Analysis

  • max time kernel
    145s
  • max time network
    103s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    12/04/2023, 03:03

General

  • Target

    830d393b1cc88f8b5ddc23d2937950b0a5dc56553379388aad709ea862005196.exe

  • Size

    1.1MB

  • MD5

    73c418dc3bcb9f7fc939cb9fd21e5709

  • SHA1

    103e37e60ffc0fc2bcdbb37190444fa228883e82

  • SHA256

    830d393b1cc88f8b5ddc23d2937950b0a5dc56553379388aad709ea862005196

  • SHA512

    7dcc16501a31c8c563c44c48f36817d5d5e600a612bbae1091a85ff5a47f44a58eb963520d85f8c725ef0bb463d47f683a28cd9d7b04b3855c8304b024eb6593

  • SSDEEP

    12288:2MrTy90mQMOyTYuuZzIqVmqHrIJY/JEAUwM1YBH573tv5mKgrhLAq5cElIpV32a1:VyMuuVVhrIJY/JEVf2Hxzmd2XhyWPPP

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\830d393b1cc88f8b5ddc23d2937950b0a5dc56553379388aad709ea862005196.exe
    "C:\Users\Admin\AppData\Local\Temp\830d393b1cc88f8b5ddc23d2937950b0a5dc56553379388aad709ea862005196.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1224
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un983110.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un983110.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1500
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un877930.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un877930.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1784
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr595428.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr595428.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1072
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu662571.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu662571.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4736
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3044
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk833259.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk833259.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3308
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si782318.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si782318.exe
      2⤵
      • Executes dropped EXE
      PID:976
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 976 -s 616
        3⤵
        • Program crash
        PID:4084
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 976 -s 696
        3⤵
        • Program crash
        PID:4396
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 976 -s 836
        3⤵
        • Program crash
        PID:4652
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 976 -s 844
        3⤵
        • Program crash
        PID:4148
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 976 -s 872
        3⤵
        • Program crash
        PID:2088
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 976 -s 836
        3⤵
        • Program crash
        PID:2760
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 976 -s 1116
        3⤵
        • Program crash
        PID:4784
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 976 -s 1152
        3⤵
        • Program crash
        PID:2228
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 976 -s 1156
        3⤵
        • Program crash
        PID:2976

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si782318.exe

    Filesize

    246KB

    MD5

    a3c633f7064f2169205d6966b1e7290a

    SHA1

    8fe0a4610d1e9a4e40a92cc1cbb82d48f770da86

    SHA256

    ba9a7b1d6eed5989e2d3cd24f6d896e012c45ea52daae6e99a3c22b824c4148c

    SHA512

    0e35ef7ef4423f9c14c0c92feecd951a27c2b0a41d8371adc5c1780a7ab8f4edd29f61285c4b45935ee0a4975effce03330ba5067ee50d06f263c804823aff7e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si782318.exe

    Filesize

    246KB

    MD5

    a3c633f7064f2169205d6966b1e7290a

    SHA1

    8fe0a4610d1e9a4e40a92cc1cbb82d48f770da86

    SHA256

    ba9a7b1d6eed5989e2d3cd24f6d896e012c45ea52daae6e99a3c22b824c4148c

    SHA512

    0e35ef7ef4423f9c14c0c92feecd951a27c2b0a41d8371adc5c1780a7ab8f4edd29f61285c4b45935ee0a4975effce03330ba5067ee50d06f263c804823aff7e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un983110.exe

    Filesize

    810KB

    MD5

    4bfb78718a036d858fdf2d527ea8c8e6

    SHA1

    1a4167397ba8714bf7892216f70eff97a1bd89ad

    SHA256

    921466a49eceb63fab743e104357de25a715b3c850738083538b49d94f7a9253

    SHA512

    a78ff0d270468f510f3d55a81ba1265f503dbab4f2e974cdf54f7ec8f8490c50bd105d8a5d9b5068ca646950b29916b23f6c82c1c5c919eb667f854b1e5f51a3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un983110.exe

