Analysis

  • max time kernel
    143s
  • max time network
    100s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13/04/2023, 14:59

General

  • Target

    4167d9c866d32884f813c285e2fb93c177bfc488ffd52a584d2d2c4942ae35a1.exe

  • Size

    952KB

  • MD5

    02c62234165310c994892f569a7d2135

  • SHA1

    4b28f627dfe4f935f48e8ffee5e75b11d2010c9b

  • SHA256

    4167d9c866d32884f813c285e2fb93c177bfc488ffd52a584d2d2c4942ae35a1

  • SHA512

    f6c9c6189debc680f75b1f7d5fbfffe066a11776700bb31f6acf0c3fedfba5221ea4145b95d70344bc56668ff688a9f2524dfd1e321ba2c02a723401267aa09c

  • SSDEEP

    24576:wy2zxwj7XhVHv/36B4w5JAE/v4YjE6ENV6ZdmqLxhfQqpZyJg:3zjzhVWQENo6ED6nLLxKX

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diro

C2

185.161.248.90:4125

Attributes
  • auth_value

    ae95bda0dd2e95169886a3a68138568b

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4167d9c866d32884f813c285e2fb93c177bfc488ffd52a584d2d2c4942ae35a1.exe
    "C:\Users\Admin\AppData\Local\Temp\4167d9c866d32884f813c285e2fb93c177bfc488ffd52a584d2d2c4942ae35a1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1224
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziia5826.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziia5826.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1492
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziwM9234.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziwM9234.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1780
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it574601.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it574601.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:632
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr877860.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr877860.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2108
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3588
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp069321.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp069321.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4116
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr293817.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr293817.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      PID:656
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 620
        3⤵
        • Program crash
        PID:2420
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 700
        3⤵
        • Program crash
        PID:4024
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 836
        3⤵
        • Program crash
        PID:3192
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 820
        3⤵
        • Program crash
        PID:1444
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 884
        3⤵
        • Program crash
        PID:1992
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 872
        3⤵
        • Program crash
        PID:2100
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 1120
        3⤵
        • Program crash
        PID:2056
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 1152
        3⤵
        • Program crash
        PID:4072
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 1204
        3⤵
        • Program crash
        PID:3572

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr293817.exe

    Filesize

    270KB

    MD5

    0f5e12a3ec9afedeeb828dd9f77fb54e

    SHA1

    ec95fe1e937e91f82172402552abff0f13ebb38b

    SHA256

    291e3f01cff765c4ed0006e0a16402180879ae6db613285b73a74dd7dec149d6

    SHA512

    9869b49de53eb5b18554c2c5500973ecf59f40227ae2b7efa1bd06a6678c68c446814b79457025d5dac57f21a7886d2f7db7f4a840f0a7010be0372a01defad1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr293817.exe

    Filesize

    270KB

    MD5

    0f5e12a3ec9afedeeb828dd9f77fb54e

    SHA1

    ec95fe1e937e91f82172402552abff0f13ebb38b

    SHA256

    291e3f01cff765c4ed0006e0a16402180879ae6db613285b73a74dd7dec149d6

    SHA512

    9869b49de53eb5b18554c2c5500973ecf59f40227ae2b7efa1bd06a6678c68c446814b79457025d5dac57f21a7886d2f7db7f4a840f0a7010be0372a01defad1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziia5826.exe

    Filesize

    668KB

    MD5

    c6c4511e69422cd254dbfbfb9c96076e

    SHA1

    ad5eb11b9e7f1d610d0c6442af9345b14bc8e56f

    SHA256

    e169323189e1b2ab26c712bfe27f56783a9586a2e833d4fb7fed1c3c0c65b9b6

    SHA512

    ea4e27a8f81807e28682bd79d26e370cb93ffd0dc181bb61b6c02826289e181448eccbca19ac4148b92ab7a50fed3ed281afd7c0a950efe25987ba211cb6ff10

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziia5826.exe

    Filesize

    668KB

    MD5

    c6c4511e69422cd254dbfbfb9c96076e

    SHA1

    ad5eb11b9e7f1d610d0c6442af9345b14bc8e56f

    SHA256

    e169323189e1b2ab26c712bfe27f56783a9586a2e833d4fb7fed1c3c0c65b9b6

    SHA512

    ea4e27a8f81807e28682bd79d26e370cb93ffd0dc181bb61b6c02826289e181448eccbca19ac4148b92ab7a50fed3ed281afd7c0a950efe25987ba211cb6ff10

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp069321.exe

    Filesize

    168KB

    MD5

    2c90c4c49415063fd2bf563d3092712d

    SHA1

    25435d061f0be4fcecb10e51d9c96fffaf5437e7

    SHA256

    8809b93d5caaecbbc18ebbc128c94f43872649042a8062fb1596b7de7a557707

    SHA512

    6f266d575cd7539ba8459af46c7978dadb08365efdbb48eb0566dc073f1af78e9e84ec1fce28bca40b03ec8e143ce67634dbe282d8c2b0811e92819129088f3a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp069321.exe

