Analysis

  • max time kernel
    135s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-06-2023 08:26

General

  • Target

    bec0321e753a86038b1cd3f2495ebb32f12f4ce0546514933f362ac98020c6b4.exe

  • Size

    779KB

  • MD5

    3374987991693b8709a013ce82ea8f46

  • SHA1

    39e7a1f4d30ed08ae0926c17ec7165920ff47aae

  • SHA256

    bec0321e753a86038b1cd3f2495ebb32f12f4ce0546514933f362ac98020c6b4

  • SHA512

    d29d310846d78d09cd158858c9f916ba519e2ff6cd6f236d2945f190f191a603285efd8df858f56d9230ffdfd53549c71721fdb1326dab0a75480ab65dd12800

  • SSDEEP

    12288:tMr9y902qiLmr9yRVrZ1JtApUpCTt+j8Q2JlvRT0SMP9SnOQh/VH:Iy5AErZ1/e5+jQvuSMpa

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19046

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Extracted

Family

redline

Botnet

metro

C2

83.97.73.126:19046

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bec0321e753a86038b1cd3f2495ebb32f12f4ce0546514933f362ac98020c6b4.exe
    "C:\Users\Admin\AppData\Local\Temp\bec0321e753a86038b1cd3f2495ebb32f12f4ce0546514933f362ac98020c6b4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4852
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4971919.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4971919.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1188
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8288879.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8288879.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:880
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6310968.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6310968.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2692
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4784
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7005136.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7005136.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:452
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0877649.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0877649.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:3660
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:680
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metado.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:1036
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metado.exe" /P "Admin:N"&&CACLS "metado.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2636
            • C:\Windows\SysWOW64\cacls.exe
              CACLS "metado.exe" /P "Admin:N"
              6⤵
                PID:4324
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                6⤵
                  PID:4552
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "metado.exe" /P "Admin:R" /E
                  6⤵
                    PID:3184
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:2348
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\a9e2a16078" /P "Admin:N"
                      6⤵
                        PID:4932
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:3512
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:1508
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1403419.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1403419.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:5020
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4872
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:3884
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:2332

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                Filesize

                226B

                MD5

                916851e072fbabc4796d8916c5131092

                SHA1

                d48a602229a690c512d5fdaf4c8d77547a88e7a2

                SHA256

                7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                SHA512

                07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1403419.exe

                Filesize

                304KB

                MD5

                da8bcf6aa7001510b276d7fd85b7080c

                SHA1

                e701bdd1dcfb4655d90a37aa731d1d177c5bccbf

                SHA256

                41e77febbe20be8dc4ff6ccd916c868dd1f484eb9be38155e98257f566455776

                SHA512

                75f4bf9979f5843c6652d2d1869c261bebd6d3aa798323744d015cb27a3c76ca554eac883dfb5d01786afb76c8eb07f79f9c0fe1d42ef90ca3109a24017a7996

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d1403419.exe

                Filesize

                304KB

                MD5

                da8bcf6aa7001510b276d7fd85b7080c

                SHA1

                e701bdd1dcfb4655d90a37aa731d1d177c5bccbf

                SHA256

                41e77febbe20be8dc4ff6ccd916c868dd1f484eb9be38155e98257f566455776

                SHA512

                75f4bf9979f5843c6652d2d1869c261bebd6d3aa798323744d015cb27a3c76ca554eac883dfb5d01786afb76c8eb07f79f9c0fe1d42ef90ca3109a24017a7996

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4971919.exe

                Filesize

                448KB

                MD5

                84ff0be28476ba3527b36365a4d1b8e4

                SHA1

                3947480eb0620489c39972740800b32bd2aa2c4d

                SHA256

                02499f1b7894c9aed37a6d871114bf22d3ed2d176d03076866daeaeb85440fa9

                SHA512

                273db2554a795ea883c59c4ca84aa8795680fd4b582ef3c5f52847cb3db114a1b3a0e461e6dd900b4ff05b93f415ecb1916140e614e8a2b47f80d97d4744c0d6

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4971919.exe

                Filesize

                448KB

                MD5

                84ff0be28476ba3527b36365a4d1b8e4

                SHA1

                3947480eb0620489c39972740800b32bd2aa2c4d

                SHA256

                02499f1b7894c9aed37a6d871114bf22d3ed2d176d03076866daeaeb85440fa9

                SHA512

                273db2554a795ea883c59c4ca84aa8795680fd4b582ef3c5f52847cb3db114a1b3a0e461e6dd900b4ff05b93f415ecb1916140e614e8a2b47f80d97d4744c0d6

