Analysis
-
max time kernel
266s -
max time network
304s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
02-09-2023 23:14
Behavioral task
behavioral1
Sample
1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d.exe
Resource
win7-20230831-en
General
-
Target
1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d.exe
-
Size
6.6MB
-
MD5
c95b05b54c227d7a5715b452975141c6
-
SHA1
02c63c6b8e0ae4d232cbee2348d6a43a5e015a3c
-
SHA256
1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d
-
SHA512
8516e5ef329bff892d361fa9ffe2e14730ed2a4341a21051779cf0b1793eaebd6e456ff9dd79ae3dc276e21da9968c283b07ea684a0546a03427660f862d6f4b
-
SSDEEP
196608:PDHuu55eRkhK6fQ3rGWhF4V1CB7fFZrVhAAGmpDZRkEXafPD:rOuqio6fcrniarFbf1PaPD
Malware Config
Extracted
amadey
3.88
5.42.64.33/vu3skClDn/index.php
-
install_dir
0ac15cf625
-
install_file
yiueea.exe
-
strings_key
23e63d80d583519d75db46f354137051
Extracted
redline
010923
happy1sept.tuktuk.ug:11290
-
auth_value
8338bf26f599326ee45afe9d54f7ef8e
Extracted
laplas
http://lpls.tuktuk.ug
-
api_key
a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ winlog.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ntlhost.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion winlog.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion winlog.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ntlhost.exe -
Executes dropped EXE 4 IoCs
pid Process 2872 taskhost.exe 1588 winlog.exe 1984 taskhost.exe 808 ntlhost.exe -
Loads dropped DLL 4 IoCs
pid Process 1200 1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d.exe 1200 1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d.exe 2872 taskhost.exe 1588 winlog.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/1200-2-0x00000000008F0000-0x000000000135C000-memory.dmp vmprotect behavioral1/memory/1200-5-0x00000000008F0000-0x000000000135C000-memory.dmp vmprotect behavioral1/memory/1200-52-0x00000000008F0000-0x000000000135C000-memory.dmp vmprotect behavioral1/memory/2832-170-0x00000000008F0000-0x000000000135C000-memory.dmp vmprotect behavioral1/memory/2832-171-0x00000000008F0000-0x000000000135C000-memory.dmp vmprotect behavioral1/memory/2832-183-0x00000000008F0000-0x000000000135C000-memory.dmp vmprotect behavioral1/memory/708-197-0x00000000008F0000-0x000000000135C000-memory.dmp vmprotect behavioral1/memory/708-200-0x00000000008F0000-0x000000000135C000-memory.dmp vmprotect behavioral1/memory/708-203-0x00000000008F0000-0x000000000135C000-memory.dmp vmprotect behavioral1/memory/1172-212-0x00000000008F0000-0x000000000135C000-memory.dmp vmprotect behavioral1/memory/1172-216-0x00000000008F0000-0x000000000135C000-memory.dmp vmprotect -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" winlog.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ntlhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlog.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1588 winlog.exe 808 ntlhost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2872 set thread context of 1984 2872 taskhost.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2844 schtasks.exe -
GoLang User-Agent 4 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 13 Go-http-client/1.1 HTTP User-Agent header 16 Go-http-client/1.1 HTTP User-Agent header 19 Go-http-client/1.1 HTTP User-Agent header 21 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1200 1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d.exe 1984 taskhost.exe 1984 taskhost.exe 1984 taskhost.exe 2832 1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d.exe 708 1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d.exe 1172 1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d.exe 1228 1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2872 taskhost.exe Token: SeDebugPrivilege 1984 taskhost.