Analysis

  • max time kernel
    144s
  • max time network
    139s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13/04/2023, 16:31

General

  • Target

    eb7f7c68dde6060e1f820b11eceead4ffe76d2d351af52735512bee055409ff4.exe

  • Size

    1.1MB

  • MD5

    55d974d808acf7010dcc1cfecdc163e6

  • SHA1

    74e1298ea9e15c8f7a6694d148fadd3d7116c31d

  • SHA256

    eb7f7c68dde6060e1f820b11eceead4ffe76d2d351af52735512bee055409ff4

  • SHA512

    bede351aee25681c3954c7db844bf996c8007f4f5d698f0e61f650cfe795f3542b7b404809502bb99ce7ddf2ab4f2ee147f491c252d570bc5cb162d5ce7df899

  • SSDEEP

    24576:VyizX0xX2H8hL8MNmLn3Q7a18CIlHj8pWmvSuv+pVE0oKq3:wizX0xGoLW73Q7m8CMARvOroKq

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diro

C2

185.161.248.90:4125

Attributes
  • auth_value

    ae95bda0dd2e95169886a3a68138568b

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb7f7c68dde6060e1f820b11eceead4ffe76d2d351af52735512bee055409ff4.exe
    "C:\Users\Admin\AppData\Local\Temp\eb7f7c68dde6060e1f820b11eceead4ffe76d2d351af52735512bee055409ff4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4148
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un460887.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un460887.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3596
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un142153.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un142153.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2344
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr093556.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr093556.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5112
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu624158.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu624158.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4552
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2120
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk174706.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk174706.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3232
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si084768.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si084768.exe
      2⤵
      • Executes dropped EXE
      PID:2268
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 620
        3⤵
        • Program crash
        PID:2080
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 700
        3⤵
        • Program crash
        PID:4296
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 840
        3⤵
        • Program crash
        PID:4248
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 848
        3⤵
        • Program crash
        PID:3928
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 876
        3⤵
        • Program crash
        PID:2616
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 888
        3⤵
        • Program crash
        PID:1776
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 1084
        3⤵
        • Program crash
        PID:5092

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si084768.exe

    Filesize

    309KB

    MD5

    36d2dec496e84a6fea85386654562c7f

    SHA1

    f72ca2fe77224156465c65b91aba219992fd6b60

    SHA256

    295cfdd068a249427bdbf1c1b30e7dc615371e9f82fd9d089e923ad5c9762f64

    SHA512

    40f16d47e9c7ed384d4ef8ae39a6a29f6dff3b08b51860d3362ecedab905265ccc180ff1578c0861a772b16638ab7deaf3731703ea10624166890a7c3cd96592

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si084768.exe

    Filesize

    309KB

    MD5

    36d2dec496e84a6fea85386654562c7f

    SHA1

    f72ca2fe77224156465c65b91aba219992fd6b60

    SHA256

    295cfdd068a249427bdbf1c1b30e7dc615371e9f82fd9d089e923ad5c9762f64

    SHA512

    40f16d47e9c7ed384d4ef8ae39a6a29f6dff3b08b51860d3362ecedab905265ccc180ff1578c0861a772b16638ab7deaf3731703ea10624166890a7c3cd96592

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un460887.exe

    Filesize

    818KB

    MD5

    70d2eacf857717dfdde97fab77168ebc

    SHA1

    3234e5b6e28902f41da23e34e76f742885f94146

    SHA256

    9a39b4a4ba1578677a1cf74c7c8247469f2bf82fb2fb7c0e2f94b55b651e2834

    SHA512

    aa253bea89415aef9c9d958fd34c497e9372554acda6ea21754b8825e46d65d0a022d9fefedea15fa805c04c0b5f3197152b4870f8dcf3790c0df0a73b8c7b65

