Analysis

  • max time kernel
    143s
  • max time network
    110s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10-04-2023 20:48

General

  • Target

    ef8a75c6b45b8bd204ef6afe1ee88e5ac7684adcad21f991523dfefc5d7479e0.exe

  • Size

    940KB

  • MD5

    025b3503d9747eec7ec048e09f5e007f

  • SHA1

    203efea7b4c025cf592e50f90ec35e1a06803c4e

  • SHA256

    ef8a75c6b45b8bd204ef6afe1ee88e5ac7684adcad21f991523dfefc5d7479e0

  • SHA512

    6987fa26706c13bc961ae070cd74674ae31e64f1ef001612fae308712959b4927479c7df0b9c3c24e8ebc49b8e38eabcaf14f7d2708a9f7095576416e537787e

  • SSDEEP

    24576:5yeX8lfG6RSiQE9lK5cIPpgR3jSN7Cpom:s+886f9lJsgdW0o

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

zima

C2

176.113.115.145:4125

Attributes
  • auth_value

    2ef701d510c0d27e8a8e3270281678b1

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef8a75c6b45b8bd204ef6afe1ee88e5ac7684adcad21f991523dfefc5d7479e0.exe
    "C:\Users\Admin\AppData\Local\Temp\ef8a75c6b45b8bd204ef6afe1ee88e5ac7684adcad21f991523dfefc5d7479e0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2556
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un769119.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un769119.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un591228.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un591228.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:5092
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr242298.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr242298.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4596
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu603665.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu603665.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2668
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk536267.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk536267.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4856
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si672277.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si672277.exe
      2⤵
      • Executes dropped EXE
      PID:4652
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4652 -s 616
        3⤵
        • Program crash
        PID:4376
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4652 -s 696
        3⤵
        • Program crash
        PID:4100
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4652 -s 836
        3⤵
        • Program crash
        PID:4352
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4652 -s 700
        3⤵
        • Program crash
        PID:4448
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4652 -s 880
        3⤵
        • Program crash
        PID:3236
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4652 -s 852
        3⤵
        • Program crash
        PID:5032
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4652 -s 1080
        3⤵
        • Program crash
        PID:1568

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si672277.exe
    Filesize

    231KB

    MD5

    f8117f396c10315824172b564d08490e

    SHA1

    96c20a6f156aa6e75f75fa9038a8878d75401138

    SHA256

    7f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba

    SHA512

    60606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si672277.exe
    Filesize

    231KB

    MD5

    f8117f396c10315824172b564d08490e

    SHA1

    96c20a6f156aa6e75f75fa9038a8878d75401138

    SHA256

    7f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba

    SHA512

    60606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un769119.exe
    Filesize

    674KB

    MD5

    1277caa450d5844ac2b4f57a00726279

    SHA1

    ae330d5e4478748328f89b0893a3bdfea5468242

    SHA256

    f00cef88d6d53cf20c821167643929b3b356325988c6ec36e61a93f629faa07e

    SHA512

    235c68a8725f55393f5c4f9e78c8ea91e53284d01ddf501c1a2b11dc84a28fb99fec825767da3113de898f4104758d8d0ffcbbf85096f4b09a710584213ebfe9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un769119.exe
    Filesize

    674KB

    MD5

    1277caa450d5844ac2b4f57a00726279

    SHA1

    ae330d5e4478748328f89b0893a3bdfea5468242

    SHA256

    f00cef88d6d53cf20c821167643929b3b356325988c6ec36e61a93f629faa07e

    SHA512

    235c68a8725f55393f5c4f9e78c8ea91e53284d01ddf501c1a2b11dc84a28fb99fec825767da3113de898f4104758d8d0ffcbbf85096f4b09a710584213ebfe9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk536267.exe
    Filesize

    169KB

    MD5

    b72fef22f4d756d8de53ce264f6a5e65

    SHA1

    74b98c87b20b6b589e15b73781c5a9ab0296ad87

    SHA256

    20eb5a4baa10c89c753e1ba84d8860c46f7d462197a83f1693f4a1273c36ae9b

    SHA512

    20ec4e5b8c65114035071c7543432068e60f9721fef391a329a407ef80a73f5fbee90c778783606a3c5777e638d909f95c61bb3ae45055e3b5c1ecffc3244f59

