Analysis

  • max time kernel
    140s
  • max time network
    106s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10-04-2023 20:00

General

  • Target

    575d49d9ef7fa46a2b81531ca598e718ed252b74228eeea0c4a5de943a43ab61.exe

  • Size

    800KB

  • MD5

    909f7efc9fe207896fb7f009592f2c81

  • SHA1

    749fb50fc8bd9c1b496759c7790dfa1287ae152e

  • SHA256

    575d49d9ef7fa46a2b81531ca598e718ed252b74228eeea0c4a5de943a43ab61

  • SHA512

    8f64fe7390cda8d0e8c55ef0ef7beb88834bc8f8e21bbe1e08d4b486b7914093f36b96926a6f9cda6c68f7f20df93fa442fd6a30f22d4f1190d20aa2d080bcb0

  • SSDEEP

    12288:wMr8y90hwlmPWEKOjxRfm/JXFa4UbOTM9mT4xK7C0QcTfls33NZUX1Rddm9ANqN7:cy+moKGxRfCFadbZc8xf+TuHNZ8Rj4F

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

zima

C2

176.113.115.145:4125

Attributes
  • auth_value

    2ef701d510c0d27e8a8e3270281678b1

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\575d49d9ef7fa46a2b81531ca598e718ed252b74228eeea0c4a5de943a43ab61.exe
    "C:\Users\Admin\AppData\Local\Temp\575d49d9ef7fa46a2b81531ca598e718ed252b74228eeea0c4a5de943a43ab61.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziyo8739.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziyo8739.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3276
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zioq0240.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zioq0240.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3748
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it280204.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it280204.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4140
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr526956.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr526956.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4196
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp043721.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp043721.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2732
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr251962.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr251962.exe
      2⤵
      • Executes dropped EXE
      PID:1500
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 620
        3⤵
        • Program crash
        PID:4812
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 700
        3⤵
        • Program crash
        PID:4584
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 840
        3⤵
        • Program crash
        PID:4568
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 872
        3⤵
        • Program crash
        PID:3620
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 880
        3⤵
        • Program crash
        PID:3584
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 928
        3⤵
        • Program crash
        PID:4428
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 1064
        3⤵
        • Program crash
        PID:4412

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr251962.exe
    Filesize

    231KB

    MD5

    f8117f396c10315824172b564d08490e

    SHA1

    96c20a6f156aa6e75f75fa9038a8878d75401138

    SHA256

    7f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba

    SHA512

    60606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr251962.exe
    Filesize

    231KB

    MD5

    f8117f396c10315824172b564d08490e

    SHA1

    96c20a6f156aa6e75f75fa9038a8878d75401138

    SHA256

    7f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba

    SHA512

    60606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziyo8739.exe
    Filesize

    536KB

    MD5

    01a18324904eec5e8ddafe07d008b8cd

    SHA1

    f01059f734f64360a714045c4ab8b09947b10dd3

    SHA256

    70444d2d9b6ec4a2490867d1910665b48f343a40e35a73de05bc189396f03d25

    SHA512

    48bedacab081b8f541b545f611a8583b4f457a1a220ad5ee2739e24a967e0184f1ccf1e00ef6ffd8f1b9e44e7ca2074e9e63a596ab45356baee36ec01f07aa3b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziyo8739.exe
    Filesize

    536KB

    MD5

    01a18324904eec5e8ddafe07d008b8cd

    SHA1

    f01059f734f64360a714045c4ab8b09947b10dd3

    SHA256

    70444d2d9b6ec4a2490867d1910665b48f343a40e35a73de05bc189396f03d25

    SHA512

    48bedacab081b8f541b545f611a8583b4f457a1a220ad5ee2739e24a967e0184f1ccf1e00ef6ffd8f1b9e44e7ca2074e9e63a596ab45356baee36ec01f07aa3b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp043721.exe
    Filesize

    169KB

    MD5

    fd1f92014666211d12e8af12eb173464

    SHA1

    67b616accd478d3cfabdbccf3df4c1c18295082d

    SHA256

    076cb8a456a790553731caf605cd78058671366bc26a980c827916eb79777f1f

    SHA512

    4dc693d62394e4644d0fa964f8f9f15e7b609cd82ce0f5f1d0c279290349b5ded582d2885d3e1d1260fa6680da269cb68b5548a3c79f1ba5025fd0ea8a0c6221

