Analysis
-
max time kernel
140s -
max time network
58s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
10-09-2022 20:24
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
General
-
Target
file.exe
-
Size
361KB
-
MD5
d84842f7912d62c8e9f44c8a11cb3cc0
-
SHA1
2e42c24f7e4b5917664621deea56a2646497a3ce
-
SHA256
c31382b24d3f3ed0cf2873aeb3bc2510ca7869a1ff64a55b48ccf8a7145b9493
-
SHA512
772f9e6cf0dd5970c58212fddfb2e214582472ee21a28855700bec714d71b07d8ab66a7ef681b1b6b3c35958b76be01f6bb110d9b0a9c5b716a6a6f82defb4cd
-
SSDEEP
6144:LoKpw8+J7IA2IWkKUpJFEtNDqO1fa5maeB7QtG9Pvn277hnlTpYGIrQ2+gFlA:Ly7oIWwpAb7i5maeB7QtG9Pvn277hnl/
Malware Config
Extracted
redline
4
79.110.62.196:26277
-
auth_value
e48cb0b64e920bb1a534eba5b2912707
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1664-54-0x00000000013B0000-0x0000000001410000-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
Updater.exeoobeldr.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Updater.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ oobeldr.exe -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
Updater.exeoobeldr.exepid process 920 Updater.exe 1124 oobeldr.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Updater.exeoobeldr.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion oobeldr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion oobeldr.exe -
Loads dropped DLL 1 IoCs
Processes:
file.exepid process 1664 file.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
oobeldr.exeUpdater.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA oobeldr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Updater.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
Updater.exeoobeldr.exepid process 920 Updater.exe 1124 oobeldr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1756 schtasks.exe 2028 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
file.exeUpdater.exeoobeldr.exepid process 1664 file.exe 1664 file.exe 920 Updater.exe 1124 oobeldr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
file.exedescription pid process Token: SeDebugPrivilege 1664 file.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
file.exeUpdater.exetaskeng.exeoobeldr.exedescription pid process target process PID 1664 wrote to memory of 920 1664 file.exe Updater.exe PID 1664 wrote to memory of 920 1664 file.exe Updater.exe PID 1664 wrote to memory of 920 1664 file.exe Updater.exe PID 1664 wrote to memory of 920 1664 file.exe Updater.exe PID 1664 wrote to memory of 920 1664 file.exe Updater.exe PID 1664 wrote to memory of 920 1664 file.exe Updater.exe PID 1664 wrote to memory of 920 1664 file.exe Updater.exe PID 920 wrote to memory of 1756 920 Updater.exe schtasks.exe PID 920 wrote to memory of 1756 920 Updater.exe schtasks.exe PID 920 wrote to memory of 1756 920 Updater.exe schtasks.exe PID 920 wrote to memory of 1756 920 Updater.exe schtasks.exe PID 1968 wrote to memory of 1124 1968 taskeng.exe oobeldr.exe PID 1968 wrote to memory of 1124 1968 taskeng.exe oobeldr.exe PID 1968 wrote to memory of 1124 1968 taskeng.exe oobeldr.exe PID 1968 wrote to memory of 1124 1968 taskeng.exe oobeldr.exe PID 1124 wrote to memory of 2028 1124 oobeldr.exe schtasks.exe PID 1124 wrote to memory of 2028 1124 oobeldr.exe schtasks.exe PID 1124 wrote to memory of 2028 1124 oobeldr.exe schtasks.exe PID 1124 wrote to memory of 2028 1124 oobeldr.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Updater.exe"C:\Users\Admin\AppData\Local\Temp\Updater.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\taskeng.exetaskeng.exe {62D8B61E-F6C9-4E09-AF67-DF1B08208AE0} S-1-5-21-3845472200-3839195424-595303356-1000:ZERMMMDR\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeC:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Telemetry Logging" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exe"3⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Updater.exeFilesize
