Analysis

  • max time kernel
    142s
  • max time network
    109s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13/04/2023, 07:22

General

  • Target

    1e9a515fef1dd644f7ed8ac33346c502cd7b8c6dfc27377ea8dbea37ca791603.exe

  • Size

    1.1MB

  • MD5

    d61cc9e46758eb1d393c21e750824da4

  • SHA1

    293a7007466e790aeb968f141d68833472e80d79

  • SHA256

    1e9a515fef1dd644f7ed8ac33346c502cd7b8c6dfc27377ea8dbea37ca791603

  • SHA512

    3c149e68b0237a46c013a7cb3ba8edee07cb75527b3344b22d553b195b8082c7309d647d29e2fbf588d6e7b47e8294dd797ae86fcfa7bbf8040335140d0febf0

  • SSDEEP

    24576:uyzcfJ3P9cueWSsCtedM8OqbDjisyryvg5105:9qJVGWfCtD8HbDOT0

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diro

C2

185.161.248.90:4125

Attributes
  • auth_value

    ae95bda0dd2e95169886a3a68138568b

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1e9a515fef1dd644f7ed8ac33346c502cd7b8c6dfc27377ea8dbea37ca791603.exe
    "C:\Users\Admin\AppData\Local\Temp\1e9a515fef1dd644f7ed8ac33346c502cd7b8c6dfc27377ea8dbea37ca791603.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un345220.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un345220.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2016
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un988089.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un988089.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2440
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr484820.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr484820.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2524
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu619189.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu619189.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3988
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:648
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk515770.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk515770.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3320
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si123270.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si123270.exe
      2⤵
      • Executes dropped EXE
      PID:2936
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 616
        3⤵
        • Program crash
        PID:4036
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 696
        3⤵
        • Program crash
        PID:4308
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 768
        3⤵
        • Program crash
        PID:1452
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 844
        3⤵
        • Program crash
        PID:2900
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 872
        3⤵
        • Program crash
        PID:4660
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 888
        3⤵
        • Program crash
        PID:1284
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 1120
        3⤵
        • Program crash
        PID:2712
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 1152
        3⤵
        • Program crash
        PID:4708
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 1032
        3⤵
        • Program crash
        PID:3960

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si123270.exe

          Filesize

          253KB

          MD5

          d7d27cec03a99717cceaa9a2303cf106

          SHA1

          1ef9e888e19bf0315036e31deb80e53e0dbaa54b

          SHA256

          245f5a47c956e169777b0de250c214d650248d895d73637b94412c95825f2260

          SHA512

          edf2dd3a89b9e4c476a021ec648ed3dc7d5b9b6ae24702b73cc2d1ac824332e8954c03257028bb2a4c41d40bf5b27115ec84d8084329356c38b38737b79b0932

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si123270.exe

          Filesize

          253KB

          MD5

          d7d27cec03a99717cceaa9a2303cf106

          SHA1

          1ef9e888e19bf0315036e31deb80e53e0dbaa54b

          SHA256

          245f5a47c956e169777b0de250c214d650248d895d73637b94412c95825f2260

          SHA512

          edf2dd3a89b9e4c476a021ec648ed3dc7d5b9b6ae24702b73cc2d1ac824332e8954c03257028bb2a4c41d40bf5b27115ec84d8084329356c38b38737b79b0932

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un345220.exe

          Filesize

          808KB

          MD5

          0b063530d752fb7b4b8ad6e92d71a5c2

          SHA1

          a043dbaec138259ed79cad2bab3223c900b73ca5

          SHA256

          4b46b7a394a6f8b201deb32c8574a66c7879fa811761a7939e106753ca611486

          SHA512

          51e39b55e97ba149d15726383fe9d2fb9c393cfd35ac32b670e6eeba50cfc4f4b6bcc95f44fa90696ac11d80f60d0859560abb675d43ab3a85c2f470f565fec3

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un345220.exe

          Filesize

          808KB

          MD5

          0b063530d752fb7b4b8ad6e92d71a5c2

          SHA1

          a043dbaec138259ed79cad2bab3223c900b73ca5

          SHA256

          4b46b7a394a6f8b201deb32c8574a66c7879fa811761a7939e106753ca611486

          SHA512

          51e39b55e97ba149d15726383fe9d2fb9c393cfd35ac32b670e6eeba50cfc4f4b6bcc95f44fa90696ac11d80f60d0859560abb675d43ab3a85c2f470f565fec3

