Analysis

  • max time kernel
    141s
  • max time network
    143s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10-04-2023 20:07

General

  • Target

    8e759ef1ad2a045ed8674b3706ac43f15e8df01b7715024630fdbc70a3403d1b.exe

  • Size

    802KB

  • MD5

    54828af02734ff4fc3896e96a9abb4a1

  • SHA1

    cd19085bc6b7feb4126e1d62e1b9d59ba23ab82f

  • SHA256

    8e759ef1ad2a045ed8674b3706ac43f15e8df01b7715024630fdbc70a3403d1b

  • SHA512

    8101fdf904040eb9c75de7f6e58200f7666d1429e03ef76be8bcb09cd0348c3c21ed7ef1e52c7630816243d1983c1d45313c5e6bb7e05e27b44ad0e491c35a5f

  • SSDEEP

    12288:WMroy90+1jRH/fZO1J9SWAPiid5hDZ6tOiq6WUxK7CR8slebC5jrGvZrrGzs495a:KyV1hw/APrP6ttDxf7Eb0HGhmzdOP

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

zima

C2

176.113.115.145:4125

Attributes
  • auth_value

    2ef701d510c0d27e8a8e3270281678b1

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 37 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e759ef1ad2a045ed8674b3706ac43f15e8df01b7715024630fdbc70a3403d1b.exe
    "C:\Users\Admin\AppData\Local\Temp\8e759ef1ad2a045ed8674b3706ac43f15e8df01b7715024630fdbc70a3403d1b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3664
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zivI4950.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zivI4950.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3644
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zicP2423.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zicP2423.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4348
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it098633.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it098633.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4884
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr604504.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr604504.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2136
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp121261.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp121261.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4840
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr890583.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr890583.exe
      2⤵
      • Executes dropped EXE
      PID:1284
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1284 -s 616
        3⤵
        • Program crash
        PID:2076
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1284 -s 696
        3⤵
        • Program crash
        PID:4548
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1284 -s 836
        3⤵
        • Program crash
        PID:4556
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1284 -s 844
        3⤵
        • Program crash
        PID:1020
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1284 -s 872
        3⤵
        • Program crash
        PID:4464
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1284 -s 884
        3⤵
        • Program crash
        PID:3704
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1284 -s 1080
        3⤵
        • Program crash
        PID:4688

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr890583.exe
    Filesize

    231KB

    MD5

    f8117f396c10315824172b564d08490e

    SHA1

    96c20a6f156aa6e75f75fa9038a8878d75401138

    SHA256

    7f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba

    SHA512

    60606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr890583.exe
    Filesize

    231KB

    MD5

    f8117f396c10315824172b564d08490e

    SHA1

    96c20a6f156aa6e75f75fa9038a8878d75401138

    SHA256

    7f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba

    SHA512

    60606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zivI4950.exe
    Filesize

    536KB

    MD5

    3350027aafee627e87e68a61d410693a

    SHA1

    541161d46fca638fcc75e31b4749f527ba818a7d

    SHA256

    ec7b19a99adb78918957b3b2347c016c6277c78239cef1db19f23febdfbc1999

    SHA512

    0e693812b0dfcdb84a907535362827d710e7f0cf1cd4668378d5cd344bddf1508e91122e25cb753757f441bc0d3cec76322aaf43b91937247f85ac21ff4a9e17

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zivI4950.exe
    Filesize

    536KB

    MD5

    3350027aafee627e87e68a61d410693a

    SHA1

    541161d46fca638fcc75e31b4749f527ba818a7d

    SHA256

    ec7b19a99adb78918957b3b2347c016c6277c78239cef1db19f23febdfbc1999

    SHA512

    0e693812b0dfcdb84a907535362827d710e7f0cf1cd4668378d5cd344bddf1508e91122e25cb753757f441bc0d3cec76322aaf43b91937247f85ac21ff4a9e17

