Analysis

  • max time kernel
    144s
  • max time network
    101s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13/04/2023, 09:41

General

  • Target

    d5f5fa9122645ddf0fbb51f76d7239968f05b7b79fdaea0215c2e6f584195317.exe

  • Size

    941KB

  • MD5

    b004cfc38218254f63966615e20a9681

  • SHA1

    72f931afc0a634f515edd253c845b5ef8641f79c

  • SHA256

    d5f5fa9122645ddf0fbb51f76d7239968f05b7b79fdaea0215c2e6f584195317

  • SHA512

    26931a7fcbee9d889259678e4603ab836d9fa72a0f37aaab733b94d281d55809e8e29098df5c73d0ca5c6b7f9595f718dbbe00241d0ee092afded1c40502d65c

  • SSDEEP

    24576:WyKXvjjVlM2UncR10VM9OTK4Y37M3u6WmJwXUvp:lKXvjjVe2UcR19n37x61

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diro

C2

185.161.248.90:4125

Attributes
  • auth_value

    ae95bda0dd2e95169886a3a68138568b

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5f5fa9122645ddf0fbb51f76d7239968f05b7b79fdaea0215c2e6f584195317.exe
    "C:\Users\Admin\AppData\Local\Temp\d5f5fa9122645ddf0fbb51f76d7239968f05b7b79fdaea0215c2e6f584195317.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1008
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimd0666.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimd0666.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4292
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziet8083.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziet8083.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4988
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it417823.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it417823.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2808
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr217114.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr217114.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4344
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5016
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp294758.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp294758.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2088
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr840330.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr840330.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      PID:4084
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 624
        3⤵
        • Program crash
        PID:4888
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 708
        3⤵
        • Program crash
        PID:68
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 852
        3⤵
        • Program crash
        PID:4032
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 840
        3⤵
        • Program crash
        PID:1476
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 892
        3⤵
        • Program crash
        PID:4644
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 940
        3⤵
        • Program crash
        PID:2424
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 1124
        3⤵
        • Program crash
        PID:2768
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 1156
        3⤵
        • Program crash
        PID:2900
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 1208
        3⤵
        • Program crash
        PID:4440

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr840330.exe

          Filesize

          253KB

          MD5

          8dddb77b930358bb9892abfde08bca5a

          SHA1

          e8e0949b4ef9ea309d8cd306574b46875e8a60ce

          SHA256

          f262befc57cc34c974337c6cb4788e18072ac26e5c08e21970bac4cab2aa5353

          SHA512

          a9d0b48cf87a46b4093301cc1719029a0aa48fa4564d2e7f717981c41490d900993880fd51d8dd09e93bce1e5a8e03ff612531504cb4b9c8bd747b7cfeabf070

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr840330.exe

          Filesize

          253KB

          MD5

          8dddb77b930358bb9892abfde08bca5a

          SHA1

          e8e0949b4ef9ea309d8cd306574b46875e8a60ce

          SHA256

          f262befc57cc34c974337c6cb4788e18072ac26e5c08e21970bac4cab2aa5353

          SHA512

          a9d0b48cf87a46b4093301cc1719029a0aa48fa4564d2e7f717981c41490d900993880fd51d8dd09e93bce1e5a8e03ff612531504cb4b9c8bd747b7cfeabf070

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimd0666.exe

          Filesize

          668KB

          MD5

          44e8fff320990d2d5519d02c95662fea

          SHA1

          ddbc7da4fe5b1a22cb2a5adeca6cd3a5b079e32c

          SHA256

          a29bc146199ff08f929a9f36dd713e1d7c0272b2de6737ec049cf5c8fc807859

          SHA512

          b28bb816bd18d4d3eaa227e433780de09c2c5fbe75a7cc75fba38f68442cb2144ef2f58af86c4343109ad020c2c21925e571633797cc87808f3801b5ab2fa8f6

