Analysis

  • max time kernel
    149s
  • max time network
    103s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10-04-2023 19:09

General

  • Target

    871dfcc7217c5c16f3b5638540eb3e999b0815c3704ba8b70d809d17367fe7ca.exe

  • Size

    801KB

  • MD5

    cd5e28fc1d6ff681fb019650c78b1872

  • SHA1

    e69cf6988db840394aeba4b6c8a52f81e3260a92

  • SHA256

    871dfcc7217c5c16f3b5638540eb3e999b0815c3704ba8b70d809d17367fe7ca

  • SHA512

    52f895ef65f20db5a6b5bf247e8a86f7e136dae7e027f1b960cd3c75feace6a8d13ea8c2ad5ff0f575efb57643764318b48fec59e6a3a2f7340c57d5a02e0c56

  • SSDEEP

    12288:RMrCy901b0WyeiPjG0jkkz7xHE5BOwchsn3EdEaFvtZz+noi+s1E:ny+XiPjG0jxtCOwbYFZIoi3E

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

zima

C2

176.113.115.145:4125

Attributes
  • auth_value

    2ef701d510c0d27e8a8e3270281678b1

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\871dfcc7217c5c16f3b5638540eb3e999b0815c3704ba8b70d809d17367fe7ca.exe
    "C:\Users\Admin\AppData\Local\Temp\871dfcc7217c5c16f3b5638540eb3e999b0815c3704ba8b70d809d17367fe7ca.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3520
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPb6300.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPb6300.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4076
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zirZ3718.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zirZ3718.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4680
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it235452.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it235452.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5060
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr607687.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr607687.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2036
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp292588.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp292588.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4916
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr937643.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr937643.exe
      2⤵
      • Executes dropped EXE
      PID:2964
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 616
        3⤵
        • Program crash
        PID:4852
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 728
        3⤵
        • Program crash
        PID:4164
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 604
        3⤵
        • Program crash
        PID:4928
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 712
        3⤵
        • Program crash
        PID:4388
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 872
        3⤵
        • Program crash
        PID:4436
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 784
        3⤵
        • Program crash
        PID:4496
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 1060
        3⤵
        • Program crash
        PID:3896

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr937643.exe

    Filesize

    231KB

    MD5

    af7fca55ea436503f0fb684c1c158383

    SHA1

    c6e2a00e5a4854b2c103748d47ae18356e7efa0d

    SHA256

    cb3b7bdaee641f2225640efc12d83f616526cc985a22e0dfb6bed041d84a8c60

    SHA512

    f6d2b00dc84a58db17080766b05fe831d08fbf0f85750b611fcea55069622964d71473a40de64cd8fbcee7f39487e9087c632645d550f63d3ec87e2f3a36fe84

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr937643.exe

    Filesize

    231KB

    MD5

    af7fca55ea436503f0fb684c1c158383

    SHA1

    c6e2a00e5a4854b2c103748d47ae18356e7efa0d

    SHA256

    cb3b7bdaee641f2225640efc12d83f616526cc985a22e0dfb6bed041d84a8c60

    SHA512

    f6d2b00dc84a58db17080766b05fe831d08fbf0f85750b611fcea55069622964d71473a40de64cd8fbcee7f39487e9087c632645d550f63d3ec87e2f3a36fe84

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPb6300.exe

    Filesize

    535KB

    MD5

    3b2dd7476a4edab226a194e5879e3ad9

    SHA1

    2c711bcd3d4c4f8217988a3dd680992fa5356e75

    SHA256

    cf366ebcda631c6857f60ae8edb278dda21abcf1443c2394248799d18090b72e

    SHA512

    c19b6bb2f8070ce8c0f83256b65401b6efa3ac3e0cf6eab9e89025735201edf3b788ad2fd3ec0b828d685842bb2a54ee3b1a68052645f17f090d3b2143aa0e5e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPb6300.exe

    Filesize

    535KB

    MD5

    3b2dd7476a4edab226a194e5879e3ad9

    SHA1

    2c711bcd3d4c4f8217988a3dd680992fa5356e75

    SHA256

    cf366ebcda631c6857f60ae8edb278dda21abcf1443c2394248799d18090b72e

    SHA512

    c19b6bb2f8070ce8c0f83256b65401b6efa3ac3e0cf6eab9e89025735201edf3b788ad2fd3ec0b828d685842bb2a54ee3b1a68052645f17f090d3b2143aa0e5e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp292588.exe

