Analysis
-
max time kernel
300s -
max time network
278s -
platform
windows10-1703_x64 -
resource
win10-20230831-en -
resource tags
arch:x64arch:x86image:win10-20230831-enlocale:en-usos:windows10-1703-x64system -
submitted
10-09-2023 22:18
Behavioral task
behavioral1
Sample
b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe
Resource
win10-20230831-en
General
-
Target
b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe
-
Size
2.7MB
-
MD5
cf0a9195cb5140896bf44aa5264bcf9f
-
SHA1
dcd732395ed47e12574dcd2dd1da957fd56cd58a
-
SHA256
b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56
-
SHA512
338697f3db380c0f9b505524d5e1ac47b21cf6707e7d74342056c2c5bfebc7f583fa396026c753307a33efec58f69f314429514276a0b4d251437b7b6e8bc233
-
SSDEEP
49152:AbbbY6RZFHuL21BTS02JDwvcwB7DQbMdVoDUeTcMIAmsPCcKD:qjFHuLGyycwB7gaV8oMIAmLD
Malware Config
Extracted
amadey
3.89
http://5.42.64.33/vu3skClDn/index.php
-
install_dir
a304d35d74
-
install_file
yiueea.exe
-
strings_key
3ae6c4e6339065c6f5a368011bb5cb8c
Extracted
redline
amadey_api
amadapi.tuktuk.ug:11290
-
auth_value
a004bea47cf55a1c8841d46c3fe3e6f5
Extracted
laplas
http://lpls.tuktuk.ug
-
api_key
a0f588021b58e0c7908a163f8750678efedf2a66bf739a12427b379aef47ccde
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ winlog.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ntlhost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion winlog.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion winlog.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ntlhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe -
Executes dropped EXE 3 IoCs
pid Process 1208 taskhost.exe 3744 winlog.exe 1276 ntlhost.exe -
resource yara_rule behavioral2/memory/2608-0-0x0000000001030000-0x000000000165E000-memory.dmp themida behavioral2/memory/2608-2-0x0000000001030000-0x000000000165E000-memory.dmp themida behavioral2/memory/2608-3-0x0000000001030000-0x000000000165E000-memory.dmp themida behavioral2/memory/2608-4-0x0000000001030000-0x000000000165E000-memory.dmp themida behavioral2/memory/2608-5-0x0000000001030000-0x000000000165E000-memory.dmp themida behavioral2/memory/4360-6-0x0000000001030000-0x000000000165E000-memory.dmp themida behavioral2/memory/4360-7-0x0000000001030000-0x000000000165E000-memory.dmp themida behavioral2/memory/4360-8-0x0000000001030000-0x000000000165E000-memory.dmp themida behavioral2/memory/4360-9-0x0000000001030000-0x000000000165E000-memory.dmp themida behavioral2/memory/4360-10-0x0000000001030000-0x000000000165E000-memory.dmp themida behavioral2/memory/2608-11-0x0000000001030000-0x000000000165E000-memory.dmp themida behavioral2/memory/2608-70-0x0000000001030000-0x000000000165E000-memory.dmp themida behavioral2/memory/3060-519-0x0000000001030000-0x000000000165E000-memory.dmp themida behavioral2/memory/3060-520-0x0000000001030000-0x000000000165E000-memory.dmp themida behavioral2/memory/3060-521-0x0000000001030000-0x000000000165E000-memory.dmp themida behavioral2/memory/3060-522-0x0000000001030000-0x000000000165E000-memory.dmp themida behavioral2/memory/3060-523-0x0000000001030000-0x000000000165E000-memory.dmp themida -
Uses the VBS compiler for execution 1 TTPs
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3540700546-2554825161-2349363825-1000\Software\Microsoft\Windows\CurrentVersion\Run\NTSystem = "C:\\Users\\Admin\\AppData\\Roaming\\NTSystem\\ntlhost.exe" winlog.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ntlhost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlog.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2608 b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe 4360 b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe 3744 winlog.exe 1276 ntlhost.exe 3060 b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1208 set thread context of 1180 1208 taskhost.exe 74 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 228 schtasks.exe -
GoLang User-Agent 1 IoCs
Uses default user-agent string defined by GoLang HTTP packages.