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk536267.exe
    Filesize

    169KB

    MD5

    b72fef22f4d756d8de53ce264f6a5e65

    SHA1

    74b98c87b20b6b589e15b73781c5a9ab0296ad87

    SHA256

    20eb5a4baa10c89c753e1ba84d8860c46f7d462197a83f1693f4a1273c36ae9b

    SHA512

    20ec4e5b8c65114035071c7543432068e60f9721fef391a329a407ef80a73f5fbee90c778783606a3c5777e638d909f95c61bb3ae45055e3b5c1ecffc3244f59

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un591228.exe
    Filesize

    521KB

    MD5

    c31737156a17d01f98fa9ce517bfe6b2

    SHA1

    cb6b0a1192082f90e2bef7aa82695f759f32281b

    SHA256

    55cda525030a7be9aa3226156d58ea3e1b18ea143d360dac72b10ff4a1f4115d

    SHA512

    b2b64fba1054f706aba1e09c0d3afe0556cc4eaf30e8171418a34bd7301892b577f24e1d29fead41bb8d9b8645a0cdad25218393540e589f5faefdce16d52945

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un591228.exe
    Filesize

    521KB

    MD5

    c31737156a17d01f98fa9ce517bfe6b2

    SHA1

    cb6b0a1192082f90e2bef7aa82695f759f32281b

    SHA256

    55cda525030a7be9aa3226156d58ea3e1b18ea143d360dac72b10ff4a1f4115d

    SHA512

    b2b64fba1054f706aba1e09c0d3afe0556cc4eaf30e8171418a34bd7301892b577f24e1d29fead41bb8d9b8645a0cdad25218393540e589f5faefdce16d52945

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr242298.exe
    Filesize

    239KB

    MD5

    81fbcca35fe798154d971211cedf2901

    SHA1

    c94b9acc4b2d2f5035001c096184645ffb1b70d9

    SHA256

    bff63fa67cbe625d6cf7b6303ae02c69b6a6443ff284a2d6c4ab7036ef88fef8

    SHA512

    f0bef8e23bd02071daec2e880eab41cd561a620fcf8e94027839393304058beda97f84d69f96e7e1ba38de0a7a11822855d2362e244ac44d6d85d7df1729c12e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr242298.exe
    Filesize

    239KB

    MD5

    81fbcca35fe798154d971211cedf2901

    SHA1

    c94b9acc4b2d2f5035001c096184645ffb1b70d9

    SHA256

    bff63fa67cbe625d6cf7b6303ae02c69b6a6443ff284a2d6c4ab7036ef88fef8

    SHA512

    f0bef8e23bd02071daec2e880eab41cd561a620fcf8e94027839393304058beda97f84d69f96e7e1ba38de0a7a11822855d2362e244ac44d6d85d7df1729c12e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu603665.exe
    Filesize

    297KB

    MD5

    14489f1fb3fe94854b7fb00d0580c89f

    SHA1

    2a66f4ba87a031875fc6d45f653b5e5032df940e

    SHA256

    ff62af2670c977cb8634e9ae7bff5f05ef61852bcf59bd6dbaf3fc7dbc453182

    SHA512

    190fa302b05a3c11457c9b1bd686dd83de003178283fbd5d4e7d80f3e1a043a3faffcbd49acd5e053f5cf728b2c5317f76007b8afc80ed273c50c8e41dbd9930

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu603665.exe
    Filesize

    297KB

    MD5

    14489f1fb3fe94854b7fb00d0580c89f

    SHA1

    2a66f4ba87a031875fc6d45f653b5e5032df940e

    SHA256

    ff62af2670c977cb8634e9ae7bff5f05ef61852bcf59bd6dbaf3fc7dbc453182

    SHA512

    190fa302b05a3c11457c9b1bd686dd83de003178283fbd5d4e7d80f3e1a043a3faffcbd49acd5e053f5cf728b2c5317f76007b8afc80ed273c50c8e41dbd9930

