Analysis

  • max time kernel
    142s
  • max time network
    97s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13/04/2023, 17:57

General

  • Target

    2376ddddb149422c650e37aab77cba56728e1efa0d0a78fc37180fd42997e09c.exe

  • Size

    961KB

  • MD5

    02a6d4c8e8f79535ad3d4040fd9e026f

  • SHA1

    2cf9ad2a2b8a620fbb915bbb86cd2a2802c1082f

  • SHA256

    2376ddddb149422c650e37aab77cba56728e1efa0d0a78fc37180fd42997e09c

  • SHA512

    6024cf9a130b0a9c4b6e43ecf213519e5ecda7e29964c7d75d82ea278e6218665d099052d3eff74ec0a6066f336f0849d199054cf6fa147c1f212fce06d07eb0

  • SSDEEP

    24576:RyPMbdPMY6c/mArNP+HC5LUTp/Wl3B1cYFTq1tV0G30cApb:EWdPv6c/myx+HCRup/WlR1cCU3

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diro

C2

185.161.248.90:4125

Attributes
  • auth_value

    ae95bda0dd2e95169886a3a68138568b

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2376ddddb149422c650e37aab77cba56728e1efa0d0a78fc37180fd42997e09c.exe
    "C:\Users\Admin\AppData\Local\Temp\2376ddddb149422c650e37aab77cba56728e1efa0d0a78fc37180fd42997e09c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4124
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidQ9307.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidQ9307.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3924
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zipl6348.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zipl6348.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4944
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it913946.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it913946.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1928
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr994766.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr994766.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2444
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:220
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp823463.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp823463.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2432
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr588925.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr588925.exe
      2⤵
      • Executes dropped EXE
      PID:4036
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4036 -s 616
        3⤵
        • Program crash
        PID:4080
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4036 -s 696
        3⤵
        • Program crash
        PID:2012
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4036 -s 836
        3⤵
        • Program crash
        PID:1928
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4036 -s 844
        3⤵
        • Program crash
        PID:4208
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4036 -s 872
        3⤵
        • Program crash
        PID:4664
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4036 -s 852
        3⤵
        • Program crash
        PID:4820
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4036 -s 1072
        3⤵
        • Program crash
        PID:4884

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr588925.exe

          Filesize

          308KB

          MD5

          004cf832ce80f6b5097bd695e8aad05e

          SHA1

          c02648897a01d9ee7e01032adedad070aaf45b7e

          SHA256

          e980c96bc4094cb299be580ae171610df142b3bca8faa44b127b4014b838477b

          SHA512

          a07906d017595df228b59d8ce7ac337e75ce94d570ced6b4c954438a3b75c65fe102f4d088106220a0b673f781022295a8229f7b578d81c5cea66b201d7487e3

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr588925.exe

          Filesize

          308KB

          MD5

          004cf832ce80f6b5097bd695e8aad05e

          SHA1

          c02648897a01d9ee7e01032adedad070aaf45b7e

          SHA256

          e980c96bc4094cb299be580ae171610df142b3bca8faa44b127b4014b838477b

          SHA512

          a07906d017595df228b59d8ce7ac337e75ce94d570ced6b4c954438a3b75c65fe102f4d088106220a0b673f781022295a8229f7b578d81c5cea66b201d7487e3

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidQ9307.exe

          Filesize

          678KB

          MD5

          0b7860ad3d277c599206a6529e273b83

          SHA1

          bc3672395bfa8dee0a8b4cc98015e6b5680d18c7

          SHA256

          b2340bd20f3db776a22d7140946de147989e6be858bccc9e82705a3432330a30

          SHA512

          3ddb48f13d999431bc2c2152a79c31bbb8d8d075300c15ac616bfe0e0a28bd219a89059394a71bfaec6497d32ddb5ad97a5969b913cdfb9b0c59aba968a22c32

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidQ9307.exe

          Filesize

          678KB

          MD5

          0b7860ad3d277c599206a6529e273b83

          SHA1

          bc3672395bfa8dee0a8b4cc98015e6b5680d18c7

          SHA256

          b2340bd20f3db776a22d7140946de147989e6be858bccc9e82705a3432330a30

          SHA512

          3ddb48f13d999431bc2c2152a79c31bbb8d8d075300c15ac616bfe0e0a28bd219a89059394a71bfaec6497d32ddb5ad97a5969b913cdfb9b0c59aba968a22c32

