Analysis

  • max time kernel
    145s
  • max time network
    112s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10-04-2023 19:56

General

  • Target

    2f7dd6c90c88679c7889428866f1a9ac4a50f91235b9b4f4fa1975916d9044ad.exe

  • Size

    940KB

  • MD5

    c1f741b68def6667ec44e12f04522e97

  • SHA1

    eb0afb5b6c6895ff5999261201cda2ed58d9e5b4

  • SHA256

    2f7dd6c90c88679c7889428866f1a9ac4a50f91235b9b4f4fa1975916d9044ad

  • SHA512

    9e677f59ebef55a4b8751b329b7363f73711648555b90c401e8bf90e6a2bea8b4f7ac1cd132b3d9ec197128ce9a3da06a7b0df016e7aa8fa7049061a6af1946b

  • SSDEEP

    24576:yyH0fjolOQVj3be1GCQH7+WyNIX3dgFMNGm2c:ZHEolO43btl+L2dgFMNGm2

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

zima

C2

176.113.115.145:4125

Attributes
  • auth_value

    2ef701d510c0d27e8a8e3270281678b1

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 22 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f7dd6c90c88679c7889428866f1a9ac4a50f91235b9b4f4fa1975916d9044ad.exe
    "C:\Users\Admin\AppData\Local\Temp\2f7dd6c90c88679c7889428866f1a9ac4a50f91235b9b4f4fa1975916d9044ad.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2472
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un878698.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un878698.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2560
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un998526.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un998526.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3076
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr898446.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr898446.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4936
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu867423.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu867423.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1904
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk071808.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk071808.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2808
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si042381.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si042381.exe
      2⤵
      • Executes dropped EXE
      PID:3504
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3504 -s 616
        3⤵
        • Program crash
        PID:3496
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3504 -s 696
        3⤵
        • Program crash
        PID:3424
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3504 -s 768
        3⤵
        • Program crash
        PID:4888
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3504 -s 844
        3⤵
        • Program crash
        PID:4908
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3504 -s 872
        3⤵
        • Program crash
        PID:4912
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3504 -s 856
        3⤵
        • Program crash
        PID:5048
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3504 -s 1080
        3⤵
        • Program crash
        PID:5032

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si042381.exe

    Filesize

    231KB

    MD5

    f8117f396c10315824172b564d08490e

    SHA1

    96c20a6f156aa6e75f75fa9038a8878d75401138

    SHA256

    7f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba

    SHA512

    60606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si042381.exe

    Filesize

    231KB

    MD5

    f8117f396c10315824172b564d08490e

    SHA1

    96c20a6f156aa6e75f75fa9038a8878d75401138

    SHA256

    7f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba

    SHA512

    60606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un878698.exe

    Filesize

    675KB

    MD5

    2be5c7d626a2e82062e060428160ebdc

    SHA1

    7c6908e0f3817b414194d7986bfebe47c8d80f51

    SHA256

    cfb60f1f1b3a00c493ee4e3c4e5746ed8ff68f63c00056dec51a25b4d784c78d

    SHA512

    b6065f2a25634e7c48b7b168906074de734941b1a2d80b6ba5dc91e0bac29bcb99b17e86e04d8efa9e5e8b38006bdf80ec9a9cface38e5ffea246921bbe74bd9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un878698.exe

    Filesize

    675KB

    MD5

    2be5c7d626a2e82062e060428160ebdc

    SHA1

    7c6908e0f3817b414194d7986bfebe47c8d80f51

    SHA256

    cfb60f1f1b3a00c493ee4e3c4e5746ed8ff68f63c00056dec51a25b4d784c78d

    SHA512

    b6065f2a25634e7c48b7b168906074de734941b1a2d80b6ba5dc91e0bac29bcb99b17e86e04d8efa9e5e8b38006bdf80ec9a9cface38e5ffea246921bbe74bd9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk071808.exe

