Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-06-2023 02:42

General

  • Target

    file.exe

  • Size

    1000KB

  • MD5

    83ef65a424e1baf1d7b861acec54ecb4

  • SHA1

    9273c6cd941d801626ac0f35ae687cab0055e208

  • SHA256

    199c2d8e24c0cc919d0400773938ed3cca76860e7be93b5d1f2f8ee12004a5f7

  • SHA512

    55b9478928ca32d400eab67aec7c1c337a47d188a04fa89c989fc35e5ba107776e29b1d03bceed6ffd193515e6f84430b1256c1b2476799858038df6ca6d4085

  • SSDEEP

    12288:xCAtA8KIiEVqjmG09laoIqLtTmAGiDd4CT7s6Z46E2W0aBjbaxZAj0VQTj7nO62z:htAIi0/9EoTJmIDKgWWa5axZfVQTl

Malware Config

Extracted

Family

redline

Botnet

top

C2

83.97.73.124:53

Attributes
  • auth_value

    053e5ccc53982413753b68419138b23a

Extracted

Family

redline

Botnet

Lyla1906

C2

94.130.176.65:13400

Attributes
  • auth_value

    5c6d9077ba684b0add99731765896e7e

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 4 IoCs
  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Unexpected DNS network traffic destination 17 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 38 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:748
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
        PID:3816
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:792
        • C:\Users\Admin\AppData\Local\Temp\9AP7AL6FMFM5NPI.exe
          "C:\Users\Admin\AppData\Local\Temp\9AP7AL6FMFM5NPI.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4720
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1568
        • C:\Users\Admin\AppData\Local\Temp\P38BE87EJO20F1O.exe
          "C:\Users\Admin\AppData\Local\Temp\P38BE87EJO20F1O.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1952
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3636
        • C:\Users\Admin\AppData\Local\Temp\DE9F1DPM6O9MO3D.exe
          "C:\Users\Admin\AppData\Local\Temp\DE9F1DPM6O9MO3D.exe"
          3⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Executes dropped EXE
          • Adds Run key to start application
          • Checks whether UAC is enabled
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3760
        • C:\Users\Admin\AppData\Local\Temp\6C4A51J1LQIHOBP.exe
          https://iplogger.com/12qaJ4
          3⤵
          • Executes dropped EXE
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:4760

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Virtualization/Sandbox Evasion

    1
    T1497

    Modify Registry

    2
    T1112

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    Query Registry

    2
    T1012

    Virtualization/Sandbox Evasion

    1
    T1497

    System Information Discovery

    3
    T1082

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\6C4A51J1LQIHOBP.exe
      Filesize

      8KB

      MD5

      8719ce641e7c777ac1b0eaec7b5fa7c7

      SHA1

      c04de52cb511480cc7d00d67f1d9e17b02d6406b

      SHA256

      6283ac6ecbf4c4038cf44896dd221c7c11152bac77273709330409032c3e72ea

      SHA512

      7be5bd6d2342dd02818f1979e7e74a6376658711ac82a59b2af1a67207cfd3c7416b657af01216473b15132e4aa5c6675f0eb8ee6343192c7dfc4a5249ccaa97

    • C:\Users\Admin\AppData\Local\Temp\6C4A51J1LQIHOBP.exe
      Filesize

      8KB

      MD5

      8719ce641e7c777ac1b0eaec7b5fa7c7

      SHA1

      c04de52cb511480cc7d00d67f1d9e17b02d6406b

      SHA256

      6283ac6ecbf4c4038cf44896dd221c7c11152bac77273709330409032c3e72ea

      SHA512

      7be5bd6d2342dd02818f1979e7e74a6376658711ac82a59b2af1a67207cfd3c7416b657af01216473b15132e4aa5c6675f0eb8ee6343192c7dfc4a5249ccaa97

    • C:\Users\Admin\AppData\Local\Temp\9AP7AL6FMFM5NPI.exe
      Filesize

      602KB

      MD5

      3f8f5177e8907b126f2575b67aea9db1

      SHA1

      30ac43a9c6dd799441519db56a14bf1a0e2b5bab

      SHA256

      712bd451f71fe3a5a3ad3b2d0965b0dd872c5348f8338af96c222add990a5326

      SHA512

      1537bb2ad49921ee5ef54ca940485d1ae9a4ec7308c77f938a47ce7451ce2e8e0638bf73511c092acfb0b1277a2c91ff202278b582d2b5319fa647b7e988f398

