Analysis

  • max time kernel
    143s
  • max time network
    100s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13/04/2023, 11:47

General

  • Target

    5b5202646520079fdbc673e23a8a8fe922c5a6316036f16fa11e22ba01bc2fff.exe

  • Size

    941KB

  • MD5

    08aa65b9735372d8234349135e90587f

  • SHA1

    53e60f840659f454c873c6e587fec5c06c60740c

  • SHA256

    5b5202646520079fdbc673e23a8a8fe922c5a6316036f16fa11e22ba01bc2fff

  • SHA512

    a4d51980b72c02082037b0123a81dfcc2b5d73422e843cb86f04cdd99c92e04b4a41fb691f73f18a1677952f6757357021b48a2eab8609beaf05cf6852748b21

  • SSDEEP

    24576:CyLFacn6JLpru4X1r46vhsTySnZPC6J5:pp16JUKrrvanZP5J

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diro

C2

185.161.248.90:4125

Attributes
  • auth_value

    ae95bda0dd2e95169886a3a68138568b

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b5202646520079fdbc673e23a8a8fe922c5a6316036f16fa11e22ba01bc2fff.exe
    "C:\Users\Admin\AppData\Local\Temp\5b5202646520079fdbc673e23a8a8fe922c5a6316036f16fa11e22ba01bc2fff.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3240
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNH9401.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNH9401.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3372
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziIu7412.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziIu7412.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4348
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it631243.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it631243.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4200
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr665357.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr665357.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4192
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2180
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp118413.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp118413.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:820
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr887734.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr887734.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      PID:3672
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 624
        3⤵
        • Program crash
        PID:4200
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 704
        3⤵
        • Program crash
        PID:4928
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 844
        3⤵
        • Program crash
        PID:8
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 852
        3⤵
        • Program crash
        PID:1764
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 880
        3⤵
        • Program crash
        PID:2104
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 888
        3⤵
        • Program crash
        PID:2468
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 1120
        3⤵
        • Program crash
        PID:3908
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 1152
        3⤵
        • Program crash
        PID:988
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 1076
        3⤵
        • Program crash
        PID:1332

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr887734.exe

          Filesize

          253KB

          MD5

          1c4b687ff7f7f7b8b0d0a3b1bf2cd568

          SHA1

          442fd0c94a574490bdec94a7a8c05e231205f530

          SHA256

          255002c9fb43a706b143e5dfd912af265387f63ad21df64b837bb0366f713932

          SHA512

          2e6079407ed488523c1ed71aeb1224a9a5da750e671dcb1c2410e4a0e3cb4e326d2ced4b9a0269fbf77120d51910d7a0de81d523db3878115e5bb91d97f8b550

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr887734.exe

          Filesize

          253KB

          MD5

          1c4b687ff7f7f7b8b0d0a3b1bf2cd568

          SHA1

          442fd0c94a574490bdec94a7a8c05e231205f530

          SHA256

          255002c9fb43a706b143e5dfd912af265387f63ad21df64b837bb0366f713932

          SHA512

          2e6079407ed488523c1ed71aeb1224a9a5da750e671dcb1c2410e4a0e3cb4e326d2ced4b9a0269fbf77120d51910d7a0de81d523db3878115e5bb91d97f8b550

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNH9401.exe

          Filesize

          669KB

          MD5

          524aaee0a0c2ddf817037bb9983128a8

          SHA1

          cfb10ee8feaa89c2869969e905f2f8b9c720342b

          SHA256

          b50cdd177d519977742c48591e660063678c2b2700ba87b24ea776bb6d4c58fd

          SHA512

          62e5ff4d6e1c02a0b9827993281ed9976d3d3359475073b75d1041f00baf328a70cb5906ec424885cecc70785d7662a982fa69af825fa4e950eccd453ef40c7f

