Analysis

  • max time kernel
    161s
  • max time network
    172s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/02/2023, 17:19

General

  • Target

    4219c49118c9d4565f8b1a4b0dc4e78e59d2772b4a776bcdd0db896fd6324793.exe

  • Size

    719KB

  • MD5

    e3495284c42485bf4b8dc8e15b445059

  • SHA1

    b4d90fa821c7334c05098e3aecaa64a43b205cea

  • SHA256

    4219c49118c9d4565f8b1a4b0dc4e78e59d2772b4a776bcdd0db896fd6324793

  • SHA512

    1d8bc9706598c8b27a3cfd8729fc9a9d8a38c4d4d935a296467b03dd7e0c14a119870aa479446bd1020714fbb499bc9012f149db7293a993fe35a9f30e44939e

  • SSDEEP

    12288:vMr3y90acuexw015mCFfw+vSoQ7pwa7ws88iK3IPfMs1OQq8qvWweaRtKj0:wyzcuex3Dwan4pwAws88iK3I7O38quZK

Malware Config

Extracted

Family

redline

Botnet

fusa

C2

193.233.20.12:4132

Attributes
  • auth_value

    a08b2f01bd2af756e38c5dd60e87e697

Extracted

Family

amadey

Version

3.66

C2

62.204.41.5/Bu58Ngs/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4219c49118c9d4565f8b1a4b0dc4e78e59d2772b4a776bcdd0db896fd6324793.exe
    "C:\Users\Admin\AppData\Local\Temp\4219c49118c9d4565f8b1a4b0dc4e78e59d2772b4a776bcdd0db896fd6324793.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1500
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sZg10qL.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sZg10qL.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4868
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\shp06Ql.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\shp06Ql.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:632
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kYs26cF.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kYs26cF.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:548
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mnz01.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mnz01.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1416
          • C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe
            "C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:912
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN mnolyk.exe /TR "C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe" /F
              6⤵
              • Creates scheduled task(s)
              PID:4036
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /k echo Y|CACLS "mnolyk.exe" /P "Admin:N"&&CACLS "mnolyk.exe" /P "Admin:R" /E&&echo Y|CACLS "..\5eb6b96734" /P "Admin:N"&&CACLS "..\5eb6b96734" /P "Admin:R" /E&&Exit
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2372
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                7⤵
                  PID:2188
                • C:\Windows\SysWOW64\cacls.exe
                  CACLS "mnolyk.exe" /P "Admin:N"
                  7⤵
                    PID:4140
                  • C:\Windows\SysWOW64\cacls.exe
                    CACLS "mnolyk.exe" /P "Admin:R" /E
                    7⤵
                      PID:1960
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      7⤵
                        PID:2356
                      • C:\Windows\SysWOW64\cacls.exe
                        CACLS "..\5eb6b96734" /P "Admin:N"
                        7⤵
                          PID:116
                        • C:\Windows\SysWOW64\cacls.exe
                          CACLS "..\5eb6b96734" /P "Admin:R" /E
                          7⤵
                            PID:212
                        • C:\Windows\SysWOW64\rundll32.exe
                          "C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
                          6⤵
                          • Loads dropped DLL
                          PID:4320
                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nIM19eG.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nIM19eG.exe
                    3⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1300
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 1300 -s 980
                      4⤵
                      • Program crash
                      PID:2704
                • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rcj34zV.exe
                  C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rcj34zV.exe
                  2⤵
                  • Executes dropped EXE
                  PID:4804
              • C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe
                C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe
                1⤵
                • Executes dropped EXE
                PID:772
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1300 -ip 1300
                1⤵
                  PID:4104
                • C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe
                  C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe
                  1⤵
                  • Executes dropped EXE
                  PID:2792

                Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe

                        Filesize

                        236KB

                        MD5

                        fde8915d251fada3a37530421eb29dcf

                        SHA1

                        44386a8947ddfab993409945dae05a772a13e047

                        SHA256

                        6cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116

                        SHA512

                        ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd

                      • C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe

                        Filesize

                        236KB

                        MD5

                        fde8915d251fada3a37530421eb29dcf

                        SHA1

                        44386a8947ddfab993409945dae05a772a13e047

                        SHA256

                        6cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116

                        SHA512

                        ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd

                      • C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe

                        Filesize

                        236KB

                        MD5

                        fde8915d251fada3a37530421eb29dcf

                        SHA1

                        44386a8947ddfab993409945dae05a772a13e047

                        SHA256

                        6cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116

                        SHA512

                        ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd

                      • C:\Users\Admin\AppData\Local\Temp\5eb6b96734\mnolyk.exe

                        Filesize

                        236KB

                        MD5

                        fde8915d251fada3a37530421eb29dcf

                        SHA1

                        44386a8947ddfab993409945dae05a772a13e047

                        SHA256

                        6cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116

                        SHA512

                        ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rcj34zV.exe

                        Filesize

                        11KB

                        MD5

                        7e93bacbbc33e6652e147e7fe07572a0

                        SHA1

                        421a7167da01c8da4dc4d5234ca3dd84e319e762

                        SHA256

                        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                        SHA512