    Filesize

    168KB

    MD5

    478148e5f60728b79726cdf181211659

    SHA1

    5f7276b74becead4dfa98c1e6305497c840e89db

    SHA256

    4e74fd0ccf69443a0eb9734c9045cbc2989d347efd619f21d0abd0a3b4e0cfb5

    SHA512

    9ec5a2dea11ada98d710126b1180ba00233c56b4ee7e9b31190b062cdd7e4b4a9c1db07b9484770d01c22d67a395419421ddb76dc2277f2e8ec366e4780a5282

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp292588.exe

    Filesize

    168KB

    MD5

    478148e5f60728b79726cdf181211659

    SHA1

    5f7276b74becead4dfa98c1e6305497c840e89db

    SHA256

    4e74fd0ccf69443a0eb9734c9045cbc2989d347efd619f21d0abd0a3b4e0cfb5

    SHA512

    9ec5a2dea11ada98d710126b1180ba00233c56b4ee7e9b31190b062cdd7e4b4a9c1db07b9484770d01c22d67a395419421ddb76dc2277f2e8ec366e4780a5282

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zirZ3718.exe

    Filesize

    382KB

    MD5

    0eb7e292c58e5713eeefb54d16c905b1

    SHA1

    e8bc1121cc7eca6e76da98ab19f9abe9c655bb28

    SHA256

    601ae9db17ce7019512af60cfc0451288cdad302ff63a249190da84faad5468f

    SHA512

    ace57d45ef7e95ebd276a93486594daaa074076767b991760e53a24833726e5e6ab33d4f63085375968716e9e3269b529392ef2ff67b346441e668f65d7543a6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zirZ3718.exe

    Filesize

    382KB

    MD5

    0eb7e292c58e5713eeefb54d16c905b1

    SHA1

    e8bc1121cc7eca6e76da98ab19f9abe9c655bb28

    SHA256

    601ae9db17ce7019512af60cfc0451288cdad302ff63a249190da84faad5468f

    SHA512

    ace57d45ef7e95ebd276a93486594daaa074076767b991760e53a24833726e5e6ab33d4f63085375968716e9e3269b529392ef2ff67b346441e668f65d7543a6

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it235452.exe

    Filesize

    11KB

    MD5

    3d408716834736ed12d9638e2e477df8

    SHA1

    a6ac21609ad6c20caf50aaadfd6f4f547435e75e

    SHA256

    6a50eca253cb440b7cabef534a21bae755ac6b7e814c5fabd9309ce30271bb7c

    SHA512

    a345c14da445dd2bd0ff74180d7a0595d132c05af51f17fb0ce79ae4b74b1da878c5e5553c56ab4fa728fa57d419c14cc50ca14c9591759cd4e52d709f4de7df

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it235452.exe

    Filesize

    11KB

    MD5

    3d408716834736ed12d9638e2e477df8

    SHA1

    a6ac21609ad6c20caf50aaadfd6f4f547435e75e

    SHA256

    6a50eca253cb440b7cabef534a21bae755ac6b7e814c5fabd9309ce30271bb7c

    SHA512

    a345c14da445dd2bd0ff74180d7a0595d132c05af51f17fb0ce79ae4b74b1da878c5e5553c56ab4fa728fa57d419c14cc50ca14c9591759cd4e52d709f4de7df

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr607687.exe

    Filesize

    297KB

    MD5

    04dc8f146bd297eeca6b9987692c4bf2

    SHA1

    433d7c3b50cccdbe3d8ff3673598a2b71b789905

    SHA256

    b93291ca21bfc06375f47c5bd67fe3168a45651eb0ec3f95543c87fc64bf90ed

    SHA512

    e62aecf6dc765b5d5d4d25d719292f5e55fc9432eb79d4cc2f07d2bf351c5685639f2b2ec42f2b2c20f658e4ac900abcbeb7f7045bd250a44f697208d4104893

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr607687.exe

    Filesize

    297KB

    MD5

    04dc8f146bd297eeca6b9987692c4bf2

    SHA1

    433d7c3b50cccdbe3d8ff3673598a2b71b789905

    SHA256

    b93291ca21bfc06375f47c5bd67fe3168a45651eb0ec3f95543c87fc64bf90ed

    SHA512

    e62aecf6dc765b5d5d4d25d719292f5e55fc9432eb79d4cc2f07d2bf351c5685639f2b2ec42f2b2c20f658e4ac900abcbeb7f7045bd250a44f697208d4104893