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNH9401.exe

          Filesize

          669KB

          MD5

          524aaee0a0c2ddf817037bb9983128a8

          SHA1

          cfb10ee8feaa89c2869969e905f2f8b9c720342b

          SHA256

          b50cdd177d519977742c48591e660063678c2b2700ba87b24ea776bb6d4c58fd

          SHA512

          62e5ff4d6e1c02a0b9827993281ed9976d3d3359475073b75d1041f00baf328a70cb5906ec424885cecc70785d7662a982fa69af825fa4e950eccd453ef40c7f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp118413.exe

          Filesize

          168KB

          MD5

          fafe1feb790f890f57a0533a5c9e23a9

          SHA1

          db6623978d8027523010043995526305651cd54b

          SHA256

          fb742cefc07b9f76a758e58d86098bfc908c81c217c51464e59090fcde48acc9

          SHA512

          94c055f21b9e584b9aa336ec72d3cee9f2fd5ce9c081e096f5dc33d94bfc7698386d31c237ab1e896431581c36b534301962d4fe28bc7b86fe44cd78f980e8f2

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp118413.exe

          Filesize

          168KB

          MD5

          fafe1feb790f890f57a0533a5c9e23a9

          SHA1

          db6623978d8027523010043995526305651cd54b

          SHA256

          fb742cefc07b9f76a758e58d86098bfc908c81c217c51464e59090fcde48acc9

          SHA512

          94c055f21b9e584b9aa336ec72d3cee9f2fd5ce9c081e096f5dc33d94bfc7698386d31c237ab1e896431581c36b534301962d4fe28bc7b86fe44cd78f980e8f2

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziIu7412.exe

          Filesize

          515KB

          MD5

          a67a1c1e2c5f161a164f01f38d0acb80

          SHA1

          baa56e04168045c0ca0dc797d0b52974766c15ff

          SHA256

          2c60905378e05fed2a2c702c07b5f08fb88140d6aa5f9b6aca5389a82bdef1ec

          SHA512

          50977663160abf3e0046447292e8b51c00c8cf75db80fad2c580799b0ba54be69d169b26d8bae60026ddbc19ce4ea73e2deec376fb4621b1cdd588005f4cd733

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziIu7412.exe

          Filesize

          515KB

          MD5

          a67a1c1e2c5f161a164f01f38d0acb80

          SHA1

          baa56e04168045c0ca0dc797d0b52974766c15ff

          SHA256

          2c60905378e05fed2a2c702c07b5f08fb88140d6aa5f9b6aca5389a82bdef1ec

          SHA512

          50977663160abf3e0046447292e8b51c00c8cf75db80fad2c580799b0ba54be69d169b26d8bae60026ddbc19ce4ea73e2deec376fb4621b1cdd588005f4cd733

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it631243.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it631243.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr665357.exe

          Filesize

          445KB

          MD5

          686bd6db689658f3832b67f11991d8d5

          SHA1

          23896c177525181533b536d2857138f0b59ca832

          SHA256

          95503c58b0490b769c611f4b759e0c6bb3ab75f8f63678d570e6d1b3d8bbed44

          SHA512

          837029c980c752851c7c0599d63558eabfc603b176c60fbff04c9576c8431a22cd87ab3fee836a9358acd41cd08c5047bd8cfcaa59cad6678bb1aa72d3638319

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr665357.exe

          Filesize

          445KB

          MD5

          686bd6db689658f3832b67f11991d8d5

          SHA1

          23896c177525181533b536d2857138f0b59ca832

          SHA256

          95503c58b0490b769c611f4b759e0c6bb3ab75f8f63678d570e6d1b3d8bbed44

          SHA512

          837029c980c752851c7c0599d63558eabfc603b176c60fbff04c9576c8431a22cd87ab3fee836a9358acd41cd08c5047bd8cfcaa59cad6678bb1aa72d3638319