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp823463.exe

          Filesize

          169KB

          MD5

          c48592c4613d69f44d4ddc6e6fb3e1be

          SHA1

          3bad66c19199b9fdff0a1615baf1a09c36941916

          SHA256

          1c9a955d9d1a31d31fa5b70a75336a8d577227efdd5d47b6b23f76d23fb19a80

          SHA512

          44e487bb9d8041c44f07fdeacc193a4150bf24795fb35e148d9fb212985ceb98fad7bbabefda983be7bfe1db347ce04dae1bfacfeb813e8c65e7dff7361020e9

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp823463.exe

          Filesize

          169KB

          MD5

          c48592c4613d69f44d4ddc6e6fb3e1be

          SHA1

          3bad66c19199b9fdff0a1615baf1a09c36941916

          SHA256

          1c9a955d9d1a31d31fa5b70a75336a8d577227efdd5d47b6b23f76d23fb19a80

          SHA512

          44e487bb9d8041c44f07fdeacc193a4150bf24795fb35e148d9fb212985ceb98fad7bbabefda983be7bfe1db347ce04dae1bfacfeb813e8c65e7dff7361020e9

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zipl6348.exe

          Filesize

          525KB

          MD5

          01f4df043ae5f14bc8992e524c3cd3ef

          SHA1

          537aed3e289462492f9d6f4d542c4c8ce15fcea8

          SHA256

          320405bf4c7a2ffb9d96c19b8a20c36310db69fab55659bd8cd6412fc93a1f48

          SHA512

          b00d597732f4aab127f6317bc883f697cabbd244a692a74f7693f49e438e3a939be8b1a64d5419dbfa9f775319f008fb934fe2bf8a9f5b4f9114f45357575cd3

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zipl6348.exe

          Filesize

          525KB

          MD5

          01f4df043ae5f14bc8992e524c3cd3ef

          SHA1

          537aed3e289462492f9d6f4d542c4c8ce15fcea8

          SHA256

          320405bf4c7a2ffb9d96c19b8a20c36310db69fab55659bd8cd6412fc93a1f48

          SHA512

          b00d597732f4aab127f6317bc883f697cabbd244a692a74f7693f49e438e3a939be8b1a64d5419dbfa9f775319f008fb934fe2bf8a9f5b4f9114f45357575cd3

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it913946.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it913946.exe

          Filesize

          11KB

          MD5

          7e93bacbbc33e6652e147e7fe07572a0

          SHA1

          421a7167da01c8da4dc4d5234ca3dd84e319e762

          SHA256

          850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

          SHA512

          250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr994766.exe

          Filesize

          501KB

          MD5

          e7b82a471cca8a9ab4cb8ff99e3ad7b4

          SHA1

          2f41dbecc1fb7e16d3960678274b913a3f119de4

          SHA256

          ec9847e4eb38e995fa790c3b736a6f845d8552573f8b08f64a86f0e6ecd78faf

          SHA512

          7e20a0a845c6b172c1e5d7ec002200f5c78f42692ed48e5821afbc2b7871a32bd04b66d901cfe4a685cc068479012dc7c6e2fbd25e167c72ffc8c45c8be59d61

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr994766.exe

          Filesize

          501KB

          MD5

          e7b82a471cca8a9ab4cb8ff99e3ad7b4

          SHA1

          2f41dbecc1fb7e16d3960678274b913a3f119de4

          SHA256

          ec9847e4eb38e995fa790c3b736a6f845d8552573f8b08f64a86f0e6ecd78faf

          SHA512

          7e20a0a845c6b172c1e5d7ec002200f5c78f42692ed48e5821afbc2b7871a32bd04b66d901cfe4a685cc068479012dc7c6e2fbd25e167c72ffc8c45c8be59d61