  • memory/2668-1101-0x0000000002730000-0x0000000002742000-memory.dmp
    Filesize

    72KB

  • memory/2668-1106-0x0000000005490000-0x00000000054F6000-memory.dmp
    Filesize

    408KB

  • memory/2668-1114-0x0000000007950000-0x0000000007E7C000-memory.dmp
    Filesize

    5.2MB

  • memory/2668-1113-0x0000000007770000-0x0000000007932000-memory.dmp
    Filesize

    1.8MB

  • memory/2668-1112-0x0000000002060000-0x00000000020B0000-memory.dmp
    Filesize

    320KB

  • memory/2668-1111-0x00000000076E0000-0x0000000007756000-memory.dmp
    Filesize

    472KB

  • memory/2668-1110-0x0000000000760000-0x0000000000770000-memory.dmp
    Filesize

    64KB

  • memory/2668-1109-0x0000000000760000-0x0000000000770000-memory.dmp
    Filesize

    64KB

  • memory/2668-1108-0x0000000000760000-0x0000000000770000-memory.dmp
    Filesize

    64KB

  • memory/2668-1107-0x0000000006160000-0x00000000061F2000-memory.dmp
    Filesize

    584KB

  • memory/2668-1104-0x0000000000760000-0x0000000000770000-memory.dmp
    Filesize

    64KB

  • memory/2668-1103-0x0000000005310000-0x000000000535B000-memory.dmp
    Filesize

    300KB

  • memory/2668-1102-0x00000000051D0000-0x000000000520E000-memory.dmp
    Filesize

    248KB

  • memory/2668-1100-0x00000000050C0000-0x00000000051CA000-memory.dmp
    Filesize

    1.0MB

  • memory/2668-1099-0x00000000056D0000-0x0000000005CD6000-memory.dmp
    Filesize

    6.0MB

  • memory/2668-336-0x0000000000760000-0x0000000000770000-memory.dmp
    Filesize

    64KB

  • memory/2668-338-0x0000000000760000-0x0000000000770000-memory.dmp
    Filesize

    64KB

  • memory/2668-333-0x0000000000760000-0x0000000000770000-memory.dmp
    Filesize

    64KB

  • memory/2668-332-0x0000000000590000-0x00000000005DB000-memory.dmp
    Filesize

    300KB

  • memory/2668-222-0x00000000021F0000-0x000000000222F000-memory.dmp
    Filesize

    252KB

  • memory/2668-220-0x00000000021F0000-0x000000000222F000-memory.dmp
    Filesize

    252KB

  • memory/2668-218-0x00000000021F0000-0x000000000222F000-memory.dmp
    Filesize

    252KB

  • memory/2668-187-0x0000000002130000-0x0000000002176000-memory.dmp
    Filesize

    280KB

  • memory/2668-188-0x00000000021F0000-0x0000000002234000-memory.dmp
    Filesize

    272KB

  • memory/2668-189-0x00000000021F0000-0x000000000222F000-memory.dmp
    Filesize

    252KB

  • memory/2668-190-0x00000000021F0000-0x000000000222F000-memory.dmp
    Filesize

    252KB

  • memory/2668-192-0x00000000021F0000-0x000000000222F000-memory.dmp
    Filesize

    252KB

  • memory/2668-194-0x00000000021F0000-0x000000000222F000-memory.dmp
    Filesize

    252KB

  • memory/2668-196-0x00000000021F0000-0x000000000222F000-memory.dmp
    Filesize

    252KB

  • memory/2668-198-0x00000000021F0000-0x000000000222F000-memory.dmp
    Filesize

    252KB

  • memory/2668-200-0x00000000021F0000-0x000000000222F000-memory.dmp
    Filesize

    252KB

  • memory/2668-202-0x00000000021F0000-0x000000000222F000-memory.dmp
    Filesize

    252KB

  • memory/2668-204-0x00000000021F0000-0x000000000222F000-memory.dmp
    Filesize

    252KB

  • memory/2668-206-0x00000000021F0000-0x000000000222F000-memory.dmp
    Filesize

    252KB

  • memory/2668-208-0x00000000021F0000-0x000000000222F000-memory.dmp