                        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rcj34zV.exe

                        Filesize

                        11KB

                        MD5

                        7e93bacbbc33e6652e147e7fe07572a0

                        SHA1

                        421a7167da01c8da4dc4d5234ca3dd84e319e762

                        SHA256

                        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

                        SHA512

                        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sZg10qL.exe

                        Filesize

                        615KB

                        MD5

                        1d45575475bb7f5e114ff2cf74ae1ecb

                        SHA1

                        ac78c574ad1d5a9c7cbc6d1361d3c6a5ae1ed369

                        SHA256

                        54b35b31663b280697eb13aea3a1aad18568759dfed30f2c1cea7d5c5bdef3dc

                        SHA512

                        96e61ca688bba8fe142cfc73d6972b9e7661d631857032948f0201935adbfe95d575a7df3b9b66371c5b058ef6cc370bce9a4a874213e31603a448278d43fa90

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sZg10qL.exe

                        Filesize

                        615KB

                        MD5

                        1d45575475bb7f5e114ff2cf74ae1ecb

                        SHA1

                        ac78c574ad1d5a9c7cbc6d1361d3c6a5ae1ed369

                        SHA256

                        54b35b31663b280697eb13aea3a1aad18568759dfed30f2c1cea7d5c5bdef3dc

                        SHA512

                        96e61ca688bba8fe142cfc73d6972b9e7661d631857032948f0201935adbfe95d575a7df3b9b66371c5b058ef6cc370bce9a4a874213e31603a448278d43fa90

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nIM19eG.exe

                        Filesize

                        287KB

                        MD5

                        5679820c359decb6148df7d1f99dbf24

                        SHA1

                        afc2c0c251e62bdcfa1b53ae4f228ba8d734ee9f

                        SHA256

                        6187b858630a3b80420ea4e8643056877eb2c528f9f366e4b41d4d31443e5938

                        SHA512

                        71d465a2e6accb08a50dc8545792df0c0dd2ea67c06be3462448ce4d76166c12214a8e8b99d994a7303d8b9b7c6f8974b01aa5af206f3f2eed4e59b503731aa9

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nIM19eG.exe

                        Filesize

                        287KB

                        MD5

                        5679820c359decb6148df7d1f99dbf24

                        SHA1

                        afc2c0c251e62bdcfa1b53ae4f228ba8d734ee9f

                        SHA256

                        6187b858630a3b80420ea4e8643056877eb2c528f9f366e4b41d4d31443e5938

                        SHA512

                        71d465a2e6accb08a50dc8545792df0c0dd2ea67c06be3462448ce4d76166c12214a8e8b99d994a7303d8b9b7c6f8974b01aa5af206f3f2eed4e59b503731aa9

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\shp06Ql.exe

                        Filesize

                        286KB

                        MD5

                        524c5b5907533a23e5901f1714f5ad8d

                        SHA1

                        88481038ccc268d1df93e67c497892af3a25f920

                        SHA256

                        f12f1befe74594a649b2b645e6a7a44cd3febf8308c6ff300d9a26e1806b5b48

                        SHA512

                        4d07ec16c30756489e7bcbac27bbe25de1026ee1688230b99c9d4ca77e5d2f976628a4b0f46d8adee65f49f65fb91898fa1394f55db7fc90f4f5ee0f0b2a9f88

                      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\shp06Ql.exe

                        Filesize

                        286KB

                        MD5

                        524c5b5907533a23e5901f1714f5ad8d

                        SHA1

                        88481038ccc268d1df93e67c497892af3a25f920

                        SHA256

                        f12f1befe74594a649b2b645e6a7a44cd3febf8308c6ff300d9a26e1806b5b48

                        SHA512

                        4d07ec16c30756489e7bcbac27bbe25de1026ee1688230b99c9d4ca77e5d2f976628a4b0f46d8adee65f49f65fb91898fa1394f55db7fc90f4f5ee0f0b2a9f88

