Analysis

  • max time kernel
    144s
  • max time network
    103s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13/04/2023, 07:24

General

  • Target

    b33934e54692350cdacb524540a9234c2149b5d8700e74f30bc2daf1c4a38495.exe

  • Size

    940KB

  • MD5

    eacae85f3f29380263b8c20c5c37d894

  • SHA1

    68fcee1ed8f0c56616bbf45988459032c202996f

  • SHA256

    b33934e54692350cdacb524540a9234c2149b5d8700e74f30bc2daf1c4a38495

  • SHA512

    80fc4915f647ed5081efd59fb3331c6832eb7c0eb8eb120f7ef694d7ed2eb1d5eb6ddafa8a3ecc53c995ead5824dd70ad84c3c4df3e69a4a9460720e68c29409

  • SSDEEP

    24576:SyEHxVyVel5qNhvgKGPwAkQF2XpmP1Qt8:52xVuel0NhyPpz4GQt

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diro

C2

185.161.248.90:4125

Attributes
  • auth_value

    ae95bda0dd2e95169886a3a68138568b

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b33934e54692350cdacb524540a9234c2149b5d8700e74f30bc2daf1c4a38495.exe
    "C:\Users\Admin\AppData\Local\Temp\b33934e54692350cdacb524540a9234c2149b5d8700e74f30bc2daf1c4a38495.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziIQ3125.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziIQ3125.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1528
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zimj0630.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zimj0630.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3860
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it438696.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it438696.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3848
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr257428.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr257428.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4508
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:200
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp939650.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp939650.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3100
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr018902.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr018902.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      PID:3740
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3740 -s 620
        3⤵
        • Program crash
        PID:3828
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3740 -s 704
        3⤵
        • Program crash
        PID:4524
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3740 -s 836
        3⤵
        • Program crash
        PID:3892
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3740 -s 848
        3⤵
        • Program crash
        PID:4736
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3740 -s 876
        3⤵
        • Program crash
        PID:4816
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3740 -s 832
        3⤵
        • Program crash
        PID:1408
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3740 -s 1120
        3⤵
        • Program crash
        PID:2932
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3740 -s 1160
        3⤵
        • Program crash
        PID:4796
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3740 -s 1080
        3⤵
        • Program crash
        PID:3220

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr018902.exe

          Filesize

          253KB

          MD5

          d7d27cec03a99717cceaa9a2303cf106

          SHA1

          1ef9e888e19bf0315036e31deb80e53e0dbaa54b

          SHA256

          245f5a47c956e169777b0de250c214d650248d895d73637b94412c95825f2260

          SHA512

          edf2dd3a89b9e4c476a021ec648ed3dc7d5b9b6ae24702b73cc2d1ac824332e8954c03257028bb2a4c41d40bf5b27115ec84d8084329356c38b38737b79b0932

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr018902.exe

          Filesize

          253KB

          MD5

          d7d27cec03a99717cceaa9a2303cf106

          SHA1

          1ef9e888e19bf0315036e31deb80e53e0dbaa54b

          SHA256

          245f5a47c956e169777b0de250c214d650248d895d73637b94412c95825f2260

          SHA512

          edf2dd3a89b9e4c476a021ec648ed3dc7d5b9b6ae24702b73cc2d1ac824332e8954c03257028bb2a4c41d40bf5b27115ec84d8084329356c38b38737b79b0932

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziIQ3125.exe

          Filesize

          668KB

          MD5

          64a0a681ec1d9dd81f524873c8a785d9

          SHA1

          d30e4fed97b516ba6bdf7dac9775371bc9bd3e6b

          SHA256

          f02a7d0e4ddf3885523e6e1c1c536060e2f4a5ffa0fb15f26ad60636cea2df78

          SHA512

          930e4b30b3b65b3bd123c416ed906a84b4d81a3cf3d709f72dee4683cc29b5bc3a1ee06646836f553367f26d026f561a6cc4a20b1ca16d4e320f328aeb62b9f5

