Analysis

  • max time kernel
    101s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/05/2023, 04:03

General

  • Target

    827bb4f727ed60f79b4017cba37aaaa212e0e3fcb7d70b3d784e9460316217c7.exe

  • Size

    805KB

  • MD5

    99ec9c084b0c1a7b391ae3494c570dd9

  • SHA1

    22aeff380a412fe2560a04db4d671779a1911b4e

  • SHA256

    827bb4f727ed60f79b4017cba37aaaa212e0e3fcb7d70b3d784e9460316217c7

  • SHA512

    12c6441fe62e0e811f5f1d7670905f72b8370e4befc91afaee0f0d8cd0fce210f461557915fe131eed34bcb613ba209a50e058f92f2fbadcccfc9839642ac052

  • SSDEEP

    12288:6MrEy90QxlqdtkxgW4q1PaWZGJIguoCAY5EyJ57Ifq9yEdpnEkfSzheCVn+EQ3Ua:qylT/tGJIguUysyBddy1eKnv6USK1C

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.127:19045

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Extracted

Family

redline

Botnet

metro

C2

83.97.73.127:19045

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\827bb4f727ed60f79b4017cba37aaaa212e0e3fcb7d70b3d784e9460316217c7.exe
    "C:\Users\Admin\AppData\Local\Temp\827bb4f727ed60f79b4017cba37aaaa212e0e3fcb7d70b3d784e9460316217c7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3468
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6784802.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6784802.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3520
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4369254.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4369254.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4964
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8411346.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8411346.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3968
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4972
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3197292.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3197292.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3788
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c7146554.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c7146554.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4132
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4660
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metado.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:1960
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metado.exe" /P "Admin:N"&&CACLS "metado.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1144
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:2192
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metado.exe" /P "Admin:N"
                6⤵
                  PID:5008
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "metado.exe" /P "Admin:R" /E
                  6⤵
                    PID:5096
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:2796
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\a9e2a16078" /P "Admin:N"
                      6⤵
                        PID:1724
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:808
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:4820
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5254295.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5254295.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:3348
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3020
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:2436
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:4372

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                Filesize

                226B

                MD5

                916851e072fbabc4796d8916c5131092

                SHA1

                d48a602229a690c512d5fdaf4c8d77547a88e7a2

                SHA256

                7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                SHA512

                07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5254295.exe

                Filesize

                342KB

                MD5

                6f186c6f316c26ee453e45bf17ca2435

                SHA1

                80bc35580af8f27a7440eda04ff69d41b1ab2286

                SHA256

                28a846614e3e8971f391c1f8db2d79bedffa628f822a04147c82dead7fb5f83b

                SHA512

                901b079c42e77ca0331c573b008382641d3c0d80a5484d7ef84b2276fbf3bf4e1c6934c4a198675cb594a28eff75b2923533da84b2113bdcdeffff7c122996fb

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5254295.exe

                Filesize

                342KB

                MD5

                6f186c6f316c26ee453e45bf17ca2435

                SHA1

                80bc35580af8f27a7440eda04ff69d41b1ab2286

                SHA256

                28a846614e3e8971f391c1f8db2d79bedffa628f822a04147c82dead7fb5f83b

                SHA512

                901b079c42e77ca0331c573b008382641d3c0d80a5484d7ef84b2276fbf3bf4e1c6934c4a198675cb594a28eff75b2923533da84b2113bdcdeffff7c122996fb

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6784802.exe

                Filesize

                461KB

                MD5

                809d980660ae3be774b9661b2bd6090f

                SHA1

                25e306f6560f8506b000974afaeb6493f33b638e

                SHA256

                453e8e9ee3f73436e4deaef98f8806d71a37826cd8bb2789e735dff7e5de3c8d

                SHA512

                c0ca3b817ec66edb0e3b2c297450474adfe8b0f74f7d9b705511f375942f2210c461e36c1e7204fede23bf8e49ce6fdbfd792865cdd0813e5eed476e55bc279a

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v6784802.exe

                Filesize

                461KB

                MD5

                809d980660ae3be774b9661b2bd6090f

                SHA1

                25e306f6560f8506b000974afaeb6493f33b638e

                SHA256

                453e8e9ee3f73436e4deaef98f8806d71a37826cd8bb2789e735dff7e5de3c8d

                SHA512

                c0ca3b817ec66edb0e3b2c297450474adfe8b0f74f7d9b705511f375942f2210c461e36c1e7204fede23bf8e49ce6fdbfd792865cdd0813e5eed476e55bc279a