    Filesize

    168KB

    MD5

    2c90c4c49415063fd2bf563d3092712d

    SHA1

    25435d061f0be4fcecb10e51d9c96fffaf5437e7

    SHA256

    8809b93d5caaecbbc18ebbc128c94f43872649042a8062fb1596b7de7a557707

    SHA512

    6f266d575cd7539ba8459af46c7978dadb08365efdbb48eb0566dc073f1af78e9e84ec1fce28bca40b03ec8e143ce67634dbe282d8c2b0811e92819129088f3a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziwM9234.exe

    Filesize

    514KB

    MD5

    f92ce1e8a982e1805fa70561d9e28db3

    SHA1

    410a81529f5aa00c91f3f1d0a4d3ba63301e5ca4

    SHA256

    83fbb5b032962426f8e334565717dfd185ca1651bc6e4b7a7976fa6c57dd5078

    SHA512

    dbc813883ba08f771e25ddf48ae4e30fe57f2d82739632ec9393e31a629304df4b0079941730a9f4b9ea06df5477974fa6d18c489b1d60ab49289c65bf91b900

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziwM9234.exe

    Filesize

    514KB

    MD5

    f92ce1e8a982e1805fa70561d9e28db3

    SHA1

    410a81529f5aa00c91f3f1d0a4d3ba63301e5ca4

    SHA256

    83fbb5b032962426f8e334565717dfd185ca1651bc6e4b7a7976fa6c57dd5078

    SHA512

    dbc813883ba08f771e25ddf48ae4e30fe57f2d82739632ec9393e31a629304df4b0079941730a9f4b9ea06df5477974fa6d18c489b1d60ab49289c65bf91b900

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it574601.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it574601.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr877860.exe

    Filesize

    445KB

    MD5

    1299afcb5bbbf66c98af64d10fae6582

    SHA1

    5b6a1547e465ff5ec1cae6256d1cc68811c3471c

    SHA256

    7718ac03e1effe0a9888ad6d4a33463ece050ef7e62278bc609c90cd670e457b

    SHA512

    90b33a6830b141b37efef64bbb8ca6ca262b91afdd89597387b9303616fc60074407abf9a8838d8cc1c453d5059d9863e584860a238f5633ecd7c562ad4a3daf

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr877860.exe

    Filesize

    445KB

    MD5

    1299afcb5bbbf66c98af64d10fae6582

    SHA1

    5b6a1547e465ff5ec1cae6256d1cc68811c3471c

    SHA256

    7718ac03e1effe0a9888ad6d4a33463ece050ef7e62278bc609c90cd670e457b

    SHA512

    90b33a6830b141b37efef64bbb8ca6ca262b91afdd89597387b9303616fc60074407abf9a8838d8cc1c453d5059d9863e584860a238f5633ecd7c562ad4a3daf

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • memory/632-142-0x00000000004B0000-0x00000000004BA000-memory.dmp

