Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    09-04-2023 20:13

General

  • Target

    8ff7ae60d08287d32284ec31e27102989ea147c467c797fe54acbc0cb0df8380.exe

  • Size

    924KB

  • MD5

    9070b31a4ea6570216ee5d0758f05cc4

  • SHA1

    a0431611f84591448c34c83aed8503295e4103f7

  • SHA256

    8ff7ae60d08287d32284ec31e27102989ea147c467c797fe54acbc0cb0df8380

  • SHA512

    6aaa0ea5b73ed0337bf5a1c6175c023924e1fdaf158f30f123f5b2b4fe0b934e5aa5022787cdcffd92b7d29fd7f7a4878f2e18fae591b894e9930f15682a6942

  • SSDEEP

    24576:myrHSY7ddQdW5rLOQx+Nl4yJ920CyR2XT:1eyddd5vcNZ920CyR2

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ff7ae60d08287d32284ec31e27102989ea147c467c797fe54acbc0cb0df8380.exe
    "C:\Users\Admin\AppData\Local\Temp\8ff7ae60d08287d32284ec31e27102989ea147c467c797fe54acbc0cb0df8380.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3272
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un828037.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un828037.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1840
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un664006.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un664006.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3592
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr034014.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr034014.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3788
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu036143.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu036143.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4968
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk969312.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk969312.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4424
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si859876.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si859876.exe
      2⤵
      • Executes dropped EXE
      PID:4420
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 616
        3⤵
        • Program crash
        PID:4140
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 696
        3⤵
        • Program crash
        PID:4072
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 836
        3⤵
        • Program crash
        PID:4164
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 816
        3⤵
        • Program crash
        PID:5020
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 880
        3⤵
        • Program crash
        PID:1020
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 868
        3⤵
        • Program crash
        PID:2144
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 1068
        3⤵
        • Program crash
        PID:2056

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si859876.exe
    Filesize

    226KB

    MD5

    d8c3f20eef4f33bd865589859629bf41

    SHA1

    3590244f8774ff4ac4e3c54cdbb149363fd9dc7d

    SHA256

    2883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f

    SHA512

    52b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si859876.exe
    Filesize

    226KB

    MD5

    d8c3f20eef4f33bd865589859629bf41

    SHA1

    3590244f8774ff4ac4e3c54cdbb149363fd9dc7d

    SHA256

    2883beaaf38f654125933398a46d5bd8c9db9fd04793cb50b28eb2343b4dd36f

    SHA512

    52b84685dacaa20eac474ee035ff3302d95324a3bf9deeff447c05a0d8066cda8fa86592e48806c661de4510b83bbae4a76ec121594e4987b27c1f883bfc77cb

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un828037.exe
    Filesize

    662KB

    MD5

    6b1ea6ff0d8ea57d8a19824a3e058d5b

    SHA1

    687e4d90972009d5a50b2108eafc92095dcb92cb

    SHA256

    fdc1cc32111a5a5d8d66607a6b9653e2a210079bd3bfc792f25b3225b1b6cf99

    SHA512

    f3d1b99b4230c6d59b296a7f2bc15626e4656dfa51316fda28ed56e4ab738a51474e7428cc0fd372cbbf9729cd6293ec5673a997b70731b679ac1b61d1cc2a87

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un828037.exe
    Filesize

    662KB

    MD5

    6b1ea6ff0d8ea57d8a19824a3e058d5b

    SHA1

    687e4d90972009d5a50b2108eafc92095dcb92cb

    SHA256

    fdc1cc32111a5a5d8d66607a6b9653e2a210079bd3bfc792f25b3225b1b6cf99

    SHA512

    f3d1b99b4230c6d59b296a7f2bc15626e4656dfa51316fda28ed56e4ab738a51474e7428cc0fd372cbbf9729cd6293ec5673a997b70731b679ac1b61d1cc2a87

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk969312.exe
    Filesize

    175KB

    MD5

    bb6d43fa4ebafe62b98ec4dea4ff49d9

    SHA1

    d8188e664ac977f59d3ec26589e3cf67b1fab23b

    SHA256

    1d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89

    SHA512

    679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk969312.exe
    Filesize

    175KB

    MD5

    bb6d43fa4ebafe62b98ec4dea4ff49d9

    SHA1

    d8188e664ac977f59d3ec26589e3cf67b1fab23b

    SHA256

    1d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89

    SHA512

    679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un664006.exe
    Filesize

