Analysis

  • max time kernel
    145s
  • max time network
    102s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    12/04/2023, 02:41

General

  • Target

    be2405329b549991a2f44fac7c8b2e88221dfb68ba497757d6f036be0f454008.exe

  • Size

    1.1MB

  • MD5

    fbd6af2302e2d8e49835854f13b792e8

  • SHA1

    c36356d10453f8d6d252416aba1561548051931a

  • SHA256

    be2405329b549991a2f44fac7c8b2e88221dfb68ba497757d6f036be0f454008

  • SHA512

    2ffa1e85b9f3a475af952624aadedda4f7edb7c34bade82966339559b4cd94c80ba3fa376a0051bba97d2465f5619a1b61a4a33295c235dd5088fda2f762055e

  • SSDEEP

    24576:qyfliU+pp7CXmmve4BrNg4+bi7gpxsGbfwwLxNBE:xsU+/34pN+bQSAwLHB

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be2405329b549991a2f44fac7c8b2e88221dfb68ba497757d6f036be0f454008.exe
    "C:\Users\Admin\AppData\Local\Temp\be2405329b549991a2f44fac7c8b2e88221dfb68ba497757d6f036be0f454008.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2468
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un121022.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un121022.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2500
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un476714.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un476714.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2984
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr444454.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr444454.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3908
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu313819.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu313819.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3624
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3348
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk713106.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk713106.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:208
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si490457.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si490457.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      PID:2208
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 616
        3⤵
        • Program crash
        PID:2456
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 696
        3⤵
        • Program crash
        PID:2904
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 836
        3⤵
        • Program crash
        PID:5012
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 844
        3⤵
        • Program crash
        PID:5028
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 872
        3⤵
        • Program crash
        PID:3840
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 736
        3⤵
        • Program crash
        PID:4132
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 1116
        3⤵
        • Program crash
        PID:4080
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 1148
        3⤵
        • Program crash
        PID:2356
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 1152
        3⤵
        • Program crash
        PID:3560

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si490457.exe

    Filesize

    246KB

    MD5

    a3c633f7064f2169205d6966b1e7290a

    SHA1

    8fe0a4610d1e9a4e40a92cc1cbb82d48f770da86

    SHA256

    ba9a7b1d6eed5989e2d3cd24f6d896e012c45ea52daae6e99a3c22b824c4148c

    SHA512

    0e35ef7ef4423f9c14c0c92feecd951a27c2b0a41d8371adc5c1780a7ab8f4edd29f61285c4b45935ee0a4975effce03330ba5067ee50d06f263c804823aff7e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si490457.exe

    Filesize

    246KB

    MD5

    a3c633f7064f2169205d6966b1e7290a

    SHA1

    8fe0a4610d1e9a4e40a92cc1cbb82d48f770da86

    SHA256

    ba9a7b1d6eed5989e2d3cd24f6d896e012c45ea52daae6e99a3c22b824c4148c

    SHA512

    0e35ef7ef4423f9c14c0c92feecd951a27c2b0a41d8371adc5c1780a7ab8f4edd29f61285c4b45935ee0a4975effce03330ba5067ee50d06f263c804823aff7e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un121022.exe

    Filesize

    810KB

    MD5

    8050d6650751a99b427a053fd9710f56

    SHA1

    597fe0c2815aa17deb5d4fba63d2ea6ae669eae4

    SHA256

    df87051fd6a1183da35977bb35453a55049b2738f677415d65d8ed7fb0c67b00

    SHA512

    96a499e642ef3906502ddc50108c269297d45ad53e6d39084328280f506a95c080a533bb8c8845e39a2b0edbd214e2b7e22c187479c644bc4705df975f20fd37

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un121022.exe

    Filesize

    810KB

    MD5

    8050d6650751a99b427a053fd9710f56

    SHA1

    597fe0c2815aa17deb5d4fba63d2ea6ae669eae4

    SHA256

    df87051fd6a1183da35977bb35453a55049b2738f677415d65d8ed7fb0c67b00

    SHA512

    96a499e642ef3906502ddc50108c269297d45ad53e6d39084328280f506a95c080a533bb8c8845e39a2b0edbd214e2b7e22c187479c644bc4705df975f20fd37

