Analysis

  • max time kernel
    148s
  • max time network
    105s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11/04/2023, 03:08

General

  • Target

    c0d85efcc21f0cfd2ffc9552e288871f4db64fd32cd7327e5760aed7a6a438e2.exe

  • Size

    925KB

  • MD5

    0a3876077dbae7ce50108297f6446ce2

  • SHA1

    3f23cc139bc788ee9b5ee9fee5e84ea76f0e21bb

  • SHA256

    c0d85efcc21f0cfd2ffc9552e288871f4db64fd32cd7327e5760aed7a6a438e2

  • SHA512

    7c2e2c48c46c609d5567055a52cd6ef604d7187c01c6681bf9ed0d47b8ec203689d9d4aaae5c7d668160d555a3e66970cec5050c7ac90293e06bfd4c61f52876

  • SSDEEP

    24576:TyYBA/dImrHXz+mXFL8T9B/wxKcvTZrS7hlo+o+:mYvmrHXzNXdyB/w3TZcs

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

nahui

C2

176.113.115.145:4125

Attributes
  • auth_value

    b9ed10946d21e28d58d0c72c535cde6f

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0d85efcc21f0cfd2ffc9552e288871f4db64fd32cd7327e5760aed7a6a438e2.exe
    "C:\Users\Admin\AppData\Local\Temp\c0d85efcc21f0cfd2ffc9552e288871f4db64fd32cd7327e5760aed7a6a438e2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2496
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un936557.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un936557.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2572
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un508736.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un508736.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3196
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr376206.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr376206.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4872
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu772401.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu772401.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2800
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk808532.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk808532.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4080
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si033180.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si033180.exe
      2⤵
      • Executes dropped EXE
      PID:4800
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 620
        3⤵
        • Program crash
        PID:780
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 704
        3⤵
        • Program crash
        PID:3144
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 864
        3⤵
        • Program crash
        PID:4428
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 852
        3⤵
        • Program crash
        PID:4400
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 872
        3⤵
        • Program crash
        PID:3368
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 844
        3⤵
        • Program crash
        PID:3356
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 1032
        3⤵
        • Program crash
        PID:4448

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si033180.exe

    Filesize

    230KB

    MD5

    6300508e058abec227185450c3c9547c

    SHA1

    41910122c84dcbdb2efa6c91378ce68731819d07

    SHA256

    ad280e6fecddb25c5a3b9ff4881f51470c1bc294c958827e9de2cf1c164f975c

    SHA512

    2216d2f631da40785c69acc788d154c5bee2dacdfd764478249c93a6684e28b2ef83091d39af4543c6930d7ec0b40a434dac3d8f6e76d9dcebe0544fce5d7892

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si033180.exe

    Filesize

    230KB

    MD5

    6300508e058abec227185450c3c9547c

    SHA1

    41910122c84dcbdb2efa6c91378ce68731819d07

    SHA256

    ad280e6fecddb25c5a3b9ff4881f51470c1bc294c958827e9de2cf1c164f975c

    SHA512

    2216d2f631da40785c69acc788d154c5bee2dacdfd764478249c93a6684e28b2ef83091d39af4543c6930d7ec0b40a434dac3d8f6e76d9dcebe0544fce5d7892

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un936557.exe

    Filesize

    660KB

    MD5

    a3791fc54efe642d150d658aed0368f8

    SHA1

    4fc8537840533a74f41ed9137d7920ddcc575996

    SHA256

    901e498d43651f821fbdfb863045964d62b846e0cdc485a5e416fc0a85cee0d4

    SHA512

    d0b50d2f1f3b00da0fa73070254a5f7c689cac46d7b46d022ee2c3c158bc4771cdb6989d2ad9b54f5f5528671814051f708e09f96e03bdc94c5422de275815a8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un936557.exe

    Filesize

    660KB

    MD5

    a3791fc54efe642d150d658aed0368f8

    SHA1

    4fc8537840533a74f41ed9137d7920ddcc575996

    SHA256

    901e498d43651f821fbdfb863045964d62b846e0cdc485a5e416fc0a85cee0d4

    SHA512

    d0b50d2f1f3b00da0fa73070254a5f7c689cac46d7b46d022ee2c3c158bc4771cdb6989d2ad9b54f5f5528671814051f708e09f96e03bdc94c5422de275815a8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk808532.exe

