Analysis

  • max time kernel
    142s
  • max time network
    97s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13/04/2023, 11:13

General

  • Target

    af173bfbee7e8fd11059b9cddd07b9ee0278996747af6cb68cef6597ea80d312.exe

  • Size

    940KB

  • MD5

    8ae214632b99409d6204368bf4b70178

  • SHA1

    29952f2cc3b21c49b05df04638e625f605299d5d

  • SHA256

    af173bfbee7e8fd11059b9cddd07b9ee0278996747af6cb68cef6597ea80d312

  • SHA512

    d8f2c12786cf9585a849da5c5e5840e8c87fa0e609711d26eb93d715cec091a86ffac758b6001d524bc3c1db6ccbae35e48d8ee28ded2bbf16662ec247e04690

  • SSDEEP

    24576:+yKdcYG1dG1sEGHLHeSr242Fvlkzcfhnso4kWvP0Y2O:NKaeQHbsnvaz2hnn4bU

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diro

C2

185.161.248.90:4125

Attributes
  • auth_value

    ae95bda0dd2e95169886a3a68138568b

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af173bfbee7e8fd11059b9cddd07b9ee0278996747af6cb68cef6597ea80d312.exe
    "C:\Users\Admin\AppData\Local\Temp\af173bfbee7e8fd11059b9cddd07b9ee0278996747af6cb68cef6597ea80d312.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3668
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zius6791.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zius6791.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:988
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zigr2739.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zigr2739.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4496
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it910841.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it910841.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4992
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr267079.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr267079.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2060
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1608
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp398346.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp398346.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1800
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr329948.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr329948.exe
      2⤵
      • Executes dropped EXE
      PID:2576
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 620
        3⤵
        • Program crash
        PID:1048
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 700
        3⤵
        • Program crash
        PID:1852
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 840
        3⤵
        • Program crash
        PID:3200
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 880
        3⤵
        • Program crash
        PID:4120
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 884
        3⤵
        • Program crash
        PID:2532
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 860
        3⤵
        • Program crash
        PID:3984
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 1120
        3⤵
        • Program crash
        PID:4092
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 1152
        3⤵
        • Program crash
        PID:4460
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 1124
        3⤵
        • Program crash
        PID:4888

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr329948.exe

    Filesize

    253KB

    MD5

    1c4b687ff7f7f7b8b0d0a3b1bf2cd568

    SHA1

    442fd0c94a574490bdec94a7a8c05e231205f530

    SHA256

    255002c9fb43a706b143e5dfd912af265387f63ad21df64b837bb0366f713932

    SHA512

    2e6079407ed488523c1ed71aeb1224a9a5da750e671dcb1c2410e4a0e3cb4e326d2ced4b9a0269fbf77120d51910d7a0de81d523db3878115e5bb91d97f8b550

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr329948.exe

    Filesize

    253KB

    MD5

    1c4b687ff7f7f7b8b0d0a3b1bf2cd568

    SHA1

    442fd0c94a574490bdec94a7a8c05e231205f530

    SHA256

    255002c9fb43a706b143e5dfd912af265387f63ad21df64b837bb0366f713932

    SHA512

    2e6079407ed488523c1ed71aeb1224a9a5da750e671dcb1c2410e4a0e3cb4e326d2ced4b9a0269fbf77120d51910d7a0de81d523db3878115e5bb91d97f8b550

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zius6791.exe

    Filesize

    668KB

    MD5

    e495803427cc5cdb19379a78bb8f34f2

    SHA1

    8710266420d68ce365a3428236465f61bd7b3314

    SHA256

    8d5f37bf856ba37dfc49f397925c96f6a4b4d023049faade21b15826291d7df3

    SHA512

    e5d762b2e9bf75fb31fe4277754bff75308ece2b2b6ef546e1edbb32966f98639de15027898bb986ceb2254a631408618176172c47c464b2865417870d0b8545

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zius6791.exe

    Filesize

    668KB

    MD5

    e495803427cc5cdb19379a78bb8f34f2

    SHA1

    8710266420d68ce365a3428236465f61bd7b3314

    SHA256

    8d5f37bf856ba37dfc49f397925c96f6a4b4d023049faade21b15826291d7df3

    SHA512

    e5d762b2e9bf75fb31fe4277754bff75308ece2b2b6ef546e1edbb32966f98639de15027898bb986ceb2254a631408618176172c47c464b2865417870d0b8545

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp398346.exe

    Filesize

    168KB

    MD5

    3797d67259ab226926ab58d7979a7384

    SHA1

    bab2fb961a09b07516d52b56c4318f193af9ee78

    SHA256

    6e0b04157fb1d366eb12d322b14dec225223fe3cf9b9ef31e517bba796882700

    SHA512

    2095654746967541ebc8d5c6cd038adc8a84be6fafce40a61a69c819312658eaa479bc0653272c76847165b827cce4fcf695c2b6477e56f85bb3ee748d6dbd11

