Analysis

  • max time kernel
    143s
  • max time network
    109s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10-04-2023 20:13

General

  • Target

    d1828b43c9c8e708261943174fefb05104bed2440aa1fe56401bf5fa91800098.exe

  • Size

    941KB

  • MD5

    b70e69da61753d54584199b2b91bd4b1

  • SHA1

    5acf25fe572188f5b1b7a184465dfb61a336fc8f

  • SHA256

    d1828b43c9c8e708261943174fefb05104bed2440aa1fe56401bf5fa91800098

  • SHA512

    eebc0c3ba220dbfc644256f2b548f975ec044e338171989078f97a30f10b8479a0c92e5346ff3df828d0990873eace9174d550d7f9f66e9d154ba9dc9296c555

  • SSDEEP

    24576:7yQC+bfJCgwwN4lTrRovtfqJINnrA/0zN7tzLi5l:uQxfJCgn4l/RotcA40Z7pa

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

zima

C2

176.113.115.145:4125

Attributes
  • auth_value

    2ef701d510c0d27e8a8e3270281678b1

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 22 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d1828b43c9c8e708261943174fefb05104bed2440aa1fe56401bf5fa91800098.exe
    "C:\Users\Admin\AppData\Local\Temp\d1828b43c9c8e708261943174fefb05104bed2440aa1fe56401bf5fa91800098.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3096
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un179672.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un179672.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3112
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un246201.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un246201.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2100
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr929582.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr929582.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5020
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu344090.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu344090.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1936
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk618974.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk618974.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2688
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si250696.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si250696.exe
      2⤵
      • Executes dropped EXE
      PID:3660
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 616
        3⤵
        • Program crash
        PID:2692
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 696
        3⤵
        • Program crash
        PID:4212
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 836
        3⤵
        • Program crash
        PID:3796
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 844
        3⤵
        • Program crash
        PID:4200
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 872
        3⤵
        • Program crash
        PID:3436
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 884
        3⤵
        • Program crash
        PID:4016
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3660 -s 1072
        3⤵
        • Program crash
        PID:4228

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si250696.exe
    Filesize

    231KB

    MD5

    f8117f396c10315824172b564d08490e

    SHA1

    96c20a6f156aa6e75f75fa9038a8878d75401138

    SHA256

    7f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba

    SHA512

    60606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si250696.exe
    Filesize

    231KB

    MD5

    f8117f396c10315824172b564d08490e

    SHA1

    96c20a6f156aa6e75f75fa9038a8878d75401138

    SHA256

    7f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba

    SHA512

    60606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un179672.exe
    Filesize

    675KB

    MD5

    f618b7e17b3f6f12036c398665d79755

    SHA1

    0c75e2c842f3cda67bc9adc2e033995030d573fa

    SHA256

    502b73782da71726d637c8c958fd6adad1b58510d0c77e783123d0ced33aeda4

    SHA512

    89d6c3e7294049e149cc9d6680169c2695d165d3f5840e7d0503eb5c63d35466de169c98e15e7fac867923c86180eb54498aaa0da5fecd9aaa17c8011fe41c54

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un179672.exe
    Filesize

    675KB

    MD5

    f618b7e17b3f6f12036c398665d79755

    SHA1

    0c75e2c842f3cda67bc9adc2e033995030d573fa

    SHA256

    502b73782da71726d637c8c958fd6adad1b58510d0c77e783123d0ced33aeda4

    SHA512

    89d6c3e7294049e149cc9d6680169c2695d165d3f5840e7d0503eb5c63d35466de169c98e15e7fac867923c86180eb54498aaa0da5fecd9aaa17c8011fe41c54

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk618974.exe
    Filesize

    169KB

    MD5

    845281ff2a8fd6af388b9533302a76a1

    SHA1

    d8aecbe952005cac5b612ed21c9721a40ed52782

    SHA256

    8cfbfd4127cf0f1cab7eb4f4887a7f98e6e18300cbd8ae170f6dbe35ded13fde

    SHA512

    c44ff68fc12700988937c6b7df1b54a613fe3cb8dc6fb0a115b776a770494590fae0de6372eaa4651a6431722ca196b801fac2eae739a50ef8cedb0a34e0af90

