Analysis
-
max time kernel
175s -
max time network
186s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:52
Static task
static1
Behavioral task
behavioral1
Sample
6fb4b196fcbce9856ff0099ab2108c7a7b0ecce86b133d0eb30f9c2e0010d9c5.exe
Resource
win10v2004-20220812-en
General
-
Target
6fb4b196fcbce9856ff0099ab2108c7a7b0ecce86b133d0eb30f9c2e0010d9c5.exe
-
Size
244KB
-
MD5
02e6fcd8c1d944ba73de12e389ab314e
-
SHA1
b9969fb9fe35a7d16906ba5cc7d3e457d9cbf24c
-
SHA256
6fb4b196fcbce9856ff0099ab2108c7a7b0ecce86b133d0eb30f9c2e0010d9c5
-
SHA512
4eafa4708cd2934186e883f630196dc88c6dc78a2db6bfa3a8628fe9f212297db032458ec7df4a3e3d1e6f6d9c570e55d320bce64beaf3cd1b889700b283836d
-
SSDEEP
3072:vBkA20emdYBLD/80PW8pD56fpTAe+UyVkMf4DWFsyUf0S1gZICyYp2bkuiWRL:WApwLDE0PPqBTAe3WF/UfTCwbd5
Malware Config
Extracted
amadey
3.50
193.56.146.194/h49vlBP/index.php
Extracted
redline
novr
31.41.244.14:4694
-
auth_value
34ddf4eb9326256f20a48cd5f1e9b496
Signatures
-
Detect Amadey credential stealer module 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll amadey_cred_module C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll amadey_cred_module -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1000121001\lada.exe family_redline C:\Users\Admin\AppData\Local\Temp\1000121001\lada.exe family_redline behavioral1/memory/2476-146-0x0000000000990000-0x00000000009B8000-memory.dmp family_redline -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 28 332 rundll32.exe -
Downloads MZ/PE file
-
Executes dropped EXE 4 IoCs
Processes:
rovwer.exelada.exerovwer.exerovwer.exepid process 4768 rovwer.exe 2476 lada.exe 3172 rovwer.exe 4572 rovwer.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
6fb4b196fcbce9856ff0099ab2108c7a7b0ecce86b133d0eb30f9c2e0010d9c5.exerovwer.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation 6fb4b196fcbce9856ff0099ab2108c7a7b0ecce86b133d0eb30f9c2e0010d9c5.exe Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation rovwer.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 332 rundll32.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
rovwer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lada.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000121001\\lada.exe" rovwer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 3 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3808 3784 WerFault.exe 6fb4b196fcbce9856ff0099ab2108c7a7b0ecce86b133d0eb30f9c2e0010d9c5.exe 1296 3172 WerFault.exe rovwer.exe 3044 4572 WerFault.exe rovwer.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
lada.exerundll32.exepid process 2476 lada.exe 2476 lada.exe 332 rundll32.exe 332 rundll32.exe 332 rundll32.exe 332 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
lada.exedescription pid process Token: SeDebugPrivilege 2476 lada.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
6fb4b196fcbce9856ff0099ab2108c7a7b0ecce86b133d0eb30f9c2e0010d9c5.exerovwer.exedescription pid process target process PID 3784 wrote to memory of 4768 3784 6fb4b196fcbce9856ff0099ab2108c7a7b0ecce86b133d0eb30f9c2e0010d9c5.exe rovwer.exe PID 3784 wrote to memory of 4768 3784 6fb4b196fcbce9856ff0099ab2108c7a7b0ecce86b133d0eb30f9c2e0010d9c5.exe rovwer.exe PID 3784 wrote to memory of 4768 3784 6fb4b196fcbce9856ff0099ab2108c7a7b0ecce86b133d0eb30f9c2e0010d9c5.exe rovwer.exe PID 4768 wrote to memory of 4932 4768 rovwer.exe schtasks.exe PID 4768 wrote to memory of 4932 4768 rovwer.exe schtasks.exe PID 4768 wrote to memory of 4932 4768 rovwer.exe schtasks.exe PID 4768 wrote to memory of 2476 4768 rovwer.exe lada.exe PID 4768 wrote to memory of 2476 4768 rovwer.exe lada.exe PID 4768 wrote to memory of 2476 4768 rovwer.exe lada.exe PID 4768 wrote to memory of 332 4768 rovwer.exe rundll32.exe PID 4768 wrote to memory of 332 4768 rovwer.exe rundll32.exe PID 4768 wrote to memory of 332 4768 rovwer.exe rundll32.exe -
