Analysis

  • max time kernel
    141s
  • max time network
    107s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10-04-2023 20:52

General

  • Target

    5fa4e9817ffd5401599d3953f5ce080a2a3c1955fa3af2e60ede42eed52e2284.exe

  • Size

    938KB

  • MD5

    1fee4cf9a946a0123830edcb4efaa678

  • SHA1

    603e59e986df51e1940bd862b8dd7071d1fdb0af

  • SHA256

    5fa4e9817ffd5401599d3953f5ce080a2a3c1955fa3af2e60ede42eed52e2284

  • SHA512

    0c78f05ad46f9077a9073b6054a56c52f9745dd127f97b59fe62c3801b3d2b54eba2a6a8b29f9225cba1f1d3473b8914480144adb849a3b00e51fa531c26505e

  • SSDEEP

    24576:AyMMNmzcPc4geaNaEWkH31pXIm9GSfP/pUwn0Vj:HIzcPyeaoEPH3n4SX/pUU

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

zima

C2

176.113.115.145:4125

Attributes
  • auth_value

    2ef701d510c0d27e8a8e3270281678b1

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5fa4e9817ffd5401599d3953f5ce080a2a3c1955fa3af2e60ede42eed52e2284.exe
    "C:\Users\Admin\AppData\Local\Temp\5fa4e9817ffd5401599d3953f5ce080a2a3c1955fa3af2e60ede42eed52e2284.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un885395.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un885395.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3276
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un983416.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un983416.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4168
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr906486.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr906486.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4140
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu278161.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu278161.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2372
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk799422.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk799422.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3120
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si202886.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si202886.exe
      2⤵
      • Executes dropped EXE
      PID:3620
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3620 -s 620
        3⤵
        • Program crash
        PID:4420
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3620 -s 700
        3⤵
        • Program crash
        PID:4468
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3620 -s 840
        3⤵
        • Program crash
        PID:3888
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3620 -s 872
        3⤵
        • Program crash
        PID:3892
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3620 -s 852
        3⤵
        • Program crash
        PID:3524
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3620 -s 880
        3⤵
        • Program crash
        PID:3260
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3620 -s 1084
        3⤵
        • Program crash
        PID:4296

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si202886.exe
    Filesize

    231KB

    MD5

    f8117f396c10315824172b564d08490e

    SHA1

    96c20a6f156aa6e75f75fa9038a8878d75401138

    SHA256

    7f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba

    SHA512

    60606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si202886.exe
    Filesize

    231KB

    MD5

    f8117f396c10315824172b564d08490e

    SHA1

    96c20a6f156aa6e75f75fa9038a8878d75401138

    SHA256

    7f2db89b0b8c955144ab3138b179d30a3d7f5220b3752bdfad443bab0fc935ba

    SHA512

    60606b0cf43e2c10d42f611c47463fcce8044faad9ebb366cc455641747b47c4c2844a5b7b56194cfca524d881fd3f9db3464b8307076a69bbf1c2bc04b43743

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un885395.exe
    Filesize

    674KB

    MD5

    0fd25596ae5dcf113c50e334833b18fc

    SHA1

    e44e873a166227e859a7663667c5ed610b408763

    SHA256

    6860f63eab3f9b227785c5c9c44a8e8de368ad41f8471b90c1162520ce963440

    SHA512

    ff1cfba68e9d2c1fde0ca52be6e2f4f0b8c9194d12f90578c64bc8699819c5c3e648ecbdbaca0fb59e5ca4d38cc0ed19b6d1dc8948085de38aa0040a4202cb39

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un885395.exe
    Filesize

    674KB

    MD5

    0fd25596ae5dcf113c50e334833b18fc

    SHA1

    e44e873a166227e859a7663667c5ed610b408763

    SHA256

    6860f63eab3f9b227785c5c9c44a8e8de368ad41f8471b90c1162520ce963440

    SHA512

    ff1cfba68e9d2c1fde0ca52be6e2f4f0b8c9194d12f90578c64bc8699819c5c3e648ecbdbaca0fb59e5ca4d38cc0ed19b6d1dc8948085de38aa0040a4202cb39

