Analysis
-
max time kernel
71s -
max time network
192s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
16/10/2023, 04:48
Behavioral task
behavioral1
Sample
262e90c269d9e14ffd85c28b4d13793daf3f6fb45a8dad07a73be091376adacb.exe
Resource
win7-20230831-en
General
-
Target
262e90c269d9e14ffd85c28b4d13793daf3f6fb45a8dad07a73be091376adacb.exe
-
Size
3.1MB
-
MD5
0c2f5ded9cb6a46f070bda0c18509c1e
-
SHA1
ee0f259887b4bdd125f429106e3457988187dd33
-
SHA256
262e90c269d9e14ffd85c28b4d13793daf3f6fb45a8dad07a73be091376adacb
-
SHA512
44555fb1f1d638033a82e5f06d83776efc3bd9d0a215b1e0a4bf8221b2b256d85060c4327946b426464f6a48cc88b4897738ac564834189e1cc30dec996c83ae
-
SSDEEP
49152:L/B1Ci1WvFpI4fsnEH8rZhjRP29qZBuve3FEaRq3AZ99F001Wp5w2PIHS:LK9+4sn9hjROIP/BRq3AH97WpNPu
Malware Config
Signatures
-
Detects DLL dropped by Raspberry Robin. 5 IoCs
Raspberry Robin.
resource yara_rule behavioral2/memory/4760-1-0x0000000074FE0000-0x00000000751A2000-memory.dmp Raspberry_Robin_DLL_MAY_2022 behavioral2/memory/4760-2-0x0000000074FE0000-0x00000000751A2000-memory.dmp Raspberry_Robin_DLL_MAY_2022 behavioral2/memory/4760-6-0x0000000074FE0000-0x00000000751A2000-memory.dmp Raspberry_Robin_DLL_MAY_2022 behavioral2/memory/4760-19-0x0000000074FE0000-0x00000000751A2000-memory.dmp Raspberry_Robin_DLL_MAY_2022 behavioral2/memory/4760-59-0x0000000074FE0000-0x00000000751A2000-memory.dmp Raspberry_Robin_DLL_MAY_2022 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/164-50-0x0000000000400000-0x000000000045A000-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 262e90c269d9e14ffd85c28b4d13793daf3f6fb45a8dad07a73be091376adacb.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 262e90c269d9e14ffd85c28b4d13793daf3f6fb45a8dad07a73be091376adacb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 262e90c269d9e14ffd85c28b4d13793daf3f6fb45a8dad07a73be091376adacb.exe -
resource yara_rule behavioral2/memory/4760-13-0x0000000000890000-0x000000000100C000-memory.dmp themida behavioral2/memory/4760-58-0x0000000000890000-0x000000000100C000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 262e90c269d9e14ffd85c28b4d13793daf3f6fb45a8dad07a73be091376adacb.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4760 262e90c269d9e14ffd85c28b4d13793daf3f6fb45a8dad07a73be091376adacb.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4760 set thread context of 164 4760 262e90c269d9e14ffd85c28b4d13793daf3f6fb45a8dad07a73be091376adacb.exe 70 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 4760 262e90c269d9e14ffd85c28b4d13793daf3f6fb45a8dad07a73be091376adacb.exe 4760 262e90c269d9e14ffd85c28b4d13793daf3f6fb45a8dad07a73be091376adacb.exe 164 AppLaunch.exe 164 AppLaunch.exe 164 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4760 262e90c269d9e14ffd85c28b4d13793daf3f6fb45a8dad07a73be091376adacb.exe Token: SeDebugPrivilege 164 AppLaunch.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4760 wrote to memory of 164 4760 262e90c269d9e14ffd85c28b4d13793daf3f6fb45a8dad07a73be091376adacb.exe 70 PID 4760 wrote to memory of 164 4760 262e90c269d9e14ffd85c28b4d13793daf3f6fb45a8dad07a73be091376adacb.exe 70 PID 4760 wrote to memory of 164 4760 262e90c269d9e14ffd85c28b4d13793daf3f6fb45a8dad07a73be091376adacb.exe 70 PID 4760 wrote to memory of 164 4760 262e90c269d9e14ffd85c28b4d13793daf3f6fb45a8dad07a73be091376adacb.exe 70 PID 4760 wrote to memory of 164 4760 262e90c269d9e14ffd85c28b4d13793daf3f6fb45a8dad07a73be091376adacb.exe 70 PID 4760 wrote to memory of 164 4760 262e90c269d9e14ffd85c28b4d13793daf3f6fb45a8dad07a73be091376adacb.exe 70 PID 4760 wrote to memory of 164 4760 262e90c269d9e14ffd85c28b4d13793daf3f6fb45a8dad07a73be091376adacb.exe 70 PID 4760 wrote to memory of 164 4760 262e90c269d9e14ffd85c28b4d13793daf3f6fb45a8dad07a73be091376adacb.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\262e90c269d9e14ffd85c28b4d13793daf3f6fb45a8dad07a73be091376adacb.exe"C:\Users\Admin\AppData\Local\Temp\262e90c269d9e14ffd85c28b4d13793daf3f6fb45a8dad07a73be091376adacb.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:164
-