Analysis

  • max time kernel
    148s
  • max time network
    103s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10-04-2023 19:24

General

  • Target

    4d146c38f51586d50d4ca15c5c78cc1871be6959e3b3c0cbe5ec7123911c42bb.exe

  • Size

    800KB

  • MD5

    3e83d2d24f5308235db0b12971c8f31e

  • SHA1

    5a9c97a3c2d9466f013c98157d0d687496210080

  • SHA256

    4d146c38f51586d50d4ca15c5c78cc1871be6959e3b3c0cbe5ec7123911c42bb

  • SHA512

    5746997d30b0ff7054d277120e8676fff03971a4246812764e329e84abd510c6c0aba1a430e124f43e09778b17ef36c3a0ac317b1157ba9eff1c841d80d40891

  • SSDEEP

    24576:fytMJ/2XszfqA1+/TCokOxfOwIixN88E9hILXtr:q+lOE+/Txxm2c8pt

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

zima

C2

176.113.115.145:4125

Attributes
  • auth_value

    2ef701d510c0d27e8a8e3270281678b1

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d146c38f51586d50d4ca15c5c78cc1871be6959e3b3c0cbe5ec7123911c42bb.exe
    "C:\Users\Admin\AppData\Local\Temp\4d146c38f51586d50d4ca15c5c78cc1871be6959e3b3c0cbe5ec7123911c42bb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3944
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKJ4336.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKJ4336.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4168
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziDz9022.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziDz9022.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4516
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it128098.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it128098.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4564
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr505016.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr505016.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4756
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp299021.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp299021.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2092
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr062358.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr062358.exe
      2⤵
      • Executes dropped EXE
      PID:4364
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 620
        3⤵
        • Program crash
        PID:4972
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 704
        3⤵
        • Program crash
        PID:4424
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 840
        3⤵
        • Program crash
        PID:4136
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 848
        3⤵
        • Program crash
        PID:4124
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 888
        3⤵
        • Program crash
        PID:4688
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 896
        3⤵
        • Program crash
        PID:2992
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 1056
        3⤵
        • Program crash
        PID:4668

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr062358.exe

    Filesize

    231KB

    MD5

    f8117f396c10315824172b564d08490e

    SHA1

    96c20a6f156aa6e75f75fa9038a8878d75401138

    SHA256

    7f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba

    SHA512

    60606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr062358.exe

    Filesize

    231KB

    MD5

    f8117f396c10315824172b564d08490e

    SHA1

    96c20a6f156aa6e75f75fa9038a8878d75401138

    SHA256

    7f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba

    SHA512

    60606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKJ4336.exe

    Filesize

    536KB

    MD5

    d5e20aed371654aebaf84220a8165012

    SHA1

    aa75877185563f22c7ea2095006819e8824774f7

    SHA256

    59e232c8f779b328a06949d9415801f3b5429ab3591ed9f227bb44fda6aade19

    SHA512

    669ed4664a0466eda2c589e3281e7800ba9eaec8907b592ebd765945cf0349b59bf6ccccf2e6abc12f866081b1305a0c6e2f107b6e6342a87855581908e7fa35

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKJ4336.exe

    Filesize

    536KB

    MD5

    d5e20aed371654aebaf84220a8165012

    SHA1

    aa75877185563f22c7ea2095006819e8824774f7

    SHA256

    59e232c8f779b328a06949d9415801f3b5429ab3591ed9f227bb44fda6aade19

    SHA512

    669ed4664a0466eda2c589e3281e7800ba9eaec8907b592ebd765945cf0349b59bf6ccccf2e6abc12f866081b1305a0c6e2f107b6e6342a87855581908e7fa35

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp299021.exe

    Filesize

    168KB

    MD5

    8348793ac13b25df5f425f7230923d04

    SHA1

    b2dcd9185817a366cee6e7b06092197977ee3bec

    SHA256

    f5c9b3a8c4ff6016626156473bcf9a2c096f26dfa50d70f4edc66ef02e51d6db

    SHA512

    279960c59eeeede84d8cf3b189e9a24161643f9f3d40e05b513e941a7ea5874b3d033e8e25f82a11b708854d808c244c649b2f68603574e642071a8c2a418256

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp299021.exe

    Filesize

    168KB

    MD5

    8348793ac13b25df5f425f7230923d04

    SHA1

    b2dcd9185817a366cee6e7b06092197977ee3bec

    SHA256

    f5c9b3a8c4ff6016626156473bcf9a2c096f26dfa50d70f4edc66ef02e51d6db

    SHA512

    279960c59eeeede84d8cf3b189e9a24161643f9f3d40e05b513e941a7ea5874b3d033e8e25f82a11b708854d808c244c649b2f68603574e642071a8c2a418256

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziDz9022.exe

    Filesize

    382KB

    MD5

    4e69af6cf2d18ece73d68aac98ba9032

    SHA1

    649ba6a1d43be415a0cfa2c40c60d11f1f2d58d4

    SHA256

    305964fc6be2a9f5aa35f94c9b040b51e47e3c183d29221b9ea9a0f9eff9d115

    SHA512

    461f2bcfe0bf62e14c3e8a3d1c12ef34b7f336895821612b59f07530fd61b0cc14fcb4160998ca38cdcbf6ddf3a4eb89943dc16175472488a53ea46b2d9a8447

