Analysis

  • max time kernel
    143s
  • max time network
    142s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10-04-2023 21:48

General

  • Target

    93a5d338087cb8075a8bd88e9f61e725e512335dfde80b04ceb3dc53dc65f713.exe

  • Size

    790KB

  • MD5

    5cf6cdb76bc843ce1cd2c6bbc60718ed

  • SHA1

    9bed8d505f10d1f885c5a17a7c618bbee8206ae2

  • SHA256

    93a5d338087cb8075a8bd88e9f61e725e512335dfde80b04ceb3dc53dc65f713

  • SHA512

    ae8a9b322c66622bc2f735c43fa8e0f24e12ba36d41a4f3c9f63ee5a7a95e0a591209714c3e7101da230265c916c3c92c61918e55621404a48c4a8470aa91177

  • SSDEEP

    24576:hyHYk5U6w00CB5oGZZTxfot5VZXnnblHHAGWaPdZ:UbS6w00ooGZZTxUPnJAGWaP

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\93a5d338087cb8075a8bd88e9f61e725e512335dfde80b04ceb3dc53dc65f713.exe
    "C:\Users\Admin\AppData\Local\Temp\93a5d338087cb8075a8bd88e9f61e725e512335dfde80b04ceb3dc53dc65f713.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4672
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLV5495.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLV5495.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4964
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zijR7663.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zijR7663.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1400
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it714900.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it714900.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1624
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr958503.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr958503.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2244
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp345491.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp345491.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4408
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr533146.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr533146.exe
      2⤵
      • Executes dropped EXE
      PID:4576
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 632
        3⤵
        • Program crash
        PID:3144
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 700
        3⤵
        • Program crash
        PID:3584
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 840
        3⤵
        • Program crash
        PID:4912
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 828
        3⤵
        • Program crash
        PID:3064
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 876
        3⤵
        • Program crash
        PID:5016
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 888
        3⤵
        • Program crash
        PID:3896
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 1072
        3⤵
        • Program crash
        PID:3388

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr533146.exe
    Filesize

    231KB

    MD5

    5a531a1495614605383afe7a35731a7a

    SHA1

    f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6

    SHA256

    2aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d

    SHA512

    906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr533146.exe
    Filesize

    231KB

    MD5

    5a531a1495614605383afe7a35731a7a

    SHA1

    f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6

    SHA256

    2aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d

    SHA512

    906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLV5495.exe
    Filesize

    524KB

    MD5

    4b1c3ba79f504627d028dbef6cabcc2f

    SHA1

    a42209ea90711acc258087571f35630cb4984b02

    SHA256

    3aabc61bbd75de39b56134ab78db8870ffc153dbc6ef4ed1e6f2fe0fe505fd1a

    SHA512

    e7bd4307950b1eb31187785078d71b4f4672f12d181fb116d6576dbbd16e6a5ff859b4278f13a0e6feb0b18bcbad124423c4d3c42797a5f308f58105f473a89a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLV5495.exe
    Filesize

    524KB

    MD5

    4b1c3ba79f504627d028dbef6cabcc2f

    SHA1

    a42209ea90711acc258087571f35630cb4984b02

    SHA256

    3aabc61bbd75de39b56134ab78db8870ffc153dbc6ef4ed1e6f2fe0fe505fd1a

    SHA512

    e7bd4307950b1eb31187785078d71b4f4672f12d181fb116d6576dbbd16e6a5ff859b4278f13a0e6feb0b18bcbad124423c4d3c42797a5f308f58105f473a89a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp345491.exe
    Filesize

    176KB

    MD5

    8d8ec0fdcb8a3bb0e3026c1f182d1c56

    SHA1

    e0b68263b1381da590316801c5b323d672905714

    SHA256

    1bc4dbb0e177c0b78d90851f8474d1732a5ec4cba072992bca67006c2b997d3b

    SHA512

    c2fdf74e4ab2ae3089fdb57a80d50029b02c236b67d2f49dec5d64d37b9735d65e39dd94167fa18f4435b908c65589a1f83bb70a247ff616d619efd89fdc1683