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1200 wrote to memory of 2844 1200 1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d.exe 28 PID 1200 wrote to memory of 2844 1200 1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d.exe 28 PID 1200 wrote to memory of 2844 1200 1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d.exe 28 PID 1200 wrote to memory of 2844 1200 1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d.exe 28 PID 1200 wrote to memory of 2872 1200 1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d.exe 30 PID 1200 wrote to memory of 2872 1200 1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d.exe 30 PID 1200 wrote to memory of 2872 1200 1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d.exe 30 PID 1200 wrote to memory of 2872 1200 1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d.exe 30 PID 1200 wrote to memory of 1588 1200 1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d.exe 31 PID 1200 wrote to memory of 1588 1200 1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d.exe 31 PID 1200 wrote to memory of 1588 1200 1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d.exe 31 PID 1200 wrote to memory of 1588 1200 1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d.exe 31 PID 2872 wrote to memory of 1984 2872 taskhost.exe 33 PID 2872 wrote to memory of 1984 2872 taskhost.exe 33 PID 2872 wrote to memory of 1984 2872 taskhost.exe 33 PID 2872 wrote to memory of 1984 2872 taskhost.exe 33 PID 2872 wrote to memory of 1984 2872 taskhost.exe 33 PID 2872 wrote to memory of 1984 2872 taskhost.exe 33 PID 2872 wrote to memory of 1984 2872 taskhost.exe 33 PID 2872 wrote to memory of 1984 2872 taskhost.exe 33 PID 2872 wrote to memory of 1984 2872 taskhost.exe 33 PID 1588 wrote to memory of 808 1588 winlog.exe 34 PID 1588 wrote to memory of 808 1588 winlog.exe 34 PID 1588 wrote to memory of 808 1588 winlog.exe 34 PID 1780 wrote to memory of 2832 1780 taskeng.exe 39 PID 1780 wrote to memory of 2832 1780 taskeng.exe 39 PID 1780 wrote to memory of 2832 1780 taskeng.exe 39 PID 1780 wrote to memory of 2832 1780 taskeng.exe 39 PID 1780 wrote to memory of 708 1780 taskeng.exe 40 PID 1780 wrote to memory of 708 1780 taskeng.exe 40 PID 1780 wrote to memory of 708 1780 taskeng.exe 40 PID 1780 wrote to memory of 708 1780 taskeng.exe 40 PID 1780 wrote to memory of 1172 1780 taskeng.exe 41 PID 1780 wrote to memory of 1172 1780 taskeng.exe 41 PID 1780 wrote to memory of 1172 1780 taskeng.exe 41 PID 1780 wrote to memory of 1172 1780 taskeng.exe 41 PID 1780 wrote to memory of 1228 1780 taskeng.exe 42 PID 1780 wrote to memory of 1228 1780 taskeng.exe 42 PID 1780 wrote to memory of 1228 1780 taskeng.exe 42 PID 1780 wrote to memory of 1228 1780 taskeng.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d.exe"C:\Users\Admin\AppData\Local\Temp\1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN 1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d.exe /TR "C:\Users\Admin\AppData\Local\Temp\1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d.exe" /F2⤵
- Creates scheduled task(s)
PID:2844
-
-
C:\Users\Admin\AppData\Local\Temp\1000498001\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\1000498001\taskhost.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\1000498001\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\1000498001\taskhost.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1984
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000499001\winlog.exe"C:\Users\Admin\AppData\Local\Temp\1000499001\winlog.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:808
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {CE320395-4FEB-46D6-BD02-BFCC7C2155B4} S-1-5-21-86725733-3001458681-3405935542-1000:ZWKQHIWB\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d.exeC:\Users\Admin\AppData\Local\Temp\1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2832
-
-