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp121261.exe
    Filesize

    169KB

    MD5

    d4f7f326a60c6708413d360fb53095ab

    SHA1

    5f547f07b78c1089ec808da4ac5c04368b24c667

    SHA256

    1a47783450adc20e0c766d28e8c8846de5798cc9fd26423c1e8f10323127aba6

    SHA512

    5a1fd1f9353cd423ffa672e99d87bfc4471dd6c00eea8a793069bf144cf4260a6892e47969915eff5b8e19ea0d03ccbaf3c385efb25d9859f0114874e2af8a78

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp121261.exe
    Filesize

    169KB

    MD5

    d4f7f326a60c6708413d360fb53095ab

    SHA1

    5f547f07b78c1089ec808da4ac5c04368b24c667

    SHA256

    1a47783450adc20e0c766d28e8c8846de5798cc9fd26423c1e8f10323127aba6

    SHA512

    5a1fd1f9353cd423ffa672e99d87bfc4471dd6c00eea8a793069bf144cf4260a6892e47969915eff5b8e19ea0d03ccbaf3c385efb25d9859f0114874e2af8a78

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zicP2423.exe
    Filesize

    382KB

    MD5

    6f9f4cb686914609dcb679541d99746d

    SHA1

    44cff1ee85015a138728a1c95d5974b6b895193d

    SHA256

    2403d9289e05de3158d2d0f10aadc6b6f021da864b01a4c64fe88c2a01d6a01a

    SHA512

    a868f4809cf99cc65f9d9aeedad3345c461b6a203779051ff2f2891c9d540915fb54fa689b915813d8c14d3b685fa8205e5d640da8e7f2895485e7e784500ed8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zicP2423.exe
    Filesize

    382KB

    MD5

    6f9f4cb686914609dcb679541d99746d

    SHA1

    44cff1ee85015a138728a1c95d5974b6b895193d

    SHA256

    2403d9289e05de3158d2d0f10aadc6b6f021da864b01a4c64fe88c2a01d6a01a

    SHA512

    a868f4809cf99cc65f9d9aeedad3345c461b6a203779051ff2f2891c9d540915fb54fa689b915813d8c14d3b685fa8205e5d640da8e7f2895485e7e784500ed8

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it098633.exe
    Filesize

    11KB

    MD5

    f1196503ea94809878fda92c4acbc4b0

    SHA1

    11f0b5ba693c181b1fe6da4e785397dbacc12b2e

    SHA256

    13f4a7115a1c2a451113c52d707170f554b38535a28c5c67f7bd99949d492155

    SHA512

    2665d741aff8ae233ad766eab0305e66489701825a70feaf1f2da6a2b48309cbf89aebd83b05823195bd2498ef1f6b47e84f5eba35447400e2ed8c6cf148516d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it098633.exe
    Filesize

    11KB

    MD5

    f1196503ea94809878fda92c4acbc4b0

    SHA1

    11f0b5ba693c181b1fe6da4e785397dbacc12b2e

    SHA256

    13f4a7115a1c2a451113c52d707170f554b38535a28c5c67f7bd99949d492155

    SHA512

    2665d741aff8ae233ad766eab0305e66489701825a70feaf1f2da6a2b48309cbf89aebd83b05823195bd2498ef1f6b47e84f5eba35447400e2ed8c6cf148516d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr604504.exe
    Filesize

    297KB

    MD5

    2d827795ff9ac42d4b13726f20cc9808

    SHA1

    db43c796cf3ab5cd224d9396976e26e882dee769

    SHA256

    65949de6148f570082b1b3d821c91627470bdfbf22611e405570fab45ff96e53

    SHA512

    5ae374e708985c70ecd02033948153de4bdf5a76bc7a1093b093f0c1755820d7e3788873f5b0c09241130d0c9bf8ace2b60bb5b79cc66bdbd42c46e01556df46

