Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14-04-2023 03:37

General

  • Target

    07eaf522ff0abcf8b16637c178ce6921e69dd9888cfc124fd497c30e9073fb56.exe

  • Size

    1.2MB

  • MD5

    7892522a6d15e4ae8c773c89b7859b8a

  • SHA1

    ab6d4b9f466a0d420d037e35a9b5950b1a696ba7

  • SHA256

    07eaf522ff0abcf8b16637c178ce6921e69dd9888cfc124fd497c30e9073fb56

  • SHA512

    1ed5589a3d383e19aff9c7894e738722586826e77af2ebd9d1adce211cab04d121b3146c7911be97c047a494c47638ececa91efd939521ea0f233a5759de0a83

  • SSDEEP

    24576:QyxDz4aI408LhrzF+qv/YCK8CCSZJfRVcvhTx60ctJ3pU:XxDkaI+JF+a9CCSfpVcvhTcntJ3

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

disa

C2

185.161.248.90:4125

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07eaf522ff0abcf8b16637c178ce6921e69dd9888cfc124fd497c30e9073fb56.exe
    "C:\Users\Admin\AppData\Local\Temp\07eaf522ff0abcf8b16637c178ce6921e69dd9888cfc124fd497c30e9073fb56.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3724
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un731360.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un731360.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3708
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un288308.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un288308.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4128
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr835339.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr835339.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4508
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu167594.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu167594.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4696
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4016
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk255222.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk255222.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2812
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si380156.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si380156.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      PID:2516
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 636
        3⤵
        • Program crash
        PID:4508
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 712
        3⤵
        • Program crash
        PID:1324
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 852
        3⤵
        • Program crash
        PID:1460
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 828
        3⤵
        • Program crash
        PID:1276
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 912
        3⤵
        • Program crash
        PID:2656
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 884
        3⤵
        • Program crash
        PID:4440
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 1128
        3⤵
        • Program crash
        PID:3576
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 1168
        3⤵
        • Program crash
        PID:3640
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 1216
        3⤵
        • Program crash
        PID:3680

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si380156.exe

    Filesize

    397KB

    MD5

    73322119dde2931ef4675da872b6e388

    SHA1

    666909e836d4896520d7b01669820f0e8eb103a1

    SHA256

    a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3

    SHA512

    360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si380156.exe

    Filesize

    397KB

    MD5

    73322119dde2931ef4675da872b6e388

    SHA1

    666909e836d4896520d7b01669820f0e8eb103a1

    SHA256

    a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3

    SHA512

    360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un731360.exe

    Filesize

    862KB

    MD5

    b8172d625750ac9e86fe82660cd7b98b

    SHA1

    918971b25da1e7b702b82c6415cd145744790710

    SHA256

    68f3beee8daa752dc3a659ebedb6e43f8e90627e3fd7c507b583e0b494d6999c

    SHA512

    25ba0c6be60426017a42ef01f75a172d8188de67f90b7dd8c2c3bc5a150a34dee7de31abe67700cf1ceb2f74f419801931198b07d727ea478113ea6c514cbd45

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un731360.exe

    Filesize

    862KB

    MD5

    b8172d625750ac9e86fe82660cd7b98b

    SHA1

    918971b25da1e7b702b82c6415cd145744790710

    SHA256

    68f3beee8daa752dc3a659ebedb6e43f8e90627e3fd7c507b583e0b494d6999c

    SHA512

    25ba0c6be60426017a42ef01f75a172d8188de67f90b7dd8c2c3bc5a150a34dee7de31abe67700cf1ceb2f74f419801931198b07d727ea478113ea6c514cbd45

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk255222.exe

    Filesize

    169KB

    MD5

    0db7aa3c3e65a50a2270d37d0ea3efb2

    SHA1

    9bf5a890ada4ab13d3997284bd5e164cb5af7d64

    SHA256

    70bdc2eb90848a14fa219a584ca8c55ffdec75b3b076704cca20a7b6272ed718

    SHA512

    bd7758473d0aee650cd0f18ea9e49e536c2eef5bbc0cbc582521dc81feb669324462e39f1a2744cf2f90b7fe2c9441b2ec2ab9483a2c8ce85a6927e2fe3bcde1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk255222.exe