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp345491.exe
    Filesize

    176KB

    MD5

    8d8ec0fdcb8a3bb0e3026c1f182d1c56

    SHA1

    e0b68263b1381da590316801c5b323d672905714

    SHA256

    1bc4dbb0e177c0b78d90851f8474d1732a5ec4cba072992bca67006c2b997d3b

    SHA512

    c2fdf74e4ab2ae3089fdb57a80d50029b02c236b67d2f49dec5d64d37b9735d65e39dd94167fa18f4435b908c65589a1f83bb70a247ff616d619efd89fdc1683

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zijR7663.exe
    Filesize

    382KB

    MD5

    21d2e28f36660334382aa89472561524

    SHA1

    1911d746ceddf63c44586d21975ab8629f23268c

    SHA256

    1f34e6ffbc2b6b6c2411db3d8bb259c5d6fac7f5b1315acfe6bc42f1c13ee0e3

    SHA512

    02fa8597bbbb332f000f05114a8e3f42c0791f525dcbad96147f07ae1f347ca0595701f0f313990b7c298e168c06f5a803f521c37c6be7367876b3efba9827e1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zijR7663.exe
    Filesize

    382KB

    MD5

    21d2e28f36660334382aa89472561524

    SHA1

    1911d746ceddf63c44586d21975ab8629f23268c

    SHA256

    1f34e6ffbc2b6b6c2411db3d8bb259c5d6fac7f5b1315acfe6bc42f1c13ee0e3

    SHA512

    02fa8597bbbb332f000f05114a8e3f42c0791f525dcbad96147f07ae1f347ca0595701f0f313990b7c298e168c06f5a803f521c37c6be7367876b3efba9827e1

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it714900.exe
    Filesize

    11KB

    MD5

    4b3e0ef0693789fc9ddd388e7af44e0f

    SHA1

    ad549514027c4a03dcc3d47f1ce2a5bf672bed55

    SHA256

    4fbab3bb6791ee3a90338dad16f2bb1ac8cfd393df0379546ce563e060dc3ee4

    SHA512

    81a1bf6e58fca18834869c37eac1e96fac73f1ae8202210e980f0fd67b615ea4bef912bf83b0026d4df8613c6b31dc70735234855eff1170d817212847cc7a01

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it714900.exe
    Filesize

    11KB

    MD5

    4b3e0ef0693789fc9ddd388e7af44e0f

    SHA1

    ad549514027c4a03dcc3d47f1ce2a5bf672bed55

    SHA256

    4fbab3bb6791ee3a90338dad16f2bb1ac8cfd393df0379546ce563e060dc3ee4

    SHA512

    81a1bf6e58fca18834869c37eac1e96fac73f1ae8202210e980f0fd67b615ea4bef912bf83b0026d4df8613c6b31dc70735234855eff1170d817212847cc7a01

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr958503.exe
    Filesize

    297KB

    MD5

    fb467654cbd26b7b287091cefa955c5c

    SHA1

    434148b1b10bf521c9184ccac80cfc14f4942b40

    SHA256

    e3042b267947267ae975f8b00b9b8df0926524513e8d0ada080c72c3f2d06c03

    SHA512

    d86a7d2c92a64cff7edbdcbcb53671a4b547ad540db6b10e8141f9b8676844e70a0ba560f0676421788e4f20333dbe01a683f4b53adc285aa8da7b6d0aad0f0c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr958503.exe
    Filesize

    297KB

    MD5

    fb467654cbd26b7b287091cefa955c5c

    SHA1

    434148b1b10bf521c9184ccac80cfc14f4942b40

    SHA256

    e3042b267947267ae975f8b00b9b8df0926524513e8d0ada080c72c3f2d06c03

    SHA512

    d86a7d2c92a64cff7edbdcbcb53671a4b547ad540db6b10e8141f9b8676844e70a0ba560f0676421788e4f20333dbe01a683f4b53adc285aa8da7b6d0aad0f0c