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimd0666.exe

          Filesize

          668KB

          MD5

          44e8fff320990d2d5519d02c95662fea

          SHA1

          ddbc7da4fe5b1a22cb2a5adeca6cd3a5b079e32c

          SHA256

          a29bc146199ff08f929a9f36dd713e1d7c0272b2de6737ec049cf5c8fc807859

          SHA512

          b28bb816bd18d4d3eaa227e433780de09c2c5fbe75a7cc75fba38f68442cb2144ef2f58af86c4343109ad020c2c21925e571633797cc87808f3801b5ab2fa8f6

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp294758.exe

          Filesize

          168KB

          MD5

          aa8bb998c46f60bacf91f98f8d4d7b5c

          SHA1

          61c7e314d916035128849f85a29b34ac1fb482e0

          SHA256

          7e0252d52b7ff9e4466411941eb98cc220824be0f2eefdfe38e6b494f1176131

          SHA512

          3e1e8400351fbeedbb0f07370260dea23782c24924482d33c54f9db9659c858c2ee89f69b9a8256b091efec0ea33b09e408e0d218769ca3e2cbd013dd935dde7

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp294758.exe

          Filesize

          168KB

          MD5

          aa8bb998c46f60bacf91f98f8d4d7b5c

          SHA1

          61c7e314d916035128849f85a29b34ac1fb482e0

          SHA256

          7e0252d52b7ff9e4466411941eb98cc220824be0f2eefdfe38e6b494f1176131

          SHA512

          3e1e8400351fbeedbb0f07370260dea23782c24924482d33c54f9db9659c858c2ee89f69b9a8256b091efec0ea33b09e408e0d218769ca3e2cbd013dd935dde7

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziet8083.exe

          Filesize

          514KB

          MD5

          5058793c56f1434a8c94f43fb5b898bc

          SHA1

          4676497384356da7de9bb1ac6e0c02ac3988401d

          SHA256

          6af69be2221cf7f9c19beaccd90df4e81683e403e36a8874729b760eb7fde9dc

          SHA512

          b940820193795fb268db6a0b0b87e8357700fe1ea1d18daa7914035cdfa50c2721076668b7ece3d826baa02909bb81c1327248a26d46b8e091c63c256f89293a

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziet8083.exe

          Filesize

          514KB

          MD5

          5058793c56f1434a8c94f43fb5b898bc

          SHA1

          4676497384356da7de9bb1ac6e0c02ac3988401d

          SHA256

          6af69be2221cf7f9c19beaccd90df4e81683e403e36a8874729b760eb7fde9dc

          SHA512

          b940820193795fb268db6a0b0b87e8357700fe1ea1d18daa7914035cdfa50c2721076668b7ece3d826baa02909bb81c1327248a26d46b8e091c63c256f89293a

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it417823.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it417823.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr217114.exe

          Filesize

          472KB

          MD5

          364613635bd32884b87f180dd8a24a22

          SHA1

          53d7ea70dcc98843083486169340349e9c7e54e6

          SHA256

          36d67dbe6494fc4ac8e13434c3ac1c17b6ac73d6681f88b0e676e0a74e55f428

          SHA512

          d0baec9ed65151783c6fdf8e507ebd701b3b83e878f8dd1a65bd1f87ca97438cf82f1ca31b9cd619c331b0598ce6193eacfb77638b55de5e9522da7c925d29d3

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr217114.exe

          Filesize

          472KB

          MD5

          364613635bd32884b87f180dd8a24a22

          SHA1

          53d7ea70dcc98843083486169340349e9c7e54e6

          SHA256

          36d67dbe6494fc4ac8e13434c3ac1c17b6ac73d6681f88b0e676e0a74e55f428

          SHA512

          d0baec9ed65151783c6fdf8e507ebd701b3b83e878f8dd1a65bd1f87ca97438cf82f1ca31b9cd619c331b0598ce6193eacfb77638b55de5e9522da7c925d29d3