    Filesize

    169KB

    MD5

    e63b55ad3012586448877e1815fc05c7

    SHA1

    ef8b1059976ce5caf4ab3309b1b471bca33acd6a

    SHA256

    b33db80fc02bee32f989036d0d2b9e53615093b071067b3bf6ac4e7ecad00c09

    SHA512

    b586cd9bff26fcf9815485e51938d4b62c4bc5f78836fb127454f287bfd5fb7ab36536a969acfe64e5746863c524d77090dd6e0d9867307e04d19260a945c4d9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk071808.exe

    Filesize

    169KB

    MD5

    e63b55ad3012586448877e1815fc05c7

    SHA1

    ef8b1059976ce5caf4ab3309b1b471bca33acd6a

    SHA256

    b33db80fc02bee32f989036d0d2b9e53615093b071067b3bf6ac4e7ecad00c09

    SHA512

    b586cd9bff26fcf9815485e51938d4b62c4bc5f78836fb127454f287bfd5fb7ab36536a969acfe64e5746863c524d77090dd6e0d9867307e04d19260a945c4d9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un998526.exe

    Filesize

    521KB

    MD5

    568f48b4a45986c45fef45e4a35ab150

    SHA1

    e6a5130b27c4c951c953a3ef49fb46a799380786

    SHA256

    5bc51495ed22a1d12e74529516b4e318829b3c0889135e3b3e7668f601ad5ea4

    SHA512

    67c9e80534e42ec2c0ae968d10c1a65ca516bcf286c2691ca508094b88ca04de3eba04566f329e9102d205cf3da6ac7b4ab612836a7535bbc22c44835cc24fe0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un998526.exe

    Filesize

    521KB

    MD5

    568f48b4a45986c45fef45e4a35ab150

    SHA1

    e6a5130b27c4c951c953a3ef49fb46a799380786

    SHA256

    5bc51495ed22a1d12e74529516b4e318829b3c0889135e3b3e7668f601ad5ea4

    SHA512

    67c9e80534e42ec2c0ae968d10c1a65ca516bcf286c2691ca508094b88ca04de3eba04566f329e9102d205cf3da6ac7b4ab612836a7535bbc22c44835cc24fe0

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr898446.exe

    Filesize

    239KB

    MD5

    d4a097800df013e8c65200ea16958561

    SHA1

    cfe49e2d5165dec525c0cb2db50c8ada64fc6e47

    SHA256

    eb4f43aea66cff3de01ee44fab41d9ef52bb56a5ad7fa0f6566223ea10bbd598

    SHA512

    9e6d7109045518717f6eab388f67f1874d8497134605aad10b113721a40ded3d30fcf6f826db70dfd1aca83ebbf4add067be50dc5a9d5716e02ea8d2022fe014

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr898446.exe

    Filesize

    239KB

    MD5

    d4a097800df013e8c65200ea16958561

    SHA1

    cfe49e2d5165dec525c0cb2db50c8ada64fc6e47

    SHA256

    eb4f43aea66cff3de01ee44fab41d9ef52bb56a5ad7fa0f6566223ea10bbd598

    SHA512

    9e6d7109045518717f6eab388f67f1874d8497134605aad10b113721a40ded3d30fcf6f826db70dfd1aca83ebbf4add067be50dc5a9d5716e02ea8d2022fe014

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu867423.exe

    Filesize

    297KB

    MD5

    5c30d448cd5893734f371c8668cff934

    SHA1

    168d53ae362a69382751d1ecad43e56c72abbde2

    SHA256

    e78386608eea99ca2a352b08c5e2f41a283203eadb7b9e0d27c10030fe16668a

    SHA512

    e438add81ba9ef245e9ed1eb94db79861efa76f78c18ba41e411857d4925c8ec9c7cfe9153536393cfbf28643465d5f60d38c1fb8ec317f29aab43953fb811fa

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu867423.exe

    Filesize

    297KB

    MD5

    5c30d448cd5893734f371c8668cff934

    SHA1

    168d53ae362a69382751d1ecad43e56c72abbde2

    SHA256

    e78386608eea99ca2a352b08c5e2f41a283203eadb7b9e0d27c10030fe16668a

    SHA512

    e438add81ba9ef245e9ed1eb94db79861efa76f78c18ba41e411857d4925c8ec9c7cfe9153536393cfbf28643465d5f60d38c1fb8ec317f29aab43953fb811fa

