Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    21-06-2023 02:42

General

  • Target

    file.exe

  • Size

    1000KB

  • MD5

    83ef65a424e1baf1d7b861acec54ecb4

  • SHA1

    9273c6cd941d801626ac0f35ae687cab0055e208

  • SHA256

    199c2d8e24c0cc919d0400773938ed3cca76860e7be93b5d1f2f8ee12004a5f7

  • SHA512

    55b9478928ca32d400eab67aec7c1c337a47d188a04fa89c989fc35e5ba107776e29b1d03bceed6ffd193515e6f84430b1256c1b2476799858038df6ca6d4085

  • SSDEEP

    12288:xCAtA8KIiEVqjmG09laoIqLtTmAGiDd4CT7s6Z46E2W0aBjbaxZAj0VQTj7nO62z:htAIi0/9EoTJmIDKgWWa5axZfVQTl

Malware Config

Extracted

Family

redline

Botnet

top

C2

83.97.73.124:53

Attributes
  • auth_value

    053e5ccc53982413753b68419138b23a

Extracted

Family

redline

Botnet

Lyla1906

C2

94.130.176.65:13400

Attributes
  • auth_value

    5c6d9077ba684b0add99731765896e7e

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 6 IoCs
  • Themida packer 5 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Unexpected DNS network traffic destination 12 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
        PID:1176
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1968
        • C:\Users\Admin\AppData\Local\Temp\JJA8BCLP3PGLE7K.exe
          "C:\Users\Admin\AppData\Local\Temp\JJA8BCLP3PGLE7K.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:876
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            4⤵
              PID:1768
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1588
          • C:\Users\Admin\AppData\Local\Temp\L8CC4GNPA2M728I.exe
            "C:\Users\Admin\AppData\Local\Temp\L8CC4GNPA2M728I.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1100
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
              4⤵
                PID:1348
              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                4⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1644
            • C:\Users\Admin\AppData\Local\Temp\6E308AF8H7IKH9Q.exe
              "C:\Users\Admin\AppData\Local\Temp\6E308AF8H7IKH9Q.exe"
              3⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Adds Run key to start application
              • Checks whether UAC is enabled
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:992
            • C:\Users\Admin\AppData\Local\Temp\L16C8J1II1I0AOF.exe
              https://iplogger.com/12qaJ4
              3⤵
              • Executes dropped EXE
              • Modifies Internet Explorer settings
              • Suspicious use of SetWindowsHookEx
              PID:1496

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Defense Evasion

        Virtualization/Sandbox Evasion

        1
        T1497

        Modify Registry

        2
        T1112

        Credential Access

        Credentials in Files

        1
        T1081

        Discovery

        Query Registry

        2
        T1012

        Virtualization/Sandbox Evasion

        1
        T1497

        System Information Discovery

        2
        T1082

        Collection

        Data from Local System

        1
        T1005

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\6E308AF8H7IKH9Q.exe
          Filesize

          2.5MB

          MD5

          6375b46cec76be55885593736cd40270

          SHA1

          32f7c3c53ab7403ae7e8488f6b93e2fdda39f9ba

          SHA256

          933722fac65bb4de9beeab946469fb6ba42c187a2ada644f781098320b6770b4

          SHA512

          a2a659f3dbcb085037ec1363bc96b2787cdea2929d47075dd2aba1e87e8f1c246ce01dadb24b503dc121864ecaac2f92d18602e0352c434a49c8bdb49f11ccd6

        • C:\Users\Admin\AppData\Local\Temp\6E308AF8H7IKH9Q.exe
          Filesize

          2.5MB

          MD5

          6375b46cec76be55885593736cd40270

          SHA1

          32f7c3c53ab7403ae7e8488f6b93e2fdda39f9ba

          SHA256

          933722fac65bb4de9beeab946469fb6ba42c187a2ada644f781098320b6770b4

          SHA512

          a2a659f3dbcb085037ec1363bc96b2787cdea2929d47075dd2aba1e87e8f1c246ce01dadb24b503dc121864ecaac2f92d18602e0352c434a49c8bdb49f11ccd6