C:\Users\Admin\AppData\Local\Temp\1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d.exeC:\Users\Admin\AppData\Local\Temp\1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:708
-
-
C:\Users\Admin\AppData\Local\Temp\1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d.exeC:\Users\Admin\AppData\Local\Temp\1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1172
-
-
C:\Users\Admin\AppData\Local\Temp\1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d.exeC:\Users\Admin\AppData\Local\Temp\1c70dce1db7e359c792d1ecc02164baa8e0ddf73e05a769e9c34a3cc2819916d.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1228
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5d3ec7e37c4d7c6d7adab1ccaa50ce27c
SHA18c13c02fcbb52cf0476aa8ed046f75d0371883dc
SHA25671cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db
SHA51262ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d
-
Filesize
1.7MB
MD5d3ec7e37c4d7c6d7adab1ccaa50ce27c
SHA18c13c02fcbb52cf0476aa8ed046f75d0371883dc
SHA25671cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db
SHA51262ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d
-
Filesize
1.7MB
MD5d3ec7e37c4d7c6d7adab1ccaa50ce27c
SHA18c13c02fcbb52cf0476aa8ed046f75d0371883dc
SHA25671cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db
SHA51262ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d
-
Filesize
1.7MB
MD5d3ec7e37c4d7c6d7adab1ccaa50ce27c
SHA18c13c02fcbb52cf0476aa8ed046f75d0371883dc
SHA25671cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db
SHA51262ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d
-
Filesize
3.5MB
MD5062fe47e8efc9041880ed273eda7c8f3
SHA1b77fffa5fce64689758a7180477ffa25bd62f509
SHA256589b49a8e56beb55dcdacec0cdc3e04949eaa678df53d720ba940c7193130344
SHA51267a4536375b34d77b3e61314ab5a6ffbbab11ff5bc4e2dd62c4b141f2b8727aef93438fd0ac74a60b55da92d54e40ee2868a9cacb2e80a60061d324940f5cb80
-
Filesize
3.5MB
MD5062fe47e8efc9041880ed273eda7c8f3
SHA1b77fffa5fce64689758a7180477ffa25bd62f509
SHA256589b49a8e56beb55dcdacec0cdc3e04949eaa678df53d720ba940c7193130344
SHA51267a4536375b34d77b3e61314ab5a6ffbbab11ff5bc4e2dd62c4b141f2b8727aef93438fd0ac74a60b55da92d54e40ee2868a9cacb2e80a60061d324940f5cb80
-
Filesize
3.5MB
MD5062fe47e8efc9041880ed273eda7c8f3
SHA1b77fffa5fce64689758a7180477ffa25bd62f509
SHA256589b49a8e56beb55dcdacec0cdc3e04949eaa678df53d720ba940c7193130344
SHA51267a4536375b34d77b3e61314ab5a6ffbbab11ff5bc4e2dd62c4b141f2b8727aef93438fd0ac74a60b55da92d54e40ee2868a9cacb2e80a60061d324940f5cb80
-
Filesize
788.5MB
MD5636fbf181eefc23a3c1d322a3e8cdbf5
SHA1226c4f7bebc539df3f1a06f24ea0ca5e6cffce54
SHA2565a10c792e965751bd714839b8bcafaae8270a84c4ad0d1d03b8886670e7b89d8
SHA512e538c43ba91f6a15d64f507b88a73919863f648914222e9d8318652bee3f1c810964ab525b9fb5e867cc0ed34286862b6148570ae536627bef2dd30c0ea7c10e
-
Filesize
1.7MB
MD5d3ec7e37c4d7c6d7adab1ccaa50ce27c
SHA18c13c02fcbb52cf0476aa8ed046f75d0371883dc
SHA25671cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db
SHA51262ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d
-
Filesize
1.7MB
MD5d3ec7e37c4d7c6d7adab1ccaa50ce27c
SHA18c13c02fcbb52cf0476aa8ed046f75d0371883dc
SHA25671cb1ea3d8e249cf83c6c0717aa292094c4fbfa99fec8ede816a27da531d57db
SHA51262ab3966f3c0061ad81d96dbd3efd222816fdd56e497891e2fa0088e540c333aa6745dcd41e722d6b6d8a92a37c032c83b3e987cc1ecc99b64a6d34438002a8d
-
Filesize
3.5MB
MD5062fe47e8efc9041880ed273eda7c8f3
SHA1b77fffa5fce64689758a7180477ffa25bd62f509
SHA256589b49a8e56beb55dcdacec0cdc3e04949eaa678df53d720ba940c7193130344
SHA51267a4536375b34d77b3e61314ab5a6ffbbab11ff5bc4e2dd62c4b141f2b8727aef93438fd0ac74a60b55da92d54e40ee2868a9cacb2e80a60061d324940f5cb80
-
Filesize
788.5MB
MD5636fbf181eefc23a3c1d322a3e8cdbf5
SHA1226c4f7bebc539df3f1a06f24ea0ca5e6cffce54
SHA2565a10c792e965751bd714839b8bcafaae8270a84c4ad0d1d03b8886670e7b89d8
SHA512e538c43ba91f6a15d64f507b88a73919863f648914222e9d8318652bee3f1c810964ab525b9fb5e867cc0ed34286862b6148570ae536627bef2dd30c0ea7c10e