Analysis

  • max time kernel
    144s
  • max time network
    101s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14-04-2023 00:12

General

  • Target

    bb5c27aa9799158dcf4e2abe9a535d23662530fb6f52e22e0bfed271034213af.exe

  • Size

    1.1MB

  • MD5

    4c67bf297d8172e517e8115e61017850

  • SHA1

    358cbca67390851a8de8500cae7c5e80848812dc

  • SHA256

    bb5c27aa9799158dcf4e2abe9a535d23662530fb6f52e22e0bfed271034213af

  • SHA512

    45ffa77038c66d32df28dbc34a9532c98e03c4bd510215a69d010520715e58df5f49af21a5bec29eb247eb620b43a3c028d0ab2d6ed9dc3f8dec234c6ea6ceeb

  • SSDEEP

    24576:PyFk/5PlCXSqwIxW2IhYBmhbIM689ZzgnhVEYtt+0BYJovQU:aFk/59mSqwIxJIhYBmh16895gnfBPBYb

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

disa

C2

185.161.248.90:4125

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb5c27aa9799158dcf4e2abe9a535d23662530fb6f52e22e0bfed271034213af.exe
    "C:\Users\Admin\AppData\Local\Temp\bb5c27aa9799158dcf4e2abe9a535d23662530fb6f52e22e0bfed271034213af.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2452
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un499222.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un499222.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un940571.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un940571.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2988
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr266546.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr266546.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5008
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu308798.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu308798.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3624
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1308
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk566456.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk566456.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2252
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si397476.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si397476.exe
      2⤵
      • Executes dropped EXE
      PID:2036
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 640
        3⤵
        • Program crash
        PID:2508
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 716
        3⤵
        • Program crash
        PID:3164
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 844
        3⤵
        • Program crash
        PID:1564
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 852
        3⤵
        • Program crash
        PID:4120
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 888
        3⤵
        • Program crash
        PID:4588
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 780
        3⤵
        • Program crash
        PID:4000
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 1080
        3⤵
        • Program crash
        PID:4708

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si397476.exe

    Filesize

    310KB

    MD5

    8c35c4b3cf812178c01e1d942c761d76

    SHA1

    1eda2cf7c899b2260685e209f98cf5fb9ce4f471

    SHA256

    eb6ed8f5ff38c6fb92f4834093ddcaa29c2563faa3b88d2df6fc3e1957641ccf

    SHA512

    30a967b2a51cd3107c25ef2675f556c193275cf39153df3c1864dd4eff354d37f1f74487af3956f7ae4226d91c0294878462049c9acf0114dab2cb664d3228d5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si397476.exe

    Filesize

    310KB

    MD5

    8c35c4b3cf812178c01e1d942c761d76

    SHA1

    1eda2cf7c899b2260685e209f98cf5fb9ce4f471

    SHA256

    eb6ed8f5ff38c6fb92f4834093ddcaa29c2563faa3b88d2df6fc3e1957641ccf

    SHA512

    30a967b2a51cd3107c25ef2675f556c193275cf39153df3c1864dd4eff354d37f1f74487af3956f7ae4226d91c0294878462049c9acf0114dab2cb664d3228d5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un499222.exe

    Filesize

    820KB

    MD5

    71a0c53b86d29c1675d27bfe339dd373

    SHA1

    e295cd54b4ccc510f076094ff54cd36e1628cf60

    SHA256

    9a544771a097fbc44bba6d89db11a65b55cd81fa3a55dc4c928e36615e790c12

    SHA512

    17e817fe18344760d7fa1c83bad31ecc89051e7a85fa0d2579ca5169486fdd18a6b897e5d0ec482360f15c13c0a53ef4940796f4d08595764757c4173f2fbcd9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un499222.exe

