Analysis

  • max time kernel
    149s
  • max time network
    135s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28/05/2023, 13:06

General

  • Target

    a398615808e914a00ab6191c24aa2650a365c2a7cae557ebbebff5c358460f52.exe

  • Size

    781KB

  • MD5

    75125213b788d38e0dbed383aca05793

  • SHA1

    ad956da5ded37addb0284f2aabd16749d9202063

  • SHA256

    a398615808e914a00ab6191c24aa2650a365c2a7cae557ebbebff5c358460f52

  • SHA512

    e5c50fb7a7df844c2018e90e7cc0342538c990bfe062804c3852a2ab9738d91471943ce4fd26fc8e0bbe6b3608238fa384bc23197875dac3226bf69b13ee6f6a

  • SSDEEP

    12288:NMrSy90aosIWYP9rZIFBC6t3iuS/lwztByatrgq7CcQbAEuegZ:ny3oBW+IFBC3wztdtUCCcQQ/

Malware Config

Extracted

Family

redline

Botnet

daswa

C2

83.97.73.127:19062

Attributes
  • auth_value

    a6ab6b8df5480a0bb295d3c069f67bf8

Extracted

Family

redline

Botnet

mirko

C2

83.97.73.127:19062

Attributes
  • auth_value

    35111a095377107ec8b7d3e035831af8

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a398615808e914a00ab6191c24aa2650a365c2a7cae557ebbebff5c358460f52.exe
    "C:\Users\Admin\AppData\Local\Temp\a398615808e914a00ab6191c24aa2650a365c2a7cae557ebbebff5c358460f52.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3704
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3580338.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3580338.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2240
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6978931.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6978931.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4596
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1231845.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1231845.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5024
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3692884.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3692884.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4380
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4188
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3560923.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3560923.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:2232
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1296
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metado.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:4800
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metado.exe" /P "Admin:N"&&CACLS "metado.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3652
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:2652
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metado.exe" /P "Admin:N"
                6⤵
                  PID:3796
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "metado.exe" /P "Admin:R" /E
                  6⤵
                    PID:2976
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "..\a9e2a16078" /P "Admin:N"
                    6⤵
                      PID:4480
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      6⤵
                        PID:4504
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:4536
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:372
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0979807.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0979807.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:4232
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1376
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:2128
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:4044

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0979807.exe

                Filesize

                326KB

                MD5

                0bbf250cee7558ef82b5bf9966309a96

                SHA1

                927ce7431d27bc81d63ff1fc5f9abc126b7f9de3

                SHA256

                5db85aedfb1453447bcfff699736029adb0f173de0f6a737442bc41ac3c9f004

                SHA512

                5e318035f788b81733946450ddcebb908ce8b3c3347a607f317a1fc9e8e6c8edbfaa922d46a47565a2be0092e76a9d564e6c8ae8991c6ac981949c25e39b08fb

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i0979807.exe

                Filesize

                326KB

                MD5

                0bbf250cee7558ef82b5bf9966309a96

                SHA1

                927ce7431d27bc81d63ff1fc5f9abc126b7f9de3

                SHA256

                5db85aedfb1453447bcfff699736029adb0f173de0f6a737442bc41ac3c9f004

                SHA512

                5e318035f788b81733946450ddcebb908ce8b3c3347a607f317a1fc9e8e6c8edbfaa922d46a47565a2be0092e76a9d564e6c8ae8991c6ac981949c25e39b08fb

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3580338.exe

                Filesize

                462KB

                MD5

                484174ccc87a1b6548b0a4103abcba67

                SHA1

                04b7c55aee6f5cdac274754e3a6dd2ded003a1ae

                SHA256

                069c60e19e29c56dc9e30ec9a187c25c8653826d07ce4f9073f2316f50e0f90d

                SHA512

                bb8214fcf79351e24985c6826b4f99d65d71d536e3d1ced2c80a08a952a1358e3ee1647a683c1309a559e032a3c37cd4a3e6dad578eb03203fe1e12019e2b1ae

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3580338.exe

                Filesize

                462KB

                MD5

                484174ccc87a1b6548b0a4103abcba67

                SHA1

                04b7c55aee6f5cdac274754e3a6dd2ded003a1ae

                SHA256

                069c60e19e29c56dc9e30ec9a187c25c8653826d07ce4f9073f2316f50e0f90d

                SHA512

                bb8214fcf79351e24985c6826b4f99d65d71d536e3d1ced2c80a08a952a1358e3ee1647a683c1309a559e032a3c37cd4a3e6dad578eb03203fe1e12019e2b1ae