                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kYs26cF.exe

                        Filesize

                        175KB

                        MD5

                        da6f3bef8abc85bd09f50783059964e3

                        SHA1

                        a0f25f60ec1896c4c920ea397f40e6ce29724322

                        SHA256

                        e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b

                        SHA512

                        4d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec

                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kYs26cF.exe

                        Filesize

                        175KB

                        MD5

                        da6f3bef8abc85bd09f50783059964e3

                        SHA1

                        a0f25f60ec1896c4c920ea397f40e6ce29724322

                        SHA256

                        e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b

                        SHA512

                        4d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec

                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mnz01.exe

                        Filesize

                        236KB

                        MD5

                        fde8915d251fada3a37530421eb29dcf

                        SHA1

                        44386a8947ddfab993409945dae05a772a13e047

                        SHA256

                        6cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116

                        SHA512

                        ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd

                      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\mnz01.exe

                        Filesize

                        236KB

                        MD5

                        fde8915d251fada3a37530421eb29dcf

                        SHA1

                        44386a8947ddfab993409945dae05a772a13e047

                        SHA256

                        6cbcf0bb90ae767a8c554cdfa90723e6b1127e98cfa19a2259dd57813d27e116

                        SHA512

                        ffc253ad4308c7a34ec5ced45cc5eda21a43a9fa59927a323829e2e87a0060c93a051c726f2f6f65ffdb8ac9666f88bf2622c975a24a6718c99ac9a44c6fd7fd

                      • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                        Filesize

                        89KB

                        MD5

                        9221a421a3e777eb7d4ce55e474bcc4a

                        SHA1

                        c96d7bd7ccbf9352d50527bff472595b3dc5298e

                        SHA256

                        10ee53988bcfbb4bb9c8928ea96c4268bd64b9dfd1f28c6233185e695434d2f8

                        SHA512

                        63ac172cb19c7c020676937cb35e853710d08e99e06e8cdcb410c37e0c9056af409a50fdec0c90a3c532edcf5e0f128fa1e2181063e1208d4fc4643b1b5736f3

                      • C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll

                        Filesize

                        89KB

                        MD5

                        9221a421a3e777eb7d4ce55e474bcc4a

                        SHA1

                        c96d7bd7ccbf9352d50527bff472595b3dc5298e

                        SHA256

                        10ee53988bcfbb4bb9c8928ea96c4268bd64b9dfd1f28c6233185e695434d2f8

                        SHA512

                        63ac172cb19c7c020676937cb35e853710d08e99e06e8cdcb410c37e0c9056af409a50fdec0c90a3c532edcf5e0f128fa1e2181063e1208d4fc4643b1b5736f3

                      • memory/548-145-0x0000000005110000-0x000000000514C000-memory.dmp

                        Filesize

                        240KB

                      • memory/548-142-0x0000000005630000-0x0000000005C48000-memory.dmp

                        Filesize

                        6.1MB

                      • memory/548-152-0x00000000072D0000-0x00000000077FC000-memory.dmp

                        Filesize

                        5.2MB

                      • memory/548-151-0x0000000006BD0000-0x0000000006D92000-memory.dmp

                        Filesize

                        1.8MB

                      • memory/548-150-0x00000000069B0000-0x0000000006A00000-memory.dmp

                        Filesize

                        320KB

                      • memory/548-149-0x0000000006930000-0x00000000069A6000-memory.dmp

                        Filesize

                        472KB

                      • memory/548-141-0x0000000000820000-0x0000000000852000-memory.dmp

                        Filesize

                        200KB

                      • memory/548-148-0x0000000005CF0000-0x0000000005D56000-memory.dmp

                        Filesize

                        408KB

                      • memory/548-147-0x0000000005C50000-0x0000000005CE2000-memory.dmp

                        Filesize

                        584KB

                      • memory/548-143-0x0000000005180000-0x000000000528A000-memory.dmp

                        Filesize

                        1.0MB

                      • memory/548-144-0x00000000050B0000-0x00000000050C2000-memory.dmp

                        Filesize

                        72KB

                      • memory/548-146-0x0000000006200000-0x00000000067A4000-memory.dmp

                        Filesize

                        5.6MB

                      • memory/1300-180-0x0000000000400000-0x00000000007A3000-memory.dmp

                        Filesize

                        3.6MB

                      • memory/1300-179-0x0000000000943000-0x0000000000971000-memory.dmp

                        Filesize

                        184KB

                      • memory/1300-170-0x0000000000943000-0x0000000000971000-memory.dmp

                        Filesize

                        184KB

                      • memory/1300-171-0x0000000002400000-0x000000000244B000-memory.dmp

                        Filesize

                        300KB

                      • memory/1300-172-0x0000000000400000-0x00000000007A3000-memory.dmp

                        Filesize

                        3.6MB

                      • memory/1300-173-0x0000000000943000-0x0000000000971000-memory.dmp

                        Filesize

                        184KB

                      • memory/4804-184-0x0000000000DD0000-0x0000000000DDA000-memory.dmp

                        Filesize

                        40KB

                      • memory/4804-185-0x00007FFA79B30000-0x00007FFA7A5F1000-memory.dmp

                        Filesize

                        10.8MB