Overview
overview
10Static
static
3Setup_new/Setup.exe
windows7-x64
10Setup_new/Setup.exe
windows10-2004-x64
10Setup_new/libEGL.dll
windows7-x64
1Setup_new/libEGL.dll
windows10-2004-x64
1Setup_new/...32.dll
windows7-x64
1Setup_new/...32.dll
windows10-2004-x64
1Setup_new/...-1.dll
windows7-x64
3Setup_new/...-1.dll
windows10-2004-x64
3Setup_new/...-1.dll
windows7-x64
1Setup_new/...-1.dll
windows10-2004-x64
1Setup_new/...00.dll
windows7-x64
3Setup_new/...00.dll
windows10-2004-x64
3Setup_new/...40.dll
windows7-x64
3Setup_new/...40.dll
windows10-2004-x64
3Setup_new/...00.dll
windows7-x64
3Setup_new/...00.dll
windows10-2004-x64
3Setup_new/...sw.dll
windows7-x64
1Setup_new/...sw.dll
windows10-2004-x64
1Analysis
-
max time kernel
144s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13-09-2023 07:36
Static task
static1
Behavioral task
behavioral1
Sample
Setup_new/Setup.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Setup_new/Setup.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral3
Sample
Setup_new/libEGL.dll
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
Setup_new/libEGL.dll
Resource
win10v2004-20230831-en
Behavioral task
behavioral5
Sample
Setup_new/libeay32.dll
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
Setup_new/libeay32.dll
Resource
win10v2004-20230831-en
Behavioral task
behavioral7
Sample
Setup_new/libgcc_s_dw2-1.dll
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
Setup_new/libgcc_s_dw2-1.dll
Resource
win10v2004-20230831-en
Behavioral task
behavioral9
Sample
Setup_new/libwinpthread-1.dll
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
Setup_new/libwinpthread-1.dll
Resource
win10v2004-20230831-en
Behavioral task
behavioral11
Sample
Setup_new/msvcp100.dll
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
Setup_new/msvcp100.dll
Resource
win10v2004-20230831-en
Behavioral task
behavioral13
Sample
Setup_new/msvcp140.dll
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
Setup_new/msvcp140.dll
Resource
win10v2004-20230831-en
Behavioral task
behavioral15
Sample
Setup_new/msvcr100.dll
Resource
win7-20230831-en
Behavioral task
behavioral16
Sample
Setup_new/msvcr100.dll
Resource
win10v2004-20230831-en
Behavioral task
behavioral17
Sample
Setup_new/opengl32sw.dll
Resource
win7-20230831-en
Behavioral task
behavioral18
Sample
Setup_new/opengl32sw.dll
Resource
win10v2004-20230831-en
General
-
Target
Setup_new/Setup.exe
-
Size
762.2MB
-
MD5
8b1b132b0c4d7190afa85bb67522bff5
-
SHA1
8d3640a5230bed9575ac81c1553c66a503a7772e
-
SHA256
2cf6b0c730f4a952f2de3f1159d63494c066015d82fb3d4fa976dcb1ba01f5d9
-
SHA512
167e161389a2d6b0be716f9ed34c2966b3c40f3221df06ff9221e823f936d2fb7806864e0ef466731e11dc9da332a11255849d15787eafb90bfed54164173b90
-
SSDEEP
3072:2E7eslBSyPJAhTD/xQtbVIIExhwn+8JMkVybrxu1HFUWEnhBMixAwuYNLx:cslBuhTDxQtqBxan+u+rxNBMixAPYN
Malware Config
Extracted
redline
@kl1891
94.142.138.4:80
-
auth_value
def9cdd582e9c7ef72b4a3cfb023c53e
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
Processes:
O.exeO.exesvchost.exeO.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ O.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ O.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ O.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
