Analysis
-
max time kernel
110s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2023 01:27
Behavioral task
behavioral1
Sample
8b11bff6246c53c7a2488b7375ce50a193a3e7a01e1f9bd4856bc55d90fb9e7c.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
8b11bff6246c53c7a2488b7375ce50a193a3e7a01e1f9bd4856bc55d90fb9e7c.exe
Resource
win10v2004-20230703-en
General
-
Target
8b11bff6246c53c7a2488b7375ce50a193a3e7a01e1f9bd4856bc55d90fb9e7c.exe
-
Size
2.3MB
-
MD5
623bca798c05a1e5dc5a26ff57329459
-
SHA1
5d3db9376a7581fad4db73b87bcf6ce555e6138b
-
SHA256
8b11bff6246c53c7a2488b7375ce50a193a3e7a01e1f9bd4856bc55d90fb9e7c
-
SHA512
1923e4bf43651cd2423275d4383b013dbbe0f05870245229d6bd6ca650c536368f44d4b72cd9ca393b4269c88f5d4954826a4d1042144c5053140f463f54032d
-
SSDEEP
49152:magq7j1kTKNpT+1OzKamfw3Fryxqu4m/YjsqV51RoipOm5FGWCmP9:Zgq7STKNUA7mfEO4cYjsq1RoinZCml
Malware Config
Extracted
redline
170723_rc_11
rcam17.tuktuk.ug:11290
-
auth_value
ddbd29a91f6321652fef2b14e5ac70d5
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8b11bff6246c53c7a2488b7375ce50a193a3e7a01e1f9bd4856bc55d90fb9e7c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Octium.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TaskMnr.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Octium.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Octium.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TaskMnr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TaskMnr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8b11bff6246c53c7a2488b7375ce50a193a3e7a01e1f9bd4856bc55d90fb9e7c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8b11bff6246c53c7a2488b7375ce50a193a3e7a01e1f9bd4856bc55d90fb9e7c.exe -
Executes dropped EXE 2 IoCs
pid Process 4016 Octium.exe 3752 TaskMnr.exe -
resource yara_rule behavioral2/memory/644-145-0x0000000000870000-0x0000000000E40000-memory.dmp themida behavioral2/memory/644-186-0x0000000000870000-0x0000000000E40000-memory.dmp themida behavioral2/files/0x00070000000230a0-222.dat themida behavioral2/files/0x00070000000230a0-226.dat themida behavioral2/files/0x00070000000230a0-228.dat themida behavioral2/memory/3752-230-0x00007FF72F760000-0x00007FF7307EB000-memory.dmp themida behavioral2/memory/3752-233-0x00007FF72F760000-0x00007FF7307EB000-memory.dmp themida behavioral2/memory/3752-236-0x00007FF72F760000-0x00007FF7307EB000-memory.dmp themida behavioral2/memory/3752-237-0x00007FF72F760000-0x00007FF7307EB000-memory.dmp themida behavioral2/memory/3752-238-0x00007FF72F760000-0x00007FF7307EB000-memory.dmp themida behavioral2/memory/3752-239-0x00007FF72F760000-0x00007FF7307EB000-memory.dmp themida behavioral2/memory/3752-240-0x00007FF72F760000-0x00007FF7307EB000-memory.dmp themida behavioral2/memory/3752-245-0x00007FF72F760000-0x00007FF7307EB000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA TaskMnr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8b11bff6246c53c7a2488b7375ce50a193a3e7a01e1f9bd4856bc55d90fb9e7c.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Octium.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 644 8b11bff6246c53c7a2488b7375ce50a193a3e7a01e1f9bd4856bc55d90fb9e7c.exe 4016 Octium.exe 3752 TaskMnr.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 644 set thread context of 4616 644 8b11bff6246c53c7a2488b7375ce50a193a3e7a01e1f9bd4856bc55d90fb9e7c.exe 96 -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 69 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 644 8b11bff6246c53c7a2488b7375ce50a193a3e7a01e1f9bd4856bc55d90fb9e7c.exe 644 8b11bff6246c53c7a2488b7375ce50a193a3e7a01e1f9bd4856bc55d90fb9e7c.exe 4616 AppLaunch.exe 4616 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 644 8b11bff6246c53c7a2488b7375ce50a193a3e7a01e1f9bd4856bc55d90fb9e7c.exe Token: SeDebugPrivilege 4616 AppLaunch.