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk713106.exe

    Filesize

    168KB

    MD5

    c52ebada00a59ec1f651a0e9fbcef2eb

    SHA1

    e1941278df76616f1ca3202ef2a9f99d2592d52f

    SHA256

    35d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e

    SHA512

    6b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk713106.exe

    Filesize

    168KB

    MD5

    c52ebada00a59ec1f651a0e9fbcef2eb

    SHA1

    e1941278df76616f1ca3202ef2a9f99d2592d52f

    SHA256

    35d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e

    SHA512

    6b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un476714.exe

    Filesize

    656KB

    MD5

    6eacccba3bc905e5142d471650366733

    SHA1

    cf3e44d46abfa5c6532ab84499b520e4c533c8cd

    SHA256

    c38207f003b1e8f3422aa4dd7b155a7bbbf86070fc6f6a79dbf544f7136b4164

    SHA512

    007bfc68ebce6b5d02be157f7c1760ded70557e28e0f498bbdbb72ac74cd8b0b0406791bb10b2f14f2f82c0e7017a9240eb36e0828662f18005c06b0fe91e3a1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un476714.exe

    Filesize

    656KB

    MD5

    6eacccba3bc905e5142d471650366733

    SHA1

    cf3e44d46abfa5c6532ab84499b520e4c533c8cd

    SHA256

    c38207f003b1e8f3422aa4dd7b155a7bbbf86070fc6f6a79dbf544f7136b4164

    SHA512

    007bfc68ebce6b5d02be157f7c1760ded70557e28e0f498bbdbb72ac74cd8b0b0406791bb10b2f14f2f82c0e7017a9240eb36e0828662f18005c06b0fe91e3a1

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr444454.exe

    Filesize

    254KB

    MD5

    177276fc3a4e877d0002698daaba05d0

    SHA1

    013401622ccf4b6b299426f09de27798bb199e19

    SHA256

    09fef6731fa7df597df02deeddcd056a2864cf7fd6fefdc719a3443d56c3dc40

    SHA512

    31f7ca0b779549ba494aae492cf17a2fefa82d5751f96540ad1ea8a78012ebb58ac7cd2821f57be5222d0509102d094b4c47998217c51f248278af8458ad3fbf

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr444454.exe

    Filesize

    254KB

    MD5

    177276fc3a4e877d0002698daaba05d0

    SHA1

    013401622ccf4b6b299426f09de27798bb199e19

    SHA256

    09fef6731fa7df597df02deeddcd056a2864cf7fd6fefdc719a3443d56c3dc40

    SHA512

    31f7ca0b779549ba494aae492cf17a2fefa82d5751f96540ad1ea8a78012ebb58ac7cd2821f57be5222d0509102d094b4c47998217c51f248278af8458ad3fbf

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu313819.exe

    Filesize

    438KB

    MD5

    3d47213f9d11d1e625fa298cb3ef87ed

    SHA1

    3201ecfdb38395ddbd264e9577dc933a97338014

    SHA256

    41e5a51fcbc602bb5c4d5c892ee95a2d5a4ee9c52f70224ad65819f3078494b6

    SHA512

    78618f588f7f31965101075b547a466e4c8f906404a1f7aac48003d33c1704bcd8504b338a71242ad991f102a4097a822509c43acdd19b1840d0f597485fb0cd

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu313819.exe

    Filesize

    438KB

    MD5

    3d47213f9d11d1e625fa298cb3ef87ed

    SHA1

    3201ecfdb38395ddbd264e9577dc933a97338014

    SHA256

    41e5a51fcbc602bb5c4d5c892ee95a2d5a4ee9c52f70224ad65819f3078494b6

    SHA512

    78618f588f7f31965101075b547a466e4c8f906404a1f7aac48003d33c1704bcd8504b338a71242ad991f102a4097a822509c43acdd19b1840d0f597485fb0cd

