Analysis

  • max time kernel
    146s
  • max time network
    112s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10-04-2023 19:42

General

  • Target

    ea943ed669511d930b0244e7009c81d8cf99fbe9a92de508f2e7a243533c6877.exe

  • Size

    801KB

  • MD5

    dde9198f8ae10cc89681066e964d22f4

  • SHA1

    9a640a75770d2938b40f05eddf1360a665537919

  • SHA256

    ea943ed669511d930b0244e7009c81d8cf99fbe9a92de508f2e7a243533c6877

  • SHA512

    83b4f2aa1e1878dfad62cbd0c2909ddbac15a7c78297011cc48051efcb57f007131f4312d15bba160414a1ae054006f820cc8f74798836ff3f7fde4026055a11

  • SSDEEP

    12288:rMrLy90+pc6r2ppxlI5rjj7+Nyy48U7wVaxK7C4g+cfJyk83ZKmdeMcHkbWoIyt:wyHp/rUIdSyNb84xf/DfJ2NsMcHkbHt

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

zima

C2

176.113.115.145:4125

Attributes
  • auth_value

    2ef701d510c0d27e8a8e3270281678b1

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea943ed669511d930b0244e7009c81d8cf99fbe9a92de508f2e7a243533c6877.exe
    "C:\Users\Admin\AppData\Local\Temp\ea943ed669511d930b0244e7009c81d8cf99fbe9a92de508f2e7a243533c6877.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3748
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihh9865.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihh9865.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4212
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziRY5832.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziRY5832.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3652
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it329030.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it329030.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5012
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr495984.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr495984.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4316
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp793534.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp793534.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2948
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr882043.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr882043.exe
      2⤵
      • Executes dropped EXE
      PID:3720
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3720 -s 616
        3⤵
        • Program crash
        PID:3964
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3720 -s 696
        3⤵
        • Program crash
        PID:3860
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3720 -s 772
        3⤵
        • Program crash
        PID:4864
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3720 -s 844
        3⤵
        • Program crash
        PID:4880
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3720 -s 872
        3⤵
        • Program crash
        PID:2840
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3720 -s 888
        3⤵
        • Program crash
        PID:4856
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3720 -s 1060
        3⤵
        • Program crash
        PID:4156

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr882043.exe

    Filesize

    231KB

    MD5

    f8117f396c10315824172b564d08490e

    SHA1

    96c20a6f156aa6e75f75fa9038a8878d75401138

    SHA256

    7f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba

    SHA512

    60606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr882043.exe

    Filesize

    231KB

    MD5

    f8117f396c10315824172b564d08490e

    SHA1

    96c20a6f156aa6e75f75fa9038a8878d75401138

    SHA256

    7f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba

    SHA512

    60606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihh9865.exe

    Filesize

    536KB

    MD5

    5a47fa33aafeeaa5a4b7f972aaed327e

    SHA1

    b3a057dcda113e9316edfee23deff9fe235300ff

    SHA256

    3385511c851997816a6f34272a78acd0ee4d0ae0c43c0f1024e1399dffeb5621

    SHA512

    60a46c459b9f4dbd703e4d529e8edd45894f126ac0c4bb97932a6e1ea913b870e75c17bb6f17a06563c57ee170607ecdaa1ca6461dc9854ae76cada6285f03f4

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihh9865.exe

    Filesize

    536KB

    MD5

    5a47fa33aafeeaa5a4b7f972aaed327e

    SHA1

    b3a057dcda113e9316edfee23deff9fe235300ff

    SHA256

    3385511c851997816a6f34272a78acd0ee4d0ae0c43c0f1024e1399dffeb5621

    SHA512

    60a46c459b9f4dbd703e4d529e8edd45894f126ac0c4bb97932a6e1ea913b870e75c17bb6f17a06563c57ee170607ecdaa1ca6461dc9854ae76cada6285f03f4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp793534.exe