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziIQ3125.exe

          Filesize

          668KB

          MD5

          64a0a681ec1d9dd81f524873c8a785d9

          SHA1

          d30e4fed97b516ba6bdf7dac9775371bc9bd3e6b

          SHA256

          f02a7d0e4ddf3885523e6e1c1c536060e2f4a5ffa0fb15f26ad60636cea2df78

          SHA512

          930e4b30b3b65b3bd123c416ed906a84b4d81a3cf3d709f72dee4683cc29b5bc3a1ee06646836f553367f26d026f561a6cc4a20b1ca16d4e320f328aeb62b9f5

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp939650.exe

          Filesize

          168KB

          MD5

          aa8bb998c46f60bacf91f98f8d4d7b5c

          SHA1

          61c7e314d916035128849f85a29b34ac1fb482e0

          SHA256

          7e0252d52b7ff9e4466411941eb98cc220824be0f2eefdfe38e6b494f1176131

          SHA512

          3e1e8400351fbeedbb0f07370260dea23782c24924482d33c54f9db9659c858c2ee89f69b9a8256b091efec0ea33b09e408e0d218769ca3e2cbd013dd935dde7

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp939650.exe

          Filesize

          168KB

          MD5

          aa8bb998c46f60bacf91f98f8d4d7b5c

          SHA1

          61c7e314d916035128849f85a29b34ac1fb482e0

          SHA256

          7e0252d52b7ff9e4466411941eb98cc220824be0f2eefdfe38e6b494f1176131

          SHA512

          3e1e8400351fbeedbb0f07370260dea23782c24924482d33c54f9db9659c858c2ee89f69b9a8256b091efec0ea33b09e408e0d218769ca3e2cbd013dd935dde7

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zimj0630.exe

          Filesize

          514KB

          MD5

          b3a8a7e370c72cfd6e1ad423ff33d45d

          SHA1

          712c17615b65e25179c7ca5874491109e74b5131

          SHA256

          2ad135e220a30fa306c71a180cf968f49293bc7c7e229c5fb6e56fce729a79fc

          SHA512

          cd970ce9b8880bab365f36663ea4e28259eb815fd28628276fef17dde94135f7a9566f5844397a7bffcf23e523a09149e73e2c7e7bc6ef9812ec39eb5039081b

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zimj0630.exe

          Filesize

          514KB

          MD5

          b3a8a7e370c72cfd6e1ad423ff33d45d

          SHA1

          712c17615b65e25179c7ca5874491109e74b5131

          SHA256

          2ad135e220a30fa306c71a180cf968f49293bc7c7e229c5fb6e56fce729a79fc

          SHA512

          cd970ce9b8880bab365f36663ea4e28259eb815fd28628276fef17dde94135f7a9566f5844397a7bffcf23e523a09149e73e2c7e7bc6ef9812ec39eb5039081b

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it438696.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it438696.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr257428.exe

          Filesize

          445KB

          MD5

          fb632bf4f9d0d7c5b21b083082f2357d

          SHA1

          dd70cfae188302f40354d1b4883f5f2ec04ca09b

          SHA256

          e611e78e08d5a7b90b16e3a93d9807d0ce4a2aeedb88759532c68d51b2fe7e8d

          SHA512

          ebafb220bbcc9ae37094b3d7e362db614e906b6e51dad53cafcec1185d5ba585e3113405268e2ade80745fa2fad13177a3d3827d872aaded27c07d4148100fb0

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr257428.exe

          Filesize

          445KB

          MD5

          fb632bf4f9d0d7c5b21b083082f2357d

          SHA1

          dd70cfae188302f40354d1b4883f5f2ec04ca09b

          SHA256

          e611e78e08d5a7b90b16e3a93d9807d0ce4a2aeedb88759532c68d51b2fe7e8d

          SHA512

          ebafb220bbcc9ae37094b3d7e362db614e906b6e51dad53cafcec1185d5ba585e3113405268e2ade80745fa2fad13177a3d3827d872aaded27c07d4148100fb0

