Analysis

  • max time kernel
    145s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13/04/2023, 19:46

General

  • Target

    bb9a4c8beea02946aa473c22baaf23e860480b77c1a228e580215793dbc4285d.exe

  • Size

    1.1MB

  • MD5

    de89c0c03f45a3abcb9d3c7f3c4510e6

  • SHA1

    f0dcdd5ad3562c5f32ba7391a5dab1713a8d1739

  • SHA256

    bb9a4c8beea02946aa473c22baaf23e860480b77c1a228e580215793dbc4285d

  • SHA512

    29e0c4539bce2e4870e97d3822ad3d9801eee32fdb9dae8246511d8f99b1e4fb8c44ecb854540e59f2a0b34150366787487d112aec5a024733e9c61f6e676083

  • SSDEEP

    24576:Fy9OD9qt1rCgqAeP2FmkH79PlpYlpgiW/:g4IP+5AeJkH5ag

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diro

C2

185.161.248.90:4125

Attributes
  • auth_value

    ae95bda0dd2e95169886a3a68138568b

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb9a4c8beea02946aa473c22baaf23e860480b77c1a228e580215793dbc4285d.exe
    "C:\Users\Admin\AppData\Local\Temp\bb9a4c8beea02946aa473c22baaf23e860480b77c1a228e580215793dbc4285d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un025054.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un025054.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2276
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un154783.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un154783.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2392
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr191770.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr191770.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2848
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu183307.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu183307.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3888
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:516
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk488418.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk488418.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4500
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si429104.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si429104.exe
      2⤵
      • Executes dropped EXE
      PID:1056
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 616
        3⤵
        • Program crash
        PID:4276
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 696
        3⤵
        • Program crash
        PID:4028
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 816
        3⤵
        • Program crash
        PID:2148
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 888
        3⤵
        • Program crash
        PID:2384
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 908
        3⤵
        • Program crash
        PID:2432
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 820
        3⤵
        • Program crash
        PID:3012
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 1080
        3⤵
        • Program crash
        PID:3288

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si429104.exe

    Filesize

    309KB

    MD5

    9242e8e8a5d6a083662e9a3114763779

    SHA1

    c942ce1860dab1d359b38d74fd93f6a6b40cd12d

    SHA256

    2fe02c613d0a5317c961aa489106fa0219bcb6426c30d6ed8aa85ff711d9fb7e

    SHA512

    64d08407736c95373efb8a642e788947fb9af4483b2ffa8843291ff31f42fa60f44bf5927efdf95c953ec29c382b308944039143d2e73c919dcb6f666b589f3e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si429104.exe

    Filesize

    309KB

    MD5

    9242e8e8a5d6a083662e9a3114763779

    SHA1

    c942ce1860dab1d359b38d74fd93f6a6b40cd12d

    SHA256

    2fe02c613d0a5317c961aa489106fa0219bcb6426c30d6ed8aa85ff711d9fb7e

    SHA512

    64d08407736c95373efb8a642e788947fb9af4483b2ffa8843291ff31f42fa60f44bf5927efdf95c953ec29c382b308944039143d2e73c919dcb6f666b589f3e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un025054.exe

    Filesize

    818KB

    MD5

    457e1e26ed98a6ff7d546058fb02ebc6

    SHA1

    186fe74c83a924af836323a363db1deb1cadc192

    SHA256

    f99eed158e075b74e84172214f84b5a00ff8ed302f0b4aa4f3e6c8f323a51970

    SHA512

    050718473e014fb389c50423ab7d0209f4ad5927a1e04b4bda6d82762ff9f773a534c955381f429b5f80c7f4a4696f8052ba5667d802b770b8dac55c295be4c1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un025054.exe

    Filesize

    818KB

    MD5

    457e1e26ed98a6ff7d546058fb02ebc6

    SHA1

    186fe74c83a924af836323a363db1deb1cadc192

    SHA256

    f99eed158e075b74e84172214f84b5a00ff8ed302f0b4aa4f3e6c8f323a51970

    SHA512

    050718473e014fb389c50423ab7d0209f4ad5927a1e04b4bda6d82762ff9f773a534c955381f429b5f80c7f4a4696f8052ba5667d802b770b8dac55c295be4c1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk488418.exe

