Analysis

  • max time kernel
    135s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/06/2023, 03:11

General

  • Target

    b1b628c52addba7acf7ed8d166b84335.exe

  • Size

    793KB

  • MD5

    b1b628c52addba7acf7ed8d166b84335

  • SHA1

    30a3a4254b771ef07ad5aab398ce28cab829fe65

  • SHA256

    1cb72edc0f1a84fb53e7a921c94bc95648ac55675d149a961cbcbffe44e1c304

  • SHA512

    b7c4a79cd89636c34d24e75305445f52018d8bae8a6fdc7ba1612feceb6aa5145e7bccdea14fb640f8eccdd9c71764281b287dfdab0d7e46e0bc96698a9155a8

  • SSDEEP

    12288:AMrey90ukLnPjsCDdnWZ/1WtAJ273jovdkBFWHNJeERuihh0WEDbgUS8:Oyqj5+W7PBgPdhmWkt

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19046

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

metro

C2

83.97.73.126:19046

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1b628c52addba7acf7ed8d166b84335.exe
    "C:\Users\Admin\AppData\Local\Temp\b1b628c52addba7acf7ed8d166b84335.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4948
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8295558.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8295558.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4404
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7819257.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7819257.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2300
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k9227183.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k9227183.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1628
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1720
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l6860164.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l6860164.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:328
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m1385175.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m1385175.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4568
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:5072
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metado.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:1308
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metado.exe" /P "Admin:N"&&CACLS "metado.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3808
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:4244
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metado.exe" /P "Admin:N"
                6⤵
                  PID:1536
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "metado.exe" /P "Admin:R" /E
                  6⤵
                    PID:644
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:60
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\a9e2a16078" /P "Admin:N"
                      6⤵
                        PID:1380
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:5088
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:1604
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n0538439.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n0538439.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:4448
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1844
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:2012
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:3688

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                Filesize

                226B

                MD5

                916851e072fbabc4796d8916c5131092

                SHA1

                d48a602229a690c512d5fdaf4c8d77547a88e7a2

                SHA256

                7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                SHA512

                07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n0538439.exe

                Filesize

                322KB

                MD5

                1c9126cfba4d2544989d47f554aede80

                SHA1

                4ac6df4341b240ba3397db2e30352be49abcf720

                SHA256

                d60b35d82b7c4052f40fc7266794bd7092207d5fd2f676ce561c04d0f6924bdf

                SHA512

                c5a148da83c72c34556762931175286894cb6370f682a683b2460ac12f3b9b111c22bc3196fd9668f95a7909968643e45d7d4e1a239dd27d23f856de7d9de9e4

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n0538439.exe

                Filesize

                322KB

                MD5

                1c9126cfba4d2544989d47f554aede80

                SHA1

                4ac6df4341b240ba3397db2e30352be49abcf720

                SHA256

                d60b35d82b7c4052f40fc7266794bd7092207d5fd2f676ce561c04d0f6924bdf

                SHA512

                c5a148da83c72c34556762931175286894cb6370f682a683b2460ac12f3b9b111c22bc3196fd9668f95a7909968643e45d7d4e1a239dd27d23f856de7d9de9e4

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8295558.exe

                Filesize

                455KB

                MD5

                781b20785971eab39928d57ba6afc960

                SHA1

                47ce04af18b0ea4c2b34f69c127002ef651721cb

                SHA256

                a0422c62be3da79feb10f14cdf672ccd8c630d79418937d55ef046abefba4009

                SHA512

                30683513a77c0068d672d7583e960f017426a8d09223040f8379c09f674d632b91ca71c25d058ec65d649c0cc02b010734f27f8ca01cc8603a35559b12b2f45c

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y8295558.exe

                Filesize

                455KB

                MD5

                781b20785971eab39928d57ba6afc960

                SHA1

                47ce04af18b0ea4c2b34f69c127002ef651721cb

                SHA256

                a0422c62be3da79feb10f14cdf672ccd8c630d79418937d55ef046abefba4009

                SHA512

                30683513a77c0068d672d7583e960f017426a8d09223040f8379c09f674d632b91ca71c25d058ec65d649c0cc02b010734f27f8ca01cc8603a35559b12b2f45c