        • C:\Windows\Temp\1.exe

          Filesize

          168KB

          MD5

          03728fed675bcde5256342183b1d6f27

          SHA1

          d13eace7d3d92f93756504b274777cc269b222a2

          SHA256

          f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

          SHA512

          6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

        • C:\Windows\Temp\1.exe

          Filesize

          168KB

          MD5

          03728fed675bcde5256342183b1d6f27

          SHA1

          d13eace7d3d92f93756504b274777cc269b222a2

          SHA256

          f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

          SHA512

          6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

        • memory/2088-2323-0x0000000002C90000-0x0000000002CA0000-memory.dmp

          Filesize

          64KB

        • memory/2088-2320-0x0000000008AF0000-0x000000000901C000-memory.dmp

          Filesize

          5.2MB

        • memory/2088-2319-0x0000000006D70000-0x0000000006F32000-memory.dmp

          Filesize

          1.8MB

        • memory/2088-2315-0x0000000002C90000-0x0000000002CA0000-memory.dmp

          Filesize

          64KB

        • memory/2088-2308-0x0000000002AE0000-0x0000000002AE6000-memory.dmp

          Filesize

          24KB

        • memory/2088-2307-0x0000000000950000-0x0000000000980000-memory.dmp

          Filesize

          192KB

        • memory/2808-138-0x0000000000F90000-0x0000000000F9A000-memory.dmp

          Filesize

          40KB

        • memory/4084-2330-0x0000000000580000-0x00000000005BB000-memory.dmp

          Filesize

          236KB

        • memory/4344-154-0x0000000007810000-0x0000000007870000-memory.dmp

          Filesize

          384KB

        • memory/4344-2293-0x00000000079E0000-0x0000000007A12000-memory.dmp

          Filesize

          200KB

        • memory/4344-166-0x0000000007810000-0x0000000007870000-memory.dmp

          Filesize

          384KB

        • memory/4344-168-0x0000000007810000-0x0000000007870000-memory.dmp

          Filesize

          384KB

        • memory/4344-170-0x0000000007810000-0x0000000007870000-memory.dmp

          Filesize

          384KB

        • memory/4344-172-0x0000000007810000-0x0000000007870000-memory.dmp

          Filesize

          384KB

        • memory/4344-174-0x0000000007810000-0x0000000007870000-memory.dmp

          Filesize

          384KB

        • memory/4344-176-0x0000000007810000-0x0000000007870000-memory.dmp

          Filesize

          384KB

        • memory/4344-178-0x0000000007810000-0x0000000007870000-memory.dmp

          Filesize

          384KB

        • memory/4344-180-0x0000000007810000-0x0000000007870000-memory.dmp

          Filesize

          384KB

        • memory/4344-182-0x0000000007810000-0x0000000007870000-memory.dmp

          Filesize

          384KB

        • memory/4344-184-0x0000000007810000-0x0000000007870000-memory.dmp

          Filesize

          384KB

        • memory/4344-186-0x0000000007810000-0x0000000007870000-memory.dmp

          Filesize

          384KB

        • memory/4344-188-0x0000000007810000-0x0000000007870000-memory.dmp

          Filesize

          384KB

        • memory/4344-190-0x0000000007810000-0x0000000007870000-memory.dmp

          Filesize

          384KB

        • memory/4344-192-0x0000000007810000-0x0000000007870000-memory.dmp

          Filesize

          384KB

        • memory/4344-194-0x0000000007810000-0x0000000007870000-memory.dmp

          Filesize

          384KB

        • memory/4344-196-0x0000000007810000-0x0000000007870000-memory.dmp

          Filesize

          384KB

        • memory/4344-198-0x0000000007810000-0x0000000007870000-memory.dmp

          Filesize

          384KB

        • memory/4344-200-0x0000000007810000-0x0000000007870000-memory.dmp

          Filesize

          384KB