    Filesize

    810KB

    MD5

    4bfb78718a036d858fdf2d527ea8c8e6

    SHA1

    1a4167397ba8714bf7892216f70eff97a1bd89ad

    SHA256

    921466a49eceb63fab743e104357de25a715b3c850738083538b49d94f7a9253

    SHA512

    a78ff0d270468f510f3d55a81ba1265f503dbab4f2e974cdf54f7ec8f8490c50bd105d8a5d9b5068ca646950b29916b23f6c82c1c5c919eb667f854b1e5f51a3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk833259.exe

    Filesize

    168KB

    MD5

    c52ebada00a59ec1f651a0e9fbcef2eb

    SHA1

    e1941278df76616f1ca3202ef2a9f99d2592d52f

    SHA256

    35d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e

    SHA512

    6b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk833259.exe

    Filesize

    168KB

    MD5

    c52ebada00a59ec1f651a0e9fbcef2eb

    SHA1

    e1941278df76616f1ca3202ef2a9f99d2592d52f

    SHA256

    35d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e

    SHA512

    6b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un877930.exe

    Filesize

    655KB

    MD5

    1d67ff50adb151a2a1a1ef094981a19a

    SHA1

    4e95e1a3be2719ed6f730f55e2ad6b53621c3539

    SHA256

    45a1f19b580148fbefcd2106cc9abf47ecd2882739c478bc8fb64a271d5a8b4a

    SHA512

    4a3c8a86d1979914f7378830fa3b852c8d96ef8e6bcb64f225dfd6d5ee7ae5568eddf2940a83420beabbe21312a67062325845e82f8d38a2f342cbded341f3f7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un877930.exe

    Filesize

    655KB

    MD5

    1d67ff50adb151a2a1a1ef094981a19a

    SHA1

    4e95e1a3be2719ed6f730f55e2ad6b53621c3539

    SHA256

    45a1f19b580148fbefcd2106cc9abf47ecd2882739c478bc8fb64a271d5a8b4a

    SHA512

    4a3c8a86d1979914f7378830fa3b852c8d96ef8e6bcb64f225dfd6d5ee7ae5568eddf2940a83420beabbe21312a67062325845e82f8d38a2f342cbded341f3f7

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr595428.exe

    Filesize

    254KB

    MD5

    f74f62f06dfd2721b302d89635d335a4

    SHA1

    6a14a46f9db3abf4d7a11d204811e4690bb9afa1

    SHA256

    656f5792fba13a1b6e0424a705ea08ec1ae7d5ec7e8e5881691144d22e1478dd

    SHA512

    95fc78908b0a2307862190080fc20590cff563cb9e8d660e03eb21a840df1424eb0f80e12f24071bd154da2c682bcbb265ebf531188f410b1e95fe4214284a8f

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr595428.exe

    Filesize

    254KB

    MD5

    f74f62f06dfd2721b302d89635d335a4

    SHA1

    6a14a46f9db3abf4d7a11d204811e4690bb9afa1

    SHA256

    656f5792fba13a1b6e0424a705ea08ec1ae7d5ec7e8e5881691144d22e1478dd

    SHA512

    95fc78908b0a2307862190080fc20590cff563cb9e8d660e03eb21a840df1424eb0f80e12f24071bd154da2c682bcbb265ebf531188f410b1e95fe4214284a8f

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu662571.exe

    Filesize

    438KB

    MD5

    99b588bc2c2ab6bbd87d9c7ccc40e095

    SHA1

    d32f724163cb383a08f66c904032602465400376

    SHA256

    e55514c543c880faf6ac9b59f6af997fd8f05252eb70269dc0dca26abfce5d2c

    SHA512

    7b4b7e1c3aac46a1269f4866eb935f96bc0fdfb28d3163c76ea9e599da08811d6b828ddab7681ea2d2090deba3ecce1c9352a98fda0e17d50fbbe6f8380c6df0

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu662571.exe

    Filesize

    438KB

    MD5

    99b588bc2c2ab6bbd87d9c7ccc40e095

    SHA1

    d32f724163cb383a08f66c904032602465400376

    SHA256

    e55514c543c880faf6ac9b59f6af997fd8f05252eb70269dc0dca26abfce5d2c

    SHA512

    7b4b7e1c3aac46a1269f4866eb935f96bc0fdfb28d3163c76ea9e599da08811d6b828ddab7681ea2d2090deba3ecce1c9352a98fda0e17d50fbbe6f8380c6df0

