Analysis
-
max time kernel
299s -
max time network
259s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
09-07-2023 23:59
Behavioral task
behavioral1
Sample
46ef6daecec030061841713f7afb387a0a7ce913e2a5d63bc46126628daf19e1.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
46ef6daecec030061841713f7afb387a0a7ce913e2a5d63bc46126628daf19e1.exe
Resource
win10-20230703-en
General
-
Target
46ef6daecec030061841713f7afb387a0a7ce913e2a5d63bc46126628daf19e1.exe
-
Size
2.6MB
-
MD5
65482e3a11dff25a26f8b9667999ae5f
-
SHA1
967455baa933e5122008db83ebf0f0be29d8afa1
-
SHA256
46ef6daecec030061841713f7afb387a0a7ce913e2a5d63bc46126628daf19e1
-
SHA512
d4475480c623ddf2a648977af78548470a56e115990018fc91b354b939949a36f7dd84822d4dee54c3a9df690b4d70deef43eb55420f38fe9186a9d26fd1c6b3
-
SSDEEP
49152:DLZTeIJtQrmRw7mGRPsIbGHH04cmjloa2TouNMjTuyRQeWhKIjAkSt80rY:D5IrmRwKGSTHtjWa2cbTuySeWhKCSvY
Malware Config
Extracted
redline
090723_rc_11
rcam.tuktuk.ug:11290
-
auth_value
abd581cdd66d51ad306682319cafa5a0
Extracted
laplas
http://lpls.tuktuk.ug
-
api_key
a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ntlhost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 46ef6daecec030061841713f7afb387a0a7ce913e2a5d63bc46126628daf19e1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ chrome.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 46ef6daecec030061841713f7afb387a0a7ce913e2a5d63bc46126628daf19e1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 46ef6daecec030061841713f7afb387a0a7ce913e2a5d63bc46126628daf19e1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion chrome.exe -
Executes dropped EXE 2 IoCs
pid Process 2124 chrome.exe 3840 ntlhost.exe -
resource yara_rule behavioral2/memory/4824-121-0x00000000001B0000-0x00000000007FA000-memory.dmp themida behavioral2/memory/4824-154-0x00000000001B0000-0x00000000007FA000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1766410430-2870137818-4067673745-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" chrome.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 46ef6daecec030061841713f7afb387a0a7ce913e2a5d63bc46126628daf19e1.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA chrome.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ntlhost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 4824 46ef6daecec030061841713f7afb387a0a7ce913e2a5d63bc46126628daf19e1.exe 2124 chrome.exe 3840 ntlhost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4824 set thread context of 3012 4824 46ef6daecec030061841713f7afb387a0a7ce913e2a5d63bc46126628daf19e1.exe 70 -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 8 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4824 46ef6daecec030061841713f7afb387a0a7ce913e2a5d63bc46126628daf19e1.exe 4824 46ef6daecec030061841713f7afb387a0a7ce913e2a5d63bc46126628daf19e1.exe 3012 MsBuild.exe 3012 MsBuild.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4824 46ef6daecec030061841713f7afb387a0a7ce913e2a5d63bc46126628daf19e1.exe Token: SeDebugPrivilege 3012 MsBuild.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4824 wrote to memory of 3012 4824 46ef6daecec030061841713f7afb387a0a7ce913e2a5d63bc46126628daf19e1.exe 70 PID 4824 wrote to memory of 3012 4824 46ef6daecec030061841713f7afb387a0a7ce913e2a5d63bc46126628daf19e1.exe 70 PID 4824 wrote to memory of 3012 4824 46ef6daecec030061841713f7afb387a0a7ce913e2a5d63bc46126628daf19e1.exe 70 PID 4824 wrote to memory of 3012 4824 46ef6daecec030061841713f7afb387a0a7ce913e2a5d63bc46126628daf19e1.exe 70 PID 4824 wrote to memory of 3012 4824 46ef6daecec030061841713f7afb387a0a7ce913e2a5d63bc46126628daf19e1.exe 70 PID 4824 wrote to memory of 3012 4824 46ef6daecec030061841713f7afb387a0a7ce913e2a5d63bc46126628daf19e1.exe 70 PID 4824 wrote to memory of 3012 4824 46ef6daecec030061841713f7afb387a0a7ce913e2a5d63bc46126628daf19e1.exe 70 PID 4824 wrote to memory of 3012 4824 46ef6daecec030061841713f7afb387a0a7ce913e2a5d63bc46126628daf19e1.exe 70 PID 3012 wrote to memory of 2124 3012 MsBuild.exe 72 PID 3012 wrote to memory of 2124 3012 MsBuild.exe 72 PID 2124 wrote to memory of 3840 2124 chrome.exe 73 PID 2124 wrote to memory of 3840 2124 chrome.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\46ef6daecec030061841713f7afb387a0a7ce913e2a5d63bc46126628daf19e1.exe"C:\Users\Admin\AppData\Local\Temp\46ef6daecec030061841713f7afb387a0a7ce913e2a5d63bc46126628daf19e1.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\chrome.exe"C:\Users\Admin\AppData\Local\Temp\chrome.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3840
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.4MB
MD5f2e100f576b44fdb37d874db2e48085c
SHA123091a0b5231d69d85866fede573b25577e20414
SHA25677530f67cff4fc2456c0b27abf28d1ab1f4f10fd9be039783adfa25ed1f7f196
SHA51214bd861a48f201a195d322e4c00f758996d2be8b6d78a1c927af53a00e029e9be7db4002c48a80f88d2869e9ba412724ec7a47c8da09faf79133df2edc608f85
-
Filesize
4.4MB
MD5f2e100f576b44fdb37d874db2e48085c
SHA123091a0b5231d69d85866fede573b25577e20414
SHA25677530f67cff4fc2456c0b27abf28d1ab1f4f10fd9be039783adfa25ed1f7f196
SHA51214bd861a48f201a195d322e4c00f758996d2be8b6d78a1c927af53a00e029e9be7db4002c48a80f88d2869e9ba412724ec7a47c8da09faf79133df2edc608f85
-
Filesize
750.4MB
MD5c0743daea1eef70fcc46c5e7da39ef3e
SHA1ddbf50c90dffa3d7d59b62a0175ea0c78f64ed88
SHA256264b2b5735de7b0adae53ad3223076a957a350dbcdf691e6b90ca3c6daf03722
SHA512ea7b306ead66b3b457ac4dddb9246ed8452756e135f4bd38dc5c04a0aa34a8148e5ec538156cb448967b72ba1d51740a5879fcd792a904f3b3c886edea6d3b12
-
Filesize
750.4MB
MD5c0743daea1eef70fcc46c5e7da39ef3e
SHA1ddbf50c90dffa3d7d59b62a0175ea0c78f64ed88
SHA256264b2b5735de7b0adae53ad3223076a957a350dbcdf691e6b90ca3c6daf03722
SHA512ea7b306ead66b3b457ac4dddb9246ed8452756e135f4bd38dc5c04a0aa34a8148e5ec538156cb448967b72ba1d51740a5879fcd792a904f3b3c886edea6d3b12
-
Filesize
750.4MB
MD5c0743daea1eef70fcc46c5e7da39ef3e
SHA1ddbf50c90dffa3d7d59b62a0175ea0c78f64ed88
SHA256264b2b5735de7b0adae53ad3223076a957a350dbcdf691e6b90ca3c6daf03722
SHA512ea7b306ead66b3b457ac4dddb9246ed8452756e135f4bd38dc5c04a0aa34a8148e5ec538156cb448967b72ba1d51740a5879fcd792a904f3b3c886edea6d3b12