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp398346.exe

    Filesize

    168KB

    MD5

    3797d67259ab226926ab58d7979a7384

    SHA1

    bab2fb961a09b07516d52b56c4318f193af9ee78

    SHA256

    6e0b04157fb1d366eb12d322b14dec225223fe3cf9b9ef31e517bba796882700

    SHA512

    2095654746967541ebc8d5c6cd038adc8a84be6fafce40a61a69c819312658eaa479bc0653272c76847165b827cce4fcf695c2b6477e56f85bb3ee748d6dbd11

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zigr2739.exe

    Filesize

    515KB

    MD5

    a6648fe4271785f79e6defb853e13968

    SHA1

    1a6714de957f94ae267dd208a64341bf4a391d77

    SHA256

    f2917a076f2d659889242689f24a262525e8f67e63a1e26c073e15af6bf28b98

    SHA512

    282b95d0eaa59c93629c243b604be3b7f62d59686b58f011a1374392b63d737a8abfa8f624dcd96550484cee63084db01c00d087a4e565facb37f2329dd3fc7c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zigr2739.exe

    Filesize

    515KB

    MD5

    a6648fe4271785f79e6defb853e13968

    SHA1

    1a6714de957f94ae267dd208a64341bf4a391d77

    SHA256

    f2917a076f2d659889242689f24a262525e8f67e63a1e26c073e15af6bf28b98

    SHA512

    282b95d0eaa59c93629c243b604be3b7f62d59686b58f011a1374392b63d737a8abfa8f624dcd96550484cee63084db01c00d087a4e565facb37f2329dd3fc7c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it910841.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it910841.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr267079.exe

    Filesize

    445KB

    MD5

    03d58ea19c630423fe098b4cfc6f27c7

    SHA1

    f5f39ee449c63d5a5a0d7dc0e6d6f1ce366acde7

    SHA256

    b9f71eb1bd47b4cca3f6492531006a056b05fbf6c048ab6189b09350afbaef33

    SHA512

    83e412e1aa27aa351b86906ef56cba5e8be8bfc38b74d63198c1268cc68e85de587cc060e9e6028e68f707d7136d035feb035b57f3173ce2482c0b95a0e7b954

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr267079.exe

    Filesize

    445KB

    MD5

    03d58ea19c630423fe098b4cfc6f27c7

    SHA1

    f5f39ee449c63d5a5a0d7dc0e6d6f1ce366acde7

    SHA256

    b9f71eb1bd47b4cca3f6492531006a056b05fbf6c048ab6189b09350afbaef33

    SHA512

    83e412e1aa27aa351b86906ef56cba5e8be8bfc38b74d63198c1268cc68e85de587cc060e9e6028e68f707d7136d035feb035b57f3173ce2482c0b95a0e7b954

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • memory/1608-2311-0x00000000058F0000-0x00000000059FA000-memory.dmp