outlook_win_path 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fb4b196fcbce9856ff0099ab2108c7a7b0ecce86b133d0eb30f9c2e0010d9c5.exe"C:\Users\Admin\AppData\Local\Temp\6fb4b196fcbce9856ff0099ab2108c7a7b0ecce86b133d0eb30f9c2e0010d9c5.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN rovwer.exe /TR "C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe" /F3⤵
- Creates scheduled task(s)
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\1000121001\lada.exe"C:\Users\Admin\AppData\Local\Temp\1000121001\lada.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2476 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\bf045808586a24\cred64.dll, Main3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_win_path
PID:332 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3784 -s 11362⤵
- Program crash
PID:3808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3784 -ip 37841⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵
- Executes dropped EXE
PID:3172 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3172 -s 4162⤵
- Program crash
PID:1296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3172 -ip 31721⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exeC:\Users\Admin\AppData\Local\Temp\50c1695437\rovwer.exe1⤵
- Executes dropped EXE
PID:4572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4572 -s 4162⤵
- Program crash
PID:3044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4572 -ip 45721⤵PID:3540
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
137KB
MD5bae3fb566c191522bab2bde67c482767
SHA17da8b30a638ff9f943cf03b32a4f254273990708
SHA2563ed2170e83cce59a98471509fb4a84090f2ddcb38549a191663d5fbd05612e01
SHA512f9859aba46d440df5dd10059a95708acdd45cca36339867ee654c271f4bb065f6c58005eadadc9a954c35078986402d2f379d5cf3c10484c603ae262d38e1f46
-
Filesize
137KB
MD5bae3fb566c191522bab2bde67c482767
SHA17da8b30a638ff9f943cf03b32a4f254273990708
SHA2563ed2170e83cce59a98471509fb4a84090f2ddcb38549a191663d5fbd05612e01
SHA512f9859aba46d440df5dd10059a95708acdd45cca36339867ee654c271f4bb065f6c58005eadadc9a954c35078986402d2f379d5cf3c10484c603ae262d38e1f46
-
Filesize
244KB
MD502e6fcd8c1d944ba73de12e389ab314e
SHA1b9969fb9fe35a7d16906ba5cc7d3e457d9cbf24c
SHA2566fb4b196fcbce9856ff0099ab2108c7a7b0ecce86b133d0eb30f9c2e0010d9c5
SHA5124eafa4708cd2934186e883f630196dc88c6dc78a2db6bfa3a8628fe9f212297db032458ec7df4a3e3d1e6f6d9c570e55d320bce64beaf3cd1b889700b283836d
-
Filesize
244KB
MD502e6fcd8c1d944ba73de12e389ab314e
SHA1b9969fb9fe35a7d16906ba5cc7d3e457d9cbf24c
SHA2566fb4b196fcbce9856ff0099ab2108c7a7b0ecce86b133d0eb30f9c2e0010d9c5
SHA5124eafa4708cd2934186e883f630196dc88c6dc78a2db6bfa3a8628fe9f212297db032458ec7df4a3e3d1e6f6d9c570e55d320bce64beaf3cd1b889700b283836d
-
Filesize
244KB
MD502e6fcd8c1d944ba73de12e389ab314e
SHA1b9969fb9fe35a7d16906ba5cc7d3e457d9cbf24c
SHA2566fb4b196fcbce9856ff0099ab2108c7a7b0ecce86b133d0eb30f9c2e0010d9c5
SHA5124eafa4708cd2934186e883f630196dc88c6dc78a2db6bfa3a8628fe9f212297db032458ec7df4a3e3d1e6f6d9c570e55d320bce64beaf3cd1b889700b283836d
-
Filesize
244KB
MD502e6fcd8c1d944ba73de12e389ab314e
SHA1b9969fb9fe35a7d16906ba5cc7d3e457d9cbf24c
SHA2566fb4b196fcbce9856ff0099ab2108c7a7b0ecce86b133d0eb30f9c2e0010d9c5
SHA5124eafa4708cd2934186e883f630196dc88c6dc78a2db6bfa3a8628fe9f212297db032458ec7df4a3e3d1e6f6d9c570e55d320bce64beaf3cd1b889700b283836d
-
Filesize
126KB
MD5674cec24e36e0dfaec6290db96dda86e
SHA1581e3a7a541cc04641e751fc850d92e07236681f
SHA256de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded
SHA5126d9898169073c240fe454bd45065fd7dc8458f1d323925b57eb58fa4305bb0d5631bbceb61835593b225e887e0867186ef637c440460279378cb29e832066029
-
Filesize
126KB
MD5674cec24e36e0dfaec6290db96dda86e
SHA1581e3a7a541cc04641e751fc850d92e07236681f
SHA256de81531468982b689451e85d249214d0aa484e2ffedfd32c58d43cf879f29ded
SHA5126d9898169073c240fe454bd45065fd7dc8458f1d323925b57eb58fa4305bb0d5631bbceb61835593b225e887e0867186ef637c440460279378cb29e832066029