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • memory/208-2356-0x000000000AD20000-0x000000000AD96000-memory.dmp

    Filesize

    472KB

  • memory/208-2357-0x000000000AE40000-0x000000000AED2000-memory.dmp

    Filesize

    584KB

  • memory/208-2355-0x00000000054C0000-0x00000000054D0000-memory.dmp

    Filesize

    64KB

  • memory/208-2363-0x00000000054C0000-0x00000000054D0000-memory.dmp

    Filesize

    64KB

  • memory/208-2347-0x0000000000C70000-0x0000000000CA0000-memory.dmp

    Filesize

    192KB

  • memory/208-2352-0x000000000AA00000-0x000000000AA3E000-memory.dmp

    Filesize

    248KB

  • memory/208-2348-0x0000000001380000-0x0000000001386000-memory.dmp

    Filesize

    24KB

  • memory/208-2350-0x000000000AA70000-0x000000000AB7A000-memory.dmp

    Filesize

    1.0MB

  • memory/2208-2370-0x0000000000580000-0x00000000005BB000-memory.dmp

    Filesize

    236KB

  • memory/3348-2349-0x0000000005040000-0x0000000005646000-memory.dmp

    Filesize

    6.0MB

  • memory/3348-2351-0x0000000004940000-0x0000000004952000-memory.dmp

    Filesize

    72KB

  • memory/3348-2359-0x00000000059E0000-0x0000000005A30000-memory.dmp

    Filesize

    320KB

  • memory/3348-2353-0x0000000004A30000-0x0000000004A7B000-memory.dmp

    Filesize

    300KB

  • memory/3348-2346-0x0000000002200000-0x0000000002206000-memory.dmp

    Filesize

    24KB

  • memory/3348-2360-0x0000000005E30000-0x0000000005FF2000-memory.dmp

    Filesize

    1.8MB

  • memory/3348-2342-0x0000000000040000-0x000000000006E000-memory.dmp

    Filesize

    184KB

  • memory/3348-2361-0x0000000006DB0000-0x00000000072DC000-memory.dmp

    Filesize

    5.2MB

  • memory/3348-2362-0x0000000004A20000-0x0000000004A30000-memory.dmp

    Filesize

    64KB

  • memory/3348-2354-0x0000000004A20000-0x0000000004A30000-memory.dmp

    Filesize

    64KB

  • memory/3348-2358-0x0000000004F90000-0x0000000004FF6000-memory.dmp

    Filesize

    408KB

  • memory/3624-200-0x0000000005100000-0x0000000005160000-memory.dmp

    Filesize

    384KB

  • memory/3624-188-0x0000000005100000-0x0000000005166000-memory.dmp

    Filesize

    408KB

  • memory/3624-189-0x0000000005100000-0x0000000005160000-memory.dmp

    Filesize

    384KB

  • memory/3624-190-0x0000000005100000-0x0000000005160000-memory.dmp

    Filesize

    384KB

  • memory/3624-192-0x0000000005100000-0x0000000005160000-memory.dmp

    Filesize

    384KB

  • memory/3624-194-0x0000000005100000-0x0000000005160000-memory.dmp

    Filesize

    384KB

  • memory/3624-196-0x0000000005100000-0x0000000005160000-memory.dmp

    Filesize

    384KB

  • memory/3624-198-0x0000000005100000-0x0000000005160000-memory.dmp

    Filesize

    384KB

  • memory/3624-186-0x00000000006F0000-0x000000000074B000-memory.dmp

    Filesize

    364KB

  • memory/3624-202-0x0000000005100000-0x0000000005160000-memory.dmp

    Filesize

    384KB

  • memory/3624-204-0x0000000005100000-0x0000000005160000-memory.dmp

    Filesize

    384KB

  • memory/3624-206-0x0000000005100000-0x0000000005160000-memory.dmp

    Filesize

    384KB

  • memory/3624-208-0x0000000005100000-0x0000000005160000-memory.dmp

    Filesize

    384KB

  • memory/3624-210-0x0000000005100000-0x0000000005160000-memory.dmp

    Filesize

    384KB