    Filesize

    820KB

    MD5

    71a0c53b86d29c1675d27bfe339dd373

    SHA1

    e295cd54b4ccc510f076094ff54cd36e1628cf60

    SHA256

    9a544771a097fbc44bba6d89db11a65b55cd81fa3a55dc4c928e36615e790c12

    SHA512

    17e817fe18344760d7fa1c83bad31ecc89051e7a85fa0d2579ca5169486fdd18a6b897e5d0ec482360f15c13c0a53ef4940796f4d08595764757c4173f2fbcd9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk566456.exe

    Filesize

    168KB

    MD5

    9a6727202ca673d1d583604f1f004e3c

    SHA1

    f983e33c45f124b1b9e993c7816aa5ed6c5b3829

    SHA256

    e7c23ccd436fe44f39c15e9053cc34f4d68155a03fbc4e836b8af8a0d9dc755e

    SHA512

    3c54dfe307a6a3b5fc826b2ed6601f3e45ac801d2c9dc107629ea3e89e2907b46a2c37048a9aa864bce124dadd3991d3e6a67ec844a8da368efc3dd441ec67ea

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk566456.exe

    Filesize

    168KB

    MD5

    9a6727202ca673d1d583604f1f004e3c

    SHA1

    f983e33c45f124b1b9e993c7816aa5ed6c5b3829

    SHA256

    e7c23ccd436fe44f39c15e9053cc34f4d68155a03fbc4e836b8af8a0d9dc755e

    SHA512

    3c54dfe307a6a3b5fc826b2ed6601f3e45ac801d2c9dc107629ea3e89e2907b46a2c37048a9aa864bce124dadd3991d3e6a67ec844a8da368efc3dd441ec67ea

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un940571.exe

    Filesize

    666KB

    MD5

    bcf5845b9ef87f3af3c9dc359ece2570

    SHA1

    f2886495224338d60908a3e347caa78f8da9b1ae

    SHA256

    4d7d00a1a0a6743b959ef243cd7c41293543f54346597746fabd527b4d66f06a

    SHA512

    8b7b9fbb83eb9f467d99d58f158d0b370921a2982b006bebbcae929b02ef975f62688066fff44be64edc35d5a52775d753bd8850dfe355c5f7caa842f9efcc34

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un940571.exe

    Filesize

    666KB

    MD5

    bcf5845b9ef87f3af3c9dc359ece2570

    SHA1

    f2886495224338d60908a3e347caa78f8da9b1ae

    SHA256

    4d7d00a1a0a6743b959ef243cd7c41293543f54346597746fabd527b4d66f06a

    SHA512

    8b7b9fbb83eb9f467d99d58f158d0b370921a2982b006bebbcae929b02ef975f62688066fff44be64edc35d5a52775d753bd8850dfe355c5f7caa842f9efcc34

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr266546.exe

    Filesize

    318KB

    MD5

    a2a40ca31e8e965f4339bc7647808d9c

    SHA1

    1050293a96403316a18aeb17c9eabdf4ebeab732

    SHA256

    4bc0ad0dafafc0dd65992a224d2cc85dede46ff1b4dbed75d6b251452bda720c

    SHA512

    2e8cd043392dff288abbff6b0433c75b79e7b7d12f217b49c9632ae33381ddbbd5010e7fc3fd0d89e81175f447e052f6bfa1e884a08fc4bcf8d0541b7000b3b0

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr266546.exe

    Filesize

    318KB

    MD5

    a2a40ca31e8e965f4339bc7647808d9c

    SHA1

    1050293a96403316a18aeb17c9eabdf4ebeab732

    SHA256

    4bc0ad0dafafc0dd65992a224d2cc85dede46ff1b4dbed75d6b251452bda720c

    SHA512

    2e8cd043392dff288abbff6b0433c75b79e7b7d12f217b49c9632ae33381ddbbd5010e7fc3fd0d89e81175f447e052f6bfa1e884a08fc4bcf8d0541b7000b3b0