    Filesize

    169KB

    MD5

    ab0163e821734ec8417c90e8bf290f79

    SHA1

    bae22f2a9eed21e88939963b483a92bd943b613e

    SHA256

    65bcde7d2af815cb39c26360c9972029709480a2fae51af0d3b649f2e0da9cbc

    SHA512

    47a6d87fbb38cbd6925499b473a7c850cf3398dc4958d5ae41708f89c1ae47c7fdca6063f4a42521d5cd217684a5c74c3801c6131c7cd367f8d00093cf63a3e9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp793534.exe

    Filesize

    169KB

    MD5

    ab0163e821734ec8417c90e8bf290f79

    SHA1

    bae22f2a9eed21e88939963b483a92bd943b613e

    SHA256

    65bcde7d2af815cb39c26360c9972029709480a2fae51af0d3b649f2e0da9cbc

    SHA512

    47a6d87fbb38cbd6925499b473a7c850cf3398dc4958d5ae41708f89c1ae47c7fdca6063f4a42521d5cd217684a5c74c3801c6131c7cd367f8d00093cf63a3e9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziRY5832.exe

    Filesize

    382KB

    MD5

    d75fcd60b488453995018b001378754b

    SHA1

    cc5ca3f37204af2cdc8204bac42190702a37565e

    SHA256

    2dd6959aa45c246a02bfffeb165abc367aae81f932bd038e411182e261d9374f

    SHA512

    056eff0933c4835a7f7ebc60e4a6f64c58a4bf80dce8dd3eb9531e8c3af5a423aca7a0d84a4c4374d64d025b1b43fad3428b57eada17cb94aa5d2304d46d6399

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziRY5832.exe

    Filesize

    382KB

    MD5

    d75fcd60b488453995018b001378754b

    SHA1

    cc5ca3f37204af2cdc8204bac42190702a37565e

    SHA256

    2dd6959aa45c246a02bfffeb165abc367aae81f932bd038e411182e261d9374f

    SHA512

    056eff0933c4835a7f7ebc60e4a6f64c58a4bf80dce8dd3eb9531e8c3af5a423aca7a0d84a4c4374d64d025b1b43fad3428b57eada17cb94aa5d2304d46d6399

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it329030.exe

    Filesize

    11KB

    MD5

    36e4199125d0a8125ec82c17fbc52a11

    SHA1

    d673675f65012e724bec7e600504d64e064289b2

    SHA256

    2155f567171ae099ba31264d097466d07e7f7661499ead4cff53a6045d0d4270

    SHA512

    3615d745516e92304b6ce73ee40273510d88c7d288742413032505f1e1266250356fe23181cd3bd314b026c18538359451168da98d669ae4e8cbf8ae89b1a559

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it329030.exe

    Filesize

    11KB

    MD5

    36e4199125d0a8125ec82c17fbc52a11

    SHA1

    d673675f65012e724bec7e600504d64e064289b2

    SHA256

    2155f567171ae099ba31264d097466d07e7f7661499ead4cff53a6045d0d4270

    SHA512

    3615d745516e92304b6ce73ee40273510d88c7d288742413032505f1e1266250356fe23181cd3bd314b026c18538359451168da98d669ae4e8cbf8ae89b1a559

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr495984.exe

    Filesize

    297KB

    MD5

    69cadcf28e3d4cb429fe8fc7b91570c6

    SHA1

    303d386d42a0a9b22812a507a4c9c25522680f27

    SHA256

    bca2ccc0975646403b117e5a1510cca56b7f236299979b83048037ba23d7100e

    SHA512

    acba16632f87d83cbaf832d167f99d46a6cc67438c85750c42d905829fd091e5d102ffbe292ba00bea627e1362611a2c0b58eea90d8f2f7b88f0a211514d2827