    520KB

    MD5

    7805db28b0270a95daed5acee84afee9

    SHA1

    b4cd1d091c69aa773f16b6fa633cee071b4064b6

    SHA256

    a97ba6bdfa9811ccf56574890d3b4913474d2f7d4739c37b6292db3aa6da8da7

    SHA512

    a08d0e44bdf852b095de8c29b5a1c4016a86e3ca3a9d9daa4befa1be001a325ca5ae810c3f35683fdf1429609dbaeb1335687c84bda5cdd6a402bdd4bc32ccb9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un664006.exe
    Filesize

    520KB

    MD5

    7805db28b0270a95daed5acee84afee9

    SHA1

    b4cd1d091c69aa773f16b6fa633cee071b4064b6

    SHA256

    a97ba6bdfa9811ccf56574890d3b4913474d2f7d4739c37b6292db3aa6da8da7

    SHA512

    a08d0e44bdf852b095de8c29b5a1c4016a86e3ca3a9d9daa4befa1be001a325ca5ae810c3f35683fdf1429609dbaeb1335687c84bda5cdd6a402bdd4bc32ccb9

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr034014.exe
    Filesize

    235KB

    MD5

    fcd7931c929cfd4e18f73cb8e303a297

    SHA1

    02f4a18e3351958e9622ca8a8ca8fee88d52231b

    SHA256

    a0ea29164fef27e7ee56b052634e55a801ad45e513dccf3a6d094f7f1065de3a

    SHA512

    3f3f2ba7bab27b1a446bb612b63d10654785829b792af48a313812294fe0dfd53358265316a0bfc43c18e36f8b2a3a898629b54e1a98b0c3d018feb65451523b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr034014.exe
    Filesize

    235KB

    MD5

    fcd7931c929cfd4e18f73cb8e303a297

    SHA1

    02f4a18e3351958e9622ca8a8ca8fee88d52231b

    SHA256

    a0ea29164fef27e7ee56b052634e55a801ad45e513dccf3a6d094f7f1065de3a

    SHA512

    3f3f2ba7bab27b1a446bb612b63d10654785829b792af48a313812294fe0dfd53358265316a0bfc43c18e36f8b2a3a898629b54e1a98b0c3d018feb65451523b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu036143.exe
    Filesize

    292KB

    MD5

    a4ad8f2ffc07da2ed47860bf27d2c085

    SHA1

    b262ecb138aaf6a97b7dda1e1d17d0dccf233da7

    SHA256

    f4d7379bd67271ef53ab43d0507ac6098d452280b1465e737e21475316f6ee3c

    SHA512

    8696aa5a62d1aa72285770652462bab8d41ff20c91aa291fdc90de99ae471be1738c14c0db90238e5a9cfb28a65b450e6fe4731dbbfb5adcc55eb66c5e6798cc

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu036143.exe
    Filesize

    292KB

    MD5

    a4ad8f2ffc07da2ed47860bf27d2c085

    SHA1

    b262ecb138aaf6a97b7dda1e1d17d0dccf233da7

    SHA256

    f4d7379bd67271ef53ab43d0507ac6098d452280b1465e737e21475316f6ee3c

    SHA512

    8696aa5a62d1aa72285770652462bab8d41ff20c91aa291fdc90de99ae471be1738c14c0db90238e5a9cfb28a65b450e6fe4731dbbfb5adcc55eb66c5e6798cc

  • memory/3788-155-0x0000000002220000-0x0000000002232000-memory.dmp
    Filesize

    72KB

  • memory/3788-165-0x0000000002220000-0x0000000002232000-memory.dmp
    Filesize

    72KB

  • memory/3788-147-0x0000000004D50000-0x0000000004D60000-memory.dmp
    Filesize

    64KB

  • memory/3788-148-0x0000000004D50000-0x0000000004D60000-memory.dmp
    Filesize

    64KB

  • memory/3788-149-0x0000000004D50000-0x0000000004D60000-memory.dmp
    Filesize

    64KB

  • memory/3788-150-0x0000000002220000-0x0000000002232000-memory.dmp
    Filesize

    72KB

  • memory/3788-151-0x0000000002220000-0x0000000002232000-memory.dmp
    Filesize

    72KB

  • memory/3788-153-0x0000000002220000-0x0000000002232000-memory.dmp
    Filesize

    72KB

  • memory/3788-145-0x0000000002220000-0x0000000002238000-memory.dmp
    Filesize

    96KB

  • memory/3788-157-0x0000000002220000-0x0000000002232000-memory.dmp
    Filesize

    72KB

  • memory/3788-159-0x0000000002220000-0x0000000002232000-memory.dmp
    Filesize

    72KB

  • memory/3788-161-0x0000000002220000-0x0000000002232000-memory.dmp
    Filesize

    72KB

  • memory/3788-163-0x0000000002220000-0x0000000002232000-memory.dmp
    Filesize

    72KB

  • memory/3788-146-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/3788-167-0x0000000002220000-0x0000000002232000-memory.dmp
    Filesize