        • C:\Users\Admin\AppData\Local\Temp\JJA8BCLP3PGLE7K.exe
          Filesize

          602KB

          MD5

          3f8f5177e8907b126f2575b67aea9db1

          SHA1

          30ac43a9c6dd799441519db56a14bf1a0e2b5bab

          SHA256

          712bd451f71fe3a5a3ad3b2d0965b0dd872c5348f8338af96c222add990a5326

          SHA512

          1537bb2ad49921ee5ef54ca940485d1ae9a4ec7308c77f938a47ce7451ce2e8e0638bf73511c092acfb0b1277a2c91ff202278b582d2b5319fa647b7e988f398

        • C:\Users\Admin\AppData\Local\Temp\JJA8BCLP3PGLE7K.exe
          Filesize

          602KB

          MD5

          3f8f5177e8907b126f2575b67aea9db1

          SHA1

          30ac43a9c6dd799441519db56a14bf1a0e2b5bab

          SHA256

          712bd451f71fe3a5a3ad3b2d0965b0dd872c5348f8338af96c222add990a5326

          SHA512

          1537bb2ad49921ee5ef54ca940485d1ae9a4ec7308c77f938a47ce7451ce2e8e0638bf73511c092acfb0b1277a2c91ff202278b582d2b5319fa647b7e988f398

        • C:\Users\Admin\AppData\Local\Temp\JJA8BCLP3PGLE7K.exe
          Filesize

          602KB

          MD5

          3f8f5177e8907b126f2575b67aea9db1

          SHA1

          30ac43a9c6dd799441519db56a14bf1a0e2b5bab

          SHA256

          712bd451f71fe3a5a3ad3b2d0965b0dd872c5348f8338af96c222add990a5326

          SHA512

          1537bb2ad49921ee5ef54ca940485d1ae9a4ec7308c77f938a47ce7451ce2e8e0638bf73511c092acfb0b1277a2c91ff202278b582d2b5319fa647b7e988f398

        • C:\Users\Admin\AppData\Local\Temp\L16C8J1II1I0AOF.exe
          Filesize

          8KB

          MD5

          8719ce641e7c777ac1b0eaec7b5fa7c7

          SHA1

          c04de52cb511480cc7d00d67f1d9e17b02d6406b

          SHA256

          6283ac6ecbf4c4038cf44896dd221c7c11152bac77273709330409032c3e72ea

          SHA512

          7be5bd6d2342dd02818f1979e7e74a6376658711ac82a59b2af1a67207cfd3c7416b657af01216473b15132e4aa5c6675f0eb8ee6343192c7dfc4a5249ccaa97

        • C:\Users\Admin\AppData\Local\Temp\L16C8J1II1I0AOF.exe
          Filesize

          8KB

          MD5

          8719ce641e7c777ac1b0eaec7b5fa7c7

          SHA1

          c04de52cb511480cc7d00d67f1d9e17b02d6406b

          SHA256

          6283ac6ecbf4c4038cf44896dd221c7c11152bac77273709330409032c3e72ea

          SHA512

          7be5bd6d2342dd02818f1979e7e74a6376658711ac82a59b2af1a67207cfd3c7416b657af01216473b15132e4aa5c6675f0eb8ee6343192c7dfc4a5249ccaa97

        • C:\Users\Admin\AppData\Local\Temp\L8CC4GNPA2M728I.exe
          Filesize

          556KB

          MD5

          2d1dffc690133c02a27ac0e2d7c03039

          SHA1

          55424f59ddc9483a15754b92594fc29bdf8736f3

          SHA256

          c5e338b789ded9449a7f28c6e8aabc8420354b0b1b9cbdc9e9a32ea05823d693

          SHA512

          8a79688ab592961bd8e31848c485c4009dcdd7902968ef41fa9b18602a368428aa97a39daf5ad48e2aa6078e31422d7296e142dccbd846f8986013d2f1828a55