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c7146554.exe

                Filesize

                209KB

                MD5

                3126a3208cefa3af385a95409caee8b7

                SHA1

                ecd76457b0d73f32b68222c858a3758f117d626f

                SHA256

                38db67171775669213c8cffceea57cfda97b06740bec3adab1b1e68a38a361c8

                SHA512

                756b13b6c9608b49b15d67e1ea72daa6de44bfa4c681a1a2d0e653c5be780d1d7d54733a722036bc140c2330ccc650c4058b4255ec69d6c3fa98290dabbdfc8d

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c7146554.exe

                Filesize

                209KB

                MD5

                3126a3208cefa3af385a95409caee8b7

                SHA1

                ecd76457b0d73f32b68222c858a3758f117d626f

                SHA256

                38db67171775669213c8cffceea57cfda97b06740bec3adab1b1e68a38a361c8

                SHA512

                756b13b6c9608b49b15d67e1ea72daa6de44bfa4c681a1a2d0e653c5be780d1d7d54733a722036bc140c2330ccc650c4058b4255ec69d6c3fa98290dabbdfc8d

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4369254.exe

                Filesize

                289KB

                MD5

                560c6c2a7f0d9f853f359fcfca589767

                SHA1

                bedcdd862e9a100d4057523279ebf9666129df51

                SHA256

                9bf03f59336667a7260485c6cc78fab34cd11ddd74c4b98a61f5cdaa8095d2f3

                SHA512

                c17f61f3be70b0eb79ad87ef5b88643a39772bae1785d44a20d09974958b3203213b7715e3cbad2fcde6a32311ce43d8acc8fb7ea684f1e7ffbe6551b583d072

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4369254.exe

                Filesize

                289KB

                MD5

                560c6c2a7f0d9f853f359fcfca589767

                SHA1

                bedcdd862e9a100d4057523279ebf9666129df51

                SHA256

                9bf03f59336667a7260485c6cc78fab34cd11ddd74c4b98a61f5cdaa8095d2f3

                SHA512

                c17f61f3be70b0eb79ad87ef5b88643a39772bae1785d44a20d09974958b3203213b7715e3cbad2fcde6a32311ce43d8acc8fb7ea684f1e7ffbe6551b583d072

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8411346.exe

                Filesize

                185KB

                MD5

                eef85a7efdf3b8e2652fb0150a6466ed

                SHA1

                5fe786b918ba962b6132a8aac2055f78026f04a8

                SHA256

                ce3d397303c4beeaf02c346266fa2413c4a5dcb06f286357821646159e1193c9

                SHA512

                7a62e723240daa6c9932d023eb1e40030a8654c4a47d527cbb7b588bf2ba1a842ce8950b0d96393b0ef69b4b9c7811b4921632689ac6a75542128feb81a22c47

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8411346.exe

                Filesize

                185KB

                MD5

                eef85a7efdf3b8e2652fb0150a6466ed

                SHA1

                5fe786b918ba962b6132a8aac2055f78026f04a8

                SHA256

                ce3d397303c4beeaf02c346266fa2413c4a5dcb06f286357821646159e1193c9

                SHA512

                7a62e723240daa6c9932d023eb1e40030a8654c4a47d527cbb7b588bf2ba1a842ce8950b0d96393b0ef69b4b9c7811b4921632689ac6a75542128feb81a22c47

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3197292.exe

                Filesize

                167KB

                MD5

                7eeff7070b1bf26929c8b37bfcec46e6

                SHA1

                0ffda9c7e17578d6158292171323e59d65353e5e

                SHA256

                5dc227508895ebaf2edb423ef1e5120b1074840129c91d1bee47586a1d68a1a0

                SHA512

                9f929d150adefb558fa7eb956e56193d70585c00f4e361a4acc20496247970ceb162d24e2c3e50b322415182ef824811af5f6cfc9db9eccedd0a88b9b4c1172e

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b3197292.exe

                Filesize

                167KB

                MD5

                7eeff7070b1bf26929c8b37bfcec46e6

                SHA1

                0ffda9c7e17578d6158292171323e59d65353e5e

                SHA256

                5dc227508895ebaf2edb423ef1e5120b1074840129c91d1bee47586a1d68a1a0

                SHA512

                9f929d150adefb558fa7eb956e56193d70585c00f4e361a4acc20496247970ceb162d24e2c3e50b322415182ef824811af5f6cfc9db9eccedd0a88b9b4c1172e