        • C:\Windows\Temp\1.exe

          Filesize

          168KB

          MD5

          03728fed675bcde5256342183b1d6f27

          SHA1

          d13eace7d3d92f93756504b274777cc269b222a2

          SHA256

          f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

          SHA512

          6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

        • C:\Windows\Temp\1.exe

          Filesize

          168KB

          MD5

          03728fed675bcde5256342183b1d6f27

          SHA1

          d13eace7d3d92f93756504b274777cc269b222a2

          SHA256

          f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

          SHA512

          6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

        • memory/820-2310-0x00000000001B0000-0x00000000001E0000-memory.dmp

          Filesize

          192KB

        • memory/820-2311-0x0000000002260000-0x0000000002266000-memory.dmp

          Filesize

          24KB

        • memory/820-2325-0x0000000004A10000-0x0000000004A20000-memory.dmp

          Filesize

          64KB

        • memory/820-2320-0x000000000A380000-0x000000000A412000-memory.dmp

          Filesize

          584KB

        • memory/820-2319-0x000000000A260000-0x000000000A2D6000-memory.dmp

          Filesize

          472KB

        • memory/820-2312-0x000000000A4B0000-0x000000000AAB6000-memory.dmp

          Filesize

          6.0MB

        • memory/820-2318-0x000000000A0C0000-0x000000000A10B000-memory.dmp

          Filesize

          300KB

        • memory/820-2317-0x0000000009F40000-0x0000000009F7E000-memory.dmp

          Filesize

          248KB

        • memory/820-2316-0x0000000004A10000-0x0000000004A20000-memory.dmp

          Filesize

          64KB

        • memory/2180-2321-0x0000000005DF0000-0x0000000005E56000-memory.dmp

          Filesize

          408KB

        • memory/2180-2314-0x00000000058F0000-0x0000000005902000-memory.dmp

          Filesize

          72KB

        • memory/2180-2313-0x00000000059D0000-0x0000000005ADA000-memory.dmp

          Filesize

          1.0MB

        • memory/2180-2315-0x00000000058B0000-0x00000000058C0000-memory.dmp

          Filesize

          64KB

        • memory/2180-2322-0x00000000073F0000-0x00000000075B2000-memory.dmp

          Filesize

          1.8MB

        • memory/2180-2323-0x0000000008170000-0x000000000869C000-memory.dmp

          Filesize

          5.2MB

        • memory/2180-2324-0x00000000058B0000-0x00000000058C0000-memory.dmp

          Filesize

          64KB

        • memory/2180-2308-0x0000000003200000-0x0000000003206000-memory.dmp

          Filesize

          24KB

        • memory/2180-2326-0x0000000006CF0000-0x0000000006D40000-memory.dmp

          Filesize

          320KB

        • memory/2180-2305-0x0000000000FE0000-0x000000000100E000-memory.dmp

          Filesize

          184KB

        • memory/3672-2333-0x00000000004B0000-0x00000000004EB000-memory.dmp

          Filesize

          236KB

        • memory/4192-159-0x00000000050C0000-0x0000000005120000-memory.dmp

          Filesize

          384KB

        • memory/4192-181-0x00000000050C0000-0x0000000005120000-memory.dmp

          Filesize

          384KB

        • memory/4192-193-0x00000000050C0000-0x0000000005120000-memory.dmp

          Filesize

          384KB

        • memory/4192-195-0x00000000050C0000-0x0000000005120000-memory.dmp

          Filesize

          384KB

        • memory/4192-197-0x00000000050C0000-0x0000000005120000-memory.dmp

          Filesize

          384KB

        • memory/4192-199-0x00000000050C0000-0x0000000005120000-memory.dmp

          Filesize

          384KB

        • memory/4192-201-0x00000000050C0000-0x0000000005120000-memory.dmp

          Filesize

          384KB

        • memory/4192-203-0x00000000050C0000-0x0000000005120000-memory.dmp

          Filesize

          384KB

