Analysis
-
max time kernel
183s -
max time network
209s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
21/10/2023, 15:41
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231020-en
General
-
Target
file.exe
-
Size
453KB
-
MD5
7393e8d9cbd060da9aa94337ed89a81c
-
SHA1
6cd6a8a437dbbf5a1b98c5ac283da98f04678493
-
SHA256
360ca0543bbf3df62ebc7602683fc4cfcd52a203f83175b89030ed9c12dbe337
-
SHA512
dd93e4f7a3179144b281f520ef4843c58e220ce2ebcab22fd5d23262591f8793db4420065118801cb481e984b0f8851f2b4d1a6b0788db11c4ca9936d82b98fe
-
SSDEEP
6144:d+jq9ergs45O/mxZSzigiqrFtAOjD7KSh9DsAn46g/24IGbBAMS:d+Lrgs45VgFDa64phBAM
Malware Config
Extracted
redline
123
171.22.28.236:38306
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/3256-0-0x0000000000400000-0x000000000043E000-memory.dmp family_redline -
Suspicious use of NtCreateUserProcessOtherParentProcess 7 IoCs
description pid Process procid_target PID 3964 created 3152 3964 mi.exe 53 PID 3964 created 3152 3964 mi.exe 53 PID 3964 created 3152 3964 mi.exe 53 PID 3964 created 3152 3964 mi.exe 53 PID 3964 created 3152 3964 mi.exe 53 PID 3964 created 3152 3964 mi.exe 53 PID 3620 created 3152 3620 updater.exe 53 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ mi.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ updater.exe -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts mi.exe -
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion mi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion mi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion updater.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion updater.exe -
Executes dropped EXE 2 IoCs
pid Process 3964 mi.exe 3620 updater.exe -
resource yara_rule behavioral2/files/0x0008000000022dce-21.dat themida behavioral2/files/0x0008000000022dce-26.dat themida behavioral2/memory/3964-27-0x00007FF7FC1B0000-0x00007FF7FD38F000-memory.dmp themida behavioral2/memory/3964-29-0x00007FF7FC1B0000-0x00007FF7FD38F000-memory.dmp themida behavioral2/memory/3964-32-0x00007FF7FC1B0000-0x00007FF7FD38F000-memory.dmp themida behavioral2/memory/3964-33-0x00007FF7FC1B0000-0x00007FF7FD38F000-memory.dmp themida behavioral2/memory/3964-34-0x00007FF7FC1B0000-0x00007FF7FD38F000-memory.dmp themida behavioral2/memory/3964-35-0x00007FF7FC1B0000-0x00007FF7FD38F000-memory.dmp themida behavioral2/memory/3964-50-0x00007FF7FC1B0000-0x00007FF7FD38F000-memory.dmp themida behavioral2/files/0x0008000000022dce-57.dat themida behavioral2/memory/3964-59-0x00007FF7FC1B0000-0x00007FF7FD38F000-memory.dmp themida behavioral2/files/0x000a000000022dd0-61.dat themida behavioral2/memory/3620-62-0x00007FF6316D0000-0x00007FF6328AF000-memory.dmp themida behavioral2/memory/3620-64-0x00007FF6316D0000-0x00007FF6328AF000-memory.dmp themida behavioral2/memory/3620-65-0x00007FF6316D0000-0x00007FF6328AF000-memory.dmp themida behavioral2/memory/3620-66-0x00007FF6316D0000-0x00007FF6328AF000-memory.dmp themida behavioral2/memory/3620-67-0x00007FF6316D0000-0x00007FF6328AF000-memory.dmp themida behavioral2/memory/3620-68-0x00007FF6316D0000-0x00007FF6328AF000-memory.dmp themida behavioral2/memory/3620-81-0x00007FF6316D0000-0x00007FF6328AF000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mi.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA updater.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3964 mi.exe 3620 updater.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 968 set thread context of 3256 968 file.exe 83 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\updater.exe mi.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2988 sc.exe 2236 sc.exe 2584 sc.exe 1916 sc.exe 4856 sc.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2264 schtasks.exe -
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 3256 AppLaunch.exe 3256 AppLaunch.exe 3256 AppLaunch.exe 3256 AppLaunch.exe 3964 mi.exe 3964 mi.exe 4744 powershell.exe 4744 powershell.exe 3964 mi.exe 3964 mi.exe 3964 mi.exe 3964 mi.exe 3964 mi.exe 3964 mi.exe 3964 mi.exe 3964 mi.exe 3964 mi.exe 3964 mi.exe 3620 updater.exe 3620 updater.exe 4940 powershell.exe 4940 powershell.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 3256 AppLaunch.exe Token: SeDebugPrivilege 4744 powershell.exe Token: SeShutdownPrivilege 880 powercfg.exe Token: SeCreatePagefilePrivilege 880 powercfg.exe Token: SeShutdownPrivilege 4192 powercfg.exe Token: SeCreatePagefilePrivilege 4192 powercfg.exe Token: SeShutdownPrivilege 2032 powercfg.exe Token: SeCreatePagefilePrivilege 2032 powercfg.exe Token: SeShutdownPrivilege 4736 powercfg.exe Token: SeCreatePagefilePrivilege 4736 powercfg.exe Token: SeDebugPrivilege 4940 powershell.