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu308798.exe

    Filesize

    502KB

    MD5

    93e78d1044672125e8ed29ed1d8c0c6c

    SHA1

    641a162c84ec6d3dadd6efad140a0916a30aed31

    SHA256

    ee60da6e6857be1a92f867563c4dce294e646ce61e5a3caba1e6393cae62e276

    SHA512

    6f41845364071b823bdad5d836700dd512faae12fd0bbbf3944125955aae253a3b5cc1cd5ffb97d678fb33fbf6fe37ddf5ec54c5cf584393852d242503848caf

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu308798.exe

    Filesize

    502KB

    MD5

    93e78d1044672125e8ed29ed1d8c0c6c

    SHA1

    641a162c84ec6d3dadd6efad140a0916a30aed31

    SHA256

    ee60da6e6857be1a92f867563c4dce294e646ce61e5a3caba1e6393cae62e276

    SHA512

    6f41845364071b823bdad5d836700dd512faae12fd0bbbf3944125955aae253a3b5cc1cd5ffb97d678fb33fbf6fe37ddf5ec54c5cf584393852d242503848caf

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • memory/1308-2356-0x0000000005110000-0x0000000005186000-memory.dmp

    Filesize

    472KB

  • memory/1308-2349-0x00000000054A0000-0x0000000005AA6000-memory.dmp

    Filesize

    6.0MB

  • memory/1308-2358-0x00000000053D0000-0x0000000005436000-memory.dmp

    Filesize

    408KB

  • memory/1308-2355-0x0000000004FA0000-0x0000000004FEB000-memory.dmp

    Filesize

    300KB

  • memory/1308-2361-0x0000000004E80000-0x0000000004E90000-memory.dmp

    Filesize

    64KB

  • memory/1308-2353-0x0000000004E80000-0x0000000004E90000-memory.dmp

    Filesize

    64KB

  • memory/1308-2342-0x0000000000480000-0x00000000004AE000-memory.dmp

    Filesize

    184KB

  • memory/1308-2351-0x0000000002730000-0x0000000002742000-memory.dmp

    Filesize

    72KB

  • memory/1308-2346-0x0000000000E40000-0x0000000000E46000-memory.dmp

    Filesize

    24KB

  • memory/1308-2357-0x0000000005230000-0x00000000052C2000-memory.dmp

    Filesize

    584KB

  • memory/2036-2370-0x0000000000650000-0x000000000068B000-memory.dmp

    Filesize

    236KB

  • memory/2252-2348-0x0000000006FD0000-0x0000000006FD6000-memory.dmp

    Filesize

    24KB

  • memory/2252-2359-0x000000000B660000-0x000000000B6B0000-memory.dmp

    Filesize

    320KB

  • memory/2252-2350-0x000000000A190000-0x000000000A29A000-memory.dmp

    Filesize

    1.0MB

  • memory/2252-2347-0x0000000000390000-0x00000000003C0000-memory.dmp

    Filesize

    192KB

  • memory/2252-2360-0x000000000B880000-0x000000000BA42000-memory.dmp

    Filesize

    1.8MB

  • memory/2252-2352-0x000000000A120000-0x000000000A15E000-memory.dmp

    Filesize

    248KB

  • memory/2252-2354-0x0000000004C40000-0x0000000004C50000-memory.dmp

    Filesize

    64KB

  • memory/2252-2362-0x0000000004C40000-0x0000000004C50000-memory.dmp

    Filesize

    64KB

  • memory/2252-2363-0x000000000BF80000-0x000000000C4AC000-memory.dmp

    Filesize

    5.2MB

  • memory/3624-201-0x00000000050B0000-0x0000000005110000-memory.dmp

    Filesize

    384KB

  • memory/3624-186-0x0000000002160000-0x00000000021BB000-memory.dmp

    Filesize

    364KB

  • memory/3624-189-0x00000000050B0000-0x0000000005110000-memory.dmp

    Filesize

    384KB

  • memory/3624-191-0x00000000050B0000-0x0000000005110000-memory.dmp

    Filesize

    384KB

  • memory/3624-193-0x00000000050B0000-0x0000000005110000-memory.dmp

    Filesize

    384KB

  • memory/3624-195-0x00000000050B0000-0x0000000005110000-memory.dmp

    Filesize

    384KB

  • memory/3624-197-0x00000000050B0000-0x0000000005110000-memory.dmp

    Filesize

    384KB

  • memory/3624-199-0x00000000050B0000-0x0000000005110000-memory.dmp