        • C:\Users\Admin\AppData\Local\Temp\L8CC4GNPA2M728I.exe
          Filesize

          556KB

          MD5

          2d1dffc690133c02a27ac0e2d7c03039

          SHA1

          55424f59ddc9483a15754b92594fc29bdf8736f3

          SHA256

          c5e338b789ded9449a7f28c6e8aabc8420354b0b1b9cbdc9e9a32ea05823d693

          SHA512

          8a79688ab592961bd8e31848c485c4009dcdd7902968ef41fa9b18602a368428aa97a39daf5ad48e2aa6078e31422d7296e142dccbd846f8986013d2f1828a55

        • C:\Users\Admin\AppData\Local\Temp\L8CC4GNPA2M728I.exe
          Filesize

          556KB

          MD5

          2d1dffc690133c02a27ac0e2d7c03039

          SHA1

          55424f59ddc9483a15754b92594fc29bdf8736f3

          SHA256

          c5e338b789ded9449a7f28c6e8aabc8420354b0b1b9cbdc9e9a32ea05823d693

          SHA512

          8a79688ab592961bd8e31848c485c4009dcdd7902968ef41fa9b18602a368428aa97a39daf5ad48e2aa6078e31422d7296e142dccbd846f8986013d2f1828a55

        • \Users\Admin\AppData\Local\Temp\6E308AF8H7IKH9Q.exe
          Filesize

          2.5MB

          MD5

          6375b46cec76be55885593736cd40270

          SHA1

          32f7c3c53ab7403ae7e8488f6b93e2fdda39f9ba

          SHA256

          933722fac65bb4de9beeab946469fb6ba42c187a2ada644f781098320b6770b4

          SHA512

          a2a659f3dbcb085037ec1363bc96b2787cdea2929d47075dd2aba1e87e8f1c246ce01dadb24b503dc121864ecaac2f92d18602e0352c434a49c8bdb49f11ccd6

        • \Users\Admin\AppData\Local\Temp\JJA8BCLP3PGLE7K.exe
          Filesize

          602KB

          MD5

          3f8f5177e8907b126f2575b67aea9db1

          SHA1

          30ac43a9c6dd799441519db56a14bf1a0e2b5bab

          SHA256

          712bd451f71fe3a5a3ad3b2d0965b0dd872c5348f8338af96c222add990a5326

          SHA512

          1537bb2ad49921ee5ef54ca940485d1ae9a4ec7308c77f938a47ce7451ce2e8e0638bf73511c092acfb0b1277a2c91ff202278b582d2b5319fa647b7e988f398

        • \Users\Admin\AppData\Local\Temp\JJA8BCLP3PGLE7K.exe
          Filesize

          602KB

          MD5

          3f8f5177e8907b126f2575b67aea9db1

          SHA1

          30ac43a9c6dd799441519db56a14bf1a0e2b5bab

          SHA256

          712bd451f71fe3a5a3ad3b2d0965b0dd872c5348f8338af96c222add990a5326

          SHA512

          1537bb2ad49921ee5ef54ca940485d1ae9a4ec7308c77f938a47ce7451ce2e8e0638bf73511c092acfb0b1277a2c91ff202278b582d2b5319fa647b7e988f398

        • \Users\Admin\AppData\Local\Temp\L16C8J1II1I0AOF.exe
          Filesize

          8KB

          MD5

          8719ce641e7c777ac1b0eaec7b5fa7c7

          SHA1

          c04de52cb511480cc7d00d67f1d9e17b02d6406b

          SHA256

          6283ac6ecbf4c4038cf44896dd221c7c11152bac77273709330409032c3e72ea

          SHA512

          7be5bd6d2342dd02818f1979e7e74a6376658711ac82a59b2af1a67207cfd3c7416b657af01216473b15132e4aa5c6675f0eb8ee6343192c7dfc4a5249ccaa97

