Analysis
-
max time kernel
44s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-05-2022 21:37
Static task
static1
Behavioral task
behavioral1
Sample
254a01201348193e84d5c4962393ad1350bf926853d035afabdb17e7e728a6a9.exe
Resource
win7-20220414-en
General
-
Target
254a01201348193e84d5c4962393ad1350bf926853d035afabdb17e7e728a6a9.exe
-
Size
4.0MB
-
MD5
8adcb0f839eafc44fb2089457e6bbe8a
-
SHA1
5b6ae8c5dd9e6ec6aa38dcdb32bfbbca8d0b53c9
-
SHA256
254a01201348193e84d5c4962393ad1350bf926853d035afabdb17e7e728a6a9
-
SHA512
18373ded0cf20d95ed1fa1c79c810c4370f1a811eab21a11c0a6e0a78de56fd06dc5c0663f1db44b9e612efda0ca921934ed7eba96b0eb26f1e0ceb652705b6b
Malware Config
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1968-56-0x00000000054C0000-0x00000000055FA000-memory.dmp family_redline behavioral1/memory/1968-58-0x0000000005380000-0x00000000054B8000-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
254a01201348193e84d5c4962393ad1350bf926853d035afabdb17e7e728a6a9.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 254a01201348193e84d5c4962393ad1350bf926853d035afabdb17e7e728a6a9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 254a01201348193e84d5c4962393ad1350bf926853d035afabdb17e7e728a6a9.exe -
Processes:
resource yara_rule behavioral1/memory/1968-55-0x0000000000400000-0x0000000000B92000-memory.dmp themida -
Processes:
254a01201348193e84d5c4962393ad1350bf926853d035afabdb17e7e728a6a9.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 254a01201348193e84d5c4962393ad1350bf926853d035afabdb17e7e728a6a9.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
254a01201348193e84d5c4962393ad1350bf926853d035afabdb17e7e728a6a9.exepid process 1968 254a01201348193e84d5c4962393ad1350bf926853d035afabdb17e7e728a6a9.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1684 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
254a01201348193e84d5c4962393ad1350bf926853d035afabdb17e7e728a6a9.exetaskkill.exedescription pid process Token: SeDebugPrivilege 1968 254a01201348193e84d5c4962393ad1350bf926853d035afabdb17e7e728a6a9.exe Token: SeDebugPrivilege 1684 taskkill.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
254a01201348193e84d5c4962393ad1350bf926853d035afabdb17e7e728a6a9.execmd.exedescription pid process target process PID 1968 wrote to memory of 776 1968 254a01201348193e84d5c4962393ad1350bf926853d035afabdb17e7e728a6a9.exe cmd.exe PID 1968 wrote to memory of 776 1968 254a01201348193e84d5c4962393ad1350bf926853d035afabdb17e7e728a6a9.exe cmd.exe PID 1968 wrote to memory of 776 1968 254a01201348193e84d5c4962393ad1350bf926853d035afabdb17e7e728a6a9.exe cmd.exe PID 1968 wrote to memory of 776 1968 254a01201348193e84d5c4962393ad1350bf926853d035afabdb17e7e728a6a9.exe cmd.exe PID 776 wrote to memory of 1684 776 cmd.exe taskkill.exe PID 776 wrote to memory of 1684 776 cmd.exe taskkill.exe PID 776 wrote to memory of 1684 776 cmd.exe taskkill.exe PID 776 wrote to memory of 1684 776 cmd.exe taskkill.exe PID 776 wrote to memory of 756 776 cmd.exe choice.exe PID 776 wrote to memory of 756 776 cmd.exe choice.exe PID 776 wrote to memory of 756 776 cmd.exe choice.exe PID 776 wrote to memory of 756 776 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\254a01201348193e84d5c4962393ad1350bf926853d035afabdb17e7e728a6a9.exe"C:\Users\Admin\AppData\Local\Temp\254a01201348193e84d5c4962393ad1350bf926853d035afabdb17e7e728a6a9.exe"1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C taskkill /F /PID 1968 && choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\254a01201348193e84d5c4962393ad1350bf926853d035afabdb17e7e728a6a9.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /PID 19683⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1684 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 33⤵PID:756