    Filesize

    169KB

    MD5

    52122165089dee032d104b5d43e8d441

    SHA1

    202778cb8060ae70f7d817c4558fac5304be5659

    SHA256

    dc5374226f6456b1095384d85278af99d6fccb1f87caa44f3ee4dc5451b3b2ef

    SHA512

    743a89256e7d2e5228786a158845757ab621be463f26981c328dde21f33dc13bc94cd8e9247d2e00452946f316a076cad2291d120fbf8f8c9b3d6ffe4289758e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk488418.exe

    Filesize

    169KB

    MD5

    52122165089dee032d104b5d43e8d441

    SHA1

    202778cb8060ae70f7d817c4558fac5304be5659

    SHA256

    dc5374226f6456b1095384d85278af99d6fccb1f87caa44f3ee4dc5451b3b2ef

    SHA512

    743a89256e7d2e5228786a158845757ab621be463f26981c328dde21f33dc13bc94cd8e9247d2e00452946f316a076cad2291d120fbf8f8c9b3d6ffe4289758e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un154783.exe

    Filesize

    665KB

    MD5

    d1c33acc55aeb1a7915877b8daeb8bcc

    SHA1

    45ded6bee39f8aac53337eb0c293c6d2b7cb4cac

    SHA256

    e4d03f06aeb34a168aba8f428d738bec7101a41d76b95038f2898003e7a3abe6

    SHA512

    c9eeb050330b06add19235dfabba3da5f6129c82d9bdfb81099b88c49aa3e5a70622dc34d2a3f0092d33c362c1185c2337b281c7e14e79a15ee57d0ba1679fff

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un154783.exe

    Filesize

    665KB

    MD5

    d1c33acc55aeb1a7915877b8daeb8bcc

    SHA1

    45ded6bee39f8aac53337eb0c293c6d2b7cb4cac

    SHA256

    e4d03f06aeb34a168aba8f428d738bec7101a41d76b95038f2898003e7a3abe6

    SHA512

    c9eeb050330b06add19235dfabba3da5f6129c82d9bdfb81099b88c49aa3e5a70622dc34d2a3f0092d33c362c1185c2337b281c7e14e79a15ee57d0ba1679fff

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr191770.exe

    Filesize

    317KB

    MD5

    8d4f17399f1c80c7cd0527ce163616de

    SHA1

    31fc0a36c42d45a68a54a88af395d38e1e8ad247

    SHA256

    a42af860a884ab216d394c5e71d5acadb938a3be87693fb66481f0326352ed29

    SHA512

    c49740782f438f72908f92dd23373655762bee35b026c191ee2d96720ff1ce98b8d9cb0c31b6608e37952529f9cc506d26d58b3143414f85c14e69db33af86e7

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr191770.exe

    Filesize

    317KB

    MD5

    8d4f17399f1c80c7cd0527ce163616de

    SHA1

    31fc0a36c42d45a68a54a88af395d38e1e8ad247

    SHA256

    a42af860a884ab216d394c5e71d5acadb938a3be87693fb66481f0326352ed29

    SHA512

    c49740782f438f72908f92dd23373655762bee35b026c191ee2d96720ff1ce98b8d9cb0c31b6608e37952529f9cc506d26d58b3143414f85c14e69db33af86e7

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu183307.exe

    Filesize

    501KB

    MD5

    cba777951f424aff6c6ee213c62ac55a

    SHA1

    30a3a96e8c8e5a6841529da511e03b480275c1c6

    SHA256

    c83f9cc7563745f4ba34dde562508f0f9a71115b5806b9aa12c1ca455ea94553

    SHA512

    4b936e32d7970c5e4f2e393731561622b589902afb5ce4a9c2453666ea77e3cfe69fa7f12b24b5d45f20844fb3e821a70c388ff650d71fb1935b193feb188379