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m1385175.exe

                Filesize

                215KB

                MD5

                5e89151456711150cce3367f839a2ec2

                SHA1

                e30e37552a818916b2f0356ce37bc775945c715e

                SHA256

                8003dfdb5f2a3c805509809b65bcc56e6d4b14d4569e4c481ac1767f6e2de3e9

                SHA512

                4b5f0e52c36a1598967405b1d3048b1013c4a613f34618e9a4f601b105ffd59a47d45da14226f7238b7afc4cf7fc7c9d3d6c802dbe76f8bab6b9700fba8b9cab

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m1385175.exe

                Filesize

                215KB

                MD5

                5e89151456711150cce3367f839a2ec2

                SHA1

                e30e37552a818916b2f0356ce37bc775945c715e

                SHA256

                8003dfdb5f2a3c805509809b65bcc56e6d4b14d4569e4c481ac1767f6e2de3e9

                SHA512

                4b5f0e52c36a1598967405b1d3048b1013c4a613f34618e9a4f601b105ffd59a47d45da14226f7238b7afc4cf7fc7c9d3d6c802dbe76f8bab6b9700fba8b9cab

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7819257.exe

                Filesize

                283KB

                MD5

                f72ba42fe97864feecc2b136d403aad4

                SHA1

                48c99193226fad1712cb1be542dd91665bcb4838

                SHA256

                03a05817b7ecfa0869bf75bbdc2c99138e0258f28914e7d1a8352c359059e36c

                SHA512

                f154f34713ba8c955dc0aa689d9a1be1cb2b3271b3ce70c4bcaa1163b80aaa1c77d79de734fcbff93254dc5f55123d3be68614c4be5071e1ed2105277ea5991f

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7819257.exe

                Filesize

                283KB

                MD5

                f72ba42fe97864feecc2b136d403aad4

                SHA1

                48c99193226fad1712cb1be542dd91665bcb4838

                SHA256

                03a05817b7ecfa0869bf75bbdc2c99138e0258f28914e7d1a8352c359059e36c

                SHA512

                f154f34713ba8c955dc0aa689d9a1be1cb2b3271b3ce70c4bcaa1163b80aaa1c77d79de734fcbff93254dc5f55123d3be68614c4be5071e1ed2105277ea5991f

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k9227183.exe

                Filesize

                166KB

                MD5

                2a080cac04f5f3f7ff911f3314e10999

                SHA1

                9f4f4e3fb11c435e036713e833a5c1a3eb722dff

                SHA256

                743d3b2603cb1677e9d8261f91165ef5949ef525d82d2371e23a8fbc1186a0c2

                SHA512

                96c707fcc313867cd053a0c3d063d78437d64a0764559bda55a67541468b5bcf05195b7ee21df47d27cfeefcacb7e2aa47ee027695fc70a7beaef82180f7a770

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k9227183.exe

                Filesize

                166KB

                MD5

                2a080cac04f5f3f7ff911f3314e10999

                SHA1

                9f4f4e3fb11c435e036713e833a5c1a3eb722dff

                SHA256

                743d3b2603cb1677e9d8261f91165ef5949ef525d82d2371e23a8fbc1186a0c2

                SHA512

                96c707fcc313867cd053a0c3d063d78437d64a0764559bda55a67541468b5bcf05195b7ee21df47d27cfeefcacb7e2aa47ee027695fc70a7beaef82180f7a770

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l6860164.exe

                Filesize

                168KB

                MD5

                04f5e4f7df7b42feb78c6928437258fe

                SHA1

                fce5247ad8787c8ee47e83b5f76c0ea0c86dc9a8

                SHA256

                3e53c64c2257af34f418bcc042d93a09e43b492ed841dace06201c7aa0d25bda

                SHA512

                124692784f9fc93e60d6e6b506aecb160efbbfd200e388862f3653d943c5183c98a6dcfe21a33d77e1df04bd057b1598c90f8001c5c3a237f1e66367591732c1

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l6860164.exe

                Filesize

                168KB

                MD5

                04f5e4f7df7b42feb78c6928437258fe

                SHA1

                fce5247ad8787c8ee47e83b5f76c0ea0c86dc9a8

                SHA256

                3e53c64c2257af34f418bcc042d93a09e43b492ed841dace06201c7aa0d25bda

                SHA512

                124692784f9fc93e60d6e6b506aecb160efbbfd200e388862f3653d943c5183c98a6dcfe21a33d77e1df04bd057b1598c90f8001c5c3a237f1e66367591732c1

