Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 09:07
Static task
static1
Behavioral task
behavioral1
Sample
ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe
Resource
win10v2004-20241007-en
General
-
Target
ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe
-
Size
1.9MB
-
MD5
223e24da769c85a796a8699e59ea0230
-
SHA1
a4d481a01f238156f685f43ffbe5729671c195a6
-
SHA256
ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05
-
SHA512
379659631608fad8ef8e343acf39396c4f0841fa92b4613be707155ac96f1129b4343e14477e88578f1e716a9f4130da91cc0d51d5b22603ead9ff917d3703fc
-
SSDEEP
49152:QfVl2iMzzVhHVsX0NLFtP6O83XxPR7FIYNMIc8qH3Lc:qlezzV1VsXyLFtP61HxzIYNM7JA
Malware Config
Extracted
redline
1
138.124.180.59:88
Signatures
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ chrome.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion chrome.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe -
Executes dropped EXE 1 IoCs
pid Process 3892 chrome.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine chrome.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA chrome.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe File opened for modification \??\PhysicalDrive0 chrome.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2940 ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe 3892 chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chrome.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1512 cmd.exe 3996 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3996 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2940 ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe 2940 ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe 3892 chrome.exe 3892 chrome.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3892 chrome.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2940 wrote to memory of 3892 2940 ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe 83 PID 2940 wrote to memory of 3892 2940 ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe 83 PID 2940 wrote to memory of 3892 2940 ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe 83 PID 2940 wrote to memory of 1512 2940 ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe 84 PID 2940 wrote to memory of 1512 2940 ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe 84 PID 2940 wrote to memory of 1512 2940 ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe 84 PID 1512 wrote to memory of 3996 1512 cmd.exe 86 PID 1512 wrote to memory of 3996 1512 cmd.exe 86 PID 1512 wrote to memory of 3996 1512 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe"C:\Users\Admin\AppData\Local\Temp\ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\chrome.exe"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\chrome.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3892
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ping 127.0.0.1 -n 3 > nul & del "C:\Users\Admin\AppData\Local\Temp\ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05N.exe"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 33⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3996
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD5036394f55820e4d4f2d9d06bdb8885ab
SHA1d3340d7274bf6d61cf195a1feb331d37340a9965
SHA256cfbb743f9acd81740576b271189f400cfd5fbc9983bac8d93f4bee63e272a1f3
SHA512e8bd2593067f4709d588451fcd1954e57bd239fb403209b1512c56623f85b862c6b16dbf939c343090334f80567ec8061abcac3b86e0792019b1b3db6f171585
-
Filesize
1.9MB
MD5223e24da769c85a796a8699e59ea0230
SHA1a4d481a01f238156f685f43ffbe5729671c195a6
SHA256ec9e30b1ba29e21f37aa0a5c6d85fd31306bfab80527b74d9a246aabb218bc05
SHA512379659631608fad8ef8e343acf39396c4f0841fa92b4613be707155ac96f1129b4343e14477e88578f1e716a9f4130da91cc0d51d5b22603ead9ff917d3703fc