Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    17-05-2022 07:42

General

  • Target

    New Project 1.exe

  • Size

    13.2MB

  • MD5

    3516f6cae47d318527ba2a24391edf43

  • SHA1

    cda159e20558c20d567f8745e30cb0dcde34e260

  • SHA256

    57d2f478356b21d798ab32c030fe0fe8cf5ddd0ceb075b259090813558b6abd8

  • SHA512

    f0d6e93743132d2c96060fe90667d61ee554228e3e72f7ba8914f012bee326ea61017daf2c63969cf04d918b6c87adc1cd4bd887480de3e2f97461a5b321c7db

Malware Config

Extracted

Family

redline

Botnet

1502775644

C2

95.143.178.231:11047

Attributes
  • auth_value

    6d1ba68e2d3a3dbe14d0406c631510fe

Extracted

Family

redline

Botnet

1137502411

C2

193.232.179.34:20856

Attributes
  • auth_value

    bf80dce2076c6f3cb9ed05b510f4060e

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 5 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • XMRig Miner Payload 5 IoCs
  • Executes dropped EXE 8 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Themida packer 4 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 55 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\New Project 1.exe
    "C:\Users\Admin\AppData\Local\Temp\New Project 1.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4500
    • C:\Users\Admin\AppData\Local\Temp\SynapseXFree.exe
      "C:\Users\Admin\AppData\Local\Temp\SynapseXFree.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4328
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
        3⤵
          PID:1048
      • C:\Users\Admin\AppData\Local\Temp\Addons.exe
        "C:\Users\Admin\AppData\Local\Temp\Addons.exe"
        2⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Checks computer location settings
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:4372
        • C:\Users\Admin\AppData\Local\Temp\payload.exe
          "C:\Users\Admin\AppData\Local\Temp\payload.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3116
          • C:\Windows\System32\conhost.exe
            "C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Local\Temp\payload.exe"
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1308
            • C:\Windows\System32\cmd.exe
              "cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "windows" /tr "C:\Users\Admin\AppData\Roaming\Windows\windows.exe"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:812
              • C:\Windows\system32\schtasks.exe
                schtasks /create /f /sc onlogon /rl highest /tn "windows" /tr "C:\Users\Admin\AppData\Roaming\Windows\windows.exe"
                6⤵
                • Creates scheduled task(s)
                PID:4528
            • C:\Windows\System32\cmd.exe
              "cmd" cmd /c "C:\Users\Admin\AppData\Roaming\Windows\windows.exe"
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:1496
              • C:\Users\Admin\AppData\Roaming\Windows\windows.exe
                C:\Users\Admin\AppData\Roaming\Windows\windows.exe
                6⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:1044
                • C:\Windows\System32\conhost.exe
                  "C:\Windows\System32\conhost.exe" "C:\Users\Admin\AppData\Roaming\Windows\windows.exe"
                  7⤵
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:5060
                  • C:\Users\Admin\AppData\Roaming\Windows\Telemetry\sihost64.exe
                    "C:\Users\Admin\AppData\Roaming\Windows\Telemetry\sihost64.exe"
                    8⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:2284
                    • C:\Windows\System32\conhost.exe
                      "C:\Windows\System32\conhost.exe" "fxvdwivzg"
                      9⤵
                        PID:1704
                    • C:\Windows\System32\svchost.exe
                      C:\Windows\System32\svchost.exe dzkxzeehmasujpof0 Xji3FXYfqqI2timPThbgZueMNpSES88mLhMz2ywydJRha9S4YJkR8/KlqFio/vzAYZEBsbMhk19a7AHFG2E7ASV8Dxez6oUKGRy7ZOMf8Xfji21MEaS1fh3ALjN5Bh/E2fCIo0IpRGVZwi5WkYIduBca2gcZ9pqMHg/Bp3PcKIjgitP5kcYG7+nDm6ARzVv0LxDe1y9+/EnFr9iFajDizRri0wkdFLQxqQapqJ8Ktr05lNfV9baUWr7AzYnXuFg+nb7xliZeOaLoE0n2gr7Ap1ferPiLfs+OKeNujnpLAa5NpPFlGfzvfAJCtVOXSOtKS7h5bPo6HsWuUAsAuF+OrRMQVqJLVNOgXm45huAH9dpfxqpXSWlgtA7MKxmewoXUACyAjYSchfFLzZaq5kLlfmJ0ZrVFKifwiM3I3wYMuQpHdstaTfc/jvntumRdvKD+k6+x/7mHZNaxCFBHH821+g==
                      8⤵
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:5028
          • C:\Users\Admin\AppData\Local\Temp\svchost.exe
            "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
            3⤵
            • Executes dropped EXE
            • Checks computer location settings
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:1360
            • C:\Users\Admin\AppData\Local\Temp\RunPE.exe
              "C:\Users\Admin\AppData\Local\Temp\RunPE.exe"
              4⤵
              • Executes dropped EXE
              • Drops startup file
              PID:1128
            • C:\Users\Admin\AppData\Local\Temp\template.exe
              "C:\Users\Admin\AppData\Local\Temp\template.exe"
              4⤵
              • Executes dropped EXE
              PID:3608

