Analysis
-
max time kernel
91s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-09-2022 21:32
Behavioral task
behavioral1
Sample
c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de.exe
Resource
win10v2004-20220812-en
General
-
Target
c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de.exe
-
Size
5.7MB
-
MD5
693455604d8adcb70f7753a775d436f9
-
SHA1
833b2bd4f502ff2b65080a05426a5d9431c558b9
-
SHA256
c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de
-
SHA512
519259896beb6ac0008fd0dcccfc853ddd9ae106cdc8aa8ab3f10d751dd5a62fa5c4e751f78525bba5f58d09c866ee03375ebccbc0be192642b1570ae8e50ad2
-
SSDEEP
98304:k02n7/ChNJdlFr9SQ/HZ1NJP96tcx0QEvVJiHbHxg8J5uK:o6sIXMuHbHxg8DuK
Malware Config
Extracted
redline
3108_RUZKI
213.219.247.199:9452
-
auth_value
f71fed1cd094e4e1eb7ad1c53e542bca
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2192-143-0x0000000000400000-0x0000000000420000-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de.exe -
Processes:
resource yara_rule behavioral1/memory/4436-135-0x0000000000E30000-0x00000000013EA000-memory.dmp themida behavioral1/memory/4436-144-0x0000000000E30000-0x00000000013EA000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Processes:
c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de.exepid process 4436 c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de.exedescription pid process target process PID 4436 set thread context of 2192 4436 c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de.exe InstallUtil.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de.exeInstallUtil.exepid process 4436 c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de.exe 4436 c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de.exe 4436 c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de.exe 4436 c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de.exe 4436 c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de.exe 4436 c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de.exe 2192 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de.exeInstallUtil.exedescription pid process Token: SeDebugPrivilege 4436 c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de.exe Token: SeDebugPrivilege 2192 InstallUtil.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de.exedescription pid process target process PID 4436 wrote to memory of 2192 4436 c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de.exe InstallUtil.exe PID 4436 wrote to memory of 2192 4436 c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de.exe InstallUtil.exe PID 4436 wrote to memory of 2192 4436 c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de.exe InstallUtil.exe PID 4436 wrote to memory of 2192 4436 c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de.exe InstallUtil.exe PID 4436 wrote to memory of 2192 4436 c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de.exe InstallUtil.exe PID 4436 wrote to memory of 2192 4436 c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de.exe InstallUtil.exe PID 4436 wrote to memory of 2192 4436 c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de.exe InstallUtil.exe PID 4436 wrote to memory of 2192 4436 c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de.exe InstallUtil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de.exe"C:\Users\Admin\AppData\Local\Temp\c848caa153eb6f5f1d66fba17b9d3f4bc97ac47cac3c40b693f466bcef23a7de.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2192-148-0x0000000005550000-0x000000000565A000-memory.dmpFilesize
1.0MB
-
memory/2192-146-0x0000000005980000-0x0000000005F98000-memory.dmpFilesize
6.1MB
-
memory/2192-143-0x0000000000400000-0x0000000000420000-memory.dmpFilesize
128KB
-
memory/2192-153-0x0000000006FD0000-0x0000000007192000-memory.dmpFilesize
1.8MB
-
memory/2192-152-0x0000000006480000-0x00000000064E6000-memory.dmpFilesize
408KB
-
memory/2192-151-0x0000000005950000-0x000000000596E000-memory.dmpFilesize
120KB
-
memory/2192-150-0x0000000006040000-0x00000000060B6000-memory.dmpFilesize
472KB
-
memory/2192-140-0x0000000000000000-mapping.dmp
-
memory/2192-149-0x0000000005480000-0x00000000054BC000-memory.dmpFilesize
240KB
-
memory/2192-147-0x0000000005420000-0x0000000005432000-memory.dmpFilesize
72KB
-
memory/2192-154-0x00000000076D0000-0x0000000007BFC000-memory.dmpFilesize
5.2MB
-
memory/4436-139-0x0000000006810000-0x000000000681A000-memory.dmpFilesize
40KB
-
memory/4436-141-0x0000000000E30000-0x00000000013EA000-memory.dmpFilesize
5.7MB
-
memory/4436-135-0x0000000000E30000-0x00000000013EA000-memory.dmpFilesize
5.7MB
-
memory/4436-142-0x00000000770F0000-0x0000000077293000-memory.dmpFilesize
1.6MB
-
memory/4436-132-0x0000000000E30000-0x00000000013EA000-memory.dmpFilesize
5.7MB
-
memory/4436-145-0x00000000770F0000-0x0000000077293000-memory.dmpFilesize
1.6MB
-
memory/4436-134-0x00000000770F0000-0x0000000077293000-memory.dmpFilesize
1.6MB
-
memory/4436-138-0x0000000006820000-0x00000000068B2000-memory.dmpFilesize
584KB
-
memory/4436-137-0x0000000006BF0000-0x0000000007194000-memory.dmpFilesize
5.6MB
-
memory/4436-136-0x0000000005940000-0x00000000059DC000-memory.dmpFilesize
624KB
-
memory/4436-144-0x0000000000E30000-0x00000000013EA000-memory.dmpFilesize
5.7MB