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr495984.exe

    Filesize

    297KB

    MD5

    69cadcf28e3d4cb429fe8fc7b91570c6

    SHA1

    303d386d42a0a9b22812a507a4c9c25522680f27

    SHA256

    bca2ccc0975646403b117e5a1510cca56b7f236299979b83048037ba23d7100e

    SHA512

    acba16632f87d83cbaf832d167f99d46a6cc67438c85750c42d905829fd091e5d102ffbe292ba00bea627e1362611a2c0b58eea90d8f2f7b88f0a211514d2827

  • memory/2948-1083-0x00000000030D0000-0x00000000030D6000-memory.dmp

    Filesize

    24KB

  • memory/2948-1082-0x0000000000FE0000-0x0000000001010000-memory.dmp

    Filesize

    192KB

  • memory/2948-1085-0x00000000058F0000-0x0000000005900000-memory.dmp

    Filesize

    64KB

  • memory/2948-1084-0x000000000AEF0000-0x000000000AF3B000-memory.dmp

    Filesize

    300KB

  • memory/3720-1091-0x00000000006A0000-0x00000000006DB000-memory.dmp

    Filesize

    236KB

  • memory/4316-189-0x0000000004A40000-0x0000000004A7F000-memory.dmp

    Filesize

    252KB

  • memory/4316-205-0x0000000004A40000-0x0000000004A7F000-memory.dmp

    Filesize

    252KB

  • memory/4316-155-0x0000000004A40000-0x0000000004A7F000-memory.dmp

    Filesize

    252KB

  • memory/4316-157-0x0000000004A40000-0x0000000004A7F000-memory.dmp

    Filesize

    252KB

  • memory/4316-159-0x0000000004A40000-0x0000000004A7F000-memory.dmp

    Filesize

    252KB

  • memory/4316-161-0x0000000004A40000-0x0000000004A7F000-memory.dmp

    Filesize

    252KB

  • memory/4316-163-0x0000000004A40000-0x0000000004A7F000-memory.dmp

    Filesize

    252KB

  • memory/4316-165-0x0000000004A40000-0x0000000004A7F000-memory.dmp

    Filesize

    252KB

  • memory/4316-167-0x0000000004A40000-0x0000000004A7F000-memory.dmp

    Filesize

    252KB

  • memory/4316-169-0x0000000004A40000-0x0000000004A7F000-memory.dmp

    Filesize

    252KB

  • memory/4316-171-0x0000000004A40000-0x0000000004A7F000-memory.dmp

    Filesize

    252KB

  • memory/4316-173-0x0000000004A40000-0x0000000004A7F000-memory.dmp

    Filesize

    252KB

  • memory/4316-175-0x0000000004A40000-0x0000000004A7F000-memory.dmp

    Filesize

    252KB

  • memory/4316-177-0x0000000004A40000-0x0000000004A7F000-memory.dmp

    Filesize

    252KB

  • memory/4316-179-0x0000000004A40000-0x0000000004A7F000-memory.dmp

    Filesize

    252KB

  • memory/4316-181-0x0000000004A40000-0x0000000004A7F000-memory.dmp

    Filesize

    252KB

  • memory/4316-183-0x0000000004A40000-0x0000000004A7F000-memory.dmp

    Filesize

    252KB

  • memory/4316-185-0x0000000004A40000-0x0000000004A7F000-memory.dmp

    Filesize

    252KB

  • memory/4316-187-0x0000000004A40000-0x0000000004A7F000-memory.dmp

    Filesize

    252KB

  • memory/4316-153-0x0000000004B90000-0x0000000004BA0000-memory.dmp

    Filesize

    64KB

  • memory/4316-191-0x0000000004A40000-0x0000000004A7F000-memory.dmp

    Filesize

    252KB

  • memory/4316-193-0x0000000004A40000-0x0000000004A7F000-memory.dmp

    Filesize

    252KB

  • memory/4316-195-0x0000000004A40000-0x0000000004A7F000-memory.dmp

