Analysis

  • max time kernel
    144s
  • max time network
    112s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10-04-2023 19:35

General

  • Target

    011e905f584f6f0f7b4b409b5d66fa5ae0c876339096255f9223280695d83e80.exe

  • Size

    801KB

  • MD5

    e02f44a7a0fed53f967b5e23dc6397ea

  • SHA1

    db93bd057a6b03e308878d35bce52ca4b5ffa5e9

  • SHA256

    011e905f584f6f0f7b4b409b5d66fa5ae0c876339096255f9223280695d83e80

  • SHA512

    2e8093344e60dd66aea0ff7b7106b4327a302d1a87fa682d4894e80b432511fe23bf26f29c9da8217576ca5be5f51fc97b6c989b94aa785e8b03658dc3e2e752

  • SSDEEP

    12288:IMrMy90/oq7l3pk/hlmmV4ACJftSxK7CX8l74PtpGxYxCbPhHg2aX:UyqoqlUBV4AEfQxfs4PuxYxUHgHX

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

zima

C2

176.113.115.145:4125

Attributes
  • auth_value

    2ef701d510c0d27e8a8e3270281678b1

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\011e905f584f6f0f7b4b409b5d66fa5ae0c876339096255f9223280695d83e80.exe
    "C:\Users\Admin\AppData\Local\Temp\011e905f584f6f0f7b4b409b5d66fa5ae0c876339096255f9223280695d83e80.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2984
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJj5529.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJj5529.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2980
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziCr2383.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziCr2383.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4140
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it456948.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it456948.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4164
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr793309.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr793309.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4964
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp257838.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp257838.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4788
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr781267.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr781267.exe
      2⤵
      • Executes dropped EXE
      PID:3728
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 616
        3⤵
        • Program crash
        PID:2908
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 696
        3⤵
        • Program crash
        PID:4820
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 768
        3⤵
        • Program crash
        PID:2084
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 844
        3⤵
        • Program crash
        PID:752
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 872
        3⤵
        • Program crash
        PID:4736
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 916
        3⤵
        • Program crash
        PID:2556
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3728 -s 1080
        3⤵
        • Program crash
        PID:2168

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr781267.exe
    Filesize

    231KB

    MD5

    f8117f396c10315824172b564d08490e

    SHA1

    96c20a6f156aa6e75f75fa9038a8878d75401138

    SHA256

    7f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba

    SHA512

    60606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr781267.exe
    Filesize

    231KB

    MD5

    f8117f396c10315824172b564d08490e

    SHA1

    96c20a6f156aa6e75f75fa9038a8878d75401138

    SHA256

    7f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba

    SHA512

    60606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJj5529.exe
    Filesize

    536KB

    MD5

    071170fa24c161e8aa84d1c0d76a2cb2

    SHA1

    eeea046b62a72ebfb7df70019f827fa4ca979118

    SHA256

    04d416b94ab59cd46a2fe7b14342aa560d720fe3f6267a4bd5bbf5e5abf0201a

    SHA512

    2e293f62c15662f45405617e86e21bd8030317b602b77d461b755b6041ffce83c374d2f104a660dc6f149e55813e61a33556870286e9165c265fdd18bb9a4ff1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJj5529.exe
    Filesize

    536KB

    MD5

    071170fa24c161e8aa84d1c0d76a2cb2

    SHA1

    eeea046b62a72ebfb7df70019f827fa4ca979118

    SHA256

    04d416b94ab59cd46a2fe7b14342aa560d720fe3f6267a4bd5bbf5e5abf0201a

    SHA512

    2e293f62c15662f45405617e86e21bd8030317b602b77d461b755b6041ffce83c374d2f104a660dc6f149e55813e61a33556870286e9165c265fdd18bb9a4ff1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp257838.exe
    Filesize