O.exeO.exeO.exesvchost.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion O.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion O.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion O.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion O.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion O.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion O.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe -
Executes dropped EXE 4 IoCs
Processes:
svchost.exeO.exeO.exeO.exepid Process 1444 svchost.exe 1732 O.exe 2212 O.exe 320 O.exe -
Loads dropped DLL 6 IoCs
Processes:
Setup.exesvchost.execmd.exeO.exepid Process 2556 Setup.exe 1444 svchost.exe 1444 svchost.exe 936 cmd.exe 1732 O.exe 1732 O.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
svchost.exeO.exeO.exeO.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA O.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA O.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA O.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
svchost.exeO.exeO.exeO.exepid Process 1444 svchost.exe 1732 O.exe 2212 O.exe 320 O.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid Process 1756 timeout.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
Setup.exepid Process 2556 Setup.exe 2556 Setup.exe 2556 Setup.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Setup.exedescription pid Process Token: SeDebugPrivilege 2556 Setup.exe Token: SeRestorePrivilege 2556 Setup.exe Token: SeBackupPrivilege 2556 Setup.exe -
Suspicious use of WriteProcessMemory 49 IoCs
Processes:
Setup.exesvchost.execmd.exeO.exetaskeng.exedescription pid Process procid_target PID 2556 wrote to memory of 1444 2556 Setup.exe 32 PID 2556 wrote to memory of 1444 2556 Setup.exe 32 PID 2556 wrote to memory of 1444 2556 Setup.exe 32 PID 2556 wrote to memory of 1444 2556 Setup.exe 32 PID 2556 wrote to memory of 1444 2556 Setup.exe 32 PID 2556 wrote to memory of 1444 2556 Setup.exe 32 PID 2556 wrote to memory of 1444 2556 Setup.exe 32 PID 1444 wrote to memory of 936 1444 svchost.exe 33 PID 1444 wrote to memory of 936 1444 svchost.exe 33 PID 1444 wrote to memory of 936 1444 svchost.exe 33 PID 1444 wrote to memory of 936 1444 svchost.exe 33 PID 1444 wrote to memory of 936 1444 svchost.exe 33 PID 1444 wrote to memory of 936 1444 svchost.exe 33 PID 1444 wrote to memory of 936 1444 svchost.exe 33 PID 936 wrote to memory of 1756 936 cmd.exe 35 PID 936 wrote to memory of 1756 936 cmd.exe 35 PID 936 wrote to memory of 1756 936 cmd.exe 35 PID 936 wrote to memory of 1756 936 cmd.exe 35 PID 936 wrote to memory of 1756 936 cmd.exe 35 PID 936 wrote to memory of 1756 936 cmd.exe 35 PID 936 wrote to memory of 1756 936 cmd.exe 35 PID 936 wrote to memory of 1732 936 cmd.exe 36 PID 936 wrote to memory of 1732 936 cmd.exe 36 PID 936 wrote to memory of 1732 936 cmd.exe 36 PID 936 wrote to memory of 1732 936 cmd.exe 36 PID 936 wrote to memory of 1732 936 cmd.exe 36 PID 936 wrote to memory of 1732 936 cmd.exe 36 PID 936 wrote to memory of 1732 936 cmd.exe 36 PID 1732 wrote to memory of 1916 1732 O.exe 37 PID 1732 wrote to memory of 1916 1732 O.exe 37 PID 1732 wrote to memory of 1916 1732 O.exe 