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziDz9022.exe

    Filesize

    382KB

    MD5

    4e69af6cf2d18ece73d68aac98ba9032

    SHA1

    649ba6a1d43be415a0cfa2c40c60d11f1f2d58d4

    SHA256

    305964fc6be2a9f5aa35f94c9b040b51e47e3c183d29221b9ea9a0f9eff9d115

    SHA512

    461f2bcfe0bf62e14c3e8a3d1c12ef34b7f336895821612b59f07530fd61b0cc14fcb4160998ca38cdcbf6ddf3a4eb89943dc16175472488a53ea46b2d9a8447

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it128098.exe

    Filesize

    11KB

    MD5

    7db5b6dd818c70bf7d89e4a4d0c348f0

    SHA1

    4ba2627cbad98cc3f34cd1b6fc90e239b7dcb037

    SHA256

    b3a9ed94c66fdaf0259747f05e0abb1a22f010517e762ce713cb0efee0c6bd16

    SHA512

    dba6be30ea75817849a314a8b5f4c9ee5bf8e3d772592b72f7fded090e242ef4e4658699fee33de3735e232dc5520d0752092024b1f5a412b5bb151edc21f40e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it128098.exe

    Filesize

    11KB

    MD5

    7db5b6dd818c70bf7d89e4a4d0c348f0

    SHA1

    4ba2627cbad98cc3f34cd1b6fc90e239b7dcb037

    SHA256

    b3a9ed94c66fdaf0259747f05e0abb1a22f010517e762ce713cb0efee0c6bd16

    SHA512

    dba6be30ea75817849a314a8b5f4c9ee5bf8e3d772592b72f7fded090e242ef4e4658699fee33de3735e232dc5520d0752092024b1f5a412b5bb151edc21f40e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr505016.exe

    Filesize

    297KB

    MD5

    0a7c713e66c12372cc6d8ffe19cd5793

    SHA1

    65c471dfc4199cb60755c7242e73f658e8b45618

    SHA256

    f48d1f6f2f91e3c4f23f43ec73194696c651b974ac10c043bbccb9917b18b831

    SHA512

    ab2d265d12b653390a78c8701640f9153a4bb2d2083e4e8cbfcc2c0ccf5949245d510e185574af465de459b05be226521b926a631ab10e80961b457b747af316

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr505016.exe

    Filesize

    297KB

    MD5

    0a7c713e66c12372cc6d8ffe19cd5793

    SHA1

    65c471dfc4199cb60755c7242e73f658e8b45618

    SHA256

    f48d1f6f2f91e3c4f23f43ec73194696c651b974ac10c043bbccb9917b18b831

    SHA512

    ab2d265d12b653390a78c8701640f9153a4bb2d2083e4e8cbfcc2c0ccf5949245d510e185574af465de459b05be226521b926a631ab10e80961b457b747af316

