Analysis
-
max time kernel
300s -
max time network
276s -
platform
windows10-1703_x64 -
resource
win10-20230831-en -
resource tags
arch:x64arch:x86image:win10-20230831-enlocale:en-usos:windows10-1703-x64system -
submitted
10-09-2023 22:15
Behavioral task
behavioral1
Sample
61ae562ea867b2b85de6b6482dd1d315b49497ec2404e799d71a7df9a434a4ad.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
61ae562ea867b2b85de6b6482dd1d315b49497ec2404e799d71a7df9a434a4ad.exe
Resource
win10-20230831-en
General
-
Target
61ae562ea867b2b85de6b6482dd1d315b49497ec2404e799d71a7df9a434a4ad.exe
-
Size
2.4MB
-
MD5
a2f2e39ba9cd5bbd496e5f6e46210cd6
-
SHA1
738b4f192a6e5e3311e8788ae8872ff2166672f9
-
SHA256
61ae562ea867b2b85de6b6482dd1d315b49497ec2404e799d71a7df9a434a4ad
-
SHA512
f34ffeae482fdd9105e4838664c62dc6148ffe924a89083e6d9d77cec98cf0258b60b6e7c009ea5b1d09bfb98c57b862c47008f258ae2e74c68d2d8bcafa322a
-
SSDEEP
49152:rHSnhemOWEUuSyr9GVHyK1OqdzuepWVOsyplgVFi9d3ra+RKrpce+7:sOPkHycOnepWIs2lgfy3DRCZo
Malware Config
Extracted
amadey
3.89
http://5.42.64.33/vu3skClDn/index.php
-
install_dir
a304d35d74
-
install_file
yiueea.exe
-
strings_key
3ae6c4e6339065c6f5a368011bb5cb8c
Extracted
redline
amadey_api
amadapi.tuktuk.ug:11290
-
auth_value
a004bea47cf55a1c8841d46c3fe3e6f5
Extracted
laplas
http://lpls.tuktuk.ug
-
api_key
a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 61ae562ea867b2b85de6b6482dd1d315b49497ec2404e799d71a7df9a434a4ad.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ winlog.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ntlhost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 61ae562ea867b2b85de6b6482dd1d315b49497ec2404e799d71a7df9a434a4ad.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion winlog.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion winlog.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 61ae562ea867b2b85de6b6482dd1d315b49497ec2404e799d71a7df9a434a4ad.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 61ae562ea867b2b85de6b6482dd1d315b49497ec2404e799d71a7df9a434a4ad.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 61ae562ea867b2b85de6b6482dd1d315b49497ec2404e799d71a7df9a434a4ad.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 61ae562ea867b2b85de6b6482dd1d315b49497ec2404e799d71a7df9a434a4ad.exe -
Executes dropped EXE 3 IoCs
pid Process 3112 taskhost.exe 4532 winlog.exe 320 ntlhost.exe -
resource yara_rule behavioral2/memory/3492-0-0x00000000012B0000-0x00000000018F0000-memory.dmp themida behavioral2/memory/3492-2-0x00000000012B0000-0x00000000018F0000-memory.dmp themida behavioral2/memory/3492-3-0x00000000012B0000-0x00000000018F0000-memory.dmp themida behavioral2/memory/3492-4-0x00000000012B0000-0x00000000018F0000-memory.dmp themida behavioral2/memory/3492-5-0x00000000012B0000-0x00000000018F0000-memory.dmp themida behavioral2/memory/3492-6-0x00000000012B0000-0x00000000018F0000-memory.dmp themida behavioral2/memory/3492-7-0x00000000012B0000-0x00000000018F0000-memory.dmp themida behavioral2/memory/3492-51-0x00000000012B0000-0x00000000018F0000-memory.dmp themida behavioral2/memory/3492-73-0x00000000012B0000-0x00000000018F0000-memory.dmp themida behavioral2/memory/1856-526-0x00000000012B0000-0x00000000018F0000-memory.dmp themida behavioral2/memory/1856-527-0x00000000012B0000-0x00000000018F0000-memory.dmp themida behavioral2/memory/1856-528-0x00000000012B0000-0x00000000018F0000-memory.dmp themida behavioral2/memory/1856-529-0x00000000012B0000-0x00000000018F0000-memory.dmp themida behavioral2/memory/1856-530-0x00000000012B0000-0x00000000018F0000-memory.dmp themida behavioral2/memory/1856-531-0x00000000012B0000-0x00000000018F0000-memory.dmp themida behavioral2/memory/1856-532-0x00000000012B0000-0x00000000018F0000-memory.dmp themida -
