Analysis

  • max time kernel
    131s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-06-2023 08:01

General

  • Target

    39740827e594c8abe8feb0bd2684ef4ff059cff1a78cfdf44246d4cffca497fc.exe

  • Size

    793KB

  • MD5

    9a385ea38c98db7a97bb1e5aebaee8d3

  • SHA1

    6f7b4d69ff685bbb3489adee6d48d0cfee0773ac

  • SHA256

    39740827e594c8abe8feb0bd2684ef4ff059cff1a78cfdf44246d4cffca497fc

  • SHA512

    fbaa42242424925ec061ea00138f0402960c27b323194d089bf3a5a67376189d750910ba3c4ec03cf24fbc530b4488f6c82bb82e10514a486477c2144bbf7783

  • SSDEEP

    12288:ZMrjy905pfXb9yj0cxgoyBytQ+zh0oEl2SkDwo92GL4HWEDgKCOZ9:Wym9OY2QQGo+2SOw2qWbKv

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19046

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Extracted

Family

redline

Botnet

metro

C2

83.97.73.126:19046

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39740827e594c8abe8feb0bd2684ef4ff059cff1a78cfdf44246d4cffca497fc.exe
    "C:\Users\Admin\AppData\Local\Temp\39740827e594c8abe8feb0bd2684ef4ff059cff1a78cfdf44246d4cffca497fc.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:744
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8391110.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8391110.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2236
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4935499.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4935499.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4704
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2633001.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2633001.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:4460
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1524
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0610156.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0610156.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2908
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2762509.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2762509.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3360
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4072
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metado.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:1964
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metado.exe" /P "Admin:N"&&CACLS "metado.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1580
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:2888
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metado.exe" /P "Admin:N"
                6⤵
                  PID:1848
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "metado.exe" /P "Admin:R" /E
                  6⤵
                    PID:1344
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:2148
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\a9e2a16078" /P "Admin:N"
                      6⤵
                        PID:1780
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:4960
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:1948
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8166195.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8166195.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:2440
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4944
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:3600
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:4180

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                Filesize

                226B

                MD5

                916851e072fbabc4796d8916c5131092

                SHA1

                d48a602229a690c512d5fdaf4c8d77547a88e7a2

                SHA256

                7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                SHA512

                07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8166195.exe

                Filesize

                321KB

                MD5

                c9fc5e68feedacb9759bdafa2d728f47

                SHA1

                360d6dd9ae668cd5f2cf03587694c364b2da87e5

                SHA256

                85d9c21f06e7bc8b2409e24468a0106380985e31915852ec5781f4c35c815fe8

                SHA512

                299e962ae2ddbe95b62f07665b367c7d3ef8beeade55fe7050277d842e7659f7de6e8672d54c492297e59d82ed390f87e3027522a3f01c4ef41c0c4c244d9241

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8166195.exe

                Filesize

                321KB

                MD5

                c9fc5e68feedacb9759bdafa2d728f47

                SHA1

                360d6dd9ae668cd5f2cf03587694c364b2da87e5

                SHA256

                85d9c21f06e7bc8b2409e24468a0106380985e31915852ec5781f4c35c815fe8

                SHA512

                299e962ae2ddbe95b62f07665b367c7d3ef8beeade55fe7050277d842e7659f7de6e8672d54c492297e59d82ed390f87e3027522a3f01c4ef41c0c4c244d9241

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8391110.exe

                Filesize

                456KB

                MD5

                6e32433aebc7c0591415c3f485219e0a

                SHA1

                2f8dd181aca6053e2a3830e4b73546f2b1f45aca

                SHA256

                7293aa36552a58d895a7356ae4d38704869068b2d88b2ec39358902158e3f7a1

                SHA512

                f679d841434e9be2f7c50c95e94e45df5887f0ca8772aa2e69f01121468e9576d4980732804a555b35707760ac3572935d100c7410ada80f326fe70a4d6d51b1

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8391110.exe

                Filesize

                456KB

                MD5

                6e32433aebc7c0591415c3f485219e0a

                SHA1

                2f8dd181aca6053e2a3830e4b73546f2b1f45aca

                SHA256

                7293aa36552a58d895a7356ae4d38704869068b2d88b2ec39358902158e3f7a1

                SHA512

                f679d841434e9be2f7c50c95e94e45df5887f0ca8772aa2e69f01121468e9576d4980732804a555b35707760ac3572935d100c7410ada80f326fe70a4d6d51b1