2.8MB
MD5ecfae3cc8a7ba2e4681a378864658af6
SHA1a84beb327be022f600aed467c2029b4301756dca
SHA25620239b724322bdef1aa4adbdfaa03a90d1f18a5b3b8bcfb16dec10a5823ac0fd
SHA51233ce30cdcfb7b86cdd86e3f9ba7ff97ea168001eca76e0c05f14555a25ce200f2e661b03e8ab762b4a9330bfd794b6366912768a4cce7f88c60c9a2a5717abda
-
C:\Users\Admin\AppData\Local\Temp\Updater.exeFilesize
2.8MB
MD5ecfae3cc8a7ba2e4681a378864658af6
SHA1a84beb327be022f600aed467c2029b4301756dca
SHA25620239b724322bdef1aa4adbdfaa03a90d1f18a5b3b8bcfb16dec10a5823ac0fd
SHA51233ce30cdcfb7b86cdd86e3f9ba7ff97ea168001eca76e0c05f14555a25ce200f2e661b03e8ab762b4a9330bfd794b6366912768a4cce7f88c60c9a2a5717abda
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeFilesize
2.8MB
MD5ecfae3cc8a7ba2e4681a378864658af6
SHA1a84beb327be022f600aed467c2029b4301756dca
SHA25620239b724322bdef1aa4adbdfaa03a90d1f18a5b3b8bcfb16dec10a5823ac0fd
SHA51233ce30cdcfb7b86cdd86e3f9ba7ff97ea168001eca76e0c05f14555a25ce200f2e661b03e8ab762b4a9330bfd794b6366912768a4cce7f88c60c9a2a5717abda
-
C:\Users\Admin\AppData\Roaming\Microsoft\Protect\oobeldr.exeFilesize
2.8MB
MD5ecfae3cc8a7ba2e4681a378864658af6
SHA1a84beb327be022f600aed467c2029b4301756dca
SHA25620239b724322bdef1aa4adbdfaa03a90d1f18a5b3b8bcfb16dec10a5823ac0fd
SHA51233ce30cdcfb7b86cdd86e3f9ba7ff97ea168001eca76e0c05f14555a25ce200f2e661b03e8ab762b4a9330bfd794b6366912768a4cce7f88c60c9a2a5717abda
-
\Users\Admin\AppData\Local\Temp\Updater.exeFilesize
2.8MB
MD5ecfae3cc8a7ba2e4681a378864658af6
SHA1a84beb327be022f600aed467c2029b4301756dca
SHA25620239b724322bdef1aa4adbdfaa03a90d1f18a5b3b8bcfb16dec10a5823ac0fd
SHA51233ce30cdcfb7b86cdd86e3f9ba7ff97ea168001eca76e0c05f14555a25ce200f2e661b03e8ab762b4a9330bfd794b6366912768a4cce7f88c60c9a2a5717abda
-
memory/920-65-0x0000000000080000-0x000000000053C000-memory.dmpFilesize
4.7MB
-
memory/920-62-0x0000000077170000-0x00000000772F0000-memory.dmpFilesize
1.5MB
-
memory/920-58-0x0000000000000000-mapping.dmp
-
memory/920-61-0x0000000000080000-0x000000000053C000-memory.dmpFilesize
4.7MB
-
memory/920-66-0x0000000077170000-0x00000000772F0000-memory.dmpFilesize
1.5MB
-
memory/1124-74-0x0000000001350000-0x000000000180C000-memory.dmpFilesize
4.7MB
-
memory/1124-77-0x0000000001350000-0x000000000180C000-memory.dmpFilesize
4.7MB
-
memory/1124-76-0x0000000077170000-0x00000000772F0000-memory.dmpFilesize
1.5MB
-
memory/1124-68-0x0000000000000000-mapping.dmp
-
memory/1124-75-0x0000000001350000-0x000000000180C000-memory.dmpFilesize
4.7MB
-
memory/1124-71-0x0000000001350000-0x000000000180C000-memory.dmpFilesize
4.7MB
-
memory/1124-72-0x0000000077170000-0x00000000772F0000-memory.dmpFilesize
1.5MB
-
memory/1664-54-0x00000000013B0000-0x0000000001410000-memory.dmpFilesize
384KB
-
memory/1664-55-0x00000000003F0000-0x00000000003F6000-memory.dmpFilesize
24KB
-
memory/1664-56-0x0000000075981000-0x0000000075983000-memory.dmpFilesize
8KB
-
memory/1756-64-0x0000000000000000-mapping.dmp
-
memory/2028-73-0x0000000000000000-mapping.dmp