Analysis
-
max time kernel
291s -
max time network
218s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 05:12
Behavioral task
behavioral1
Sample
a8b0a923d7a3c0b4f4bf9c576d9f41af4fe8cfab022d60d26e889ff58e2a3e71.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a8b0a923d7a3c0b4f4bf9c576d9f41af4fe8cfab022d60d26e889ff58e2a3e71.exe
Resource
win10-20231215-en
General
-
Target
a8b0a923d7a3c0b4f4bf9c576d9f41af4fe8cfab022d60d26e889ff58e2a3e71.exe
-
Size
4.4MB
-
MD5
48f8fa3cbbc9043e7abafd445a0c1a12
-
SHA1
8d1dc05ab88b4feda6984f5db8c93ae9797067e9
-
SHA256
a8b0a923d7a3c0b4f4bf9c576d9f41af4fe8cfab022d60d26e889ff58e2a3e71
-
SHA512
d996ae803369f0255b11f9044c0de245e750d1c094fcdfe6c7e6fb0e66c39912a46416928c2966f483ec28ee0dd266ae3e23fc19ce9f8d62f4572354bca0d792
-
SSDEEP
98304:N5Di+wStwXYACgIrWyi0Fj00CApYThTSPrg26LWjvcgVBN:N5Di+H8YAVedF4hApYJsg24Wj0gVn
Malware Config
Extracted
redline
1222-55000
193.233.132.72:36295
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/2608-54-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/2608-52-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/2608-50-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/2608-46-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/2608-45-0x0000000000400000-0x0000000000452000-memory.dmp family_redline -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a8b0a923d7a3c0b4f4bf9c576d9f41af4fe8cfab022d60d26e889ff58e2a3e71.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a8b0a923d7a3c0b4f4bf9c576d9f41af4fe8cfab022d60d26e889ff58e2a3e71.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a8b0a923d7a3c0b4f4bf9c576d9f41af4fe8cfab022d60d26e889ff58e2a3e71.exe -
Loads dropped DLL 1 IoCs
pid Process 1244 a8b0a923d7a3c0b4f4bf9c576d9f41af4fe8cfab022d60d26e889ff58e2a3e71.exe -
resource yara_rule behavioral1/memory/1244-26-0x00000000009B0000-0x00000000012AA000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA a8b0a923d7a3c0b4f4bf9c576d9f41af4fe8cfab022d60d26e889ff58e2a3e71.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1244 a8b0a923d7a3c0b4f4bf9c576d9f41af4fe8cfab022d60d26e889ff58e2a3e71.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1244 set thread context of 2608 1244 a8b0a923d7a3c0b4f4bf9c576d9f41af4fe8cfab022d60d26e889ff58e2a3e71.exe 28 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1244 a8b0a923d7a3c0b4f4bf9c576d9f41af4fe8cfab022d60d26e889ff58e2a3e71.exe 2608 jsc.exe 2608 jsc.exe 2608 jsc.exe 2608 jsc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2608 jsc.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2952 1244 a8b0a923d7a3c0b4f4bf9c576d9f41af4fe8cfab022d60d26e889ff58e2a3e71.exe 29 PID 1244 wrote to memory of 2952 1244 a8b0a923d7a3c0b4f4bf9c576d9f41af4fe8cfab022d60d26e889ff58e2a3e71.exe 29 PID 1244 wrote to memory of 2952 1244 a8b0a923d7a3c0b4f4bf9c576d9f41af4fe8cfab022d60d26e889ff58e2a3e71.exe 29 PID 1244 wrote to memory of 2952 1244 a8b0a923d7a3c0b4f4bf9c576d9f41af4fe8cfab022d60d26e889ff58e2a3e71.exe 29 PID 1244 wrote to memory of 2608 1244 a8b0a923d7a3c0b4f4bf9c576d9f41af4fe8cfab022d60d26e889ff58e2a3e71.exe 28 PID 1244 wrote to memory of 2608 1244 a8b0a923d7a3c0b4f4bf9c576d9f41af4fe8cfab022d60d26e889ff58e2a3e71.exe 28 PID 1244 wrote to memory of 2608 1244 a8b0a923d7a3c0b4f4bf9c576d9f41af4fe8cfab022d60d26e889ff58e2a3e71.exe 28 PID 1244 wrote to memory of 2608 1244 a8b0a923d7a3c0b4f4bf9c576d9f41af4fe8cfab022d60d26e889ff58e2a3e71.exe 28 PID 1244 wrote to memory of 2608 1244 a8b0a923d7a3c0b4f4bf9c576d9f41af4fe8cfab022d60d26e889ff58e2a3e71.exe 28 PID 1244 wrote to memory of 2608 1244 a8b0a923d7a3c0b4f4bf9c576d9f41af4fe8cfab022d60d26e889ff58e2a3e71.exe 28 PID 1244 wrote to memory of 2608 1244 a8b0a923d7a3c0b4f4bf9c576d9f41af4fe8cfab022d60d26e889ff58e2a3e71.exe 28 PID 1244 wrote to memory of 2608 1244 a8b0a923d7a3c0b4f4bf9c576d9f41af4fe8cfab022d60d26e889ff58e2a3e71.exe 28 PID 1244 wrote to memory of 2608 1244 a8b0a923d7a3c0b4f4bf9c576d9f41af4fe8cfab022d60d26e889ff58e2a3e71.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8b0a923d7a3c0b4f4bf9c576d9f41af4fe8cfab022d60d26e889ff58e2a3e71.exe"C:\Users\Admin\AppData\Local\Temp\a8b0a923d7a3c0b4f4bf9c576d9f41af4fe8cfab022d60d26e889ff58e2a3e71.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2608
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe2⤵PID:2952
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5f37b0574c9f51b13af10d0a4ae198919
SHA14bf5af5a2d506e22693fd56b2e8621a16ac9fc5d
SHA2565a810b5b92454ac6cbacc5b6a4f1689c2e7373f2ac8f60d6f44898e9f7a7ecb7
SHA5122da00df4f88ffa3d3f0dfd913313553bf7d7f7713b6ea195a67d33772d5f0bc541ab58651a29a2c1fde451c5b9aa7582bc6590b5a42c746a65df5b326598f768