Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
17-07-2023 09:43
Behavioral task
behavioral1
Sample
9b06361b484531e8d71b64fbb32534d9.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
9b06361b484531e8d71b64fbb32534d9.exe
Resource
win10v2004-20230703-en
General
-
Target
9b06361b484531e8d71b64fbb32534d9.exe
-
Size
2.3MB
-
MD5
9b06361b484531e8d71b64fbb32534d9
-
SHA1
6c47e8bfaf1b82c57c861312f1fe130cc5e21c96
-
SHA256
753fbc1dfa05d6007c5dfa534a7d019cbb24d07224b67ae9d48c9772039c63cd
-
SHA512
dd9ab0d96801bdc8e541c60f0cb23f8c5089f8cefd4fa9041dae5d6d7e393f27ff25cc445117e3804f235fabce0fd2ae80d284463ef2278da5afb6a81f285bbb
-
SSDEEP
49152:SgUFBrKkyuD7ug6e1NsUfgvig28JUU1y4unHZ1IxLRoV:eJK1umgBUU+n28uUMxHXIh6
Malware Config
Extracted
redline
150723_rc_11
rcam15.tuktuk.ug:11290
-
auth_value
0b3645317afbcac212f68853bb45b46d
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9b06361b484531e8d71b64fbb32534d9.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9b06361b484531e8d71b64fbb32534d9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9b06361b484531e8d71b64fbb32534d9.exe -
resource yara_rule behavioral1/memory/2280-63-0x0000000000EB0000-0x000000000146A000-memory.dmp themida behavioral1/memory/2280-107-0x0000000000EB0000-0x000000000146A000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 9b06361b484531e8d71b64fbb32534d9.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2280 9b06361b484531e8d71b64fbb32534d9.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2280 set thread context of 2972 2280 9b06361b484531e8d71b64fbb32534d9.exe 28 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2280 9b06361b484531e8d71b64fbb32534d9.exe 2972 AppLaunch.exe 2972 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2280 9b06361b484531e8d71b64fbb32534d9.exe Token: SeDebugPrivilege 2972 AppLaunch.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2972 2280 9b06361b484531e8d71b64fbb32534d9.exe 28 PID 2280 wrote to memory of 2972 2280 9b06361b484531e8d71b64fbb32534d9.exe 28 PID 2280 wrote to memory of 2972 2280 9b06361b484531e8d71b64fbb32534d9.exe 28 PID 2280 wrote to memory of 2972 2280 9b06361b484531e8d71b64fbb32534d9.exe 28 PID 2280 wrote to memory of 2972 2280 9b06361b484531e8d71b64fbb32534d9.exe 28 PID 2280 wrote to memory of 2972 2280 9b06361b484531e8d71b64fbb32534d9.exe 28 PID 2280 wrote to memory of 2972 2280 9b06361b484531e8d71b64fbb32534d9.exe 28 PID 2280 wrote to memory of 2972 2280 9b06361b484531e8d71b64fbb32534d9.exe 28 PID 2280 wrote to memory of 2972 2280 9b06361b484531e8d71b64fbb32534d9.exe 28 PID 2280 wrote to memory of 2972 2280 9b06361b484531e8d71b64fbb32534d9.exe 28 PID 2280 wrote to memory of 2972 2280 9b06361b484531e8d71b64fbb32534d9.exe 28 PID 2280 wrote to memory of 2972 2280 9b06361b484531e8d71b64fbb32534d9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b06361b484531e8d71b64fbb32534d9.exe"C:\Users\Admin\AppData\Local\Temp\9b06361b484531e8d71b64fbb32534d9.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2972
-