    Filesize

    40KB

  • memory/656-2332-0x0000000000590000-0x00000000005CB000-memory.dmp

    Filesize

    236KB

  • memory/2108-194-0x00000000050A0000-0x0000000005100000-memory.dmp

    Filesize

    384KB

  • memory/2108-212-0x00000000050A0000-0x0000000005100000-memory.dmp

    Filesize

    384KB

  • memory/2108-158-0x00000000050A0000-0x0000000005100000-memory.dmp

    Filesize

    384KB

  • memory/2108-160-0x00000000050A0000-0x0000000005100000-memory.dmp

    Filesize

    384KB

  • memory/2108-162-0x00000000050A0000-0x0000000005100000-memory.dmp

    Filesize

    384KB

  • memory/2108-164-0x00000000050A0000-0x0000000005100000-memory.dmp

    Filesize

    384KB

  • memory/2108-166-0x00000000050A0000-0x0000000005100000-memory.dmp

    Filesize

    384KB

  • memory/2108-168-0x00000000050A0000-0x0000000005100000-memory.dmp

    Filesize

    384KB

  • memory/2108-170-0x00000000050A0000-0x0000000005100000-memory.dmp

    Filesize

    384KB

  • memory/2108-172-0x00000000050A0000-0x0000000005100000-memory.dmp

    Filesize

    384KB

  • memory/2108-174-0x00000000050A0000-0x0000000005100000-memory.dmp

    Filesize

    384KB

  • memory/2108-176-0x00000000050A0000-0x0000000005100000-memory.dmp

    Filesize

    384KB

  • memory/2108-178-0x00000000050A0000-0x0000000005100000-memory.dmp

    Filesize

    384KB

  • memory/2108-180-0x00000000050A0000-0x0000000005100000-memory.dmp

    Filesize

    384KB

  • memory/2108-182-0x00000000050A0000-0x0000000005100000-memory.dmp

    Filesize

    384KB

  • memory/2108-184-0x00000000050A0000-0x0000000005100000-memory.dmp

    Filesize

    384KB

  • memory/2108-186-0x00000000050A0000-0x0000000005100000-memory.dmp

    Filesize

    384KB

  • memory/2108-188-0x00000000050A0000-0x0000000005100000-memory.dmp

    Filesize

    384KB

  • memory/2108-190-0x00000000050A0000-0x0000000005100000-memory.dmp

    Filesize

    384KB

  • memory/2108-192-0x00000000050A0000-0x0000000005100000-memory.dmp

    Filesize

    384KB

  • memory/2108-155-0x00000000050A0000-0x0000000005100000-memory.dmp

    Filesize

    384KB

  • memory/2108-196-0x00000000050A0000-0x0000000005100000-memory.dmp

    Filesize

    384KB

  • memory/2108-198-0x00000000050A0000-0x0000000005100000-memory.dmp

    Filesize

    384KB

  • memory/2108-200-0x00000000050A0000-0x0000000005100000-memory.dmp

    Filesize

    384KB

  • memory/2108-202-0x00000000050A0000-0x0000000005100000-memory.dmp

    Filesize

    384KB

  • memory/2108-204-0x00000000050A0000-0x0000000005100000-memory.dmp

    Filesize

    384KB

  • memory/2108-208-0x00000000050A0000-0x0000000005100000-memory.dmp

    Filesize

    384KB

  • memory/2108-206-0x00000000050A0000-0x0000000005100000-memory.dmp

    Filesize

    384KB

  • memory/2108-210-0x00000000050A0000-0x0000000005100000-memory.dmp

    Filesize

    384KB

  • memory/2108-156-0x00000000050A0000-0x0000000005100000-memory.dmp

    Filesize

    384KB

  • memory/2108-214-0x00000000050A0000-0x0000000005100000-memory.dmp

    Filesize

    384KB

  • memory/2108-216-0x00000000050A0000-0x0000000005100000-memory.dmp

    Filesize

    384KB

  • memory/2108-218-0x00000000050A0000-0x0000000005100000-memory.dmp

    Filesize

    384KB

  • memory/2108-2297-0x00000000052D0000-0x0000000005302000-memory.dmp

    Filesize

    200KB

  • memory/2108-2299-0x0000000004A50000-0x0000000004A60000-memory.dmp

    Filesize

    64KB

  • memory/2108-154-0x0000000004A50000-0x0000000004A60000-memory.dmp

    Filesize

    64KB

  • memory/2108-153-0x0000000004A50000-0x0000000004A60000-memory.dmp

    Filesize

    64KB

  • memory/2108-148-0x00000000049E0000-0x0000000004A48000-memory.dmp

    Filesize

    416KB

  • memory/2108-152-0x0000000004A50000-0x0000000004A60000-memory.dmp

    Filesize

    64KB

  • memory/2108-149-0x0000000004B60000-0x000000000505E000-memory.dmp

    Filesize

    5.0MB

  • memory/2108-151-0x0000000000600000-0x000000000065B000-memory.dmp

    Filesize

    364KB

  • memory/2108-150-0x00000000050A0000-0x0000000005106000-memory.dmp

    Filesize

    408KB

  • memory/3588-2321-0x00000000057B0000-0x0000000005842000-memory.dmp

    Filesize

    584KB

  • memory/3588-2308-0x0000000000900000-0x000000000092E000-memory.dmp

    Filesize

    184KB

  • memory/3588-2311-0x0000000002B80000-0x0000000002B86000-memory.dmp

    Filesize

    24KB

  • memory/3588-2325-0x00000000085D0000-0x0000000008AFC000-memory.dmp

    Filesize

    5.2MB

  • memory/3588-2324-0x00000000065F0000-0x00000000067B2000-memory.dmp

    Filesize

    1.8MB

  • memory/3588-2323-0x00000000063D0000-0x0000000006420000-memory.dmp

    Filesize

    320KB

  • memory/3588-2319-0x0000000005240000-0x0000000005250000-memory.dmp

    Filesize

    64KB

  • memory/4116-2316-0x000000000A850000-0x000000000A88E000-memory.dmp

    Filesize

    248KB

  • memory/4116-2320-0x000000000AB70000-0x000000000ABE6000-memory.dmp

    Filesize

    472KB

  • memory/4116-2318-0x00000000052D0000-0x00000000052E0000-memory.dmp

    Filesize

    64KB

  • memory/4116-2322-0x000000000ABF0000-0x000000000AC56000-memory.dmp

    Filesize

    408KB

  • memory/4116-2317-0x000000000A9D0000-0x000000000AA1B000-memory.dmp

    Filesize

    300KB

  • memory/4116-2312-0x0000000001340000-0x0000000001346000-memory.dmp

    Filesize

    24KB

  • memory/4116-2315-0x000000000A7F0000-0x000000000A802000-memory.dmp

    Filesize

    72KB

  • memory/4116-2314-0x000000000A8C0000-0x000000000A9CA000-memory.dmp

    Filesize

    1.0MB

  • memory/4116-2313-0x000000000AD70000-0x000000000B376000-memory.dmp

    Filesize

    6.0MB

  • memory/4116-2310-0x0000000000AC0000-0x0000000000AF0000-memory.dmp

    Filesize

    192KB