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 644 wrote to memory of 4616 644 8b11bff6246c53c7a2488b7375ce50a193a3e7a01e1f9bd4856bc55d90fb9e7c.exe 96 PID 644 wrote to memory of 4616 644 8b11bff6246c53c7a2488b7375ce50a193a3e7a01e1f9bd4856bc55d90fb9e7c.exe 96 PID 644 wrote to memory of 4616 644 8b11bff6246c53c7a2488b7375ce50a193a3e7a01e1f9bd4856bc55d90fb9e7c.exe 96 PID 644 wrote to memory of 4616 644 8b11bff6246c53c7a2488b7375ce50a193a3e7a01e1f9bd4856bc55d90fb9e7c.exe 96 PID 644 wrote to memory of 4616 644 8b11bff6246c53c7a2488b7375ce50a193a3e7a01e1f9bd4856bc55d90fb9e7c.exe 96 PID 644 wrote to memory of 4616 644 8b11bff6246c53c7a2488b7375ce50a193a3e7a01e1f9bd4856bc55d90fb9e7c.exe 96 PID 644 wrote to memory of 4616 644 8b11bff6246c53c7a2488b7375ce50a193a3e7a01e1f9bd4856bc55d90fb9e7c.exe 96 PID 644 wrote to memory of 4616 644 8b11bff6246c53c7a2488b7375ce50a193a3e7a01e1f9bd4856bc55d90fb9e7c.exe 96 PID 4616 wrote to memory of 4016 4616 AppLaunch.exe 101 PID 4616 wrote to memory of 4016 4616 AppLaunch.exe 101 PID 4616 wrote to memory of 3752 4616 AppLaunch.exe 103 PID 4616 wrote to memory of 3752 4616 AppLaunch.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b11bff6246c53c7a2488b7375ce50a193a3e7a01e1f9bd4856bc55d90fb9e7c.exe"C:\Users\Admin\AppData\Local\Temp\8b11bff6246c53c7a2488b7375ce50a193a3e7a01e1f9bd4856bc55d90fb9e7c.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\Octium.exe"C:\Users\Admin\AppData\Local\Temp\Octium.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4016 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe4⤵PID:2452
-
-
-
C:\Users\Admin\AppData\Local\Temp\TaskMnr.exe"C:\Users\Admin\AppData\Local\Temp\TaskMnr.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3752
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.0MB
MD5e1cd1c30f4761a2bf4c878ef0a723435
SHA18fe5aaf4f0906bbc33c73819fd27eb838cc096e0
SHA256b20d74c759e6d677148c3cf1ddac1056631d69ec738f098d2c8103782d8d82c6
SHA512ecf459342f3d6aa775fa471e9b80d457a8a6bdaae18ffe0495fb044c1a665bd6efcfe9fbf27f8e977939797b1caff468e3b5e2a41b433f080e7b63c7fc8d32d8
-
Filesize
4.0MB
MD5e1cd1c30f4761a2bf4c878ef0a723435
SHA18fe5aaf4f0906bbc33c73819fd27eb838cc096e0
SHA256b20d74c759e6d677148c3cf1ddac1056631d69ec738f098d2c8103782d8d82c6
SHA512ecf459342f3d6aa775fa471e9b80d457a8a6bdaae18ffe0495fb044c1a665bd6efcfe9fbf27f8e977939797b1caff468e3b5e2a41b433f080e7b63c7fc8d32d8
-
Filesize
4.0MB
MD5e1cd1c30f4761a2bf4c878ef0a723435
SHA18fe5aaf4f0906bbc33c73819fd27eb838cc096e0
SHA256b20d74c759e6d677148c3cf1ddac1056631d69ec738f098d2c8103782d8d82c6
SHA512ecf459342f3d6aa775fa471e9b80d457a8a6bdaae18ffe0495fb044c1a665bd6efcfe9fbf27f8e977939797b1caff468e3b5e2a41b433f080e7b63c7fc8d32d8
-
Filesize
9.2MB
MD5c74b706ecaa058e6e71e7b4b64dff9df
SHA15fa641b867716e397c449a7eeae77e37a0c8c804
SHA256c2520a713db1ddda557dc6d4ace41e12d02bde143df9275e5fcc48a0fea8a21f
SHA512ab3b626c27dfaf1b991a3f2650e5c0896f248eed4b10ff903047f63fe72874229138c85615ab063904654b2abc0226ad7e7151148b09731dd761a527a8e4a591
-
Filesize
9.1MB
MD58a0d94eb1fed2d21eecf7edebbdf3a6d
SHA16bd0d3bc85896fa7e90f7b0879e432ed894a453a
SHA2561f4eeef23e2010c941ba90a7f3e05fa1c07de289838ce2ee9dac74469e47b92f
SHA5122f9632145c8eea9e6eb2051210916a5d9cfe7281b904934c1990a334baaeb8917b84c33b1131f582d47698f5ccba44b0c4f7a1de3954be25eb7875ac464b860d
-
Filesize
7.9MB
MD5b3d91c1851d9ee1d9fdcb130327d5d1e
SHA1b229b4f5d66aa2fe789e80c949c20cf5f9ad4b44
SHA256aa6af47ac58c206ee3f80dd637624a08379770a24857e1fc3d29b939360572ca
SHA512c0f84af368017ee7a7459ce015fc163dca0805c2bce1583044bca4472c137c334f9b1810fcc2f6630d897b8678e68e15b93d455f96ba7fa94e65546a97fafbaa
-
Filesize
4.8MB
MD5f72c71fdd017ae2686da530089e96e47
SHA16b8a81634c94de3d3052e2645f55552b38186f9f
SHA256f78e97a3dd38a2165f6a9931bfbeae03810ea53374ba5f3469a048b6e9afe2ba
SHA51219eb3be3cb63174def8616ad0b07411c18063d36e3ce1041d18f914369ddf9847470feab7009b76fc8b6d222a1427bd688a59e789b531441a8623f9641133791
-
Filesize
4.9MB
MD536d1b48b8a3e7df53d2168278b863cb5
SHA1b365d0178438b2d3b6cd4778b210d2846bca781e
SHA256f2bca1cabea4f3035a05a928d93b568564b7bc41f4ecd5787eda6572a40fe0e0
SHA5129df88ca507dd826a87b1cdf2b18a6575eecb76ef9b359e5254ff5ba9a02b1dc82fb3763a33a7c64641f5bbb3127af37c915a46bf89ce20215a0d0d776930d521