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scheduled Task

      1
      T1053

      Persistence

      Scheduled Task

      1
      T1053

      Privilege Escalation

      Scheduled Task

      1
      T1053

      Defense Evasion

      Virtualization/Sandbox Evasion

      1
      T1497

      Discovery

      Query Registry

      3
      T1012

      Virtualization/Sandbox Evasion

      1
      T1497

      System Information Discovery

      4
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\conhost.exe.log
        Filesize

        539B

        MD5

        8ee0f3b0e00f89f7523395bb72e9118b

        SHA1

        bec3fa36a1fb136551dc8157a4963ba5d2f957d4

        SHA256

        8c5f958972fce1812970a1f8da8ccef94a86663d42d13e296813673638a6b68b

        SHA512

        55f862beb42fa76ca118b2c76c92cb1e0a2586727c602645d0d4bd0e8f2120cfc2015f4333df67f3bd9f4eda8b9b399774461ab558f08312920a1489acf7a207

      • C:\Users\Admin\AppData\Local\Temp\Addons.exe
        Filesize

        8.2MB

        MD5

        3bc0439ff61f4c83cad707ad12824ab6

        SHA1

        3a7ec6ec46f802cab509ae01adcd3eb6b388c693

        SHA256

        f126b9afa2cd5cd134137374f5ed9f8831ffe9816f25fa06f706c4e4701a22f1

        SHA512

        778ce6e574a5263fe70dab718f29502ea7a114cf428a8c7d21c48d16f0fbef66f844185b51360ef10f210c383e7a6a5fae946a0a6adea79ade4ada491d507f1d

      • C:\Users\Admin\AppData\Local\Temp\Addons.exe
        Filesize

        8.2MB

        MD5

        3bc0439ff61f4c83cad707ad12824ab6

        SHA1

        3a7ec6ec46f802cab509ae01adcd3eb6b388c693

        SHA256

        f126b9afa2cd5cd134137374f5ed9f8831ffe9816f25fa06f706c4e4701a22f1

        SHA512

        778ce6e574a5263fe70dab718f29502ea7a114cf428a8c7d21c48d16f0fbef66f844185b51360ef10f210c383e7a6a5fae946a0a6adea79ade4ada491d507f1d

      • C:\Users\Admin\AppData\Local\Temp\RunPE.exe
        Filesize

        12KB

        MD5

        51d4620b6e02afa5b2f0bbe727108a0e

        SHA1

        c244a0a22d7deb5694da0dadce839afb365093fb

        SHA256

        3f6c92f97ff315193a2edead954ee10a671ba869aed94b0f7d7b955622b38d8c

        SHA512

        06446e35f7ec9b8b6d0a508507ddedebe31a7d078533f009d914913f08bbc8cf8befe2176c04cb5db4c4d8d1ce8f1eb42b461145f7be5eb64bde44ecedb59de9