    Filesize

    252KB

  • memory/4316-197-0x0000000004A40000-0x0000000004A7F000-memory.dmp

    Filesize

    252KB

  • memory/4316-199-0x0000000004A40000-0x0000000004A7F000-memory.dmp

    Filesize

    252KB

  • memory/4316-201-0x0000000004A40000-0x0000000004A7F000-memory.dmp

    Filesize

    252KB

  • memory/4316-203-0x0000000004A40000-0x0000000004A7F000-memory.dmp

    Filesize

    252KB

  • memory/4316-154-0x0000000004A40000-0x0000000004A7F000-memory.dmp

    Filesize

    252KB

  • memory/4316-207-0x0000000004A40000-0x0000000004A7F000-memory.dmp

    Filesize

    252KB

  • memory/4316-209-0x0000000004A40000-0x0000000004A7F000-memory.dmp

    Filesize

    252KB

  • memory/4316-211-0x0000000004A40000-0x0000000004A7F000-memory.dmp

    Filesize

    252KB

  • memory/4316-213-0x0000000004A40000-0x0000000004A7F000-memory.dmp

    Filesize

    252KB

  • memory/4316-215-0x0000000004A40000-0x0000000004A7F000-memory.dmp

    Filesize

    252KB

  • memory/4316-217-0x0000000004A40000-0x0000000004A7F000-memory.dmp

    Filesize

    252KB

  • memory/4316-1060-0x00000000050A0000-0x00000000056A6000-memory.dmp

    Filesize

    6.0MB

  • memory/4316-1061-0x00000000056B0000-0x00000000057BA000-memory.dmp

    Filesize

    1.0MB

  • memory/4316-1062-0x0000000004B70000-0x0000000004B82000-memory.dmp

    Filesize

    72KB

  • memory/4316-1063-0x00000000057C0000-0x00000000057FE000-memory.dmp

    Filesize

    248KB

  • memory/4316-1064-0x0000000004B90000-0x0000000004BA0000-memory.dmp

    Filesize

    64KB

  • memory/4316-1065-0x0000000005910000-0x000000000595B000-memory.dmp

    Filesize

    300KB

  • memory/4316-1067-0x0000000004B90000-0x0000000004BA0000-memory.dmp

    Filesize

    64KB

  • memory/4316-1068-0x0000000004B90000-0x0000000004BA0000-memory.dmp

    Filesize

    64KB

  • memory/4316-1069-0x0000000005AA0000-0x0000000005B06000-memory.dmp

    Filesize

    408KB

  • memory/4316-1070-0x0000000006160000-0x00000000061F2000-memory.dmp

    Filesize

    584KB

  • memory/4316-1071-0x0000000006380000-0x0000000006542000-memory.dmp

    Filesize

    1.8MB

  • memory/4316-152-0x0000000004B90000-0x0000000004BA0000-memory.dmp

    Filesize

    64KB

  • memory/4316-151-0x0000000004A40000-0x0000000004A84000-memory.dmp

    Filesize

    272KB

  • memory/4316-150-0x0000000004BA0000-0x000000000509E000-memory.dmp

    Filesize

    5.0MB

  • memory/4316-149-0x00000000024D0000-0x0000000002516000-memory.dmp

    Filesize

    280KB

  • memory/4316-148-0x00000000005E0000-0x000000000062B000-memory.dmp

    Filesize

    300KB

  • memory/4316-1072-0x0000000006570000-0x0000000006A9C000-memory.dmp

    Filesize

    5.2MB

  • memory/4316-1073-0x0000000004B90000-0x0000000004BA0000-memory.dmp

    Filesize

    64KB

  • memory/4316-1074-0x0000000006BE0000-0x0000000006C56000-memory.dmp

    Filesize

    472KB

  • memory/4316-1075-0x0000000006C60000-0x0000000006CB0000-memory.dmp

    Filesize

    320KB

  • memory/5012-142-0x0000000000A60000-0x0000000000A6A000-memory.dmp

    Filesize

    40KB