Analysis

  • max time kernel
    190s
  • max time network
    208s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/05/2023, 19:27

General

  • Target

    c2c9ceefab1f8c3e606b02c22e40090e3df0be35b567658765f847962dd920b6.exe

  • Size

    924KB

  • MD5

    161c9a0fb3a9de0c700cbe0ab6bb2cc0

  • SHA1

    2edc949e1e426c41ef0b1cc178aef21ead1ef61c

  • SHA256

    c2c9ceefab1f8c3e606b02c22e40090e3df0be35b567658765f847962dd920b6

  • SHA512

    70df0c1d35f343ce18246de44226c7b21be0f78912887532b410b818807f2ee0930a125605e184631c759b1ef6a137508439fd2af3740ba6f8ec1e4219daec29

  • SSDEEP

    24576:By5RAulxm4DeRvVznUJ3cE7hoRJC3u2Q5/2x:05RAkm4DynUZcE76LC3S5+

Malware Config

Extracted

Family

redline

Botnet

lupa

C2

217.196.96.56:4138

Attributes
  • auth_value

    fcb02fce9bc10c56a9841d56974bd7b8

Extracted

Family

amadey

Version

3.70

C2

212.113.119.255/joomla/index.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Detects Redline Stealer samples 3 IoCs

    This rule detects the presence of Redline Stealer samples based on their unique strings.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 11 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c2c9ceefab1f8c3e606b02c22e40090e3df0be35b567658765f847962dd920b6.exe
    "C:\Users\Admin\AppData\Local\Temp\c2c9ceefab1f8c3e606b02c22e40090e3df0be35b567658765f847962dd920b6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5833959.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5833959.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1652
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7515219.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7515219.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3488
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1348484.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1348484.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1136
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n7689254.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n7689254.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2668
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2668 -s 1088
              6⤵
              • Program crash
              PID:4980
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o0412646.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o0412646.exe
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3384
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p6760058.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p6760058.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4328
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s7723018.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s7723018.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        PID:1564
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2668 -ip 2668
    1⤵
      PID:4248

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5833959.exe

      Filesize

      771KB

      MD5

      b23e3cde053c3a9815ab0a88e0bb906c

      SHA1

      2853d72c4538a36e4ce7087c1ce74523e1894737

      SHA256

      0e2adc699bc61691175d692de49e19f7e4986aafac4fb096dd7e151ef0d427ac

      SHA512

      cd07d320090c169750af26d22995c3319e7310b2574ecd7910ebff01f45fa831007b8726fc2951feb0d56d2f2153dcaeae7782708df9208957cb21856baacd00

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z5833959.exe

      Filesize

      771KB

      MD5

      b23e3cde053c3a9815ab0a88e0bb906c

      SHA1

      2853d72c4538a36e4ce7087c1ce74523e1894737

      SHA256

      0e2adc699bc61691175d692de49e19f7e4986aafac4fb096dd7e151ef0d427ac

      SHA512

      cd07d320090c169750af26d22995c3319e7310b2574ecd7910ebff01f45fa831007b8726fc2951feb0d56d2f2153dcaeae7782708df9208957cb21856baacd00

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s7723018.exe

      Filesize

      229KB

      MD5

      5e4b56e906c72d13064241b15a94df99

      SHA1

      2d1d87321488f6ad6ee3a01852c4c301f5dee92c

      SHA256

      40572447f3d8a2587b9cc50916f917011c8ceeba1a63a6a2bb3d1ef0100d9c8c

      SHA512

      f32ee30e32858420837c3175132c1a4b83b6bded559233af924b8311bbc64808bbfeec6cd8c4697c1d03a83c3a4865d4318a7a6110044e8399048a9b0bf0b84e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\s7723018.exe

      Filesize

      229KB

      MD5

      5e4b56e906c72d13064241b15a94df99

      SHA1

      2d1d87321488f6ad6ee3a01852c4c301f5dee92c

      SHA256

      40572447f3d8a2587b9cc50916f917011c8ceeba1a63a6a2bb3d1ef0100d9c8c

      SHA512

      f32ee30e32858420837c3175132c1a4b83b6bded559233af924b8311bbc64808bbfeec6cd8c4697c1d03a83c3a4865d4318a7a6110044e8399048a9b0bf0b84e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7515219.exe

      Filesize

      588KB

      MD5

      88d6475b5ffacbe54b6f3be4e4734753

      SHA1

      ca2bf5ce1b8e730dcf1cf63f000904bcc9d11993

      SHA256

      efbe8280f13aa8c15858ad171d950c702fc6e6e2ec861e54ca6483b20bf6d68f

      SHA512

      f8fed8d6bd4587d6e83a3b1da629d0e246741c5798c55e6e7f74d64b1c8448959129d0079e90154384d4a4ae34c9772fb637877cd64df35e50ce6110e89e4c17