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu183307.exe

    Filesize

    501KB

    MD5

    cba777951f424aff6c6ee213c62ac55a

    SHA1

    30a3a96e8c8e5a6841529da511e03b480275c1c6

    SHA256

    c83f9cc7563745f4ba34dde562508f0f9a71115b5806b9aa12c1ca455ea94553

    SHA512

    4b936e32d7970c5e4f2e393731561622b589902afb5ce4a9c2453666ea77e3cfe69fa7f12b24b5d45f20844fb3e821a70c388ff650d71fb1935b193feb188379

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • memory/516-2357-0x0000000004F20000-0x0000000004FB2000-memory.dmp

    Filesize

    584KB

  • memory/516-2352-0x0000000004AE0000-0x0000000004B1E000-memory.dmp

    Filesize

    248KB

  • memory/516-2349-0x0000000005090000-0x0000000005696000-memory.dmp

    Filesize

    6.0MB

  • memory/516-2346-0x0000000002210000-0x0000000002216000-memory.dmp

    Filesize

    24KB

  • memory/516-2354-0x0000000004970000-0x0000000004980000-memory.dmp

    Filesize

    64KB

  • memory/516-2355-0x0000000004B30000-0x0000000004B7B000-memory.dmp

    Filesize

    300KB

  • memory/516-2342-0x0000000000170000-0x000000000019E000-memory.dmp

    Filesize

    184KB

  • memory/516-2358-0x0000000004FC0000-0x0000000005026000-memory.dmp

    Filesize

    408KB

  • memory/516-2362-0x0000000004970000-0x0000000004980000-memory.dmp

    Filesize

    64KB

  • memory/516-2363-0x0000000005E80000-0x0000000005ED0000-memory.dmp

    Filesize

    320KB

  • memory/1056-2370-0x00000000004F0000-0x000000000052B000-memory.dmp

    Filesize

    236KB

  • memory/2848-168-0x0000000002490000-0x00000000024A2000-memory.dmp

    Filesize

    72KB

  • memory/2848-176-0x0000000002160000-0x0000000002170000-memory.dmp

    Filesize

    64KB

  • memory/2848-177-0x0000000002160000-0x0000000002170000-memory.dmp

    Filesize

    64KB

  • memory/2848-178-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2848-180-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/2848-175-0x0000000002160000-0x0000000002170000-memory.dmp

    Filesize

    64KB

  • memory/2848-174-0x0000000002490000-0x00000000024A2000-memory.dmp

    Filesize

    72KB

  • memory/2848-143-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2848-144-0x00000000020D0000-0x00000000020EA000-memory.dmp