    Filesize

    169KB

    MD5

    0db7aa3c3e65a50a2270d37d0ea3efb2

    SHA1

    9bf5a890ada4ab13d3997284bd5e164cb5af7d64

    SHA256

    70bdc2eb90848a14fa219a584ca8c55ffdec75b3b076704cca20a7b6272ed718

    SHA512

    bd7758473d0aee650cd0f18ea9e49e536c2eef5bbc0cbc582521dc81feb669324462e39f1a2744cf2f90b7fe2c9441b2ec2ab9483a2c8ce85a6927e2fe3bcde1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un288308.exe

    Filesize

    708KB

    MD5

    4f68218b5334e6275e4afedfdee65c96

    SHA1

    dc55ccf6077ce3e0825cd9fd50d0c2d05b6b30c8

    SHA256

    95c6f29c2fb24a9e742152746af76fb822a02d7daedce351363d4d84f262f295

    SHA512

    e666cc5885c948e03cd0ca0220425e6a3f5932f5a588d49b50575005bfd582ee471daa7b349fef5531ddb39ce0a0d3a6cf491e995770103827b59c25c5e1a497

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un288308.exe

    Filesize

    708KB

    MD5

    4f68218b5334e6275e4afedfdee65c96

    SHA1

    dc55ccf6077ce3e0825cd9fd50d0c2d05b6b30c8

    SHA256

    95c6f29c2fb24a9e742152746af76fb822a02d7daedce351363d4d84f262f295

    SHA512

    e666cc5885c948e03cd0ca0220425e6a3f5932f5a588d49b50575005bfd582ee471daa7b349fef5531ddb39ce0a0d3a6cf491e995770103827b59c25c5e1a497

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr835339.exe

    Filesize

    405KB

    MD5

    3fb23c6e954f441280a664a588f9c803

    SHA1

    e809ca627bfe774fdce1c4a30ebdf8a74dc29422

    SHA256

    b2ca0cc2a7ac05ca67aad2b2ef171448683c0741c103912815da7ca5c5409db9

    SHA512

    35d80ec4a40956184a5b64f09d371edbd42d63338b3555e21fcecce4e474650f7d3883a6cbb6a84b7a3e50e06baacd4c19561b8462bdf1a89d33e5aa527cbf58

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr835339.exe

    Filesize

    405KB

    MD5

    3fb23c6e954f441280a664a588f9c803

    SHA1

    e809ca627bfe774fdce1c4a30ebdf8a74dc29422

    SHA256

    b2ca0cc2a7ac05ca67aad2b2ef171448683c0741c103912815da7ca5c5409db9

    SHA512

    35d80ec4a40956184a5b64f09d371edbd42d63338b3555e21fcecce4e474650f7d3883a6cbb6a84b7a3e50e06baacd4c19561b8462bdf1a89d33e5aa527cbf58

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu167594.exe

    Filesize

    588KB

    MD5

    947aeeea1cf72401724a8de47ecd80ca

    SHA1

    79a17937c851cd45bbf8c1fc1b093f7f5ff3284d

    SHA256

    e44cb4884d8af2ab13129c2d8ca71c3e862d2b9b9b751269da2d2257b931614b

    SHA512

    f2b07c6c34bf81434fa9db6983d55af1a9ea030c3b4dea36938184eb729ccd92acff13238cd75a9becf64dfba20719a1e0ac9b467e3e5f28b3ede57747916291

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu167594.exe

    Filesize

    588KB

    MD5

    947aeeea1cf72401724a8de47ecd80ca

    SHA1

    79a17937c851cd45bbf8c1fc1b093f7f5ff3284d

    SHA256

    e44cb4884d8af2ab13129c2d8ca71c3e862d2b9b9b751269da2d2257b931614b

    SHA512

    f2b07c6c34bf81434fa9db6983d55af1a9ea030c3b4dea36938184eb729ccd92acff13238cd75a9becf64dfba20719a1e0ac9b467e3e5f28b3ede57747916291