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk515770.exe

          Filesize

          168KB

          MD5

          aa8bb998c46f60bacf91f98f8d4d7b5c

          SHA1

          61c7e314d916035128849f85a29b34ac1fb482e0

          SHA256

          7e0252d52b7ff9e4466411941eb98cc220824be0f2eefdfe38e6b494f1176131

          SHA512

          3e1e8400351fbeedbb0f07370260dea23782c24924482d33c54f9db9659c858c2ee89f69b9a8256b091efec0ea33b09e408e0d218769ca3e2cbd013dd935dde7

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk515770.exe

          Filesize

          168KB

          MD5

          aa8bb998c46f60bacf91f98f8d4d7b5c

          SHA1

          61c7e314d916035128849f85a29b34ac1fb482e0

          SHA256

          7e0252d52b7ff9e4466411941eb98cc220824be0f2eefdfe38e6b494f1176131

          SHA512

          3e1e8400351fbeedbb0f07370260dea23782c24924482d33c54f9db9659c858c2ee89f69b9a8256b091efec0ea33b09e408e0d218769ca3e2cbd013dd935dde7

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un988089.exe

          Filesize

          654KB

          MD5

          536089b4d2c3ed6992e7f5ca40f08c19

          SHA1

          2dd0bed513e7128becc75a4d91217b2a472c5e2f

          SHA256

          4bd8729433eecd78431b6b108685fba2fd366040ed91dd102473ffe0fecb2416

          SHA512

          7c658c3d42164c83a3192209ed75ba1d7c48c26c815e56a84a126b07c67ede4003ea2f1b8329129c336ba27977e0bead84850deba1c3146dd3b8f66cab941b39

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un988089.exe

          Filesize

          654KB

          MD5

          536089b4d2c3ed6992e7f5ca40f08c19

          SHA1

          2dd0bed513e7128becc75a4d91217b2a472c5e2f

          SHA256

          4bd8729433eecd78431b6b108685fba2fd366040ed91dd102473ffe0fecb2416

          SHA512

          7c658c3d42164c83a3192209ed75ba1d7c48c26c815e56a84a126b07c67ede4003ea2f1b8329129c336ba27977e0bead84850deba1c3146dd3b8f66cab941b39

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr484820.exe

          Filesize

          262KB

          MD5

          1ff366c17fe36ba57005653add861d00

          SHA1

          3d6424ab0625447b3b08ba0fe7075d635bcab94d

          SHA256

          fbf02eb5807cd8d6bcfea389770a1354b36ba78d679cb56ba38681e2c0b13e9c

          SHA512

          c165fac69d74c72ed7bd07fba0fbbd2990055e7ad868f987ffad5af11a594f326fd2e5fbc06f92cc33d18a52dadd5fe8547d8ebeb3ef70abab61382e152711d0

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr484820.exe

          Filesize

          262KB

          MD5

          1ff366c17fe36ba57005653add861d00

          SHA1

          3d6424ab0625447b3b08ba0fe7075d635bcab94d

          SHA256

          fbf02eb5807cd8d6bcfea389770a1354b36ba78d679cb56ba38681e2c0b13e9c

          SHA512

          c165fac69d74c72ed7bd07fba0fbbd2990055e7ad868f987ffad5af11a594f326fd2e5fbc06f92cc33d18a52dadd5fe8547d8ebeb3ef70abab61382e152711d0

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu619189.exe

          Filesize

          445KB

          MD5

          761e7bb299d220fb2470aa9f70b6f81e

          SHA1

          ec79f387da5f5866a8b421f30073c2c7cc6f1f4f

          SHA256

          1f007730d7fc752c0982237c8065b2986cbc795bb7a3446d0017837875600d4c

          SHA512

          d25174d4c15bf5eacaa39fa106f48cb53f77a0bb606eba5f6b616c639ac678cc5ca22f4203bce66c57ea24ac7db7a9760dfc3f11f0ecebbb1450073ca8895d69

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu619189.exe

          Filesize

          445KB

          MD5

          761e7bb299d220fb2470aa9f70b6f81e

          SHA1

          ec79f387da5f5866a8b421f30073c2c7cc6f1f4f

          SHA256

          1f007730d7fc752c0982237c8065b2986cbc795bb7a3446d0017837875600d4c

          SHA512

          d25174d4c15bf5eacaa39fa106f48cb53f77a0bb606eba5f6b616c639ac678cc5ca22f4203bce66c57ea24ac7db7a9760dfc3f11f0ecebbb1450073ca8895d69

