Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09-11-2024 01:45
Static task
static1
Behavioral task
behavioral1
Sample
asd/HackLoader.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
asd/HackLoader.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
asd/asd.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
asd/asd.exe
Resource
win10v2004-20241007-en
General
-
Target
asd/asd.exe
-
Size
1.9MB
-
MD5
cc534308f17c36ccc99b06fc2d871b88
-
SHA1
2b48a106d38be3dae4add81ac4a78deece210e4d
-
SHA256
c68189a418b307e204e8771acc84d9d5cec0d1f9aa2c1290208fa15a9fdda017
-
SHA512
ffa32e4e536aa2eb6d1aec5dca72258d5fe4ccba005601d43c0fd3feda0a4e9bdbc23775fd28deec8702c4db7ce07e181f5ab77d6b5546d4087748b6d6d03289
-
SSDEEP
49152:ufVl2iMzzVhHVsX0NLFtP6O83XxPR7FIYNMIc8qH3Lc:IlezzV1VsXyLFtP61HxzIYNM7JA
Malware Config
Extracted
redline
1
138.124.180.59:88
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ asd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ chrome.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion asd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion asd.exe -
Deletes itself 1 IoCs
pid Process 2848 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2712 chrome.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine asd.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine chrome.exe -
Loads dropped DLL 2 IoCs
pid Process 2544 asd.exe 2544 asd.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA asd.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA chrome.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 asd.exe File opened for modification \??\PhysicalDrive0 chrome.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2544 asd.exe 2712 chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chrome.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2760 PING.EXE 2848 cmd.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2760 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2544 asd.exe 2712 chrome.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2712 chrome.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2712 2544 asd.exe 29 PID 2544 wrote to memory of 2712 2544 asd.exe 29 PID 2544 wrote to memory of 2712 2544 asd.exe 29 PID 2544 wrote to memory of 2712 2544 asd.exe 29 PID 2544 wrote to memory of 2848 2544 asd.exe 30 PID 2544 wrote to memory of 2848 2544 asd.exe 30 PID 2544 wrote to memory of 2848 2544 asd.exe 30 PID 2544 wrote to memory of 2848 2544 asd.exe 30 PID 2848 wrote to memory of 2760 2848 cmd.exe 32 PID 2848 wrote to memory of 2760 2848 cmd.exe 32 PID 2848 wrote to memory of 2760 2848 cmd.exe 32 PID 2848 wrote to memory of 2760 2848 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\asd\asd.exe"C:\Users\Admin\AppData\Local\Temp\asd\asd.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\chrome.exe"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\chrome.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ping 127.0.0.1 -n 3 > nul & del "C:\Users\Admin\AppData\Local\Temp\asd\asd.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 33⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2760
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD5036394f55820e4d4f2d9d06bdb8885ab
SHA1d3340d7274bf6d61cf195a1feb331d37340a9965
SHA256cfbb743f9acd81740576b271189f400cfd5fbc9983bac8d93f4bee63e272a1f3
SHA512e8bd2593067f4709d588451fcd1954e57bd239fb403209b1512c56623f85b862c6b16dbf939c343090334f80567ec8061abcac3b86e0792019b1b3db6f171585
-
Filesize
1.9MB
MD5cc534308f17c36ccc99b06fc2d871b88
SHA12b48a106d38be3dae4add81ac4a78deece210e4d
SHA256c68189a418b307e204e8771acc84d9d5cec0d1f9aa2c1290208fa15a9fdda017
SHA512ffa32e4e536aa2eb6d1aec5dca72258d5fe4ccba005601d43c0fd3feda0a4e9bdbc23775fd28deec8702c4db7ce07e181f5ab77d6b5546d4087748b6d6d03289