Analysis

  • max time kernel
    160s
  • max time network
    151s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    12-02-2023 23:20

General

  • Target

    71e9702cffa024dbfb623093a287ddd2ed5ad1dddaa9d0e44f7cbf2dd3b083b2.exe

  • Size

    716KB

  • MD5

    f62854af58d4aef23d3ec5e63696ffc4

  • SHA1

    eafdaa4c408dad0ff44dbcf9cf9b839554796117

  • SHA256

    71e9702cffa024dbfb623093a287ddd2ed5ad1dddaa9d0e44f7cbf2dd3b083b2

  • SHA512

    4e578d91eaa7ac7d771cc28c29f9cc606be40461202731199f1c517d86dd5f1529f0f37b87a0c6e8f3db8b92ba46707f60b8d1652c0bcaa701bc683f886bba42

  • SSDEEP

    12288:oMrBy90zfEeZV1UDyUo4wDA9AxqIKlGf88/KdIP8WyK0ilFpTf5jCij8R0r3Jlab:Zy6fVzCaVM6q8f88/KdIpeaRjkSrzuBX

Malware Config

Extracted

Family

redline

Botnet

fusa

C2

193.233.20.12:4132

Attributes
  • auth_value

    a08b2f01bd2af756e38c5dd60e87e697

Extracted

Family

amadey

Version

3.66

C2

62.204.41.5/Bu58Ngs/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\71e9702cffa024dbfb623093a287ddd2ed5ad1dddaa9d0e44f7cbf2dd3b083b2.exe
    "C:\Users\Admin\AppData\Local\Temp\71e9702cffa024dbfb623093a287ddd2ed5ad1dddaa9d0e44f7cbf2dd3b083b2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sOd92sF.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sOd92sF.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3028
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ssb13aH.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ssb13aH.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3540
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kHN63sI.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kHN63sI.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4932
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mZz55.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mZz55.exe
          4⤵
          • Executes dropped EXE
          PID:2040

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sOd92sF.exe

    Filesize

    612KB

    MD5

    42d58021187dcdf166968545021f9a06

    SHA1

    bdfb616db34c4c5de6c8badab07d3a4b17cf9c9d

    SHA256

    bdc664a555769a75ae3e5cd219780715f003e9aa9f42718875be93eaa30cbc4e

    SHA512

    fb91190202495bac0004b9ea1d04ca7b0016b8c54e8616de59b9c54942916a9f9dfa6bb69074562fcd86677db762e6ab73abc953bed6fa8b6f241414c162fbf1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sOd92sF.exe

    Filesize

    612KB

    MD5

    42d58021187dcdf166968545021f9a06

    SHA1

    bdfb616db34c4c5de6c8badab07d3a4b17cf9c9d

    SHA256

    bdc664a555769a75ae3e5cd219780715f003e9aa9f42718875be93eaa30cbc4e

    SHA512

    fb91190202495bac0004b9ea1d04ca7b0016b8c54e8616de59b9c54942916a9f9dfa6bb69074562fcd86677db762e6ab73abc953bed6fa8b6f241414c162fbf1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ssb13aH.exe

    Filesize

    286KB

    MD5

    25f37e4c90aee212b2d6ba361446d79c

    SHA1

    d3bb0bd049524a98bd5587a866c23bedac7d0401

    SHA256

    b346013f6aedc6b33c9fa6dc5858b75211431d69f33b8f424e9fe97ebd382f75

    SHA512

    13a15348ad37007f6b1f32f2e4c2166a4994928bbacf98a0680b47f61e4474778eef404b9603c8bf825d0928831b86b32c6357114478bd0be84b7d6f8aaadef8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ssb13aH.exe

    Filesize

    286KB

    MD5

    25f37e4c90aee212b2d6ba361446d79c

    SHA1

    d3bb0bd049524a98bd5587a866c23bedac7d0401

    SHA256

    b346013f6aedc6b33c9fa6dc5858b75211431d69f33b8f424e9fe97ebd382f75

    SHA512

    13a15348ad37007f6b1f32f2e4c2166a4994928bbacf98a0680b47f61e4474778eef404b9603c8bf825d0928831b86b32c6357114478bd0be84b7d6f8aaadef8

