Overview
overview
10Static
static
3Setup_new/Setup.exe
windows7-x64
10Setup_new/Setup.exe
windows10-2004-x64
10Setup_new/libEGL.dll
windows7-x64
1Setup_new/libEGL.dll
windows10-2004-x64
1Setup_new/...32.dll
windows7-x64
1Setup_new/...32.dll
windows10-2004-x64
1Setup_new/...-1.dll
windows7-x64
3Setup_new/...-1.dll
windows10-2004-x64
3Setup_new/...-1.dll
windows7-x64
1Setup_new/...-1.dll
windows10-2004-x64
1Setup_new/...00.dll
windows7-x64
3Setup_new/...00.dll
windows10-2004-x64
3Setup_new/...40.dll
windows7-x64
3Setup_new/...40.dll
windows10-2004-x64
3Setup_new/...00.dll
windows7-x64
3Setup_new/...00.dll
windows10-2004-x64
3Setup_new/...sw.dll
windows7-x64
1Setup_new/...sw.dll
windows10-2004-x64
1Analysis
-
max time kernel
133s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2023 07:36
Static task
static1
Behavioral task
behavioral1
Sample
Setup_new/Setup.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Setup_new/Setup.exe
Resource
win10v2004-20230831-en
Behavioral task
behavioral3
Sample
Setup_new/libEGL.dll
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
Setup_new/libEGL.dll
Resource
win10v2004-20230831-en
Behavioral task
behavioral5
Sample
Setup_new/libeay32.dll
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
Setup_new/libeay32.dll
Resource
win10v2004-20230831-en
Behavioral task
behavioral7
Sample
Setup_new/libgcc_s_dw2-1.dll
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
Setup_new/libgcc_s_dw2-1.dll
Resource
win10v2004-20230831-en
Behavioral task
behavioral9
Sample
Setup_new/libwinpthread-1.dll
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
Setup_new/libwinpthread-1.dll
Resource
win10v2004-20230831-en
Behavioral task
behavioral11
Sample
Setup_new/msvcp100.dll
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
Setup_new/msvcp100.dll
Resource
win10v2004-20230831-en
Behavioral task
behavioral13
Sample
Setup_new/msvcp140.dll
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
Setup_new/msvcp140.dll
Resource
win10v2004-20230831-en
Behavioral task
behavioral15
Sample
Setup_new/msvcr100.dll
Resource
win7-20230831-en
Behavioral task
behavioral16
Sample
Setup_new/msvcr100.dll
Resource
win10v2004-20230831-en
Behavioral task
behavioral17
Sample
Setup_new/opengl32sw.dll
Resource
win7-20230831-en
Behavioral task
behavioral18
Sample
Setup_new/opengl32sw.dll
Resource
win10v2004-20230831-en
General
-
Target
Setup_new/Setup.exe
-
Size
762.2MB
-
MD5
8b1b132b0c4d7190afa85bb67522bff5
-
SHA1
8d3640a5230bed9575ac81c1553c66a503a7772e
-
SHA256
2cf6b0c730f4a952f2de3f1159d63494c066015d82fb3d4fa976dcb1ba01f5d9
-
SHA512
167e161389a2d6b0be716f9ed34c2966b3c40f3221df06ff9221e823f936d2fb7806864e0ef466731e11dc9da332a11255849d15787eafb90bfed54164173b90
-
SSDEEP
3072:2E7eslBSyPJAhTD/xQtbVIIExhwn+8JMkVybrxu1HFUWEnhBMixAwuYNLx:cslBuhTDxQtqBxan+u+rxNBMixAPYN
Malware Config
Extracted
redline
@kl1891
94.142.138.4:80
-
auth_value
def9cdd582e9c7ef72b4a3cfb023c53e
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
svchost.exeO.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ O.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
svchost.exeO.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion O.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion O.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Setup.exesvchost.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1859779917-101786662-3680946609-1000\Control Panel\International\Geo\Nation Setup.exe Key value queried \REGISTRY\USER\S-1-5-21-1859779917-101786662-3680946609-1000\Control Panel\International\Geo\Nation svchost.exe -
Executes dropped EXE 2 IoCs
Processes:
svchost.exeO.exepid Process 1816 svchost.exe 1908 O.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