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk618974.exe
    Filesize

    169KB

    MD5

    845281ff2a8fd6af388b9533302a76a1

    SHA1

    d8aecbe952005cac5b612ed21c9721a40ed52782

    SHA256

    8cfbfd4127cf0f1cab7eb4f4887a7f98e6e18300cbd8ae170f6dbe35ded13fde

    SHA512

    c44ff68fc12700988937c6b7df1b54a613fe3cb8dc6fb0a115b776a770494590fae0de6372eaa4651a6431722ca196b801fac2eae739a50ef8cedb0a34e0af90

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un246201.exe
    Filesize

    521KB

    MD5

    4b38171105afb246f075d893e6b76383

    SHA1

    b6627c108e2f4ec072c603b862cfb311a5444820

    SHA256

    01cf147e76e85a8fa5ac8b63d3cb26b3e7d5813e417457c1ba58b7c8a8e91e62

    SHA512

    ff43076bdde4f57b16188395ae8086470ba52b35ca8ec4e195a633c0553c95c8ea8c09d3af9019e49624424dd0b24b8824d1081841ddb46dd051a8108253c55a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un246201.exe
    Filesize

    521KB

    MD5

    4b38171105afb246f075d893e6b76383

    SHA1

    b6627c108e2f4ec072c603b862cfb311a5444820

    SHA256

    01cf147e76e85a8fa5ac8b63d3cb26b3e7d5813e417457c1ba58b7c8a8e91e62

    SHA512

    ff43076bdde4f57b16188395ae8086470ba52b35ca8ec4e195a633c0553c95c8ea8c09d3af9019e49624424dd0b24b8824d1081841ddb46dd051a8108253c55a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr929582.exe
    Filesize

    239KB

    MD5

    3b2776e79f808aefdcc892382243d742

    SHA1

    b2e727e8f0c117d32e50549cf9435a731be9b669

    SHA256

    ccb79fdef945eb64a8d19a6b1929a84c7a44f2e45a8579b9c9810a7a2ad8167b

    SHA512

    b3aca9a4fb880e6408bc3ea5c0e4e13314d5eb04ba91d2b93c7a4e3bf0ec3455e6348941596a8e7ea2acd1ea8497788aa049840e8c88892d2e47859beb8e3c07

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr929582.exe
    Filesize

    239KB

    MD5

    3b2776e79f808aefdcc892382243d742

    SHA1

    b2e727e8f0c117d32e50549cf9435a731be9b669

    SHA256

    ccb79fdef945eb64a8d19a6b1929a84c7a44f2e45a8579b9c9810a7a2ad8167b

    SHA512

    b3aca9a4fb880e6408bc3ea5c0e4e13314d5eb04ba91d2b93c7a4e3bf0ec3455e6348941596a8e7ea2acd1ea8497788aa049840e8c88892d2e47859beb8e3c07

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu344090.exe
    Filesize

    297KB

    MD5

    ca738538731703c036099a47a5d11623

    SHA1

    7191e2c4d0bee368861d7a7bd6c3dd136bdfb216

    SHA256

    b032243dfbbac409b84b27d114fdac82f84b47573a6703c55fbe0387954bd19f

    SHA512

    7984133a60dbb9d7ec718583c64ab202dfb7119224d462c70dcd085e435f55fa54c00271fd8cdbfba6ddb5e1a230f0f5c33c0f06aaffd076e8f3a6d416f9226f

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu344090.exe
    Filesize

    297KB

    MD5

    ca738538731703c036099a47a5d11623

    SHA1

    7191e2c4d0bee368861d7a7bd6c3dd136bdfb216

    SHA256

    b032243dfbbac409b84b27d114fdac82f84b47573a6703c55fbe0387954bd19f

    SHA512

    7984133a60dbb9d7ec718583c64ab202dfb7119224d462c70dcd085e435f55fa54c00271fd8cdbfba6ddb5e1a230f0f5c33c0f06aaffd076e8f3a6d416f9226f

