Analysis

  • max time kernel
    135s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-05-2023 06:06

General

  • Target

    c910a9ef44772482488a69f3f60319d9377c6f5ce7f13602d131a97a60bea17a.exe

  • Size

    730KB

  • MD5

    4c9a6afcd8a98338d0e5f4189fc8007a

  • SHA1

    c19138b54971f237b08a33cbbadef5f03e449391

  • SHA256

    c910a9ef44772482488a69f3f60319d9377c6f5ce7f13602d131a97a60bea17a

  • SHA512

    6d332425fcc7c43f4dbc41e7f467e2adcc443a3d7953eb32e38ef6514453e3f11efb770b6150d32868f02f06f1189c6d7770a9d6a02c5c562aa066a84c7b6b3c

  • SSDEEP

    12288:6Mr+y90XVfAGxd2WiPse9VKNJ6QkZWUHxxHOgtQJUpg/nXeo+aDuBBcOXuV:oyKAG+WiPt9QNJ3kZLJ+Sg/nX3DuBSV

Malware Config

Extracted

Family

redline

Botnet

musa

C2

83.97.73.127:19045

Attributes
  • auth_value

    745cd242a52ab79c9c9026155d62f359

Extracted

Family

redline

Botnet

tinda

C2

83.97.73.127:19045

Attributes
  • auth_value

    88da3924455f4ba3a1b76cd03af918bb

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c910a9ef44772482488a69f3f60319d9377c6f5ce7f13602d131a97a60bea17a.exe
    "C:\Users\Admin\AppData\Local\Temp\c910a9ef44772482488a69f3f60319d9377c6f5ce7f13602d131a97a60bea17a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4288
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8349456.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8349456.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4388
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6372627.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6372627.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:5060
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0111659.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0111659.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:368
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3536
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9567625.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9567625.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2624
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2830591.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2830591.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3216
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4020
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metado.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:4876
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metado.exe" /P "Admin:N"&&CACLS "metado.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1952
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:880
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metado.exe" /P "Admin:N"
                6⤵
                  PID:1880
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "metado.exe" /P "Admin:R" /E
                  6⤵
                    PID:4236
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:1832
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\a9e2a16078" /P "Admin:N"
                      6⤵
                        PID:5088
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:3612
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:2124
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7134329.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7134329.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:3892
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2676
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:4408
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:1640

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                Filesize

                226B

                MD5

                916851e072fbabc4796d8916c5131092

                SHA1

                d48a602229a690c512d5fdaf4c8d77547a88e7a2

                SHA256

                7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                SHA512

                07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7134329.exe

                Filesize

                318KB

                MD5

                6ccd3c1d445f9228733615ee4c18ccc0

                SHA1

                45cf7e056c8d316f7e2aa03a3c8d6e2d0d7701ac

                SHA256

                fa53d759e8f74bed118b9afea49f7d3c5d55d0738265a842b28e3e04d15ec995

                SHA512

                3b33d3aa19475e4fe359f10536007e8a5c185382ab3fbfb395eaf1832a85a5ab8a0e05cbb466f45aa5751af8e8943df438b4cb6e3e5c33684229cd3c4b4eec1c

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7134329.exe

                Filesize

                318KB

                MD5

                6ccd3c1d445f9228733615ee4c18ccc0

                SHA1

                45cf7e056c8d316f7e2aa03a3c8d6e2d0d7701ac

                SHA256

                fa53d759e8f74bed118b9afea49f7d3c5d55d0738265a842b28e3e04d15ec995

                SHA512

                3b33d3aa19475e4fe359f10536007e8a5c185382ab3fbfb395eaf1832a85a5ab8a0e05cbb466f45aa5751af8e8943df438b4cb6e3e5c33684229cd3c4b4eec1c

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8349456.exe

                Filesize

                448KB

                MD5

                ca9def03b8473f3e3e7d97ade01e8e35

                SHA1

                4785ebc36e6116fed9aec0498f2d8d11064bf629

                SHA256

                eca5531f730e630d97bfece35503326a4cab0322ae0441d7831b0e30dc654332

                SHA512

                33a88e53cfd7683afbd5d1df807f31347f5d1d01e224d379bd12df7ee974d7ff34bc5bbb96f2711234502115c2856c5c3f448f5d39e1097f6ac182805bf70799

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8349456.exe

                Filesize

                448KB

                MD5

                ca9def03b8473f3e3e7d97ade01e8e35

                SHA1

                4785ebc36e6116fed9aec0498f2d8d11064bf629

                SHA256

                eca5531f730e630d97bfece35503326a4cab0322ae0441d7831b0e30dc654332

                SHA512

                33a88e53cfd7683afbd5d1df807f31347f5d1d01e224d379bd12df7ee974d7ff34bc5bbb96f2711234502115c2856c5c3f448f5d39e1097f6ac182805bf70799

