Analysis

  • max time kernel
    145s
  • max time network
    111s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10-04-2023 21:17

General

  • Target

    8da6ee7b8add1a7f4d15d02fc61ada0cdeffd28f30a9290bfc340174e1fe0781.exe

  • Size

    939KB

  • MD5

    92547dba42f3d4a4c8fce4da5d3b8f5a

  • SHA1

    bdb2c511f35c9fd4767a582949bc71fe1195d3e8

  • SHA256

    8da6ee7b8add1a7f4d15d02fc61ada0cdeffd28f30a9290bfc340174e1fe0781

  • SHA512

    e66c5b0d726ec58d889f07a1a56a3be1d0aa2dbc1343e18abaf4518f1326fb4fa8ae8f064d45d023bc0d45a8c6d0fafb4b32811b25f20c5be0007e46b7795432

  • SSDEEP

    24576:6yGRrKAgP/yFWLBbsx2FuoIFghluXJDoljvtc:BGR2A2Pxsx2TRnSDoh

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

zima

C2

176.113.115.145:4125

Attributes
  • auth_value

    2ef701d510c0d27e8a8e3270281678b1

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8da6ee7b8add1a7f4d15d02fc61ada0cdeffd28f30a9290bfc340174e1fe0781.exe
    "C:\Users\Admin\AppData\Local\Temp\8da6ee7b8add1a7f4d15d02fc61ada0cdeffd28f30a9290bfc340174e1fe0781.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2284
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un098047.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un098047.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2520
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un967455.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un967455.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2904
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr818675.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr818675.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3812
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu402761.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu402761.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1288
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk143509.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk143509.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4928
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si137010.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si137010.exe
      2⤵
      • Executes dropped EXE
      PID:3788
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 620
        3⤵
        • Program crash
        PID:4040
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 700
        3⤵
        • Program crash
        PID:3148
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 772
        3⤵
        • Program crash
        PID:4716
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 844
        3⤵
        • Program crash
        PID:4352
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 876
        3⤵
        • Program crash
        PID:3412
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 756
        3⤵
        • Program crash
        PID:760
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 1072
        3⤵
        • Program crash
        PID:4336

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si137010.exe

    Filesize

    231KB

    MD5

    5a531a1495614605383afe7a35731a7a

    SHA1

    f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6

    SHA256

    2aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d

    SHA512

    906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si137010.exe

    Filesize

    231KB

    MD5

    5a531a1495614605383afe7a35731a7a

    SHA1

    f00c58c5745c7adeb14b5b176fc0cd8d6d694bb6

    SHA256

    2aa40e53a153a68c6fd28793fdd06fa3bcbe4658820261607f6f4f8ecd3b8c2d

    SHA512

    906eb4afa865e09a68e5f40e48837bf576ced8218e8545daa25bd1ac0bea2087f77c9905d143c243cb3cbf04b3472c049620e2b51ccf243ac75f7134376e4aa3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un098047.exe

    Filesize

    674KB

    MD5

    bb37510d91485d5248d84af826935052

    SHA1

    c3eb2e1fd5ca8b47927a965784c4d92a90e4128a

    SHA256

    f10e06d50d8514a271e956291ecca191b378c868a11214e0a24573a73c7fad20

    SHA512

    d62234010b916083723a426211d70459b1e227e4bdd506cc5a3b06272f9b91db09b7561c66bc1623ca21f609cb0b56bed05ce38bdf22f0213123051a393707f7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un098047.exe

    Filesize

    674KB

    MD5

    bb37510d91485d5248d84af826935052

    SHA1

    c3eb2e1fd5ca8b47927a965784c4d92a90e4128a

    SHA256

    f10e06d50d8514a271e956291ecca191b378c868a11214e0a24573a73c7fad20

    SHA512

    d62234010b916083723a426211d70459b1e227e4bdd506cc5a3b06272f9b91db09b7561c66bc1623ca21f609cb0b56bed05ce38bdf22f0213123051a393707f7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk143509.exe

    Filesize

    169KB

    MD5

    e62e94d50978c5bbada3c0277af7909a

    SHA1

    2778c40df14b4825c375481ba57fb287a7ed0b3a

    SHA256

    05d28c48aca4a7caa545857d8cf77fd7757f5d172519ca02dbef46b15043815e

    SHA512

    4759f14a6c4263633895f0a97eecedac05fda058c33ef13b53917c6142d7ad0ce6e11a162c2c1e8c2917dec338ef768913318547d9d0a5ec0f09cd6ee54f4e18