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • memory/2516-2368-0x0000000000960000-0x000000000099B000-memory.dmp

    Filesize

    236KB

  • memory/2812-2354-0x000000000AC90000-0x000000000AD06000-memory.dmp

    Filesize

    472KB

  • memory/2812-2346-0x0000000002D50000-0x0000000002D56000-memory.dmp

    Filesize

    24KB

  • memory/2812-2353-0x00000000053D0000-0x00000000053E0000-memory.dmp

    Filesize

    64KB

  • memory/2812-2361-0x00000000053D0000-0x00000000053E0000-memory.dmp

    Filesize

    64KB

  • memory/2812-2359-0x000000000C7E0000-0x000000000CD0C000-memory.dmp

    Filesize

    5.2MB

  • memory/2812-2358-0x000000000C0E0000-0x000000000C2A2000-memory.dmp

    Filesize

    1.8MB

  • memory/2812-2350-0x000000000A970000-0x000000000A9AE000-memory.dmp

    Filesize

    248KB

  • memory/2812-2357-0x000000000B920000-0x000000000B970000-memory.dmp

    Filesize

    320KB

  • memory/2812-2348-0x000000000A9E0000-0x000000000AAEA000-memory.dmp

    Filesize

    1.0MB

  • memory/2812-2345-0x0000000000BE0000-0x0000000000C10000-memory.dmp

    Filesize

    192KB

  • memory/4016-2356-0x0000000005100000-0x0000000005166000-memory.dmp

    Filesize

    408KB

  • memory/4016-2347-0x0000000005270000-0x0000000005876000-memory.dmp

    Filesize

    6.0MB

  • memory/4016-2349-0x0000000004AB0000-0x0000000004AC2000-memory.dmp

    Filesize

    72KB

  • memory/4016-2355-0x0000000005060000-0x00000000050F2000-memory.dmp

    Filesize

    584KB

  • memory/4016-2341-0x0000000002350000-0x0000000002356000-memory.dmp

    Filesize

    24KB

  • memory/4016-2351-0x0000000004C70000-0x0000000004CBB000-memory.dmp

    Filesize

    300KB

  • memory/4016-2360-0x0000000004B50000-0x0000000004B60000-memory.dmp

    Filesize

    64KB

  • memory/4016-2340-0x00000000002B0000-0x00000000002DE000-memory.dmp

    Filesize

    184KB

  • memory/4016-2352-0x0000000004B50000-0x0000000004B60000-memory.dmp

    Filesize

    64KB

  • memory/4508-166-0x0000000005000000-0x0000000005010000-memory.dmp

    Filesize

    64KB

  • memory/4508-179-0x0000000000400000-0x000000000080A000-memory.dmp

    Filesize

    4.0MB

  • memory/4508-142-0x00000000024B0000-0x00000000024CA000-memory.dmp

    Filesize

    104KB

  • memory/4508-143-0x0000000005010000-0x000000000550E000-memory.dmp

    Filesize

    5.0MB

  • memory/4508-144-0x0000000002810000-0x0000000002828000-memory.dmp

    Filesize

    96KB

  • memory/4508-145-0x0000000002810000-0x0000000002822000-memory.dmp

    Filesize

    72KB

  • memory/4508-146-0x0000000002810000-0x0000000002822000-memory.dmp

    Filesize

    72KB

  • memory/4508-148-0x0000000002810000-0x0000000002822000-memory.dmp

    Filesize

    72KB

  • memory/4508-150-0x0000000002810000-0x0000000002822000-memory.dmp

    Filesize

    72KB

  • memory/4508-152-0x0000000002810000-0x0000000002822000-memory.dmp

    Filesize

    72KB

  • memory/4508-154-0x0000000002810000-0x0000000002822000-memory.dmp

    Filesize

    72KB

  • memory/4508-156-0x0000000002810000-0x0000000002822000-memory.dmp

    Filesize

    72KB

  • memory/4508-158-0x0000000002810000-0x0000000002822000-memory.dmp

    Filesize

    72KB

  • memory/4508-160-0x0000000002810000-0x0000000002822000-memory.dmp

    Filesize

    72KB

  • memory/4508-162-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4508-164-0x0000000005000000-0x0000000005010000-memory.dmp

