Analysis
-
max time kernel
26s -
max time network
29s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
01-06-2023 19:17
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
General
-
Target
file.exe
-
Size
560KB
-
MD5
0500e55091f7055bf28ec7670ac07a8e
-
SHA1
f128be0f27fa9b44389eb25abbe967bab27d7e9f
-
SHA256
b2881644ca2777869b611abca810c4ea6eaa347f65abf1d9920313523c5939c2
-
SHA512
3117b41064d1f75481ea40874d945728427139c16888fdcd489707b30de9ddc1297b9e9901ff0c6bd18dd5ed96155eb277ecfa302f4ab3dd9e2e79eb1054f98a
-
SSDEEP
12288:YBpjpAxCHUtrYrMCWmi86LOJJaga1jsh2ERCqS:lx0UtUrfrtlkm8f
Malware Config
Extracted
redline
VEBO.01-06_H
50.114.39.71:10576
-
auth_value
4baffaf63b3dd023176c1aae4d99ad49
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions svchost.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions file.exe -
Looks for VMWare Tools registry key 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools file.exe Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools svchost.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\TaskKill\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\Иисус.sys" svchost.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1356 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 1388 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" file.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum file.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 file.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1356 set thread context of 364 1356 svchost.exe 46 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1172 364 WerFault.exe 46 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2032 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1612 timeout.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 912 file.exe 1532 powershell.exe 1356 svchost.exe 1356 svchost.exe 1356 svchost.exe 1356 svchost.exe 1356 svchost.exe 1356 svchost.exe 1356 svchost.exe 1356 svchost.exe 1356 svchost.exe 1356 svchost.exe 1356 svchost.exe 1356 svchost.exe 1356 svchost.exe 1356 svchost.exe 1356 svchost.exe 1356 svchost.exe 1356 svchost.exe 1356 svchost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1356 svchost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 912 file.exe Token: SeDebugPrivilege 1356 svchost.exe Token: SeDebugPrivilege 1356 svchost.exe Token: SeLoadDriverPrivilege 1356 svchost.exe Token: SeDebugPrivilege 1532 powershell.exe -
Suspicious use of WriteProcessMemory 61 IoCs
description pid Process procid_target PID 912 wrote to memory of 560 912 file.exe 28 PID 912 wrote to memory of 560 912 file.exe 28 PID 912 wrote to memory of 560 912 file.exe 28 PID 560 wrote to memory of 2032 560 cmd.exe 30 PID 560 wrote to memory of 2032 560 cmd.exe 30 PID 560 wrote to memory of 2032 560 cmd.exe 30 PID 912 wrote to memory of 1388 912 file.exe 31 PID 912 wrote to memory of 1388 912 file.exe 31 PID 912 wrote to memory of 1388 912 file.exe 31 PID 1388 wrote to memory of 1612 1388 cmd.exe 33 PID 1388 wrote to memory of 1612 1388 cmd.exe 33 PID 1388 wrote to memory of 1612 1388 cmd.exe 33 PID 1388 wrote to memory of 1356 1388 cmd.exe 34 PID 1388 wrote to memory of 1356 1388 cmd.exe 34 PID 1388 wrote to memory of 1356 1388 cmd.exe 34 PID 1356 wrote to memory of 1532 1356 svchost.exe 35 PID 1356 wrote to memory of 1532 1356 svchost.exe 35 PID 1356 wrote to memory of 1532 1356 svchost.exe 35 PID 1356 wrote to memory of 1740 1356 svchost.exe 37 PID 1356 wrote to memory of 1740 1356 svchost.exe 37 PID 1356 wrote to memory of 1740 1356 svchost.exe 37 PID 1356 wrote to memory of 672 1356 svchost.exe 38 PID 1356 wrote to memory of 672 1356 svchost.exe 38 PID 1356 wrote to memory of 672 1356 svchost.exe 38 PID 1356 wrote to memory of 1908 1356 svchost.exe 39 PID 1356 wrote to memory of 1908 1356 svchost.exe 39 PID 1356 wrote to memory of 1908 1356 svchost.exe 39 PID 1356 wrote to memory of 1728 1356 svchost.exe 40 PID 1356 wrote to memory of 1728 1356 svchost.exe 40 PID 1356 wrote to memory of 1728 1356 svchost.exe 40 PID 1356 wrote to memory of 1964 1356 svchost.exe 41 PID 1356 wrote to memory of 1964 1356 svchost.exe 41 PID 1356 wrote to memory of 1964 1356 svchost.exe 41 PID 1356 wrote to memory of 588 1356 svchost.exe 42 PID 1356 wrote to memory of 588 1356 svchost.exe 42 PID 1356 