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp043721.exe
    Filesize

    169KB

    MD5

    fd1f92014666211d12e8af12eb173464

    SHA1

    67b616accd478d3cfabdbccf3df4c1c18295082d

    SHA256

    076cb8a456a790553731caf605cd78058671366bc26a980c827916eb79777f1f

    SHA512

    4dc693d62394e4644d0fa964f8f9f15e7b609cd82ce0f5f1d0c279290349b5ded582d2885d3e1d1260fa6680da269cb68b5548a3c79f1ba5025fd0ea8a0c6221

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zioq0240.exe
    Filesize

    382KB

    MD5

    992f900e8d1d0707786f874e3a62a005

    SHA1

    e95f5c0341cf2d5c48a0789d504d1211be4832f9

    SHA256

    bd35a06791d5e02171c01e7cbbd8902afb4dd90483c033b5ad4002f8ecd6de57

    SHA512

    6a9a19b39d54b2eded150f9b30ade273612544f679bff20d6e40863a5fd08fa421f449da405f54b5dd80a79d591fdf76d3729204368f7fdf2d35ba51048d6dc9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zioq0240.exe
    Filesize

    382KB

    MD5

    992f900e8d1d0707786f874e3a62a005

    SHA1

    e95f5c0341cf2d5c48a0789d504d1211be4832f9

    SHA256

    bd35a06791d5e02171c01e7cbbd8902afb4dd90483c033b5ad4002f8ecd6de57

    SHA512

    6a9a19b39d54b2eded150f9b30ade273612544f679bff20d6e40863a5fd08fa421f449da405f54b5dd80a79d591fdf76d3729204368f7fdf2d35ba51048d6dc9

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it280204.exe
    Filesize

    11KB

    MD5

    b2bec61005ca2195355095166a1ef055

    SHA1

    d0460844fc181a7c0e56b68bafb58118a6700a93

    SHA256

    33b52364b2d186fba477abe0737ebd3cfb6b083313b5c5b42e73c08b29b9395f

    SHA512

    3d8e465131ae7c833795327fadb791ea79d43391bc5ef33f1bddd823858e2ea419fcf514c24fca1734ef22fc28ac6ee4aae092f1efd4a5a57107e29bab420089

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it280204.exe
    Filesize

    11KB

    MD5

    b2bec61005ca2195355095166a1ef055

    SHA1

    d0460844fc181a7c0e56b68bafb58118a6700a93

    SHA256

    33b52364b2d186fba477abe0737ebd3cfb6b083313b5c5b42e73c08b29b9395f

    SHA512

    3d8e465131ae7c833795327fadb791ea79d43391bc5ef33f1bddd823858e2ea419fcf514c24fca1734ef22fc28ac6ee4aae092f1efd4a5a57107e29bab420089

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr526956.exe
    Filesize

    297KB

    MD5

    343b7f33566ec6776db79f518a584b34

    SHA1

    1203edb723857c4ab103ca3f92b12304e6de55c5

    SHA256

    9ae3c5379008fb9eb8710158b27abe13e1fd04e70611e8eaa91a5adcc3dfa7f6

    SHA512

    26b5a446ffb7d700d06fae4f17e85ba4c228ebfa444408791730963dc6a09fae9cc59a27ab7a237b7baec18a09f2443dcdbad455964bb82d2b2321411b6dc198

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr526956.exe
    Filesize

    297KB

    MD5

    343b7f33566ec6776db79f518a584b34

    SHA1

    1203edb723857c4ab103ca3f92b12304e6de55c5

    SHA256

    9ae3c5379008fb9eb8710158b27abe13e1fd04e70611e8eaa91a5adcc3dfa7f6

    SHA512

    26b5a446ffb7d700d06fae4f17e85ba4c228ebfa444408791730963dc6a09fae9cc59a27ab7a237b7baec18a09f2443dcdbad455964bb82d2b2321411b6dc198