    168KB

    MD5

    c32710c11743bbf67102ca76141eda6f

    SHA1

    f3ac63ad91f246707be00442f9f914ba847bc186

    SHA256

    d823704a4d6ff2f7c9bad0a9325363a81b986d1b51b3715121c8753af7f73fa5

    SHA512

    7d1dab6e08dd26553bbc3066a02583678190a4bb4f239efa67ff48cc70491e6253664081ef951f1f2fab0c9bb71886de0afd435d1ca40bbaf3203d7939625d2b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp257838.exe
    Filesize

    168KB

    MD5

    c32710c11743bbf67102ca76141eda6f

    SHA1

    f3ac63ad91f246707be00442f9f914ba847bc186

    SHA256

    d823704a4d6ff2f7c9bad0a9325363a81b986d1b51b3715121c8753af7f73fa5

    SHA512

    7d1dab6e08dd26553bbc3066a02583678190a4bb4f239efa67ff48cc70491e6253664081ef951f1f2fab0c9bb71886de0afd435d1ca40bbaf3203d7939625d2b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziCr2383.exe
    Filesize

    382KB

    MD5

    b4603ae6759f4b71610312255b66b590

    SHA1

    8926a9b21701b69fb3a773a2c5ee9e3817ebc869

    SHA256

    c4d7891438ea6e55c513dcbf1602fa52b605993e7bf6afd2428212864a001f2b

    SHA512

    4c8ca4b56843ebbf3e4f027a77ff118f8f29fc5fae051243329d28f47bc8ab0694e002920bef7d57f238351933442ea7fba709bea36807af85456bdd0cbf2c47

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziCr2383.exe
    Filesize

    382KB

    MD5

    b4603ae6759f4b71610312255b66b590

    SHA1

    8926a9b21701b69fb3a773a2c5ee9e3817ebc869

    SHA256

    c4d7891438ea6e55c513dcbf1602fa52b605993e7bf6afd2428212864a001f2b

    SHA512

    4c8ca4b56843ebbf3e4f027a77ff118f8f29fc5fae051243329d28f47bc8ab0694e002920bef7d57f238351933442ea7fba709bea36807af85456bdd0cbf2c47

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it456948.exe
    Filesize

    11KB

    MD5

    ffa806fcde598c40288f7dedcf1f3687

    SHA1

    205b34112f10fb73813018f5e44c744386e1a96b

    SHA256

    83ee008e83c0ab56a531c5ff7c7aefb9dee303aa02e7e81c8cf407d4dee617a0

    SHA512

    6dbaaf246c6ea4246b5ca168e5effaa6fc9663668888250d232754ea48c14f6ba95c43e8b49480f46ba0d614b13a971a308b6a109b684c02b6d529af66769c67

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it456948.exe
    Filesize

    11KB

    MD5

    ffa806fcde598c40288f7dedcf1f3687

    SHA1

    205b34112f10fb73813018f5e44c744386e1a96b

    SHA256

    83ee008e83c0ab56a531c5ff7c7aefb9dee303aa02e7e81c8cf407d4dee617a0

    SHA512

    6dbaaf246c6ea4246b5ca168e5effaa6fc9663668888250d232754ea48c14f6ba95c43e8b49480f46ba0d614b13a971a308b6a109b684c02b6d529af66769c67

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr793309.exe
    Filesize

    297KB

    MD5

    183de026b335b611061ee8a0beaeae53

    SHA1

    75f5752ab937d9dfff96dfbd71dc140801610819

    SHA256

    50fffe1b2220fc50a22e0c7376a91985929ec65cfd5ec023cf468ef450fcb903

    SHA512

    9a44054e72d65772d1c07b0a37f874b89c0ab618f3015542d756c49bc90fe07c4e67290623484002fc371ddc2202ac14180377f9821753ed77cf5cbd60e1be6d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr793309.exe
    Filesize