  • memory/2092-1082-0x0000000001020000-0x0000000001026000-memory.dmp

    Filesize

    24KB

  • memory/2092-1081-0x00000000009D0000-0x0000000000A00000-memory.dmp

    Filesize

    192KB

  • memory/2092-1084-0x0000000005280000-0x0000000005290000-memory.dmp

    Filesize

    64KB

  • memory/2092-1083-0x000000000A7B0000-0x000000000A7FB000-memory.dmp

    Filesize

    300KB

  • memory/4364-1090-0x0000000001EC0000-0x0000000001EFB000-memory.dmp

    Filesize

    236KB

  • memory/4564-141-0x00000000007B0000-0x00000000007BA000-memory.dmp

    Filesize

    40KB

  • memory/4756-185-0x0000000002540000-0x000000000257F000-memory.dmp

    Filesize

    252KB

  • memory/4756-203-0x0000000002540000-0x000000000257F000-memory.dmp

    Filesize

    252KB

  • memory/4756-154-0x0000000002540000-0x000000000257F000-memory.dmp

    Filesize

    252KB

  • memory/4756-155-0x0000000002540000-0x000000000257F000-memory.dmp

    Filesize

    252KB

  • memory/4756-157-0x0000000002540000-0x000000000257F000-memory.dmp

    Filesize

    252KB

  • memory/4756-159-0x0000000002540000-0x000000000257F000-memory.dmp

    Filesize

    252KB

  • memory/4756-161-0x0000000002540000-0x000000000257F000-memory.dmp

    Filesize

    252KB

  • memory/4756-163-0x0000000002540000-0x000000000257F000-memory.dmp

    Filesize

    252KB

  • memory/4756-165-0x0000000002540000-0x000000000257F000-memory.dmp

    Filesize

    252KB

  • memory/4756-167-0x0000000002540000-0x000000000257F000-memory.dmp

    Filesize

    252KB

  • memory/4756-169-0x0000000002540000-0x000000000257F000-memory.dmp

    Filesize

    252KB

  • memory/4756-171-0x0000000002540000-0x000000000257F000-memory.dmp

    Filesize

    252KB

  • memory/4756-173-0x0000000002540000-0x000000000257F000-memory.dmp

    Filesize

    252KB

  • memory/4756-175-0x0000000002540000-0x000000000257F000-memory.dmp

    Filesize

    252KB

  • memory/4756-177-0x0000000002540000-0x000000000257F000-memory.dmp

    Filesize

    252KB

  • memory/4756-179-0x0000000002540000-0x000000000257F000-memory.dmp

    Filesize

    252KB

  • memory/4756-181-0x0000000002540000-0x000000000257F000-memory.dmp

    Filesize

    252KB

  • memory/4756-183-0x0000000002540000-0x000000000257F000-memory.dmp

    Filesize

    252KB

  • memory/4756-152-0x0000000004B90000-0x0000000004BA0000-memory.dmp

    Filesize

    64KB

  • memory/4756-187-0x0000000002540000-0x000000000257F000-memory.dmp

    Filesize

    252KB

  • memory/4756-189-0x0000000002540000-0x000000000257F000-memory.dmp

    Filesize

    252KB

  • memory/4756-191-0x0000000002540000-0x000000000257F000-memory.dmp

    Filesize

    252KB

  • memory/4756-193-0x0000000002540000-0x000000000257F000-memory.dmp

    Filesize

    252KB

  • memory/4756-195-0x0000000002540000-0x000000000257F000-memory.dmp

    Filesize

    252KB

  • memory/4756-197-0x0000000002540000-0x000000000257F000-memory.dmp

    Filesize

    252KB

  • memory/4756-199-0x0000000002540000-0x000000000257F000-memory.dmp

    Filesize

    252KB

  • memory/4756-201-0x0000000002540000-0x000000000257F000-memory.dmp

    Filesize

    252KB

  • memory/4756-153-0x0000000004B90000-0x0000000004BA0000-memory.dmp

    Filesize

    64KB

  • memory/4756-205-0x0000000002540000-0x000000000257F000-memory.dmp

    Filesize

    252KB

  • memory/4756-207-0x0000000002540000-0x000000000257F000-memory.dmp

    Filesize

    252KB

  • memory/4756-209-0x0000000002540000-0x000000000257F000-memory.dmp

    Filesize

    252KB

  • memory/4756-211-0x0000000002540000-0x000000000257F000-memory.dmp

    Filesize

    252KB

  • memory/4756-213-0x0000000002540000-0x000000000257F000-memory.dmp

    Filesize

    252KB

  • memory/4756-215-0x0000000002540000-0x000000000257F000-memory.dmp

    Filesize

    252KB

  • memory/4756-217-0x0000000002540000-0x000000000257F000-memory.dmp

    Filesize

    252KB

  • memory/4756-1060-0x00000000056B0000-0x0000000005CB6000-memory.dmp

    Filesize

    6.0MB

  • memory/4756-1061-0x00000000050A0000-0x00000000051AA000-memory.dmp

    Filesize

    1.0MB

  • memory/4756-1062-0x0000000004B70000-0x0000000004B82000-memory.dmp

    Filesize

    72KB

  • memory/4756-1063-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/4756-1064-0x0000000004B90000-0x0000000004BA0000-memory.dmp

    Filesize

    64KB

  • memory/4756-1065-0x0000000005300000-0x000000000534B000-memory.dmp

    Filesize

    300KB

  • memory/4756-1067-0x0000000005490000-0x00000000054F6000-memory.dmp

    Filesize

    408KB

  • memory/4756-1068-0x0000000006170000-0x0000000006202000-memory.dmp

    Filesize

    584KB

  • memory/4756-1069-0x0000000004B90000-0x0000000004BA0000-memory.dmp

    Filesize

    64KB

  • memory/4756-1070-0x0000000004B90000-0x0000000004BA0000-memory.dmp

    Filesize

    64KB

  • memory/4756-1071-0x0000000006340000-0x00000000063B6000-memory.dmp

    Filesize

    472KB

  • memory/4756-151-0x0000000004B90000-0x0000000004BA0000-memory.dmp

    Filesize

    64KB

  • memory/4756-150-0x00000000005B0000-0x00000000005FB000-memory.dmp

    Filesize

    300KB

  • memory/4756-149-0x0000000002540000-0x0000000002584000-memory.dmp

    Filesize

    272KB

  • memory/4756-148-0x0000000004BA0000-0x000000000509E000-memory.dmp

    Filesize

    5.0MB

  • memory/4756-147-0x00000000021A0000-0x00000000021E6000-memory.dmp

    Filesize

    280KB

  • memory/4756-1072-0x00000000063D0000-0x0000000006420000-memory.dmp

    Filesize

    320KB

  • memory/4756-1073-0x0000000004B90000-0x0000000004BA0000-memory.dmp

    Filesize

    64KB

  • memory/4756-1074-0x0000000006580000-0x0000000006742000-memory.dmp

    Filesize

    1.8MB

  • memory/4756-1075-0x0000000006750000-0x0000000006C7C000-memory.dmp

    Filesize

    5.2MB