Analysis
-
max time kernel
298s -
max time network
260s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
07-07-2023 22:09
Static task
static1
Behavioral task
behavioral1
Sample
4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe
Resource
win10-20230703-en
General
-
Target
4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe
-
Size
1.1MB
-
MD5
03d0ae067121c5fc020a2ca5496fc8d3
-
SHA1
75cfb937b7135da6590c8db1601931039b728637
-
SHA256
4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe
-
SHA512
486f28b226cf68fb602f7a81abd74d9f983eb2ffecb4ad6a86033a495ee9090a3c5311cfb45de9f4024282a29f35ccc3b45c5001dafe9bc896e990295ae8adae
-
SSDEEP
12288:WzDmXqzF8qEYMbZB1A37ddj0+GS4fU2tmi+q84FGfYZ4H2Z6rYfT89nT9vwMb44G:WWM+pYr0+AfNorq8xm8jrYUx9qROe1
Malware Config
Extracted
redline
070723_rc_11
amrc.tuktuk.ug:11290
-
auth_value
5c003bb2a44f6538df34879227a9ad34
Extracted
laplas
http://lpls.tuktuk.ug
-
api_key
a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ntlhost.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ntlhost.exe -
Executes dropped EXE 2 IoCs
pid Process 5012 chrome.exe 3840 ntlhost.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2393848421-2120571652-2495149697-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" chrome.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA chrome.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ntlhost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 5012 chrome.exe 3840 ntlhost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4692 set thread context of 1480 4692 4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe 70 -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 8 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1480 AppLaunch.exe 1480 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4692 4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe Token: SeDebugPrivilege 1480 AppLaunch.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4692 wrote to memory of 1480 4692 4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe 70 PID 4692 wrote to memory of 1480 4692 4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe 70 PID 4692 wrote to memory of 1480 4692 4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe 70 PID 4692 wrote to memory of 1480 4692 4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe 70 PID 4692 wrote to memory of 1480 4692 4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe 70 PID 4692 wrote to memory of 1480 4692 4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe 70 PID 4692 wrote to memory of 1480 4692 4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe 70 PID 4692 wrote to memory of 1480 4692 4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe 70 PID 1480 wrote to memory of 5012 1480 AppLaunch.exe 72 PID 1480 wrote to memory of 5012 1480 AppLaunch.exe 72 PID 5012 wrote to memory of 3840 5012 chrome.exe 73 PID 5012 wrote to memory of 3840 5012 chrome.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe"C:\Users\Admin\AppData\Local\Temp\4fea427b2873969bc8b5dc51aa5fccd37bd4a517cff435072fb19e54921317fe.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\chrome.exe"C:\Users\Admin\AppData\Local\Temp\chrome.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3840
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD571f04aa7d5c3232c7c2b9afad6777b53
SHA1617487d25e1b3c27112c918e54deb744c57e9fa9
SHA2563405a14bdc05e4bca019b1b364393e0d78b94bbd1f2652cb3106631610ee7269
SHA5121068c6162f07e6123c827e3f731047a7caee91dca6a1977a6236f49c6a162cadf6d7e6c0e29baa7a61c70d378ac9356029ce4330a2eab169aa15c03b2b731ffe
-
Filesize
4.1MB
MD571f04aa7d5c3232c7c2b9afad6777b53
SHA1617487d25e1b3c27112c918e54deb744c57e9fa9
SHA2563405a14bdc05e4bca019b1b364393e0d78b94bbd1f2652cb3106631610ee7269
SHA5121068c6162f07e6123c827e3f731047a7caee91dca6a1977a6236f49c6a162cadf6d7e6c0e29baa7a61c70d378ac9356029ce4330a2eab169aa15c03b2b731ffe
-
Filesize
708.1MB
MD5a1c2c60a8ac54c2c759c1dbd5dd5e834
SHA1863268689f4b8f189f89de9fc26862d5803e5a99
SHA256f54f67ac62749ada494de635e075178355de3e40e1d3449f0d1d1b71b4c30066
SHA51233cc68b5325cf9092a9f147305d18a1f58062ffff02839bd4fe17c8a46100bb9475056429b462b87f10216bf428dc82e18d913ae0fe6e9c06a3fb94f65fa5473
-
Filesize
708.1MB
MD5a1c2c60a8ac54c2c759c1dbd5dd5e834
SHA1863268689f4b8f189f89de9fc26862d5803e5a99
SHA256f54f67ac62749ada494de635e075178355de3e40e1d3449f0d1d1b71b4c30066
SHA51233cc68b5325cf9092a9f147305d18a1f58062ffff02839bd4fe17c8a46100bb9475056429b462b87f10216bf428dc82e18d913ae0fe6e9c06a3fb94f65fa5473
-
Filesize
708.1MB
MD5a1c2c60a8ac54c2c759c1dbd5dd5e834
SHA1863268689f4b8f189f89de9fc26862d5803e5a99
SHA256f54f67ac62749ada494de635e075178355de3e40e1d3449f0d1d1b71b4c30066
SHA51233cc68b5325cf9092a9f147305d18a1f58062ffff02839bd4fe17c8a46100bb9475056429b462b87f10216bf428dc82e18d913ae0fe6e9c06a3fb94f65fa5473