    • C:\Users\Admin\AppData\Local\Temp\9AP7AL6FMFM5NPI.exe
      Filesize

      602KB

      MD5

      3f8f5177e8907b126f2575b67aea9db1

      SHA1

      30ac43a9c6dd799441519db56a14bf1a0e2b5bab

      SHA256

      712bd451f71fe3a5a3ad3b2d0965b0dd872c5348f8338af96c222add990a5326

      SHA512

      1537bb2ad49921ee5ef54ca940485d1ae9a4ec7308c77f938a47ce7451ce2e8e0638bf73511c092acfb0b1277a2c91ff202278b582d2b5319fa647b7e988f398

    • C:\Users\Admin\AppData\Local\Temp\DE9F1DPM6O9MO3D.exe
      Filesize

      2.5MB

      MD5

      6375b46cec76be55885593736cd40270

      SHA1

      32f7c3c53ab7403ae7e8488f6b93e2fdda39f9ba

      SHA256

      933722fac65bb4de9beeab946469fb6ba42c187a2ada644f781098320b6770b4

      SHA512

      a2a659f3dbcb085037ec1363bc96b2787cdea2929d47075dd2aba1e87e8f1c246ce01dadb24b503dc121864ecaac2f92d18602e0352c434a49c8bdb49f11ccd6

    • C:\Users\Admin\AppData\Local\Temp\DE9F1DPM6O9MO3D.exe
      Filesize

      2.5MB

      MD5

      6375b46cec76be55885593736cd40270

      SHA1

      32f7c3c53ab7403ae7e8488f6b93e2fdda39f9ba

      SHA256

      933722fac65bb4de9beeab946469fb6ba42c187a2ada644f781098320b6770b4

      SHA512

      a2a659f3dbcb085037ec1363bc96b2787cdea2929d47075dd2aba1e87e8f1c246ce01dadb24b503dc121864ecaac2f92d18602e0352c434a49c8bdb49f11ccd6

    • C:\Users\Admin\AppData\Local\Temp\P38BE87EJO20F1O.exe
      Filesize

      556KB

      MD5

      2d1dffc690133c02a27ac0e2d7c03039

      SHA1

      55424f59ddc9483a15754b92594fc29bdf8736f3

      SHA256

      c5e338b789ded9449a7f28c6e8aabc8420354b0b1b9cbdc9e9a32ea05823d693

      SHA512

      8a79688ab592961bd8e31848c485c4009dcdd7902968ef41fa9b18602a368428aa97a39daf5ad48e2aa6078e31422d7296e142dccbd846f8986013d2f1828a55

    • C:\Users\Admin\AppData\Local\Temp\P38BE87EJO20F1O.exe
      Filesize

      556KB

      MD5

      2d1dffc690133c02a27ac0e2d7c03039

      SHA1

      55424f59ddc9483a15754b92594fc29bdf8736f3

      SHA256

      c5e338b789ded9449a7f28c6e8aabc8420354b0b1b9cbdc9e9a32ea05823d693

      SHA512

      8a79688ab592961bd8e31848c485c4009dcdd7902968ef41fa9b18602a368428aa97a39daf5ad48e2aa6078e31422d7296e142dccbd846f8986013d2f1828a55