        • memory/4192-205-0x00000000050C0000-0x0000000005120000-memory.dmp

          Filesize

          384KB

        • memory/4192-207-0x00000000050C0000-0x0000000005120000-memory.dmp

          Filesize

          384KB

        • memory/4192-209-0x00000000050C0000-0x0000000005120000-memory.dmp

          Filesize

          384KB

        • memory/4192-211-0x00000000050C0000-0x0000000005120000-memory.dmp

          Filesize

          384KB

        • memory/4192-213-0x00000000050C0000-0x0000000005120000-memory.dmp

          Filesize

          384KB

        • memory/4192-215-0x00000000050C0000-0x0000000005120000-memory.dmp

          Filesize

          384KB

        • memory/4192-217-0x00000000050C0000-0x0000000005120000-memory.dmp

          Filesize

          384KB

        • memory/4192-2296-0x00000000052D0000-0x0000000005302000-memory.dmp

          Filesize

          200KB

        • memory/4192-189-0x00000000050C0000-0x0000000005120000-memory.dmp

          Filesize

          384KB

        • memory/4192-2301-0x0000000004B40000-0x0000000004B50000-memory.dmp

          Filesize

          64KB

        • memory/4192-187-0x00000000050C0000-0x0000000005120000-memory.dmp

          Filesize

          384KB

        • memory/4192-185-0x00000000050C0000-0x0000000005120000-memory.dmp

          Filesize

          384KB

        • memory/4192-183-0x00000000050C0000-0x0000000005120000-memory.dmp

          Filesize

          384KB

        • memory/4192-191-0x00000000050C0000-0x0000000005120000-memory.dmp

          Filesize

          384KB

        • memory/4192-179-0x00000000050C0000-0x0000000005120000-memory.dmp

          Filesize

          384KB

        • memory/4192-177-0x00000000050C0000-0x0000000005120000-memory.dmp

          Filesize

          384KB

        • memory/4192-175-0x00000000050C0000-0x0000000005120000-memory.dmp

          Filesize

          384KB

        • memory/4192-173-0x00000000050C0000-0x0000000005120000-memory.dmp

          Filesize

          384KB

        • memory/4192-171-0x00000000050C0000-0x0000000005120000-memory.dmp

          Filesize

          384KB

        • memory/4192-169-0x00000000050C0000-0x0000000005120000-memory.dmp

          Filesize

          384KB

        • memory/4192-167-0x00000000050C0000-0x0000000005120000-memory.dmp

          Filesize

          384KB

        • memory/4192-165-0x00000000050C0000-0x0000000005120000-memory.dmp

          Filesize

          384KB

        • memory/4192-163-0x00000000050C0000-0x0000000005120000-memory.dmp

          Filesize

          384KB

        • memory/4192-161-0x00000000050C0000-0x0000000005120000-memory.dmp

          Filesize

          384KB

        • memory/4192-157-0x00000000050C0000-0x0000000005120000-memory.dmp

          Filesize

          384KB

        • memory/4192-155-0x00000000050C0000-0x0000000005120000-memory.dmp

          Filesize

          384KB

        • memory/4192-154-0x00000000050C0000-0x0000000005120000-memory.dmp

          Filesize

          384KB

        • memory/4192-153-0x0000000004B40000-0x0000000004B50000-memory.dmp

          Filesize

          64KB

        • memory/4192-151-0x0000000004B40000-0x0000000004B50000-memory.dmp

          Filesize

          64KB

        • memory/4192-152-0x0000000004B40000-0x0000000004B50000-memory.dmp

          Filesize

          64KB

        • memory/4192-150-0x0000000000520000-0x000000000057B000-memory.dmp

          Filesize

          364KB

        • memory/4192-149-0x00000000050C0000-0x0000000005126000-memory.dmp

          Filesize

          408KB

        • memory/4192-148-0x0000000004BC0000-0x00000000050BE000-memory.dmp

          Filesize

          5.0MB

        • memory/4192-147-0x0000000004B50000-0x0000000004BB8000-memory.dmp

          Filesize

          416KB

        • memory/4200-141-0x0000000000040000-0x000000000004A000-memory.dmp

          Filesize

          40KB