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2762509.exe

                Filesize

                216KB

                MD5

                b5a8813d6973f2e3ecd780837c1d7491

                SHA1

                e662a96abf2270184fc3d49c74aebe702f143f47

                SHA256

                2405e1a67126540ccbeffb86d046e137e4c4f0d273279f9e2c71b79e0aef7bff

                SHA512

                066e22fa077f31cff5008c4df2e0b37aca69de8abd3d83b347219dd6b8155e74446d2e390b31b6d4f4a634aae311861cb913a929dce4ea8aa3151f8318e856bf

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2762509.exe

                Filesize

                216KB

                MD5

                b5a8813d6973f2e3ecd780837c1d7491

                SHA1

                e662a96abf2270184fc3d49c74aebe702f143f47

                SHA256

                2405e1a67126540ccbeffb86d046e137e4c4f0d273279f9e2c71b79e0aef7bff

                SHA512

                066e22fa077f31cff5008c4df2e0b37aca69de8abd3d83b347219dd6b8155e74446d2e390b31b6d4f4a634aae311861cb913a929dce4ea8aa3151f8318e856bf

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4935499.exe

                Filesize

                284KB

                MD5

                94dd7a9681a6683246cf44795708a059

                SHA1

                94626bd2600e85cd7d06701664343faed6ee509b

                SHA256

                53356f464218f6043760e11bec182108f53468eecc260e8471f2019efed61648

                SHA512

                d5185316b50b96cae82d0ec7821c725ff0bd4e37577471c354347d22d69e396d3d3b5c33461f29c7cc832b8bbf9407ec38c26e674d407eddc3fd276b9a8a1114

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4935499.exe

                Filesize

                284KB

                MD5

                94dd7a9681a6683246cf44795708a059

                SHA1

                94626bd2600e85cd7d06701664343faed6ee509b

                SHA256

                53356f464218f6043760e11bec182108f53468eecc260e8471f2019efed61648

                SHA512

                d5185316b50b96cae82d0ec7821c725ff0bd4e37577471c354347d22d69e396d3d3b5c33461f29c7cc832b8bbf9407ec38c26e674d407eddc3fd276b9a8a1114

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2633001.exe

                Filesize

                164KB

                MD5

                8354dd96241860a1580c2426f8198c20

                SHA1

                599f11b9bd49a214092cb39ca21b5801fdec8a4c

                SHA256

                eced6d006c39f7efe01749c4a085d869cdb7ec11a650adf8ba68838ad129e9ff

                SHA512

                182a875abc0c279d39ea4bbc1e4ee16d64565a5abfc2d7fa681ae3d84cc727a095b69bf3a1d483f29f83866991c7084f1d070c27fe5ba8011dd1de100ceb759d

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2633001.exe

                Filesize

                164KB

                MD5

                8354dd96241860a1580c2426f8198c20

                SHA1

                599f11b9bd49a214092cb39ca21b5801fdec8a4c

                SHA256

                eced6d006c39f7efe01749c4a085d869cdb7ec11a650adf8ba68838ad129e9ff

                SHA512

                182a875abc0c279d39ea4bbc1e4ee16d64565a5abfc2d7fa681ae3d84cc727a095b69bf3a1d483f29f83866991c7084f1d070c27fe5ba8011dd1de100ceb759d

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0610156.exe

                Filesize

                168KB

                MD5

                d724c25c12f7818c4351d2cc7d8a460f

                SHA1

                2965dd02d248206f68544731df271b7bcb08e8db

                SHA256

                dc6a345e4e91a020a1076218a7cf6bfe8fb5a12b36e0282a4445f5253694d855

                SHA512

                5d4813b9ee96ef4dc5a255f29ae43d898bbfc781320339b710ce91803f7001bef94ae7dbb033aa14d92b234ced0807ea6d261a570073aee962356591f3ccd827

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0610156.exe

                Filesize

                168KB

                MD5

                d724c25c12f7818c4351d2cc7d8a460f

                SHA1

                2965dd02d248206f68544731df271b7bcb08e8db

                SHA256

                dc6a345e4e91a020a1076218a7cf6bfe8fb5a12b36e0282a4445f5253694d855

                SHA512

                5d4813b9ee96ef4dc5a255f29ae43d898bbfc781320339b710ce91803f7001bef94ae7dbb033aa14d92b234ced0807ea6d261a570073aee962356591f3ccd827

