Analysis

  • max time kernel
    129s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    06-05-2023 23:27

General

  • Target

    167645a3961ac8521e1db57b4a70c12adf03217b8f546fdd34c4fb770ccb4779.exe

  • Size

    1.0MB

  • MD5

    9f88f83efed561b5002940f8425d73bd

  • SHA1

    e211bc5df1d01ed150e5f4c727ae33c021a2011f

  • SHA256

    167645a3961ac8521e1db57b4a70c12adf03217b8f546fdd34c4fb770ccb4779

  • SHA512

    71fc4523d93f6a9f0ba48291e54528e18c969e1dd0d3d45c75ef90a64a1b9b1a12e14a5ae1a0b23e9a7b91f8576d7e4c8c252523d684e18f0cc0f95ab38bd7b6

  • SSDEEP

    24576:w0I5Wj1JZkaiSEZe1HOqJarhD85O/f6CDruxp6/XjtjWm:w0IEj1l131HOqJad85mSCDrCp6/0m

Malware Config

Extracted

Family

redline

Botnet

Youtube

C2

5.75.169.103:18374

Attributes
  • auth_value

    fa6349261c48cdab29f1787f5ed475fe

Signatures

  • Detects Redline Stealer samples 1 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • UAC bypass 3 TTPs 1 IoCs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs 2 IoCs
  • Looks for VMWare Tools registry key 2 TTPs 2 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\167645a3961ac8521e1db57b4a70c12adf03217b8f546fdd34c4fb770ccb4779.exe
    "C:\Users\Admin\AppData\Local\Temp\167645a3961ac8521e1db57b4a70c12adf03217b8f546fdd34c4fb770ccb4779.exe"
    1⤵
    • Looks for VirtualBox Guest Additions in registry
    • Looks for VMWare Tools registry key
    • Checks BIOS information in registry
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1100
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1932
      • C:\Windows\system32\schtasks.exe
        schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'
        3⤵
        • Creates scheduled task(s)
        PID:916
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp25AB.tmp.bat""
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1928
      • C:\Windows\system32\timeout.exe
        timeout 3
        3⤵
        • Delays execution with timeout.exe
        PID:1504
      • C:\Users\Admin\AppData\Roaming\svchost.exe
        "C:\Users\Admin\AppData\Roaming\svchost.exe"
        3⤵
        • UAC bypass
        • Looks for VirtualBox Guest Additions in registry
        • Looks for VMWare Tools registry key
        • Sets service image path in registry
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks whether UAC is enabled
        • Maps connected drives based on registry
        • Modifies system certificate store
        • Suspicious behavior: LoadsDriver
        • System policy modification
        PID:1004
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\svchost.exe" -Force
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1868
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
          4⤵
            PID:1180

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Registry Run Keys / Startup Folder

    2
    T1060

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Bypass User Account Control

    1
    T1088

    Scheduled Task

    1
    T1053

    Defense Evasion

    Bypass User Account Control

    1
    T1088

    Disabling Security Tools

    1
    T1089

    Modify Registry

    5
    T1112

    Virtualization/Sandbox Evasion

    2
    T1497

    Install Root Certificate

    1
    T1130

    Discovery

    Query Registry

    5
    T1012

    Virtualization/Sandbox Evasion

    2
    T1497

    System Information Discovery

    4
    T1082

    Peripheral Device Discovery

    1
    T1120

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      62KB

      MD5

      3ac860860707baaf32469fa7cc7c0192

      SHA1

      c33c2acdaba0e6fa41fd2f00f186804722477639

      SHA256

      d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904

      SHA512

      d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c

    • C:\Users\Admin\AppData\Local\Temp\Cab1825.tmp
      Filesize

      61KB

      MD5

      fc4666cbca561e864e7fdf883a9e6661

      SHA1

      2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

      SHA256

      10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

      SHA512

      c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

    • C:\Users\Admin\AppData\Local\Temp\Tar1848.tmp
      Filesize

      161KB

      MD5

      73b4b714b42fc9a6aaefd0ae59adb009

      SHA1

      efdaffd5b0ad21913d22001d91bf6c19ecb4ac41

      SHA256

      c0cf8cc04c34b5b80a2d86ad0eafb2dd71436f070c86b0321fba0201879625fd

      SHA512

      73af3c51b15f89237552b1718bef21fd80788fa416bab2cb2e7fb3a60d56249a716eda0d2dd68ab643752272640e7eaaaf57ce64bcb38373ddc3d035fb8d57cd