    297KB

    MD5

    183de026b335b611061ee8a0beaeae53

    SHA1

    75f5752ab937d9dfff96dfbd71dc140801610819

    SHA256

    50fffe1b2220fc50a22e0c7376a91985929ec65cfd5ec023cf468ef450fcb903

    SHA512

    9a44054e72d65772d1c07b0a37f874b89c0ab618f3015542d756c49bc90fe07c4e67290623484002fc371ddc2202ac14180377f9821753ed77cf5cbd60e1be6d

  • memory/3728-1088-0x00000000004B0000-0x00000000004EB000-memory.dmp
    Filesize

    236KB

  • memory/4164-139-0x0000000000A20000-0x0000000000A2A000-memory.dmp
    Filesize

    40KB

  • memory/4788-1079-0x0000000000DB0000-0x0000000000DE0000-memory.dmp
    Filesize

    192KB

  • memory/4788-1080-0x0000000005660000-0x0000000005666000-memory.dmp
    Filesize

    24KB

  • memory/4788-1082-0x0000000005700000-0x0000000005710000-memory.dmp
    Filesize

    64KB

  • memory/4788-1081-0x000000000ACC0000-0x000000000AD0B000-memory.dmp
    Filesize

    300KB

  • memory/4964-184-0x0000000004F60000-0x0000000004F9F000-memory.dmp
    Filesize

    252KB

  • memory/4964-202-0x0000000004F60000-0x0000000004F9F000-memory.dmp
    Filesize

    252KB

  • memory/4964-152-0x0000000004F60000-0x0000000004F9F000-memory.dmp
    Filesize

    252KB

  • memory/4964-154-0x0000000004F60000-0x0000000004F9F000-memory.dmp
    Filesize

    252KB

  • memory/4964-156-0x0000000004F60000-0x0000000004F9F000-memory.dmp
    Filesize

    252KB

  • memory/4964-158-0x0000000004F60000-0x0000000004F9F000-memory.dmp
    Filesize

    252KB

  • memory/4964-160-0x0000000004F60000-0x0000000004F9F000-memory.dmp
    Filesize

    252KB

  • memory/4964-162-0x0000000004F60000-0x0000000004F9F000-memory.dmp
    Filesize

    252KB

  • memory/4964-164-0x0000000004F60000-0x0000000004F9F000-memory.dmp
    Filesize

    252KB

  • memory/4964-166-0x0000000004F60000-0x0000000004F9F000-memory.dmp
    Filesize

    252KB

  • memory/4964-168-0x0000000004F60000-0x0000000004F9F000-memory.dmp
    Filesize

    252KB

  • memory/4964-170-0x0000000004F60000-0x0000000004F9F000-memory.dmp
    Filesize

    252KB

  • memory/4964-172-0x0000000004F60000-0x0000000004F9F000-memory.dmp
    Filesize

    252KB

  • memory/4964-174-0x0000000004F60000-0x0000000004F9F000-memory.dmp
    Filesize

    252KB

  • memory/4964-176-0x0000000004F60000-0x0000000004F9F000-memory.dmp
    Filesize

    252KB

  • memory/4964-178-0x0000000004F60000-0x0000000004F9F000-memory.dmp
    Filesize

    252KB

  • memory/4964-180-0x0000000004F60000-0x0000000004F9F000-memory.dmp
    Filesize

    252KB

  • memory/4964-182-0x0000000004F60000-0x0000000004F9F000-memory.dmp
    Filesize

    252KB

  • memory/4964-150-0x0000000004F60000-0x0000000004FA4000-memory.dmp
    Filesize

    272KB

  • memory/4964-186-0x0000000004F60000-0x0000000004F9F000-memory.dmp
    Filesize

    252KB

  • memory/4964-188-0x0000000004F60000-0x0000000004F9F000-memory.dmp
    Filesize

    252KB

  • memory/4964-190-0x0000000004F60000-0x0000000004F9F000-memory.dmp
    Filesize

    252KB