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                216KB

                MD5

                b5a8813d6973f2e3ecd780837c1d7491

                SHA1

                e662a96abf2270184fc3d49c74aebe702f143f47

                SHA256

                2405e1a67126540ccbeffb86d046e137e4c4f0d273279f9e2c71b79e0aef7bff

                SHA512

                066e22fa077f31cff5008c4df2e0b37aca69de8abd3d83b347219dd6b8155e74446d2e390b31b6d4f4a634aae311861cb913a929dce4ea8aa3151f8318e856bf

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                216KB

                MD5

                b5a8813d6973f2e3ecd780837c1d7491

                SHA1

                e662a96abf2270184fc3d49c74aebe702f143f47

                SHA256

                2405e1a67126540ccbeffb86d046e137e4c4f0d273279f9e2c71b79e0aef7bff

                SHA512

                066e22fa077f31cff5008c4df2e0b37aca69de8abd3d83b347219dd6b8155e74446d2e390b31b6d4f4a634aae311861cb913a929dce4ea8aa3151f8318e856bf

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                216KB

                MD5

                b5a8813d6973f2e3ecd780837c1d7491

                SHA1

                e662a96abf2270184fc3d49c74aebe702f143f47

                SHA256

                2405e1a67126540ccbeffb86d046e137e4c4f0d273279f9e2c71b79e0aef7bff

                SHA512

                066e22fa077f31cff5008c4df2e0b37aca69de8abd3d83b347219dd6b8155e74446d2e390b31b6d4f4a634aae311861cb913a929dce4ea8aa3151f8318e856bf

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                216KB

                MD5

                b5a8813d6973f2e3ecd780837c1d7491

                SHA1

                e662a96abf2270184fc3d49c74aebe702f143f47

                SHA256

                2405e1a67126540ccbeffb86d046e137e4c4f0d273279f9e2c71b79e0aef7bff

                SHA512

                066e22fa077f31cff5008c4df2e0b37aca69de8abd3d83b347219dd6b8155e74446d2e390b31b6d4f4a634aae311861cb913a929dce4ea8aa3151f8318e856bf

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                216KB

                MD5

                b5a8813d6973f2e3ecd780837c1d7491

                SHA1

                e662a96abf2270184fc3d49c74aebe702f143f47

                SHA256

                2405e1a67126540ccbeffb86d046e137e4c4f0d273279f9e2c71b79e0aef7bff

                SHA512

                066e22fa077f31cff5008c4df2e0b37aca69de8abd3d83b347219dd6b8155e74446d2e390b31b6d4f4a634aae311861cb913a929dce4ea8aa3151f8318e856bf

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • memory/1524-154-0x0000000000160000-0x000000000016A000-memory.dmp

                Filesize

                40KB

              • memory/2908-162-0x0000000000360000-0x000000000038E000-memory.dmp

                Filesize

                184KB

              • memory/2908-168-0x000000000A440000-0x000000000A4B6000-memory.dmp

                Filesize

                472KB

              • memory/2908-175-0x0000000004BF0000-0x0000000004C00000-memory.dmp

                Filesize

                64KB

              • memory/2908-173-0x000000000C150000-0x000000000C67C000-memory.dmp

                Filesize

                5.2MB

              • memory/2908-172-0x000000000B490000-0x000000000B652000-memory.dmp

                Filesize

                1.8MB

              • memory/2908-171-0x000000000B670000-0x000000000BC14000-memory.dmp

                Filesize

                5.6MB

              • memory/2908-170-0x000000000A4C0000-0x000000000A526000-memory.dmp

                Filesize

                408KB

              • memory/2908-163-0x000000000A6A0000-0x000000000ACB8000-memory.dmp

                Filesize

                6.1MB

              • memory/2908-169-0x000000000A560000-0x000000000A5F2000-memory.dmp

                Filesize

                584KB

              • memory/2908-164-0x000000000A1A0000-0x000000000A2AA000-memory.dmp

                Filesize

                1.0MB

              • memory/2908-176-0x000000000B230000-0x000000000B280000-memory.dmp

                Filesize

                320KB

              • memory/2908-167-0x0000000004BF0000-0x0000000004C00000-memory.dmp

                Filesize

                64KB

              • memory/2908-166-0x000000000A130000-0x000000000A16C000-memory.dmp

                Filesize

                240KB

              • memory/2908-165-0x000000000A0D0000-0x000000000A0E2000-memory.dmp

                Filesize

                72KB

              • memory/4944-200-0x0000000004D10000-0x0000000004D20000-memory.dmp

                Filesize

                64KB

              • memory/4944-194-0x00000000007A0000-0x00000000007CE000-memory.dmp

                Filesize

                184KB