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk143509.exe

    Filesize

    169KB

    MD5

    e62e94d50978c5bbada3c0277af7909a

    SHA1

    2778c40df14b4825c375481ba57fb287a7ed0b3a

    SHA256

    05d28c48aca4a7caa545857d8cf77fd7757f5d172519ca02dbef46b15043815e

    SHA512

    4759f14a6c4263633895f0a97eecedac05fda058c33ef13b53917c6142d7ad0ce6e11a162c2c1e8c2917dec338ef768913318547d9d0a5ec0f09cd6ee54f4e18

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un967455.exe

    Filesize

    520KB

    MD5

    6ac607143d6a7d8bbb321703b500ff63

    SHA1

    73c03c88311dbe951cea8a7f426c71fe834cbfb8

    SHA256

    59a331fb32727262354e3da58f27ebf5762ab73684a6a45258c0078eae787191

    SHA512

    6851009faadb003b9c0da4632f2c668e0ab46fe69738ac0747972a50f92b3d60c2107230c72bed70baf7d1a5649ec6a881cf2995af66434de9e959cf1e28fa18

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un967455.exe

    Filesize

    520KB

    MD5

    6ac607143d6a7d8bbb321703b500ff63

    SHA1

    73c03c88311dbe951cea8a7f426c71fe834cbfb8

    SHA256

    59a331fb32727262354e3da58f27ebf5762ab73684a6a45258c0078eae787191

    SHA512

    6851009faadb003b9c0da4632f2c668e0ab46fe69738ac0747972a50f92b3d60c2107230c72bed70baf7d1a5649ec6a881cf2995af66434de9e959cf1e28fa18

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr818675.exe

    Filesize

    239KB

    MD5

    2079dfd8c9f8bfd0c2e55a5eae289755

    SHA1

    3a03e81ce0b6b14a9d6af75957d93a719340059e

    SHA256

    68bdbcc610d4d6b6fe292e52e1b6ef1cb0e1f85f39fc1791e5367b50a01b1019

    SHA512

    021430313c245f81782fbcca25ed9a5f30ebe4c9b98c53b60f4f634ea9959d4fa7cb599b40bcb1bdc786f6cd900d10bf6a61a0ce47ef73e109b14fd9214b9d38

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr818675.exe

    Filesize

    239KB

    MD5

    2079dfd8c9f8bfd0c2e55a5eae289755

    SHA1

    3a03e81ce0b6b14a9d6af75957d93a719340059e

    SHA256

    68bdbcc610d4d6b6fe292e52e1b6ef1cb0e1f85f39fc1791e5367b50a01b1019

    SHA512

    021430313c245f81782fbcca25ed9a5f30ebe4c9b98c53b60f4f634ea9959d4fa7cb599b40bcb1bdc786f6cd900d10bf6a61a0ce47ef73e109b14fd9214b9d38

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu402761.exe

    Filesize

    297KB

    MD5

    e34be74adfe872fb8516f9fa05cd39ab

    SHA1

    13ea2e7075f559315d89d9989c168ae2b04da538

    SHA256

    6d205dbc63c0160fe064f97e2640dd3f57e96fb08d2f5b3d2dedbace160ee53e

    SHA512

    af7ee5dc3d8a9d14acefd09ccf1342ae1ccf2d71a74c27d7184ecc1d7929ed993d9ee623a104e899f51237654d7429b0ae977ce784e95705502a08b1e455527e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu402761.exe

    Filesize

    297KB

    MD5

    e34be74adfe872fb8516f9fa05cd39ab

    SHA1

    13ea2e7075f559315d89d9989c168ae2b04da538

    SHA256

    6d205dbc63c0160fe064f97e2640dd3f57e96fb08d2f5b3d2dedbace160ee53e

    SHA512

    af7ee5dc3d8a9d14acefd09ccf1342ae1ccf2d71a74c27d7184ecc1d7929ed993d9ee623a104e899f51237654d7429b0ae977ce784e95705502a08b1e455527e

