Analysis

  • max time kernel
    50s
  • max time network
    69s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13/04/2023, 20:03

General

  • Target

    f805781c705742777c783060df19e17cb426b9d19652d04f198de1b48da88ae5.exe

  • Size

    962KB

  • MD5

    54e5bbb2bf8ca10e2319f3205ef0422b

  • SHA1

    2b45f0720dab978f996cce51911e1a7acc926b16

  • SHA256

    f805781c705742777c783060df19e17cb426b9d19652d04f198de1b48da88ae5

  • SHA512

    22b76dfe0a2002caa124630b18fbd77ad748c9dad4350ee95a3cbeca634ac7a7f547dae3f2ce85c844e1325ca703de8c6f35338def4e5b078114469547ace3d2

  • SSDEEP

    24576:nyCeFdmVDWFhyq5txtke8CtWCXT7JUZyOlRlgmwL:yCe2I5tTkeKCXT6dl

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

disa

C2

185.161.248.90:4125

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f805781c705742777c783060df19e17cb426b9d19652d04f198de1b48da88ae5.exe
    "C:\Users\Admin\AppData\Local\Temp\f805781c705742777c783060df19e17cb426b9d19652d04f198de1b48da88ae5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1308
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGS1523.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGS1523.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1476
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziDv3192.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziDv3192.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1740
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it239948.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it239948.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2060
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr754893.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr754893.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4160
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5088
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp432995.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp432995.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4364
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr278901.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr278901.exe
      2⤵
      • Executes dropped EXE
      PID:1724
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 616
        3⤵
        • Program crash
        PID:4424
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 696
        3⤵
        • Program crash
        PID:3928
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 768
        3⤵
        • Program crash
        PID:4776
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 844
        3⤵
        • Program crash
        PID:3932
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 876
        3⤵
        • Program crash
        PID:1496
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 856
        3⤵
        • Program crash
        PID:2984
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 1128
        3⤵
        • Program crash
        PID:4780
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 1060
        3⤵
        • Program crash
        PID:3772

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr278901.exe

          Filesize

          309KB

          MD5

          9242e8e8a5d6a083662e9a3114763779

          SHA1

          c942ce1860dab1d359b38d74fd93f6a6b40cd12d

          SHA256

          2fe02c613d0a5317c961aa489106fa0219bcb6426c30d6ed8aa85ff711d9fb7e

          SHA512

          64d08407736c95373efb8a642e788947fb9af4483b2ffa8843291ff31f42fa60f44bf5927efdf95c953ec29c382b308944039143d2e73c919dcb6f666b589f3e

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr278901.exe

          Filesize

          309KB

          MD5

          9242e8e8a5d6a083662e9a3114763779

          SHA1

          c942ce1860dab1d359b38d74fd93f6a6b40cd12d

          SHA256

          2fe02c613d0a5317c961aa489106fa0219bcb6426c30d6ed8aa85ff711d9fb7e

          SHA512

          64d08407736c95373efb8a642e788947fb9af4483b2ffa8843291ff31f42fa60f44bf5927efdf95c953ec29c382b308944039143d2e73c919dcb6f666b589f3e

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGS1523.exe

          Filesize

          679KB

          MD5

          cb6cf9c78fd5ee9d923262cb217fae32

          SHA1

          11b3c50d8fae1ba40fd5585fcfd2d795ca6e3589

          SHA256

          42fe52432f38eb7720082b5359315f6e720868297e365c8ac15240f60dd5bcc1

          SHA512

          8e9be70100fbf0b9db399cc65426e4ee79769dcae4a1939fe39d1c9255dbe3abf4ede4c6fa9bba97d84f75eab08fcbb4a528a5e2fac7afcac594243192303b0e

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGS1523.exe

          Filesize

          679KB

          MD5

          cb6cf9c78fd5ee9d923262cb217fae32

          SHA1

          11b3c50d8fae1ba40fd5585fcfd2d795ca6e3589

          SHA256

          42fe52432f38eb7720082b5359315f6e720868297e365c8ac15240f60dd5bcc1

          SHA512

          8e9be70100fbf0b9db399cc65426e4ee79769dcae4a1939fe39d1c9255dbe3abf4ede4c6fa9bba97d84f75eab08fcbb4a528a5e2fac7afcac594243192303b0e

