Analysis

  • max time kernel
    133s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-06-2023 08:51

General

  • Target

    d76cedb0c5dcbd3cb098d3fd83817c5e2bc3a64b2ce4fe9f3759b70131ed75b5.exe

  • Size

    778KB

  • MD5

    f766c85c2da335d4472dc6301b225091

  • SHA1

    d20e968edf6b486828cbc85b96cbaedf78449a5a

  • SHA256

    d76cedb0c5dcbd3cb098d3fd83817c5e2bc3a64b2ce4fe9f3759b70131ed75b5

  • SHA512

    a6af5a5151acba13c334202bdd5cb53c9f6327a2ea5d340570117cc3fb079dfbad24a582acd1eba4a4dd6b001884f4ee5781b2a4efdfdfedb10a64103d03a29e

  • SSDEEP

    12288:UMrfy90jbHN2x/N8uqSm4q/T9IoEzqK8shSZfpt+Mk+FEyAuAlRi0+5PPo:jyPudnyoEzq5ZR8OEhTlp+5Y

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19046

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Extracted

Family

redline

Botnet

metro

C2

83.97.73.126:19046

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d76cedb0c5dcbd3cb098d3fd83817c5e2bc3a64b2ce4fe9f3759b70131ed75b5.exe
    "C:\Users\Admin\AppData\Local\Temp\d76cedb0c5dcbd3cb098d3fd83817c5e2bc3a64b2ce4fe9f3759b70131ed75b5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:748
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5569459.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5569459.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4464
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6351677.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6351677.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:5060
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4285082.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4285082.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3224
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1508
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2947142.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2947142.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5004
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1715146.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1715146.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:5100
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4540
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metado.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:2148
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metado.exe" /P "Admin:N"&&CACLS "metado.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:4652
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:2960
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metado.exe" /P "Admin:N"
                6⤵
                  PID:4064
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "metado.exe" /P "Admin:R" /E
                  6⤵
                    PID:2884
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:2876
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\a9e2a16078" /P "Admin:N"
                      6⤵
                        PID:4348
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:2296
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:4752
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6713668.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6713668.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:2888
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3972
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:908
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:2736

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                Filesize

                226B

                MD5

                916851e072fbabc4796d8916c5131092

                SHA1

                d48a602229a690c512d5fdaf4c8d77547a88e7a2

                SHA256

                7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                SHA512

                07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6713668.exe

                Filesize

                304KB

                MD5

                52c627dc320591c96f98bb44f57a1445

                SHA1

                99314b7165bf308787bcc604a952c7fdfa3e638d

                SHA256

                62153fd093fe6bdf842b2ec5acc5cb62a888413eef92b3ff678339d1a70bbade

                SHA512

                422102ec0c654530f1ed631ab76c116447083881e7ead9829aab61efe3ed76ec68687f404e3a4755d28cd3e1aebf17e407919e53a6a9741e8de072357f610e3e

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6713668.exe

                Filesize

                304KB

                MD5

                52c627dc320591c96f98bb44f57a1445

                SHA1

                99314b7165bf308787bcc604a952c7fdfa3e638d

                SHA256

                62153fd093fe6bdf842b2ec5acc5cb62a888413eef92b3ff678339d1a70bbade

                SHA512

                422102ec0c654530f1ed631ab76c116447083881e7ead9829aab61efe3ed76ec68687f404e3a4755d28cd3e1aebf17e407919e53a6a9741e8de072357f610e3e

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5569459.exe

                Filesize

                448KB

                MD5

                ab8a71a02b1c53ced4271bf216174cad

                SHA1

                5e0b290b4433b597faf6ca3d9e6097007b1a10bc

                SHA256

                7fd7858a20aaff4be83332dd6ce04620c2b1f5b1c5cf559beb0a2f928835c592

                SHA512

                cf759a3792f7b3cf1b251a308c1156c07c15fa8489f0a82a485559671555afaf5a491d10d704216152cc2237c36808822f59146263fc56032de197bd1301edc7

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5569459.exe

                Filesize

                448KB

                MD5

                ab8a71a02b1c53ced4271bf216174cad

                SHA1

                5e0b290b4433b597faf6ca3d9e6097007b1a10bc

                SHA256

                7fd7858a20aaff4be83332dd6ce04620c2b1f5b1c5cf559beb0a2f928835c592

                SHA512

                cf759a3792f7b3cf1b251a308c1156c07c15fa8489f0a82a485559671555afaf5a491d10d704216152cc2237c36808822f59146263fc56032de197bd1301edc7