    Filesize

    104KB

  • memory/2848-145-0x0000000004B30000-0x000000000502E000-memory.dmp

    Filesize

    5.0MB

  • memory/2848-146-0x0000000002490000-0x00000000024A8000-memory.dmp

    Filesize

    96KB

  • memory/2848-147-0x0000000002490000-0x00000000024A2000-memory.dmp

    Filesize

    72KB

  • memory/2848-148-0x0000000002490000-0x00000000024A2000-memory.dmp

    Filesize

    72KB

  • memory/2848-150-0x0000000002490000-0x00000000024A2000-memory.dmp

    Filesize

    72KB

  • memory/2848-152-0x0000000002490000-0x00000000024A2000-memory.dmp

    Filesize

    72KB

  • memory/2848-154-0x0000000002490000-0x00000000024A2000-memory.dmp

    Filesize

    72KB

  • memory/2848-156-0x0000000002490000-0x00000000024A2000-memory.dmp

    Filesize

    72KB

  • memory/2848-158-0x0000000002490000-0x00000000024A2000-memory.dmp

    Filesize

    72KB

  • memory/2848-166-0x0000000002490000-0x00000000024A2000-memory.dmp

    Filesize

    72KB

  • memory/2848-164-0x0000000002490000-0x00000000024A2000-memory.dmp

    Filesize

    72KB

  • memory/2848-162-0x0000000002490000-0x00000000024A2000-memory.dmp

    Filesize

    72KB

  • memory/2848-160-0x0000000002490000-0x00000000024A2000-memory.dmp

    Filesize

    72KB

  • memory/2848-170-0x0000000002490000-0x00000000024A2000-memory.dmp

    Filesize

    72KB

  • memory/2848-172-0x0000000002490000-0x00000000024A2000-memory.dmp

    Filesize

    72KB

  • memory/3888-222-0x0000000005120000-0x0000000005180000-memory.dmp

    Filesize

    384KB

  • memory/3888-202-0x0000000005120000-0x0000000005180000-memory.dmp

    Filesize

    384KB

  • memory/3888-216-0x0000000005120000-0x0000000005180000-memory.dmp

    Filesize

    384KB

  • memory/3888-218-0x0000000005120000-0x0000000005180000-memory.dmp

    Filesize

    384KB

  • memory/3888-220-0x0000000005120000-0x0000000005180000-memory.dmp

    Filesize

    384KB

  • memory/3888-208-0x00000000049D0000-0x00000000049E0000-memory.dmp

    Filesize

    64KB

  • memory/3888-224-0x0000000005120000-0x0000000005180000-memory.dmp

    Filesize

    384KB

  • memory/3888-2333-0x00000000049D0000-0x00000000049E0000-memory.dmp

    Filesize

    64KB

  • memory/3888-2334-0x00000000052F0000-0x0000000005322000-memory.dmp

    Filesize

    200KB

  • memory/3888-212-0x0000000005120000-0x0000000005180000-memory.dmp

    Filesize

    384KB

  • memory/3888-210-0x00000000049D0000-0x00000000049E0000-memory.dmp

    Filesize

    64KB

  • memory/3888-209-0x0000000005120000-0x0000000005180000-memory.dmp

    Filesize

    384KB

  • memory/3888-206-0x00000000049D0000-0x00000000049E0000-memory.dmp

    Filesize

    64KB

  • memory/3888-205-0x0000000005120000-0x0000000005180000-memory.dmp

    Filesize

    384KB

  • memory/3888-204-0x0000000001EF0000-0x0000000001F4B000-memory.dmp

    Filesize

    364KB

  • memory/3888-185-0x0000000004930000-0x0000000004998000-memory.dmp

    Filesize

    416KB

  • memory/3888-186-0x0000000005120000-0x0000000005186000-memory.dmp

    Filesize

    408KB

  • memory/3888-214-0x0000000005120000-0x0000000005180000-memory.dmp

    Filesize

    384KB

  • memory/3888-187-0x0000000005120000-0x0000000005180000-memory.dmp

    Filesize

    384KB

  • memory/3888-188-0x0000000005120000-0x0000000005180000-memory.dmp

    Filesize

    384KB

  • memory/3888-200-0x0000000005120000-0x0000000005180000-memory.dmp

    Filesize

    384KB

  • memory/3888-190-0x0000000005120000-0x0000000005180000-memory.dmp

    Filesize

    384KB

  • memory/3888-198-0x0000000005120000-0x0000000005180000-memory.dmp

    Filesize

    384KB

  • memory/3888-196-0x0000000005120000-0x0000000005180000-memory.dmp

    Filesize

    384KB

  • memory/3888-192-0x0000000005120000-0x0000000005180000-memory.dmp

    Filesize

    384KB

  • memory/3888-194-0x0000000005120000-0x0000000005180000-memory.dmp

    Filesize

    384KB

  • memory/4500-2356-0x000000000AFB0000-0x000000000B026000-memory.dmp

    Filesize

    472KB

  • memory/4500-2359-0x000000000C600000-0x000000000C7C2000-memory.dmp

    Filesize

    1.8MB

  • memory/4500-2360-0x000000000CD00000-0x000000000D22C000-memory.dmp

    Filesize

    5.2MB

  • memory/4500-2361-0x00000000057F0000-0x0000000005800000-memory.dmp

    Filesize

    64KB

  • memory/4500-2353-0x00000000057F0000-0x0000000005800000-memory.dmp

    Filesize

    64KB

  • memory/4500-2351-0x00000000057A0000-0x00000000057B2000-memory.dmp

    Filesize

    72KB

  • memory/4500-2350-0x000000000AD90000-0x000000000AE9A000-memory.dmp

    Filesize

    1.0MB

  • memory/4500-2348-0x0000000001690000-0x0000000001696000-memory.dmp

    Filesize

    24KB

  • memory/4500-2347-0x0000000000F00000-0x0000000000F30000-memory.dmp

    Filesize

    192KB