    • C:\Users\Admin\AppData\Local\Temp\Tar1A70.tmp
      Filesize

      164KB

      MD5

      4ff65ad929cd9a367680e0e5b1c08166

      SHA1

      c0af0d4396bd1f15c45f39d3b849ba444233b3a2

      SHA256

      c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6

      SHA512

      f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27

    • C:\Users\Admin\AppData\Local\Temp\tmp25AB.tmp.bat
      Filesize

      151B

      MD5

      d7630d32ab99ea98f67edddab73fe3d8

      SHA1

      ae15f6e3af1e83f3b017fc4038fc8363ce8dea3c

      SHA256

      600f6b062b636df01b7370d9a707a72719a1701588406c9e3be30456459ff936

      SHA512

      bd7171c300dd69e8f1f52fe28e86c211dce1fbd860e65f36c5fdaa5e3bc60a799f0c0e7283c11ad670caa7dd7c00786856e37b454863fa5f40624dae39a4f267

    • C:\Users\Admin\AppData\Local\Temp\tmp25AB.tmp.bat
      Filesize

      151B

      MD5

      d7630d32ab99ea98f67edddab73fe3d8

      SHA1

      ae15f6e3af1e83f3b017fc4038fc8363ce8dea3c

      SHA256

      600f6b062b636df01b7370d9a707a72719a1701588406c9e3be30456459ff936

      SHA512

      bd7171c300dd69e8f1f52fe28e86c211dce1fbd860e65f36c5fdaa5e3bc60a799f0c0e7283c11ad670caa7dd7c00786856e37b454863fa5f40624dae39a4f267

    • C:\Users\Admin\AppData\Roaming\svchost.exe
      Filesize

      1.0MB

      MD5

      9f88f83efed561b5002940f8425d73bd

      SHA1

      e211bc5df1d01ed150e5f4c727ae33c021a2011f

      SHA256

      167645a3961ac8521e1db57b4a70c12adf03217b8f546fdd34c4fb770ccb4779

      SHA512

      71fc4523d93f6a9f0ba48291e54528e18c969e1dd0d3d45c75ef90a64a1b9b1a12e14a5ae1a0b23e9a7b91f8576d7e4c8c252523d684e18f0cc0f95ab38bd7b6

    • \Users\Admin\AppData\Roaming\svchost.exe
      Filesize

      1.0MB

      MD5

      9f88f83efed561b5002940f8425d73bd

      SHA1

      e211bc5df1d01ed150e5f4c727ae33c021a2011f

      SHA256

      167645a3961ac8521e1db57b4a70c12adf03217b8f546fdd34c4fb770ccb4779

      SHA512

      71fc4523d93f6a9f0ba48291e54528e18c969e1dd0d3d45c75ef90a64a1b9b1a12e14a5ae1a0b23e9a7b91f8576d7e4c8c252523d684e18f0cc0f95ab38bd7b6

    • memory/1100-129-0x0000000000A60000-0x0000000000AD0000-memory.dmp
      Filesize

      448KB

    • memory/1100-97-0x000000001B370000-0x000000001B3F0000-memory.dmp
      Filesize

      512KB

    • memory/1100-54-0x0000000000DC0000-0x0000000000EC4000-memory.dmp
      Filesize

      1.0MB

    • memory/1180-148-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1180-149-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1180-156-0x00000000004C0000-0x00000000004C6000-memory.dmp
      Filesize

      24KB

    • memory/1180-157-0x0000000004A40000-0x0000000004A80000-memory.dmp
      Filesize

      256KB

    • memory/1180-158-0x0000000004A40000-0x0000000004A80000-memory.dmp
      Filesize

      256KB

    • memory/1868-146-0x000000001B1F0000-0x000000001B4D2000-memory.dmp
      Filesize

      2.9MB

    • memory/1868-147-0x0000000002390000-0x0000000002398000-memory.dmp
      Filesize

      32KB

    • memory/1868-154-0x00000000023C0000-0x0000000002440000-memory.dmp
      Filesize

      512KB

    • memory/1868-155-0x00000000023C0000-0x0000000002440000-memory.dmp
      Filesize

      512KB