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • memory/976-2370-0x0000000000580000-0x00000000005BB000-memory.dmp

    Filesize

    236KB

  • memory/1072-165-0x00000000049D0000-0x00000000049E2000-memory.dmp

    Filesize

    72KB

  • memory/1072-178-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1072-159-0x00000000049D0000-0x00000000049E2000-memory.dmp

    Filesize

    72KB

  • memory/1072-161-0x00000000049D0000-0x00000000049E2000-memory.dmp

    Filesize

    72KB

  • memory/1072-163-0x00000000049D0000-0x00000000049E2000-memory.dmp

    Filesize

    72KB

  • memory/1072-155-0x00000000049D0000-0x00000000049E2000-memory.dmp

    Filesize

    72KB

  • memory/1072-167-0x00000000049D0000-0x00000000049E2000-memory.dmp

    Filesize

    72KB

  • memory/1072-173-0x00000000049D0000-0x00000000049E2000-memory.dmp

    Filesize

    72KB

  • memory/1072-171-0x00000000049D0000-0x00000000049E2000-memory.dmp

    Filesize

    72KB

  • memory/1072-169-0x00000000049D0000-0x00000000049E2000-memory.dmp

    Filesize

    72KB

  • memory/1072-175-0x00000000049D0000-0x00000000049E2000-memory.dmp

    Filesize

    72KB

  • memory/1072-176-0x0000000004A60000-0x0000000004A70000-memory.dmp

    Filesize

    64KB

  • memory/1072-177-0x0000000004A60000-0x0000000004A70000-memory.dmp

    Filesize

    64KB

  • memory/1072-157-0x00000000049D0000-0x00000000049E2000-memory.dmp

    Filesize

    72KB

  • memory/1072-179-0x0000000004A60000-0x0000000004A70000-memory.dmp

    Filesize

    64KB

  • memory/1072-181-0x0000000000400000-0x00000000004AF000-memory.dmp

    Filesize

    700KB

  • memory/1072-153-0x00000000049D0000-0x00000000049E2000-memory.dmp

    Filesize

    72KB

  • memory/1072-151-0x00000000049D0000-0x00000000049E2000-memory.dmp

    Filesize

    72KB

  • memory/1072-149-0x00000000049D0000-0x00000000049E2000-memory.dmp

    Filesize

    72KB

  • memory/1072-148-0x00000000049D0000-0x00000000049E2000-memory.dmp

    Filesize

    72KB

  • memory/1072-147-0x00000000049D0000-0x00000000049E8000-memory.dmp

    Filesize

    96KB

  • memory/1072-146-0x0000000004A70000-0x0000000004F6E000-memory.dmp

    Filesize

    5.0MB

  • memory/1072-145-0x0000000004A60000-0x0000000004A70000-memory.dmp

    Filesize

    64KB

  • memory/1072-144-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/1072-143-0x0000000004950000-0x000000000496A000-memory.dmp