    Filesize

    175KB

    MD5

    b2e599dec0856d70ebb2ab2327ae6442

    SHA1

    300323436b47ddafa78cb7e835deb1ab09f13698

    SHA256

    b1470330cd560723c67ad42eb7e8c8137271c5a729cd08a81d3028e8bb2e1c43

    SHA512

    c5092c0377c8d7aa8a1097d52e2b96df41ce9b1b9a72bf0c3a1f10c7c60ea5831bb2c535e144f1908f39f2b93017d69fd9f24272b0e706bacd5970e84e909065

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk808532.exe

    Filesize

    175KB

    MD5

    b2e599dec0856d70ebb2ab2327ae6442

    SHA1

    300323436b47ddafa78cb7e835deb1ab09f13698

    SHA256

    b1470330cd560723c67ad42eb7e8c8137271c5a729cd08a81d3028e8bb2e1c43

    SHA512

    c5092c0377c8d7aa8a1097d52e2b96df41ce9b1b9a72bf0c3a1f10c7c60ea5831bb2c535e144f1908f39f2b93017d69fd9f24272b0e706bacd5970e84e909065

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un508736.exe

    Filesize

    518KB

    MD5

    5fcc21d72f8612df514cf7e14f57ad84

    SHA1

    aa9a5522b14ee81c66d817068e5ae3f2f9e07245

    SHA256

    38e731bce6e9ea12f8841dc3236e3dbe27af814584153e22db1c04743607ee6e

    SHA512

    e9efa357dd23c10bd6a752934b1c16e418c3849224380fa9bb9252ce54060a038217c9426592b92f4c480f7c877b8091ec7ceda83a4f76cc9a61b104bdc3a2dc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un508736.exe

    Filesize

    518KB

    MD5

    5fcc21d72f8612df514cf7e14f57ad84

    SHA1

    aa9a5522b14ee81c66d817068e5ae3f2f9e07245

    SHA256

    38e731bce6e9ea12f8841dc3236e3dbe27af814584153e22db1c04743607ee6e

    SHA512

    e9efa357dd23c10bd6a752934b1c16e418c3849224380fa9bb9252ce54060a038217c9426592b92f4c480f7c877b8091ec7ceda83a4f76cc9a61b104bdc3a2dc

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr376206.exe

    Filesize

    238KB

    MD5

    ff0544e2ce1ee69832a8808528d274f5

    SHA1

    561127ca7e86e3e8712c387933b09c581291bacd

    SHA256

    210b0c703fd740a19ca52a4889932f97ea05e51a2c37734450f8e3f844aca691

    SHA512

    6f205308305eef5416185ef4493f538485bc6f8a9a68ff50b2e1e5f1e256ecb59c1a1f8ab9e4dc10277be919f1ca7c5925dd6625b9efa9ccbf6d3ca0ab10c26c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr376206.exe

    Filesize

    238KB

    MD5

    ff0544e2ce1ee69832a8808528d274f5

    SHA1

    561127ca7e86e3e8712c387933b09c581291bacd

    SHA256

    210b0c703fd740a19ca52a4889932f97ea05e51a2c37734450f8e3f844aca691

    SHA512

    6f205308305eef5416185ef4493f538485bc6f8a9a68ff50b2e1e5f1e256ecb59c1a1f8ab9e4dc10277be919f1ca7c5925dd6625b9efa9ccbf6d3ca0ab10c26c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu772401.exe

    Filesize

    297KB

    MD5

    bc1a1708fa262d7ea76518c7756d7946

    SHA1

    b7b5029b1e7558c0f109dc3160b415bef59ac7fe

    SHA256

    6f70daaefcbbb7c582f2a01401f9f9fe85213932846f94c7ff47eab91be623f2

    SHA512

    f3edc2142bed437cb324f5a68db84dd8d5c7ab2803adf0a7dc4541cebcd5436561b37e00c2bd8ae9920609a9f560b289408eb7d2abc353a8a1634eeee9d07c56