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un460887.exe

    Filesize

    818KB

    MD5

    70d2eacf857717dfdde97fab77168ebc

    SHA1

    3234e5b6e28902f41da23e34e76f742885f94146

    SHA256

    9a39b4a4ba1578677a1cf74c7c8247469f2bf82fb2fb7c0e2f94b55b651e2834

    SHA512

    aa253bea89415aef9c9d958fd34c497e9372554acda6ea21754b8825e46d65d0a022d9fefedea15fa805c04c0b5f3197152b4870f8dcf3790c0df0a73b8c7b65

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk174706.exe

    Filesize

    169KB

    MD5

    cfb3d13f43bfc042057d49c13e53a228

    SHA1

    3f77ab005f7897fc993b077df9fbfd029e4884ba

    SHA256

    1eebfd7544ab87d04f2cec540a6397dd203f915a665db0df0bac8d12fad7f821

    SHA512

    303dbff71aa2322567c81cb059722c373cfe2e9c456f8e61c24c2e72917835412f11a33535ed68d434cac2e13d543d8429b8b8bc28d3baf5c2b704709eb88a56

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk174706.exe

    Filesize

    169KB

    MD5

    cfb3d13f43bfc042057d49c13e53a228

    SHA1

    3f77ab005f7897fc993b077df9fbfd029e4884ba

    SHA256

    1eebfd7544ab87d04f2cec540a6397dd203f915a665db0df0bac8d12fad7f821

    SHA512

    303dbff71aa2322567c81cb059722c373cfe2e9c456f8e61c24c2e72917835412f11a33535ed68d434cac2e13d543d8429b8b8bc28d3baf5c2b704709eb88a56

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un142153.exe

    Filesize

    664KB

    MD5

    3006157b98891c01b5df9deaf2d03187

    SHA1

    00f37d2d381a65e9eaa4f1a0792932c65417cba0

    SHA256

    9fafd2250e4388b8e5598d4d33d337d3563115da75cf07e413c38c8c01fdf4d5

    SHA512

    17b60daf87391af0fb4631bf3483a39382775a0058025658ea0cfc72cee1c4fd903e80543840a60082c3d77b1af0861e81ddba9a785a1e9dd50af4a40aca82f5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un142153.exe

    Filesize

    664KB

    MD5

    3006157b98891c01b5df9deaf2d03187

    SHA1

    00f37d2d381a65e9eaa4f1a0792932c65417cba0

    SHA256

    9fafd2250e4388b8e5598d4d33d337d3563115da75cf07e413c38c8c01fdf4d5

    SHA512

    17b60daf87391af0fb4631bf3483a39382775a0058025658ea0cfc72cee1c4fd903e80543840a60082c3d77b1af0861e81ddba9a785a1e9dd50af4a40aca82f5

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr093556.exe

    Filesize

    317KB

    MD5

    fb5e1f6bd09ee5055659c5603d8335fc

    SHA1

    15e26cf47adbfd5116c859383a7ec7266ba5ff95

    SHA256

    9e4d704296a8179d01c7f6572626db31b5a24e91094dd8df2cf1753b75b519a4

    SHA512

    d9c75c7862acf1f411cfc54e3b1ba1951976e4984fd46d4f4d6a5669460cd4a8587e02dbbe26b0f04b042949a2baefe9721adcdf6ca4d7dba8e4e5ee2df9d720

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr093556.exe

    Filesize

    317KB

    MD5

    fb5e1f6bd09ee5055659c5603d8335fc

    SHA1

    15e26cf47adbfd5116c859383a7ec7266ba5ff95

    SHA256

    9e4d704296a8179d01c7f6572626db31b5a24e91094dd8df2cf1753b75b519a4

    SHA512

    d9c75c7862acf1f411cfc54e3b1ba1951976e4984fd46d4f4d6a5669460cd4a8587e02dbbe26b0f04b042949a2baefe9721adcdf6ca4d7dba8e4e5ee2df9d720

