Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
12-07-2023 13:30
Behavioral task
behavioral1
Sample
65482e3a11dff25a26f8b9667999ae5f.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
65482e3a11dff25a26f8b9667999ae5f.exe
Resource
win10v2004-20230703-en
General
-
Target
65482e3a11dff25a26f8b9667999ae5f.exe
-
Size
2.6MB
-
MD5
65482e3a11dff25a26f8b9667999ae5f
-
SHA1
967455baa933e5122008db83ebf0f0be29d8afa1
-
SHA256
46ef6daecec030061841713f7afb387a0a7ce913e2a5d63bc46126628daf19e1
-
SHA512
d4475480c623ddf2a648977af78548470a56e115990018fc91b354b939949a36f7dd84822d4dee54c3a9df690b4d70deef43eb55420f38fe9186a9d26fd1c6b3
-
SSDEEP
49152:DLZTeIJtQrmRw7mGRPsIbGHH04cmjloa2TouNMjTuyRQeWhKIjAkSt80rY:D5IrmRwKGSTHtjWa2cbTuySeWhKCSvY
Malware Config
Extracted
redline
090723_rc_11
rcam.tuktuk.ug:11290
-
auth_value
abd581cdd66d51ad306682319cafa5a0
Extracted
laplas
http://lpls.tuktuk.ug
-
api_key
a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 65482e3a11dff25a26f8b9667999ae5f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ntlhost.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 65482e3a11dff25a26f8b9667999ae5f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 65482e3a11dff25a26f8b9667999ae5f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion chrome.exe -
Executes dropped EXE 2 IoCs
pid Process 1196 chrome.exe 1904 ntlhost.exe -
Loads dropped DLL 2 IoCs
pid Process 2948 MsBuild.exe 1196 chrome.exe -
resource yara_rule behavioral1/memory/2228-58-0x0000000000B10000-0x000000000115A000-memory.dmp themida behavioral1/memory/2228-97-0x0000000000B10000-0x000000000115A000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" chrome.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 65482e3a11dff25a26f8b9667999ae5f.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA chrome.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ntlhost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 2228 65482e3a11dff25a26f8b9667999ae5f.exe 1196 chrome.exe 1904 ntlhost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2228 set thread context of 2948 2228 65482e3a11dff25a26f8b9667999ae5f.exe 28 -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 6 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2228 65482e3a11dff25a26f8b9667999ae5f.exe 2948 MsBuild.exe 2948 MsBuild.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2228 65482e3a11dff25a26f8b9667999ae5f.exe Token: SeDebugPrivilege 2948 MsBuild.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2228 wrote to memory of 2948 2228 65482e3a11dff25a26f8b9667999ae5f.exe 28 PID 2228 wrote to memory of 2948 2228 65482e3a11dff25a26f8b9667999ae5f.exe 28 PID 2228 wrote to memory of 2948 2228 65482e3a11dff25a26f8b9667999ae5f.exe 28 PID 2228 wrote to memory of 2948 2228 65482e3a11dff25a26f8b9667999ae5f.exe 28 PID 2228 wrote to memory of 2948 2228 65482e3a11dff25a26f8b9667999ae5f.exe 28 PID 2228 wrote to memory of 2948 2228 65482e3a11dff25a26f8b9667999ae5f.exe 28 PID 2228 wrote to memory of 2948 2228 65482e3a11dff25a26f8b9667999ae5f.exe 28 PID 2228 wrote to memory of 2948 2228 65482e3a11dff25a26f8b9667999ae5f.exe 28 PID 2228 wrote to memory of 2948 2228 65482e3a11dff25a26f8b9667999ae5f.exe 28 PID 2948 wrote to memory of 1196 2948 MsBuild.exe 32 PID 2948 wrote to memory of 1196 2948 MsBuild.exe 32 PID 2948 wrote to memory of 1196 2948 MsBuild.exe 32 PID 2948 wrote to memory of 1196 2948 MsBuild.exe 32 PID 1196 wrote to memory of 1904 1196 chrome.exe 33 PID 1196 wrote to memory of 1904 1196 chrome.exe 33 PID 1196 wrote to memory of 1904 1196 chrome.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\65482e3a11dff25a26f8b9667999ae5f.exe"C:\Users\Admin\AppData\Local\Temp\65482e3a11dff25a26f8b9667999ae5f.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\chrome.exe"C:\Users\Admin\AppData\Local\Temp\chrome.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1904
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.4MB
MD5f2e100f576b44fdb37d874db2e48085c
SHA123091a0b5231d69d85866fede573b25577e20414
SHA25677530f67cff4fc2456c0b27abf28d1ab1f4f10fd9be039783adfa25ed1f7f196
SHA51214bd861a48f201a195d322e4c00f758996d2be8b6d78a1c927af53a00e029e9be7db4002c48a80f88d2869e9ba412724ec7a47c8da09faf79133df2edc608f85
-
Filesize
4.4MB
MD5f2e100f576b44fdb37d874db2e48085c
SHA123091a0b5231d69d85866fede573b25577e20414
SHA25677530f67cff4fc2456c0b27abf28d1ab1f4f10fd9be039783adfa25ed1f7f196
SHA51214bd861a48f201a195d322e4c00f758996d2be8b6d78a1c927af53a00e029e9be7db4002c48a80f88d2869e9ba412724ec7a47c8da09faf79133df2edc608f85
-
Filesize
402.7MB
MD52184ae5a56155adab70a7e8cc7ae43f3
SHA1dede7da051c03fba539c75e77ff9d438d380f388
SHA256f237dce19ffa62b57f66e1b15eea3de882041ac510ce00fbd75448e9c287c2a9
SHA51288dd1eaea2ecbc266325d3cf669386bad20e01edd530c46c4224c4c55da10de2b3923b0f063dd77e69baf62fd3c05d2789a04b2b33b060605592fdd2fd5869df
-
Filesize
365.9MB
MD56a8c81731a0f23e59ad580201b33d102
SHA1f20c9313f571316f0a7bbdad082f22da37779ee3
SHA2568febf9ff602878901dbf51e1c832335ee6c9b0c64a915a95e6b515b58a4e8a3d
SHA5126fcc41015d8aac9f2005541882302811a89333a7fe1cde6ca93acee641fdf19ca923ef5d512669b9dd449383b5ebad439936af687353335bdc771803a9795487
-
Filesize
4.4MB
MD5f2e100f576b44fdb37d874db2e48085c
SHA123091a0b5231d69d85866fede573b25577e20414
SHA25677530f67cff4fc2456c0b27abf28d1ab1f4f10fd9be039783adfa25ed1f7f196
SHA51214bd861a48f201a195d322e4c00f758996d2be8b6d78a1c927af53a00e029e9be7db4002c48a80f88d2869e9ba412724ec7a47c8da09faf79133df2edc608f85
-
Filesize
414.8MB
MD57fbfd544e776b504cdbfe3a62ee308eb
SHA1d7a784a89b0529138b8afaf610b5f104c1ab37de
SHA256b800dabd0b1ea35ba364a7a5ac53d4f0cb401a6833dd1fa03252227a4164fa1f
SHA512dffc084b90aef8578d4fcb6f832ee0778a713ab7ac79760ce02f06b407fd1517421bdf72df3f85947fd8415aa74791def957bc5824a56d1a7094e5086b8afa54