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3560923.exe

                Filesize

                208KB

                MD5

                fe09b04f0353e346dab2b8fcecc4d11b

                SHA1

                3742e64b1155e84d7c469b61fbe394aaba1f3550

                SHA256

                c3a4f6522880f0cb371fadae0503ecf4e62376eb4b3ca6a416940572834e4674

                SHA512

                aa99f420b362a2cb2298b0e2331cef9cc666f7923cbd9cae576b537240a09b5a895183b701398fe59967ca25cd26429d3550d4b2058dcd5b8c05c087b8e4fc06

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3560923.exe

                Filesize

                208KB

                MD5

                fe09b04f0353e346dab2b8fcecc4d11b

                SHA1

                3742e64b1155e84d7c469b61fbe394aaba1f3550

                SHA256

                c3a4f6522880f0cb371fadae0503ecf4e62376eb4b3ca6a416940572834e4674

                SHA512

                aa99f420b362a2cb2298b0e2331cef9cc666f7923cbd9cae576b537240a09b5a895183b701398fe59967ca25cd26429d3550d4b2058dcd5b8c05c087b8e4fc06

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6978931.exe

                Filesize

                290KB

                MD5

                cf625d3503ab8473517c514c40863aea

                SHA1

                43e7daca0cb86a1d6a2493f7ae2450b57864d76a

                SHA256

                d3fddabcdbd531b048d2826d1fc60b11f51b04a46afdf554dc91dc5b60462805

                SHA512

                a0e99e5731bbd1f561cec90e9dcac6fc196a559858dedc0f743ccc5b029239d7b5f4c2bfc41414a0d7eb481dc6bca05a4348dd867178d58b8ec9d9dbd3aaf2c1

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6978931.exe

                Filesize

                290KB

                MD5

                cf625d3503ab8473517c514c40863aea

                SHA1

                43e7daca0cb86a1d6a2493f7ae2450b57864d76a

                SHA256

                d3fddabcdbd531b048d2826d1fc60b11f51b04a46afdf554dc91dc5b60462805

                SHA512

                a0e99e5731bbd1f561cec90e9dcac6fc196a559858dedc0f743ccc5b029239d7b5f4c2bfc41414a0d7eb481dc6bca05a4348dd867178d58b8ec9d9dbd3aaf2c1

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1231845.exe

                Filesize

                168KB

                MD5

                59e84a61090725516b13f937b1669d73

                SHA1

                1c1cd6f265e9affab339b6e902fe69add8abceb3

                SHA256

                f3871d23339fc89206a47a9970a2d030c0961fd91c1ac253a8e12c59982a73c9

                SHA512

                ea0916b22b4554cc27a99f7456cb99e4d346882ba514d418f12c2b752ea85f9573d7c38323663ffe27faf1ec5bdb01e28558f568f5421c1ea34342d97f6a0b69

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1231845.exe

                Filesize

                168KB

                MD5

                59e84a61090725516b13f937b1669d73

                SHA1

                1c1cd6f265e9affab339b6e902fe69add8abceb3

                SHA256

                f3871d23339fc89206a47a9970a2d030c0961fd91c1ac253a8e12c59982a73c9

                SHA512

                ea0916b22b4554cc27a99f7456cb99e4d346882ba514d418f12c2b752ea85f9573d7c38323663ffe27faf1ec5bdb01e28558f568f5421c1ea34342d97f6a0b69

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3692884.exe

                Filesize

                193KB

                MD5

                6cadd8400d0ff6179a1f3b0358c657ef

                SHA1

                64f4365c6ece54f4dba29bcdea116b864393b33f

                SHA256

                349ed4bcd9a73cf23e5b3b51b2a5efc6a38307121e6805f9008058bbcd1fe82d

                SHA512

                d10597021baa02d06f2472a58d67656773793a8add2aa16d50eab974148d45de025f309476c11bf951baf988fdadbebdbdb3d601f899aa9eaa835e2b7256b58b

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3692884.exe

                Filesize

                193KB

                MD5

                6cadd8400d0ff6179a1f3b0358c657ef

                SHA1

                64f4365c6ece54f4dba29bcdea116b864393b33f

                SHA256

                349ed4bcd9a73cf23e5b3b51b2a5efc6a38307121e6805f9008058bbcd1fe82d

                SHA512

                d10597021baa02d06f2472a58d67656773793a8add2aa16d50eab974148d45de025f309476c11bf951baf988fdadbebdbdb3d601f899aa9eaa835e2b7256b58b

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                208KB

                MD5

                fe09b04f0353e346dab2b8fcecc4d11b

                SHA1

                3742e64b1155e84d7c469b61fbe394aaba1f3550

                SHA256

                c3a4f6522880f0cb371fadae0503ecf4e62376eb4b3ca6a416940572834e4674

                SHA512

                aa99f420b362a2cb2298b0e2331cef9cc666f7923cbd9cae576b537240a09b5a895183b701398fe59967ca25cd26429d3550d4b2058dcd5b8c05c087b8e4fc06