37 PID 1732 wrote to memory of 1916 1732 O.exe 37 PID 1732 wrote to memory of 1916 1732 O.exe 37 PID 1732 wrote to memory of 1916 1732 O.exe 37 PID 1732 wrote to memory of 1916 1732 O.exe 37 PID 2692 wrote to memory of 2212 2692 taskeng.exe 40 PID 2692 wrote to memory of 2212 2692 taskeng.exe 40 PID 2692 wrote to memory of 2212 2692 taskeng.exe 40 PID 2692 wrote to memory of 2212 2692 taskeng.exe 40 PID 2692 wrote to memory of 2212 2692 taskeng.exe 40 PID 2692 wrote to memory of 2212 2692 taskeng.exe 40 PID 2692 wrote to memory of 2212 2692 taskeng.exe 40 PID 2692 wrote to memory of 320 2692 taskeng.exe 41 PID 2692 wrote to memory of 320 2692 taskeng.exe 41 PID 2692 wrote to memory of 320 2692 taskeng.exe 41 PID 2692 wrote to memory of 320 2692 taskeng.exe 41 PID 2692 wrote to memory of 320 2692 taskeng.exe 41 PID 2692 wrote to memory of 320 2692 taskeng.exe 41 PID 2692 wrote to memory of 320 2692 taskeng.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup_new\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup_new\Setup.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\s144.0.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:1756
-
-
C:\ProgramData\Roaming\O.exe"C:\ProgramData\Roaming\O.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 1 /RL HIGHEST /tn "O" /tr C:\ProgramData\Roaming\O.exe /f5⤵
- Creates scheduled task(s)
PID:1916
-
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {359443F5-FB62-4353-A479-7D46167FB6BA} S-1-5-21-3185155662-718608226-894467740-1000:YETUIZPU\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\ProgramData\Roaming\O.exeC:\ProgramData\Roaming\O.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2212
-
-
C:\ProgramData\Roaming\O.exeC:\ProgramData\Roaming\O.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD5a92a908cae30b9b020244bedf61a1dd4
SHA1a45bf660ae267b2c8027327b2b97c61faa88d9ae
SHA256ae14b287be4c2cb072802d65693beeb9efecefd6e6de5994abe49546b8ca0308
SHA512beab8787db9e978c0db067f0cbc2acff56033f1343bbde5ed6ff364b9ce241cdac00c33f66e799ad6a693a7dd7eb54274c11010fa4c087b18a31fb408cd10fba
-
Filesize
5.5MB
MD5a92a908cae30b9b020244bedf61a1dd4
SHA1a45bf660ae267b2c8027327b2b97c61faa88d9ae
SHA256ae14b287be4c2cb072802d65693beeb9efecefd6e6de5994abe49546b8ca0308
SHA512beab8787db9e978c0db067f0cbc2acff56033f1343bbde5ed6ff364b9ce241cdac00c33f66e799ad6a693a7dd7eb54274c11010fa4c087b18a31fb408cd10fba
-
Filesize
5.5MB
MD5a92a908cae30b9b020244bedf61a1dd4
SHA1a45bf660ae267b2c8027327b2b97c61faa88d9ae
SHA256ae14b287be4c2cb072802d65693beeb9efecefd6e6de5994abe49546b8ca0308
SHA512beab8787db9e978c0db067f0cbc2acff56033f1343bbde5ed6ff364b9ce241cdac00c33f66e799ad6a693a7dd7eb54274c11010fa4c087b18a31fb408cd10fba
-
Filesize
5.5MB
MD5a92a908cae30b9b020244bedf61a1dd4
SHA1a45bf660ae267b2c8027327b2b97c61faa88d9ae
SHA256ae14b287be4c2cb072802d65693beeb9efecefd6e6de5994abe49546b8ca0308
SHA512beab8787db9e978c0db067f0cbc2acff56033f1343bbde5ed6ff364b9ce241cdac00c33f66e799ad6a693a7dd7eb54274c11010fa4c087b18a31fb408cd10fba
-
Filesize
5.5MB
MD5a92a908cae30b9b020244bedf61a1dd4
SHA1a45bf660ae267b2c8027327b2b97c61faa88d9ae
SHA256ae14b287be4c2cb072802d65693beeb9efecefd6e6de5994abe49546b8ca0308