  • memory/3624-212-0x0000000005100000-0x0000000005160000-memory.dmp

    Filesize

    384KB

  • memory/3624-214-0x0000000005100000-0x0000000005160000-memory.dmp

    Filesize

    384KB

  • memory/3624-216-0x0000000005100000-0x0000000005160000-memory.dmp

    Filesize

    384KB

  • memory/3624-218-0x0000000005100000-0x0000000005160000-memory.dmp

    Filesize

    384KB

  • memory/3624-220-0x0000000005100000-0x0000000005160000-memory.dmp

    Filesize

    384KB

  • memory/3624-222-0x0000000005100000-0x0000000005160000-memory.dmp

    Filesize

    384KB

  • memory/3624-305-0x00000000026A0000-0x00000000026B0000-memory.dmp

    Filesize

    64KB

  • memory/3624-308-0x00000000026A0000-0x00000000026B0000-memory.dmp

    Filesize

    64KB

  • memory/3624-310-0x00000000026A0000-0x00000000026B0000-memory.dmp

    Filesize

    64KB

  • memory/3624-2334-0x00000000052D0000-0x0000000005302000-memory.dmp

    Filesize

    200KB

  • memory/3624-187-0x0000000002600000-0x0000000002668000-memory.dmp

    Filesize

    416KB

  • memory/3908-181-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/3908-179-0x0000000002340000-0x0000000002350000-memory.dmp

    Filesize

    64KB

  • memory/3908-178-0x0000000002340000-0x0000000002350000-memory.dmp

    Filesize

    64KB

  • memory/3908-177-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/3908-174-0x0000000002390000-0x00000000023A2000-memory.dmp

    Filesize

    72KB

  • memory/3908-176-0x0000000002390000-0x00000000023A2000-memory.dmp

    Filesize

    72KB

  • memory/3908-170-0x0000000002390000-0x00000000023A2000-memory.dmp

    Filesize

    72KB

  • memory/3908-172-0x0000000002390000-0x00000000023A2000-memory.dmp

    Filesize

    72KB

  • memory/3908-156-0x0000000002390000-0x00000000023A2000-memory.dmp

    Filesize

    72KB

  • memory/3908-162-0x0000000002390000-0x00000000023A2000-memory.dmp

    Filesize

    72KB

  • memory/3908-164-0x0000000002390000-0x00000000023A2000-memory.dmp

    Filesize

    72KB

  • memory/3908-168-0x0000000002390000-0x00000000023A2000-memory.dmp

    Filesize

    72KB

  • memory/3908-166-0x0000000002390000-0x00000000023A2000-memory.dmp

    Filesize

    72KB

  • memory/3908-158-0x0000000002390000-0x00000000023A2000-memory.dmp

    Filesize

    72KB

  • memory/3908-160-0x0000000002390000-0x00000000023A2000-memory.dmp

    Filesize

    72KB

  • memory/3908-152-0x0000000002390000-0x00000000023A2000-memory.dmp

    Filesize

    72KB

  • memory/3908-154-0x0000000002390000-0x00000000023A2000-memory.dmp

    Filesize

    72KB

  • memory/3908-149-0x0000000002390000-0x00000000023A2000-memory.dmp

    Filesize

    72KB

  • memory/3908-150-0x0000000002390000-0x00000000023A2000-memory.dmp

    Filesize

    72KB

  • memory/3908-148-0x0000000002340000-0x0000000002350000-memory.dmp

    Filesize

    64KB

  • memory/3908-147-0x0000000002340000-0x0000000002350000-memory.dmp

    Filesize

    64KB

  • memory/3908-146-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/3908-145-0x0000000002390000-0x00000000023A8000-memory.dmp

    Filesize

    96KB

  • memory/3908-144-0x0000000004A40000-0x0000000004F3E000-memory.dmp

    Filesize

    5.0MB

  • memory/3908-143-0x0000000001FE0000-0x0000000001FFA000-memory.dmp

    Filesize

    104KB