Analysis

  • max time kernel
    132s
  • max time network
    169s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05-05-2023 11:18

General

  • Target

    wyCdPrh7QF.exe

  • Size

    1.0MB

  • MD5

    9f88f83efed561b5002940f8425d73bd

  • SHA1

    e211bc5df1d01ed150e5f4c727ae33c021a2011f

  • SHA256

    167645a3961ac8521e1db57b4a70c12adf03217b8f546fdd34c4fb770ccb4779

  • SHA512

    71fc4523d93f6a9f0ba48291e54528e18c969e1dd0d3d45c75ef90a64a1b9b1a12e14a5ae1a0b23e9a7b91f8576d7e4c8c252523d684e18f0cc0f95ab38bd7b6

  • SSDEEP

    24576:w0I5Wj1JZkaiSEZe1HOqJarhD85O/f6CDruxp6/XjtjWm:w0IEj1l131HOqJad85mSCDrCp6/0m

Malware Config

Extracted

Family

redline

Botnet

Youtube

C2

5.75.169.103:18374

Attributes
  • auth_value

    fa6349261c48cdab29f1787f5ed475fe

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • UAC bypass 3 TTPs 1 IoCs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs 2 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 2 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\wyCdPrh7QF.exe
    "C:\Users\Admin\AppData\Local\Temp\wyCdPrh7QF.exe"
    1⤵
    • Looks for VirtualBox Guest Additions in registry
    • Looks for VMWare Tools registry key
    • Checks BIOS information in registry
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1536
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1596
      • C:\Windows\system32\schtasks.exe
        schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'
        3⤵
        • Creates scheduled task(s)
        PID:1992
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp8509.tmp.bat""
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1412
      • C:\Windows\system32\timeout.exe
        timeout 3
        3⤵
        • Delays execution with timeout.exe
        PID:1308
      • C:\Users\Admin\AppData\Roaming\svchost.exe
        "C:\Users\Admin\AppData\Roaming\svchost.exe"
        3⤵
        • UAC bypass
        • Looks for VirtualBox Guest Additions in registry
        • Looks for VMWare Tools registry key
        • Sets service image path in registry
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Maps connected drives based on registry
        • Suspicious use of SetThreadContext
        • Modifies system certificate store
        • Suspicious behavior: LoadsDriver
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:932
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\svchost.exe" -Force
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1972
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
          4⤵
            PID:108

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Registry Run Keys / Startup Folder

    2
    T1060

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Bypass User Account Control

    1
    T1088

    Scheduled Task

    1
    T1053

    Defense Evasion

    Bypass User Account Control

    1
    T1088

    Disabling Security Tools

    1
    T1089

    Modify Registry

    5
    T1112

    Virtualization/Sandbox Evasion

    2
    T1497

    Install Root Certificate

    1
    T1130

    Discovery

    Query Registry

    5
    T1012

    Virtualization/Sandbox Evasion

    2
    T1497

    System Information Discovery

    4
    T1082

    Peripheral Device Discovery

    1
    T1120

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      62KB

      MD5

      b5fcc55cffd66f38d548e8b63206c5e6

      SHA1

      79db08ababfa33a4f644fa8fe337195b5aba44c7

      SHA256

      7730df1165195dd5bb6b40d6e519b4ce07aceb03601a77bca6535d31698d4ca1

      SHA512

      aaa17175e90dbca04f0fa753084731313e70119fef7d408b41ff4170116ab24eaee0bd05dca2cc43464b1ee920819e5ce6f6e750d97e3c4fc605f01e7ff9c649

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      62KB

      MD5

      b5fcc55cffd66f38d548e8b63206c5e6

      SHA1

      79db08ababfa33a4f644fa8fe337195b5aba44c7

      SHA256

      7730df1165195dd5bb6b40d6e519b4ce07aceb03601a77bca6535d31698d4ca1

      SHA512

      aaa17175e90dbca04f0fa753084731313e70119fef7d408b41ff4170116ab24eaee0bd05dca2cc43464b1ee920819e5ce6f6e750d97e3c4fc605f01e7ff9c649

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      0d2762ecab83a607f81198134e84ec41

      SHA1

      5d70b6177814e485d539d73f25a2f6cf57ab1763

      SHA256

      c7abac1cdd02dad035348e1b973991a8dfeb482bf9fe154e5d1affdbe609615b

      SHA512

      12a81faa9005688d43f87584d186763eb6d1bf4af563e3f533f990c009e3c45cb2033e49d6246a7f304ce4e4bbe3c2aa0d0247273dea7af59c0aeb0cc6be4eca