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp432995.exe

          Filesize

          168KB

          MD5

          47368dc18eb6e302875e996aebab2dab

          SHA1

          e9cd449991494ae5621306180228fbbeef7cf79a

          SHA256

          81d3319660c363f686e4ed187dce054b036d054bdaf3356d63dff714a3c22b5e

          SHA512

          0806e1d66485f58a2e8ac4506c88d4ff40d859d8a7fa9f2c4af101cc450af17ccf491b16e30d144e6a5415f3b4520084f9dc528ec52dc8c77c23012698f5de83

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp432995.exe

          Filesize

          168KB

          MD5

          47368dc18eb6e302875e996aebab2dab

          SHA1

          e9cd449991494ae5621306180228fbbeef7cf79a

          SHA256

          81d3319660c363f686e4ed187dce054b036d054bdaf3356d63dff714a3c22b5e

          SHA512

          0806e1d66485f58a2e8ac4506c88d4ff40d859d8a7fa9f2c4af101cc450af17ccf491b16e30d144e6a5415f3b4520084f9dc528ec52dc8c77c23012698f5de83

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziDv3192.exe

          Filesize

          525KB

          MD5

          07a744f758e392a397e107428f2e5bd6

          SHA1

          62a1327930e2de4fbf2e106d274bda0e798f8b83

          SHA256

          78a9145a4235c8ddece1f7088577be50bac450ade565d8663391c0f7a7afeceb

          SHA512

          0c7cc85bddc31c3f349fd29515160455490e5b1710405dd20fb2919fa0f4daa39a14bf8c4b0afd35a5bd291aad0ad8d415baae186be76b5b99bc5cdde88fe45a

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziDv3192.exe

          Filesize

          525KB

          MD5

          07a744f758e392a397e107428f2e5bd6

          SHA1

          62a1327930e2de4fbf2e106d274bda0e798f8b83

          SHA256

          78a9145a4235c8ddece1f7088577be50bac450ade565d8663391c0f7a7afeceb

          SHA512

          0c7cc85bddc31c3f349fd29515160455490e5b1710405dd20fb2919fa0f4daa39a14bf8c4b0afd35a5bd291aad0ad8d415baae186be76b5b99bc5cdde88fe45a

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it239948.exe

          Filesize

          11KB

          MD5

          095b8cc26883cc1cb72e7b1c5838c181

          SHA1

          764216622b952d86630d4f6cde45c0649c31246e

          SHA256

          402d27f2f330d0fa4b75976501e16dfd153adece583d6e0c82300b78b79d15e8

          SHA512

          768f8c59d46319d94303141aa5c5a7bd49309c67e859f3df44f9c563830a38d5222dd5ac8deca7427f98e77282ef78331fc8a8b618af3b7de6eb834cdc92cf08

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it239948.exe

          Filesize

          11KB

          MD5

          095b8cc26883cc1cb72e7b1c5838c181

          SHA1

          764216622b952d86630d4f6cde45c0649c31246e

          SHA256

          402d27f2f330d0fa4b75976501e16dfd153adece583d6e0c82300b78b79d15e8

          SHA512

          768f8c59d46319d94303141aa5c5a7bd49309c67e859f3df44f9c563830a38d5222dd5ac8deca7427f98e77282ef78331fc8a8b618af3b7de6eb834cdc92cf08

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr754893.exe

          Filesize

          501KB

          MD5

          ead20a66b86600891d7b28c103f690a7

          SHA1

          d941d1e1757f76ee87f6de746d773942bb36dc6e

          SHA256

          37cae9d5d2746bc03473f59ca118efd464110829e2f728d9bbd8a2d519df57e4

          SHA512

          7ee422077c959935fa95b78ba26c64976b2ea3d55da0827fa3bb985ceaa4b385b9d9b796b02e9d17d84cb7f893ff2b68f7f5ac8aaed1067b2fcea0326d054496