        • \Users\Admin\AppData\Local\Temp\L8CC4GNPA2M728I.exe
          Filesize

          556KB

          MD5

          2d1dffc690133c02a27ac0e2d7c03039

          SHA1

          55424f59ddc9483a15754b92594fc29bdf8736f3

          SHA256

          c5e338b789ded9449a7f28c6e8aabc8420354b0b1b9cbdc9e9a32ea05823d693

          SHA512

          8a79688ab592961bd8e31848c485c4009dcdd7902968ef41fa9b18602a368428aa97a39daf5ad48e2aa6078e31422d7296e142dccbd846f8986013d2f1828a55

        • \Users\Admin\AppData\Local\Temp\L8CC4GNPA2M728I.exe
          Filesize

          556KB

          MD5

          2d1dffc690133c02a27ac0e2d7c03039

          SHA1

          55424f59ddc9483a15754b92594fc29bdf8736f3

          SHA256

          c5e338b789ded9449a7f28c6e8aabc8420354b0b1b9cbdc9e9a32ea05823d693

          SHA512

          8a79688ab592961bd8e31848c485c4009dcdd7902968ef41fa9b18602a368428aa97a39daf5ad48e2aa6078e31422d7296e142dccbd846f8986013d2f1828a55

        • memory/876-101-0x0000000000380000-0x000000000041C000-memory.dmp
          Filesize

          624KB

        • memory/992-121-0x0000000000CB0000-0x000000000132C000-memory.dmp
          Filesize

          6.5MB

        • memory/992-224-0x0000000000CB0000-0x000000000132C000-memory.dmp
          Filesize

          6.5MB

        • memory/992-124-0x00000000052A0000-0x00000000052E0000-memory.dmp
          Filesize

          256KB

        • memory/992-232-0x00000000052A0000-0x00000000052E0000-memory.dmp
          Filesize

          256KB

        • memory/992-118-0x0000000000CB0000-0x000000000132C000-memory.dmp
          Filesize

          6.5MB

        • memory/1100-111-0x00000000000E0000-0x0000000000170000-memory.dmp
          Filesize

          576KB

        • memory/1100-198-0x0000000004BD0000-0x0000000004C10000-memory.dmp
          Filesize

          256KB

        • memory/1100-199-0x00000000002B0000-0x00000000002B1000-memory.dmp
          Filesize

          4KB

        • memory/1496-212-0x000000001BE60000-0x000000001BEE0000-memory.dmp
          Filesize

          512KB

        • memory/1496-215-0x000000001BE60000-0x000000001BEE0000-memory.dmp
          Filesize

          512KB

        • memory/1496-216-0x000000001BE60000-0x000000001BEE0000-memory.dmp
          Filesize

          512KB

        • memory/1496-217-0x000000001BE60000-0x000000001BEE0000-memory.dmp
          Filesize

          512KB

        • memory/1496-214-0x000000001BE60000-0x000000001BEE0000-memory.dmp
          Filesize

          512KB

        • memory/1496-231-0x0000000025580000-0x0000000025D26000-memory.dmp
          Filesize

          7.6MB

        • memory/1496-173-0x000000013FE00000-0x000000013FE06000-memory.dmp
          Filesize

          24KB

        • memory/1588-166-0x0000000000520000-0x0000000000560000-memory.dmp
          Filesize

          256KB

        • memory/1588-151-0x0000000000400000-0x0000000000430000-memory.dmp
          Filesize

          192KB

        • memory/1588-234-0x0000000000520000-0x0000000000560000-memory.dmp
          Filesize

          256KB

        • memory/1588-162-0x00000000003C0000-0x00000000003C6000-memory.dmp
          Filesize

          24KB

        • memory/1588-161-0x0000000000400000-0x0000000000430000-memory.dmp
          Filesize