    • C:\Users\Admin\AppData\Local\Temp\Cab71AA.tmp
      Filesize

      61KB

      MD5

      fc4666cbca561e864e7fdf883a9e6661

      SHA1

      2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

      SHA256

      10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

      SHA512

      c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

    • C:\Users\Admin\AppData\Local\Temp\Tar71BC.tmp
      Filesize

      161KB

      MD5

      73b4b714b42fc9a6aaefd0ae59adb009

      SHA1

      efdaffd5b0ad21913d22001d91bf6c19ecb4ac41

      SHA256

      c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd

      SHA512

      73af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd

    • C:\Users\Admin\AppData\Local\Temp\tmp8509.tmp.bat
      Filesize

      151B

      MD5

      e47f5f2f73e7ac721962511e2067c265

      SHA1

      df4eb4218b33c53e3c3c47ecaede7ebb46117ff3

      SHA256

      716e761173f0ab979fc6b80ecd535e73647cd98889e2fc4380bb1cbf9bfe2cd3

      SHA512

      c79027f1ef436f7bb9fc834362e99b5a5f581bd3bba4de1cb7c88775de318c98bb74c6db5183a2e1c4407f9ded36de733773336146b7a0b665bf4a5373db6bb9

    • C:\Users\Admin\AppData\Local\Temp\tmp8509.tmp.bat
      Filesize

      151B

      MD5

      e47f5f2f73e7ac721962511e2067c265

      SHA1

      df4eb4218b33c53e3c3c47ecaede7ebb46117ff3

      SHA256

      716e761173f0ab979fc6b80ecd535e73647cd98889e2fc4380bb1cbf9bfe2cd3

      SHA512

      c79027f1ef436f7bb9fc834362e99b5a5f581bd3bba4de1cb7c88775de318c98bb74c6db5183a2e1c4407f9ded36de733773336146b7a0b665bf4a5373db6bb9

    • C:\Users\Admin\AppData\Roaming\svchost.exe
      Filesize

      1.0MB

      MD5

      9f88f83efed561b5002940f8425d73bd

      SHA1

      e211bc5df1d01ed150e5f4c727ae33c021a2011f

      SHA256

      167645a3961ac8521e1db57b4a70c12adf03217b8f546fdd34c4fb770ccb4779

      SHA512

      71fc4523d93f6a9f0ba48291e54528e18c969e1dd0d3d45c75ef90a64a1b9b1a12e14a5ae1a0b23e9a7b91f8576d7e4c8c252523d684e18f0cc0f95ab38bd7b6

    • C:\Users\Admin\AppData\Roaming\svchost.exe
      Filesize

      1.0MB

      MD5

      9f88f83efed561b5002940f8425d73bd

      SHA1

      e211bc5df1d01ed150e5f4c727ae33c021a2011f

      SHA256

      167645a3961ac8521e1db57b4a70c12adf03217b8f546fdd34c4fb770ccb4779

      SHA512

      71fc4523d93f6a9f0ba48291e54528e18c969e1dd0d3d45c75ef90a64a1b9b1a12e14a5ae1a0b23e9a7b91f8576d7e4c8c252523d684e18f0cc0f95ab38bd7b6

    • \Users\Admin\AppData\Roaming\svchost.exe
      Filesize

      1.0MB

      MD5

      9f88f83efed561b5002940f8425d73bd

      SHA1

      e211bc5df1d01ed150e5f4c727ae33c021a2011f

      SHA256

      167645a3961ac8521e1db57b4a70c12adf03217b8f546fdd34c4fb770ccb4779

      SHA512

      71fc4523d93f6a9f0ba48291e54528e18c969e1dd0d3d45c75ef90a64a1b9b1a12e14a5ae1a0b23e9a7b91f8576d7e4c8c252523d684e18f0cc0f95ab38bd7b6

    • memory/108-149-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/108-160-0x0000000004730000-0x0000000004770000-memory.dmp
      Filesize

      256KB

    • memory/108-159-0x0000000004730000-0x0000000004770000-memory.dmp
      Filesize

      256KB

    • memory/108-157-0x0000000000430000-0x0000000000436000-memory.dmp
      Filesize

      24KB

    • memory/108-151-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/108-143-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/932-128-0x0000000000BC0000-0x0000000000CC4000-memory.dmp
      Filesize

      1.0MB

    • memory/932-131-0x000000001B470000-0x000000001B4F0000-memory.dmp
      Filesize

      512KB

    • memory/1536-76-0x0000000000470000-0x00000000004F0000-memory.dmp
      Filesize

      512KB

    • memory/1536-114-0x0000000000940000-0x00000000009B0000-memory.dmp
      Filesize

      448KB

    • memory/1536-54-0x00000000009F0000-0x0000000000AF4000-memory.dmp
      Filesize

      1.0MB

    • memory/1972-152-0x000000001B200000-0x000000001B4E2000-memory.dmp
      Filesize

      2.9MB

    • memory/1972-153-0x0000000001DE0000-0x0000000001DE8000-memory.dmp
      Filesize

      32KB

    • memory/1972-154-0x0000000002430000-0x00000000024B0000-memory.dmp
      Filesize

      512KB

    • memory/1972-155-0x0000000002430000-0x00000000024B0000-memory.dmp
      Filesize

      512KB

    • memory/1972-156-0x0000000002430000-0x00000000024B0000-memory.dmp
      Filesize

      512KB

    • memory/1972-158-0x000000000243B000-0x0000000002472000-memory.dmp
      Filesize

      220KB