      • C:\Users\Admin\AppData\Local\Temp\RunPE.exe
        Filesize

        12KB

        MD5

        51d4620b6e02afa5b2f0bbe727108a0e

        SHA1

        c244a0a22d7deb5694da0dadce839afb365093fb

        SHA256

        3f6c92f97ff315193a2edead954ee10a671ba869aed94b0f7d7b955622b38d8c

        SHA512

        06446e35f7ec9b8b6d0a508507ddedebe31a7d078533f009d914913f08bbc8cf8befe2176c04cb5db4c4d8d1ce8f1eb42b461145f7be5eb64bde44ecedb59de9

      • C:\Users\Admin\AppData\Local\Temp\SynapseXFree.exe
        Filesize

        623KB

        MD5

        ee6959e2a619c49325bc6711021c669e

        SHA1

        daef09fe10b13507817a03c2c3352deaee8a4c33

        SHA256

        a26412559cc5b5256c41a460d35bcce96664cb3183cc40be318a3b906c6db16e

        SHA512

        322e3a3a67d00f3dd63d4693544b2902e5444c3d6e1afb41bcb402f596399fdd9bb259ba7ec9a28fae1b72916f4aaa3cd2705c15245ecc3537d94317ede37e70

      • C:\Users\Admin\AppData\Local\Temp\SynapseXFree.exe
        Filesize

        623KB

        MD5

        ee6959e2a619c49325bc6711021c669e

        SHA1

        daef09fe10b13507817a03c2c3352deaee8a4c33

        SHA256

        a26412559cc5b5256c41a460d35bcce96664cb3183cc40be318a3b906c6db16e

        SHA512

        322e3a3a67d00f3dd63d4693544b2902e5444c3d6e1afb41bcb402f596399fdd9bb259ba7ec9a28fae1b72916f4aaa3cd2705c15245ecc3537d94317ede37e70

      • C:\Users\Admin\AppData\Local\Temp\payload.exe
        Filesize

        4.3MB

        MD5

        f7391bc8e83b68d3f16f0bf9bd05182c

        SHA1

        1b1e826150673860bdf1a2f9fe45d51846bd0f7f

        SHA256

        bce16670b455fa55ec337d68c329a4608f1bd6154b4022ef3d49656bc3309507

        SHA512

        6bf016a47592b9e8537eea9b37155cf38b1c632282f07538a38bf54590cab04d2cafbfe0ef09926c0c135544838fcacbef9d77ce8211ccde1c7d04d2466f6f87

      • C:\Users\Admin\AppData\Local\Temp\payload.exe
        Filesize

        4.3MB

        MD5

        f7391bc8e83b68d3f16f0bf9bd05182c

        SHA1

        1b1e826150673860bdf1a2f9fe45d51846bd0f7f

        SHA256

        bce16670b455fa55ec337d68c329a4608f1bd6154b4022ef3d49656bc3309507

        SHA512

        6bf016a47592b9e8537eea9b37155cf38b1c632282f07538a38bf54590cab04d2cafbfe0ef09926c0c135544838fcacbef9d77ce8211ccde1c7d04d2466f6f87

      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        Filesize

        182KB

        MD5

        572959802bd4d42cfc8de33f0c96b0f9

        SHA1

        ccc78a96d96ec4a514b8a4ea38225fc1a5c18c67

        SHA256

        b6cd92bf1e3fbc647cf21cb667b0d5b11d48b5c2ee604603140c2fd4eeb6a73f

        SHA512

        8d38198d3a435477ab8e6fcfbfd09e2837a7676f3c65eacca578f2549e559f992419a9bc551c9bedfe403a8c8d6d08f421d1359d9e75bcbcc25ce5b8ffbfc804

      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        Filesize

        182KB

        MD5

        572959802bd4d42cfc8de33f0c96b0f9

        SHA1

        ccc78a96d96ec4a514b8a4ea38225fc1a5c18c67

        SHA256

        b6cd92bf1e3fbc647cf21cb667b0d5b11d48b5c2ee604603140c2fd4eeb6a73f

        SHA512

        8d38198d3a435477ab8e6fcfbfd09e2837a7676f3c65eacca578f2549e559f992419a9bc551c9bedfe403a8c8d6d08f421d1359d9e75bcbcc25ce5b8ffbfc804