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk799422.exe
    Filesize

    169KB

    MD5

    d3ab6884f15b5e486f1592a69f2573e7

    SHA1

    b2902bec045b153587920344681408d1e1fead1b

    SHA256

    13984a6fa99d3cdc5524e3c9168ef914487d246f5a07ea49e2d0d6ac6d11533c

    SHA512

    0beff9c28edb2991045c25b5a2d9413893d66801c7eef0465719d200b332d71a4a1d509b8cc994ade91bb024110d8954e7f71735f6c450d0be4f1077e3fdaa42

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk799422.exe
    Filesize

    169KB

    MD5

    d3ab6884f15b5e486f1592a69f2573e7

    SHA1

    b2902bec045b153587920344681408d1e1fead1b

    SHA256

    13984a6fa99d3cdc5524e3c9168ef914487d246f5a07ea49e2d0d6ac6d11533c

    SHA512

    0beff9c28edb2991045c25b5a2d9413893d66801c7eef0465719d200b332d71a4a1d509b8cc994ade91bb024110d8954e7f71735f6c450d0be4f1077e3fdaa42

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un983416.exe
    Filesize

    520KB

    MD5

    ffed3adb6d9dde4bac3d19d03f3792c3

    SHA1

    23415b96135492dc8aac646d7d115331aba34950

    SHA256

    e1b0000ad70192a570e41f7716d9de976ee33892db389e51e7cbc82fca1b3989

    SHA512

    6a23986dc9d69ccf2adfb63b6deb4e8c83df9f5ec1aae07d0bd61ac5b978cf206cac810431826ad24c34b41d0d020654d22d2392286ec7d8f07a2d8b7df8eaa3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un983416.exe
    Filesize

    520KB

    MD5

    ffed3adb6d9dde4bac3d19d03f3792c3

    SHA1

    23415b96135492dc8aac646d7d115331aba34950

    SHA256

    e1b0000ad70192a570e41f7716d9de976ee33892db389e51e7cbc82fca1b3989

    SHA512

    6a23986dc9d69ccf2adfb63b6deb4e8c83df9f5ec1aae07d0bd61ac5b978cf206cac810431826ad24c34b41d0d020654d22d2392286ec7d8f07a2d8b7df8eaa3

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr906486.exe
    Filesize

    239KB

    MD5

    dca9202595d7b36bcc75ffbd83c76133

    SHA1

    e84e239d17170b78a7ac5a2d0c1b2bd9f5b61ed0

    SHA256

    883aad065c59507760ec793e7e6581af98d9d08130156407132e3097b6c5ec00

    SHA512

    6f228af542ab612dfb8784340d21bfe134024c29cb92f8bf0fa8cf825d3ff28f8c2286342b76d4634873b0a34ad45e26a5a8e1b7427863922f130017b784f6ca

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr906486.exe
    Filesize

    239KB

    MD5

    dca9202595d7b36bcc75ffbd83c76133

    SHA1

    e84e239d17170b78a7ac5a2d0c1b2bd9f5b61ed0

    SHA256

    883aad065c59507760ec793e7e6581af98d9d08130156407132e3097b6c5ec00

    SHA512

    6f228af542ab612dfb8784340d21bfe134024c29cb92f8bf0fa8cf825d3ff28f8c2286342b76d4634873b0a34ad45e26a5a8e1b7427863922f130017b784f6ca

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu278161.exe
    Filesize

    297KB

    MD5

    f9348cb3f31fc8dd57d7f69ce000a330

    SHA1

    5b9c1447aa07780081cba6cd0bdc0be4c7c7e86f

    SHA256

    53b828cc774b5c9a828111fc9044231b1eea6a2d8551abc1747f5d90f94b838c

    SHA512

    1ba58006dc9a427623e38f7d3ea6d36c7c5fb1324882e37bb9d10fee78c548a031bd0a511509fdc97fbadffe02470b27720129d3ffad137c152c968894f06b9e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu278161.exe
    Filesize