  • memory/1904-1104-0x0000000005920000-0x000000000596B000-memory.dmp

    Filesize

    300KB

  • memory/1904-1107-0x0000000004BF0000-0x0000000004C00000-memory.dmp

    Filesize

    64KB

  • memory/1904-1116-0x0000000004BF0000-0x0000000004C00000-memory.dmp

    Filesize

    64KB

  • memory/1904-1115-0x0000000006C40000-0x0000000006C90000-memory.dmp

    Filesize

    320KB

  • memory/1904-1114-0x0000000006BB0000-0x0000000006C26000-memory.dmp

    Filesize

    472KB

  • memory/1904-1113-0x0000000006420000-0x000000000694C000-memory.dmp

    Filesize

    5.2MB

  • memory/1904-1112-0x0000000006250000-0x0000000006412000-memory.dmp

    Filesize

    1.8MB

  • memory/1904-1111-0x0000000006160000-0x00000000061F2000-memory.dmp

    Filesize

    584KB

  • memory/1904-1110-0x0000000005AA0000-0x0000000005B06000-memory.dmp

    Filesize

    408KB

  • memory/1904-1109-0x0000000004BF0000-0x0000000004C00000-memory.dmp

    Filesize

    64KB

  • memory/1904-1108-0x0000000004BF0000-0x0000000004C00000-memory.dmp

    Filesize

    64KB

  • memory/1904-1105-0x0000000004BF0000-0x0000000004C00000-memory.dmp

    Filesize

    64KB

  • memory/1904-1103-0x0000000004B90000-0x0000000004BCE000-memory.dmp

    Filesize

    248KB

  • memory/1904-1102-0x0000000004B70000-0x0000000004B82000-memory.dmp

    Filesize

    72KB

  • memory/1904-1101-0x0000000005710000-0x000000000581A000-memory.dmp

    Filesize

    1.0MB

  • memory/1904-1100-0x0000000005100000-0x0000000005706000-memory.dmp

    Filesize

    6.0MB

  • memory/1904-227-0x00000000026F0000-0x000000000272F000-memory.dmp

    Filesize

    252KB

  • memory/1904-225-0x00000000026F0000-0x000000000272F000-memory.dmp

    Filesize

    252KB

  • memory/1904-221-0x0000000004BF0000-0x0000000004C00000-memory.dmp

    Filesize

    64KB

  • memory/1904-223-0x00000000026F0000-0x000000000272F000-memory.dmp

    Filesize

    252KB

  • memory/1904-220-0x00000000026F0000-0x000000000272F000-memory.dmp

    Filesize

    252KB

  • memory/1904-218-0x0000000004BF0000-0x0000000004C00000-memory.dmp

    Filesize

    64KB

  • memory/1904-219-0x0000000004BF0000-0x0000000004C00000-memory.dmp

    Filesize

    64KB

  • memory/1904-188-0x0000000002240000-0x0000000002286000-memory.dmp

    Filesize

    280KB

  • memory/1904-189-0x00000000026F0000-0x0000000002734000-memory.dmp

    Filesize

    272KB

  • memory/1904-190-0x00000000026F0000-0x000000000272F000-memory.dmp

    Filesize

    252KB

  • memory/1904-191-0x00000000026F0000-0x000000000272F000-memory.dmp

    Filesize

    252KB

  • memory/1904-193-0x00000000026F0000-0x000000000272F000-memory.dmp

    Filesize

    252KB

  • memory/1904-195-0x00000000026F0000-0x000000000272F000-memory.dmp

    Filesize

    252KB

  • memory/1904-197-0x00000000026F0000-0x000000000272F000-memory.dmp

    Filesize

    252KB

  • memory/1904-199-0x00000000026F0000-0x000000000272F000-memory.dmp

    Filesize

    252KB

  • memory/1904-201-0x00000000026F0000-0x000000000272F000-memory.dmp

    Filesize

    252KB

  • memory/1904-203-0x00000000026F0000-0x000000000272F000-memory.dmp

    Filesize

    252KB

  • memory/1904-205-0x00000000026F0000-0x000000000272F000-memory.dmp

    Filesize

    252KB

  • memory/1904-207-0x00000000026F0000-0x000000000272F000-memory.dmp

    Filesize

    252KB