      • C:\Users\Admin\AppData\Local\Temp\template.exe
        Filesize

        102KB

        MD5

        45ed3071803b83c772409ca27d59b450

        SHA1

        d5c8365847583db6ea84b09a4877d6e4b8d11a4a

        SHA256

        9b47990bfd7bd783dadfd534c4ba4f2d67c8044b39f24cf62ff2d96c9f78b88c

        SHA512

        c09c39bffc40c1521609190004ecae9191e9ab4d10c214c2f6ee42f9575e681f753fc12cb550688287f840c228fccd8ba56d7eebd4b2c845031c2cc060c03553

      • C:\Users\Admin\AppData\Local\Temp\template.exe
        Filesize

        102KB

        MD5

        45ed3071803b83c772409ca27d59b450

        SHA1

        d5c8365847583db6ea84b09a4877d6e4b8d11a4a

        SHA256

        9b47990bfd7bd783dadfd534c4ba4f2d67c8044b39f24cf62ff2d96c9f78b88c

        SHA512

        c09c39bffc40c1521609190004ecae9191e9ab4d10c214c2f6ee42f9575e681f753fc12cb550688287f840c228fccd8ba56d7eebd4b2c845031c2cc060c03553

      • C:\Users\Admin\AppData\Roaming\Windows\Telemetry\sihost64.exe
        Filesize

        30KB

        MD5

        46ccfb7902429d99e014e34bffee754e

        SHA1

        7635b6422563bb7c9e3af243872c243ee82d0f48

        SHA256

        99f7184e3cfd66a6cb69913479921cfb1cb13a982477b4ee1648449caac50cff

        SHA512

        527927737e3162857e22153a4d80d5da1771ea9bc05d8175e11b358a37d6437d6c37efe024d3562b442df157208b25c8b55dffabde0a2724a3075639e931c4b5

      • C:\Users\Admin\AppData\Roaming\Windows\Telemetry\sihost64.exe
        Filesize

        30KB

        MD5

        46ccfb7902429d99e014e34bffee754e

        SHA1

        7635b6422563bb7c9e3af243872c243ee82d0f48

        SHA256

        99f7184e3cfd66a6cb69913479921cfb1cb13a982477b4ee1648449caac50cff

        SHA512

        527927737e3162857e22153a4d80d5da1771ea9bc05d8175e11b358a37d6437d6c37efe024d3562b442df157208b25c8b55dffabde0a2724a3075639e931c4b5

      • C:\Users\Admin\AppData\Roaming\Windows\windows.exe
        Filesize

        4.3MB

        MD5

        f7391bc8e83b68d3f16f0bf9bd05182c

        SHA1

        1b1e826150673860bdf1a2f9fe45d51846bd0f7f

        SHA256

        bce16670b455fa55ec337d68c329a4608f1bd6154b4022ef3d49656bc3309507

        SHA512

        6bf016a47592b9e8537eea9b37155cf38b1c632282f07538a38bf54590cab04d2cafbfe0ef09926c0c135544838fcacbef9d77ce8211ccde1c7d04d2466f6f87

      • C:\Users\Admin\AppData\Roaming\Windows\windows.exe
        Filesize

        4.3MB

        MD5

        f7391bc8e83b68d3f16f0bf9bd05182c

        SHA1

        1b1e826150673860bdf1a2f9fe45d51846bd0f7f

        SHA256

        bce16670b455fa55ec337d68c329a4608f1bd6154b4022ef3d49656bc3309507

        SHA512

        6bf016a47592b9e8537eea9b37155cf38b1c632282f07538a38bf54590cab04d2cafbfe0ef09926c0c135544838fcacbef9d77ce8211ccde1c7d04d2466f6f87

      • memory/812-174-0x0000000000000000-mapping.dmp
      • memory/1044-177-0x0000000000000000-mapping.dmp
      • memory/1048-152-0x0000000005860000-0x0000000005872000-memory.dmp
        Filesize

        72KB

      • memory/1048-143-0x0000000000000000-mapping.dmp
      • memory/1048-154-0x0000000005900000-0x000000000593C000-memory.dmp
        Filesize