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kHN63sI.exe

    Filesize

    175KB

    MD5

    da6f3bef8abc85bd09f50783059964e3

    SHA1

    a0f25f60ec1896c4c920ea397f40e6ce29724322

    SHA256

    e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b

    SHA512

    4d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kHN63sI.exe

    Filesize

    175KB

    MD5

    da6f3bef8abc85bd09f50783059964e3

    SHA1

    a0f25f60ec1896c4c920ea397f40e6ce29724322

    SHA256

    e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b

    SHA512

    4d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mZz55.exe

    Filesize

    236KB

    MD5

    fde8915d251fada3a37530421eb29dcf

    SHA1

    44386a8947ddfab993409945dae05a772a13e047

    SHA256

    6cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116

    SHA512

    ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mZz55.exe

    Filesize

    236KB

    MD5

    fde8915d251fada3a37530421eb29dcf

    SHA1

    44386a8947ddfab993409945dae05a772a13e047

    SHA256

    6cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116

    SHA512

    ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd

  • memory/1684-159-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-155-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-125-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-126-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-127-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-128-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-129-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-130-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-131-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-132-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-133-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-134-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-135-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-136-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-137-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-165-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-139-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-140-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-141-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-142-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-143-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-144-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-145-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-146-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-147-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-148-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-149-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-150-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-151-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-152-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-153-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-154-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-164-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-156-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-157-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-158-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-123-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-160-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-163-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-162-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-161-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-124-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-138-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-120-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-121-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/1684-122-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/2040-361-0x0000000000000000-mapping.dmp

  • memory/3028-172-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/3028-185-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/3028-173-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/3028-175-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/3028-170-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/3028-177-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/3028-178-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/3028-169-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/3028-180-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/3028-186-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/3028-181-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/3028-183-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/3028-184-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/3028-168-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/3028-171-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/3028-166-0x0000000000000000-mapping.dmp

  • memory/3028-176-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/3028-179-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/3028-182-0x0000000077390000-0x000000007751E000-memory.dmp

    Filesize

    1.6MB

  • memory/3540-215-0x0000000000000000-mapping.dmp

  • memory/4932-314-0x0000000000570000-0x00000000005A2000-memory.dmp

    Filesize

    200KB

  • memory/4932-330-0x0000000004DD0000-0x0000000004DE2000-memory.dmp

    Filesize

    72KB

  • memory/4932-332-0x0000000004E40000-0x0000000004E7E000-memory.dmp

    Filesize

    248KB

  • memory/4932-334-0x0000000004FB0000-0x0000000004FFB000-memory.dmp

    Filesize

    300KB

  • memory/4932-339-0x00000000059E0000-0x0000000005A46000-memory.dmp

    Filesize

    408KB

  • memory/4932-347-0x0000000005CF0000-0x0000000005D82000-memory.dmp

    Filesize

    584KB

  • memory/4932-348-0x0000000006290000-0x000000000678E000-memory.dmp

    Filesize

    5.0MB

  • memory/4932-350-0x0000000005E10000-0x0000000005E86000-memory.dmp

    Filesize

    472KB

  • memory/4932-351-0x0000000002520000-0x0000000002570000-memory.dmp

    Filesize

    320KB

  • memory/4932-352-0x0000000006790000-0x0000000006952000-memory.dmp

    Filesize

    1.8MB

  • memory/4932-353-0x0000000006E90000-0x00000000073BC000-memory.dmp

    Filesize

    5.2MB

  • memory/4932-328-0x0000000004EA0000-0x0000000004FAA000-memory.dmp

    Filesize

    1.0MB

  • memory/4932-327-0x0000000005320000-0x0000000005926000-memory.dmp

    Filesize

    6.0MB

  • memory/4932-264-0x0000000000000000-mapping.dmp