  • memory/1936-1099-0x0000000005300000-0x000000000534B000-memory.dmp
    Filesize

    300KB

  • memory/1936-1104-0x0000000006350000-0x0000000006512000-memory.dmp
    Filesize

    1.8MB

  • memory/1936-1111-0x0000000004A90000-0x0000000004AA0000-memory.dmp
    Filesize

    64KB

  • memory/1936-1110-0x0000000006C00000-0x0000000006C50000-memory.dmp
    Filesize

    320KB

  • memory/1936-1109-0x0000000006B80000-0x0000000006BF6000-memory.dmp
    Filesize

    472KB

  • memory/1936-1108-0x0000000006520000-0x0000000006A4C000-memory.dmp
    Filesize

    5.2MB

  • memory/1936-1107-0x0000000004A90000-0x0000000004AA0000-memory.dmp
    Filesize

    64KB

  • memory/1936-1106-0x0000000004A90000-0x0000000004AA0000-memory.dmp
    Filesize

    64KB

  • memory/1936-1105-0x0000000004A90000-0x0000000004AA0000-memory.dmp
    Filesize

    64KB

  • memory/1936-1103-0x0000000006040000-0x00000000060D2000-memory.dmp
    Filesize

    584KB

  • memory/1936-1101-0x0000000005490000-0x00000000054F6000-memory.dmp
    Filesize

    408KB

  • memory/1936-1100-0x0000000004A90000-0x0000000004AA0000-memory.dmp
    Filesize

    64KB

  • memory/1936-1098-0x00000000051B0000-0x00000000051EE000-memory.dmp
    Filesize

    248KB

  • memory/1936-1097-0x0000000005190000-0x00000000051A2000-memory.dmp
    Filesize

    72KB

  • memory/1936-1096-0x0000000005050000-0x000000000515A000-memory.dmp
    Filesize

    1.0MB

  • memory/1936-1095-0x00000000055E0000-0x0000000005BE6000-memory.dmp
    Filesize

    6.0MB

  • memory/1936-450-0x0000000004A90000-0x0000000004AA0000-memory.dmp
    Filesize

    64KB

  • memory/1936-453-0x0000000004A90000-0x0000000004AA0000-memory.dmp
    Filesize

    64KB

  • memory/1936-449-0x0000000004A90000-0x0000000004AA0000-memory.dmp
    Filesize

    64KB

  • memory/1936-219-0x0000000004A40000-0x0000000004A7F000-memory.dmp
    Filesize

    252KB

  • memory/1936-217-0x0000000004A40000-0x0000000004A7F000-memory.dmp
    Filesize

    252KB

  • memory/1936-215-0x0000000004A40000-0x0000000004A7F000-memory.dmp
    Filesize

    252KB

  • memory/1936-213-0x0000000004A40000-0x0000000004A7F000-memory.dmp
    Filesize

    252KB

  • memory/1936-184-0x00000000022B0000-0x00000000022F6000-memory.dmp
    Filesize

    280KB

  • memory/1936-183-0x0000000000590000-0x00000000005DB000-memory.dmp
    Filesize

    300KB

  • memory/1936-185-0x0000000004A40000-0x0000000004A84000-memory.dmp
    Filesize

    272KB

  • memory/1936-186-0x0000000004A40000-0x0000000004A7F000-memory.dmp
    Filesize

    252KB

  • memory/1936-187-0x0000000004A40000-0x0000000004A7F000-memory.dmp
    Filesize

    252KB

  • memory/1936-189-0x0000000004A40000-0x0000000004A7F000-memory.dmp
    Filesize

    252KB

  • memory/1936-191-0x0000000004A40000-0x0000000004A7F000-memory.dmp
    Filesize

    252KB

  • memory/1936-193-0x0000000004A40000-0x0000000004A7F000-memory.dmp
    Filesize

    252KB

  • memory/1936-195-0x0000000004A40000-0x0000000004A7F000-memory.dmp
    Filesize

    252KB

  • memory/1936-197-0x0000000004A40000-0x0000000004A7F000-memory.dmp
    Filesize

    252KB

  • memory/1936-199-0x0000000004A40000-0x0000000004A7F000-memory.dmp
    Filesize

    252KB

  • memory/1936-201-0x0000000004A40000-0x0000000004A7F000-memory.dmp
    Filesize

    252KB

  • memory/1936-203-0x0000000004A40000-0x0000000004A7F000-memory.dmp
    Filesize

    252KB