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2830591.exe

                Filesize

                211KB

                MD5

                69e173383cde0fa21cbecec1ed64db51

                SHA1

                99a1d4317adddc79ffc09724b6484a2ab70ef855

                SHA256

                9ecea7e1400895c2341d57c1591b60da4b96cb369a9392a0207f6a3afd51e20f

                SHA512

                ff6e6d0e2dfb25404c702008384d35597e349dc87bcc38025d3a98db676438dddcf1279e098af695e1f70bd153add601a91acab6233e3c941e1e4a228c599287

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2830591.exe

                Filesize

                211KB

                MD5

                69e173383cde0fa21cbecec1ed64db51

                SHA1

                99a1d4317adddc79ffc09724b6484a2ab70ef855

                SHA256

                9ecea7e1400895c2341d57c1591b60da4b96cb369a9392a0207f6a3afd51e20f

                SHA512

                ff6e6d0e2dfb25404c702008384d35597e349dc87bcc38025d3a98db676438dddcf1279e098af695e1f70bd153add601a91acab6233e3c941e1e4a228c599287

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6372627.exe

                Filesize

                277KB

                MD5

                1d2208ca587299462d290d5f9f84525f

                SHA1

                57d11a46c1d01e36f4c41e7346c796aa06ed1f4d

                SHA256

                e5dbd3764d7d8a930207cf41994d50f71640da8513642db349c737c0d9e33d42

                SHA512

                941f594ae28e9451a1fc0edc8a9123a920525aa0e1bd37d183828316dedcc246efc5d36c8d8af01f1f7b5a3509624e70810c3f755dba86760979903197eb6e0d

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6372627.exe

                Filesize

                277KB

                MD5

                1d2208ca587299462d290d5f9f84525f

                SHA1

                57d11a46c1d01e36f4c41e7346c796aa06ed1f4d

                SHA256

                e5dbd3764d7d8a930207cf41994d50f71640da8513642db349c737c0d9e33d42

                SHA512

                941f594ae28e9451a1fc0edc8a9123a920525aa0e1bd37d183828316dedcc246efc5d36c8d8af01f1f7b5a3509624e70810c3f755dba86760979903197eb6e0d

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0111659.exe

                Filesize

                161KB

                MD5

                fb7e8900c04a161307b4b8442667a2f2

                SHA1

                5cbc2f8925d96e0fd2178341761f9b9726e1b0d8

                SHA256

                421ac36f76ae279efbe843db758fcf9cdc4d3fcb65b5ee86b26b31c1cd45e144

                SHA512

                cc13762d017b5fd19df8fafaa1121ffc3090a68efabba801201985a208a5a03c94efbce2467bda9781cc7da37625198023a1e1b3cf9798b3222d6657e1ec25e1

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0111659.exe

                Filesize

                161KB

                MD5

                fb7e8900c04a161307b4b8442667a2f2

                SHA1

                5cbc2f8925d96e0fd2178341761f9b9726e1b0d8

                SHA256

                421ac36f76ae279efbe843db758fcf9cdc4d3fcb65b5ee86b26b31c1cd45e144

                SHA512

                cc13762d017b5fd19df8fafaa1121ffc3090a68efabba801201985a208a5a03c94efbce2467bda9781cc7da37625198023a1e1b3cf9798b3222d6657e1ec25e1

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9567625.exe

                Filesize

                168KB

                MD5

                00e0f4a65ac2dc796260ca209ba34432

                SHA1

                9a1ccf91c6a178e8c2be5d34280bd8aa0b3042ed

                SHA256

                87936fae84abab4fdb6c14ef453070c777d1693a8ed92a1cfa3be24275c0e4a2

                SHA512

                ca283b447672d4b289b6a5dc1f4daad48874fc45a6b1402d5521281b76636baf0bc46093412f1f30c1139c306841d34039d6fb39f83cae82e88edc1df38ddf78

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9567625.exe

                Filesize

                168KB

                MD5

                00e0f4a65ac2dc796260ca209ba34432

                SHA1

                9a1ccf91c6a178e8c2be5d34280bd8aa0b3042ed

                SHA256

                87936fae84abab4fdb6c14ef453070c777d1693a8ed92a1cfa3be24275c0e4a2

                SHA512

                ca283b447672d4b289b6a5dc1f4daad48874fc45a6b1402d5521281b76636baf0bc46093412f1f30c1139c306841d34039d6fb39f83cae82e88edc1df38ddf78