        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr754893.exe

          Filesize

          501KB

          MD5

          ead20a66b86600891d7b28c103f690a7

          SHA1

          d941d1e1757f76ee87f6de746d773942bb36dc6e

          SHA256

          37cae9d5d2746bc03473f59ca118efd464110829e2f728d9bbd8a2d519df57e4

          SHA512

          7ee422077c959935fa95b78ba26c64976b2ea3d55da0827fa3bb985ceaa4b385b9d9b796b02e9d17d84cb7f893ff2b68f7f5ac8aaed1067b2fcea0326d054496

        • C:\Windows\Temp\1.exe

          Filesize

          168KB

          MD5

          03728fed675bcde5256342183b1d6f27

          SHA1

          d13eace7d3d92f93756504b274777cc269b222a2

          SHA256

          f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

          SHA512

          6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

        • C:\Windows\Temp\1.exe

          Filesize

          168KB

          MD5

          03728fed675bcde5256342183b1d6f27

          SHA1

          d13eace7d3d92f93756504b274777cc269b222a2

          SHA256

          f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

          SHA512

          6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

        • memory/1724-2335-0x00000000005C0000-0x00000000005FB000-memory.dmp

          Filesize

          236KB

        • memory/2060-142-0x0000000000090000-0x000000000009A000-memory.dmp

          Filesize

          40KB

        • memory/4160-190-0x0000000005130000-0x0000000005190000-memory.dmp

          Filesize

          384KB

        • memory/4160-208-0x0000000005130000-0x0000000005190000-memory.dmp

          Filesize

          384KB

        • memory/4160-151-0x0000000005130000-0x0000000005196000-memory.dmp

          Filesize

          408KB

        • memory/4160-154-0x0000000004B20000-0x0000000004B30000-memory.dmp

          Filesize

          64KB

        • memory/4160-155-0x0000000005130000-0x0000000005190000-memory.dmp

          Filesize

          384KB

        • memory/4160-156-0x0000000005130000-0x0000000005190000-memory.dmp

          Filesize

          384KB

        • memory/4160-158-0x0000000005130000-0x0000000005190000-memory.dmp

          Filesize

          384KB

        • memory/4160-160-0x0000000005130000-0x0000000005190000-memory.dmp

          Filesize

          384KB

        • memory/4160-162-0x0000000005130000-0x0000000005190000-memory.dmp

          Filesize

          384KB

        • memory/4160-164-0x0000000005130000-0x0000000005190000-memory.dmp

          Filesize

          384KB

        • memory/4160-174-0x0000000005130000-0x0000000005190000-memory.dmp

          Filesize

          384KB

        • memory/4160-176-0x0000000005130000-0x0000000005190000-memory.dmp

          Filesize

          384KB

        • memory/4160-172-0x0000000005130000-0x0000000005190000-memory.dmp

          Filesize

          384KB

        • memory/4160-170-0x0000000005130000-0x0000000005190000-memory.dmp

          Filesize

          384KB

        • memory/4160-168-0x0000000005130000-0x0000000005190000-memory.dmp

          Filesize

          384KB

        • memory/4160-178-0x0000000005130000-0x0000000005190000-memory.dmp

          Filesize

          384KB

        • memory/4160-166-0x0000000005130000-0x0000000005190000-memory.dmp

          Filesize

          384KB

        • memory/4160-180-0x0000000005130000-0x0000000005190000-memory.dmp

          Filesize

          384KB

        • memory/4160-184-0x0000000005130000-0x0000000005190000-memory.dmp

          Filesize

          384KB

        • memory/4160-186-0x0000000005130000-0x0000000005190000-memory.dmp

          Filesize

          384KB

        • memory/4160-182-0x0000000005130000-0x0000000005190000-memory.dmp

          Filesize

          384KB

        • memory/4160-188-0x0000000005130000-0x0000000005190000-memory.dmp

          Filesize

          384KB

        • memory/4160-152-0x0000000004B20000-0x0000000004B30000-memory.dmp

          Filesize

          64KB

        • memory/4160-192-0x0000000005130000-0x0000000005190000-memory.dmp

          Filesize

          384KB