  • memory/1624-137-0x0000000000330000-0x000000000033A000-memory.dmp
    Filesize

    40KB

  • memory/2244-181-0x0000000004A60000-0x0000000004A9F000-memory.dmp
    Filesize

    252KB

  • memory/2244-197-0x0000000004A60000-0x0000000004A9F000-memory.dmp
    Filesize

    252KB

  • memory/2244-145-0x0000000004A60000-0x0000000004AA4000-memory.dmp
    Filesize

    272KB

  • memory/2244-146-0x0000000004A60000-0x0000000004A9F000-memory.dmp
    Filesize

    252KB

  • memory/2244-147-0x0000000004A60000-0x0000000004A9F000-memory.dmp
    Filesize

    252KB

  • memory/2244-149-0x0000000004A60000-0x0000000004A9F000-memory.dmp
    Filesize

    252KB

  • memory/2244-151-0x0000000004A60000-0x0000000004A9F000-memory.dmp
    Filesize

    252KB

  • memory/2244-154-0x0000000004A60000-0x0000000004A9F000-memory.dmp
    Filesize

    252KB

  • memory/2244-153-0x00000000005E0000-0x000000000062B000-memory.dmp
    Filesize

    300KB

  • memory/2244-155-0x0000000004BA0000-0x0000000004BB0000-memory.dmp
    Filesize

    64KB

  • memory/2244-156-0x0000000004BA0000-0x0000000004BB0000-memory.dmp
    Filesize

    64KB

  • memory/2244-159-0x0000000004BA0000-0x0000000004BB0000-memory.dmp
    Filesize

    64KB

  • memory/2244-158-0x0000000004A60000-0x0000000004A9F000-memory.dmp
    Filesize

    252KB

  • memory/2244-161-0x0000000004A60000-0x0000000004A9F000-memory.dmp
    Filesize

    252KB

  • memory/2244-163-0x0000000004A60000-0x0000000004A9F000-memory.dmp
    Filesize

    252KB

  • memory/2244-165-0x0000000004A60000-0x0000000004A9F000-memory.dmp
    Filesize

    252KB

  • memory/2244-167-0x0000000004A60000-0x0000000004A9F000-memory.dmp
    Filesize

    252KB

  • memory/2244-169-0x0000000004A60000-0x0000000004A9F000-memory.dmp
    Filesize

    252KB

  • memory/2244-171-0x0000000004A60000-0x0000000004A9F000-memory.dmp
    Filesize

    252KB

  • memory/2244-173-0x0000000004A60000-0x0000000004A9F000-memory.dmp
    Filesize

    252KB

  • memory/2244-175-0x0000000004A60000-0x0000000004A9F000-memory.dmp
    Filesize

    252KB

  • memory/2244-177-0x0000000004A60000-0x0000000004A9F000-memory.dmp
    Filesize

    252KB

  • memory/2244-179-0x0000000004A60000-0x0000000004A9F000-memory.dmp
    Filesize

    252KB

  • memory/2244-143-0x00000000023C0000-0x0000000002406000-memory.dmp
    Filesize

    280KB

  • memory/2244-183-0x0000000004A60000-0x0000000004A9F000-memory.dmp
    Filesize

    252KB

  • memory/2244-185-0x0000000004A60000-0x0000000004A9F000-memory.dmp
    Filesize

    252KB

  • memory/2244-187-0x0000000004A60000-0x0000000004A9F000-memory.dmp
    Filesize

    252KB

  • memory/2244-189-0x0000000004A60000-0x0000000004A9F000-memory.dmp
    Filesize

    252KB

  • memory/2244-191-0x0000000004A60000-0x0000000004A9F000-memory.dmp
    Filesize

    252KB

  • memory/2244-193-0x0000000004A60000-0x0000000004A9F000-memory.dmp
    Filesize

    252KB