  • memory/2036-190-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/2036-200-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/2036-148-0x0000000004B30000-0x0000000004B40000-memory.dmp

    Filesize

    64KB

  • memory/2036-149-0x0000000004B40000-0x000000000503E000-memory.dmp

    Filesize

    5.0MB

  • memory/2036-150-0x0000000004A80000-0x0000000004AC4000-memory.dmp

    Filesize

    272KB

  • memory/2036-151-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/2036-152-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/2036-156-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/2036-154-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/2036-158-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/2036-160-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/2036-162-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/2036-166-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/2036-164-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/2036-168-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/2036-170-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/2036-172-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/2036-174-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/2036-176-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/2036-178-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/2036-180-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/2036-182-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/2036-184-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/2036-187-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/2036-146-0x0000000004A00000-0x0000000004A46000-memory.dmp

    Filesize

    280KB

  • memory/2036-188-0x0000000004B30000-0x0000000004B40000-memory.dmp

    Filesize

    64KB

  • memory/2036-186-0x0000000004B30000-0x0000000004B40000-memory.dmp

    Filesize

    64KB

  • memory/2036-192-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/2036-194-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/2036-196-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/2036-198-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/2036-147-0x0000000000610000-0x000000000065B000-memory.dmp

    Filesize

    300KB

  • memory/2036-202-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/2036-204-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/2036-206-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/2036-208-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/2036-210-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/2036-212-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/2036-214-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/2036-216-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/2036-1059-0x0000000005650000-0x0000000005C56000-memory.dmp

    Filesize

    6.0MB

  • memory/2036-1060-0x0000000005050000-0x000000000515A000-memory.dmp

    Filesize

    1.0MB

  • memory/2036-1061-0x0000000005190000-0x00000000051A2000-memory.dmp

    Filesize

    72KB

  • memory/2036-1062-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/2036-1063-0x0000000005300000-0x000000000534B000-memory.dmp

    Filesize

    300KB

  • memory/2036-1064-0x0000000004B30000-0x0000000004B40000-memory.dmp

    Filesize

    64KB

  • memory/2036-1066-0x0000000005490000-0x00000000054F6000-memory.dmp

    Filesize

    408KB

  • memory/2036-1067-0x0000000006160000-0x00000000061F2000-memory.dmp

    Filesize

    584KB

  • memory/2036-1068-0x0000000004B30000-0x0000000004B40000-memory.dmp

    Filesize

    64KB

  • memory/2036-1069-0x0000000006340000-0x0000000006502000-memory.dmp

    Filesize

    1.8MB

  • memory/2036-1070-0x0000000006510000-0x0000000006A3C000-memory.dmp

    Filesize

    5.2MB

  • memory/2036-1071-0x0000000004B30000-0x0000000004B40000-memory.dmp

    Filesize

    64KB

  • memory/2036-1072-0x0000000004B30000-0x0000000004B40000-memory.dmp

    Filesize

    64KB

  • memory/2036-1073-0x0000000004B30000-0x0000000004B40000-memory.dmp

    Filesize

    64KB

  • memory/2036-1074-0x0000000006CD0000-0x0000000006D46000-memory.dmp

    Filesize

    472KB

  • memory/2036-1075-0x0000000006D50000-0x0000000006DA0000-memory.dmp

    Filesize

    320KB

  • memory/2964-1090-0x0000000000590000-0x00000000005CB000-memory.dmp

    Filesize

    236KB

  • memory/4916-1081-0x0000000000690000-0x00000000006C0000-memory.dmp

    Filesize

    192KB

  • memory/4916-1082-0x0000000000BB0000-0x0000000000BB6000-memory.dmp

    Filesize

    24KB

  • memory/4916-1083-0x000000000A470000-0x000000000A4BB000-memory.dmp

    Filesize

    300KB

  • memory/4916-1084-0x0000000005060000-0x0000000005070000-memory.dmp

    Filesize

    64KB

  • memory/5060-140-0x0000000000BF0000-0x0000000000BFA000-memory.dmp

    Filesize

    40KB