Analysis
-
max time kernel
151s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/01/2023, 02:05
Static task
static1
Behavioral task
behavioral1
Sample
34 рекламные материалы, тз .exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
34 рекламные материалы, тз .exe
Resource
win10v2004-20220812-en
General
-
Target
34 рекламные материалы, тз .exe
-
Size
763.8MB
-
MD5
3be1c69b41af83d371a3c7ec53b594d3
-
SHA1
3c28537f0c0ff9b45d5bf8085f31d3da91eea8e3
-
SHA256
8311d74ee56baf34698abfed0c71f36f73502ad6be7a2b4459bf771767ab32f2
-
SHA512
11f93d40514059d252634ec30ed76d72ea4c3fbecb3b0f17396f971bc921583331ef6fdcf2e6e218b3d4c6be786f60f12f2a9a1397a30a2125abf0c06c4fd5de
-
SSDEEP
196608:zsHz+H8822i22r2222+41nuwPrR93uL17B7IWvlp0yF/wu3DqBub7mt:f8822i22r2222+GuwP1telhFHzvm
Malware Config
Extracted
redline
16
46.3.199.69:21581
-
auth_value
2d39c11f320a5db0b4d6863a9e41919c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 34 рекламные материалы, тз .exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 34 рекламные материалы, тз .exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 34 рекламные материалы, тз .exe -
Uses the VBS compiler for execution 1 TTPs
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 34 рекламные материалы, тз .exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1752 set thread context of 1504 1752 34 рекламные материалы, тз .exe 45 -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache firefox.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1468 chrome.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2020 firefox.exe Token: SeDebugPrivilege 2020 firefox.exe Token: 33 2712 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2712 AUDIODG.EXE Token: 33 2712 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2712 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2020 firefox.exe 2020 firefox.exe 2020 firefox.exe 2020 firefox.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2020 firefox.exe 2020 firefox.exe 2020 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1648 wrote to memory of 2020 1648 firefox.exe 41 PID 1648 wrote to memory of 2020 1648 firefox.exe 41 PID 1648 wrote to memory of 2020 1648 firefox.exe 41 PID 1648 wrote to memory of 2020 1648 firefox.exe 41 PID 1648 wrote to memory of 2020 1648 firefox.exe 41 PID 1648 wrote to memory of 2020 1648 firefox.exe 41 PID 1648 wrote to memory of 2020 1648 firefox.exe 41 PID 1648 wrote to memory of 2020 1648 firefox.exe 41 PID 1648 wrote to memory of 2020 1648 firefox.exe 41 PID 1648 wrote to memory of 2020 1648 firefox.exe 41 PID 2020 wrote to memory of 1644 2020 firefox.exe 42 PID 2020 wrote to memory of 1644 2020 firefox.exe 42 PID 2020 wrote to memory of 1644 2020 firefox.exe 42 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 364 2020 firefox.exe 44 PID 2020 wrote to memory of 240 2020 firefox.exe 46 PID 2020 wrote to memory of 240 2020 firefox.exe 46 PID 2020 wrote to memory of 240 2020 firefox.exe 46 PID 2020 wrote to memory of 240 2020 firefox.exe 46 PID 2020 wrote to memory of 240 2020 firefox.exe 46 PID 2020 wrote to memory of 240 2020 firefox.exe 46 PID 2020 wrote to memory of 240 2020 firefox.exe 46
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefb344f50,0x7fefb344f60,0x7fefb344f701⤵PID:952
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xbc,0xc0,0xc4,0x90,0xc8,0x7fefb344f50,0x7fefb344f60,0x7fefb344f701⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\34 рекламные материалы, тз .exe"C:\Users\Admin\AppData\Local\Temp\34 рекламные материалы, тз .exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:1752 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵PID:1504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1248,13417856562720728632,571632063832138105,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1324 /prefetch:81⤵
- Suspicious behavior: EnumeratesProcesses
PID:1468
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1248,13417856562720728632,571632063832138105,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1260 /prefetch:21⤵PID:1928
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1120,5457418656093347548,17039733008759334157,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1172 /prefetch:21⤵PID:428
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1248,13417856562720728632,571632063832138105,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1632 /prefetch:81⤵PID:1124
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1120,5457418656093347548,17039733008759334157,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1252 /prefetch:81⤵PID:652
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1248,13417856562720728632,571632063832138105,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2056 /prefetch:11⤵PID:1188
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1248,13417856562720728632,571632063832138105,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2024 /prefetch:11⤵PID:1012
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1248,13417856562720728632,571632063832138105,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:81⤵PID:1420
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2020.0.1423293972\902944278" -parentBuildID 20200403170909 -prefsHandle 1176 -prefMapHandle 1168 -prefsLen 1 -prefMapSize 220106 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2020 "\\.\pipe\gecko-crash-server-pipe.2020" 1244 gpu3⤵PID:1644
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2020.3.1271919374\2044086932" -childID 1 -isForBrowser -prefsHandle 1692 -prefMapHandle 1776 -prefsLen 156 -prefMapSize 220106 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2020 "\\.\pipe\gecko-crash-server-pipe.2020" 1696 tab3⤵PID:364
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2020.13.1818742903\1925860835" -childID 2 -isForBrowser -prefsHandle 2272 -prefMapHandle 2532 -prefsLen 6938 -prefMapSize 220106 -parentBuildID 20200403170909 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2020 "\\.\pipe\gecko-crash-server-pipe.2020" 2548 tab3⤵PID:240
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2588
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x18c1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2712