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr604504.exe
    Filesize

    297KB

    MD5

    2d827795ff9ac42d4b13726f20cc9808

    SHA1

    db43c796cf3ab5cd224d9396976e26e882dee769

    SHA256

    65949de6148f570082b1b3d821c91627470bdfbf22611e405570fab45ff96e53

    SHA512

    5ae374e708985c70ecd02033948153de4bdf5a76bc7a1093b093f0c1755820d7e3788873f5b0c09241130d0c9bf8ace2b60bb5b79cc66bdbd42c46e01556df46

  • memory/1284-1091-0x0000000000580000-0x00000000005BB000-memory.dmp
    Filesize

    236KB

  • memory/2136-184-0x0000000004F70000-0x0000000004FAF000-memory.dmp
    Filesize

    252KB

  • memory/2136-202-0x0000000004F70000-0x0000000004FAF000-memory.dmp
    Filesize

    252KB

  • memory/2136-149-0x0000000004A70000-0x0000000004F6E000-memory.dmp
    Filesize

    5.0MB

  • memory/2136-150-0x0000000004F70000-0x0000000004FB4000-memory.dmp
    Filesize

    272KB

  • memory/2136-151-0x0000000004F70000-0x0000000004FAF000-memory.dmp
    Filesize

    252KB

  • memory/2136-152-0x0000000004F70000-0x0000000004FAF000-memory.dmp
    Filesize

    252KB

  • memory/2136-154-0x0000000004F70000-0x0000000004FAF000-memory.dmp
    Filesize

    252KB

  • memory/2136-156-0x0000000004F70000-0x0000000004FAF000-memory.dmp
    Filesize

    252KB

  • memory/2136-158-0x0000000004F70000-0x0000000004FAF000-memory.dmp
    Filesize

    252KB

  • memory/2136-160-0x0000000004F70000-0x0000000004FAF000-memory.dmp
    Filesize

    252KB

  • memory/2136-162-0x0000000004F70000-0x0000000004FAF000-memory.dmp
    Filesize

    252KB

  • memory/2136-164-0x0000000004F70000-0x0000000004FAF000-memory.dmp
    Filesize

    252KB

  • memory/2136-166-0x0000000004F70000-0x0000000004FAF000-memory.dmp
    Filesize

    252KB

  • memory/2136-168-0x0000000004F70000-0x0000000004FAF000-memory.dmp
    Filesize

    252KB

  • memory/2136-170-0x0000000004F70000-0x0000000004FAF000-memory.dmp
    Filesize

    252KB

  • memory/2136-172-0x0000000004F70000-0x0000000004FAF000-memory.dmp
    Filesize

    252KB

  • memory/2136-174-0x0000000004F70000-0x0000000004FAF000-memory.dmp
    Filesize

    252KB

  • memory/2136-176-0x0000000004F70000-0x0000000004FAF000-memory.dmp
    Filesize

    252KB

  • memory/2136-178-0x0000000004F70000-0x0000000004FAF000-memory.dmp
    Filesize

    252KB

  • memory/2136-180-0x0000000004F70000-0x0000000004FAF000-memory.dmp
    Filesize

    252KB

  • memory/2136-182-0x0000000004F70000-0x0000000004FAF000-memory.dmp
    Filesize

    252KB

  • memory/2136-187-0x0000000002570000-0x0000000002580000-memory.dmp
    Filesize

    64KB

  • memory/2136-185-0x0000000002570000-0x0000000002580000-memory.dmp
    Filesize

    64KB

  • memory/2136-147-0x0000000001E60000-0x0000000001EAB000-memory.dmp
    Filesize

    300KB

  • memory/2136-190-0x0000000004F70000-0x0000000004FAF000-memory.dmp
    Filesize

    252KB

  • memory/2136-188-0x0000000004F70000-0x0000000004FAF000-memory.dmp
    Filesize

    252KB

  • memory/2136-192-0x0000000004F70000-0x0000000004FAF000-memory.dmp
    Filesize

    252KB

  • memory/2136-194-0x0000000004F70000-0x0000000004FAF000-memory.dmp
    Filesize

    252KB

