Analysis
-
max time kernel
279s -
max time network
291s -
platform
windows7_x64 -
resource
win7-20230703-en -
resource tags
arch:x64arch:x86image:win7-20230703-enlocale:en-usos:windows7-x64system -
submitted
07-07-2023 22:09
Static task
static1
Behavioral task
behavioral1
Sample
4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe
Resource
win10-20230703-en
General
-
Target
4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe
-
Size
1.1MB
-
MD5
03d0ae067121c5fc020a2ca5496fc8d3
-
SHA1
75cfb937b7135da6590c8db1601931039b728637
-
SHA256
4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe
-
SHA512
486f28b226cf68fb602f7a81abd74d9f983eb2ffecb4ad6a86033a495ee9090a3c5311cfb45de9f4024282a29f35ccc3b45c5001dafe9bc896e990295ae8adae
-
SSDEEP
12288:WzDmXqzF8qEYMbZB1A37ddj0+GS4fU2tmi+q84FGfYZ4H2Z6rYfT89nT9vwMb44G:WWM+pYr0+AfNorq8xm8jrYUx9qROe1
Malware Config
Extracted
redline
070723_rc_11
amrc.tuktuk.ug:11290
-
auth_value
5c003bb2a44f6538df34879227a9ad34
Extracted
laplas
http://lpls.tuktuk.ug
-
api_key
a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ntlhost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ chrome.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion chrome.exe -
Executes dropped EXE 2 IoCs
pid Process 1668 chrome.exe 2644 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 908 AppLaunch.exe 1668 chrome.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2813141852-3076131560-4232376420-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" chrome.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA chrome.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ntlhost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1668 chrome.exe 2644 ntlhost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2320 set thread context of 908 2320 4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe 30 -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 8 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2320 4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe 908 AppLaunch.exe 908 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2320 4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe Token: SeDebugPrivilege 908 AppLaunch.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2320 wrote to memory of 1936 2320 4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe 29 PID 2320 wrote to memory of 1936 2320 4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe 29 PID 2320 wrote to memory of 1936 2320 4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe 29 PID 2320 wrote to memory of 1936 2320 4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe 29 PID 2320 wrote to memory of 1936 2320 4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe 29 PID 2320 wrote to memory of 1936 2320 4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe 29 PID 2320 wrote to memory of 1936 2320 4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe 29 PID 2320 wrote to memory of 908 2320 4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe 30 PID 2320 wrote to memory of 908 2320 4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe 30 PID 2320 wrote to memory of 908 2320 4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe 30 PID 2320 wrote to memory of 908 2320 4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe 30 PID 2320 wrote to memory of 908 2320 4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe 30 PID 2320 wrote to memory of 908 2320 4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe 30 PID 2320 wrote to memory of 908 2320 4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe 30 PID 2320 wrote to memory of 908 2320 4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe 30 PID 2320 wrote to memory of 908 2320 4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe 30 PID 2320 wrote to memory of 908 2320 4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe 30 PID 2320 wrote to memory of 908 2320 4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe 30 PID 2320 wrote to memory of 908 2320 4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe 30 PID 908 wrote to memory of 1668 908 AppLaunch.exe 32 PID 908 wrote to memory of 1668 908 AppLaunch.exe 32 PID 908 wrote to memory of 1668 908 AppLaunch.exe 32 PID 908 wrote to memory of 1668 908 AppLaunch.exe 32 PID 1668 wrote to memory of 2644 1668 chrome.exe 33 PID 1668 wrote to memory of 2644 1668 chrome.exe 33 PID 1668 wrote to memory of 2644 1668 chrome.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe"C:\Users\Admin\AppData\Local\Temp\4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:1936
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Users\Admin\AppData\Local\Temp\chrome.exe"C:\Users\Admin\AppData\Local\Temp\chrome.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2644
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD571f04aa7d5c3232c7c2b9afad6777b53
SHA1617487d25e1b3c27112c918e54deb744c57e9fa9
SHA2563405a14bdc05e4bca019b1b364393e0d78b94bbd1f2652cb3106631610ee7269
SHA5121068c6162f07e6123c827e3f731047a7caee91dca6a1977a6236f49c6a162cadf6d7e6c0e29baa7a61c70d378ac9356029ce4330a2eab169aa15c03b2b731ffe
-
Filesize
4.1MB
MD571f04aa7d5c3232c7c2b9afad6777b53
SHA1617487d25e1b3c27112c918e54deb744c57e9fa9
SHA2563405a14bdc05e4bca019b1b364393e0d78b94bbd1f2652cb3106631610ee7269
SHA5121068c6162f07e6123c827e3f731047a7caee91dca6a1977a6236f49c6a162cadf6d7e6c0e29baa7a61c70d378ac9356029ce4330a2eab169aa15c03b2b731ffe
-
Filesize
773.1MB
MD5a3e360532c95a3783ef57e962401472b
SHA1ffe7cd68ef5ffa5f3f94793a18bb6856ab0ad876
SHA2567366da52a762cbdd86ce5437b3330e9518c294adb0defb367dff10f22fae041a
SHA512eb98b3a334fd61706b6b802af12c8e6501813bab0a3b545086f5c4d315d66f3c0170890e1ab48a169a0050a4359565f38139c899974fbecf464fd4d37c74ae05
-
Filesize
773.1MB
MD5a3e360532c95a3783ef57e962401472b
SHA1ffe7cd68ef5ffa5f3f94793a18bb6856ab0ad876
SHA2567366da52a762cbdd86ce5437b3330e9518c294adb0defb367dff10f22fae041a
SHA512eb98b3a334fd61706b6b802af12c8e6501813bab0a3b545086f5c4d315d66f3c0170890e1ab48a169a0050a4359565f38139c899974fbecf464fd4d37c74ae05
-
Filesize
4.1MB
MD571f04aa7d5c3232c7c2b9afad6777b53
SHA1617487d25e1b3c27112c918e54deb744c57e9fa9
SHA2563405a14bdc05e4bca019b1b364393e0d78b94bbd1f2652cb3106631610ee7269
SHA5121068c6162f07e6123c827e3f731047a7caee91dca6a1977a6236f49c6a162cadf6d7e6c0e29baa7a61c70d378ac9356029ce4330a2eab169aa15c03b2b731ffe
-
Filesize
773.1MB
MD5a3e360532c95a3783ef57e962401472b
SHA1ffe7cd68ef5ffa5f3f94793a18bb6856ab0ad876
SHA2567366da52a762cbdd86ce5437b3330e9518c294adb0defb367dff10f22fae041a
SHA512eb98b3a334fd61706b6b802af12c8e6501813bab0a3b545086f5c4d315d66f3c0170890e1ab48a169a0050a4359565f38139c899974fbecf464fd4d37c74ae05