        • C:\Windows\Temp\1.exe

          Filesize

          168KB

          MD5

          03728fed675bcde5256342183b1d6f27

          SHA1

          d13eace7d3d92f93756504b274777cc269b222a2

          SHA256

          f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

          SHA512

          6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

        • C:\Windows\Temp\1.exe

          Filesize

          168KB

          MD5

          03728fed675bcde5256342183b1d6f27

          SHA1

          d13eace7d3d92f93756504b274777cc269b222a2

          SHA256

          f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

          SHA512

          6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

        • memory/648-2354-0x00000000028E0000-0x00000000028F0000-memory.dmp

          Filesize

          64KB

        • memory/648-2360-0x00000000028E0000-0x00000000028F0000-memory.dmp

          Filesize

          64KB

        • memory/648-2361-0x000000000BEB0000-0x000000000C072000-memory.dmp

          Filesize

          1.8MB

        • memory/648-2342-0x0000000002810000-0x0000000002816000-memory.dmp

          Filesize

          24KB

        • memory/648-2340-0x00000000007E0000-0x000000000080E000-memory.dmp

          Filesize

          184KB

        • memory/648-2351-0x000000000A570000-0x000000000A5AE000-memory.dmp

          Filesize

          248KB

        • memory/648-2358-0x000000000B570000-0x000000000B5C0000-memory.dmp

          Filesize

          320KB

        • memory/648-2355-0x000000000A890000-0x000000000A906000-memory.dmp

          Filesize

          472KB

        • memory/648-2357-0x000000000A910000-0x000000000A976000-memory.dmp

          Filesize

          408KB

        • memory/2524-164-0x00000000023E0000-0x00000000023F2000-memory.dmp

          Filesize

          72KB

        • memory/2524-144-0x0000000002400000-0x0000000002410000-memory.dmp

          Filesize

          64KB

        • memory/2524-170-0x00000000023E0000-0x00000000023F2000-memory.dmp

          Filesize

          72KB

        • memory/2524-172-0x00000000023E0000-0x00000000023F2000-memory.dmp

          Filesize

          72KB

        • memory/2524-174-0x00000000023E0000-0x00000000023F2000-memory.dmp

          Filesize

          72KB

        • memory/2524-175-0x0000000000400000-0x00000000004B1000-memory.dmp

          Filesize

          708KB

        • memory/2524-176-0x0000000002400000-0x0000000002410000-memory.dmp

          Filesize

          64KB

        • memory/2524-177-0x0000000002400000-0x0000000002410000-memory.dmp

          Filesize

          64KB

        • memory/2524-179-0x0000000000400000-0x00000000004B1000-memory.dmp

          Filesize

          708KB

        • memory/2524-166-0x00000000023E0000-0x00000000023F2000-memory.dmp

          Filesize

          72KB

        • memory/2524-162-0x00000000023E0000-0x00000000023F2000-memory.dmp

          Filesize

          72KB

        • memory/2524-160-0x00000000023E0000-0x00000000023F2000-memory.dmp

          Filesize

          72KB

        • memory/2524-140-0x00000000001D0000-0x00000000001FD000-memory.dmp

          Filesize

          180KB

        • memory/2524-141-0x00000000007D0000-0x00000000007EA000-memory.dmp

          Filesize

          104KB

        • memory/2524-156-0x00000000023E0000-0x00000000023F2000-memory.dmp

          Filesize

          72KB

        • memory/2524-142-0x0000000004A70000-0x0000000004F6E000-memory.dmp

          Filesize

          5.0MB

        • memory/2524-168-0x00000000023E0000-0x00000000023F2000-memory.dmp

          Filesize

          72KB

        • memory/2524-143-0x0000000002400000-0x0000000002410000-memory.dmp

          Filesize

          64KB

        • memory/2524-154-0x00000000023E0000-0x00000000023F2000-memory.dmp

          Filesize

          72KB

        • memory/2524-158-0x00000000023E0000-0x00000000023F2000-memory.dmp

          Filesize

          72KB

        • memory/2524-145-0x0000000002400000-0x0000000002410000-memory.dmp

          Filesize

          64KB

        • memory/2524-152-0x00000000023E0000-0x00000000023F2000-memory.dmp

          Filesize

          72KB

        • memory/2524-146-0x00000000023E0000-0x00000000023F8000-memory.dmp

          Filesize

          96KB

        • memory/2524-147-0x00000000023E0000-0x00000000023F2000-memory.dmp

          Filesize