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3229154902-1540650024-2860248029-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" winlog.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 61ae562ea867b2b85de6b6482dd1d315b49497ec2404e799d71a7df9a434a4ad.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 61ae562ea867b2b85de6b6482dd1d315b49497ec2404e799d71a7df9a434a4ad.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlog.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ntlhost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3492 61ae562ea867b2b85de6b6482dd1d315b49497ec2404e799d71a7df9a434a4ad.exe 4532 winlog.exe 320 ntlhost.exe 1856 61ae562ea867b2b85de6b6482dd1d315b49497ec2404e799d71a7df9a434a4ad.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3112 set thread context of 4064 3112 taskhost.exe 73 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4136 schtasks.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 21 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 3492 61ae562ea867b2b85de6b6482dd1d315b49497ec2404e799d71a7df9a434a4ad.exe 3492 61ae562ea867b2b85de6b6482dd1d315b49497ec2404e799d71a7df9a434a4ad.exe 4064 vbc.exe 4064 vbc.exe 4064 vbc.exe 1856 61ae562ea867b2b85de6b6482dd1d315b49497ec2404e799d71a7df9a434a4ad.exe 1856 61ae562ea867b2b85de6b6482dd1d315b49497ec2404e799d71a7df9a434a4ad.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4064 vbc.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3492 wrote to memory of 4136 3492 61ae562ea867b2b85de6b6482dd1d315b49497ec2404e799d71a7df9a434a4ad.exe 70 PID 3492 wrote to memory of 4136 3492 61ae562ea867b2b85de6b6482dd1d315b49497ec2404e799d71a7df9a434a4ad.exe 70 PID 3492 wrote to memory of 4136 3492 61ae562ea867b2b85de6b6482dd1d315b49497ec2404e799d71a7df9a434a4ad.exe 70 PID 3492 wrote to memory of 3112 3492 61ae562ea867b2b85de6b6482dd1d315b49497ec2404e799d71a7df9a434a4ad.exe 72 PID 3492 wrote to memory of 3112 3492 61ae562ea867b2b85de6b6482dd1d315b49497ec2404e799d71a7df9a434a4ad.exe 72 PID 3492 wrote to memory of 3112 3492 61ae562ea867b2b85de6b6482dd1d315b49497ec2404e799d71a7df9a434a4ad.exe 72 PID 3112 wrote to memory of 4064 3112 taskhost.exe 73 PID 3112 wrote to memory of 4064 3112 taskhost.exe 73 PID 3112 wrote to memory of 4064 3112 taskhost.exe 73 PID 3112 wrote to memory of 4064 3112 taskhost.exe 73 PID 3112 wrote to memory of 4064 3112 taskhost.exe 73 PID 3492 wrote to memory of 4532 3492 61ae562ea867b2b85de6b6482dd1d315b49497ec2404e799d71a7df9a434a4ad.exe 74 PID 3492 wrote to memory of 4532 3492 61ae562ea867b2b85de6b6482dd1d315b49497ec2404e799d71a7df9a434a4ad.exe 74 PID 4532 wrote to memory of 320 4532 winlog.exe 75 PID 4532 wrote to memory of 320 4532 winlog.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\61ae562ea867b2b85de6b6482dd1d315b49497ec2404e799d71a7df9a434a4ad.exe"C:\Users\Admin\AppData\Local\Temp\61ae562ea867b2b85de6b6482dd1d315b49497ec2404e799d71a7df9a434a4ad.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN 61ae562ea867b2b85de6b6482dd1d315b49497ec2404e799d71a7df9a434a4ad.exe /TR "C:\Users\Admin\AppData\Local\Temp\61ae562ea867b2b85de6b6482dd1d315b49497ec2404e799d71a7df9a434a4ad.exe" /F2⤵
