Analysis

  • max time kernel
    128s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-06-2023 14:50

General

  • Target

    688eebac37bb9694c4d029a9ecabc4ce3de4ff80dd232735a5e025654fe990ce.exe

  • Size

    624KB

  • MD5

    2d7e22b96e015ad22bfcb2b3073540fe

  • SHA1

    c3f55ded5d22e62f78ea03ec0236cf15e13382eb

  • SHA256

    688eebac37bb9694c4d029a9ecabc4ce3de4ff80dd232735a5e025654fe990ce

  • SHA512

    ed796572c845df91bb41678d6595dbb9a8702266e8bdef1877cd2cab48dc3e54a7e390210e19a56f289450c31779e9c7c405287bf690270304b371aaca0b7b05

  • SSDEEP

    12288:RMrBy90nl0kvG1dFiSFGGDuuGp8eX1rR8qOVZYnyCsxscoqq9:UyUvvcPjF5DuupyR89e19V9

Malware Config

Extracted

Family

redline

Botnet

dusa

C2

83.97.73.126:19046

Attributes
  • auth_value

    ee896466545fedf9de5406175fb82de5

Extracted

Family

redline

Botnet

brain

C2

83.97.73.126:19046

Attributes
  • auth_value

    5fb8269baadec0c49899b9a7a0c8851f

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\688eebac37bb9694c4d029a9ecabc4ce3de4ff80dd232735a5e025654fe990ce.exe
    "C:\Users\Admin\AppData\Local\Temp\688eebac37bb9694c4d029a9ecabc4ce3de4ff80dd232735a5e025654fe990ce.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1072
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2710482.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2710482.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4460
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1689938.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1689938.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1036
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f7719589.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f7719589.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5112
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9504337.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9504337.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2408
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2064
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3293039.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3293039.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:1336
        • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
          "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1328
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN metado.exe /TR "C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe" /F
            5⤵
            • Creates scheduled task(s)
            PID:4392
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "metado.exe" /P "Admin:N"&&CACLS "metado.exe" /P "Admin:R" /E&&echo Y|CACLS "..\a9e2a16078" /P "Admin:N"&&CACLS "..\a9e2a16078" /P "Admin:R" /E&&Exit
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3592
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
              6⤵
                PID:2748
              • C:\Windows\SysWOW64\cacls.exe
                CACLS "metado.exe" /P "Admin:N"
                6⤵
                  PID:3356
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "metado.exe" /P "Admin:R" /E
                  6⤵
                    PID:4644
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                    6⤵
                      PID:2340
                    • C:\Windows\SysWOW64\cacls.exe
                      CACLS "..\a9e2a16078" /P "Admin:N"
                      6⤵
                        PID:3284
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\a9e2a16078" /P "Admin:R" /E
                        6⤵
                          PID:3952
                      • C:\Windows\SysWOW64\rundll32.exe
                        "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                        5⤵
                        • Loads dropped DLL
                        PID:3388
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8890501.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8890501.exe
                  2⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious use of WriteProcessMemory
                  PID:1856
                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
                    "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
                    3⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:624
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:4656
              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe
                1⤵
                • Executes dropped EXE
                PID:2284

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

                Filesize

                226B

                MD5

                916851e072fbabc4796d8916c5131092

                SHA1

                d48a602229a690c512d5fdaf4c8d77547a88e7a2

                SHA256

                7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

                SHA512

                07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8890501.exe

                Filesize

                265KB

                MD5

                f00bcf65d961efb9f6bbe41654e9f833

                SHA1

                3aef98be6b811bd1af47d32235bcdfc50e67153c

                SHA256

                d4494466499ad58bbf255ec234d085c46561db3b83786edb303c62003f4a2664

                SHA512

                ee81e4fc1ec84ce9e3ba2eef6184fb4453a628749068c91500a66f4e6af72a62919b9f3adeb48858c94832f704e816c11b86dbd10514871c5f206a865c6e5965