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0877649.exe

                Filesize

                216KB

                MD5

                7ad6c3c7c4beadf52583c8395dc83799

                SHA1

                c3cb7502bc49a59f94d3500065cfd0bb60e32c0f

                SHA256

                5f2a53ba1fd7b667da14aa8010ac58d4b59bf291b16e3489a45fc2f2fbb00311

                SHA512

                ecc2ff12f33516a18d7dfa7c9af3a4f3e1f8ffb722722f512f7492a2ed2eccdbeaf2507faed12dfddaef774db824fe1a25ed47f9a9f9e7ce41c24eea6f3c51ee

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0877649.exe

                Filesize

                216KB

                MD5

                7ad6c3c7c4beadf52583c8395dc83799

                SHA1

                c3cb7502bc49a59f94d3500065cfd0bb60e32c0f

                SHA256

                5f2a53ba1fd7b667da14aa8010ac58d4b59bf291b16e3489a45fc2f2fbb00311

                SHA512

                ecc2ff12f33516a18d7dfa7c9af3a4f3e1f8ffb722722f512f7492a2ed2eccdbeaf2507faed12dfddaef774db824fe1a25ed47f9a9f9e7ce41c24eea6f3c51ee

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8288879.exe

                Filesize

                277KB

                MD5

                c1beeb6b2116375552305e33ca711d18

                SHA1

                c5615e0516f0ff91a56d25df6985f1473ff09d99

                SHA256

                1aa89354b6c531c0fb2cb7139e20f9e64adb1902ed33e8d9c58222d1f80b4be5

                SHA512

                bd995b2ad7add1ce6cc89dbb8c085b35b01e18773b3c21936f98a6378b3aa542451256465afddbb04291cd3e71a96ba9e117f86d9f6d874de23e5b9edfd3f6fa

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8288879.exe

                Filesize

                277KB

                MD5

                c1beeb6b2116375552305e33ca711d18

                SHA1

                c5615e0516f0ff91a56d25df6985f1473ff09d99

                SHA256

                1aa89354b6c531c0fb2cb7139e20f9e64adb1902ed33e8d9c58222d1f80b4be5

                SHA512

                bd995b2ad7add1ce6cc89dbb8c085b35b01e18773b3c21936f98a6378b3aa542451256465afddbb04291cd3e71a96ba9e117f86d9f6d874de23e5b9edfd3f6fa

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6310968.exe

                Filesize

                147KB

                MD5

                0b047b95824c2721176653d651c9df93

                SHA1

                29c961b92f80d74db61e18c4e79606f475268759

                SHA256

                47cf67534c3de622fcd364b9d896b1db5e2c36c0bd888733d8e77b00fbd83619

                SHA512

                f1131175fbc4cd6f4259977483f090dfd1d7eb244c222757fe244f362f73d733e319a3b1499aa438d0a754cebf62a80c37104d57c80490383daf74602db0e594

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a6310968.exe

                Filesize

                147KB

                MD5

                0b047b95824c2721176653d651c9df93

                SHA1

                29c961b92f80d74db61e18c4e79606f475268759

                SHA256

                47cf67534c3de622fcd364b9d896b1db5e2c36c0bd888733d8e77b00fbd83619

                SHA512

                f1131175fbc4cd6f4259977483f090dfd1d7eb244c222757fe244f362f73d733e319a3b1499aa438d0a754cebf62a80c37104d57c80490383daf74602db0e594

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7005136.exe

                Filesize

                168KB

                MD5

                acadccb578fd3554588db65cc8a0f431

                SHA1

                189cd4de761dba50ce7d8624106f7e62d068b02d

                SHA256

                9f65f2a68ec5c97c6e2ba01a79e009544054a4ed0adc060c62f9e60d2034846c

                SHA512

                cbf84ae39548758580874c0d0bad004af77b9f50c979234e3cf82a86d292349fe09bfd554628927ce516d4970192e81266c7602d87013847e076fb1016e624df

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7005136.exe

                Filesize

                168KB

                MD5

                acadccb578fd3554588db65cc8a0f431

                SHA1

                189cd4de761dba50ce7d8624106f7e62d068b02d

                SHA256

                9f65f2a68ec5c97c6e2ba01a79e009544054a4ed0adc060c62f9e60d2034846c

                SHA512

                cbf84ae39548758580874c0d0bad004af77b9f50c979234e3cf82a86d292349fe09bfd554628927ce516d4970192e81266c7602d87013847e076fb1016e624df

