Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
15-02-2022 07:11
Static task
static1
Behavioral task
behavioral1
Sample
ac6f90ff2e5bddd26a0e1abdf9d35b5533d0d09727a0fd1c28da4bfec2bda950.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
ac6f90ff2e5bddd26a0e1abdf9d35b5533d0d09727a0fd1c28da4bfec2bda950.exe
Resource
win10v2004-en-20220113
General
-
Target
ac6f90ff2e5bddd26a0e1abdf9d35b5533d0d09727a0fd1c28da4bfec2bda950.exe
-
Size
6.4MB
-
MD5
1008944bf8de596e9d032ab66a46caa7
-
SHA1
cc411e0c3b2a7ef3e02618bdab39d9a023f0569d
-
SHA256
ac6f90ff2e5bddd26a0e1abdf9d35b5533d0d09727a0fd1c28da4bfec2bda950
-
SHA512
67e9d1d78fa1a32b53f59c3a21846cb125b5f9d79acd56eb8357cd04aec754418a430b11287f106177439c49e9df08e72d5fab2e2ff1b7927cf2c48934ca393d
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1992-138-0x00000000004B0000-0x0000000000C70000-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Executes dropped EXE 3 IoCs
Processes:
proliv041.exeUnderdress.exeUnseduceability.exepid process 1992 proliv041.exe 1316 Underdress.exe 1320 Unseduceability.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
proliv041.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion proliv041.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion proliv041.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Underdress.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation Underdress.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\proliv041.exe themida behavioral2/memory/1992-138-0x00000000004B0000-0x0000000000C70000-memory.dmp themida -
Processes:
proliv041.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA proliv041.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
proliv041.exepid process 1992 proliv041.exe -
Drops file in Windows directory 8 IoCs
Processes:
svchost.exeTiWorker.exedescription ioc process File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
proliv041.exepid process 1992 proliv041.exe 1992 proliv041.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
Unseduceability.exesvchost.exeTiWorker.exedescription pid process Token: SeDebugPrivilege 1320 Unseduceability.exe Token: SeShutdownPrivilege 4740 svchost.exe Token: SeCreatePagefilePrivilege 4740 svchost.exe Token: SeShutdownPrivilege 4740 svchost.exe Token: SeCreatePagefilePrivilege 4740 svchost.exe Token: SeShutdownPrivilege 4740 svchost.exe Token: SeCreatePagefilePrivilege 4740 svchost.exe Token: SeSecurityPrivilege 1912 TiWorker.exe Token: SeRestorePrivilege 1912 TiWorker.exe Token: SeBackupPrivilege 1912 TiWorker.exe Token: SeBackupPrivilege 1912 TiWorker.exe Token: SeRestorePrivilege 1912 TiWorker.exe Token: SeSecurityPrivilege 1912 TiWorker.exe Token: SeBackupPrivilege 1912 TiWorker.exe Token: SeRestorePrivilege 1912 TiWorker.exe Token: SeSecurityPrivilege 1912 TiWorker.exe Token: SeBackupPrivilege 1912 TiWorker.exe Token: SeRestorePrivilege 1912 TiWorker.exe Token: SeSecurityPrivilege 1912 TiWorker.exe Token: SeBackupPrivilege 1912 TiWorker.exe Token: SeRestorePrivilege 1912 TiWorker.exe Token: SeSecurityPrivilege 1912 TiWorker.exe Token: SeBackupPrivilege 1912 TiWorker.exe Token: SeRestorePrivilege 1912 TiWorker.exe Token: SeSecurityPrivilege 1912 TiWorker.exe Token: SeBackupPrivilege 1912 TiWorker.exe Token: SeRestorePrivilege 1912 TiWorker.exe Token: SeSecurityPrivilege 1912 TiWorker.exe Token: SeBackupPrivilege 1912 TiWorker.exe Token: SeRestorePrivilege 1912 TiWorker.exe Token: SeSecurityPrivilege 1912 TiWorker.exe Token: SeBackupPrivilege 1912 TiWorker.exe Token: SeRestorePrivilege 1912 TiWorker.exe Token: SeSecurityPrivilege 1912 TiWorker.exe Token: SeBackupPrivilege 1912 TiWorker.exe Token: SeRestorePrivilege 1912 TiWorker.exe Token: SeSecurityPrivilege 1912 TiWorker.exe Token: SeBackupPrivilege 1912 TiWorker.exe Token: SeRestorePrivilege 1912 TiWorker.exe Token: SeSecurityPrivilege 1912 TiWorker.exe Token: SeBackupPrivilege 1912 TiWorker.exe Token: SeRestorePrivilege 1912 TiWorker.exe Token: SeSecurityPrivilege 1912 TiWorker.exe Token: SeBackupPrivilege 1912 TiWorker.exe Token: SeRestorePrivilege 1912 TiWorker.exe Token: SeSecurityPrivilege 1912 TiWorker.exe