  • memory/1500-1092-0x0000000000580000-0x00000000005BB000-memory.dmp
    Filesize

    236KB

  • memory/2732-1083-0x00000000022A0000-0x00000000022A6000-memory.dmp
    Filesize

    24KB

  • memory/2732-1082-0x0000000000120000-0x0000000000150000-memory.dmp
    Filesize

    192KB

  • memory/2732-1086-0x0000000004980000-0x0000000004990000-memory.dmp
    Filesize

    64KB

  • memory/2732-1085-0x000000000A030000-0x000000000A07B000-memory.dmp
    Filesize

    300KB

  • memory/2732-1084-0x0000000004980000-0x0000000004990000-memory.dmp
    Filesize

    64KB

  • memory/4140-141-0x0000000000FB0000-0x0000000000FBA000-memory.dmp
    Filesize

    40KB

  • memory/4196-185-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4196-205-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4196-155-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4196-157-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4196-159-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4196-161-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4196-163-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4196-165-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4196-167-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4196-169-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4196-171-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4196-173-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4196-175-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4196-177-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4196-179-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4196-181-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4196-183-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4196-153-0x0000000001F80000-0x0000000001F90000-memory.dmp
    Filesize

    64KB

  • memory/4196-187-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4196-189-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4196-191-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4196-193-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4196-195-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4196-197-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4196-199-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4196-201-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4196-203-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4196-154-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4196-207-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4196-209-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4196-211-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4196-213-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4196-215-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4196-217-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/4196-1060-0x0000000005720000-0x0000000005D26000-memory.dmp
    Filesize

    6.0MB

  • memory/4196-1061-0x0000000005190000-0x000000000529A000-memory.dmp
    Filesize

    1.0MB

  • memory/4196-1062-0x00000000052D0000-0x00000000052E2000-memory.dmp
    Filesize

    72KB

  • memory/4196-1063-0x00000000052F0000-0x000000000532E000-memory.dmp
    Filesize

    248KB

  • memory/4196-1064-0x0000000001F80000-0x0000000001F90000-memory.dmp
    Filesize

    64KB

  • memory/4196-1065-0x0000000005440000-0x000000000548B000-memory.dmp
    Filesize

    300KB

  • memory/4196-1067-0x00000000055D0000-0x0000000005636000-memory.dmp
    Filesize

    408KB

  • memory/4196-1068-0x00000000062B0000-0x0000000006342000-memory.dmp
    Filesize

    584KB

  • memory/4196-1070-0x0000000001F80000-0x0000000001F90000-memory.dmp
    Filesize

    64KB

  • memory/4196-1069-0x0000000001F80000-0x0000000001F90000-memory.dmp
    Filesize

    64KB

  • memory/4196-1071-0x0000000001F80000-0x0000000001F90000-memory.dmp
    Filesize

    64KB

  • memory/4196-1072-0x0000000006480000-0x0000000006642000-memory.dmp
    Filesize

    1.8MB

  • memory/4196-152-0x0000000001F80000-0x0000000001F90000-memory.dmp
    Filesize

    64KB

  • memory/4196-151-0x0000000001F80000-0x0000000001F90000-memory.dmp
    Filesize

    64KB

  • memory/4196-150-0x00000000005E0000-0x000000000062B000-memory.dmp
    Filesize

    300KB

  • memory/4196-149-0x0000000004F50000-0x0000000004F94000-memory.dmp
    Filesize

    272KB

  • memory/4196-148-0x0000000004A50000-0x0000000004F4E000-memory.dmp
    Filesize

    5.0MB

  • memory/4196-147-0x0000000002170000-0x00000000021B6000-memory.dmp
    Filesize

    280KB

  • memory/4196-1073-0x0000000006650000-0x0000000006B7C000-memory.dmp
    Filesize

    5.2MB

  • memory/4196-1074-0x0000000001F80000-0x0000000001F90000-memory.dmp
    Filesize

    64KB

  • memory/4196-1075-0x0000000006F50000-0x0000000006FC6000-memory.dmp
    Filesize

    472KB

  • memory/4196-1076-0x0000000006FD0000-0x0000000007020000-memory.dmp
    Filesize

    320KB