Analysis
-
max time kernel
28s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-06-2023 09:54
Static task
static1
Behavioral task
behavioral1
Sample
15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe
Resource
win10v2004-20230220-en
General
-
Target
15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe
-
Size
560KB
-
MD5
056deb6ec10027d86888638b8b2247b8
-
SHA1
98f36ae500e628dba667be3ec84b8023dfc37206
-
SHA256
15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821
-
SHA512
af067154ab0c0d6e537967f405da53aa3590229f0759382ba0602299eed7135928d683323c7dd68fb4aa4ab40bba55cc7c0440370cf2d70b2a4f22fc73927712
-
SSDEEP
6144:u7dNSb0zoj6JITz7zEFjnhK4P4SShWYrmhUCTI6mK+kFSutrXy0IRHN7eifbwR:YP8fEFj8mOAF9VM0IRHN7ei8R
Malware Config
Extracted
redline
VEBO.01-06_TA
50.114.39.71:10576
-
auth_value
8f9eccdbb2415cc019309e8058c956b4
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions svchost.exe -
Looks for VMWare Tools registry key 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools svchost.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\TaskKill\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\Иисус.sys" svchost.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1856 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 1664 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2961826002-3968192592-354541192-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1856 set thread context of 2016 1856 svchost.exe 38 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1540 2016 WerFault.exe 38 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1340 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 576 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1216 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe 1360 powershell.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 1856 svchost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1216 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe Token: SeDebugPrivilege 1856 svchost.exe Token: SeDebugPrivilege 1856 svchost.exe Token: SeLoadDriverPrivilege 1856 svchost.exe Token: SeDebugPrivilege 1360 powershell.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 1216 wrote to memory of 1148 1216 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe 29 PID 1216 wrote to memory of 1148 1216 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe 29 PID 1216 wrote to memory of 1148 1216 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe 29 PID 1216 wrote to memory of 1664 1216 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe 31 PID 1216 wrote to memory of 1664 1216 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe 31 PID 1216 wrote to memory of 1664 1216 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe 31 PID 1664 wrote to memory of 576 1664 cmd.exe 33 PID 1664 wrote to memory of 576 1664 cmd.exe 33 PID 1664 wrote to memory of 576 1664 cmd.exe 33 PID 1148 wrote to memory of 1340 1148 cmd.exe 34 PID 1148 wrote to memory of 1340 1148 cmd.exe 34 PID 1148 wrote to memory of 1340 1148 cmd.exe 34 PID 1664 wrote to memory of 1856 1664 cmd.exe 35 PID 1664 wrote to memory of 1856 1664 cmd.exe 35 PID 1664 wrote to memory of 1856 1664 cmd.exe 35 PID 1856 wrote to memory of 1360 1856 svchost.exe 36 PID 1856 wrote to memory of 1360 1856 svchost.exe 36 PID 1856 wrote to memory of 1360 1856 svchost.exe 36 PID 1856 wrote to memory of 2016 1856 svchost.exe 38 PID 1856 wrote to memory of 2016 1856 svchost.exe 38 PID 1856 wrote to memory of 2016 1856 svchost.exe 38 PID 1856 wrote to memory of 2016 1856 svchost.exe 38 PID 1856 wrote to memory of 2016 1856 svchost.exe 38 PID 1856 wrote to memory of 2016 1856 svchost.exe 38 PID 1856 wrote to memory of 2016 1856 svchost.exe 38 PID 1856 wrote to memory of 2016 1856 svchost.exe 38 PID 1856 wrote to memory of 2016 1856 svchost.exe 38 PID 2016 wrote to memory of 1540 2016 jsc.exe 39 PID 2016 wrote to memory of 1540 2016 jsc.exe 39 PID 2016 wrote to memory of 1540 2016 jsc.exe 39 PID 2016 wrote to memory of 1540 2016 jsc.exe 39 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe"C:\Users\Admin\AppData\Local\Temp\15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- Creates scheduled task(s)
PID:1340
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp19D8.tmp.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:576
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- UAC bypass
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Sets service image path in registry
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1856 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\svchost.exe" -Force4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1360
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2016 -s 5045⤵
- Program crash
PID:1540
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD523b01ef1f596d72818e15f66be7d6969
SHA1fdc942e0a33f44ed83463e68fedc89ace1ffbee8
SHA2568a53e97b8379efd8291b4e014a5990bc954c48d9f74f4197d249c2a61335bea3
SHA512cdcdee973c64970341ddf404950b79e7458fd2981ab43920da03d273d54be5f68c3a07ebfc6b52a23a6634b0ddc6650e179bdc07b5db891cd7032375ff4ac325
-
Filesize
151B
MD523b01ef1f596d72818e15f66be7d6969
SHA1fdc942e0a33f44ed83463e68fedc89ace1ffbee8
SHA2568a53e97b8379efd8291b4e014a5990bc954c48d9f74f4197d249c2a61335bea3
SHA512cdcdee973c64970341ddf404950b79e7458fd2981ab43920da03d273d54be5f68c3a07ebfc6b52a23a6634b0ddc6650e179bdc07b5db891cd7032375ff4ac325
-
Filesize
560KB
MD5056deb6ec10027d86888638b8b2247b8
SHA198f36ae500e628dba667be3ec84b8023dfc37206
SHA25615e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821
SHA512af067154ab0c0d6e537967f405da53aa3590229f0759382ba0602299eed7135928d683323c7dd68fb4aa4ab40bba55cc7c0440370cf2d70b2a4f22fc73927712
-
Filesize
560KB
MD5056deb6ec10027d86888638b8b2247b8
SHA198f36ae500e628dba667be3ec84b8023dfc37206
SHA25615e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821
SHA512af067154ab0c0d6e537967f405da53aa3590229f0759382ba0602299eed7135928d683323c7dd68fb4aa4ab40bba55cc7c0440370cf2d70b2a4f22fc73927712
-
Filesize
560KB
MD5056deb6ec10027d86888638b8b2247b8
SHA198f36ae500e628dba667be3ec84b8023dfc37206
SHA25615e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821
SHA512af067154ab0c0d6e537967f405da53aa3590229f0759382ba0602299eed7135928d683323c7dd68fb4aa4ab40bba55cc7c0440370cf2d70b2a4f22fc73927712