          192KB

        • memory/1588-156-0x0000000000400000-0x0000000000430000-memory.dmp
          Filesize

          192KB

        • memory/1588-154-0x0000000000400000-0x0000000000430000-memory.dmp
          Filesize

          192KB

        • memory/1588-153-0x0000000000400000-0x0000000000430000-memory.dmp
          Filesize

          192KB

        • memory/1588-152-0x0000000000400000-0x0000000000430000-memory.dmp
          Filesize

          192KB

        • memory/1644-211-0x00000000004F0000-0x0000000000530000-memory.dmp
          Filesize

          256KB

        • memory/1644-210-0x0000000000400000-0x0000000000426000-memory.dmp
          Filesize

          152KB

        • memory/1968-82-0x0000000000400000-0x0000000000492000-memory.dmp
          Filesize

          584KB

        • memory/1968-171-0x0000000000400000-0x0000000000492000-memory.dmp
          Filesize

          584KB

        • memory/1968-91-0x0000000000400000-0x0000000000492000-memory.dmp
          Filesize

          584KB

        • memory/1968-81-0x0000000000400000-0x0000000000492000-memory.dmp
          Filesize

          584KB

        • memory/1968-83-0x0000000000400000-0x0000000000492000-memory.dmp
          Filesize

          584KB

        • memory/1968-84-0x0000000000400000-0x0000000000492000-memory.dmp
          Filesize

          584KB

        • memory/1968-85-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
          Filesize

          4KB

        • memory/1968-86-0x0000000000400000-0x0000000000492000-memory.dmp
          Filesize

          584KB

        • memory/1968-165-0x0000000000400000-0x0000000000492000-memory.dmp
          Filesize

          584KB

        • memory/1968-90-0x0000000000400000-0x0000000000492000-memory.dmp
          Filesize

          584KB

        • memory/1968-80-0x0000000000400000-0x0000000000492000-memory.dmp
          Filesize

          584KB

        • memory/2004-88-0x0000000000AA0000-0x0000000000AA1000-memory.dmp
          Filesize

          4KB

        • memory/2004-71-0x0000000000910000-0x0000000000925000-memory.dmp
          Filesize

          84KB

        • memory/2004-75-0x0000000000910000-0x0000000000925000-memory.dmp
          Filesize

          84KB

        • memory/2004-77-0x0000000000910000-0x0000000000925000-memory.dmp
          Filesize

          84KB

        • memory/2004-65-0x0000000000910000-0x0000000000925000-memory.dmp
          Filesize

          84KB

        • memory/2004-69-0x0000000000910000-0x0000000000925000-memory.dmp
          Filesize

          84KB

        • memory/2004-87-0x0000000000DE0000-0x0000000000E20000-memory.dmp
          Filesize

          256KB

        • memory/2004-63-0x0000000000910000-0x0000000000925000-memory.dmp
          Filesize

          84KB

        • memory/2004-73-0x0000000000910000-0x0000000000925000-memory.dmp
          Filesize

          84KB

        • memory/2004-79-0x0000000000910000-0x0000000000925000-memory.dmp
          Filesize

          84KB

        • memory/2004-67-0x0000000000910000-0x0000000000925000-memory.dmp
          Filesize

          84KB

        • memory/2004-61-0x0000000000910000-0x0000000000925000-memory.dmp
          Filesize

          84KB

        • memory/2004-59-0x0000000000910000-0x0000000000925000-memory.dmp
          Filesize

          84KB

        • memory/2004-57-0x0000000000910000-0x0000000000925000-memory.dmp
          Filesize

          84KB

        • memory/2004-56-0x0000000000910000-0x0000000000925000-memory.dmp
          Filesize

          84KB

        • memory/2004-55-0x0000000000910000-0x000000000092C000-memory.dmp
          Filesize

          112KB

        • memory/2004-54-0x0000000001210000-0x0000000001310000-memory.dmp
          Filesize

          1024KB