Analysis
-
max time kernel
143s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 05:39
Static task
static1
Behavioral task
behavioral1
Sample
Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe
Resource
win10v2004-20231215-en
General
-
Target
Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe
-
Size
413KB
-
MD5
8b549dd5d9bd265f5c2f660128ca0416
-
SHA1
e30b5ff421c81114fc5f4e6d9fe52d201b4486a5
-
SHA256
468b604307b567958f106df5a1503da9ce04390eda7c83f67bc38d08a09156f0
-
SHA512
3441562ee73483eccc1f4eba9449f49a0248b5908b0f1b817bd166c78dcafe6235c4fee7989a8b0e4f9ceece52c92cd48c2df11d3bd418b32648b613f7658f25
-
SSDEEP
6144:3l6C3WQk+iM53X+FduVXUCB5EU7hbBNrVO+DSLbyVnygTClugS+EI:3p9iMtX+6TLEUNb3rI+DSInTTC0gS+EI
Malware Config
Extracted
redline
W118
77.73.134.2:4427
-
auth_value
709a90bfc5899237ba049ee1a7dec425
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Extensions\exe = "1" Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe = "0" Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Extensions Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe -
Nirsoft 1 IoCs
resource yara_rule behavioral2/files/0x000d000000023104-14.dat Nirsoft -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation AdvancedRun.exe -
Executes dropped EXE 3 IoCs
pid Process 3944 AdvancedRun.exe 2584 3b181df5-de77-4ead-af5a-55f0525950ef.exe 1852 AdvancedRun.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Extensions\exe = "1" Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Local\Temp\Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe = "0" Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Extensions Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4476 set thread context of 1812 4476 Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe 102 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\Tril5bal.raw Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 4476 Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe 4476 Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe 4476 Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe 4476 Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe 3944 AdvancedRun.exe 3944 AdvancedRun.exe 3944 AdvancedRun.exe 3944 AdvancedRun.exe 4476 Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe 4476 Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe 4476 Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe 4476 Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe 4252 powershell.exe 4252 powershell.exe 3656 powershell.exe 3656 powershell.exe 512 powershell.exe 512 powershell.exe 1852 AdvancedRun.exe 1852 AdvancedRun.exe 1852 AdvancedRun.exe 1852 AdvancedRun.exe 4252 powershell.exe 3656 powershell.exe 512 powershell.exe 4476 Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe 4476 Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 4476 Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe Token: SeDebugPrivilege 3944 AdvancedRun.exe Token: SeImpersonatePrivilege 3944 AdvancedRun.exe Token: SeDebugPrivilege 4252 powershell.exe Token: SeDebugPrivilege 512 powershell.exe Token: SeTakeOwnershipPrivilege 2584 3b181df5-de77-4ead-af5a-55f0525950ef.exe Token: SeDebugPrivilege 3656 powershell.exe Token: SeDebugPrivilege 1852 AdvancedRun.exe Token: SeImpersonatePrivilege 1852 AdvancedRun.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 4476 wrote to memory of 2584 4476 Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe 97 PID 4476 wrote to memory of 2584 4476 Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe 97 PID 4476 wrote to memory of 3944 4476 Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe 98 PID 4476 wrote to memory of 3944 4476 Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe 98 PID 4476 wrote to memory of 3944 4476 Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe 98 PID 4476 wrote to memory of 4252 4476 Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe 96 PID 4476 wrote to memory of 4252 4476 Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe 96 PID 4476 wrote to memory of 4252 4476 Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe 96 PID 4476 wrote to memory of 512 4476 Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe 95 PID 4476 wrote to memory of 512 4476 Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe 95 PID 4476 wrote to memory of 512 4476 Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe 95 PID 4476 wrote to memory of 3656 4476 Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe 99 PID 4476 wrote to memory of 3656 4476 Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe 99 PID 4476 wrote to memory of 3656 4476 Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe 99 PID 4476 wrote to memory of 1812 4476 Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe 102 PID 4476 wrote to memory of 1812 4476 Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe 102 PID 4476 wrote to memory of 1812 4476 Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe 102 PID 4476 wrote to memory of 1812 4476 Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe 102 PID 4476 wrote to memory of 1812 4476 Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe 102 PID 4476 wrote to memory of 1812 4476 Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe 102 PID 4476 wrote to memory of 1812 4476 Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe 102 PID 4476 wrote to memory of 1812 4476 Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe 102 PID 3944 wrote to memory of 1852 3944 AdvancedRun.exe 103 PID 3944 wrote to memory of 1852 3944 AdvancedRun.exe 103 PID 3944 wrote to memory of 1852 3944 AdvancedRun.exe 103 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe"1⤵
- UAC bypass
- Windows security bypass
- Checks computer location settings
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4476 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionExtension "exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:512
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4252
-
-
C:\Users\Admin\AppData\Local\Temp\01072950-83c0-4449-8845-d6552589f811\3b181df5-de77-4ead-af5a-55f0525950ef.exe"C:\Users\Admin\AppData\Local\Temp\01072950-83c0-4449-8845-d6552589f811\3b181df5-de77-4ead-af5a-55f0525950ef.exe" /o /c "Windows-Defender" /r2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2584
-
-
C:\Users\Admin\AppData\Local\Temp\01072950-83c0-4449-8845-d6552589f811\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\01072950-83c0-4449-8845-d6552589f811\AdvancedRun.exe" /EXEFilename "C:\Users\Admin\AppData\Local\Temp\01072950-83c0-4449-8845-d6552589f811\test.bat" /WindowState ""0"" /PriorityClass ""32"" /CommandLine "" /StartDirectory "" /RunAs 8 /Run2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\01072950-83c0-4449-8845-d6552589f811\AdvancedRun.exe"C:\Users\Admin\AppData\Local\Temp\01072950-83c0-4449-8845-d6552589f811\AdvancedRun.exe" /SpecialRun 4101d8 39443⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe" -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3656
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft.VisualStudio.Web.Publish.Contracts.dll.exe"2⤵PID:1812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\01072950-83c0-4449-8845-d6552589f811\3b181df5-de77-4ead-af5a-55f0525950ef.exe
Filesize25KB
MD55951b52c9b4d11ca7f4f33e5a3fb2c31
SHA10bc54fd699fff7b93e5c447a141c0d904924ab0d
SHA25670b785e5cb5b2e61c0f5da4a71ab0bbd14d9a0849387f037e0d75cc1ffe0a082
SHA51230b3b1eed05ba724d9a19d0d301b6ffb45222a47cc5476cc7f61ae565ddea4deea669f6fc3f38a1c5f24396eb4d3d6a7a8b58992fdfe2fac57dbcc2fa5b9b1d8
-
Filesize
88KB
MD517fc12902f4769af3a9271eb4e2dacce
SHA19a4a1581cc3971579574f837e110f3bd6d529dab
SHA25629ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b
SHA512036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a