Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21-03-2023 14:32
Static task
static1
Behavioral task
behavioral1
Sample
4bbf8447f25f44cabc87e9e20bf6594475f999a58e86c76bbad265d1db9bd513.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4bbf8447f25f44cabc87e9e20bf6594475f999a58e86c76bbad265d1db9bd513.exe
Resource
win10v2004-20230220-en
General
-
Target
4bbf8447f25f44cabc87e9e20bf6594475f999a58e86c76bbad265d1db9bd513.exe
-
Size
4.2MB
-
MD5
446215913dd436aae1317ad90bf75677
-
SHA1
6f9c887f3fe17b16045fd2fa2d754c744447a4d2
-
SHA256
4bbf8447f25f44cabc87e9e20bf6594475f999a58e86c76bbad265d1db9bd513
-
SHA512
dd1b3f89efb92245640289b43ceedbf3bb562578286966d3a72bd03ff145f36054788353d39804489174c6f9018624820f54cad560394be7cf09f5127188acb3
-
SSDEEP
98304:scyyd+oHduCY3f3rFQtAjgyzZdGxHeqWF0KfgOjCH:sAswQFQtLUGFeqlm
Malware Config
Extracted
bitrat
1.38
185.246.220.122:1488
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
tor_process
tor
Extracted
redline
185.246.220.122:7164
-
auth_value
bc36aaf1c6447fa611401422deaa29dd
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
4bbf8447f25f44cabc87e9e20bf6594475f999a58e86c76bbad265d1db9bd513.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation 4bbf8447f25f44cabc87e9e20bf6594475f999a58e86c76bbad265d1db9bd513.exe -
Executes dropped EXE 1 IoCs
Processes:
rr.exepid process 4200 rr.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
vbc.exepid process 3992 vbc.exe 3992 vbc.exe 3992 vbc.exe 3992 vbc.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
4bbf8447f25f44cabc87e9e20bf6594475f999a58e86c76bbad265d1db9bd513.exerr.exedescription pid process target process PID 3288 set thread context of 3992 3288 4bbf8447f25f44cabc87e9e20bf6594475f999a58e86c76bbad265d1db9bd513.exe vbc.exe PID 4200 set thread context of 228 4200 rr.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
vbc.exedescription pid process Token: SeShutdownPrivilege 3992 vbc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
vbc.exepid process 3992 vbc.exe 3992 vbc.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
4bbf8447f25f44cabc87e9e20bf6594475f999a58e86c76bbad265d1db9bd513.exerr.exedescription pid process target process PID 3288 wrote to memory of 3992 3288 4bbf8447f25f44cabc87e9e20bf6594475f999a58e86c76bbad265d1db9bd513.exe vbc.exe PID 3288 wrote to memory of 3992 3288 4bbf8447f25f44cabc87e9e20bf6594475f999a58e86c76bbad265d1db9bd513.exe vbc.exe PID 3288 wrote to memory of 3992 3288 4bbf8447f25f44cabc87e9e20bf6594475f999a58e86c76bbad265d1db9bd513.exe vbc.exe PID 3288 wrote to memory of 3992 3288 4bbf8447f25f44cabc87e9e20bf6594475f999a58e86c76bbad265d1db9bd513.exe vbc.exe PID 3288 wrote to memory of 3992 3288 4bbf8447f25f44cabc87e9e20bf6594475f999a58e86c76bbad265d1db9bd513.exe vbc.exe PID 3288 wrote to memory of 3992 3288 4bbf8447f25f44cabc87e9e20bf6594475f999a58e86c76bbad265d1db9bd513.exe vbc.exe PID 3288 wrote to memory of 3992 3288 4bbf8447f25f44cabc87e9e20bf6594475f999a58e86c76bbad265d1db9bd513.exe vbc.exe PID 3288 wrote to memory of 3992 3288 4bbf8447f25f44cabc87e9e20bf6594475f999a58e86c76bbad265d1db9bd513.exe vbc.exe PID 3288 wrote to memory of 3992 3288 4bbf8447f25f44cabc87e9e20bf6594475f999a58e86c76bbad265d1db9bd513.exe vbc.exe PID 3288 wrote to memory of 3992 3288 4bbf8447f25f44cabc87e9e20bf6594475f999a58e86c76bbad265d1db9bd513.exe vbc.exe PID 3288 wrote to memory of 3992 3288 4bbf8447f25f44cabc87e9e20bf6594475f999a58e86c76bbad265d1db9bd513.exe vbc.exe PID 3288 wrote to memory of 4200 3288 4bbf8447f25f44cabc87e9e20bf6594475f999a58e86c76bbad265d1db9bd513.exe rr.exe PID 3288 wrote to memory of 4200 3288 4bbf8447f25f44cabc87e9e20bf6594475f999a58e86c76bbad265d1db9bd513.exe rr.exe PID 3288 wrote to memory of 4200 3288 4bbf8447f25f44cabc87e9e20bf6594475f999a58e86c76bbad265d1db9bd513.exe rr.exe PID 4200 wrote to memory of 228 4200 rr.exe vbc.exe PID 4200 wrote to memory of 228 4200 rr.exe vbc.exe PID 4200 wrote to memory of 228 4200 rr.exe vbc.exe PID 4200 wrote to memory of 228 4200 rr.exe vbc.exe PID 4200 wrote to memory of 228 4200 rr.exe vbc.exe PID 4200 wrote to memory of 228 4200 rr.exe vbc.exe PID 4200 wrote to memory of 228 4200 rr.exe vbc.exe PID 4200 wrote to memory of 228 4200 rr.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4bbf8447f25f44cabc87e9e20bf6594475f999a58e86c76bbad265d1db9bd513.exe"C:\Users\Admin\AppData\Local\Temp\4bbf8447f25f44cabc87e9e20bf6594475f999a58e86c76bbad265d1db9bd513.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\rr.exe"C:\Users\Admin\AppData\Local\Temp\rr.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵PID:228
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
328KB
MD53f2f9975e1964be99f7e51ddc30f8c07
SHA11e6d873c70d4ac66daf350087a50409050eeeaff
SHA256843dc782676a45c6e1ab1197fe4d16ba3bc57943423eca12ec2b69ece68ac32f
SHA51289848eb83bced651355f5d8f5fe767fe7830ebe4287be4345223438318246089710e5393a4a75b7cf5c5eb2df22429ebd56f248b46e628c44ea8f5df88c5fb0d
-
Filesize
328KB
MD53f2f9975e1964be99f7e51ddc30f8c07
SHA11e6d873c70d4ac66daf350087a50409050eeeaff
SHA256843dc782676a45c6e1ab1197fe4d16ba3bc57943423eca12ec2b69ece68ac32f
SHA51289848eb83bced651355f5d8f5fe767fe7830ebe4287be4345223438318246089710e5393a4a75b7cf5c5eb2df22429ebd56f248b46e628c44ea8f5df88c5fb0d
-
Filesize
328KB
MD53f2f9975e1964be99f7e51ddc30f8c07
SHA11e6d873c70d4ac66daf350087a50409050eeeaff
SHA256843dc782676a45c6e1ab1197fe4d16ba3bc57943423eca12ec2b69ece68ac32f
SHA51289848eb83bced651355f5d8f5fe767fe7830ebe4287be4345223438318246089710e5393a4a75b7cf5c5eb2df22429ebd56f248b46e628c44ea8f5df88c5fb0d