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1715146.exe

                Filesize

                216KB

                MD5

                e78e331fc303c577613365a757330350

                SHA1

                d6185c7cab5c28e7150c904e27368326276860df

                SHA256

                b8d28228481f5a9225f39c5b9ec7a49ad082ad89ba01cfe11a3662bd3a9fe0c9

                SHA512

                6ec0932729725ade03a0a864ef6000e53010629597ea7c405efc49bb389f2356609e28d632f25406436bea321c62478a73f27b5b58f6b08e3b561dfbb84430ec

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1715146.exe

                Filesize

                216KB

                MD5

                e78e331fc303c577613365a757330350

                SHA1

                d6185c7cab5c28e7150c904e27368326276860df

                SHA256

                b8d28228481f5a9225f39c5b9ec7a49ad082ad89ba01cfe11a3662bd3a9fe0c9

                SHA512

                6ec0932729725ade03a0a864ef6000e53010629597ea7c405efc49bb389f2356609e28d632f25406436bea321c62478a73f27b5b58f6b08e3b561dfbb84430ec

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6351677.exe

                Filesize

                276KB

                MD5

                635800428bc528517c3d040c9f05fa81

                SHA1

                597bfc9696b9bac422c545ec8eb607f7011c8762

                SHA256

                4e95684507d14e0c897aaaae69757e35a2eca446f053cad3957933bc9623f68c

                SHA512

                5d96aafbe5dfc062b96ee6436250061dc29967f507909c8e9551dd4435528f25a379407b50bb84a6364c6e5a5c5ed079eefcf6894e9b6997799e314c7fa33a62

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6351677.exe

                Filesize

                276KB

                MD5

                635800428bc528517c3d040c9f05fa81

                SHA1

                597bfc9696b9bac422c545ec8eb607f7011c8762

                SHA256

                4e95684507d14e0c897aaaae69757e35a2eca446f053cad3957933bc9623f68c

                SHA512

                5d96aafbe5dfc062b96ee6436250061dc29967f507909c8e9551dd4435528f25a379407b50bb84a6364c6e5a5c5ed079eefcf6894e9b6997799e314c7fa33a62

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4285082.exe

                Filesize

                147KB

                MD5

                8a8dce7171797ee266238fda176fc847

                SHA1

                3f46aa2c8bd50da9b260c7fa8c4a7fbbfdb98d5d

                SHA256

                d2b4f8b6d6001286b4d7f3f4eeba9503494464681ae690e32a7a771f54b11449

                SHA512

                da096dc6a81a6947c0dc09240f61b57c9145cc83d53dc4aa86f7037a5d578aa37a0e48883909ceef5f9c544ed5963f355149d35abafcc936c6e8cd35dd58d065

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4285082.exe

                Filesize

                147KB

                MD5

                8a8dce7171797ee266238fda176fc847

                SHA1

                3f46aa2c8bd50da9b260c7fa8c4a7fbbfdb98d5d

                SHA256

                d2b4f8b6d6001286b4d7f3f4eeba9503494464681ae690e32a7a771f54b11449

                SHA512

                da096dc6a81a6947c0dc09240f61b57c9145cc83d53dc4aa86f7037a5d578aa37a0e48883909ceef5f9c544ed5963f355149d35abafcc936c6e8cd35dd58d065

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2947142.exe

                Filesize

                168KB

                MD5

                66d83f043f9fed9842cc08ee41ca02ed

                SHA1

                42146fda54116bd9952db1973616da2397857084

                SHA256

                8ca0cfda4a5f36164ee9bc878f39eb0e0766de5e5866a2d4f7fdb3ccfe4cbb7d

                SHA512

                1d69efa86ed7b243fb3963463ea89dca6a56258eeece48c33480656890d6a375d9c5fd015966fbb876eaf2ff2c837383ac21843ddbff78fe207b1053c211a33d

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2947142.exe

                Filesize

                168KB

                MD5

                66d83f043f9fed9842cc08ee41ca02ed

                SHA1

                42146fda54116bd9952db1973616da2397857084

                SHA256

                8ca0cfda4a5f36164ee9bc878f39eb0e0766de5e5866a2d4f7fdb3ccfe4cbb7d

                SHA512

                1d69efa86ed7b243fb3963463ea89dca6a56258eeece48c33480656890d6a375d9c5fd015966fbb876eaf2ff2c837383ac21843ddbff78fe207b1053c211a33d

