Analysis

  • max time kernel
    149s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    14-05-2024 01:39

General

  • Target

    bb762ded17b408634ecd0675d9e823cebd7984cca8cfc53afe5f3665cde3dee6.exe

  • Size

    95KB

  • MD5

    735c15c37831cdc319c03f4f7971da49

  • SHA1

    166949cdb534d97c564adc27f297406a4bf38204

  • SHA256

    bb762ded17b408634ecd0675d9e823cebd7984cca8cfc53afe5f3665cde3dee6

  • SHA512

    3c9227b9472d7840f74363b9801756923de56fcff5349f6e287206531c0da4717a9de520322d122bef30f7b66fdbeaac715ebbe64389de89b1c7d5e832e87ac8

  • SSDEEP

    1536:9qskXqrzWBlbG6jejoigI343Ywzi0Zb78ivombfexv0ujXyyed2OtmulgS6pY:rCgzWHY3+zi0ZbYe1g0ujyzd6Y

Malware Config

Extracted

Family

redline

Botnet

exodus

C2

94.156.8.229:1334

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 1 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs. 1 IoCs
  • UPX dump on OEP (original entry point) 17 IoCs
  • XMRig Miner payload 13 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 2 IoCs
  • Stops running service(s) 4 TTPs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 18 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Launches sc.exe 14 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb762ded17b408634ecd0675d9e823cebd7984cca8cfc53afe5f3665cde3dee6.exe
    "C:\Users\Admin\AppData\Local\Temp\bb762ded17b408634ecd0675d9e823cebd7984cca8cfc53afe5f3665cde3dee6.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Users\Admin\AppData\Local\Temp\east.exe
      "C:\Users\Admin\AppData\Local\Temp\east.exe"
      2⤵
      • Drops file in Drivers directory
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      PID:1556
      • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2284
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2076
        • C:\Windows\system32\wusa.exe
          wusa /uninstall /kb:890830 /quiet /norestart
          4⤵
          • Drops file in Windows directory
          PID:1480
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop UsoSvc
        3⤵
        • Launches sc.exe
        PID:572
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop WaaSMedicSvc
        3⤵
        • Launches sc.exe
        PID:944
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop wuauserv
        3⤵
        • Launches sc.exe
        PID:2304
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop bits
        3⤵
        • Launches sc.exe
        PID:1152
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop dosvc
        3⤵
        • Launches sc.exe
        PID:876
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2368
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2268
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2340
      • C:\Windows\system32\powercfg.exe
        C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2392
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe delete "GoogleUpdateTaskMachineQC"
        3⤵
        • Launches sc.exe
        PID:1764
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe create "GoogleUpdateTaskMachineQC" binpath= "C:\ProgramData\Google\Chrome\updater.exe" start= "auto"
        3⤵
        • Launches sc.exe
        PID:1596
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe stop eventlog
        3⤵
        • Launches sc.exe
        PID:1932
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start "GoogleUpdateTaskMachineQC"
        3⤵
        • Launches sc.exe
        PID:1612
  • C:\ProgramData\Google\Chrome\updater.exe
    C:\ProgramData\Google\Chrome\updater.exe
    1⤵
    • Drops file in Drivers directory
    • Executes dropped EXE
    • Drops file in System32 directory
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2336
    • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Drops file in System32 directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2332
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2272
      • C:\Windows\system32\wusa.exe
        wusa /uninstall /kb:890830 /quiet /norestart
        3⤵
        • Drops file in Windows directory
        PID:2888
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe stop UsoSvc
      2⤵
      • Launches sc.exe
      PID:2936
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe stop WaaSMedicSvc
      2⤵
      • Launches sc.exe
      PID:2176
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe stop wuauserv
      2⤵
      • Launches sc.exe
      PID:2044
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe stop bits
      2⤵
      • Launches sc.exe
      PID:2204
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe stop dosvc
      2⤵
      • Launches sc.exe
      PID:2108
    • C:\Windows\system32\powercfg.exe
      C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2016
    • C:\Windows\system32\powercfg.exe
      C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1820
    • C:\Windows\system32\powercfg.exe
      C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3064
    • C:\Windows\system32\powercfg.exe
      C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2824
    • C:\Windows\system32\conhost.exe
      C:\Windows\system32\conhost.exe
      2⤵
        PID:2068
      • C:\Windows\explorer.exe
        explorer.exe
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2636