        240KB

      • memory/1048-153-0x0000000005990000-0x0000000005A9A000-memory.dmp
        Filesize

        1.0MB

      • memory/1048-144-0x0000000000400000-0x0000000000420000-memory.dmp
        Filesize

        128KB

      • memory/1048-151-0x0000000005DC0000-0x00000000063D8000-memory.dmp
        Filesize

        6.1MB

      • memory/1128-165-0x00000253B0C70000-0x00000253B0C7A000-memory.dmp
        Filesize

        40KB

      • memory/1128-162-0x0000000000000000-mapping.dmp
      • memory/1128-170-0x00007FFA58880000-0x00007FFA59341000-memory.dmp
        Filesize

        10.8MB

      • memory/1308-172-0x000001D4CD9E0000-0x000001D4CDE25000-memory.dmp
        Filesize

        4.3MB

      • memory/1308-171-0x000001D4CFE50000-0x000001D4CFE62000-memory.dmp
        Filesize

        72KB

      • memory/1308-173-0x00007FFA58880000-0x00007FFA59341000-memory.dmp
        Filesize

        10.8MB

      • memory/1360-158-0x0000000000000000-mapping.dmp
      • memory/1360-161-0x0000000000400000-0x0000000000430000-memory.dmp
        Filesize

        192KB

      • memory/1496-176-0x0000000000000000-mapping.dmp
      • memory/1704-192-0x0000024F02410000-0x0000024F02417000-memory.dmp
        Filesize

        28KB

      • memory/1704-193-0x00007FFA58880000-0x00007FFA59341000-memory.dmp
        Filesize

        10.8MB

      • memory/2284-182-0x0000000000000000-mapping.dmp
      • memory/3116-155-0x0000000000000000-mapping.dmp
      • memory/3608-169-0x0000000000A60000-0x0000000000A80000-memory.dmp
        Filesize

        128KB

      • memory/3608-166-0x0000000000000000-mapping.dmp
      • memory/4328-140-0x0000000002100000-0x0000000002160000-memory.dmp
        Filesize

        384KB

      • memory/4328-134-0x0000000000000000-mapping.dmp
      • memory/4328-141-0x0000000003310000-0x0000000003410000-memory.dmp
        Filesize

        1024KB

      • memory/4372-150-0x0000000000400000-0x0000000001098000-memory.dmp
        Filesize

        12.6MB

      • memory/4372-147-0x0000000000400000-0x0000000001098000-memory.dmp
        Filesize

        12.6MB

      • memory/4372-142-0x0000000076FD0000-0x0000000077173000-memory.dmp
        Filesize

        1.6MB

      • memory/4372-136-0x0000000000000000-mapping.dmp
      • memory/4500-133-0x0000000000400000-0x0000000001132000-memory.dmp
        Filesize

        13.2MB

      • memory/4528-175-0x0000000000000000-mapping.dmp
      • memory/5028-185-0x0000000140000000-0x0000000140829000-memory.dmp
        Filesize

        8.2MB

      • memory/5028-186-0x000000014036FC98-mapping.dmp
      • memory/5028-188-0x0000000140000000-0x0000000140829000-memory.dmp
        Filesize

        8.2MB

      • memory/5028-189-0x0000028E14270000-0x0000028E14290000-memory.dmp
        Filesize

        128KB

      • memory/5028-190-0x0000000140000000-0x0000000140829000-memory.dmp
        Filesize

        8.2MB

      • memory/5028-191-0x0000028E142D0000-0x0000028E14310000-memory.dmp
        Filesize

        256KB

      • memory/5028-187-0x0000000140000000-0x0000000140829000-memory.dmp
        Filesize

        8.2MB

      • memory/5028-194-0x0000028E00050000-0x0000028E00070000-memory.dmp
        Filesize

        128KB

      • memory/5028-195-0x0000028E00070000-0x0000028E00090000-memory.dmp
        Filesize

        128KB

      • memory/5028-196-0x0000028E00050000-0x0000028E00070000-memory.dmp
        Filesize

        128KB

      • memory/5060-181-0x00007FFA58880000-0x00007FFA59341000-memory.dmp
        Filesize

        10.8MB