Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 09:07
Static task
static1
Behavioral task
behavioral1
Sample
ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe
Resource
win10v2004-20241007-en
General
-
Target
ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe
-
Size
1.9MB
-
MD5
223e24da769c85a796a8699e59ea0230
-
SHA1
a4d481a01f238156f685f43ffbe5729671c195a6
-
SHA256
ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05
-
SHA512
379659631608fad8ef8e343acf39396c4f0841fa92b4613be707155ac96f1129b4343e14477e88578f1e716a9f4130da91cc0d51d5b22603ead9ff917d3703fc
-
SSDEEP
49152:QfVl2iMzzVhHVsX0NLFtP6O83XxPR7FIYNMIc8qH3Lc:qlezzV1VsXyLFtP61HxzIYNM7JA
Malware Config
Extracted
redline
1
138.124.180.59:88
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ chrome.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe -
Deletes itself 1 IoCs
pid Process 2696 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2484 chrome.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine chrome.exe -
Loads dropped DLL 2 IoCs
pid Process 2816 ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe 2816 ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA chrome.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe File opened for modification \??\PhysicalDrive0 chrome.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2816 ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe 2484 chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chrome.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2696 cmd.exe 2832 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2832 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2816 ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe 2484 chrome.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2484 chrome.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2816 wrote to memory of 2484 2816 ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe 30 PID 2816 wrote to memory of 2484 2816 ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe 30 PID 2816 wrote to memory of 2484 2816 ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe 30 PID 2816 wrote to memory of 2484 2816 ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe 30 PID 2816 wrote to memory of 2696 2816 ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe 31 PID 2816 wrote to memory of 2696 2816 ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe 31 PID 2816 wrote to memory of 2696 2816 ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe 31 PID 2816 wrote to memory of 2696 2816 ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe 31 PID 2696 wrote to memory of 2832 2696 cmd.exe 33 PID 2696 wrote to memory of 2832 2696 cmd.exe 33 PID 2696 wrote to memory of 2832 2696 cmd.exe 33 PID 2696 wrote to memory of 2832 2696 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe"C:\Users\Admin\AppData\Local\Temp\ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\chrome.exe"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\chrome.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2484
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ping 127.0.0.1 -n 3 > nul & del "C:\Users\Admin\AppData\Local\Temp\ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 33⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2832
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD5036394f55820e4d4f2d9d06bdb8885ab
SHA1d3340d7274bf6d61cf195a1feb331d37340a9965
SHA256cfbb743f9acd81740576b271189f400cfd5fbc9983bac8d93f4bee63e272a1f3
SHA512e8bd2593067f4709d588451fcd1954e57bd239fb403209b1512c56623f85b862c6b16dbf939c343090334f80567ec8061abcac3b86e0792019b1b3db6f171585
-
Filesize
1.9MB
MD5223e24da769c85a796a8699e59ea0230
SHA1a4d481a01f238156f685f43ffbe5729671c195a6
SHA256ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05
SHA512379659631608fad8ef8e343acf39396c4f0841fa92b4613be707155ac96f1129b4343e14477e88578f1e716a9f4130da91cc0d51d5b22603ead9ff917d3703fc