Analysis
-
max time kernel
135s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/06/2023, 19:17
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230220-en
General
-
Target
file.exe
-
Size
560KB
-
MD5
0500e55091f7055bf28ec7670ac07a8e
-
SHA1
f128be0f27fa9b44389eb25abbe967bab27d7e9f
-
SHA256
b2881644ca2777869b611abca810c4ea6eaa347f65abf1d9920313523c5939c2
-
SHA512
3117b41064d1f75481ea40874d945728427139c16888fdcd489707b30de9ddc1297b9e9901ff0c6bd18dd5ed96155eb277ecfa302f4ab3dd9e2e79eb1054f98a
-
SSDEEP
12288:YBpjpAxCHUtrYrMCWmi86LOJJaga1jsh2ERCqS:lx0UtUrfrtlkm8f
Malware Config
Extracted
redline
VEBO.01-06_H
50.114.39.71:10576
-
auth_value
4baffaf63b3dd023176c1aae4d99ad49
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\svchost.exe = "0" svchost.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions file.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions svchost.exe -
Looks for VMWare Tools registry key 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools file.exe Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools svchost.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TaskKill\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\Иисус.sys" svchost.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation file.exe -
Executes dropped EXE 1 IoCs
pid Process 952 svchost.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\svchost.exe = "0" svchost.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" file.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum file.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 952 set thread context of 4240 952 svchost.exe 98 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3404 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3244 timeout.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 2296 file.exe 2296 file.exe 2296 file.exe 2296 file.exe 2296 file.exe 2296 file.exe 2296 file.exe 2296 file.exe 2296 file.exe 2296 file.exe 2296 file.exe 2296 file.exe 2296 file.exe 2296 file.exe 2296 file.exe 2296 file.exe 2296 file.exe 2296 file.exe 2296 file.exe 2296 file.exe 2296 file.exe 2296 file.exe 2296 file.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 952 svchost.exe 216 powershell.exe 216 powershell.exe 4240 jsc.exe 4240 jsc.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 952 svchost.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2296 file.exe Token: SeDebugPrivilege 952 svchost.exe Token: SeDebugPrivilege 952 svchost.exe Token: SeLoadDriverPrivilege 952 svchost.exe Token: SeDebugPrivilege 216 powershell.exe Token: SeDebugPrivilege 4240 jsc.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2296 wrote to memory of 4940 2296 file.exe 85 PID 2296 wrote to memory of 4940 2296 file.exe 85 PID 2296 wrote to memory of 4804 2296 file.exe 87 PID 2296 wrote to memory of 4804 2296 file.exe 87 PID 4804 wrote to memory of 3244 4804 cmd.exe 89 PID 4804 wrote to memory of 3244 4804 cmd.exe 89 PID 4940 wrote to memory of 3404 4940 cmd.exe 90 PID 4940 wrote to memory of 3404 4940 cmd.exe 90 PID 4804 wrote to memory of 952 4804 cmd.exe 91 PID 4804 wrote to memory of 952 4804 cmd.exe 91 PID 952 wrote to memory of 216 952 svchost.exe 92 PID 952 wrote to memory of 216 952 svchost.exe 92 PID 952 wrote to memory of 4376 952 svchost.exe 94 PID 952 wrote to memory of 4376 952 svchost.exe 94 PID 952 wrote to memory of 4288 952 svchost.exe 96 PID 952 wrote to memory of 4288 952 svchost.exe 96 PID 952 wrote to memory of 4652 952 svchost.exe 95 PID 952 wrote to memory of 4652 952 svchost.exe 95 PID 952 wrote to memory of 4064 952 svchost.exe 97 PID 952 wrote to memory of 4064 952 svchost.exe 97 PID 952 wrote to memory of 4240 952 svchost.exe 98 PID 952 wrote to memory of 4240 952 svchost.exe 98 PID 952 wrote to memory of 4240 952 svchost.exe 98 PID 952 wrote to memory of 4240 952 svchost.exe 98 PID 952 wrote to memory of 4240 952 svchost.exe 98 PID 952 wrote to memory of 4240 952 svchost.exe 98 PID 952 wrote to memory of 4240 952 svchost.exe 98 PID 952 wrote to memory of 4240 952 svchost.exe 98 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Checks computer location settings
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- Creates scheduled task(s)
PID:3404
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp96F5.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:3244
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- UAC bypass
- Windows security bypass
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Sets service image path in registry
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:952 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\svchost.exe" -Force4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:216
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe"4⤵PID:4376
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"4⤵PID:4652
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"4⤵PID:4288
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"4⤵PID:4064
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4240
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
151B
MD52b52ef1807cd14f2288d1ff35536b596
SHA1ff7a6803935f8c6df09cc176e20f8823638c8b82
SHA2561c6a0906c61666688e30101b97d5d5d3f6204fa8abdfca1e2014606edecd6cab
SHA51265d781463e36bb6553d354d3870ffc072746c8195d91faec147f4181e53aaac8ef5af5d2f34c440d3ad50f9b6ed0d256bf40154b5d9947cd1c86e559f1e0e96f
-
Filesize
560KB
MD50500e55091f7055bf28ec7670ac07a8e
SHA1f128be0f27fa9b44389eb25abbe967bab27d7e9f
SHA256b2881644ca2777869b611abca810c4ea6eaa347f65abf1d9920313523c5939c2
SHA5123117b41064d1f75481ea40874d945728427139c16888fdcd489707b30de9ddc1297b9e9901ff0c6bd18dd5ed96155eb277ecfa302f4ab3dd9e2e79eb1054f98a
-
Filesize
560KB
MD50500e55091f7055bf28ec7670ac07a8e
SHA1f128be0f27fa9b44389eb25abbe967bab27d7e9f
SHA256b2881644ca2777869b611abca810c4ea6eaa347f65abf1d9920313523c5939c2
SHA5123117b41064d1f75481ea40874d945728427139c16888fdcd489707b30de9ddc1297b9e9901ff0c6bd18dd5ed96155eb277ecfa302f4ab3dd9e2e79eb1054f98a