Token: SeBackupPrivilege 1912 TiWorker.exe Token: SeRestorePrivilege 1912 TiWorker.exe Token: SeSecurityPrivilege 1912 TiWorker.exe Token: SeBackupPrivilege 1912 TiWorker.exe Token: SeRestorePrivilege 1912 TiWorker.exe Token: SeSecurityPrivilege 1912 TiWorker.exe Token: SeBackupPrivilege 1912 TiWorker.exe Token: SeRestorePrivilege 1912 TiWorker.exe Token: SeSecurityPrivilege 1912 TiWorker.exe Token: SeBackupPrivilege 1912 TiWorker.exe Token: SeRestorePrivilege 1912 TiWorker.exe Token: SeSecurityPrivilege 1912 TiWorker.exe Token: SeBackupPrivilege 1912 TiWorker.exe Token: SeRestorePrivilege 1912 TiWorker.exe Token: SeSecurityPrivilege 1912 TiWorker.exe Token: SeBackupPrivilege 1912 TiWorker.exe Token: SeRestorePrivilege 1912 TiWorker.exe Token: SeSecurityPrivilege 1912 TiWorker.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
ac6f90ff2e5bddd26a0e1abdf9d35b5533d0d09727a0fd1c28da4bfec2bda950.exeUnderdress.exedescription pid process target process PID 3048 wrote to memory of 1992 3048 ac6f90ff2e5bddd26a0e1abdf9d35b5533d0d09727a0fd1c28da4bfec2bda950.exe proliv041.exe PID 3048 wrote to memory of 1992 3048 ac6f90ff2e5bddd26a0e1abdf9d35b5533d0d09727a0fd1c28da4bfec2bda950.exe proliv041.exe PID 3048 wrote to memory of 1992 3048 ac6f90ff2e5bddd26a0e1abdf9d35b5533d0d09727a0fd1c28da4bfec2bda950.exe proliv041.exe PID 3048 wrote to memory of 1316 3048 ac6f90ff2e5bddd26a0e1abdf9d35b5533d0d09727a0fd1c28da4bfec2bda950.exe Underdress.exe PID 3048 wrote to memory of 1316 3048 ac6f90ff2e5bddd26a0e1abdf9d35b5533d0d09727a0fd1c28da4bfec2bda950.exe Underdress.exe PID 3048 wrote to memory of 1316 3048 ac6f90ff2e5bddd26a0e1abdf9d35b5533d0d09727a0fd1c28da4bfec2bda950.exe Underdress.exe PID 1316 wrote to memory of 1320 1316 Underdress.exe Unseduceability.exe PID 1316 wrote to memory of 1320 1316 Underdress.exe Unseduceability.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac6f90ff2e5bddd26a0e1abdf9d35b5533d0d09727a0fd1c28da4bfec2bda950.exe"C:\Users\Admin\AppData\Local\Temp\ac6f90ff2e5bddd26a0e1abdf9d35b5533d0d09727a0fd1c28da4bfec2bda950.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Roaming\proliv041.exeC:\Users\Admin\AppData\Roaming\proliv041.exe2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1992
-
-
C:\Users\Admin\AppData\Roaming\Underdress.exeC:\Users\Admin\AppData\Roaming\Underdress.exe2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\Unseduceability.exe"C:\Users\Admin\AppData\Local\Temp\Unseduceability.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1320
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4740
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1912
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
91f6b00edae795d78097a46fb95a9a6e
SHA1cc1fdf6d7fb9f9714c7dc514403b9fbf146f9ecb
SHA25606dff5df2be2ce59bdec091b34a18ef78073087fd4a1682efd7744ffa0d4f5b8
SHA5127853f2127531cdb0aee922b80a65233f2b90bed70082df89a01baaa81f331ee96fb0ff0c4112742771373a9ec14e0953f0e2caa3db0cdba3578489901ba9a975
-
MD5
91f6b00edae795d78097a46fb95a9a6e
SHA1cc1fdf6d7fb9f9714c7dc514403b9fbf146f9ecb
SHA25606dff5df2be2ce59bdec091b34a18ef78073087fd4a1682efd7744ffa0d4f5b8
SHA5127853f2127531cdb0aee922b80a65233f2b90bed70082df89a01baaa81f331ee96fb0ff0c4112742771373a9ec14e0953f0e2caa3db0cdba3578489901ba9a975
-
MD5
98f60434f7be5433b37cd47ec5029537
SHA11bb8e44edde75b6f346d8997106efe57eba9e3ef
SHA256c6e318d3262b78179f3f17c4cbf60405dc95634e6100199439fa21bba6216766
SHA512df547958f85c0ad26c5636b4e6bbbb7ca198d5cc3e950f04fa0f5dc28aacdb50d03491adc098ca5cf11a819be9a8038726dad5ce7939fd007fcb550581094ac7
-
MD5
98f60434f7be5433b37cd47ec5029537
SHA11bb8e44edde75b6f346d8997106efe57eba9e3ef
SHA256c6e318d3262b78179f3f17c4cbf60405dc95634e6100199439fa21bba6216766
SHA512df547958f85c0ad26c5636b4e6bbbb7ca198d5cc3e950f04fa0f5dc28aacdb50d03491adc098ca5cf11a819be9a8038726dad5ce7939fd007fcb550581094ac7
-
MD5
95c9346936c5c633e7921950127049d6
SHA173f85b8663892657610d581e9529bd6e9342c0a8
SHA256dccdfc1c0e6a10d9a3dd9ef2d07097f754dd4781d942ddebd9abed9559f8677d
SHA5125a698d8ae664321a0ae006d103d41c89efdbba60edda1e752fc292c4173688c2855cb2dc88a2c236499339dee70b09cfc620c2f7fbb0330dcf2eff9f0a502866