Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2023, 09:54
Static task
static1
Behavioral task
behavioral1
Sample
15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe
Resource
win10v2004-20230220-en
General
-
Target
15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe
-
Size
560KB
-
MD5
056deb6ec10027d86888638b8b2247b8
-
SHA1
98f36ae500e628dba667be3ec84b8023dfc37206
-
SHA256
15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821
-
SHA512
af067154ab0c0d6e537967f405da53aa3590229f0759382ba0602299eed7135928d683323c7dd68fb4aa4ab40bba55cc7c0440370cf2d70b2a4f22fc73927712
-
SSDEEP
6144:u7dNSb0zoj6JITz7zEFjnhK4P4SShWYrmhUCTI6mK+kFSutrXy0IRHN7eifbwR:YP8fEFj8mOAF9VM0IRHN7ei8R
Malware Config
Extracted
redline
VEBO.01-06_TA
50.114.39.71:10576
-
auth_value
8f9eccdbb2415cc019309e8058c956b4
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\svchost.exe = "0" svchost.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions svchost.exe -
Looks for VMWare Tools registry key 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools svchost.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\TaskKill\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\Иисус.sys" svchost.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4512 svchost.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\svchost.exe = "0" svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4512 set thread context of 3060 4512 svchost.exe 106 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1120 3060 WerFault.exe 106 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1308 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3004 timeout.exe -
Suspicious behavior: EnumeratesProcesses 51 IoCs
pid Process 820 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe 820 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe 820 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe 820 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe 820 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe 820 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe 820 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe 820 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe 820 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe 820 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe 820 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe 820 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe 820 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe 820 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe 820 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe 820 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe 820 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe 820 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe 820 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe 820 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe 820 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe 820 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe 820 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe 4512 svchost.exe 4512 svchost.exe 4512 svchost.exe 4512 svchost.exe 4512 svchost.exe 4512 svchost.exe 4312 powershell.exe 4512 svchost.exe 4512 svchost.exe 4512 svchost.exe 4512 svchost.exe 4512 svchost.exe 4512 svchost.exe 4512 svchost.exe 4512 svchost.exe 4512 svchost.exe 4512 svchost.exe 4312 powershell.exe 4512 svchost.exe 4512 svchost.exe 4512 svchost.exe 4512 svchost.exe 4512 svchost.exe 4512 svchost.exe 4512 svchost.exe 4512 svchost.exe 4512 svchost.exe 4512 svchost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 4512 svchost.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 820 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe Token: SeDebugPrivilege 4512 svchost.exe Token: SeDebugPrivilege 4512 svchost.exe Token: SeLoadDriverPrivilege 4512 svchost.exe Token: SeDebugPrivilege 4312 powershell.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 820 wrote to memory of 3176 820 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe 84 PID 820 wrote to memory of 3176 820 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe 84 PID 820 wrote to memory of 4176 820 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe 86 PID 820 wrote to memory of 4176 820 15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe 86 PID 3176 wrote to memory of 1308 3176 cmd.exe 88 PID 3176 wrote to memory of 1308 3176 cmd.exe 88 PID 4176 wrote to memory of 3004 4176 cmd.exe 89 PID 4176 wrote to memory of 3004 4176 cmd.exe 89 PID 4176 wrote to memory of 4512 4176 cmd.exe 90 PID 4176 wrote to memory of 4512 4176 cmd.exe 90 PID 4512 wrote to memory of 4312 4512 svchost.exe 91 PID 4512 