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8890501.exe

                Filesize

                265KB

                MD5

                f00bcf65d961efb9f6bbe41654e9f833

                SHA1

                3aef98be6b811bd1af47d32235bcdfc50e67153c

                SHA256

                d4494466499ad58bbf255ec234d085c46561db3b83786edb303c62003f4a2664

                SHA512

                ee81e4fc1ec84ce9e3ba2eef6184fb4453a628749068c91500a66f4e6af72a62919b9f3adeb48858c94832f704e816c11b86dbd10514871c5f206a865c6e5965

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2710482.exe

                Filesize

                424KB

                MD5

                64e3ba7ddeb06b134b8076eb8d42711d

                SHA1

                c15933311f105d1c2421626601fac9796e69d95e

                SHA256

                36064cea93e8e17842ba85549be8f596e9c5e3f77b7669a83c7a3cc22cbf949b

                SHA512

                6cb7474f572b3665fd9c6ff240298d691a63c06d37b7fe3a06bfc2d808ca9d9d9cae9116380dbeb166c78af02c7bd273f2a1d7ae1a8ddf5e0e6ff36815d8f28e

              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2710482.exe

                Filesize

                424KB

                MD5

                64e3ba7ddeb06b134b8076eb8d42711d

                SHA1

                c15933311f105d1c2421626601fac9796e69d95e

                SHA256

                36064cea93e8e17842ba85549be8f596e9c5e3f77b7669a83c7a3cc22cbf949b

                SHA512

                6cb7474f572b3665fd9c6ff240298d691a63c06d37b7fe3a06bfc2d808ca9d9d9cae9116380dbeb166c78af02c7bd273f2a1d7ae1a8ddf5e0e6ff36815d8f28e

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3293039.exe

                Filesize

                217KB

                MD5

                0b8f8d134a516d299b76447df8d68ba1

                SHA1

                617950bee43c5f2f38f7deb411b14aeddeca614f

                SHA256

                b8f3d517944572ba1dfdb7b0496e30cc3c9cb52d8b1fbf9290a644db20f5867c

                SHA512

                515c4915f4eb44ec0656d2b4f8f5d0d2cddad881e6524b7d97ccf9bec06d21f4d2783b8bd470911c201cec7c12acac240622bd85d689b2d2621095cc03f923f5

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h3293039.exe

                Filesize

                217KB

                MD5

                0b8f8d134a516d299b76447df8d68ba1

                SHA1

                617950bee43c5f2f38f7deb411b14aeddeca614f

                SHA256

                b8f3d517944572ba1dfdb7b0496e30cc3c9cb52d8b1fbf9290a644db20f5867c

                SHA512

                515c4915f4eb44ec0656d2b4f8f5d0d2cddad881e6524b7d97ccf9bec06d21f4d2783b8bd470911c201cec7c12acac240622bd85d689b2d2621095cc03f923f5

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1689938.exe

                Filesize

                252KB

                MD5

                6de60c13c8e1272539e9cde767a2f6bc

                SHA1

                2e86b9fd04495b7f3b2832ebfd0c8e37c239bdfe

                SHA256

                15c124cc96786fe9aaa2f4a26ef2871b9b7f5084ac04a09a4d292cad400c115e

                SHA512

                c88e17f18ad539c13d2c784f3f212c15087b1306a1b3f965a8c35f119305c8c85f55656c201b497a707265114e0c4a80447971bc286470526434f92ea073a151

              • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x1689938.exe

                Filesize

                252KB

                MD5

                6de60c13c8e1272539e9cde767a2f6bc

                SHA1

                2e86b9fd04495b7f3b2832ebfd0c8e37c239bdfe

                SHA256

                15c124cc96786fe9aaa2f4a26ef2871b9b7f5084ac04a09a4d292cad400c115e

                SHA512

                c88e17f18ad539c13d2c784f3f212c15087b1306a1b3f965a8c35f119305c8c85f55656c201b497a707265114e0c4a80447971bc286470526434f92ea073a151

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f7719589.exe

                Filesize

                168KB

                MD5

                46bc7ec3b7c5cdfdd25473ee6a046da9

                SHA1

                1c86eb1a3659ae5aa6b79d542d43ef547021b0b6

                SHA256

                8af3cfd057c7f7929a5ab68041e22b64fc22f0cbb2d5e522f2e8615d5115940a

                SHA512

                29bd1e163e83335e99f6ebeea20932cfe58633a42b110c356ef582376fc09b9d4e061c7a6a089b646019be72032f0ef9ca56048171125af1199882c80e53f38a

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f7719589.exe

                Filesize

                168KB

                MD5

                46bc7ec3b7c5cdfdd25473ee6a046da9

                SHA1

                1c86eb1a3659ae5aa6b79d542d43ef547021b0b6

                SHA256

                8af3cfd057c7f7929a5ab68041e22b64fc22f0cbb2d5e522f2e8615d5115940a

                SHA512

                29bd1e163e83335e99f6ebeea20932cfe58633a42b110c356ef582376fc09b9d4e061c7a6a089b646019be72032f0ef9ca56048171125af1199882c80e53f38a

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9504337.exe

                Filesize

                108KB

                MD5

                bd698f3949fa1755fbe24eeadd04052f

                SHA1

                831aa1078413fcef8efef92ed87fbc2cfdebb1e1

                SHA256

                87d10b8aef6d171a6061318514832289094088dbf8f1976b58bef98e236fe3ba

                SHA512

                7454e4013979d0ace7c79623be607b704c18beee1ca9b0fbe82c7cf576a9aa79c0ce72c30f09e0137324da7e056b06d8e38367b0caad2608b41fe04b7fa4eb37

              • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9504337.exe

                Filesize

                108KB

                MD5

                bd698f3949fa1755fbe24eeadd04052f

                SHA1

                831aa1078413fcef8efef92ed87fbc2cfdebb1e1

                SHA256

                87d10b8aef6d171a6061318514832289094088dbf8f1976b58bef98e236fe3ba

                SHA512

                7454e4013979d0ace7c79623be607b704c18beee1ca9b0fbe82c7cf576a9aa79c0ce72c30f09e0137324da7e056b06d8e38367b0caad2608b41fe04b7fa4eb37

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                217KB

                MD5

                0b8f8d134a516d299b76447df8d68ba1

                SHA1

                617950bee43c5f2f38f7deb411b14aeddeca614f

                SHA256

                b8f3d517944572ba1dfdb7b0496e30cc3c9cb52d8b1fbf9290a644db20f5867c

                SHA512

                515c4915f4eb44ec0656d2b4f8f5d0d2cddad881e6524b7d97ccf9bec06d21f4d2783b8bd470911c201cec7c12acac240622bd85d689b2d2621095cc03f923f5

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                217KB

                MD5

                0b8f8d134a516d299b76447df8d68ba1

                SHA1

                617950bee43c5f2f38f7deb411b14aeddeca614f

                SHA256

                b8f3d517944572ba1dfdb7b0496e30cc3c9cb52d8b1fbf9290a644db20f5867c

                SHA512

                515c4915f4eb44ec0656d2b4f8f5d0d2cddad881e6524b7d97ccf9bec06d21f4d2783b8bd470911c201cec7c12acac240622bd85d689b2d2621095cc03f923f5

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                217KB

                MD5

                0b8f8d134a516d299b76447df8d68ba1

                SHA1

                617950bee43c5f2f38f7deb411b14aeddeca614f

                SHA256

                b8f3d517944572ba1dfdb7b0496e30cc3c9cb52d8b1fbf9290a644db20f5867c

                SHA512

                515c4915f4eb44ec0656d2b4f8f5d0d2cddad881e6524b7d97ccf9bec06d21f4d2783b8bd470911c201cec7c12acac240622bd85d689b2d2621095cc03f923f5

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                217KB

                MD5

                0b8f8d134a516d299b76447df8d68ba1

                SHA1

                617950bee43c5f2f38f7deb411b14aeddeca614f

                SHA256

                b8f3d517944572ba1dfdb7b0496e30cc3c9cb52d8b1fbf9290a644db20f5867c

                SHA512

                515c4915f4eb44ec0656d2b4f8f5d0d2cddad881e6524b7d97ccf9bec06d21f4d2783b8bd470911c201cec7c12acac240622bd85d689b2d2621095cc03f923f5

              • C:\Users\Admin\AppData\Local\Temp\a9e2a16078\metado.exe

                Filesize

                217KB

                MD5

                0b8f8d134a516d299b76447df8d68ba1

                SHA1

                617950bee43c5f2f38f7deb411b14aeddeca614f

                SHA256

                b8f3d517944572ba1dfdb7b0496e30cc3c9cb52d8b1fbf9290a644db20f5867c

                SHA512

                515c4915f4eb44ec0656d2b4f8f5d0d2cddad881e6524b7d97ccf9bec06d21f4d2783b8bd470911c201cec7c12acac240622bd85d689b2d2621095cc03f923f5

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                Filesize

                89KB

                MD5

                547bae937be965d63f61d89e8eafb4a1

                SHA1

                85466c95625bcbb7f68aa89a367149d35f80e1fa

                SHA256

                015d60486e75035f83ea454e87afb38d11ec39643c33b07f61a40343078ee4f5

                SHA512

                1869b1cd3dcc09fbf9f965a8f45b647390e8859e6bf476293cbfd8b1122c660eca5db2943f0b1e77d451684fdef34ae503d5f357408e1a4fe5c1237871f5d02f

              • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\cred64.dll

                Filesize

                162B

                MD5

                1b7c22a214949975556626d7217e9a39

                SHA1

                d01c97e2944166ed23e47e4a62ff471ab8fa031f

                SHA256

                340c8464c2007ce3f80682e15dfafa4180b641d53c14201b929906b7b0284d87

                SHA512

                ba64847cf1d4157d50abe4f4a1e5c1996fe387c5808e2f758c7fb3213bfefe1f3712d343f0c30a16819749840954654a70611d2250fd0f7b032429db7afd2cc5

              • memory/624-193-0x0000000000400000-0x000000000042E000-memory.dmp

                Filesize

                184KB

              • memory/624-198-0x0000000002A10000-0x0000000002A20000-memory.dmp

                Filesize

                64KB

              • memory/2064-172-0x00000000007B0000-0x00000000007BA000-memory.dmp

                Filesize

                40KB

              • memory/5112-157-0x000000000ACA0000-0x000000000ACB2000-memory.dmp

                Filesize

                72KB

              • memory/5112-167-0x0000000005850000-0x0000000005860000-memory.dmp

                Filesize

                64KB

              • memory/5112-166-0x000000000C500000-0x000000000C550000-memory.dmp

                Filesize

                320KB

              • memory/5112-165-0x000000000CD50000-0x000000000D27C000-memory.dmp

                Filesize

                5.2MB

              • memory/5112-164-0x000000000C650000-0x000000000C812000-memory.dmp

                Filesize

                1.8MB

              • memory/5112-163-0x000000000B950000-0x000000000B9B6000-memory.dmp

                Filesize

                408KB

              • memory/5112-162-0x000000000BDD0000-0x000000000C374000-memory.dmp

                Filesize

                5.6MB

              • memory/5112-161-0x000000000B130000-0x000000000B1C2000-memory.dmp

                Filesize

                584KB

              • memory/5112-160-0x000000000B010000-0x000000000B086000-memory.dmp

                Filesize

                472KB

              • memory/5112-159-0x0000000005850000-0x0000000005860000-memory.dmp

                Filesize

                64KB

              • memory/5112-158-0x000000000AD00000-0x000000000AD3C000-memory.dmp

                Filesize

                240KB

              • memory/5112-156-0x000000000AD70000-0x000000000AE7A000-memory.dmp

                Filesize

                1.0MB

              • memory/5112-155-0x000000000B200000-0x000000000B818000-memory.dmp

                Filesize

                6.1MB

              • memory/5112-154-0x0000000000DF0000-0x0000000000E1E000-memory.dmp

                Filesize

                184KB