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Command and Scripting Interpreter

    1
    T1059

    PowerShell

    1
    T1059.001

    System Services

    2
    T1569

    Service Execution

    2
    T1569.002

    Persistence

    Create or Modify System Process

    2
    T1543

    Windows Service

    2
    T1543.003

    Privilege Escalation

    Create or Modify System Process

    2
    T1543

    Windows Service

    2
    T1543.003

    Defense Evasion

    Impair Defenses

    1
    T1562

    Subvert Trust Controls

    1
    T1553

    Install Root Certificate

    1
    T1553.004

    Modify Registry

    1
    T1112

    Credential Access

    Unsecured Credentials

    2
    T1552

    Credentials In Files

    2
    T1552.001

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    2
    T1005

    Impact

    Service Stop

    1
    T1489

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      83a25d913b9e63ea02a7b5c6bdae4f71

      SHA1

      47e3ef11e376fb6d0df4254316c6564b3efbd579

      SHA256

      6284f9b5fe7220791f7e0b64ebd8d1216e14e02c96a81a476ce6182f26e1b099

      SHA512

      66f70ab17116d555b3668c34e715a9e0aa6c9944b52577b14c279111183652528fa515e4562f93bbadbca3b57701991f8de692fa515a1a5c974013ba12021905

    • C:\Users\Admin\AppData\Local\Temp\Cab3B8C.tmp
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\Tar3FC3.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Users\Admin\AppData\Local\Temp\tmp46C1.tmp
      Filesize

      46KB

      MD5

      02d2c46697e3714e49f46b680b9a6b83

      SHA1

      84f98b56d49f01e9b6b76a4e21accf64fd319140

      SHA256

      522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9

      SHA512

      60348a145bfc71b1e07cb35fa79ab5ff472a3d0a557741ea2d39b3772bc395b86e261bd616f65307ae0d997294e49b5548d32f11e86ef3e2704959ca63da8aac

    • C:\Users\Admin\AppData\Local\Temp\tmp46E6.tmp
      Filesize

      92KB

      MD5

      d45b32a69554239e2df99241a8bde05f

      SHA1

      badc4c0d437a578947a744fd57e0189639609c1f

      SHA256

      a5b5c18640f9de53293b9914874824490b65522e1c8d91b2b0abfcd09719747c

      SHA512

      406b39c28e134fa6161e7efd777091a11af55a473e4a0d71f7733632337483d36801bd828879a593d45ddd2769a1d1aef3e7e7b1b7583104481bd9168496fe50

    • C:\Windows\system32\drivers\etc\hosts
      Filesize

      2KB

      MD5

      3e9af076957c5b2f9c9ce5ec994bea05

      SHA1

      a8c7326f6bceffaeed1c2bb8d7165e56497965fe

      SHA256

      e332ebfed27e0bb08b84dfda05acc7f0fa1b6281678e0120c5b7c893a75df47e

      SHA512

      933ba0d69e7b78537348c0dc1bf83fb069f98bb93d31c638dc79c4a48d12d879c474bd61e3cbde44622baef5e20fb92ebf16c66128672e4a6d4ee20afbf9d01f

    • \Users\Admin\AppData\Local\Temp\east.exe
      Filesize

      5.1MB

      MD5

      53fc8153edf492734d97158afd8644a5

      SHA1

      682296b14eddb32ccadaaecc098b497539393b94

      SHA256

      0cbef477e60c59c62f64fe6760ebcf4325c479a957a5622a66feabb0cf50befc

      SHA512

      bda8742db17f89534e2c8a3c53a14d31cb52179cfe06bf24114690046eae42ccb67394e054eb4a53df28b0e0ff5a7ebeb2d23c809b7d40579d988a695c3981eb