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                208KB

                MD5

                fe09b04f0353e346dab2b8fcecc4d11b

                SHA1

                3742e64b1155e84d7c469b61fbe394aaba1f3550

                SHA256

                c3a4f6522880f0cb371fadae0503ecf4e62376eb4b3ca6a416940572834e4674

                SHA512

                aa99f420b362a2cb2298b0e2331cef9cc666f7923cbd9cae576b537240a09b5a895183b701398fe59967ca25cd26429d3550d4b2058dcd5b8c05c087b8e4fc06

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                208KB

                MD5

                fe09b04f0353e346dab2b8fcecc4d11b

                SHA1

                3742e64b1155e84d7c469b61fbe394aaba1f3550

                SHA256

                c3a4f6522880f0cb371fadae0503ecf4e62376eb4b3ca6a416940572834e4674

                SHA512

                aa99f420b362a2cb2298b0e2331cef9cc666f7923cbd9cae576b537240a09b5a895183b701398fe59967ca25cd26429d3550d4b2058dcd5b8c05c087b8e4fc06

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                208KB

                MD5

                fe09b04f0353e346dab2b8fcecc4d11b

                SHA1

                3742e64b1155e84d7c469b61fbe394aaba1f3550

                SHA256

                c3a4f6522880f0cb371fadae0503ecf4e62376eb4b3ca6a416940572834e4674

                SHA512

                aa99f420b362a2cb2298b0e2331cef9cc666f7923cbd9cae576b537240a09b5a895183b701398fe59967ca25cd26429d3550d4b2058dcd5b8c05c087b8e4fc06

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                208KB

                MD5

                fe09b04f0353e346dab2b8fcecc4d11b

                SHA1

                3742e64b1155e84d7c469b61fbe394aaba1f3550

                SHA256

                c3a4f6522880f0cb371fadae0503ecf4e62376eb4b3ca6a416940572834e4674

                SHA512

                aa99f420b362a2cb2298b0e2331cef9cc666f7923cbd9cae576b537240a09b5a895183b701398fe59967ca25cd26429d3550d4b2058dcd5b8c05c087b8e4fc06

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • \Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • memory/1376-180-0x0000000000200000-0x000000000022A000-memory.dmp

                Filesize

                168KB

              • memory/1376-188-0x0000000008AA0000-0x0000000008AEB000-memory.dmp

                Filesize

                300KB

              • memory/1376-197-0x0000000008C50000-0x0000000008C60000-memory.dmp

                Filesize

                64KB

              • memory/1376-374-0x0000000008C50000-0x0000000008C60000-memory.dmp

                Filesize

                64KB

              • memory/4188-158-0x0000000000400000-0x000000000040A000-memory.dmp

                Filesize

                40KB

              • memory/5024-141-0x0000000004B40000-0x0000000004B52000-memory.dmp

                Filesize

                72KB

              • memory/5024-152-0x0000000008440000-0x000000000896C000-memory.dmp

                Filesize

                5.2MB

              • memory/5024-151-0x00000000066C0000-0x0000000006882000-memory.dmp

                Filesize

                1.8MB

              • memory/5024-150-0x0000000004B80000-0x0000000004B90000-memory.dmp

                Filesize

                64KB

              • memory/5024-149-0x0000000005D10000-0x0000000005D60000-memory.dmp

                Filesize

                320KB

              • memory/5024-148-0x00000000061C0000-0x00000000066BE000-memory.dmp

                Filesize

                5.0MB

              • memory/5024-147-0x0000000004F50000-0x0000000004FB6000-memory.dmp

                Filesize

                408KB

              • memory/5024-146-0x0000000004FF0000-0x0000000005082000-memory.dmp

                Filesize

                584KB

              • memory/5024-145-0x0000000004ED0000-0x0000000004F46000-memory.dmp

                Filesize

                472KB

              • memory/5024-144-0x0000000004C10000-0x0000000004C5B000-memory.dmp

                Filesize

                300KB

              • memory/5024-143-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

                Filesize

                248KB

              • memory/5024-142-0x0000000004B80000-0x0000000004B90000-memory.dmp

                Filesize

                64KB

              • memory/5024-140-0x0000000004CA0000-0x0000000004DAA000-memory.dmp

                Filesize

                1.0MB

              • memory/5024-139-0x00000000051A0000-0x00000000057A6000-memory.dmp

                Filesize

                6.0MB

              • memory/5024-138-0x0000000004AF0000-0x0000000004AF6000-memory.dmp

                Filesize

                24KB

              • memory/5024-137-0x0000000000240000-0x000000000026E000-memory.dmp

                Filesize

                184KB