wrote to memory of 588 1356 svchost.exe 42 PID 1356 wrote to memory of 1816 1356 svchost.exe 43 PID 1356 wrote to memory of 1816 1356 svchost.exe 43 PID 1356 wrote to memory of 1816 1356 svchost.exe 43 PID 1356 wrote to memory of 656 1356 svchost.exe 44 PID 1356 wrote to memory of 656 1356 svchost.exe 44 PID 1356 wrote to memory of 656 1356 svchost.exe 44 PID 1356 wrote to memory of 1480 1356 svchost.exe 45 PID 1356 wrote to memory of 1480 1356 svchost.exe 45 PID 1356 wrote to memory of 1480 1356 svchost.exe 45 PID 1356 wrote to memory of 364 1356 svchost.exe 46 PID 1356 wrote to memory of 364 1356 svchost.exe 46 PID 1356 wrote to memory of 364 1356 svchost.exe 46 PID 1356 wrote to memory of 364 1356 svchost.exe 46 PID 1356 wrote to memory of 364 1356 svchost.exe 46 PID 1356 wrote to memory of 364 1356 svchost.exe 46 PID 1356 wrote to memory of 364 1356 svchost.exe 46 PID 1356 wrote to memory of 364 1356 svchost.exe 46 PID 1356 wrote to memory of 364 1356 svchost.exe 46 PID 1356 wrote to memory of 364 1356 svchost.exe 46 PID 1356 wrote to memory of 364 1356 svchost.exe 46 PID 1356 wrote to memory of 364 1356 svchost.exe 46 PID 364 wrote to memory of 1172 364 SetupUtility.exe 47 PID 364 wrote to memory of 1172 364 SetupUtility.exe 47 PID 364 wrote to memory of 1172 364 SetupUtility.exe 47 PID 364 wrote to memory of 1172 364 SetupUtility.exe 47 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- Creates scheduled task(s)
PID:2032
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp6D73.tmp.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:1612
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- UAC bypass
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Sets service image path in registry
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1356 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\svchost.exe" -Force4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1532
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"4⤵PID:1740
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"4⤵PID:672
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"4⤵PID:1908
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\MSBuild.exe"4⤵PID:1728
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"4⤵PID:1964
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"4⤵PID:588
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"4⤵PID:1816
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"4⤵PID:656
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"4⤵PID:1480
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\SetupUtility.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.03062\SetupUtility.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 364 -s 1685⤵
- Program crash
PID:1172
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD5fa590f521371f0f52167f3cfbbd17be0
SHA1fd04126154a57ab677f224f594ce62d2a8bf32b9
SHA256b4bb177ba69a1b3288b72ec051c61d0fe447ecd5b9fb612f7ea948d5c8d2431d
SHA512011ed9dd76d469689cc83e3b2a8faadacf8a1274b84d3c2d071899e3aeb0ba5674326cb48c5f30e27f8c9d1fd5257e687eab3cbef42a369fd328f4d991d307f6
-
Filesize
151B
MD5fa590f521371f0f52167f3cfbbd17be0
SHA1fd04126154a57ab677f224f594ce62d2a8bf32b9
SHA256b4bb177ba69a1b3288b72ec051c61d0fe447ecd5b9fb612f7ea948d5c8d2431d
SHA512011ed9dd76d469689cc83e3b2a8faadacf8a1274b84d3c2d071899e3aeb0ba5674326cb48c5f30e27f8c9d1fd5257e687eab3cbef42a369fd328f4d991d307f6
-
Filesize
560KB
MD50500e55091f7055bf28ec7670ac07a8e
SHA1f128be0f27fa9b44389eb25abbe967bab27d7e9f
SHA256b2881644ca2777869b611abca810c4ea6eaa347f65abf1d9920313523c5939c2
SHA5123117b41064d1f75481ea40874d945728427139c16888fdcd489707b30de9ddc1297b9e9901ff0c6bd18dd5ed96155eb277ecfa302f4ab3dd9e2e79eb1054f98a
-
Filesize
560KB
MD50500e55091f7055bf28ec7670ac07a8e
SHA1f128be0f27fa9b44389eb25abbe967bab27d7e9f
SHA256b2881644ca2777869b611abca810c4ea6eaa347f65abf1d9920313523c5939c2
SHA5123117b41064d1f75481ea40874d945728427139c16888fdcd489707b30de9ddc1297b9e9901ff0c6bd18dd5ed96155eb277ecfa302f4ab3dd9e2e79eb1054f98a
-
Filesize
560KB
MD50500e55091f7055bf28ec7670ac07a8e
SHA1f128be0f27fa9b44389eb25abbe967bab27d7e9f
SHA256b2881644ca2777869b611abca810c4ea6eaa347f65abf1d9920313523c5939c2
SHA5123117b41064d1f75481ea40874d945728427139c16888fdcd489707b30de9ddc1297b9e9901ff0c6bd18dd5ed96155eb277ecfa302f4ab3dd9e2e79eb1054f98a