    72KB

  • memory/3788-169-0x0000000002220000-0x0000000002232000-memory.dmp
    Filesize

    72KB

  • memory/3788-171-0x0000000002220000-0x0000000002232000-memory.dmp
    Filesize

    72KB

  • memory/3788-173-0x0000000002220000-0x0000000002232000-memory.dmp
    Filesize

    72KB

  • memory/3788-177-0x0000000002220000-0x0000000002232000-memory.dmp
    Filesize

    72KB

  • memory/3788-175-0x0000000002220000-0x0000000002232000-memory.dmp
    Filesize

    72KB

  • memory/3788-178-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/3788-180-0x0000000000400000-0x00000000004A8000-memory.dmp
    Filesize

    672KB

  • memory/3788-143-0x00000000009D0000-0x00000000009EA000-memory.dmp
    Filesize

    104KB

  • memory/3788-144-0x0000000004D60000-0x000000000525E000-memory.dmp
    Filesize

    5.0MB

  • memory/4420-1127-0x0000000000580000-0x00000000005BB000-memory.dmp
    Filesize

    236KB

  • memory/4424-1119-0x00000000004C0000-0x00000000004F2000-memory.dmp
    Filesize

    200KB

  • memory/4424-1121-0x0000000004DD0000-0x0000000004E1B000-memory.dmp
    Filesize

    300KB

  • memory/4424-1120-0x00000000050A0000-0x00000000050B0000-memory.dmp
    Filesize

    64KB

  • memory/4968-192-0x00000000024F0000-0x0000000002500000-memory.dmp
    Filesize

    64KB

  • memory/4968-194-0x00000000024F0000-0x0000000002500000-memory.dmp
    Filesize

    64KB

  • memory/4968-193-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4968-196-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4968-191-0x00000000024F0000-0x0000000002500000-memory.dmp
    Filesize

    64KB

  • memory/4968-198-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4968-200-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4968-202-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4968-204-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4968-206-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4968-208-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4968-210-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4968-212-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4968-214-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4968-216-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4968-218-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4968-220-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4968-222-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4968-224-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4968-1097-0x0000000004FD0000-0x00000000055D6000-memory.dmp
    Filesize

    6.0MB

  • memory/4968-1098-0x0000000005660000-0x000000000576A000-memory.dmp
    Filesize

    1.0MB

  • memory/4968-1099-0x00000000057A0000-0x00000000057B2000-memory.dmp
    Filesize

    72KB

  • memory/4968-1100-0x00000000057C0000-0x00000000057FE000-memory.dmp
    Filesize

    248KB

  • memory/4968-1101-0x0000000005910000-0x000000000595B000-memory.dmp
    Filesize

    300KB

  • memory/4968-1102-0x00000000024F0000-0x0000000002500000-memory.dmp
    Filesize

    64KB

  • memory/4968-1104-0x0000000005AA0000-0x0000000005B06000-memory.dmp
    Filesize

    408KB

  • memory/4968-1105-0x00000000024F0000-0x0000000002500000-memory.dmp
    Filesize

    64KB

  • memory/4968-1106-0x00000000024F0000-0x0000000002500000-memory.dmp
    Filesize

    64KB

  • memory/4968-1107-0x00000000024F0000-0x0000000002500000-memory.dmp
    Filesize

    64KB

  • memory/4968-1108-0x0000000006040000-0x00000000060D2000-memory.dmp
    Filesize

    584KB

  • memory/4968-1109-0x0000000006250000-0x0000000006412000-memory.dmp
    Filesize

    1.8MB

  • memory/4968-1110-0x0000000006420000-0x000000000694C000-memory.dmp
    Filesize

    5.2MB

  • memory/4968-188-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4968-189-0x00000000005F0000-0x000000000063B000-memory.dmp
    Filesize

    300KB

  • memory/4968-187-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4968-186-0x0000000004F50000-0x0000000004F94000-memory.dmp
    Filesize

    272KB

  • memory/4968-185-0x0000000002460000-0x00000000024A6000-memory.dmp
    Filesize

    280KB

  • memory/4968-1111-0x0000000006B70000-0x0000000006BE6000-memory.dmp
    Filesize

    472KB

  • memory/4968-1112-0x0000000006C00000-0x0000000006C50000-memory.dmp
    Filesize

    320KB

  • memory/4968-1113-0x00000000024F0000-0x0000000002500000-memory.dmp
    Filesize

    64KB