    Filesize

    1.0MB

  • memory/1608-2310-0x0000000005DF0000-0x00000000063F6000-memory.dmp

    Filesize

    6.0MB

  • memory/1608-2323-0x00000000056D0000-0x00000000056E0000-memory.dmp

    Filesize

    64KB

  • memory/1608-2317-0x0000000005AA0000-0x0000000005B16000-memory.dmp

    Filesize

    472KB

  • memory/1608-2314-0x00000000057E0000-0x000000000582B000-memory.dmp

    Filesize

    300KB

  • memory/1608-2319-0x0000000005B20000-0x0000000005B86000-memory.dmp

    Filesize

    408KB

  • memory/1608-2306-0x0000000000E10000-0x0000000000E3E000-memory.dmp

    Filesize

    184KB

  • memory/1608-2315-0x00000000056D0000-0x00000000056E0000-memory.dmp

    Filesize

    64KB

  • memory/1608-2313-0x0000000005680000-0x00000000056BE000-memory.dmp

    Filesize

    248KB

  • memory/1608-2312-0x0000000005620000-0x0000000005632000-memory.dmp

    Filesize

    72KB

  • memory/1608-2308-0x00000000014A0000-0x00000000014A6000-memory.dmp

    Filesize

    24KB

  • memory/1800-2320-0x0000000006BE0000-0x0000000006DA2000-memory.dmp

    Filesize

    1.8MB

  • memory/1800-2321-0x0000000008F30000-0x000000000945C000-memory.dmp

    Filesize

    5.2MB

  • memory/1800-2309-0x0000000005660000-0x0000000005666000-memory.dmp

    Filesize

    24KB

  • memory/1800-2307-0x0000000000DB0000-0x0000000000DE0000-memory.dmp

    Filesize

    192KB

  • memory/1800-2322-0x00000000069B0000-0x0000000006A00000-memory.dmp

    Filesize

    320KB

  • memory/1800-2316-0x0000000005670000-0x0000000005680000-memory.dmp

    Filesize

    64KB

  • memory/1800-2318-0x0000000005B60000-0x0000000005BF2000-memory.dmp

    Filesize

    584KB

  • memory/1800-2324-0x0000000005670000-0x0000000005680000-memory.dmp

    Filesize

    64KB

  • memory/2060-162-0x0000000002210000-0x0000000002220000-memory.dmp

    Filesize

    64KB

  • memory/2060-178-0x0000000005150000-0x00000000051B0000-memory.dmp

    Filesize

    384KB

  • memory/2060-190-0x0000000005150000-0x00000000051B0000-memory.dmp

    Filesize

    384KB

  • memory/2060-192-0x0000000005150000-0x00000000051B0000-memory.dmp

    Filesize

    384KB

  • memory/2060-194-0x0000000005150000-0x00000000051B0000-memory.dmp

    Filesize

    384KB

  • memory/2060-196-0x0000000005150000-0x00000000051B0000-memory.dmp

    Filesize

    384KB

  • memory/2060-198-0x0000000005150000-0x00000000051B0000-memory.dmp

    Filesize

    384KB

  • memory/2060-200-0x0000000005150000-0x00000000051B0000-memory.dmp

    Filesize

    384KB

  • memory/2060-202-0x0000000005150000-0x00000000051B0000-memory.dmp

    Filesize

    384KB

  • memory/2060-204-0x0000000005150000-0x00000000051B0000-memory.dmp

    Filesize

    384KB

  • memory/2060-206-0x0000000005150000-0x00000000051B0000-memory.dmp

    Filesize

    384KB

  • memory/2060-208-0x0000000005150000-0x00000000051B0000-memory.dmp

    Filesize

    384KB

  • memory/2060-210-0x0000000005150000-0x00000000051B0000-memory.dmp

    Filesize

    384KB

  • memory/2060-212-0x0000000005150000-0x00000000051B0000-memory.dmp

    Filesize

    384KB

  • memory/2060-214-0x0000000005150000-0x00000000051B0000-memory.dmp

    Filesize

    384KB

  • memory/2060-216-0x0000000005150000-0x00000000051B0000-memory.dmp

    Filesize

    384KB

  • memory/2060-2295-0x0000000002640000-0x0000000002672000-memory.dmp

    Filesize

    200KB

  • memory/2060-186-0x0000000005150000-0x00000000051B0000-memory.dmp

    Filesize

    384KB

  • memory/2060-184-0x0000000005150000-0x00000000051B0000-memory.dmp

    Filesize

    384KB

  • memory/2060-182-0x0000000005150000-0x00000000051B0000-memory.dmp

    Filesize

    384KB

  • memory/2060-180-0x0000000005150000-0x00000000051B0000-memory.dmp

    Filesize

    384KB

  • memory/2060-188-0x0000000005150000-0x00000000051B0000-memory.dmp

    Filesize

    384KB

  • memory/2060-176-0x0000000005150000-0x00000000051B0000-memory.dmp

    Filesize

    384KB

  • memory/2060-174-0x0000000005150000-0x00000000051B0000-memory.dmp

    Filesize

    384KB

  • memory/2060-172-0x0000000005150000-0x00000000051B0000-memory.dmp

    Filesize

    384KB

  • memory/2060-170-0x0000000005150000-0x00000000051B0000-memory.dmp

    Filesize

    384KB

  • memory/2060-168-0x0000000005150000-0x00000000051B0000-memory.dmp

    Filesize

    384KB

  • memory/2060-165-0x0000000002210000-0x0000000002220000-memory.dmp

    Filesize

    64KB

  • memory/2060-166-0x0000000005150000-0x00000000051B0000-memory.dmp

    Filesize

    384KB

  • memory/2060-161-0x0000000005150000-0x00000000051B0000-memory.dmp

    Filesize

    384KB

  • memory/2060-163-0x0000000002210000-0x0000000002220000-memory.dmp

    Filesize

    64KB

  • memory/2060-159-0x0000000005150000-0x00000000051B0000-memory.dmp

    Filesize

    384KB

  • memory/2060-157-0x0000000005150000-0x00000000051B0000-memory.dmp

    Filesize

    384KB

  • memory/2060-155-0x0000000005150000-0x00000000051B0000-memory.dmp

    Filesize

    384KB

  • memory/2060-153-0x0000000005150000-0x00000000051B0000-memory.dmp

    Filesize

    384KB

  • memory/2060-151-0x0000000005150000-0x00000000051B0000-memory.dmp

    Filesize

    384KB

  • memory/2060-150-0x0000000005150000-0x00000000051B0000-memory.dmp

    Filesize

    384KB

  • memory/2060-149-0x0000000005150000-0x00000000051B6000-memory.dmp

    Filesize

    408KB

  • memory/2060-148-0x0000000004C50000-0x000000000514E000-memory.dmp

    Filesize

    5.0MB

  • memory/2060-147-0x0000000004BE0000-0x0000000004C48000-memory.dmp

    Filesize

    416KB

  • memory/2060-146-0x0000000000600000-0x000000000065B000-memory.dmp

    Filesize

    364KB

  • memory/2576-2331-0x00000000005B0000-0x00000000005EB000-memory.dmp

    Filesize

    236KB

  • memory/4992-140-0x00000000005E0000-0x00000000005EA000-memory.dmp

    Filesize

    40KB