        • C:\Windows\Temp\1.exe

          Filesize

          168KB

          MD5

          03728fed675bcde5256342183b1d6f27

          SHA1

          d13eace7d3d92f93756504b274777cc269b222a2

          SHA256

          f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

          SHA512

          6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

        • C:\Windows\Temp\1.exe

          Filesize

          168KB

          MD5

          03728fed675bcde5256342183b1d6f27

          SHA1

          d13eace7d3d92f93756504b274777cc269b222a2

          SHA256

          f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

          SHA512

          6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

        • memory/200-2308-0x0000000004EA0000-0x0000000004EA6000-memory.dmp

          Filesize

          24KB

        • memory/200-2305-0x00000000006F0000-0x000000000071E000-memory.dmp

          Filesize

          184KB

        • memory/200-2324-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

          Filesize

          64KB

        • memory/200-2312-0x0000000005600000-0x0000000005C06000-memory.dmp

          Filesize

          6.0MB

        • memory/200-2313-0x0000000005100000-0x000000000520A000-memory.dmp

          Filesize

          1.0MB

        • memory/200-2316-0x00000000050B0000-0x00000000050FB000-memory.dmp

          Filesize

          300KB

        • memory/200-2321-0x00000000054A0000-0x0000000005532000-memory.dmp

          Filesize

          584KB

        • memory/200-2319-0x0000000005380000-0x00000000053F6000-memory.dmp

          Filesize

          472KB

        • memory/200-2314-0x0000000005010000-0x0000000005022000-memory.dmp

          Filesize

          72KB

        • memory/200-2317-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

          Filesize

          64KB

        • memory/3100-2320-0x00000000053F0000-0x0000000005482000-memory.dmp

          Filesize

          584KB

        • memory/3100-2315-0x0000000004E70000-0x0000000004EAE000-memory.dmp

          Filesize

          248KB

        • memory/3100-2318-0x0000000004F20000-0x0000000004F30000-memory.dmp

          Filesize

          64KB

        • memory/3100-2322-0x0000000005490000-0x00000000054F6000-memory.dmp

          Filesize

          408KB

        • memory/3100-2323-0x0000000005FA0000-0x0000000005FF0000-memory.dmp

          Filesize

          320KB

        • memory/3100-2311-0x0000000001010000-0x0000000001016000-memory.dmp

          Filesize

          24KB

        • memory/3100-2325-0x0000000004F20000-0x0000000004F30000-memory.dmp

          Filesize

          64KB

        • memory/3100-2326-0x0000000006430000-0x00000000065F2000-memory.dmp

          Filesize

          1.8MB

        • memory/3100-2327-0x00000000083B0000-0x00000000088DC000-memory.dmp

          Filesize

          5.2MB

        • memory/3100-2310-0x0000000000610000-0x0000000000640000-memory.dmp

          Filesize

          192KB

        • memory/3740-2334-0x0000000000820000-0x000000000085B000-memory.dmp

          Filesize

          236KB

        • memory/3848-141-0x00000000009D0000-0x00000000009DA000-memory.dmp

          Filesize

          40KB

        • memory/4508-161-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/4508-181-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/4508-197-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/4508-199-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/4508-201-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/4508-203-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/4508-205-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/4508-207-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/4508-209-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/4508-211-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/4508-213-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/4508-215-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/4508-217-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/4508-2296-0x00000000052D0000-0x0000000005302000-memory.dmp

          Filesize

          200KB

        • memory/4508-2298-0x0000000004AC0000-0x0000000004AD0000-memory.dmp

          Filesize

          64KB

        • memory/4508-193-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/4508-191-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/4508-189-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/4508-187-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/4508-185-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/4508-183-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/4508-195-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/4508-179-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/4508-177-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/4508-175-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/4508-173-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/4508-171-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/4508-169-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/4508-167-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/4508-160-0x0000000004AC0000-0x0000000004AD0000-memory.dmp

          Filesize

          64KB

        • memory/4508-165-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/4508-163-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/4508-157-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/4508-158-0x0000000004AC0000-0x0000000004AD0000-memory.dmp

          Filesize

          64KB

        • memory/4508-156-0x0000000004AC0000-0x0000000004AD0000-memory.dmp

          Filesize

          64KB

        • memory/4508-154-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/4508-152-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/4508-151-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/4508-150-0x00000000050D0000-0x0000000005136000-memory.dmp

          Filesize

          408KB

        • memory/4508-149-0x0000000004BD0000-0x00000000050CE000-memory.dmp

          Filesize

          5.0MB

        • memory/4508-148-0x0000000004A30000-0x0000000004A98000-memory.dmp

          Filesize

          416KB

        • memory/4508-147-0x00000000008B0000-0x000000000090B000-memory.dmp

          Filesize

          364KB