          72KB

        • memory/2524-150-0x00000000023E0000-0x00000000023F2000-memory.dmp

          Filesize

          72KB

        • memory/2524-148-0x00000000023E0000-0x00000000023F2000-memory.dmp

          Filesize

          72KB

        • memory/2936-2369-0x0000000000580000-0x00000000005BB000-memory.dmp

          Filesize

          236KB

        • memory/3320-2352-0x0000000009FD0000-0x000000000A01B000-memory.dmp

          Filesize

          300KB

        • memory/3320-2350-0x0000000009DF0000-0x0000000009E02000-memory.dmp

          Filesize

          72KB

        • memory/3320-2349-0x0000000009EC0000-0x0000000009FCA000-memory.dmp

          Filesize

          1.0MB

        • memory/3320-2348-0x000000000A340000-0x000000000A946000-memory.dmp

          Filesize

          6.0MB

        • memory/3320-2347-0x0000000000840000-0x0000000000846000-memory.dmp

          Filesize

          24KB

        • memory/3320-2346-0x00000000000C0000-0x00000000000F0000-memory.dmp

          Filesize

          192KB

        • memory/3320-2353-0x0000000004860000-0x0000000004870000-memory.dmp

          Filesize

          64KB

        • memory/3320-2356-0x000000000A9F0000-0x000000000AA82000-memory.dmp

          Filesize

          584KB

        • memory/3320-2359-0x0000000004860000-0x0000000004870000-memory.dmp

          Filesize

          64KB

        • memory/3320-2362-0x000000000BDB0000-0x000000000C2DC000-memory.dmp

          Filesize

          5.2MB

        • memory/3988-191-0x00000000050F0000-0x0000000005150000-memory.dmp

          Filesize

          384KB

        • memory/3988-2339-0x0000000004A70000-0x0000000004A80000-memory.dmp

          Filesize

          64KB

        • memory/3988-2332-0x00000000052D0000-0x0000000005302000-memory.dmp

          Filesize

          200KB

        • memory/3988-223-0x00000000050F0000-0x0000000005150000-memory.dmp

          Filesize

          384KB

        • memory/3988-221-0x00000000050F0000-0x0000000005150000-memory.dmp

          Filesize

          384KB

        • memory/3988-215-0x0000000004A70000-0x0000000004A80000-memory.dmp

          Filesize

          64KB

        • memory/3988-219-0x00000000050F0000-0x0000000005150000-memory.dmp

          Filesize

          384KB

        • memory/3988-216-0x00000000050F0000-0x0000000005150000-memory.dmp

          Filesize

          384KB

        • memory/3988-217-0x0000000004A70000-0x0000000004A80000-memory.dmp

          Filesize

          64KB

        • memory/3988-214-0x0000000004A70000-0x0000000004A80000-memory.dmp

          Filesize

          64KB

        • memory/3988-211-0x00000000050F0000-0x0000000005150000-memory.dmp

          Filesize

          384KB

        • memory/3988-212-0x0000000001EE0000-0x0000000001F3B000-memory.dmp

          Filesize

          364KB

        • memory/3988-209-0x00000000050F0000-0x0000000005150000-memory.dmp

          Filesize

          384KB

        • memory/3988-207-0x00000000050F0000-0x0000000005150000-memory.dmp

          Filesize

          384KB

        • memory/3988-205-0x00000000050F0000-0x0000000005150000-memory.dmp

          Filesize

          384KB

        • memory/3988-203-0x00000000050F0000-0x0000000005150000-memory.dmp

          Filesize

          384KB

        • memory/3988-201-0x00000000050F0000-0x0000000005150000-memory.dmp

          Filesize

          384KB

        • memory/3988-199-0x00000000050F0000-0x0000000005150000-memory.dmp

          Filesize

          384KB

        • memory/3988-197-0x00000000050F0000-0x0000000005150000-memory.dmp

          Filesize

          384KB

        • memory/3988-195-0x00000000050F0000-0x0000000005150000-memory.dmp

          Filesize

          384KB

        • memory/3988-193-0x00000000050F0000-0x0000000005150000-memory.dmp

          Filesize

          384KB

        • memory/3988-189-0x00000000050F0000-0x0000000005150000-memory.dmp

          Filesize

          384KB

        • memory/3988-187-0x00000000050F0000-0x0000000005150000-memory.dmp

          Filesize

          384KB

        • memory/3988-186-0x00000000050F0000-0x0000000005150000-memory.dmp

          Filesize

          384KB

        • memory/3988-185-0x00000000050F0000-0x0000000005156000-memory.dmp

          Filesize

          408KB

        • memory/3988-184-0x0000000004B80000-0x0000000004BE8000-memory.dmp

          Filesize

          416KB