  • memory/1288-1101-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB

  • memory/1288-1106-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB

  • memory/1288-1113-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB

  • memory/1288-1112-0x0000000006610000-0x0000000006B3C000-memory.dmp

    Filesize

    5.2MB

  • memory/1288-1111-0x0000000006440000-0x0000000006602000-memory.dmp

    Filesize

    1.8MB

  • memory/1288-1110-0x00000000062D0000-0x0000000006320000-memory.dmp

    Filesize

    320KB

  • memory/1288-1109-0x0000000006250000-0x00000000062C6000-memory.dmp

    Filesize

    472KB

  • memory/1288-1108-0x0000000006040000-0x00000000060D2000-memory.dmp

    Filesize

    584KB

  • memory/1288-1107-0x0000000005AA0000-0x0000000005B06000-memory.dmp

    Filesize

    408KB

  • memory/1288-1105-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB

  • memory/1288-1104-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB

  • memory/1288-1102-0x0000000005910000-0x000000000595B000-memory.dmp

    Filesize

    300KB

  • memory/1288-1100-0x00000000057C0000-0x00000000057FE000-memory.dmp

    Filesize

    248KB

  • memory/1288-1099-0x00000000057A0000-0x00000000057B2000-memory.dmp

    Filesize

    72KB

  • memory/1288-1098-0x0000000005690000-0x000000000579A000-memory.dmp

    Filesize

    1.0MB

  • memory/1288-1097-0x0000000005080000-0x0000000005686000-memory.dmp

    Filesize

    6.0MB

  • memory/1288-224-0x00000000025E0000-0x000000000261F000-memory.dmp

    Filesize

    252KB

  • memory/1288-222-0x00000000025E0000-0x000000000261F000-memory.dmp

    Filesize

    252KB

  • memory/1288-220-0x00000000025E0000-0x000000000261F000-memory.dmp

    Filesize

    252KB

  • memory/1288-218-0x00000000025E0000-0x000000000261F000-memory.dmp

    Filesize

    252KB

  • memory/1288-185-0x0000000002130000-0x0000000002176000-memory.dmp

    Filesize

    280KB

  • memory/1288-186-0x00000000025E0000-0x0000000002624000-memory.dmp

    Filesize

    272KB

  • memory/1288-187-0x00000000025E0000-0x000000000261F000-memory.dmp

    Filesize

    252KB

  • memory/1288-188-0x00000000025E0000-0x000000000261F000-memory.dmp

    Filesize

    252KB

  • memory/1288-190-0x00000000025E0000-0x000000000261F000-memory.dmp

    Filesize

    252KB

  • memory/1288-193-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB

  • memory/1288-194-0x00000000025E0000-0x000000000261F000-memory.dmp

    Filesize

    252KB

  • memory/1288-195-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB

  • memory/1288-197-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB

  • memory/1288-191-0x00000000004C0000-0x000000000050B000-memory.dmp

    Filesize

    300KB

  • memory/1288-198-0x00000000025E0000-0x000000000261F000-memory.dmp

    Filesize

    252KB

  • memory/1288-200-0x00000000025E0000-0x000000000261F000-memory.dmp

    Filesize

    252KB

  • memory/1288-202-0x00000000025E0000-0x000000000261F000-memory.dmp

    Filesize

    252KB

  • memory/1288-204-0x00000000025E0000-0x000000000261F000-memory.dmp

    Filesize

    252KB

  • memory/1288-206-0x00000000025E0000-0x000000000261F000-memory.dmp

    Filesize

    252KB

  • memory/1288-208-0x00000000025E0000-0x000000000261F000-memory.dmp

    Filesize

    252KB

  • memory/1288-210-0x00000000025E0000-0x000000000261F000-memory.dmp

    Filesize

    252KB

  • memory/1288-212-0x00000000025E0000-0x000000000261F000-memory.dmp

    Filesize

    252KB

  • memory/1288-214-0x00000000025E0000-0x000000000261F000-memory.dmp

    Filesize

    252KB

  • memory/1288-216-0x00000000025E0000-0x000000000261F000-memory.dmp

    Filesize

    252KB

  • memory/3788-1128-0x00000000004B0000-0x00000000004EB000-memory.dmp

    Filesize

    236KB

  • memory/3812-163-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/3812-144-0x00000000007F0000-0x000000000080A000-memory.dmp

    Filesize

    104KB

  • memory/3812-178-0x0000000004B80000-0x0000000004B90000-memory.dmp

    Filesize

    64KB

  • memory/3812-177-0x0000000004B80000-0x0000000004B90000-memory.dmp

    Filesize

    64KB

  • memory/3812-176-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/3812-175-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/3812-173-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/3812-148-0x0000000004B80000-0x0000000004B90000-memory.dmp

    Filesize

    64KB

  • memory/3812-171-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/3812-169-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/3812-167-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/3812-151-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/3812-149-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/3812-180-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/3812-153-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/3812-159-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/3812-157-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/3812-155-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/3812-161-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/3812-146-0x00000000049E0000-0x00000000049F8000-memory.dmp

    Filesize

    96KB

  • memory/3812-145-0x0000000004B90000-0x000000000508E000-memory.dmp

    Filesize

    5.0MB

  • memory/3812-165-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/3812-143-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/3812-147-0x00000000049E0000-0x00000000049F2000-memory.dmp

    Filesize

    72KB

  • memory/4928-1122-0x00000000054B0000-0x00000000054C0000-memory.dmp

    Filesize

    64KB

  • memory/4928-1121-0x000000000AB90000-0x000000000ABDB000-memory.dmp

    Filesize

    300KB

  • memory/4928-1120-0x00000000014C0000-0x00000000014C6000-memory.dmp

    Filesize

    24KB

  • memory/4928-1119-0x0000000000C80000-0x0000000000CB0000-memory.dmp

    Filesize

    192KB