    297KB

    MD5

    f9348cb3f31fc8dd57d7f69ce000a330

    SHA1

    5b9c1447aa07780081cba6cd0bdc0be4c7c7e86f

    SHA256

    53b828cc774b5c9a828111fc9044231b1eea6a2d8551abc1747f5d90f94b838c

    SHA512

    1ba58006dc9a427623e38f7d3ea6d36c7c5fb1324882e37bb9d10fee78c548a031bd0a511509fdc97fbadffe02470b27720129d3ffad137c152c968894f06b9e

  • memory/2372-1103-0x0000000005440000-0x000000000548B000-memory.dmp
    Filesize

    300KB

  • memory/2372-1108-0x0000000006370000-0x00000000063E6000-memory.dmp
    Filesize

    472KB

  • memory/2372-1115-0x00000000021F0000-0x0000000002200000-memory.dmp
    Filesize

    64KB

  • memory/2372-1114-0x0000000006890000-0x0000000006DBC000-memory.dmp
    Filesize

    5.2MB

  • memory/2372-1113-0x00000000066B0000-0x0000000006872000-memory.dmp
    Filesize

    1.8MB

  • memory/2372-1112-0x00000000021F0000-0x0000000002200000-memory.dmp
    Filesize

    64KB

  • memory/2372-1111-0x00000000021F0000-0x0000000002200000-memory.dmp
    Filesize

    64KB

  • memory/2372-1110-0x00000000021F0000-0x0000000002200000-memory.dmp
    Filesize

    64KB

  • memory/2372-1109-0x00000000063F0000-0x0000000006440000-memory.dmp
    Filesize

    320KB

  • memory/2372-1106-0x0000000005670000-0x00000000056D6000-memory.dmp
    Filesize

    408KB

  • memory/2372-1105-0x00000000055D0000-0x0000000005662000-memory.dmp
    Filesize

    584KB

  • memory/2372-1104-0x00000000021F0000-0x0000000002200000-memory.dmp
    Filesize

    64KB

  • memory/2372-1102-0x0000000005300000-0x000000000533E000-memory.dmp
    Filesize

    248KB

  • memory/2372-1101-0x00000000052E0000-0x00000000052F2000-memory.dmp
    Filesize

    72KB

  • memory/2372-1100-0x00000000051D0000-0x00000000052DA000-memory.dmp
    Filesize

    1.0MB

  • memory/2372-1099-0x00000000057E0000-0x0000000005DE6000-memory.dmp
    Filesize

    6.0MB

  • memory/2372-226-0x00000000021B0000-0x00000000021EF000-memory.dmp
    Filesize

    252KB

  • memory/2372-224-0x00000000021B0000-0x00000000021EF000-memory.dmp
    Filesize

    252KB

  • memory/2372-222-0x00000000021B0000-0x00000000021EF000-memory.dmp
    Filesize

    252KB

  • memory/2372-220-0x00000000021B0000-0x00000000021EF000-memory.dmp
    Filesize

    252KB

  • memory/2372-218-0x00000000021B0000-0x00000000021EF000-memory.dmp
    Filesize

    252KB

  • memory/2372-216-0x00000000021B0000-0x00000000021EF000-memory.dmp
    Filesize

    252KB

  • memory/2372-214-0x00000000021B0000-0x00000000021EF000-memory.dmp
    Filesize

    252KB

  • memory/2372-187-0x00000000020F0000-0x0000000002136000-memory.dmp
    Filesize

    280KB

  • memory/2372-188-0x00000000021B0000-0x00000000021F4000-memory.dmp
    Filesize

    272KB

  • memory/2372-189-0x00000000021B0000-0x00000000021EF000-memory.dmp
    Filesize

    252KB

  • memory/2372-190-0x00000000021B0000-0x00000000021EF000-memory.dmp
    Filesize

    252KB

  • memory/2372-192-0x00000000021B0000-0x00000000021EF000-memory.dmp
    Filesize

    252KB

  • memory/2372-194-0x00000000021B0000-0x00000000021EF000-memory.dmp
    Filesize

    252KB

  • memory/2372-197-0x00000000005E0000-0x000000000062B000-memory.dmp
    Filesize

    300KB

  • memory/2372-196-0x00000000021B0000-0x00000000021EF000-memory.dmp
    Filesize

    252KB

  • memory/2372-200-0x00000000021B0000-0x00000000021EF000-memory.dmp
    Filesize