description flow ioc HTTP User-Agent header 12 Go-http-client/1.1 -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2608 b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe 2608 b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe 4360 b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe 4360 b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe 1180 vbc.exe 1180 vbc.exe 1180 vbc.exe 3060 b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe 3060 b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1180 vbc.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2608 wrote to memory of 228 2608 b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe 70 PID 2608 wrote to memory of 228 2608 b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe 70 PID 2608 wrote to memory of 228 2608 b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe 70 PID 2608 wrote to memory of 1208 2608 b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe 73 PID 2608 wrote to memory of 1208 2608 b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe 73 PID 2608 wrote to memory of 1208 2608 b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe 73 PID 1208 wrote to memory of 1180 1208 taskhost.exe 74 PID 1208 wrote to memory of 1180 1208 taskhost.exe 74 PID 1208 wrote to memory of 1180 1208 taskhost.exe 74 PID 1208 wrote to memory of 1180 1208 taskhost.exe 74 PID 1208 wrote to memory of 1180 1208 taskhost.exe 74 PID 2608 wrote to memory of 3744 2608 b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe 75 PID 2608 wrote to memory of 3744 2608 b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe 75 PID 3744 wrote to memory of 1276 3744 winlog.exe 77 PID 3744 wrote to memory of 1276 3744 winlog.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe"C:\Users\Admin\AppData\Local\Temp\b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe /TR "C:\Users\Admin\AppData\Local\Temp\b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe" /F2⤵
- Creates scheduled task(s)
PID:228
-
-
C:\Users\Admin\AppData\Local\Temp\1000498001\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\1000498001\taskhost.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1180
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000499001\winlog.exe"C:\Users\Admin\AppData\Local\Temp\1000499001\winlog.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exeC:\Users\Admin\AppData\Roaming\NTSystem\ntlhost.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1276
-
-
-
C:\Users\Admin\AppData\Local\Temp\b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exeC:\Users\Admin\AppData\Local\Temp\b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4360
-
C:\Users\Admin\AppData\Local\Temp\b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exeC:\Users\Admin\AppData\Local\Temp\b41025e8d55470d9615a0d4a22249f96b46eac7c36fab65d3c20a6bec3d72c56.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3060
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5807d82efb54d554476db81199d897d77
SHA106931509b9f0b62631a1f245cd01f24b10eec76f
SHA2563214992b4169da41cbbdc88d2a52e06730be033173b6b941d5d7de31ef6650c2
SHA51282322da72f53d788b574e9f541850fcef00066f5ffbcce0ea7936e3d3b825bc6f3c873f4ec12cb8a599c93386152477e3593434a611587ae51faa6c55ed435d2
-
Filesize
1.0MB
MD5807d82efb54d554476db81199d897d77
SHA106931509b9f0b62631a1f245cd01f24b10eec76f
SHA2563214992b4169da41cbbdc88d2a52e06730be033173b6b941d5d7de31ef6650c2
SHA51282322da72f53d788b574e9f541850fcef00066f5ffbcce0ea7936e3d3b825bc6f3c873f4ec12cb8a599c93386152477e3593434a611587ae51faa6c55ed435d2
-
Filesize
1.0MB
MD5807d82efb54d554476db81199d897d77
SHA106931509b9f0b62631a1f245cd01f24b10eec76f
SHA2563214992b4169da41cbbdc88d2a52e06730be033173b6b941d5d7de31ef6650c2
SHA51282322da72f53d788b574e9f541850fcef00066f5ffbcce0ea7936e3d3b825bc6f3c873f4ec12cb8a599c93386152477e3593434a611587ae51faa6c55ed435d2
-
Filesize
2.6MB
MD53f821e69fe1b38097b29ac284016858a
SHA13995cad76f1313243e5c8abce901876638575341
SHA256203abb4fef06659cf437ca0d5c338b7e0ed1add2645361ba92ab5aab6e3a0e08
SHA512704a799fae6f6139f9c66a1f11bff243a4381ff69028b1fc1f903c8c75d303a9769b6843c67f794c1c85dd9b10dd1c07bead63702a2f077cb467e5a50c99d5d7
-
Filesize
2.6MB
MD53f821e69fe1b38097b29ac284016858a
SHA13995cad76f1313243e5c8abce901876638575341
SHA256203abb4fef06659cf437ca0d5c338b7e0ed1add2645361ba92ab5aab6e3a0e08
SHA512704a799fae6f6139f9c66a1f11bff243a4381ff69028b1fc1f903c8c75d303a9769b6843c67f794c1c85dd9b10dd1c07bead63702a2f077cb467e5a50c99d5d7
-
Filesize
2.6MB
MD53f821e69fe1b38097b29ac284016858a
SHA13995cad76f1313243e5c8abce901876638575341
SHA256203abb4fef06659cf437ca0d5c338b7e0ed1add2645361ba92ab5aab6e3a0e08
SHA512704a799fae6f6139f9c66a1f11bff243a4381ff69028b1fc1f903c8c75d303a9769b6843c67f794c1c85dd9b10dd1c07bead63702a2f077cb467e5a50c99d5d7
-
Filesize
837.6MB
MD54744ff68e18701cbe0e88223163fba40
SHA10980040bc5f45ea87b2952933706d6b339c582ae
SHA256fb953525b4c6cd23a387c9711f550273cf636729bb500264506c26e80afbe80b
SHA5120bfb317300ee2a4099db6b97bfe9e9a7e3fc6d78b942164ea507dc79ca0a9db95b2524ca792dd60319e42613630abbd9b8cc0385c68afcc4897a8432cd17b5a1