    • memory/748-143-0x0000000005630000-0x0000000005645000-memory.dmp
      Filesize

      84KB

    • memory/748-141-0x0000000005630000-0x0000000005645000-memory.dmp
      Filesize

      84KB

    • memory/748-149-0x0000000005630000-0x0000000005645000-memory.dmp
      Filesize

      84KB

    • memory/748-151-0x0000000005630000-0x0000000005645000-memory.dmp
      Filesize

      84KB

    • memory/748-153-0x0000000005630000-0x0000000005645000-memory.dmp
      Filesize

      84KB

    • memory/748-155-0x0000000005630000-0x0000000005645000-memory.dmp
      Filesize

      84KB

    • memory/748-157-0x0000000005630000-0x0000000005645000-memory.dmp
      Filesize

      84KB

    • memory/748-159-0x0000000005630000-0x0000000005645000-memory.dmp
      Filesize

      84KB

    • memory/748-134-0x0000000005660000-0x00000000056FC000-memory.dmp
      Filesize

      624KB

    • memory/748-135-0x0000000005630000-0x0000000005645000-memory.dmp
      Filesize

      84KB

    • memory/748-136-0x0000000005630000-0x0000000005645000-memory.dmp
      Filesize

      84KB

    • memory/748-138-0x0000000005630000-0x0000000005645000-memory.dmp
      Filesize

      84KB

    • memory/748-145-0x0000000005630000-0x0000000005645000-memory.dmp
      Filesize

      84KB

    • memory/748-147-0x0000000005630000-0x0000000005645000-memory.dmp
      Filesize

      84KB

    • memory/748-133-0x0000000000C00000-0x0000000000D00000-memory.dmp
      Filesize

      1024KB

    • memory/748-139-0x0000000005860000-0x0000000005870000-memory.dmp
      Filesize

      64KB

    • memory/792-193-0x0000000000400000-0x0000000000492000-memory.dmp
      Filesize

      584KB

    • memory/792-164-0x0000000000400000-0x0000000000492000-memory.dmp
      Filesize

      584KB

    • memory/792-163-0x0000000000400000-0x0000000000492000-memory.dmp
      Filesize

      584KB

    • memory/792-201-0x0000000000400000-0x0000000000492000-memory.dmp
      Filesize

      584KB

    • memory/792-162-0x0000000000400000-0x0000000000492000-memory.dmp
      Filesize

      584KB

    • memory/792-160-0x0000000000400000-0x0000000000492000-memory.dmp
      Filesize

      584KB

    • memory/1568-244-0x0000000005880000-0x0000000005892000-memory.dmp
      Filesize

      72KB

    • memory/1568-247-0x0000000005910000-0x000000000594C000-memory.dmp
      Filesize

      240KB

    • memory/1568-239-0x00000000059E0000-0x0000000005AEA000-memory.dmp
      Filesize

      1.0MB

    • memory/1568-237-0x0000000005EF0000-0x0000000006508000-memory.dmp
      Filesize

      6.1MB

    • memory/1568-228-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1952-174-0x00000000003E0000-0x0000000000470000-memory.dmp
      Filesize

      576KB

    • memory/1952-245-0x0000000004E40000-0x0000000004E50000-memory.dmp
      Filesize

      64KB

    • memory/3636-275-0x0000000005390000-0x00000000053F6000-memory.dmp
      Filesize

      408KB

    • memory/3636-273-0x0000000000400000-0x0000000000426000-memory.dmp
      Filesize

      152KB

    • memory/3636-283-0x0000000006D10000-0x0000000006D60000-memory.dmp
      Filesize

      320KB

    • memory/3636-280-0x00000000061B0000-0x00000000061CE000-memory.dmp
      Filesize

      120KB

    • memory/3636-279-0x0000000007040000-0x000000000756C000-memory.dmp
      Filesize

      5.2MB

    • memory/3636-278-0x00000000062A0000-0x0000000006462000-memory.dmp
      Filesize

      1.8MB

    • memory/3636-277-0x0000000006050000-0x00000000060C6000-memory.dmp
      Filesize

      472KB

    • memory/3636-274-0x0000000005050000-0x0000000005060000-memory.dmp
      Filesize

      64KB

    • memory/3760-180-0x0000000000F10000-0x000000000158C000-memory.dmp
      Filesize

      6.5MB

    • memory/3760-187-0x00000000061A0000-0x0000000006744000-memory.dmp
      Filesize

      5.6MB

    • memory/3760-192-0x0000000005E90000-0x0000000005E9A000-memory.dmp
      Filesize

      40KB

    • memory/3760-282-0x00000000053A0000-0x00000000053B0000-memory.dmp
      Filesize

      64KB

    • memory/3760-190-0x0000000005CF0000-0x0000000005D82000-memory.dmp
      Filesize

      584KB

    • memory/3760-185-0x00000000053A0000-0x00000000053B0000-memory.dmp
      Filesize

      64KB

    • memory/3760-281-0x0000000000F10000-0x000000000158C000-memory.dmp
      Filesize

      6.5MB

    • memory/3760-179-0x0000000000F10000-0x000000000158C000-memory.dmp
      Filesize

      6.5MB

    • memory/4720-169-0x00000000009A0000-0x0000000000A3C000-memory.dmp
      Filesize

      624KB

    • memory/4760-202-0x000002D0819C0000-0x000002D0819C6000-memory.dmp
      Filesize

      24KB

    • memory/4760-235-0x000002D083650000-0x000002D083660000-memory.dmp
      Filesize

      64KB

    • memory/4760-236-0x000002D083650000-0x000002D083660000-memory.dmp
      Filesize

      64KB

    • memory/4760-238-0x000002D89E560000-0x000002D89ED06000-memory.dmp
      Filesize

      7.6MB

    • memory/4760-243-0x000002D083650000-0x000002D083660000-memory.dmp
      Filesize

      64KB

    • memory/4760-203-0x000002D083650000-0x000002D083660000-memory.dmp
      Filesize

      64KB