    Filesize

    384KB

  • memory/3624-187-0x00000000050B0000-0x0000000005116000-memory.dmp

    Filesize

    408KB

  • memory/3624-203-0x00000000050B0000-0x0000000005110000-memory.dmp

    Filesize

    384KB

  • memory/3624-205-0x00000000050B0000-0x0000000005110000-memory.dmp

    Filesize

    384KB

  • memory/3624-207-0x00000000050B0000-0x0000000005110000-memory.dmp

    Filesize

    384KB

  • memory/3624-209-0x00000000050B0000-0x0000000005110000-memory.dmp

    Filesize

    384KB

  • memory/3624-211-0x00000000050B0000-0x0000000005110000-memory.dmp

    Filesize

    384KB

  • memory/3624-213-0x00000000050B0000-0x0000000005110000-memory.dmp

    Filesize

    384KB

  • memory/3624-215-0x00000000050B0000-0x0000000005110000-memory.dmp

    Filesize

    384KB

  • memory/3624-217-0x00000000050B0000-0x0000000005110000-memory.dmp

    Filesize

    384KB

  • memory/3624-219-0x00000000050B0000-0x0000000005110000-memory.dmp

    Filesize

    384KB

  • memory/3624-221-0x00000000050B0000-0x0000000005110000-memory.dmp

    Filesize

    384KB

  • memory/3624-281-0x00000000024F0000-0x0000000002500000-memory.dmp

    Filesize

    64KB

  • memory/3624-284-0x00000000024F0000-0x0000000002500000-memory.dmp

    Filesize

    64KB

  • memory/3624-285-0x00000000024F0000-0x0000000002500000-memory.dmp

    Filesize

    64KB

  • memory/3624-2333-0x00000000052E0000-0x0000000005312000-memory.dmp

    Filesize

    200KB

  • memory/3624-2336-0x00000000024F0000-0x0000000002500000-memory.dmp

    Filesize

    64KB

  • memory/3624-185-0x0000000002470000-0x00000000024D8000-memory.dmp

    Filesize

    416KB

  • memory/3624-188-0x00000000050B0000-0x0000000005110000-memory.dmp

    Filesize

    384KB

  • memory/5008-158-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/5008-145-0x0000000002570000-0x0000000002588000-memory.dmp

    Filesize

    96KB

  • memory/5008-177-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/5008-176-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/5008-174-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/5008-172-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/5008-170-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/5008-168-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/5008-166-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/5008-164-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/5008-143-0x00000000024F0000-0x000000000250A000-memory.dmp

    Filesize

    104KB

  • memory/5008-178-0x0000000004C30000-0x0000000004C40000-memory.dmp

    Filesize

    64KB

  • memory/5008-154-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/5008-156-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/5008-180-0x0000000000400000-0x00000000004BE000-memory.dmp

    Filesize

    760KB

  • memory/5008-152-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/5008-150-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/5008-149-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/5008-148-0x0000000004C30000-0x0000000004C40000-memory.dmp

    Filesize

    64KB

  • memory/5008-147-0x0000000004C30000-0x0000000004C40000-memory.dmp

    Filesize

    64KB

  • memory/5008-146-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/5008-160-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/5008-144-0x0000000004C40000-0x000000000513E000-memory.dmp

    Filesize

    5.0MB

  • memory/5008-162-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB