Analysis
-
max time kernel
144s -
max time network
158s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
15-02-2022 07:11
Static task
static1
Behavioral task
behavioral1
Sample
ac6f90ff2e5bddd26a0e1abdf9d35b5533d0d09727a0fd1c28da4bfec2bda950.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
ac6f90ff2e5bddd26a0e1abdf9d35b5533d0d09727a0fd1c28da4bfec2bda950.exe
Resource
win10v2004-en-20220113
General
-
Target
ac6f90ff2e5bddd26a0e1abdf9d35b5533d0d09727a0fd1c28da4bfec2bda950.exe
-
Size
6.4MB
-
MD5
1008944bf8de596e9d032ab66a46caa7
-
SHA1
cc411e0c3b2a7ef3e02618bdab39d9a023f0569d
-
SHA256
ac6f90ff2e5bddd26a0e1abdf9d35b5533d0d09727a0fd1c28da4bfec2bda950
-
SHA512
67e9d1d78fa1a32b53f59c3a21846cb125b5f9d79acd56eb8357cd04aec754418a430b11287f106177439c49e9df08e72d5fab2e2ff1b7927cf2c48934ca393d
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1620-72-0x00000000013E0000-0x0000000001BA0000-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Executes dropped EXE 4 IoCs
Processes:
proliv041.exeUnderdress.exeUnseduceability.exepid process 1620 proliv041.exe 864 Underdress.exe 1236 Unseduceability.exe 1360 -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
proliv041.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion proliv041.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion proliv041.exe -
Loads dropped DLL 9 IoCs
Processes:
ac6f90ff2e5bddd26a0e1abdf9d35b5533d0d09727a0fd1c28da4bfec2bda950.exeUnderdress.exeWerFault.exepid process 764 ac6f90ff2e5bddd26a0e1abdf9d35b5533d0d09727a0fd1c28da4bfec2bda950.exe 764 ac6f90ff2e5bddd26a0e1abdf9d35b5533d0d09727a0fd1c28da4bfec2bda950.exe 864 Underdress.exe 864 Underdress.exe 1728 WerFault.exe 1728 WerFault.exe 1728 WerFault.exe 1728 WerFault.exe 1728 WerFault.exe -
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\proliv041.exe themida C:\Users\Admin\AppData\Roaming\proliv041.exe themida behavioral1/memory/1620-72-0x00000000013E0000-0x0000000001BA0000-memory.dmp themida -
Processes:
proliv041.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA proliv041.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
proliv041.exepid process 1620 proliv041.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1728 1236 WerFault.exe Unseduceability.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
proliv041.exeWerFault.exepid process 1620 proliv041.exe 1728 WerFault.exe 1728 WerFault.exe 1728 WerFault.exe 1728 WerFault.exe 1728 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
WerFault.exepid process 1728 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Unseduceability.exeWerFault.exedescription pid process Token: SeDebugPrivilege 1236 Unseduceability.exe Token: SeDebugPrivilege 1728 WerFault.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
ac6f90ff2e5bddd26a0e1abdf9d35b5533d0d09727a0fd1c28da4bfec2bda950.exeUnderdress.exeUnseduceability.exedescription pid process target process PID 764 wrote to memory of 1620 764 ac6f90ff2e5bddd26a0e1abdf9d35b5533d0d09727a0fd1c28da4bfec2bda950.exe proliv041.exe PID 764 wrote to memory of 1620 764 ac6f90ff2e5bddd26a0e1abdf9d35b5533d0d09727a0fd1c28da4bfec2bda950.exe proliv041.exe PID 764 wrote to memory of 1620 764 ac6f90ff2e5bddd26a0e1abdf9d35b5533d0d09727a0fd1c28da4bfec2bda950.exe proliv041.exe PID 764 wrote to memory of 1620 764 ac6f90ff2e5bddd26a0e1abdf9d35b5533d0d09727a0fd1c28da4bfec2bda950.exe proliv041.exe PID 764 wrote to memory of 864 764 ac6f90ff2e5bddd26a0e1abdf9d35b5533d0d09727a0fd1c28da4bfec2bda950.exe Underdress.exe PID 764 wrote to memory of 864 764 ac6f90ff2e5bddd26a0e1abdf9d35b5533d0d09727a0fd1c28da4bfec2bda950.exe Underdress.exe PID 764 wrote to memory of 864 764 ac6f90ff2e5bddd26a0e1abdf9d35b5533d0d09727a0fd1c28da4bfec2bda950.exe Underdress.exe PID 764 wrote to memory of 864 764 ac6f90ff2e5bddd26a0e1abdf9d35b5533d0d09727a0fd1c28da4bfec2bda950.exe Underdress.exe PID 764 wrote to memory of 864 764 ac6f90ff2e5bddd26a0e1abdf9d35b5533d0d09727a0fd1c28da4bfec2bda950.exe Underdress.exe PID 764 wrote to memory of 864 764 ac6f90ff2e5bddd26a0e1abdf9d35b5533d0d09727a0fd1c28da4bfec2bda950.exe Underdress.exe PID 764 wrote to memory of 864 764 ac6f90ff2e5bddd26a0e1abdf9d35b5533d0d09727a0fd1c28da4bfec2bda950.exe Underdress.exe PID 864 wrote to memory of 1236 864 Underdress.exe Unseduceability.exe PID 864 wrote to memory of 1236 864 Underdress.exe Unseduceability.exe PID 864 wrote to memory of 1236 864 Underdress.exe Unseduceability.exe PID 864 wrote to memory of 1236 864 Underdress.exe Unseduceability.exe PID 1236 wrote to memory of 1728 1236 Unseduceability.exe WerFault.exe PID 1236 wrote to memory of 1728 1236 Unseduceability.exe WerFault.exe PID 1236 wrote to memory of 1728 1236 Unseduceability.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac6f90ff2e5bddd26a0e1abdf9d35b5533d0d09727a0fd1c28da4bfec2bda950.exe"C:\Users\Admin\AppData\Local\Temp\ac6f90ff2e5bddd26a0e1abdf9d35b5533d0d09727a0fd1c28da4bfec2bda950.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Roaming\proliv041.exeC:\Users\Admin\AppData\Roaming\proliv041.exe2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1620
-
-
C:\Users\Admin\AppData\Roaming\Underdress.exeC:\Users\Admin\AppData\Roaming\Underdress.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\AppData\Local\Temp\Unseduceability.exe"C:\Users\Admin\AppData\Local\Temp\Unseduceability.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1236 -s 8724⤵
- Loads dropped DLL
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
91f6b00edae795d78097a46fb95a9a6e
SHA1cc1fdf6d7fb9f9714c7dc514403b9fbf146f9ecb
SHA25606dff5df2be2ce59bdec091b34a18ef78073087fd4a1682efd7744ffa0d4f5b8
SHA5127853f2127531cdb0aee922b80a65233f2b90bed70082df89a01baaa81f331ee96fb0ff0c4112742771373a9ec14e0953f0e2caa3db0cdba3578489901ba9a975
-
MD5
91f6b00edae795d78097a46fb95a9a6e
SHA1cc1fdf6d7fb9f9714c7dc514403b9fbf146f9ecb
SHA25606dff5df2be2ce59bdec091b34a18ef78073087fd4a1682efd7744ffa0d4f5b8
SHA5127853f2127531cdb0aee922b80a65233f2b90bed70082df89a01baaa81f331ee96fb0ff0c4112742771373a9ec14e0953f0e2caa3db0cdba3578489901ba9a975
-
MD5
98f60434f7be5433b37cd47ec5029537
SHA11bb8e44edde75b6f346d8997106efe57eba9e3ef
SHA256c6e318d3262b78179f3f17c4cbf60405dc95634e6100199439fa21bba6216766
SHA512df547958f85c0ad26c5636b4e6bbbb7ca198d5cc3e950f04fa0f5dc28aacdb50d03491adc098ca5cf11a819be9a8038726dad5ce7939fd007fcb550581094ac7
-
MD5
98f60434f7be5433b37cd47ec5029537
SHA11bb8e44edde75b6f346d8997106efe57eba9e3ef
SHA256c6e318d3262b78179f3f17c4cbf60405dc95634e6100199439fa21bba6216766
SHA512df547958f85c0ad26c5636b4e6bbbb7ca198d5cc3e950f04fa0f5dc28aacdb50d03491adc098ca5cf11a819be9a8038726dad5ce7939fd007fcb550581094ac7
-
MD5
95c9346936c5c633e7921950127049d6
SHA173f85b8663892657610d581e9529bd6e9342c0a8
SHA256dccdfc1c0e6a10d9a3dd9ef2d07097f754dd4781d942ddebd9abed9559f8677d
SHA5125a698d8ae664321a0ae006d103d41c89efdbba60edda1e752fc292c4173688c2855cb2dc88a2c236499339dee70b09cfc620c2f7fbb0330dcf2eff9f0a502866
-
MD5
91f6b00edae795d78097a46fb95a9a6e
SHA1cc1fdf6d7fb9f9714c7dc514403b9fbf146f9ecb
SHA25606dff5df2be2ce59bdec091b34a18ef78073087fd4a1682efd7744ffa0d4f5b8
SHA5127853f2127531cdb0aee922b80a65233f2b90bed70082df89a01baaa81f331ee96fb0ff0c4112742771373a9ec14e0953f0e2caa3db0cdba3578489901ba9a975
-
MD5
91f6b00edae795d78097a46fb95a9a6e
SHA1cc1fdf6d7fb9f9714c7dc514403b9fbf146f9ecb
SHA25606dff5df2be2ce59bdec091b34a18ef78073087fd4a1682efd7744ffa0d4f5b8
SHA5127853f2127531cdb0aee922b80a65233f2b90bed70082df89a01baaa81f331ee96fb0ff0c4112742771373a9ec14e0953f0e2caa3db0cdba3578489901ba9a975
-
MD5
91f6b00edae795d78097a46fb95a9a6e
SHA1cc1fdf6d7fb9f9714c7dc514403b9fbf146f9ecb
SHA25606dff5df2be2ce59bdec091b34a18ef78073087fd4a1682efd7744ffa0d4f5b8
SHA5127853f2127531cdb0aee922b80a65233f2b90bed70082df89a01baaa81f331ee96fb0ff0c4112742771373a9ec14e0953f0e2caa3db0cdba3578489901ba9a975
-
MD5
91f6b00edae795d78097a46fb95a9a6e
SHA1cc1fdf6d7fb9f9714c7dc514403b9fbf146f9ecb
SHA25606dff5df2be2ce59bdec091b34a18ef78073087fd4a1682efd7744ffa0d4f5b8
SHA5127853f2127531cdb0aee922b80a65233f2b90bed70082df89a01baaa81f331ee96fb0ff0c4112742771373a9ec14e0953f0e2caa3db0cdba3578489901ba9a975
-
MD5
91f6b00edae795d78097a46fb95a9a6e
SHA1cc1fdf6d7fb9f9714c7dc514403b9fbf146f9ecb
SHA25606dff5df2be2ce59bdec091b34a18ef78073087fd4a1682efd7744ffa0d4f5b8
SHA5127853f2127531cdb0aee922b80a65233f2b90bed70082df89a01baaa81f331ee96fb0ff0c4112742771373a9ec14e0953f0e2caa3db0cdba3578489901ba9a975
-
MD5
91f6b00edae795d78097a46fb95a9a6e
SHA1cc1fdf6d7fb9f9714c7dc514403b9fbf146f9ecb
SHA25606dff5df2be2ce59bdec091b34a18ef78073087fd4a1682efd7744ffa0d4f5b8
SHA5127853f2127531cdb0aee922b80a65233f2b90bed70082df89a01baaa81f331ee96fb0ff0c4112742771373a9ec14e0953f0e2caa3db0cdba3578489901ba9a975
-
MD5
91f6b00edae795d78097a46fb95a9a6e
SHA1cc1fdf6d7fb9f9714c7dc514403b9fbf146f9ecb
SHA25606dff5df2be2ce59bdec091b34a18ef78073087fd4a1682efd7744ffa0d4f5b8
SHA5127853f2127531cdb0aee922b80a65233f2b90bed70082df89a01baaa81f331ee96fb0ff0c4112742771373a9ec14e0953f0e2caa3db0cdba3578489901ba9a975
-
MD5
91f6b00edae795d78097a46fb95a9a6e
SHA1cc1fdf6d7fb9f9714c7dc514403b9fbf146f9ecb
SHA25606dff5df2be2ce59bdec091b34a18ef78073087fd4a1682efd7744ffa0d4f5b8
SHA5127853f2127531cdb0aee922b80a65233f2b90bed70082df89a01baaa81f331ee96fb0ff0c4112742771373a9ec14e0953f0e2caa3db0cdba3578489901ba9a975
-
MD5
98f60434f7be5433b37cd47ec5029537
SHA11bb8e44edde75b6f346d8997106efe57eba9e3ef
SHA256c6e318d3262b78179f3f17c4cbf60405dc95634e6100199439fa21bba6216766
SHA512df547958f85c0ad26c5636b4e6bbbb7ca198d5cc3e950f04fa0f5dc28aacdb50d03491adc098ca5cf11a819be9a8038726dad5ce7939fd007fcb550581094ac7
-
MD5
95c9346936c5c633e7921950127049d6
SHA173f85b8663892657610d581e9529bd6e9342c0a8
SHA256dccdfc1c0e6a10d9a3dd9ef2d07097f754dd4781d942ddebd9abed9559f8677d
SHA5125a698d8ae664321a0ae006d103d41c89efdbba60edda1e752fc292c4173688c2855cb2dc88a2c236499339dee70b09cfc620c2f7fbb0330dcf2eff9f0a502866