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu624158.exe

    Filesize

    501KB

    MD5

    a72bd75e4dac8b439002301ffd6c70c7

    SHA1

    74dcf7d9b3b0dbff14d04365cba3712d1c5f7d54

    SHA256

    ff7c4d21fe81aeffaf830e850d5528314fed42f3f37d06cd0d94dedc5eaec25a

    SHA512

    3ce2177be80f8870411794a6edbad836e309f4172b5e615436ac1c30975c7d99432c8a2bc58337ad1d1df8c032d0a68efc5d9e81af70e37db9b90d15073c212d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu624158.exe

    Filesize

    501KB

    MD5

    a72bd75e4dac8b439002301ffd6c70c7

    SHA1

    74dcf7d9b3b0dbff14d04365cba3712d1c5f7d54

    SHA256

    ff7c4d21fe81aeffaf830e850d5528314fed42f3f37d06cd0d94dedc5eaec25a

    SHA512

    3ce2177be80f8870411794a6edbad836e309f4172b5e615436ac1c30975c7d99432c8a2bc58337ad1d1df8c032d0a68efc5d9e81af70e37db9b90d15073c212d

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • memory/2120-2358-0x0000000004F70000-0x0000000004F80000-memory.dmp

    Filesize

    64KB

  • memory/2120-2338-0x0000000000740000-0x000000000076E000-memory.dmp

    Filesize

    184KB

  • memory/2120-2354-0x000000000A870000-0x000000000A8D6000-memory.dmp

    Filesize

    408KB

  • memory/2120-2351-0x000000000A650000-0x000000000A69B000-memory.dmp

    Filesize

    300KB

  • memory/2120-2342-0x0000000002700000-0x0000000002706000-memory.dmp

    Filesize

    24KB

  • memory/2120-2348-0x0000000004F70000-0x0000000004F80000-memory.dmp

    Filesize

    64KB

  • memory/2120-2347-0x000000000A470000-0x000000000A482000-memory.dmp

    Filesize

    72KB

  • memory/2268-2366-0x00000000005E0000-0x000000000061B000-memory.dmp

    Filesize

    236KB

  • memory/3232-2352-0x000000000AF40000-0x000000000AFB6000-memory.dmp

    Filesize

    472KB

  • memory/3232-2345-0x000000000B180000-0x000000000B786000-memory.dmp

    Filesize

    6.0MB

  • memory/3232-2344-0x0000000001510000-0x0000000001516000-memory.dmp

    Filesize

    24KB

  • memory/3232-2343-0x0000000000E90000-0x0000000000EC0000-memory.dmp

    Filesize

    192KB

  • memory/3232-2346-0x000000000AC90000-0x000000000AD9A000-memory.dmp

    Filesize

    1.0MB

  • memory/3232-2350-0x000000000AC20000-0x000000000AC5E000-memory.dmp

    Filesize

    248KB

  • memory/3232-2349-0x0000000003150000-0x0000000003160000-memory.dmp

    Filesize

    64KB

  • memory/3232-2353-0x000000000B060000-0x000000000B0F2000-memory.dmp

    Filesize

    584KB

  • memory/3232-2355-0x000000000C360000-0x000000000C522000-memory.dmp

    Filesize

    1.8MB

  • memory/3232-2356-0x000000000CA60000-0x000000000CF8C000-memory.dmp

    Filesize

    5.2MB

  • memory/3232-2357-0x000000000C240000-0x000000000C290000-memory.dmp

    Filesize

    320KB

  • memory/3232-2359-0x0000000003150000-0x0000000003160000-memory.dmp

    Filesize

    64KB

  • memory/4552-195-0x00000000050F0000-0x0000000005150000-memory.dmp

    Filesize

    384KB

  • memory/4552-183-0x00000000050F0000-0x0000000005156000-memory.dmp

    Filesize

    408KB

  • memory/4552-185-0x00000000050F0000-0x0000000005150000-memory.dmp

    Filesize

    384KB

  • memory/4552-187-0x00000000050F0000-0x0000000005150000-memory.dmp

    Filesize

    384KB

  • memory/4552-189-0x00000000050F0000-0x0000000005150000-memory.dmp

    Filesize

    384KB

  • memory/4552-184-0x00000000050F0000-0x0000000005150000-memory.dmp

    Filesize

    384KB

  • memory/4552-191-0x00000000050F0000-0x0000000005150000-memory.dmp

    Filesize

    384KB

  • memory/4552-193-0x00000000050F0000-0x0000000005150000-memory.dmp

    Filesize