        • memory/4160-194-0x0000000005130000-0x0000000005190000-memory.dmp

          Filesize

          384KB

        • memory/4160-196-0x0000000005130000-0x0000000005190000-memory.dmp

          Filesize

          384KB

        • memory/4160-202-0x0000000005130000-0x0000000005190000-memory.dmp

          Filesize

          384KB

        • memory/4160-200-0x0000000005130000-0x0000000005190000-memory.dmp

          Filesize

          384KB

        • memory/4160-204-0x0000000005130000-0x0000000005190000-memory.dmp

          Filesize

          384KB

        • memory/4160-206-0x0000000005130000-0x0000000005190000-memory.dmp

          Filesize

          384KB

        • memory/4160-198-0x0000000005130000-0x0000000005190000-memory.dmp

          Filesize

          384KB

        • memory/4160-153-0x0000000004B20000-0x0000000004B30000-memory.dmp

          Filesize

          64KB

        • memory/4160-210-0x0000000005130000-0x0000000005190000-memory.dmp

          Filesize

          384KB

        • memory/4160-212-0x0000000005130000-0x0000000005190000-memory.dmp

          Filesize

          384KB

        • memory/4160-214-0x0000000005130000-0x0000000005190000-memory.dmp

          Filesize

          384KB

        • memory/4160-216-0x0000000005130000-0x0000000005190000-memory.dmp

          Filesize

          384KB

        • memory/4160-218-0x0000000005130000-0x0000000005190000-memory.dmp

          Filesize

          384KB

        • memory/4160-2297-0x0000000005300000-0x0000000005332000-memory.dmp

          Filesize

          200KB

        • memory/4160-2300-0x0000000004B20000-0x0000000004B30000-memory.dmp

          Filesize

          64KB

        • memory/4160-148-0x0000000000620000-0x000000000067B000-memory.dmp

          Filesize

          364KB

        • memory/4160-149-0x0000000004A70000-0x0000000004AD8000-memory.dmp

          Filesize

          416KB

        • memory/4160-150-0x0000000004C30000-0x000000000512E000-memory.dmp

          Filesize

          5.0MB

        • memory/4364-2321-0x000000000AB00000-0x000000000AB76000-memory.dmp

          Filesize

          472KB

        • memory/4364-2326-0x000000000C640000-0x000000000CB6C000-memory.dmp

          Filesize

          5.2MB

        • memory/4364-2315-0x000000000A850000-0x000000000A95A000-memory.dmp

          Filesize

          1.0MB

        • memory/4364-2312-0x0000000000A50000-0x0000000000A80000-memory.dmp

          Filesize

          192KB

        • memory/4364-2317-0x0000000002BF0000-0x0000000002C00000-memory.dmp

          Filesize

          64KB

        • memory/4364-2313-0x00000000012D0000-0x00000000012D6000-memory.dmp

          Filesize

          24KB

        • memory/4364-2327-0x0000000002BF0000-0x0000000002C00000-memory.dmp

          Filesize

          64KB

        • memory/4364-2325-0x000000000BF40000-0x000000000C102000-memory.dmp

          Filesize

          1.8MB

        • memory/4364-2316-0x000000000A780000-0x000000000A792000-memory.dmp

          Filesize

          72KB

        • memory/4364-2323-0x000000000B320000-0x000000000B386000-memory.dmp

          Filesize

          408KB

        • memory/5088-2314-0x0000000004F80000-0x0000000005586000-memory.dmp

          Filesize

          6.0MB

        • memory/5088-2324-0x0000000005BA0000-0x0000000005BF0000-memory.dmp

          Filesize

          320KB

        • memory/5088-2320-0x0000000004A20000-0x0000000004A6B000-memory.dmp

          Filesize

          300KB

        • memory/5088-2311-0x00000000007F0000-0x00000000007F6000-memory.dmp

          Filesize

          24KB

        • memory/5088-2319-0x00000000049D0000-0x0000000004A0E000-memory.dmp

          Filesize

          248KB

        • memory/5088-2328-0x0000000004960000-0x0000000004970000-memory.dmp

          Filesize

          64KB

        • memory/5088-2318-0x0000000004960000-0x0000000004970000-memory.dmp

          Filesize

          64KB

        • memory/5088-2322-0x0000000004E10000-0x0000000004EA2000-memory.dmp

          Filesize

          584KB

        • memory/5088-2307-0x0000000000060000-0x000000000008E000-memory.dmp

          Filesize

          184KB