  • memory/2244-195-0x0000000004A60000-0x0000000004A9F000-memory.dmp
    Filesize

    252KB

  • memory/2244-144-0x0000000004BB0000-0x00000000050AE000-memory.dmp
    Filesize

    5.0MB

  • memory/2244-199-0x0000000004A60000-0x0000000004A9F000-memory.dmp
    Filesize

    252KB

  • memory/2244-201-0x0000000004A60000-0x0000000004A9F000-memory.dmp
    Filesize

    252KB

  • memory/2244-203-0x0000000004A60000-0x0000000004A9F000-memory.dmp
    Filesize

    252KB

  • memory/2244-205-0x0000000004A60000-0x0000000004A9F000-memory.dmp
    Filesize

    252KB

  • memory/2244-207-0x0000000004A60000-0x0000000004A9F000-memory.dmp
    Filesize

    252KB

  • memory/2244-209-0x0000000004A60000-0x0000000004A9F000-memory.dmp
    Filesize

    252KB

  • memory/2244-211-0x0000000004A60000-0x0000000004A9F000-memory.dmp
    Filesize

    252KB

  • memory/2244-213-0x0000000004A60000-0x0000000004A9F000-memory.dmp
    Filesize

    252KB

  • memory/2244-1056-0x00000000051B0000-0x00000000057B6000-memory.dmp
    Filesize

    6.0MB

  • memory/2244-1057-0x00000000057C0000-0x00000000058CA000-memory.dmp
    Filesize

    1.0MB

  • memory/2244-1058-0x00000000058E0000-0x00000000058F2000-memory.dmp
    Filesize

    72KB

  • memory/2244-1059-0x0000000004BA0000-0x0000000004BB0000-memory.dmp
    Filesize

    64KB

  • memory/2244-1060-0x0000000005900000-0x000000000593E000-memory.dmp
    Filesize

    248KB

  • memory/2244-1061-0x0000000005A50000-0x0000000005A9B000-memory.dmp
    Filesize

    300KB

  • memory/2244-1063-0x0000000005BE0000-0x0000000005C72000-memory.dmp
    Filesize

    584KB

  • memory/2244-1064-0x0000000005C80000-0x0000000005CE6000-memory.dmp
    Filesize

    408KB

  • memory/2244-1065-0x0000000006340000-0x00000000063B6000-memory.dmp
    Filesize

    472KB

  • memory/2244-1066-0x00000000063E0000-0x0000000006430000-memory.dmp
    Filesize

    320KB

  • memory/2244-1067-0x0000000004BA0000-0x0000000004BB0000-memory.dmp
    Filesize

    64KB

  • memory/2244-1068-0x0000000004BA0000-0x0000000004BB0000-memory.dmp
    Filesize

    64KB

  • memory/2244-1069-0x0000000004BA0000-0x0000000004BB0000-memory.dmp
    Filesize

    64KB

  • memory/2244-1070-0x0000000006580000-0x0000000006742000-memory.dmp
    Filesize

    1.8MB

  • memory/2244-1071-0x0000000006750000-0x0000000006C7C000-memory.dmp
    Filesize

    5.2MB

  • memory/2244-1072-0x0000000004BA0000-0x0000000004BB0000-memory.dmp
    Filesize

    64KB

  • memory/4408-1078-0x0000000000010000-0x0000000000042000-memory.dmp
    Filesize

    200KB

  • memory/4408-1079-0x0000000004B80000-0x0000000004B90000-memory.dmp
    Filesize

    64KB

  • memory/4408-1080-0x0000000004A60000-0x0000000004AAB000-memory.dmp
    Filesize

    300KB

  • memory/4408-1081-0x0000000004B80000-0x0000000004B90000-memory.dmp
    Filesize

    64KB

  • memory/4576-1087-0x0000000000580000-0x00000000005BB000-memory.dmp
    Filesize

    236KB