    384KB

  • memory/4552-182-0x00000000025D0000-0x0000000002638000-memory.dmp

    Filesize

    416KB

  • memory/4552-198-0x00000000050F0000-0x0000000005150000-memory.dmp

    Filesize

    384KB

  • memory/4552-199-0x0000000002660000-0x0000000002670000-memory.dmp

    Filesize

    64KB

  • memory/4552-202-0x0000000002660000-0x0000000002670000-memory.dmp

    Filesize

    64KB

  • memory/4552-204-0x0000000002660000-0x0000000002670000-memory.dmp

    Filesize

    64KB

  • memory/4552-207-0x00000000050F0000-0x0000000005150000-memory.dmp

    Filesize

    384KB

  • memory/4552-205-0x00000000050F0000-0x0000000005150000-memory.dmp

    Filesize

    384KB

  • memory/4552-201-0x00000000050F0000-0x0000000005150000-memory.dmp

    Filesize

    384KB

  • memory/4552-197-0x00000000004F0000-0x000000000054B000-memory.dmp

    Filesize

    364KB

  • memory/4552-209-0x00000000050F0000-0x0000000005150000-memory.dmp

    Filesize

    384KB

  • memory/4552-211-0x00000000050F0000-0x0000000005150000-memory.dmp

    Filesize

    384KB

  • memory/4552-213-0x00000000050F0000-0x0000000005150000-memory.dmp

    Filesize

    384KB

  • memory/4552-215-0x00000000050F0000-0x0000000005150000-memory.dmp

    Filesize

    384KB

  • memory/4552-217-0x00000000050F0000-0x0000000005150000-memory.dmp

    Filesize

    384KB

  • memory/4552-219-0x00000000050F0000-0x0000000005150000-memory.dmp

    Filesize

    384KB

  • memory/4552-221-0x00000000050F0000-0x0000000005150000-memory.dmp

    Filesize

    384KB

  • memory/4552-2330-0x00000000052E0000-0x0000000005312000-memory.dmp

    Filesize

    200KB

  • memory/5112-177-0x00000000021B0000-0x00000000021C0000-memory.dmp

    Filesize

    64KB

  • memory/5112-176-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/5112-174-0x0000000000590000-0x00000000005BD000-memory.dmp

    Filesize

    180KB

  • memory/5112-173-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/5112-172-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/5112-170-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/5112-168-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/5112-166-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/5112-164-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/5112-162-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/5112-160-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/5112-158-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/5112-156-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/5112-154-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/5112-152-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/5112-150-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/5112-148-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/5112-146-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/5112-145-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/5112-144-0x00000000021B0000-0x00000000021C0000-memory.dmp

    Filesize

    64KB

  • memory/5112-143-0x00000000021B0000-0x00000000021C0000-memory.dmp

    Filesize

    64KB

  • memory/5112-142-0x00000000021B0000-0x00000000021C0000-memory.dmp

    Filesize

    64KB

  • memory/5112-141-0x0000000002650000-0x0000000002668000-memory.dmp

    Filesize

    96KB

  • memory/5112-140-0x0000000004B90000-0x000000000508E000-memory.dmp

    Filesize

    5.0MB

  • memory/5112-139-0x0000000000790000-0x00000000007AA000-memory.dmp

    Filesize

    104KB

  • memory/5112-138-0x0000000000590000-0x00000000005BD000-memory.dmp

    Filesize

    180KB