  • memory/1904-209-0x00000000026F0000-0x000000000272F000-memory.dmp

    Filesize

    252KB

  • memory/1904-211-0x00000000026F0000-0x000000000272F000-memory.dmp

    Filesize

    252KB

  • memory/1904-213-0x00000000026F0000-0x000000000272F000-memory.dmp

    Filesize

    252KB

  • memory/1904-215-0x00000000026F0000-0x000000000272F000-memory.dmp

    Filesize

    252KB

  • memory/1904-216-0x0000000000610000-0x000000000065B000-memory.dmp

    Filesize

    300KB

  • memory/2808-1122-0x0000000000D40000-0x0000000000D70000-memory.dmp

    Filesize

    192KB

  • memory/2808-1125-0x0000000005690000-0x00000000056A0000-memory.dmp

    Filesize

    64KB

  • memory/2808-1124-0x000000000AC50000-0x000000000AC9B000-memory.dmp

    Filesize

    300KB

  • memory/2808-1123-0x00000000055F0000-0x00000000055F6000-memory.dmp

    Filesize

    24KB

  • memory/3504-1131-0x0000000000690000-0x00000000006CB000-memory.dmp

    Filesize

    236KB

  • memory/4936-163-0x0000000002170000-0x0000000002182000-memory.dmp

    Filesize

    72KB

  • memory/4936-159-0x0000000002170000-0x0000000002182000-memory.dmp

    Filesize

    72KB

  • memory/4936-177-0x0000000002170000-0x0000000002182000-memory.dmp

    Filesize

    72KB

  • memory/4936-175-0x0000000002170000-0x0000000002182000-memory.dmp

    Filesize

    72KB

  • memory/4936-173-0x0000000002170000-0x0000000002182000-memory.dmp

    Filesize

    72KB

  • memory/4936-171-0x0000000002170000-0x0000000002182000-memory.dmp

    Filesize

    72KB

  • memory/4936-147-0x00000000020F0000-0x0000000002100000-memory.dmp

    Filesize

    64KB

  • memory/4936-169-0x0000000002170000-0x0000000002182000-memory.dmp

    Filesize

    72KB

  • memory/4936-150-0x0000000002170000-0x0000000002182000-memory.dmp

    Filesize

    72KB

  • memory/4936-167-0x0000000002170000-0x0000000002182000-memory.dmp

    Filesize

    72KB

  • memory/4936-165-0x0000000002170000-0x0000000002182000-memory.dmp

    Filesize

    72KB

  • memory/4936-148-0x00000000020F0000-0x0000000002100000-memory.dmp

    Filesize

    64KB

  • memory/4936-161-0x0000000002170000-0x0000000002182000-memory.dmp

    Filesize

    72KB

  • memory/4936-178-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/4936-157-0x0000000002170000-0x0000000002182000-memory.dmp

    Filesize

    72KB

  • memory/4936-155-0x0000000002170000-0x0000000002182000-memory.dmp

    Filesize

    72KB

  • memory/4936-153-0x0000000002170000-0x0000000002182000-memory.dmp

    Filesize

    72KB

  • memory/4936-151-0x0000000002170000-0x0000000002182000-memory.dmp

    Filesize

    72KB

  • memory/4936-146-0x0000000002170000-0x0000000002188000-memory.dmp

    Filesize

    96KB

  • memory/4936-145-0x0000000004A60000-0x0000000004F5E000-memory.dmp

    Filesize

    5.0MB

  • memory/4936-179-0x00000000020F0000-0x0000000002100000-memory.dmp

    Filesize

    64KB

  • memory/4936-180-0x00000000020F0000-0x0000000002100000-memory.dmp

    Filesize

    64KB

  • memory/4936-181-0x00000000020F0000-0x0000000002100000-memory.dmp

    Filesize

    64KB

  • memory/4936-183-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/4936-144-0x00000000020D0000-0x00000000020EA000-memory.dmp

    Filesize

    104KB

  • memory/4936-143-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4936-149-0x00000000020F0000-0x0000000002100000-memory.dmp

    Filesize

    64KB