4f27797e32e3a58d97142bebdc5a382a6651a04a

                SHA256

                6fc50e3aeee48b437a8f48176ea14b38f3a370b779df0660bd3c07f0d94937b0

                SHA512

                336f1bbec38c3dff8fd3f7efb567988db8e92e905fb42814148cd73d229345f386f646b23c31b1e5f9229fda88e1f32158ff5c531bf829bb7b07454d765da3ba

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                206KB

                MD5

                c79acec945a7b5e3e62868b776066611

                SHA1

                4f27797e32e3a58d97142bebdc5a382a6651a04a

                SHA256

                6fc50e3aeee48b437a8f48176ea14b38f3a370b779df0660bd3c07f0d94937b0

                SHA512

                336f1bbec38c3dff8fd3f7efb567988db8e92e905fb42814148cd73d229345f386f646b23c31b1e5f9229fda88e1f32158ff5c531bf829bb7b07454d765da3ba

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                206KB

                MD5

                c79acec945a7b5e3e62868b776066611

                SHA1

                4f27797e32e3a58d97142bebdc5a382a6651a04a

                SHA256

                6fc50e3aeee48b437a8f48176ea14b38f3a370b779df0660bd3c07f0d94937b0

                SHA512

                336f1bbec38c3dff8fd3f7efb567988db8e92e905fb42814148cd73d229345f386f646b23c31b1e5f9229fda88e1f32158ff5c531bf829bb7b07454d765da3ba

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • memory/1988-195-0x0000000000400000-0x000000000042A000-memory.dmp

                Filesize

                168KB

              • memory/1988-200-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

                Filesize

                64KB

              • memory/2948-157-0x0000000005920000-0x0000000005932000-memory.dmp

                Filesize

                72KB

              • memory/2948-162-0x0000000006880000-0x0000000006912000-memory.dmp

                Filesize

                584KB

              • memory/2948-167-0x0000000007A00000-0x0000000007F2C000-memory.dmp

                Filesize

                5.2MB

              • memory/2948-166-0x0000000007300000-0x00000000074C2000-memory.dmp

                Filesize

                1.8MB

              • memory/2948-165-0x0000000006B30000-0x0000000006B80000-memory.dmp

                Filesize

                320KB

              • memory/2948-164-0x0000000006AB0000-0x0000000006B26000-memory.dmp

                Filesize

                472KB

              • memory/2948-163-0x0000000005990000-0x00000000059A0000-memory.dmp

                Filesize

                64KB

              • memory/2948-154-0x0000000000F50000-0x0000000000F7A000-memory.dmp

                Filesize

                168KB

              • memory/2948-161-0x0000000006D50000-0x00000000072F4000-memory.dmp

                Filesize

                5.6MB

              • memory/2948-160-0x0000000005C90000-0x0000000005CF6000-memory.dmp

                Filesize

                408KB

              • memory/2948-159-0x0000000005990000-0x00000000059A0000-memory.dmp

                Filesize

                64KB

              • memory/2948-158-0x00000000059A0000-0x00000000059DC000-memory.dmp

                Filesize

                240KB

              • memory/2948-156-0x00000000059F0000-0x0000000005AFA000-memory.dmp

                Filesize

                1.0MB

              • memory/2948-155-0x0000000005E70000-0x0000000006488000-memory.dmp

                Filesize

                6.1MB

              • memory/5096-173-0x0000000000400000-0x000000000040A000-memory.dmp

                Filesize

                40KB