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                215KB

                MD5

                5e89151456711150cce3367f839a2ec2

                SHA1

                e30e37552a818916b2f0356ce37bc775945c715e

                SHA256

                8003dfdb5f2a3c805509809b65bcc56e6d4b14d4569e4c481ac1767f6e2de3e9

                SHA512

                4b5f0e52c36a1598967405b1d3048b1013c4a613f34618e9a4f601b105ffd59a47d45da14226f7238b7afc4cf7fc7c9d3d6c802dbe76f8bab6b9700fba8b9cab

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                215KB

                MD5

                5e89151456711150cce3367f839a2ec2

                SHA1

                e30e37552a818916b2f0356ce37bc775945c715e

                SHA256

                8003dfdb5f2a3c805509809b65bcc56e6d4b14d4569e4c481ac1767f6e2de3e9

                SHA512

                4b5f0e52c36a1598967405b1d3048b1013c4a613f34618e9a4f601b105ffd59a47d45da14226f7238b7afc4cf7fc7c9d3d6c802dbe76f8bab6b9700fba8b9cab

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                215KB

                MD5

                5e89151456711150cce3367f839a2ec2

                SHA1

                e30e37552a818916b2f0356ce37bc775945c715e

                SHA256

                8003dfdb5f2a3c805509809b65bcc56e6d4b14d4569e4c481ac1767f6e2de3e9

                SHA512

                4b5f0e52c36a1598967405b1d3048b1013c4a613f34618e9a4f601b105ffd59a47d45da14226f7238b7afc4cf7fc7c9d3d6c802dbe76f8bab6b9700fba8b9cab

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                215KB

                MD5

                5e89151456711150cce3367f839a2ec2

                SHA1

                e30e37552a818916b2f0356ce37bc775945c715e

                SHA256

                8003dfdb5f2a3c805509809b65bcc56e6d4b14d4569e4c481ac1767f6e2de3e9

                SHA512

                4b5f0e52c36a1598967405b1d3048b1013c4a613f34618e9a4f601b105ffd59a47d45da14226f7238b7afc4cf7fc7c9d3d6c802dbe76f8bab6b9700fba8b9cab

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                215KB

                MD5

                5e89151456711150cce3367f839a2ec2

                SHA1

                e30e37552a818916b2f0356ce37bc775945c715e

                SHA256

                8003dfdb5f2a3c805509809b65bcc56e6d4b14d4569e4c481ac1767f6e2de3e9

                SHA512

                4b5f0e52c36a1598967405b1d3048b1013c4a613f34618e9a4f601b105ffd59a47d45da14226f7238b7afc4cf7fc7c9d3d6c802dbe76f8bab6b9700fba8b9cab

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • memory/328-162-0x0000000000EB0000-0x0000000000EDE000-memory.dmp

                Filesize

                184KB

              • memory/328-168-0x000000000B1D0000-0x000000000B246000-memory.dmp

                Filesize

                472KB

              • memory/328-175-0x000000000CDA0000-0x000000000D2CC000-memory.dmp

                Filesize

                5.2MB

              • memory/328-174-0x000000000C090000-0x000000000C252000-memory.dmp

                Filesize

                1.8MB

              • memory/328-173-0x0000000005680000-0x0000000005690000-memory.dmp

                Filesize

                64KB

              • memory/328-171-0x000000000C2C0000-0x000000000C864000-memory.dmp

                Filesize

                5.6MB

              • memory/328-170-0x000000000B8D0000-0x000000000B936000-memory.dmp

                Filesize

                408KB

              • memory/328-169-0x000000000B970000-0x000000000BA02000-memory.dmp

                Filesize

                584KB

              • memory/328-163-0x000000000B2B0000-0x000000000B8C8000-memory.dmp

                Filesize

                6.1MB

              • memory/328-176-0x000000000BFF0000-0x000000000C040000-memory.dmp

                Filesize

                320KB

              • memory/328-164-0x000000000AE30000-0x000000000AF3A000-memory.dmp

                Filesize

                1.0MB

              • memory/328-167-0x000000000ADC0000-0x000000000ADFC000-memory.dmp

                Filesize

                240KB

              • memory/328-166-0x0000000005680000-0x0000000005690000-memory.dmp

                Filesize

                64KB

              • memory/328-165-0x000000000AD60000-0x000000000AD72000-memory.dmp

                Filesize

                72KB

              • memory/1720-154-0x0000000000400000-0x000000000040A000-memory.dmp

                Filesize

                40KB

              • memory/1844-200-0x00000000057E0000-0x00000000057F0000-memory.dmp

                Filesize

                64KB

              • memory/1844-194-0x0000000000400000-0x000000000042E000-memory.dmp

                Filesize

                184KB