wrote to memory of 4312 4512 svchost.exe 91 PID 4512 wrote to memory of 232 4512 svchost.exe 93 PID 4512 wrote to memory of 232 4512 svchost.exe 93 PID 4512 wrote to memory of 228 4512 svchost.exe 94 PID 4512 wrote to memory of 228 4512 svchost.exe 94 PID 4512 wrote to memory of 4124 4512 svchost.exe 95 PID 4512 wrote to memory of 4124 4512 svchost.exe 95 PID 4512 wrote to memory of 464 4512 svchost.exe 96 PID 4512 wrote to memory of 464 4512 svchost.exe 96 PID 4512 wrote to memory of 2264 4512 svchost.exe 97 PID 4512 wrote to memory of 2264 4512 svchost.exe 97 PID 4512 wrote to memory of 1092 4512 svchost.exe 100 PID 4512 wrote to memory of 1092 4512 svchost.exe 100 PID 4512 wrote to memory of 3968 4512 svchost.exe 99 PID 4512 wrote to memory of 3968 4512 svchost.exe 99 PID 4512 wrote to memory of 392 4512 svchost.exe 98 PID 4512 wrote to memory of 392 4512 svchost.exe 98 PID 4512 wrote to memory of 4828 4512 svchost.exe 101 PID 4512 wrote to memory of 4828 4512 svchost.exe 101 PID 4512 wrote to memory of 3644 4512 svchost.exe 102 PID 4512 wrote to memory of 3644 4512 svchost.exe 102 PID 4512 wrote to memory of 3276 4512 svchost.exe 103 PID 4512 wrote to memory of 3276 4512 svchost.exe 103 PID 4512 wrote to memory of 1800 4512 svchost.exe 104 PID 4512 wrote to memory of 1800 4512 svchost.exe 104 PID 4512 wrote to memory of 3120 4512 svchost.exe 105 PID 4512 wrote to memory of 3120 4512 svchost.exe 105 PID 4512 wrote to memory of 3060 4512 svchost.exe 106 PID 4512 wrote to memory of 3060 4512 svchost.exe 106 PID 4512 wrote to memory of 3060 4512 svchost.exe 106 PID 4512 wrote to memory of 3060 4512 svchost.exe 106 PID 4512 wrote to memory of 3060 4512 svchost.exe 106 PID 4512 wrote to memory of 3060 4512 svchost.exe 106 PID 4512 wrote to memory of 3060 4512 svchost.exe 106 PID 4512 wrote to memory of 3060 4512 svchost.exe 106 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe"C:\Users\Admin\AppData\Local\Temp\15e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Checks computer location settings
- Adds Run key to start application
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- Creates scheduled task(s)
PID:1308
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp6B9F.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:3004
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- UAC bypass
- Windows security bypass
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Sets service image path in registry
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4512 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\svchost.exe" -Force4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4312
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"4⤵PID:232
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"4⤵PID:228
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"4⤵PID:4124
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"4⤵PID:464
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"4⤵PID:2264
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"4⤵PID:392
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"4⤵PID:3968
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"4⤵PID:1092
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"4⤵PID:4828
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"4⤵PID:3644
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"4⤵PID:3276
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"4⤵PID:1800
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"4⤵PID:3120
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"4⤵PID:3060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3060 -s 7205⤵
- Program crash
PID:1120
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3060 -ip 30601⤵PID:4540
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
151B
MD5ca9099a7b497d00a43056eae40905d43
SHA19e799f993af412d51c5e1afa7c0c266db558d580
SHA25682ec03255b175f663661d4997fb1ce31edd3e7eb6616c75d285ba11681660d9f
SHA5124f715cb8147379ccd1d369bcf0ed935a2c293bdb720f700df8cd25a687d67fb33a1812d5ee85527775dd4888df6183b3a4342d0ac969a65b568b4d50ec4bb910
-
Filesize
560KB
MD5056deb6ec10027d86888638b8b2247b8
SHA198f36ae500e628dba667be3ec84b8023dfc37206
SHA25615e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821
SHA512af067154ab0c0d6e537967f405da53aa3590229f0759382ba0602299eed7135928d683323c7dd68fb4aa4ab40bba55cc7c0440370cf2d70b2a4f22fc73927712
-
Filesize
560KB
MD5056deb6ec10027d86888638b8b2247b8
SHA198f36ae500e628dba667be3ec84b8023dfc37206
SHA25615e26094676227ed93d5968badafe6f33ac17f77b9e91ef7ef86ee82d5a07821
SHA512af067154ab0c0d6e537967f405da53aa3590229f0759382ba0602299eed7135928d683323c7dd68fb4aa4ab40bba55cc7c0440370cf2d70b2a4f22fc73927712