        • C:\Windows\Temp\1.exe

          Filesize

          168KB

          MD5

          03728fed675bcde5256342183b1d6f27

          SHA1

          d13eace7d3d92f93756504b274777cc269b222a2

          SHA256

          f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

          SHA512

          6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

        • C:\Windows\Temp\1.exe

          Filesize

          168KB

          MD5

          03728fed675bcde5256342183b1d6f27

          SHA1

          d13eace7d3d92f93756504b274777cc269b222a2

          SHA256

          f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

          SHA512

          6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

        • memory/220-2320-0x00000000056C0000-0x00000000056D0000-memory.dmp

          Filesize

          64KB

        • memory/220-2300-0x0000000000CA0000-0x0000000000CCE000-memory.dmp

          Filesize

          184KB

        • memory/220-2304-0x00000000014B0000-0x00000000014B6000-memory.dmp

          Filesize

          24KB

        • memory/220-2308-0x00000000057E0000-0x00000000058EA000-memory.dmp

          Filesize

          1.0MB

        • memory/220-2311-0x0000000005650000-0x000000000569B000-memory.dmp

          Filesize

          300KB

        • memory/220-2310-0x0000000005610000-0x000000000564E000-memory.dmp

          Filesize

          248KB

        • memory/220-2312-0x00000000056C0000-0x00000000056D0000-memory.dmp

          Filesize

          64KB

        • memory/1928-137-0x00000000006F0000-0x00000000006FA000-memory.dmp

          Filesize

          40KB

        • memory/2432-2316-0x000000000AFE0000-0x000000000B046000-memory.dmp

          Filesize

          408KB

        • memory/2432-2313-0x0000000004EF0000-0x0000000004F00000-memory.dmp

          Filesize

          64KB

        • memory/2432-2309-0x000000000A480000-0x000000000A492000-memory.dmp

          Filesize

          72KB

        • memory/2432-2314-0x000000000A800000-0x000000000A876000-memory.dmp

          Filesize

          472KB

        • memory/2432-2307-0x000000000A9D0000-0x000000000AFD6000-memory.dmp

          Filesize

          6.0MB

        • memory/2432-2306-0x0000000004EC0000-0x0000000004EC6000-memory.dmp

          Filesize

          24KB

        • memory/2432-2315-0x000000000A920000-0x000000000A9B2000-memory.dmp

          Filesize

          584KB

        • memory/2432-2317-0x000000000BA30000-0x000000000BA80000-memory.dmp

          Filesize

          320KB

        • memory/2432-2305-0x0000000000750000-0x0000000000780000-memory.dmp

          Filesize

          192KB

        • memory/2432-2318-0x000000000BD50000-0x000000000BF12000-memory.dmp

          Filesize

          1.8MB

        • memory/2432-2319-0x000000000C450000-0x000000000C97C000-memory.dmp

          Filesize

          5.2MB

        • memory/2432-2321-0x0000000004EF0000-0x0000000004F00000-memory.dmp

          Filesize

          64KB

        • memory/2444-159-0x00000000022B0000-0x00000000022C0000-memory.dmp

          Filesize

          64KB

        • memory/2444-175-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/2444-189-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/2444-191-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/2444-193-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/2444-195-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/2444-197-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/2444-199-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/2444-201-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/2444-203-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/2444-205-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/2444-207-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/2444-209-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/2444-211-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/2444-213-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/2444-2292-0x00000000052E0000-0x0000000005312000-memory.dmp

          Filesize

          200KB

        • memory/2444-185-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/2444-183-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/2444-181-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/2444-179-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/2444-177-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/2444-187-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/2444-173-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/2444-171-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/2444-165-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/2444-169-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/2444-167-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/2444-158-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/2444-162-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/2444-163-0x00000000022B0000-0x00000000022C0000-memory.dmp

          Filesize

          64KB

        • memory/2444-161-0x00000000022B0000-0x00000000022C0000-memory.dmp

          Filesize

          64KB

        • memory/2444-156-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/2444-154-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/2444-152-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/2444-150-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/2444-148-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/2444-147-0x00000000050D0000-0x0000000005130000-memory.dmp

          Filesize

          384KB

        • memory/2444-146-0x00000000050D0000-0x0000000005136000-memory.dmp

          Filesize

          408KB

        • memory/2444-145-0x0000000004BD0000-0x00000000050CE000-memory.dmp

          Filesize

          5.0MB

        • memory/2444-144-0x00000000025E0000-0x0000000002648000-memory.dmp

          Filesize

          416KB

        • memory/2444-143-0x00000000004F0000-0x000000000054B000-memory.dmp

          Filesize

          364KB

        • memory/4036-2328-0x00000000004C0000-0x00000000004FB000-memory.dmp

          Filesize

          236KB