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu772401.exe

    Filesize

    297KB

    MD5

    bc1a1708fa262d7ea76518c7756d7946

    SHA1

    b7b5029b1e7558c0f109dc3160b415bef59ac7fe

    SHA256

    6f70daaefcbbb7c582f2a01401f9f9fe85213932846f94c7ff47eab91be623f2

    SHA512

    f3edc2142bed437cb324f5a68db84dd8d5c7ab2803adf0a7dc4541cebcd5436561b37e00c2bd8ae9920609a9f560b289408eb7d2abc353a8a1634eeee9d07c56

  • memory/2800-1101-0x0000000005690000-0x000000000579A000-memory.dmp

    Filesize

    1.0MB

  • memory/2800-1105-0x0000000005940000-0x000000000598B000-memory.dmp

    Filesize

    300KB

  • memory/2800-1116-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB

  • memory/2800-1115-0x0000000006D70000-0x0000000006DC0000-memory.dmp

    Filesize

    320KB

  • memory/2800-1114-0x0000000006CF0000-0x0000000006D66000-memory.dmp

    Filesize

    472KB

  • memory/2800-1113-0x0000000006680000-0x0000000006BAC000-memory.dmp

    Filesize

    5.2MB

  • memory/2800-1112-0x00000000064B0000-0x0000000006672000-memory.dmp

    Filesize

    1.8MB

  • memory/2800-1111-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB

  • memory/2800-1110-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB

  • memory/2800-1109-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB

  • memory/2800-1108-0x0000000006160000-0x00000000061F2000-memory.dmp

    Filesize

    584KB

  • memory/2800-1107-0x0000000005AA0000-0x0000000005B06000-memory.dmp

    Filesize

    408KB

  • memory/2800-1104-0x0000000005800000-0x000000000583E000-memory.dmp

    Filesize

    248KB

  • memory/2800-1103-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB

  • memory/2800-1102-0x00000000057A0000-0x00000000057B2000-memory.dmp

    Filesize

    72KB

  • memory/2800-1100-0x0000000005080000-0x0000000005686000-memory.dmp

    Filesize

    6.0MB

  • memory/2800-227-0x0000000004A30000-0x0000000004A6F000-memory.dmp

    Filesize

    252KB

  • memory/2800-225-0x0000000004A30000-0x0000000004A6F000-memory.dmp

    Filesize

    252KB

  • memory/2800-223-0x0000000004A30000-0x0000000004A6F000-memory.dmp

    Filesize

    252KB

  • memory/2800-221-0x0000000004A30000-0x0000000004A6F000-memory.dmp

    Filesize

    252KB

  • memory/2800-219-0x0000000004A30000-0x0000000004A6F000-memory.dmp

    Filesize

    252KB

  • memory/2800-217-0x0000000004A30000-0x0000000004A6F000-memory.dmp

    Filesize

    252KB

  • memory/2800-215-0x0000000004A30000-0x0000000004A6F000-memory.dmp

    Filesize

    252KB

  • memory/2800-188-0x00000000049B0000-0x00000000049F6000-memory.dmp

    Filesize

    280KB

  • memory/2800-189-0x0000000004A30000-0x0000000004A74000-memory.dmp

    Filesize

    272KB

  • memory/2800-190-0x0000000004A30000-0x0000000004A6F000-memory.dmp

    Filesize

    252KB

  • memory/2800-191-0x0000000004A30000-0x0000000004A6F000-memory.dmp

    Filesize

    252KB

  • memory/2800-193-0x0000000004A30000-0x0000000004A6F000-memory.dmp

    Filesize

    252KB

  • memory/2800-195-0x0000000004A30000-0x0000000004A6F000-memory.dmp

    Filesize

    252KB

  • memory/2800-197-0x0000000004A30000-0x0000000004A6F000-memory.dmp

    Filesize

    252KB

  • memory/2800-198-0x00000000004C0000-0x000000000050B000-memory.dmp

    Filesize

    300KB

  • memory/2800-200-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB

  • memory/2800-202-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB

  • memory/2800-201-0x0000000004A30000-0x0000000004A6F000-memory.dmp

