Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2023 13:30
Behavioral task
behavioral1
Sample
65482e3a11dff25a26f8b9667999ae5f.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
65482e3a11dff25a26f8b9667999ae5f.exe
Resource
win10v2004-20230703-en
General
-
Target
65482e3a11dff25a26f8b9667999ae5f.exe
-
Size
2.6MB
-
MD5
65482e3a11dff25a26f8b9667999ae5f
-
SHA1
967455baa933e5122008db83ebf0f0be29d8afa1
-
SHA256
46ef6daecec030061841713f7afb387a0a7ce913e2a5d63bc46126628daf19e1
-
SHA512
d4475480c623ddf2a648977af78548470a56e115990018fc91b354b939949a36f7dd84822d4dee54c3a9df690b4d70deef43eb55420f38fe9186a9d26fd1c6b3
-
SSDEEP
49152:DLZTeIJtQrmRw7mGRPsIbGHH04cmjloa2TouNMjTuyRQeWhKIjAkSt80rY:D5IrmRwKGSTHtjWa2cbTuySeWhKCSvY
Malware Config
Extracted
redline
090723_rc_11
rcam.tuktuk.ug:11290
-
auth_value
abd581cdd66d51ad306682319cafa5a0
Extracted
laplas
http://lpls.tuktuk.ug
-
api_key
a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ntlhost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 65482e3a11dff25a26f8b9667999ae5f.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 65482e3a11dff25a26f8b9667999ae5f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 65482e3a11dff25a26f8b9667999ae5f.exe -
Executes dropped EXE 2 IoCs
pid Process 4956 chrome.exe 1816 ntlhost.exe -
resource yara_rule behavioral2/memory/3780-137-0x0000000000B90000-0x00000000011DA000-memory.dmp themida behavioral2/memory/3780-168-0x0000000000B90000-0x00000000011DA000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3195054982-4292022746-1467505928-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" chrome.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 65482e3a11dff25a26f8b9667999ae5f.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA chrome.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ntlhost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 3780 65482e3a11dff25a26f8b9667999ae5f.exe 4956 chrome.exe 1816 ntlhost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3780 set thread context of 1656 3780 65482e3a11dff25a26f8b9667999ae5f.exe 95 -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 68 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3780 65482e3a11dff25a26f8b9667999ae5f.exe 3780 65482e3a11dff25a26f8b9667999ae5f.exe 1656 MsBuild.exe 1656 MsBuild.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3780 65482e3a11dff25a26f8b9667999ae5f.exe Token: SeDebugPrivilege 1656 MsBuild.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3780 wrote to memory of 1656 3780 65482e3a11dff25a26f8b9667999ae5f.exe 95 PID 3780 wrote to memory of 1656 3780 65482e3a11dff25a26f8b9667999ae5f.exe 95 PID 3780 wrote to memory of 1656 3780 65482e3a11dff25a26f8b9667999ae5f.exe 95 PID 3780 wrote to memory of 1656 3780 65482e3a11dff25a26f8b9667999ae5f.exe 95 PID 3780 wrote to memory of 1656 3780 65482e3a11dff25a26f8b9667999ae5f.exe 95 PID 3780 wrote to memory of 1656 3780 65482e3a11dff25a26f8b9667999ae5f.exe 95 PID 3780 wrote to memory of 1656 3780 65482e3a11dff25a26f8b9667999ae5f.exe 95 PID 3780 wrote to memory of 1656 3780 65482e3a11dff25a26f8b9667999ae5f.exe 95 PID 1656 wrote to memory of 4956 1656 MsBuild.exe 99 PID 1656 wrote to memory of 4956 1656 MsBuild.exe 99 PID 4956 wrote to memory of 1816 4956 chrome.exe 100 PID 4956 wrote to memory of 1816 4956 chrome.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\65482e3a11dff25a26f8b9667999ae5f.exe"C:\Users\Admin\AppData\Local\Temp\65482e3a11dff25a26f8b9667999ae5f.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MsBuild.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\chrome.exe"C:\Users\Admin\AppData\Local\Temp\chrome.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1816
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.4MB
MD5f2e100f576b44fdb37d874db2e48085c
SHA123091a0b5231d69d85866fede573b25577e20414
SHA25677530f67cff4fc2456c0b27abf28d1ab1f4f10fd9be039783adfa25ed1f7f196
SHA51214bd861a48f201a195d322e4c00f758996d2be8b6d78a1c927af53a00e029e9be7db4002c48a80f88d2869e9ba412724ec7a47c8da09faf79133df2edc608f85
-
Filesize
4.4MB
MD5f2e100f576b44fdb37d874db2e48085c
SHA123091a0b5231d69d85866fede573b25577e20414
SHA25677530f67cff4fc2456c0b27abf28d1ab1f4f10fd9be039783adfa25ed1f7f196
SHA51214bd861a48f201a195d322e4c00f758996d2be8b6d78a1c927af53a00e029e9be7db4002c48a80f88d2869e9ba412724ec7a47c8da09faf79133df2edc608f85
-
Filesize
4.4MB
MD5f2e100f576b44fdb37d874db2e48085c
SHA123091a0b5231d69d85866fede573b25577e20414
SHA25677530f67cff4fc2456c0b27abf28d1ab1f4f10fd9be039783adfa25ed1f7f196
SHA51214bd861a48f201a195d322e4c00f758996d2be8b6d78a1c927af53a00e029e9be7db4002c48a80f88d2869e9ba412724ec7a47c8da09faf79133df2edc608f85
-
Filesize
681.2MB
MD5db24cf4b540db198769928396c0ee4e4
SHA1fff6a223f2942db207555c17f7589e4ddda514f5
SHA25615ac0de3d693499a3d5c5dc122bc065e86f6d6f5b0072cd6060172b4665bf7cb
SHA512950d2dc11187c3dfd66222e59d98a50bc8d8d853c68e9affc645de2381a466303830228adb50b5e6a2dd6e4f6e10fa4609c7ca849353bb06d590e1a2db3042af
-
Filesize
714.8MB
MD5cf55faded2532723f9b5003af057145e
SHA155bd9711b81a35a5383444526c322403ea5cf19d
SHA25644bb2f9598ab899bfd793113a3786e4bc5c1759fde9d8e969d38d9c64295cfab
SHA512d7f25cb93d9a9bec25c3164aa59c75751ece5d2452d29934b16a47579bcad323024d158107861646cbc760262f13f297b784db73353b6a5fd555c1a3e81e96be