  • memory/1936-205-0x0000000004A40000-0x0000000004A7F000-memory.dmp
    Filesize

    252KB

  • memory/1936-207-0x0000000004A40000-0x0000000004A7F000-memory.dmp
    Filesize

    252KB

  • memory/1936-209-0x0000000004A40000-0x0000000004A7F000-memory.dmp
    Filesize

    252KB

  • memory/1936-211-0x0000000004A40000-0x0000000004A7F000-memory.dmp
    Filesize

    252KB

  • memory/2688-1117-0x0000000000720000-0x0000000000750000-memory.dmp
    Filesize

    192KB

  • memory/2688-1121-0x0000000004F20000-0x0000000004F30000-memory.dmp
    Filesize

    64KB

  • memory/2688-1120-0x0000000004F20000-0x0000000004F30000-memory.dmp
    Filesize

    64KB

  • memory/2688-1119-0x000000000A630000-0x000000000A67B000-memory.dmp
    Filesize

    300KB

  • memory/2688-1118-0x00000000010B0000-0x00000000010B6000-memory.dmp
    Filesize

    24KB

  • memory/3660-1127-0x00000000004B0000-0x00000000004EB000-memory.dmp
    Filesize

    236KB

  • memory/5020-161-0x0000000002160000-0x0000000002172000-memory.dmp
    Filesize

    72KB

  • memory/5020-155-0x0000000002160000-0x0000000002172000-memory.dmp
    Filesize

    72KB

  • memory/5020-171-0x0000000002180000-0x0000000002190000-memory.dmp
    Filesize

    64KB

  • memory/5020-170-0x0000000002180000-0x0000000002190000-memory.dmp
    Filesize

    64KB

  • memory/5020-169-0x0000000002160000-0x0000000002172000-memory.dmp
    Filesize

    72KB

  • memory/5020-142-0x0000000002160000-0x0000000002172000-memory.dmp
    Filesize

    72KB

  • memory/5020-167-0x0000000002160000-0x0000000002172000-memory.dmp
    Filesize

    72KB

  • memory/5020-165-0x0000000002160000-0x0000000002172000-memory.dmp
    Filesize

    72KB

  • memory/5020-163-0x0000000002160000-0x0000000002172000-memory.dmp
    Filesize

    72KB

  • memory/5020-147-0x0000000002160000-0x0000000002172000-memory.dmp
    Filesize

    72KB

  • memory/5020-143-0x0000000002160000-0x0000000002172000-memory.dmp
    Filesize

    72KB

  • memory/5020-159-0x0000000002160000-0x0000000002172000-memory.dmp
    Filesize

    72KB

  • memory/5020-157-0x0000000002160000-0x0000000002172000-memory.dmp
    Filesize

    72KB

  • memory/5020-172-0x0000000002180000-0x0000000002190000-memory.dmp
    Filesize

    64KB

  • memory/5020-153-0x0000000002160000-0x0000000002172000-memory.dmp
    Filesize

    72KB

  • memory/5020-151-0x0000000002160000-0x0000000002172000-memory.dmp
    Filesize

    72KB

  • memory/5020-149-0x0000000002160000-0x0000000002172000-memory.dmp
    Filesize

    72KB

  • memory/5020-141-0x0000000002160000-0x0000000002178000-memory.dmp
    Filesize

    96KB

  • memory/5020-140-0x0000000004AD0000-0x0000000004FCE000-memory.dmp
    Filesize

    5.0MB

  • memory/5020-173-0x0000000000400000-0x00000000004AA000-memory.dmp
    Filesize

    680KB

  • memory/5020-174-0x0000000002180000-0x0000000002190000-memory.dmp
    Filesize

    64KB

  • memory/5020-175-0x0000000002180000-0x0000000002190000-memory.dmp
    Filesize

    64KB

  • memory/5020-176-0x0000000002180000-0x0000000002190000-memory.dmp
    Filesize

    64KB

  • memory/5020-178-0x0000000000400000-0x00000000004AA000-memory.dmp
    Filesize

    680KB

  • memory/5020-139-0x00000000020C0000-0x00000000020DA000-memory.dmp
    Filesize

    104KB

  • memory/5020-138-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/5020-145-0x0000000002160000-0x0000000002172000-memory.dmp
    Filesize

    72KB