  • memory/2136-196-0x0000000004F70000-0x0000000004FAF000-memory.dmp
    Filesize

    252KB

  • memory/2136-198-0x0000000004F70000-0x0000000004FAF000-memory.dmp
    Filesize

    252KB

  • memory/2136-200-0x0000000004F70000-0x0000000004FAF000-memory.dmp
    Filesize

    252KB

  • memory/2136-148-0x0000000002570000-0x0000000002580000-memory.dmp
    Filesize

    64KB

  • memory/2136-204-0x0000000004F70000-0x0000000004FAF000-memory.dmp
    Filesize

    252KB

  • memory/2136-206-0x0000000004F70000-0x0000000004FAF000-memory.dmp
    Filesize

    252KB

  • memory/2136-208-0x0000000004F70000-0x0000000004FAF000-memory.dmp
    Filesize

    252KB

  • memory/2136-210-0x0000000004F70000-0x0000000004FAF000-memory.dmp
    Filesize

    252KB

  • memory/2136-212-0x0000000004F70000-0x0000000004FAF000-memory.dmp
    Filesize

    252KB

  • memory/2136-214-0x0000000004F70000-0x0000000004FAF000-memory.dmp
    Filesize

    252KB

  • memory/2136-216-0x0000000004F70000-0x0000000004FAF000-memory.dmp
    Filesize

    252KB

  • memory/2136-1059-0x00000000055E0000-0x0000000005BE6000-memory.dmp
    Filesize

    6.0MB

  • memory/2136-1060-0x0000000005050000-0x000000000515A000-memory.dmp
    Filesize

    1.0MB

  • memory/2136-1061-0x0000000005190000-0x00000000051A2000-memory.dmp
    Filesize

    72KB

  • memory/2136-1062-0x00000000051B0000-0x00000000051EE000-memory.dmp
    Filesize

    248KB

  • memory/2136-1063-0x0000000002570000-0x0000000002580000-memory.dmp
    Filesize

    64KB

  • memory/2136-1064-0x0000000005300000-0x000000000534B000-memory.dmp
    Filesize

    300KB

  • memory/2136-1066-0x0000000005490000-0x00000000054F6000-memory.dmp
    Filesize

    408KB

  • memory/2136-1067-0x0000000002570000-0x0000000002580000-memory.dmp
    Filesize

    64KB

  • memory/2136-1068-0x0000000006170000-0x0000000006202000-memory.dmp
    Filesize

    584KB

  • memory/2136-1069-0x0000000002570000-0x0000000002580000-memory.dmp
    Filesize

    64KB

  • memory/2136-1070-0x0000000002570000-0x0000000002580000-memory.dmp
    Filesize

    64KB

  • memory/2136-1071-0x0000000006340000-0x0000000006502000-memory.dmp
    Filesize

    1.8MB

  • memory/2136-1072-0x0000000006510000-0x0000000006A3C000-memory.dmp
    Filesize

    5.2MB

  • memory/2136-1073-0x0000000006B80000-0x0000000006BF6000-memory.dmp
    Filesize

    472KB

  • memory/2136-1074-0x0000000006C00000-0x0000000006C50000-memory.dmp
    Filesize

    320KB

  • memory/2136-1075-0x0000000002570000-0x0000000002580000-memory.dmp
    Filesize

    64KB

  • memory/2136-146-0x0000000002580000-0x00000000025C6000-memory.dmp
    Filesize

    280KB

  • memory/4840-1082-0x0000000001580000-0x0000000001586000-memory.dmp
    Filesize

    24KB

  • memory/4840-1083-0x000000000AC80000-0x000000000ACCB000-memory.dmp
    Filesize

    300KB

  • memory/4840-1081-0x0000000000E80000-0x0000000000EB0000-memory.dmp
    Filesize

    192KB

  • memory/4840-1084-0x0000000005770000-0x0000000005780000-memory.dmp
    Filesize

    64KB

  • memory/4840-1085-0x0000000005770000-0x0000000005780000-memory.dmp
    Filesize

    64KB

  • memory/4884-140-0x00000000008D0000-0x00000000008DA000-memory.dmp
    Filesize

    40KB