SHA512beab8787db9e978c0db067f0cbc2acff56033f1343bbde5ed6ff364b9ce241cdac00c33f66e799ad6a693a7dd7eb54274c11010fa4c087b18a31fb408cd10fba
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf
-
Filesize
168B
MD56d8100dfd6ba408934dc5bcda513f811
SHA1318e1715d60f0205794c2967926a51432cf08231
SHA25629d9b9ea557d336e99b44c431b94c21cc49e57e2ab9ef05a3f536fced8ebd5b0
SHA51266ba7d5bbffc4bbbfa591a71b99f8998841ba48ea76b0423ccf65b8536e77eaeff9f846c9f7a7cdc53abbe208ac946e8fd7aa841a976338ec2e83dc1d39d3e7a
-
Filesize
168B
MD56d8100dfd6ba408934dc5bcda513f811
SHA1318e1715d60f0205794c2967926a51432cf08231
SHA25629d9b9ea557d336e99b44c431b94c21cc49e57e2ab9ef05a3f536fced8ebd5b0
SHA51266ba7d5bbffc4bbbfa591a71b99f8998841ba48ea76b0423ccf65b8536e77eaeff9f846c9f7a7cdc53abbe208ac946e8fd7aa841a976338ec2e83dc1d39d3e7a
-
Filesize
5.5MB
MD5a92a908cae30b9b020244bedf61a1dd4
SHA1a45bf660ae267b2c8027327b2b97c61faa88d9ae
SHA256ae14b287be4c2cb072802d65693beeb9efecefd6e6de5994abe49546b8ca0308
SHA512beab8787db9e978c0db067f0cbc2acff56033f1343bbde5ed6ff364b9ce241cdac00c33f66e799ad6a693a7dd7eb54274c11010fa4c087b18a31fb408cd10fba
-
Filesize
5.5MB
MD5a92a908cae30b9b020244bedf61a1dd4
SHA1a45bf660ae267b2c8027327b2b97c61faa88d9ae
SHA256ae14b287be4c2cb072802d65693beeb9efecefd6e6de5994abe49546b8ca0308
SHA512beab8787db9e978c0db067f0cbc2acff56033f1343bbde5ed6ff364b9ce241cdac00c33f66e799ad6a693a7dd7eb54274c11010fa4c087b18a31fb408cd10fba
-
Filesize
5.5MB
MD5a92a908cae30b9b020244bedf61a1dd4
SHA1a45bf660ae267b2c8027327b2b97c61faa88d9ae
SHA256ae14b287be4c2cb072802d65693beeb9efecefd6e6de5994abe49546b8ca0308
SHA512beab8787db9e978c0db067f0cbc2acff56033f1343bbde5ed6ff364b9ce241cdac00c33f66e799ad6a693a7dd7eb54274c11010fa4c087b18a31fb408cd10fba
-
Filesize
5.5MB
MD5a92a908cae30b9b020244bedf61a1dd4
SHA1a45bf660ae267b2c8027327b2b97c61faa88d9ae
SHA256ae14b287be4c2cb072802d65693beeb9efecefd6e6de5994abe49546b8ca0308
SHA512beab8787db9e978c0db067f0cbc2acff56033f1343bbde5ed6ff364b9ce241cdac00c33f66e799ad6a693a7dd7eb54274c11010fa4c087b18a31fb408cd10fba
-
Filesize
5.5MB
MD5a92a908cae30b9b020244bedf61a1dd4
SHA1a45bf660ae267b2c8027327b2b97c61faa88d9ae
SHA256ae14b287be4c2cb072802d65693beeb9efecefd6e6de5994abe49546b8ca0308
SHA512beab8787db9e978c0db067f0cbc2acff56033f1343bbde5ed6ff364b9ce241cdac00c33f66e799ad6a693a7dd7eb54274c11010fa4c087b18a31fb408cd10fba
-
Filesize
5.5MB
MD5a92a908cae30b9b020244bedf61a1dd4
SHA1a45bf660ae267b2c8027327b2b97c61faa88d9ae
SHA256ae14b287be4c2cb072802d65693beeb9efecefd6e6de5994abe49546b8ca0308
SHA512beab8787db9e978c0db067f0cbc2acff56033f1343bbde5ed6ff364b9ce241cdac00c33f66e799ad6a693a7dd7eb54274c11010fa4c087b18a31fb408cd10fba
-
Filesize
5.5MB
MD5a92a908cae30b9b020244bedf61a1dd4
SHA1a45bf660ae267b2c8027327b2b97c61faa88d9ae
SHA256ae14b287be4c2cb072802d65693beeb9efecefd6e6de5994abe49546b8ca0308
SHA512beab8787db9e978c0db067f0cbc2acff56033f1343bbde5ed6ff364b9ce241cdac00c33f66e799ad6a693a7dd7eb54274c11010fa4c087b18a31fb408cd10fba
-
Filesize
5.5MB
MD5a92a908cae30b9b020244bedf61a1dd4
SHA1a45bf660ae267b2c8027327b2b97c61faa88d9ae
SHA256ae14b287be4c2cb072802d65693beeb9efecefd6e6de5994abe49546b8ca0308
SHA512beab8787db9e978c0db067f0cbc2acff56033f1343bbde5ed6ff364b9ce241cdac00c33f66e799ad6a693a7dd7eb54274c11010fa4c087b18a31fb408cd10fba