    • memory/2068-166-0x0000000140000000-0x000000014000E000-memory.dmp
      Filesize

      56KB

    • memory/2068-164-0x0000000140000000-0x000000014000E000-memory.dmp
      Filesize

      56KB

    • memory/2068-167-0x0000000140000000-0x000000014000E000-memory.dmp
      Filesize

      56KB

    • memory/2068-171-0x0000000140000000-0x000000014000E000-memory.dmp
      Filesize

      56KB

    • memory/2068-165-0x0000000140000000-0x000000014000E000-memory.dmp
      Filesize

      56KB

    • memory/2068-168-0x0000000140000000-0x000000014000E000-memory.dmp
      Filesize

      56KB

    • memory/2284-153-0x0000000002720000-0x0000000002728000-memory.dmp
      Filesize

      32KB

    • memory/2284-152-0x000000001B4F0000-0x000000001B7D2000-memory.dmp
      Filesize

      2.9MB

    • memory/2332-161-0x0000000000950000-0x0000000000958000-memory.dmp
      Filesize

      32KB

    • memory/2332-160-0x0000000019EB0000-0x000000001A192000-memory.dmp
      Filesize

      2.9MB

    • memory/2408-1-0x0000000001090000-0x00000000010AE000-memory.dmp
      Filesize

      120KB

    • memory/2408-2-0x0000000074DF0000-0x00000000754DE000-memory.dmp
      Filesize

      6.9MB

    • memory/2408-147-0x0000000074DF0000-0x00000000754DE000-memory.dmp
      Filesize

      6.9MB

    • memory/2408-0-0x0000000074DFE000-0x0000000074DFF000-memory.dmp
      Filesize

      4KB

    • memory/2636-174-0x0000000140000000-0x0000000140848000-memory.dmp
      Filesize

      8.3MB

    • memory/2636-175-0x0000000140000000-0x0000000140848000-memory.dmp
      Filesize

      8.3MB

    • memory/2636-179-0x0000000140000000-0x0000000140848000-memory.dmp
      Filesize

      8.3MB

    • memory/2636-178-0x0000000140000000-0x0000000140848000-memory.dmp
      Filesize

      8.3MB

    • memory/2636-176-0x0000000140000000-0x0000000140848000-memory.dmp
      Filesize

      8.3MB

    • memory/2636-180-0x00000000000B0000-0x00000000000D0000-memory.dmp
      Filesize

      128KB

    • memory/2636-173-0x0000000140000000-0x0000000140848000-memory.dmp
      Filesize

      8.3MB

    • memory/2636-177-0x0000000140000000-0x0000000140848000-memory.dmp
      Filesize

      8.3MB

    • memory/2636-181-0x0000000140000000-0x0000000140848000-memory.dmp
      Filesize

      8.3MB

    • memory/2636-185-0x0000000140000000-0x0000000140848000-memory.dmp
      Filesize

      8.3MB

    • memory/2636-184-0x0000000140000000-0x0000000140848000-memory.dmp
      Filesize

      8.3MB

    • memory/2636-183-0x0000000140000000-0x0000000140848000-memory.dmp
      Filesize

      8.3MB

    • memory/2636-182-0x0000000140000000-0x0000000140848000-memory.dmp
      Filesize

      8.3MB

    • memory/2636-186-0x0000000140000000-0x0000000140848000-memory.dmp
      Filesize

      8.3MB

    • memory/2636-187-0x0000000140000000-0x0000000140848000-memory.dmp
      Filesize

      8.3MB

    • memory/2636-188-0x0000000140000000-0x0000000140848000-memory.dmp
      Filesize

      8.3MB

    • memory/2636-189-0x0000000140000000-0x0000000140848000-memory.dmp
      Filesize

      8.3MB

    • memory/2636-190-0x0000000140000000-0x0000000140848000-memory.dmp
      Filesize

      8.3MB

    • memory/2636-191-0x0000000140000000-0x0000000140848000-memory.dmp
      Filesize

      8.3MB