Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 01:45
Static task
static1
Behavioral task
behavioral1
Sample
asd/HackLoader.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
asd/HackLoader.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
asd/asd.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
asd/asd.exe
Resource
win10v2004-20241007-en
General
-
Target
asd/asd.exe
-
Size
1.9MB
-
MD5
cc534308f17c36ccc99b06fc2d871b88
-
SHA1
2b48a106d38be3dae4add81ac4a78deece210e4d
-
SHA256
c68189a418b307e204e8771acc84d9d5cec0d1f9aa2c1290208fa15a9fdda017
-
SHA512
ffa32e4e536aa2eb6d1aec5dca72258d5fe4ccba005601d43c0fd3feda0a4e9bdbc23775fd28deec8702c4db7ce07e181f5ab77d6b5546d4087748b6d6d03289
-
SSDEEP
49152:ufVl2iMzzVhHVsX0NLFtP6O83XxPR7FIYNMIc8qH3Lc:IlezzV1VsXyLFtP61HxzIYNM7JA
Malware Config
Extracted
redline
1
138.124.180.59:88
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ asd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ chrome.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion asd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion asd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion chrome.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation asd.exe -
Executes dropped EXE 1 IoCs
pid Process 2012 chrome.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine asd.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine chrome.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA chrome.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA asd.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 chrome.exe File opened for modification \??\PhysicalDrive0 asd.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1836 asd.exe 2012 chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chrome.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2980 cmd.exe 3956 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3956 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1836 asd.exe 1836 asd.exe 2012 chrome.exe 2012 chrome.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2012 chrome.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1836 wrote to memory of 2012 1836 asd.exe 86 PID 1836 wrote to memory of 2012 1836 asd.exe 86 PID 1836 wrote to memory of 2012 1836 asd.exe 86 PID 1836 wrote to memory of 2980 1836 asd.exe 87 PID 1836 wrote to memory of 2980 1836 asd.exe 87 PID 1836 wrote to memory of 2980 1836 asd.exe 87 PID 2980 wrote to memory of 3956 2980 cmd.exe 89 PID 2980 wrote to memory of 3956 2980 cmd.exe 89 PID 2980 wrote to memory of 3956 2980 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\asd\asd.exe"C:\Users\Admin\AppData\Local\Temp\asd\asd.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\chrome.exe"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\chrome.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2012
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ping 127.0.0.1 -n 3 > nul & del "C:\Users\Admin\AppData\Local\Temp\asd\asd.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 33⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3956
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD5036394f55820e4d4f2d9d06bdb8885ab
SHA1d3340d7274bf6d61cf195a1feb331d37340a9965
SHA256cfbb743f9acd81740576b271189f400cfd5fbc9983bac8d93f4bee63e272a1f3
SHA512e8bd2593067f4709d588451fcd1954e57bd239fb403209b1512c56623f85b862c6b16dbf939c343090334f80567ec8061abcac3b86e0792019b1b3db6f171585
-
Filesize
1.9MB
MD5cc534308f17c36ccc99b06fc2d871b88
SHA12b48a106d38be3dae4add81ac4a78deece210e4d
SHA256c68189a418b307e204e8771acc84d9d5cec0d1f9aa2c1290208fa15a9fdda017
SHA512ffa32e4e536aa2eb6d1aec5dca72258d5fe4ccba005601d43c0fd3feda0a4e9bdbc23775fd28deec8702c4db7ce07e181f5ab77d6b5546d4087748b6d6d03289