    Filesize

    104KB

  • memory/3044-2346-0x0000000000AC0000-0x0000000000AC6000-memory.dmp

    Filesize

    24KB

  • memory/3044-2354-0x0000000004A50000-0x0000000004A60000-memory.dmp

    Filesize

    64KB

  • memory/3044-2349-0x0000000005170000-0x0000000005776000-memory.dmp

    Filesize

    6.0MB

  • memory/3044-2362-0x0000000004A50000-0x0000000004A60000-memory.dmp

    Filesize

    64KB

  • memory/3044-2351-0x0000000004B60000-0x0000000004B72000-memory.dmp

    Filesize

    72KB

  • memory/3044-2342-0x0000000000230000-0x000000000025E000-memory.dmp

    Filesize

    184KB

  • memory/3044-2352-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

    Filesize

    248KB

  • memory/3308-2360-0x000000000C210000-0x000000000C3D2000-memory.dmp

    Filesize

    1.8MB

  • memory/3308-2357-0x000000000ADC0000-0x000000000AE52000-memory.dmp

    Filesize

    584KB

  • memory/3308-2356-0x000000000ACA0000-0x000000000AD16000-memory.dmp

    Filesize

    472KB

  • memory/3308-2355-0x0000000002E20000-0x0000000002E30000-memory.dmp

    Filesize

    64KB

  • memory/3308-2358-0x000000000AE60000-0x000000000AEC6000-memory.dmp

    Filesize

    408KB

  • memory/3308-2353-0x000000000A9C0000-0x000000000AA0B000-memory.dmp

    Filesize

    300KB

  • memory/3308-2359-0x000000000B690000-0x000000000B6E0000-memory.dmp

    Filesize

    320KB

  • memory/3308-2361-0x000000000C910000-0x000000000CE3C000-memory.dmp

    Filesize

    5.2MB

  • memory/3308-2350-0x000000000AA30000-0x000000000AB3A000-memory.dmp

    Filesize

    1.0MB

  • memory/3308-2363-0x0000000002E20000-0x0000000002E30000-memory.dmp

    Filesize

    64KB

  • memory/3308-2348-0x0000000001540000-0x0000000001546000-memory.dmp

    Filesize

    24KB

  • memory/3308-2347-0x0000000000BF0000-0x0000000000C20000-memory.dmp

    Filesize

    192KB

  • memory/4736-219-0x00000000050E0000-0x0000000005140000-memory.dmp

    Filesize

    384KB

  • memory/4736-217-0x00000000050E0000-0x0000000005140000-memory.dmp

    Filesize

    384KB

  • memory/4736-193-0x00000000050E0000-0x0000000005140000-memory.dmp

    Filesize

    384KB

  • memory/4736-191-0x00000000050E0000-0x0000000005140000-memory.dmp

    Filesize

    384KB

  • memory/4736-189-0x00000000050E0000-0x0000000005140000-memory.dmp

    Filesize

    384KB

  • memory/4736-197-0x00000000050E0000-0x0000000005140000-memory.dmp

    Filesize

    384KB

  • memory/4736-2334-0x00000000052D0000-0x0000000005302000-memory.dmp

    Filesize

    200KB

  • memory/4736-225-0x00000000050E0000-0x0000000005140000-memory.dmp

    Filesize

    384KB

  • memory/4736-211-0x00000000050E0000-0x0000000005140000-memory.dmp

    Filesize

    384KB

  • memory/4736-223-0x00000000050E0000-0x0000000005140000-memory.dmp

    Filesize

    384KB

  • memory/4736-215-0x00000000050E0000-0x0000000005140000-memory.dmp

    Filesize

    384KB

  • memory/4736-221-0x00000000050E0000-0x0000000005140000-memory.dmp

    Filesize

    384KB

  • memory/4736-199-0x00000000050E0000-0x0000000005140000-memory.dmp

    Filesize

    384KB

  • memory/4736-195-0x00000000050E0000-0x0000000005140000-memory.dmp

    Filesize

    384KB

  • memory/4736-214-0x0000000004B90000-0x0000000004BA0000-memory.dmp

    Filesize

    64KB

  • memory/4736-212-0x0000000004B90000-0x0000000004BA0000-memory.dmp

    Filesize

    64KB

  • memory/4736-207-0x0000000001E70000-0x0000000001ECB000-memory.dmp

    Filesize

    364KB

  • memory/4736-208-0x00000000050E0000-0x0000000005140000-memory.dmp

    Filesize

    384KB

  • memory/4736-209-0x0000000004B90000-0x0000000004BA0000-memory.dmp

    Filesize

    64KB

  • memory/4736-205-0x00000000050E0000-0x0000000005140000-memory.dmp

    Filesize

    384KB

  • memory/4736-203-0x00000000050E0000-0x0000000005140000-memory.dmp

    Filesize

    384KB

  • memory/4736-201-0x00000000050E0000-0x0000000005140000-memory.dmp

    Filesize

    384KB

  • memory/4736-188-0x00000000050E0000-0x0000000005140000-memory.dmp

    Filesize

    384KB

  • memory/4736-187-0x00000000050E0000-0x0000000005146000-memory.dmp

    Filesize

    408KB

  • memory/4736-186-0x0000000004B00000-0x0000000004B68000-memory.dmp

    Filesize

    416KB