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z7515219.exe

      Filesize

      588KB

      MD5

      88d6475b5ffacbe54b6f3be4e4734753

      SHA1

      ca2bf5ce1b8e730dcf1cf63f000904bcc9d11993

      SHA256

      efbe8280f13aa8c15858ad171d950c702fc6e6e2ec861e54ca6483b20bf6d68f

      SHA512

      f8fed8d6bd4587d6e83a3b1da629d0e246741c5798c55e6e7f74d64b1c8448959129d0079e90154384d4a4ae34c9772fb637877cd64df35e50ce6110e89e4c17

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p6760058.exe

      Filesize

      176KB

      MD5

      858e11bce00701731d5c66edea1f00a9

      SHA1

      4d30c15b022c03b66bbc6127fd108914cf83e236

      SHA256

      6e76966978280ef30acc361335d3b583c1df827bdaf7229ab9b0db6bd3b1c555

      SHA512

      87b3765b54d9002a552e369f02123b7292de6398ece454f77ee4eb7fafbfd020df3ad4ca77b6b311dc1273bb91e7546a60df6da8b369f062e17bdd2fc82fc84e

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p6760058.exe

      Filesize

      176KB

      MD5

      858e11bce00701731d5c66edea1f00a9

      SHA1

      4d30c15b022c03b66bbc6127fd108914cf83e236

      SHA256

      6e76966978280ef30acc361335d3b583c1df827bdaf7229ab9b0db6bd3b1c555

      SHA512

      87b3765b54d9002a552e369f02123b7292de6398ece454f77ee4eb7fafbfd020df3ad4ca77b6b311dc1273bb91e7546a60df6da8b369f062e17bdd2fc82fc84e

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1348484.exe

      Filesize

      385KB

      MD5

      28d873b173f35006077806633c5eeee1

      SHA1

      113abad4308785150064d17b0bf320c4cb9eb039

      SHA256

      bd8c088ab41377986190b238bfdbe870a87f74405536c89d0448da2eec0b0a56

      SHA512

      99cff5d1fda9208625b7fe063e8ec14d42c4918b62d48f24dbe78b804d5bbd62281ab990dc14a7bb74a4f492faef6dddbc8c29faacc623a22a5ef420a0457c54

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1348484.exe

      Filesize

      385KB

      MD5

      28d873b173f35006077806633c5eeee1

      SHA1

      113abad4308785150064d17b0bf320c4cb9eb039

      SHA256

      bd8c088ab41377986190b238bfdbe870a87f74405536c89d0448da2eec0b0a56

      SHA512

      99cff5d1fda9208625b7fe063e8ec14d42c4918b62d48f24dbe78b804d5bbd62281ab990dc14a7bb74a4f492faef6dddbc8c29faacc623a22a5ef420a0457c54

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n7689254.exe

      Filesize

      283KB

      MD5

      eac3b76befd8ce012200781e9b5fb0ed

      SHA1

      a84b2549eb067f8a9718a42a4f7fda5b0ff31c8c

      SHA256

      000208e7f22d17d0f4dcdb613e101b7bb40ea86dcb0b4878cfe2f668c95f24a4

      SHA512

      e528d951c60914c9cda41c869238c6ea1d6dfedd225c3e39bfe6c91602efde9adc68ab3bddf7272b680cfb4072a2f97b2a4636bf442bb011687fe0e29e4e36dc

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\n7689254.exe

      Filesize

      283KB

      MD5

      eac3b76befd8ce012200781e9b5fb0ed

      SHA1

      a84b2549eb067f8a9718a42a4f7fda5b0ff31c8c

      SHA256

      000208e7f22d17d0f4dcdb613e101b7bb40ea86dcb0b4878cfe2f668c95f24a4

      SHA512

      e528d951c60914c9cda41c869238c6ea1d6dfedd225c3e39bfe6c91602efde9adc68ab3bddf7272b680cfb4072a2f97b2a4636bf442bb011687fe0e29e4e36dc

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o0412646.exe

      Filesize

      169KB

      MD5

      0607ec7c329f39615876a10b1c912947

      SHA1

      40c1736218358000a28c506ee472478b29cc8227

      SHA256

      c7cbc3ac69f45b09159c5c99183ba2bb546d761fa48cd257db04fb95fea682eb

      SHA512

      501ad3ec769b7181f2ab1497e728cda6465256d3ad0c33736ffa74522d030b1a76e5759322571232b43743b31ccf0b5046b4e5933223d712121cd56cefe15068

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o0412646.exe

      Filesize

      169KB

      MD5

      0607ec7c329f39615876a10b1c912947

      SHA1

      40c1736218358000a28c506ee472478b29cc8227

      SHA256

      c7cbc3ac69f45b09159c5c99183ba2bb546d761fa48cd257db04fb95fea682eb

      SHA512

      501ad3ec769b7181f2ab1497e728cda6465256d3ad0c33736ffa74522d030b1a76e5759322571232b43743b31ccf0b5046b4e5933223d712121cd56cefe15068

    • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\o0412646.exe

      Filesize

      169KB

      MD5

      0607ec7c329f39615876a10b1c912947

      SHA1

      40c1736218358000a28c506ee472478b29cc8227

      SHA256

      c7cbc3ac69f45b09159c5c99183ba2bb546d761fa48cd257db04fb95fea682eb

      SHA512

      501ad3ec769b7181f2ab1497e728cda6465256d3ad0c33736ffa74522d030b1a76e5759322571232b43743b31ccf0b5046b4e5933223d712121cd56cefe15068