svchost.exeO.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA O.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
svchost.exeO.exepid Process 1816 svchost.exe 1908 O.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 3344 1908 WerFault.exe 99 -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid Process 5112 timeout.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Setup.exepid Process 1276 Setup.exe 1276 Setup.exe 1276 Setup.exe 1276 Setup.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Setup.exedescription pid Process Token: SeDebugPrivilege 1276 Setup.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Setup.exesvchost.execmd.exedescription pid Process procid_target PID 1276 wrote to memory of 1816 1276 Setup.exe 95 PID 1276 wrote to memory of 1816 1276 Setup.exe 95 PID 1276 wrote to memory of 1816 1276 Setup.exe 95 PID 1816 wrote to memory of 2652 1816 svchost.exe 96 PID 1816 wrote to memory of 2652 1816 svchost.exe 96 PID 1816 wrote to memory of 2652 1816 svchost.exe 96 PID 2652 wrote to memory of 5112 2652 cmd.exe 98 PID 2652 wrote to memory of 5112 2652 cmd.exe 98 PID 2652 wrote to memory of 5112 2652 cmd.exe 98 PID 2652 wrote to memory of 1908 2652 cmd.exe 99 PID 2652 wrote to memory of 1908 2652 cmd.exe 99 PID 2652 wrote to memory of 1908 2652 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup_new\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup_new\Setup.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\s1eg.0.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:5112
-
-
C:\ProgramData\Roaming\O.exe"C:\ProgramData\Roaming\O.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 5325⤵
- Program crash
PID:3344
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1908 -ip 19081⤵PID:1292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.5MB
MD5a92a908cae30b9b020244bedf61a1dd4
SHA1a45bf660ae267b2c8027327b2b97c61faa88d9ae
SHA256ae14b287be4c2cb072802d65693beeb9efecefd6e6de5994abe49546b8ca0308
SHA512beab8787db9e978c0db067f0cbc2acff56033f1343bbde5ed6ff364b9ce241cdac00c33f66e799ad6a693a7dd7eb54274c11010fa4c087b18a31fb408cd10fba
-
Filesize
5.5MB
MD5a92a908cae30b9b020244bedf61a1dd4
SHA1a45bf660ae267b2c8027327b2b97c61faa88d9ae
SHA256ae14b287be4c2cb072802d65693beeb9efecefd6e6de5994abe49546b8ca0308
SHA512beab8787db9e978c0db067f0cbc2acff56033f1343bbde5ed6ff364b9ce241cdac00c33f66e799ad6a693a7dd7eb54274c11010fa4c087b18a31fb408cd10fba
-
Filesize
168B
MD54a68de5fbd0b33eb5c1d9597ed5262c5
SHA14414ccac976404fdab4d5612cfaea84f5fcdcf49
SHA256d93d8db43f3809955aec6cebab1d5829ad6fdb19f98885ccacfe41baebb12b78
SHA5124c9ddcc6e3647551690e7839896f763d1d33b0b3bec925c9e384ad888fc8e38b062cc35da1fbc5e8b914837324ddb3e12005d61c221c4f88805da070f4265b02
-
Filesize
5.5MB
MD5a92a908cae30b9b020244bedf61a1dd4
SHA1a45bf660ae267b2c8027327b2b97c61faa88d9ae
SHA256ae14b287be4c2cb072802d65693beeb9efecefd6e6de5994abe49546b8ca0308
SHA512beab8787db9e978c0db067f0cbc2acff56033f1343bbde5ed6ff364b9ce241cdac00c33f66e799ad6a693a7dd7eb54274c11010fa4c087b18a31fb408cd10fba
-
Filesize
5.5MB
MD5a92a908cae30b9b020244bedf61a1dd4
SHA1a45bf660ae267b2c8027327b2b97c61faa88d9ae
SHA256ae14b287be4c2cb072802d65693beeb9efecefd6e6de5994abe49546b8ca0308
SHA512beab8787db9e978c0db067f0cbc2acff56033f1343bbde5ed6ff364b9ce241cdac00c33f66e799ad6a693a7dd7eb54274c11010fa4c087b18a31fb408cd10fba
-
Filesize
5.5MB
MD5a92a908cae30b9b020244bedf61a1dd4
SHA1a45bf660ae267b2c8027327b2b97c61faa88d9ae
SHA256ae14b287be4c2cb072802d65693beeb9efecefd6e6de5994abe49546b8ca0308
SHA512beab8787db9e978c0db067f0cbc2acff56033f1343bbde5ed6ff364b9ce241cdac00c33f66e799ad6a693a7dd7eb54274c11010fa4c087b18a31fb408cd10fba