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                216KB

                MD5

                e78e331fc303c577613365a757330350

                SHA1

                d6185c7cab5c28e7150c904e27368326276860df

                SHA256

                b8d28228481f5a9225f39c5b9ec7a49ad082ad89ba01cfe11a3662bd3a9fe0c9

                SHA512

                6ec0932729725ade03a0a864ef6000e53010629597ea7c405efc49bb389f2356609e28d632f25406436bea321c62478a73f27b5b58f6b08e3b561dfbb84430ec

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                216KB

                MD5

                e78e331fc303c577613365a757330350

                SHA1

                d6185c7cab5c28e7150c904e27368326276860df

                SHA256

                b8d28228481f5a9225f39c5b9ec7a49ad082ad89ba01cfe11a3662bd3a9fe0c9

                SHA512

                6ec0932729725ade03a0a864ef6000e53010629597ea7c405efc49bb389f2356609e28d632f25406436bea321c62478a73f27b5b58f6b08e3b561dfbb84430ec

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                216KB

                MD5

                e78e331fc303c577613365a757330350

                SHA1

                d6185c7cab5c28e7150c904e27368326276860df

                SHA256

                b8d28228481f5a9225f39c5b9ec7a49ad082ad89ba01cfe11a3662bd3a9fe0c9

                SHA512

                6ec0932729725ade03a0a864ef6000e53010629597ea7c405efc49bb389f2356609e28d632f25406436bea321c62478a73f27b5b58f6b08e3b561dfbb84430ec

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                216KB

                MD5

                e78e331fc303c577613365a757330350

                SHA1

                d6185c7cab5c28e7150c904e27368326276860df

                SHA256

                b8d28228481f5a9225f39c5b9ec7a49ad082ad89ba01cfe11a3662bd3a9fe0c9

                SHA512

                6ec0932729725ade03a0a864ef6000e53010629597ea7c405efc49bb389f2356609e28d632f25406436bea321c62478a73f27b5b58f6b08e3b561dfbb84430ec

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                216KB

                MD5

                e78e331fc303c577613365a757330350

                SHA1

                d6185c7cab5c28e7150c904e27368326276860df

                SHA256

                b8d28228481f5a9225f39c5b9ec7a49ad082ad89ba01cfe11a3662bd3a9fe0c9

                SHA512

                6ec0932729725ade03a0a864ef6000e53010629597ea7c405efc49bb389f2356609e28d632f25406436bea321c62478a73f27b5b58f6b08e3b561dfbb84430ec

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • memory/1508-154-0x0000000000400000-0x000000000040A000-memory.dmp

                Filesize

                40KB

              • memory/3972-194-0x0000000000400000-0x000000000042E000-memory.dmp

                Filesize

                184KB

              • memory/3972-200-0x0000000005060000-0x0000000005070000-memory.dmp

                Filesize

                64KB

              • memory/5004-162-0x0000000000B20000-0x0000000000B4E000-memory.dmp

                Filesize

                184KB

              • memory/5004-176-0x0000000006AA0000-0x0000000006AF0000-memory.dmp

                Filesize

                320KB

              • memory/5004-175-0x0000000005420000-0x0000000005430000-memory.dmp

                Filesize

                64KB

              • memory/5004-173-0x0000000008CE0000-0x000000000920C000-memory.dmp

                Filesize

                5.2MB

              • memory/5004-172-0x0000000006830000-0x00000000069F2000-memory.dmp

                Filesize

                1.8MB

              • memory/5004-171-0x00000000059A0000-0x0000000005A06000-memory.dmp

                Filesize

                408KB

              • memory/5004-170-0x0000000006B10000-0x00000000070B4000-memory.dmp

                Filesize

                5.6MB

              • memory/5004-169-0x0000000005900000-0x0000000005992000-memory.dmp

                Filesize

                584KB

              • memory/5004-168-0x00000000057E0000-0x0000000005856000-memory.dmp

                Filesize

                472KB

              • memory/5004-167-0x0000000005420000-0x0000000005430000-memory.dmp

                Filesize

                64KB

              • memory/5004-166-0x00000000054D0000-0x000000000550C000-memory.dmp

                Filesize

                240KB

              • memory/5004-165-0x0000000005470000-0x0000000005482000-memory.dmp

                Filesize

                72KB

              • memory/5004-164-0x0000000005540000-0x000000000564A000-memory.dmp

                Filesize

                1.0MB

              • memory/5004-163-0x0000000005A50000-0x0000000006068000-memory.dmp

                Filesize

                6.1MB