    Filesize

    64KB

  • memory/4508-168-0x0000000002810000-0x0000000002822000-memory.dmp

    Filesize

    72KB

  • memory/4508-170-0x0000000002810000-0x0000000002822000-memory.dmp

    Filesize

    72KB

  • memory/4508-167-0x0000000005000000-0x0000000005010000-memory.dmp

    Filesize

    64KB

  • memory/4508-163-0x0000000002810000-0x0000000002822000-memory.dmp

    Filesize

    72KB

  • memory/4508-172-0x0000000002810000-0x0000000002822000-memory.dmp

    Filesize

    72KB

  • memory/4508-174-0x0000000002810000-0x0000000002822000-memory.dmp

    Filesize

    72KB

  • memory/4508-176-0x0000000002810000-0x0000000002822000-memory.dmp

    Filesize

    72KB

  • memory/4508-177-0x0000000000400000-0x000000000080A000-memory.dmp

    Filesize

    4.0MB

  • memory/4696-207-0x0000000002970000-0x00000000029D0000-memory.dmp

    Filesize

    384KB

  • memory/4696-188-0x0000000005150000-0x0000000005160000-memory.dmp

    Filesize

    64KB

  • memory/4696-185-0x0000000002970000-0x00000000029D6000-memory.dmp

    Filesize

    408KB

  • memory/4696-186-0x00000000009D0000-0x0000000000A2B000-memory.dmp

    Filesize

    364KB

  • memory/4696-2332-0x0000000002BD0000-0x0000000002C02000-memory.dmp

    Filesize

    200KB

  • memory/4696-223-0x0000000002970000-0x00000000029D0000-memory.dmp

    Filesize

    384KB

  • memory/4696-221-0x0000000002970000-0x00000000029D0000-memory.dmp

    Filesize

    384KB

  • memory/4696-219-0x0000000002970000-0x00000000029D0000-memory.dmp

    Filesize

    384KB

  • memory/4696-217-0x0000000002970000-0x00000000029D0000-memory.dmp

    Filesize

    384KB

  • memory/4696-215-0x0000000002970000-0x00000000029D0000-memory.dmp

    Filesize

    384KB

  • memory/4696-213-0x0000000002970000-0x00000000029D0000-memory.dmp

    Filesize

    384KB

  • memory/4696-211-0x0000000002970000-0x00000000029D0000-memory.dmp

    Filesize

    384KB

  • memory/4696-209-0x0000000002970000-0x00000000029D0000-memory.dmp

    Filesize

    384KB

  • memory/4696-184-0x0000000002770000-0x00000000027D8000-memory.dmp

    Filesize

    416KB

  • memory/4696-205-0x0000000002970000-0x00000000029D0000-memory.dmp

    Filesize

    384KB

  • memory/4696-203-0x0000000002970000-0x00000000029D0000-memory.dmp

    Filesize

    384KB

  • memory/4696-195-0x0000000002970000-0x00000000029D0000-memory.dmp

    Filesize

    384KB

  • memory/4696-201-0x0000000002970000-0x00000000029D0000-memory.dmp

    Filesize

    384KB

  • memory/4696-197-0x0000000002970000-0x00000000029D0000-memory.dmp

    Filesize

    384KB

  • memory/4696-199-0x0000000002970000-0x00000000029D0000-memory.dmp

    Filesize

    384KB

  • memory/4696-193-0x0000000002970000-0x00000000029D0000-memory.dmp

    Filesize

    384KB

  • memory/4696-191-0x0000000002970000-0x00000000029D0000-memory.dmp

    Filesize

    384KB

  • memory/4696-189-0x0000000005150000-0x0000000005160000-memory.dmp

    Filesize

    64KB

  • memory/4696-190-0x0000000002970000-0x00000000029D0000-memory.dmp

    Filesize

    384KB

  • memory/4696-187-0x0000000005150000-0x0000000005160000-memory.dmp

    Filesize

    64KB