    Filesize

    252KB

  • memory/2668-210-0x00000000021F0000-0x000000000222F000-memory.dmp
    Filesize

    252KB

  • memory/2668-212-0x00000000021F0000-0x000000000222F000-memory.dmp
    Filesize

    252KB

  • memory/2668-214-0x00000000021F0000-0x000000000222F000-memory.dmp
    Filesize

    252KB

  • memory/2668-216-0x00000000021F0000-0x000000000222F000-memory.dmp
    Filesize

    252KB

  • memory/4596-166-0x0000000002490000-0x00000000024A2000-memory.dmp
    Filesize

    72KB

  • memory/4596-146-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/4596-147-0x0000000002440000-0x0000000002450000-memory.dmp
    Filesize

    64KB

  • memory/4596-180-0x0000000002440000-0x0000000002450000-memory.dmp
    Filesize

    64KB

  • memory/4596-179-0x0000000002440000-0x0000000002450000-memory.dmp
    Filesize

    64KB

  • memory/4596-178-0x0000000002440000-0x0000000002450000-memory.dmp
    Filesize

    64KB

  • memory/4596-177-0x0000000000400000-0x00000000004AA000-memory.dmp
    Filesize

    680KB

  • memory/4596-176-0x0000000002490000-0x00000000024A2000-memory.dmp
    Filesize

    72KB

  • memory/4596-174-0x0000000002490000-0x00000000024A2000-memory.dmp
    Filesize

    72KB

  • memory/4596-148-0x0000000002440000-0x0000000002450000-memory.dmp
    Filesize

    64KB

  • memory/4596-172-0x0000000002490000-0x00000000024A2000-memory.dmp
    Filesize

    72KB

  • memory/4596-170-0x0000000002490000-0x00000000024A2000-memory.dmp
    Filesize

    72KB

  • memory/4596-168-0x0000000002490000-0x00000000024A2000-memory.dmp
    Filesize

    72KB

  • memory/4596-150-0x0000000002490000-0x00000000024A2000-memory.dmp
    Filesize

    72KB

  • memory/4596-182-0x0000000000400000-0x00000000004AA000-memory.dmp
    Filesize

    680KB

  • memory/4596-164-0x0000000002490000-0x00000000024A2000-memory.dmp
    Filesize

    72KB

  • memory/4596-149-0x0000000002490000-0x00000000024A2000-memory.dmp
    Filesize

    72KB

  • memory/4596-160-0x0000000002490000-0x00000000024A2000-memory.dmp
    Filesize

    72KB

  • memory/4596-158-0x0000000002490000-0x00000000024A2000-memory.dmp
    Filesize

    72KB

  • memory/4596-156-0x0000000002490000-0x00000000024A2000-memory.dmp
    Filesize

    72KB

  • memory/4596-154-0x0000000002490000-0x00000000024A2000-memory.dmp
    Filesize

    72KB

  • memory/4596-152-0x0000000002490000-0x00000000024A2000-memory.dmp
    Filesize

    72KB

  • memory/4596-162-0x0000000002490000-0x00000000024A2000-memory.dmp
    Filesize

    72KB

  • memory/4596-145-0x0000000002490000-0x00000000024A8000-memory.dmp
    Filesize

    96KB

  • memory/4596-143-0x0000000002400000-0x000000000241A000-memory.dmp
    Filesize

    104KB

  • memory/4596-144-0x0000000004A00000-0x0000000004EFE000-memory.dmp
    Filesize

    5.0MB

  • memory/4652-1129-0x00000000005B0000-0x00000000005EB000-memory.dmp
    Filesize

    236KB

  • memory/4856-1122-0x000000000A580000-0x000000000A5CB000-memory.dmp
    Filesize

    300KB

  • memory/4856-1123-0x0000000005050000-0x0000000005060000-memory.dmp
    Filesize

    64KB

  • memory/4856-1121-0x0000000000FA0000-0x0000000000FA6000-memory.dmp
    Filesize

    24KB

  • memory/4856-1120-0x00000000007A0000-0x00000000007D0000-memory.dmp
    Filesize

    192KB