    • memory/2668-189-0x00000000025D0000-0x00000000025E2000-memory.dmp

      Filesize

      72KB

    • memory/2668-198-0x0000000004E20000-0x0000000004E30000-memory.dmp

      Filesize

      64KB

    • memory/2668-165-0x00000000025D0000-0x00000000025E2000-memory.dmp

      Filesize

      72KB

    • memory/2668-169-0x00000000025D0000-0x00000000025E2000-memory.dmp

      Filesize

      72KB

    • memory/2668-171-0x00000000025D0000-0x00000000025E2000-memory.dmp

      Filesize

      72KB

    • memory/2668-173-0x00000000025D0000-0x00000000025E2000-memory.dmp

      Filesize

      72KB

    • memory/2668-175-0x00000000025D0000-0x00000000025E2000-memory.dmp

      Filesize

      72KB

    • memory/2668-177-0x00000000025D0000-0x00000000025E2000-memory.dmp

      Filesize

      72KB

    • memory/2668-179-0x00000000025D0000-0x00000000025E2000-memory.dmp

      Filesize

      72KB

    • memory/2668-181-0x00000000025D0000-0x00000000025E2000-memory.dmp

      Filesize

      72KB

    • memory/2668-183-0x00000000025D0000-0x00000000025E2000-memory.dmp

      Filesize

      72KB

    • memory/2668-185-0x00000000025D0000-0x00000000025E2000-memory.dmp

      Filesize

      72KB

    • memory/2668-187-0x00000000025D0000-0x00000000025E2000-memory.dmp

      Filesize

      72KB

    • memory/2668-164-0x00000000025D0000-0x00000000025E2000-memory.dmp

      Filesize

      72KB

    • memory/2668-191-0x00000000025D0000-0x00000000025E2000-memory.dmp

      Filesize

      72KB

    • memory/2668-192-0x0000000004E20000-0x0000000004E30000-memory.dmp

      Filesize

      64KB

    • memory/2668-193-0x0000000004E20000-0x0000000004E30000-memory.dmp

      Filesize

      64KB

    • memory/2668-194-0x0000000004E20000-0x0000000004E30000-memory.dmp

      Filesize

      64KB

    • memory/2668-195-0x0000000000400000-0x00000000006C7000-memory.dmp

      Filesize

      2.8MB

    • memory/2668-196-0x0000000004E20000-0x0000000004E30000-memory.dmp

      Filesize

      64KB

    • memory/2668-197-0x0000000004E20000-0x0000000004E30000-memory.dmp

      Filesize

      64KB

    • memory/2668-167-0x00000000025D0000-0x00000000025E2000-memory.dmp

      Filesize

      72KB

    • memory/2668-202-0x0000000000400000-0x00000000006C7000-memory.dmp

      Filesize

      2.8MB

    • memory/2668-162-0x00000000007A0000-0x00000000007CD000-memory.dmp

      Filesize

      180KB

    • memory/2668-163-0x0000000004E30000-0x00000000053D4000-memory.dmp

      Filesize

      5.6MB

    • memory/3384-217-0x000000000BA10000-0x000000000BBD2000-memory.dmp

      Filesize

      1.8MB

    • memory/3384-218-0x000000000C850000-0x000000000CD7C000-memory.dmp

      Filesize

      5.2MB

    • memory/3384-211-0x0000000005330000-0x0000000005340000-memory.dmp

      Filesize

      64KB

    • memory/3384-212-0x0000000005230000-0x000000000526C000-memory.dmp

      Filesize

      240KB

    • memory/3384-213-0x0000000005330000-0x0000000005340000-memory.dmp

      Filesize

      64KB

    • memory/3384-214-0x000000000ADC0000-0x000000000AE36000-memory.dmp

      Filesize

      472KB

    • memory/3384-210-0x000000000A910000-0x000000000A922000-memory.dmp

      Filesize

      72KB

    • memory/3384-215-0x000000000B520000-0x000000000B5B2000-memory.dmp

      Filesize

      584KB

    • memory/3384-209-0x000000000A9E0000-0x000000000AAEA000-memory.dmp

      Filesize

      1.0MB

    • memory/3384-216-0x000000000B480000-0x000000000B4E6000-memory.dmp

      Filesize

      408KB

    • memory/3384-219-0x000000000B960000-0x000000000B9B0000-memory.dmp

      Filesize

      320KB

    • memory/3384-207-0x0000000000A60000-0x0000000000A8E000-memory.dmp

      Filesize

      184KB

    • memory/3384-208-0x000000000AE60000-0x000000000B478000-memory.dmp

      Filesize

      6.1MB

    • memory/4328-254-0x0000000004B60000-0x0000000004B70000-memory.dmp

      Filesize

      64KB

    • memory/4328-253-0x0000000004B60000-0x0000000004B70000-memory.dmp

      Filesize

      64KB

    • memory/4328-252-0x0000000004B60000-0x0000000004B70000-memory.dmp

      Filesize

      64KB