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                209KB

                MD5

                3126a3208cefa3af385a95409caee8b7

                SHA1

                ecd76457b0d73f32b68222c858a3758f117d626f

                SHA256

                38db67171775669213c8cffceea57cfda97b06740bec3adab1b1e68a38a361c8

                SHA512

                756b13b6c9608b49b15d67e1ea72daa6de44bfa4c681a1a2d0e653c5be780d1d7d54733a722036bc140c2330ccc650c4058b4255ec69d6c3fa98290dabbdfc8d

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                209KB

                MD5

                3126a3208cefa3af385a95409caee8b7

                SHA1

                ecd76457b0d73f32b68222c858a3758f117d626f

                SHA256

                38db67171775669213c8cffceea57cfda97b06740bec3adab1b1e68a38a361c8

                SHA512

                756b13b6c9608b49b15d67e1ea72daa6de44bfa4c681a1a2d0e653c5be780d1d7d54733a722036bc140c2330ccc650c4058b4255ec69d6c3fa98290dabbdfc8d

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                209KB

                MD5

                3126a3208cefa3af385a95409caee8b7

                SHA1

                ecd76457b0d73f32b68222c858a3758f117d626f

                SHA256

                38db67171775669213c8cffceea57cfda97b06740bec3adab1b1e68a38a361c8

                SHA512

                756b13b6c9608b49b15d67e1ea72daa6de44bfa4c681a1a2d0e653c5be780d1d7d54733a722036bc140c2330ccc650c4058b4255ec69d6c3fa98290dabbdfc8d

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                209KB

                MD5

                3126a3208cefa3af385a95409caee8b7

                SHA1

                ecd76457b0d73f32b68222c858a3758f117d626f

                SHA256

                38db67171775669213c8cffceea57cfda97b06740bec3adab1b1e68a38a361c8

                SHA512

                756b13b6c9608b49b15d67e1ea72daa6de44bfa4c681a1a2d0e653c5be780d1d7d54733a722036bc140c2330ccc650c4058b4255ec69d6c3fa98290dabbdfc8d

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                209KB

                MD5

                3126a3208cefa3af385a95409caee8b7

                SHA1

                ecd76457b0d73f32b68222c858a3758f117d626f

                SHA256

                38db67171775669213c8cffceea57cfda97b06740bec3adab1b1e68a38a361c8

                SHA512

                756b13b6c9608b49b15d67e1ea72daa6de44bfa4c681a1a2d0e653c5be780d1d7d54733a722036bc140c2330ccc650c4058b4255ec69d6c3fa98290dabbdfc8d

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • memory/3020-196-0x0000000000400000-0x000000000042E000-memory.dmp

                Filesize

                184KB

              • memory/3020-202-0x0000000005030000-0x0000000005040000-memory.dmp

                Filesize

                64KB

              • memory/3788-163-0x0000000000C80000-0x0000000000CAE000-memory.dmp

                Filesize

                184KB

              • memory/3788-177-0x0000000005660000-0x0000000005670000-memory.dmp

                Filesize

                64KB

              • memory/3788-176-0x000000000BB60000-0x000000000BBB0000-memory.dmp

                Filesize

                320KB

              • memory/3788-174-0x000000000CA60000-0x000000000CF8C000-memory.dmp

                Filesize

                5.2MB

              • memory/3788-173-0x000000000BD30000-0x000000000BEF2000-memory.dmp

                Filesize

                1.8MB

              • memory/3788-172-0x000000000BF80000-0x000000000C524000-memory.dmp

                Filesize

                5.6MB

              • memory/3788-171-0x000000000AEE0000-0x000000000AF46000-memory.dmp

                Filesize

                408KB

              • memory/3788-170-0x000000000B630000-0x000000000B6C2000-memory.dmp

                Filesize

                584KB

              • memory/3788-169-0x000000000AE60000-0x000000000AED6000-memory.dmp

                Filesize

                472KB

              • memory/3788-168-0x000000000AA50000-0x000000000AA8C000-memory.dmp

                Filesize

                240KB

              • memory/3788-167-0x0000000005660000-0x0000000005670000-memory.dmp

                Filesize

                64KB

              • memory/3788-166-0x000000000A9F0000-0x000000000AA02000-memory.dmp

                Filesize

                72KB

              • memory/3788-165-0x000000000AB00000-0x000000000AC0A000-memory.dmp

                Filesize

                1.0MB

              • memory/3788-164-0x000000000B010000-0x000000000B628000-memory.dmp

                Filesize

                6.1MB

              • memory/4972-155-0x0000000000400000-0x000000000040A000-memory.dmp

                Filesize

                40KB