        • memory/4344-202-0x0000000007810000-0x0000000007870000-memory.dmp

          Filesize

          384KB

        • memory/4344-204-0x0000000007810000-0x0000000007870000-memory.dmp

          Filesize

          384KB

        • memory/4344-206-0x0000000007810000-0x0000000007870000-memory.dmp

          Filesize

          384KB

        • memory/4344-208-0x0000000007810000-0x0000000007870000-memory.dmp

          Filesize

          384KB

        • memory/4344-210-0x0000000007810000-0x0000000007870000-memory.dmp

          Filesize

          384KB

        • memory/4344-212-0x0000000007810000-0x0000000007870000-memory.dmp

          Filesize

          384KB

        • memory/4344-214-0x0000000007810000-0x0000000007870000-memory.dmp

          Filesize

          384KB

        • memory/4344-164-0x0000000007810000-0x0000000007870000-memory.dmp

          Filesize

          384KB

        • memory/4344-2295-0x0000000007200000-0x0000000007210000-memory.dmp

          Filesize

          64KB

        • memory/4344-162-0x0000000007810000-0x0000000007870000-memory.dmp

          Filesize

          384KB

        • memory/4344-160-0x0000000007810000-0x0000000007870000-memory.dmp

          Filesize

          384KB

        • memory/4344-144-0x0000000002CA0000-0x0000000002CFB000-memory.dmp

          Filesize

          364KB

        • memory/4344-145-0x0000000007150000-0x00000000071B8000-memory.dmp

          Filesize

          416KB

        • memory/4344-158-0x0000000007810000-0x0000000007870000-memory.dmp

          Filesize

          384KB

        • memory/4344-156-0x0000000007810000-0x0000000007870000-memory.dmp

          Filesize

          384KB

        • memory/4344-152-0x0000000007810000-0x0000000007870000-memory.dmp

          Filesize

          384KB

        • memory/4344-151-0x0000000007810000-0x0000000007870000-memory.dmp

          Filesize

          384KB

        • memory/4344-146-0x0000000007310000-0x000000000780E000-memory.dmp

          Filesize

          5.0MB

        • memory/4344-147-0x0000000007810000-0x0000000007876000-memory.dmp

          Filesize

          408KB

        • memory/4344-148-0x0000000007200000-0x0000000007210000-memory.dmp

          Filesize

          64KB

        • memory/4344-149-0x0000000007200000-0x0000000007210000-memory.dmp

          Filesize

          64KB

        • memory/4344-150-0x0000000007200000-0x0000000007210000-memory.dmp

          Filesize

          64KB

        • memory/5016-2311-0x0000000005370000-0x0000000005382000-memory.dmp

          Filesize

          72KB

        • memory/5016-2313-0x0000000005550000-0x000000000559B000-memory.dmp

          Filesize

          300KB

        • memory/5016-2316-0x0000000005800000-0x0000000005876000-memory.dmp

          Filesize

          472KB

        • memory/5016-2317-0x0000000005920000-0x00000000059B2000-memory.dmp

          Filesize

          584KB

        • memory/5016-2318-0x00000000060F0000-0x0000000006156000-memory.dmp

          Filesize

          408KB

        • memory/5016-2312-0x0000000005510000-0x000000000554E000-memory.dmp

          Filesize

          248KB

        • memory/5016-2314-0x00000000053C0000-0x00000000053D0000-memory.dmp

          Filesize

          64KB

        • memory/5016-2321-0x0000000006650000-0x00000000066A0000-memory.dmp

          Filesize

          320KB

        • memory/5016-2322-0x00000000053C0000-0x00000000053D0000-memory.dmp

          Filesize

          64KB

        • memory/5016-2310-0x00000000055E0000-0x00000000056EA000-memory.dmp

          Filesize

          1.0MB

        • memory/5016-2309-0x0000000005AE0000-0x00000000060E6000-memory.dmp

          Filesize

          6.0MB

        • memory/5016-2303-0x00000000012B0000-0x00000000012B6000-memory.dmp

          Filesize

          24KB

        • memory/5016-2302-0x0000000000B70000-0x0000000000B9E000-memory.dmp

          Filesize

          184KB