  • memory/4964-192-0x0000000004F60000-0x0000000004F9F000-memory.dmp
    Filesize

    252KB

  • memory/4964-194-0x0000000004F60000-0x0000000004F9F000-memory.dmp
    Filesize

    252KB

  • memory/4964-196-0x0000000004F60000-0x0000000004F9F000-memory.dmp
    Filesize

    252KB

  • memory/4964-198-0x0000000004F60000-0x0000000004F9F000-memory.dmp
    Filesize

    252KB

  • memory/4964-200-0x0000000004F60000-0x0000000004F9F000-memory.dmp
    Filesize

    252KB

  • memory/4964-151-0x0000000004F60000-0x0000000004F9F000-memory.dmp
    Filesize

    252KB

  • memory/4964-204-0x0000000004F60000-0x0000000004F9F000-memory.dmp
    Filesize

    252KB

  • memory/4964-206-0x0000000004F60000-0x0000000004F9F000-memory.dmp
    Filesize

    252KB

  • memory/4964-208-0x0000000004F60000-0x0000000004F9F000-memory.dmp
    Filesize

    252KB

  • memory/4964-210-0x0000000004F60000-0x0000000004F9F000-memory.dmp
    Filesize

    252KB

  • memory/4964-212-0x0000000004F60000-0x0000000004F9F000-memory.dmp
    Filesize

    252KB

  • memory/4964-214-0x0000000004F60000-0x0000000004F9F000-memory.dmp
    Filesize

    252KB

  • memory/4964-1057-0x00000000055E0000-0x0000000005BE6000-memory.dmp
    Filesize

    6.0MB

  • memory/4964-1058-0x0000000005050000-0x000000000515A000-memory.dmp
    Filesize

    1.0MB

  • memory/4964-1059-0x0000000005190000-0x00000000051A2000-memory.dmp
    Filesize

    72KB

  • memory/4964-1060-0x0000000002030000-0x0000000002040000-memory.dmp
    Filesize

    64KB

  • memory/4964-1061-0x00000000051B0000-0x00000000051EE000-memory.dmp
    Filesize

    248KB

  • memory/4964-1062-0x0000000005300000-0x000000000534B000-memory.dmp
    Filesize

    300KB

  • memory/4964-1064-0x00000000005A0000-0x00000000005EB000-memory.dmp
    Filesize

    300KB

  • memory/4964-1065-0x0000000002030000-0x0000000002040000-memory.dmp
    Filesize

    64KB

  • memory/4964-1066-0x0000000005490000-0x0000000005522000-memory.dmp
    Filesize

    584KB

  • memory/4964-1067-0x0000000005530000-0x0000000005596000-memory.dmp
    Filesize

    408KB

  • memory/4964-1068-0x0000000002030000-0x0000000002040000-memory.dmp
    Filesize

    64KB

  • memory/4964-149-0x0000000004A20000-0x0000000004F1E000-memory.dmp
    Filesize

    5.0MB

  • memory/4964-148-0x0000000002030000-0x0000000002040000-memory.dmp
    Filesize

    64KB

  • memory/4964-147-0x0000000002030000-0x0000000002040000-memory.dmp
    Filesize

    64KB

  • memory/4964-146-0x0000000002570000-0x00000000025B6000-memory.dmp
    Filesize

    280KB

  • memory/4964-145-0x00000000005A0000-0x00000000005EB000-memory.dmp
    Filesize

    300KB

  • memory/4964-1069-0x0000000006220000-0x0000000006296000-memory.dmp
    Filesize

    472KB

  • memory/4964-1070-0x00000000062B0000-0x0000000006300000-memory.dmp
    Filesize

    320KB

  • memory/4964-1071-0x0000000006340000-0x0000000006502000-memory.dmp
    Filesize

    1.8MB

  • memory/4964-1072-0x0000000006510000-0x0000000006A3C000-memory.dmp
    Filesize

    5.2MB