    Filesize

    252KB

  • memory/2800-205-0x0000000004A30000-0x0000000004A6F000-memory.dmp

    Filesize

    252KB

  • memory/2800-204-0x0000000004B70000-0x0000000004B80000-memory.dmp

    Filesize

    64KB

  • memory/2800-207-0x0000000004A30000-0x0000000004A6F000-memory.dmp

    Filesize

    252KB

  • memory/2800-211-0x0000000004A30000-0x0000000004A6F000-memory.dmp

    Filesize

    252KB

  • memory/2800-209-0x0000000004A30000-0x0000000004A6F000-memory.dmp

    Filesize

    252KB

  • memory/2800-213-0x0000000004A30000-0x0000000004A6F000-memory.dmp

    Filesize

    252KB

  • memory/4080-1122-0x00000000003A0000-0x00000000003D2000-memory.dmp

    Filesize

    200KB

  • memory/4080-1124-0x0000000005020000-0x0000000005030000-memory.dmp

    Filesize

    64KB

  • memory/4080-1123-0x0000000004CD0000-0x0000000004D1B000-memory.dmp

    Filesize

    300KB

  • memory/4800-1130-0x0000000000580000-0x00000000005BB000-memory.dmp

    Filesize

    236KB

  • memory/4872-167-0x0000000002480000-0x0000000002492000-memory.dmp

    Filesize

    72KB

  • memory/4872-161-0x0000000002480000-0x0000000002492000-memory.dmp

    Filesize

    72KB

  • memory/4872-178-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/4872-177-0x0000000002480000-0x0000000002492000-memory.dmp

    Filesize

    72KB

  • memory/4872-148-0x0000000004B30000-0x0000000004B40000-memory.dmp

    Filesize

    64KB

  • memory/4872-175-0x0000000002480000-0x0000000002492000-memory.dmp

    Filesize

    72KB

  • memory/4872-173-0x0000000002480000-0x0000000002492000-memory.dmp

    Filesize

    72KB

  • memory/4872-171-0x0000000002480000-0x0000000002492000-memory.dmp

    Filesize

    72KB

  • memory/4872-150-0x0000000002480000-0x0000000002492000-memory.dmp

    Filesize

    72KB

  • memory/4872-169-0x0000000002480000-0x0000000002492000-memory.dmp

    Filesize

    72KB

  • memory/4872-147-0x0000000004B30000-0x0000000004B40000-memory.dmp

    Filesize

    64KB

  • memory/4872-165-0x0000000002480000-0x0000000002492000-memory.dmp

    Filesize

    72KB

  • memory/4872-163-0x0000000002480000-0x0000000002492000-memory.dmp

    Filesize

    72KB

  • memory/4872-179-0x0000000004B30000-0x0000000004B40000-memory.dmp

    Filesize

    64KB

  • memory/4872-159-0x0000000002480000-0x0000000002492000-memory.dmp

    Filesize

    72KB

  • memory/4872-157-0x0000000002480000-0x0000000002492000-memory.dmp

    Filesize

    72KB

  • memory/4872-155-0x0000000002480000-0x0000000002492000-memory.dmp

    Filesize

    72KB

  • memory/4872-153-0x0000000002480000-0x0000000002492000-memory.dmp

    Filesize

    72KB

  • memory/4872-151-0x0000000002480000-0x0000000002492000-memory.dmp

    Filesize

    72KB

  • memory/4872-146-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4872-145-0x0000000002480000-0x0000000002498000-memory.dmp

    Filesize

    96KB

  • memory/4872-180-0x0000000004B30000-0x0000000004B40000-memory.dmp

    Filesize

    64KB

  • memory/4872-181-0x0000000004B30000-0x0000000004B40000-memory.dmp

    Filesize

    64KB

  • memory/4872-183-0x0000000000400000-0x00000000004AA000-memory.dmp

    Filesize

    680KB

  • memory/4872-144-0x0000000004B40000-0x000000000503E000-memory.dmp

    Filesize

    5.0MB

  • memory/4872-143-0x0000000002400000-0x000000000241A000-memory.dmp

    Filesize

    104KB

  • memory/4872-149-0x0000000004B30000-0x0000000004B40000-memory.dmp

    Filesize

    64KB