- Creates scheduled task(s)
PID:4136
-
-
C:\Users\Admin\AppData\Local\Temp\1000498001\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\1000498001\taskhost.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4064
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000499001\winlog.exe"C:\Users\Admin\AppData\Local\Temp\1000499001\winlog.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:320
-
-
-
C:\Users\Admin\AppData\Local\Temp\61ae562ea867b2b85de6b6482dd1d315b49497ec2404e799d71a7df9a434a4ad.exeC:\Users\Admin\AppData\Local\Temp\61ae562ea867b2b85de6b6482dd1d315b49497ec2404e799d71a7df9a434a4ad.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1856
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
708B
MD52382378378c002d88b9a507c712c3349
SHA12e894db3808b554abadc8b144338ad9e2ea937ba
SHA25637a4e56c497e170de6e152bc479624eb8d7ccb35bad5a190f2fdb17ac699cffa
SHA5122120f9ae9e5d63ee9aa5aa25e24081662059bdeb01afd8b21ddb8bdfff22832ea0c1dec51dbcbf714e1e82537d624f0ddf0b862ff218b9d2a38941fbe63c3258
-
Filesize
1.0MB
MD5a265ef334c611306f2e3fa8840b1ae7d
SHA1bfda73f8df4dd783cc6d3571864921cf94e2066d
SHA256c08c529f426ee56246cfd750c2e0e9c43df8b54247c9a14ac07508e178776adc
SHA512f3ff0d1a40fa0b094c9b5854d68a32e7efbb044167a15924bb6a24d4a5dadb56dc33d055fc134649d2e99c7b0ee05b98742d890a629d688b866f3022282f1441
-
Filesize
1.0MB
MD5a265ef334c611306f2e3fa8840b1ae7d
SHA1bfda73f8df4dd783cc6d3571864921cf94e2066d
SHA256c08c529f426ee56246cfd750c2e0e9c43df8b54247c9a14ac07508e178776adc
SHA512f3ff0d1a40fa0b094c9b5854d68a32e7efbb044167a15924bb6a24d4a5dadb56dc33d055fc134649d2e99c7b0ee05b98742d890a629d688b866f3022282f1441
-
Filesize
1.0MB
MD5a265ef334c611306f2e3fa8840b1ae7d
SHA1bfda73f8df4dd783cc6d3571864921cf94e2066d
SHA256c08c529f426ee56246cfd750c2e0e9c43df8b54247c9a14ac07508e178776adc
SHA512f3ff0d1a40fa0b094c9b5854d68a32e7efbb044167a15924bb6a24d4a5dadb56dc33d055fc134649d2e99c7b0ee05b98742d890a629d688b866f3022282f1441
-
Filesize
2.6MB
MD53f821e69fe1b38097b29ac284016858a
SHA13995cad76f1313243e5c8abce901876638575341
SHA256203abb4fef06659cf437ca0d5c338b7e0ed1add2645361ba92ab5aab6e3a0e08
SHA512704a799fae6f6139f9c66a1f11bff243a4381ff69028b1fc1f903c8c75d303a9769b6843c67f794c1c85dd9b10dd1c07bead63702a2f077cb467e5a50c99d5d7
-
Filesize
2.6MB
MD53f821e69fe1b38097b29ac284016858a
SHA13995cad76f1313243e5c8abce901876638575341
SHA256203abb4fef06659cf437ca0d5c338b7e0ed1add2645361ba92ab5aab6e3a0e08
SHA512704a799fae6f6139f9c66a1f11bff243a4381ff69028b1fc1f903c8c75d303a9769b6843c67f794c1c85dd9b10dd1c07bead63702a2f077cb467e5a50c99d5d7
-
Filesize
2.6MB
MD53f821e69fe1b38097b29ac284016858a
SHA13995cad76f1313243e5c8abce901876638575341
SHA256203abb4fef06659cf437ca0d5c338b7e0ed1add2645361ba92ab5aab6e3a0e08
SHA512704a799fae6f6139f9c66a1f11bff243a4381ff69028b1fc1f903c8c75d303a9769b6843c67f794c1c85dd9b10dd1c07bead63702a2f077cb467e5a50c99d5d7
-
Filesize
782.6MB
MD5839c8c68fdb5c750f1cf8dbd3851ac6d
SHA18ecc244e7442ea96b0e786bac05703271adcacc3
SHA2567529b8e8e38916a74f8c933a3af004f715c64379e888c6a269ed249e23c4fb36
SHA512da7d76ba8f093852b1ec954125351f22d72c33f6ea0cf0a93805c41ad27a33225477af51d4c7d5487235ed9355b073946ec5388fddd9d6011bd92661987e35d8