    252KB

  • memory/2372-199-0x00000000021F0000-0x0000000002200000-memory.dmp
    Filesize

    64KB

  • memory/2372-201-0x00000000021F0000-0x0000000002200000-memory.dmp
    Filesize

    64KB

  • memory/2372-203-0x00000000021F0000-0x0000000002200000-memory.dmp
    Filesize

    64KB

  • memory/2372-204-0x00000000021B0000-0x00000000021EF000-memory.dmp
    Filesize

    252KB

  • memory/2372-206-0x00000000021B0000-0x00000000021EF000-memory.dmp
    Filesize

    252KB

  • memory/2372-208-0x00000000021B0000-0x00000000021EF000-memory.dmp
    Filesize

    252KB

  • memory/2372-210-0x00000000021B0000-0x00000000021EF000-memory.dmp
    Filesize

    252KB

  • memory/2372-212-0x00000000021B0000-0x00000000021EF000-memory.dmp
    Filesize

    252KB

  • memory/3120-1121-0x0000000000EA0000-0x0000000000ED0000-memory.dmp
    Filesize

    192KB

  • memory/3120-1125-0x0000000005760000-0x0000000005770000-memory.dmp
    Filesize

    64KB

  • memory/3120-1124-0x0000000005760000-0x0000000005770000-memory.dmp
    Filesize

    64KB

  • memory/3120-1123-0x000000000AC80000-0x000000000ACCB000-memory.dmp
    Filesize

    300KB

  • memory/3120-1122-0x00000000015A0000-0x00000000015A6000-memory.dmp
    Filesize

    24KB

  • memory/3620-1131-0x0000000000580000-0x00000000005BB000-memory.dmp
    Filesize

    236KB

  • memory/4140-162-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4140-156-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4140-174-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4140-172-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4140-166-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4140-146-0x0000000004B00000-0x0000000004B10000-memory.dmp
    Filesize

    64KB

  • memory/4140-168-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4140-170-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4140-164-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4140-149-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4140-147-0x0000000004B00000-0x0000000004B10000-memory.dmp
    Filesize

    64KB

  • memory/4140-160-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4140-158-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4140-176-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4140-154-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4140-152-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4140-150-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4140-145-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/4140-144-0x00000000049D0000-0x00000000049E8000-memory.dmp
    Filesize

    96KB

  • memory/4140-177-0x0000000000400000-0x00000000004AA000-memory.dmp
    Filesize

    680KB

  • memory/4140-178-0x0000000004B00000-0x0000000004B10000-memory.dmp
    Filesize

    64KB

  • memory/4140-179-0x0000000004B00000-0x0000000004B10000-memory.dmp
    Filesize

    64KB

  • memory/4140-180-0x0000000004B00000-0x0000000004B10000-memory.dmp
    Filesize

    64KB

  • memory/4140-182-0x0000000000400000-0x00000000004AA000-memory.dmp
    Filesize

    680KB

  • memory/4140-143-0x0000000004B10000-0x000000000500E000-memory.dmp
    Filesize

    5.0MB

  • memory/4140-142-0x0000000002440000-0x000000000245A000-memory.dmp
    Filesize

    104KB

  • memory/4140-148-0x0000000004B00000-0x0000000004B10000-memory.dmp
    Filesize

    64KB