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                216KB

                MD5

                7ad6c3c7c4beadf52583c8395dc83799

                SHA1

                c3cb7502bc49a59f94d3500065cfd0bb60e32c0f

                SHA256

                5f2a53ba1fd7b667da14aa8010ac58d4b59bf291b16e3489a45fc2f2fbb00311

                SHA512

                ecc2ff12f33516a18d7dfa7c9af3a4f3e1f8ffb722722f512f7492a2ed2eccdbeaf2507faed12dfddaef774db824fe1a25ed47f9a9f9e7ce41c24eea6f3c51ee

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                216KB

                MD5

                7ad6c3c7c4beadf52583c8395dc83799

                SHA1

                c3cb7502bc49a59f94d3500065cfd0bb60e32c0f

                SHA256

                5f2a53ba1fd7b667da14aa8010ac58d4b59bf291b16e3489a45fc2f2fbb00311

                SHA512

                ecc2ff12f33516a18d7dfa7c9af3a4f3e1f8ffb722722f512f7492a2ed2eccdbeaf2507faed12dfddaef774db824fe1a25ed47f9a9f9e7ce41c24eea6f3c51ee

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                216KB

                MD5

                7ad6c3c7c4beadf52583c8395dc83799

                SHA1

                c3cb7502bc49a59f94d3500065cfd0bb60e32c0f

                SHA256

                5f2a53ba1fd7b667da14aa8010ac58d4b59bf291b16e3489a45fc2f2fbb00311

                SHA512

                ecc2ff12f33516a18d7dfa7c9af3a4f3e1f8ffb722722f512f7492a2ed2eccdbeaf2507faed12dfddaef774db824fe1a25ed47f9a9f9e7ce41c24eea6f3c51ee

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                216KB

                MD5

                7ad6c3c7c4beadf52583c8395dc83799

                SHA1

                c3cb7502bc49a59f94d3500065cfd0bb60e32c0f

                SHA256

                5f2a53ba1fd7b667da14aa8010ac58d4b59bf291b16e3489a45fc2f2fbb00311

                SHA512

                ecc2ff12f33516a18d7dfa7c9af3a4f3e1f8ffb722722f512f7492a2ed2eccdbeaf2507faed12dfddaef774db824fe1a25ed47f9a9f9e7ce41c24eea6f3c51ee

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                216KB

                MD5

                7ad6c3c7c4beadf52583c8395dc83799

                SHA1

                c3cb7502bc49a59f94d3500065cfd0bb60e32c0f

                SHA256

                5f2a53ba1fd7b667da14aa8010ac58d4b59bf291b16e3489a45fc2f2fbb00311

                SHA512

                ecc2ff12f33516a18d7dfa7c9af3a4f3e1f8ffb722722f512f7492a2ed2eccdbeaf2507faed12dfddaef774db824fe1a25ed47f9a9f9e7ce41c24eea6f3c51ee

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • memory/452-162-0x00000000009F0000-0x0000000000A1E000-memory.dmp

                Filesize

                184KB

              • memory/452-168-0x000000000AAD0000-0x000000000AB46000-memory.dmp

                Filesize

                472KB

              • memory/452-175-0x0000000002D30000-0x0000000002D40000-memory.dmp

                Filesize

                64KB

              • memory/452-174-0x000000000C840000-0x000000000CD6C000-memory.dmp

                Filesize

                5.2MB

              • memory/452-173-0x000000000C140000-0x000000000C302000-memory.dmp

                Filesize

                1.8MB

              • memory/452-171-0x000000000B410000-0x000000000B476000-memory.dmp

                Filesize

                408KB

              • memory/452-170-0x000000000B8C0000-0x000000000BE64000-memory.dmp

                Filesize

                5.6MB

              • memory/452-169-0x000000000ABF0000-0x000000000AC82000-memory.dmp

                Filesize

                584KB

              • memory/452-163-0x000000000ACF0000-0x000000000B308000-memory.dmp

                Filesize

                6.1MB

              • memory/452-176-0x000000000BFC0000-0x000000000C010000-memory.dmp

                Filesize

                320KB

              • memory/452-164-0x000000000A830000-0x000000000A93A000-memory.dmp

                Filesize

                1.0MB

              • memory/452-167-0x0000000002D30000-0x0000000002D40000-memory.dmp

                Filesize

                64KB

              • memory/452-166-0x000000000A7C0000-0x000000000A7FC000-memory.dmp

                Filesize

                240KB

              • memory/452-165-0x000000000A760000-0x000000000A772000-memory.dmp

                Filesize

                72KB

              • memory/4784-154-0x0000000000400000-0x000000000040A000-memory.dmp

                Filesize

                40KB

              • memory/4872-200-0x00000000008A0000-0x00000000008B0000-memory.dmp

                Filesize

                64KB

              • memory/4872-194-0x0000000000150000-0x000000000017E000-memory.dmp

                Filesize

                184KB