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 968 wrote to memory of 3256 968 file.exe 83 PID 968 wrote to memory of 3256 968 file.exe 83 PID 968 wrote to memory of 3256 968 file.exe 83 PID 968 wrote to memory of 3256 968 file.exe 83 PID 968 wrote to memory of 3256 968 file.exe 83 PID 968 wrote to memory of 3256 968 file.exe 83 PID 968 wrote to memory of 3256 968 file.exe 83 PID 968 wrote to memory of 3256 968 file.exe 83 PID 3256 wrote to memory of 3964 3256 AppLaunch.exe 84 PID 3256 wrote to memory of 3964 3256 AppLaunch.exe 84 PID 1560 wrote to memory of 2988 1560 cmd.exe 89 PID 1560 wrote to memory of 2988 1560 cmd.exe 89 PID 1560 wrote to memory of 2236 1560 cmd.exe 90 PID 1560 wrote to memory of 2236 1560 cmd.exe 90 PID 1560 wrote to memory of 2584 1560 cmd.exe 91 PID 1560 wrote to memory of 2584 1560 cmd.exe 91 PID 1560 wrote to memory of 1916 1560 cmd.exe 92 PID 1560 wrote to memory of 1916 1560 cmd.exe 92 PID 1560 wrote to memory of 4856 1560 cmd.exe 93 PID 1560 wrote to memory of 4856 1560 cmd.exe 93 PID 3636 wrote to memory of 880 3636 cmd.exe 98 PID 3636 wrote to memory of 880 3636 cmd.exe 98 PID 3636 wrote to memory of 4192 3636 cmd.exe 99 PID 3636 wrote to memory of 4192 3636 cmd.exe 99 PID 3636 wrote to memory of 2032 3636 cmd.exe 102 PID 3636 wrote to memory of 2032 3636 cmd.exe 102 PID 3636 wrote to memory of 4736 3636 cmd.exe 103 PID 3636 wrote to memory of 4736 3636 cmd.exe 103 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3152
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Users\Admin\AppData\Local\Temp\mi.exe"C:\Users\Admin\AppData\Local\Temp\mi.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Drops file in Drivers directory
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:3964
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4744
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:2988
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:2236
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:2584
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:1916
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:4856
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:880
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4192
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2032
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4736
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /delete /f /tn "GoogleUpdateTaskMachineQC"2⤵PID:2520
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /create /f /ru "System" /tn "GoogleUpdateTaskMachineQC" /xml "C:\Users\Admin\AppData\Local\Temp\soayntyiqiqi.xml"2⤵
- Creates scheduled task(s)
PID:2264
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "GoogleUpdateTaskMachineQC"2⤵PID:2812
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4940
-
-
C:\Program Files\Google\Chrome\updater.exe"C:\Program Files\Google\Chrome\updater.exe"1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3620
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.7MB
MD58a22c4b4e8b911a51322dfd78fe799c4
SHA165a15134c02657e6079c84e2f7902f3d8ee6f8da
SHA2565337415a9069931bb4b3c68559d2ed226afa5e64e9d66165d6a9f65400f259d9
SHA51203eccc4c5448a9309b3a81c9d531550e6ecf67cbb071d6fa4df50597f0c2447a598c7ad1aaeabd4dea7a88287a0064217d812b9da09b728d580f74ba84bca3ca
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
9.7MB
MD58a22c4b4e8b911a51322dfd78fe799c4
SHA165a15134c02657e6079c84e2f7902f3d8ee6f8da
SHA2565337415a9069931bb4b3c68559d2ed226afa5e64e9d66165d6a9f65400f259d9
SHA51203eccc4c5448a9309b3a81c9d531550e6ecf67cbb071d6fa4df50597f0c2447a598c7ad1aaeabd4dea7a88287a0064217d812b9da09b728d580f74ba84bca3ca
-
Filesize
9.7MB
MD58a22c4b4e8b911a51322dfd78fe799c4
SHA165a15134c02657e6079c84e2f7902f3d8ee6f8da
SHA2565337415a9069931bb4b3c68559d2ed226afa5e64e9d66165d6a9f65400f259d9
SHA51203eccc4c5448a9309b3a81c9d531550e6ecf67cbb071d6fa4df50597f0c2447a598c7ad1aaeabd4dea7a88287a0064217d812b9da09b728d580f74ba84bca3ca
-
Filesize
9.7MB
MD58a22c4b4e8b911a51322dfd78fe799c4
SHA165a15134c02657e6079c84e2f7902f3d8ee6f8da
SHA2565337415a9069931bb4b3c68559d2ed226afa5e64e9d66165d6a9f65400f259d9
SHA51203eccc4c5448a9309b3a81c9d531550e6ecf67cbb071d6fa4df50597f0c2447a598c7ad1aaeabd4dea7a88287a0064217d812b9da09b728d580f74ba84bca3ca
-
Filesize
1KB
MD5546d67a48ff2bf7682cea9fac07b942e
SHA1a2cb3a9a97fd935b5e62d4c29b3e2c5ab7d5fc90
SHA256eff7edc19e6c430aaeca7ea8a77251c74d1e9abb79b183a9ee1f58c2934b4b6a
SHA51210d90edf31c0955bcec52219d854952fd38768bd97e8e50d32a1237bccaf1a5eb9f824da0f81a7812e0ce62c0464168dd0201d1c0eb61b9fe253fe7c89de05fe