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                211KB

                MD5

                69e173383cde0fa21cbecec1ed64db51

                SHA1

                99a1d4317adddc79ffc09724b6484a2ab70ef855

                SHA256

                9ecea7e1400895c2341d57c1591b60da4b96cb369a9392a0207f6a3afd51e20f

                SHA512

                ff6e6d0e2dfb25404c702008384d35597e349dc87bcc38025d3a98db676438dddcf1279e098af695e1f70bd153add601a91acab6233e3c941e1e4a228c599287

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                211KB

                MD5

                69e173383cde0fa21cbecec1ed64db51

                SHA1

                99a1d4317adddc79ffc09724b6484a2ab70ef855

                SHA256

                9ecea7e1400895c2341d57c1591b60da4b96cb369a9392a0207f6a3afd51e20f

                SHA512

                ff6e6d0e2dfb25404c702008384d35597e349dc87bcc38025d3a98db676438dddcf1279e098af695e1f70bd153add601a91acab6233e3c941e1e4a228c599287

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                211KB

                MD5

                69e173383cde0fa21cbecec1ed64db51

                SHA1

                99a1d4317adddc79ffc09724b6484a2ab70ef855

                SHA256

                9ecea7e1400895c2341d57c1591b60da4b96cb369a9392a0207f6a3afd51e20f

                SHA512

                ff6e6d0e2dfb25404c702008384d35597e349dc87bcc38025d3a98db676438dddcf1279e098af695e1f70bd153add601a91acab6233e3c941e1e4a228c599287

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                211KB

                MD5

                69e173383cde0fa21cbecec1ed64db51

                SHA1

                99a1d4317adddc79ffc09724b6484a2ab70ef855

                SHA256

                9ecea7e1400895c2341d57c1591b60da4b96cb369a9392a0207f6a3afd51e20f

                SHA512

                ff6e6d0e2dfb25404c702008384d35597e349dc87bcc38025d3a98db676438dddcf1279e098af695e1f70bd153add601a91acab6233e3c941e1e4a228c599287

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                211KB

                MD5

                69e173383cde0fa21cbecec1ed64db51

                SHA1

                99a1d4317adddc79ffc09724b6484a2ab70ef855

                SHA256

                9ecea7e1400895c2341d57c1591b60da4b96cb369a9392a0207f6a3afd51e20f

                SHA512

                ff6e6d0e2dfb25404c702008384d35597e349dc87bcc38025d3a98db676438dddcf1279e098af695e1f70bd153add601a91acab6233e3c941e1e4a228c599287

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • memory/2624-163-0x0000000000CD0000-0x0000000000CFE000-memory.dmp

                Filesize

                184KB

              • memory/2624-169-0x000000000AEF0000-0x000000000AF66000-memory.dmp

                Filesize

                472KB

              • memory/2624-176-0x000000000CC20000-0x000000000D14C000-memory.dmp

                Filesize

                5.2MB

              • memory/2624-175-0x000000000C520000-0x000000000C6E2000-memory.dmp

                Filesize

                1.8MB

              • memory/2624-174-0x0000000005620000-0x0000000005630000-memory.dmp

                Filesize

                64KB

              • memory/2624-172-0x000000000B7F0000-0x000000000B856000-memory.dmp

                Filesize

                408KB

              • memory/2624-171-0x000000000BDA0000-0x000000000C344000-memory.dmp

                Filesize

                5.6MB

              • memory/2624-170-0x000000000B010000-0x000000000B0A2000-memory.dmp

                Filesize

                584KB

              • memory/2624-164-0x000000000B0D0000-0x000000000B6E8000-memory.dmp

                Filesize

                6.1MB

              • memory/2624-177-0x000000000C410000-0x000000000C460000-memory.dmp

                Filesize

                320KB

              • memory/2624-165-0x000000000AC50000-0x000000000AD5A000-memory.dmp

                Filesize

                1.0MB

              • memory/2624-168-0x0000000005620000-0x0000000005630000-memory.dmp

                Filesize

                64KB

              • memory/2624-167-0x000000000ABE0000-0x000000000AC1C000-memory.dmp

                Filesize

                240KB

              • memory/2624-166-0x000000000AB80000-0x000000000AB92000-memory.dmp

                Filesize

                72KB

              • memory/2676-202-0x0000000005520000-0x0000000005530000-memory.dmp

                Filesize

                64KB

              • memory/2676-196-0x0000000000400000-0x000000000042E000-memory.dmp

                Filesize

                184KB

              • memory/3536-155-0x00000000003F0000-0x00000000003FA000-memory.dmp

                Filesize

                40KB