Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14-04-2023 03:17

General

  • Target

    fb1d2f35f2c1914bf147bebf06b71161b28a71d928e80aab6dc11f5ba2813b3a.exe

  • Size

    1.2MB

  • MD5

    192b9b2d9c93005ad91c55cd6e201424

  • SHA1

    bfb09bd9b9d6b4f847cbc7cb7e4842102113a076

  • SHA256

    fb1d2f35f2c1914bf147bebf06b71161b28a71d928e80aab6dc11f5ba2813b3a

  • SHA512

    e12fedc503815e787e4fb5ed175fd3010dd54afda4065f77d36485d521bdba1a41ca6cbb5ebe40a9b33681f8b5068177dd9cefbc3f9a31884f9d7b30f689d728

  • SSDEEP

    24576:gyiG8TBpcbjKEVZcrPHSPsY8Fg6oSZJYR3cYf2w0nM/xn:nONpp7Hza6oSfo3l0nM/x

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

disa

C2

185.161.248.90:4125

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb1d2f35f2c1914bf147bebf06b71161b28a71d928e80aab6dc11f5ba2813b3a.exe
    "C:\Users\Admin\AppData\Local\Temp\fb1d2f35f2c1914bf147bebf06b71161b28a71d928e80aab6dc11f5ba2813b3a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1804
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un788747.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un788747.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2144
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un353320.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un353320.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2512
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr037002.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr037002.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4780
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu776085.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu776085.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3820
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3640
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk332086.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk332086.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4620
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si261725.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si261725.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      PID:3892
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3892 -s 636
        3⤵
        • Program crash
        PID:3048
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3892 -s 712
        3⤵
        • Program crash
        PID:4928
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3892 -s 852
        3⤵
        • Program crash
        PID:4144
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3892 -s 856
        3⤵
        • Program crash
        PID:4472
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3892 -s 888
        3⤵
        • Program crash
        PID:4512
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3892 -s 892
        3⤵
        • Program crash
        PID:4452
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3892 -s 1128
        3⤵
        • Program crash
        PID:4492
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3892 -s 1160
        3⤵
        • Program crash
        PID:4432
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3892 -s 1088
        3⤵
        • Program crash
        PID:3116

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si261725.exe

    Filesize

    397KB

    MD5

    73322119dde2931ef4675da872b6e388

    SHA1

    666909e836d4896520d7b01669820f0e8eb103a1

    SHA256

    a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3

    SHA512

    360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si261725.exe

    Filesize

    397KB

    MD5

    73322119dde2931ef4675da872b6e388

    SHA1

    666909e836d4896520d7b01669820f0e8eb103a1

    SHA256

    a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3

    SHA512

    360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un788747.exe

    Filesize

    862KB

    MD5

    fa7db956c5e72138958619da6d782873

    SHA1

    5edfd8d7ed8cb01827dc8bfd72d64f732f432889

    SHA256

    cb5e8f4c94572f582ea8f8d92d015fd941f3d38e3f367a8f4071bb656ee7575b

    SHA512

    60f7b786fb1a537eea651b5da0d87c5ae3094068b2670275fc083fa75aae354813ebecc332d2f70d3f3bf68024d4208f890bc51a297aa9d150c2324a5965241d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un788747.exe

    Filesize

    862KB

    MD5

    fa7db956c5e72138958619da6d782873

    SHA1

    5edfd8d7ed8cb01827dc8bfd72d64f732f432889

    SHA256

    cb5e8f4c94572f582ea8f8d92d015fd941f3d38e3f367a8f4071bb656ee7575b

    SHA512

    60f7b786fb1a537eea651b5da0d87c5ae3094068b2670275fc083fa75aae354813ebecc332d2f70d3f3bf68024d4208f890bc51a297aa9d150c2324a5965241d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk332086.exe

    Filesize

    169KB

    MD5

    7c169d786b3b2fee17ae7253d17e0d2d

    SHA1

    4e435e36a43af553eba36852deffe23a0c561f3f

    SHA256

    4d87fb2c6f67ceb88e569d7e1f8de70ed4904f213bcb4fb4c4afba8158f21630

    SHA512

    49a197a2c5fd464dce49a5e72ba868c8fea3dd2e2bd8b9f4b62f685dd879f3947c1d062bcb5916761bb9f5aab878ea1ec73b5291e291c93ba14408542f1e3516

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk332086.exe

    Filesize

    169KB

    MD5

    7c169d786b3b2fee17ae7253d17e0d2d

    SHA1

    4e435e36a43af553eba36852deffe23a0c561f3f

    SHA256

    4d87fb2c6f67ceb88e569d7e1f8de70ed4904f213bcb4fb4c4afba8158f21630

    SHA512

    49a197a2c5fd464dce49a5e72ba868c8fea3dd2e2bd8b9f4b62f685dd879f3947c1d062bcb5916761bb9f5aab878ea1ec73b5291e291c93ba14408542f1e3516

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un353320.exe

    Filesize

    708KB

    MD5

    e465939aa9a0f8cdc947c1941270a8f4

    SHA1

    6c8cb621925fd524fafdd6b232f4326c52eb01f4

    SHA256

    ad1821c99226fd6abb7412020c683b699f49599554ca12cb56e0e5624248ace8

    SHA512

    64c9ec88b842137d0dd2d0e7ec476adaa46ba1ca42f5b73d27804fa2cd9430748e893f0d5d3e67d47c13fac557d29dee01a9079289fbbe5dc96f5fac5f0b3bef

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un353320.exe

    Filesize

    708KB

    MD5

    e465939aa9a0f8cdc947c1941270a8f4

    SHA1

    6c8cb621925fd524fafdd6b232f4326c52eb01f4

    SHA256

    ad1821c99226fd6abb7412020c683b699f49599554ca12cb56e0e5624248ace8

    SHA512

    64c9ec88b842137d0dd2d0e7ec476adaa46ba1ca42f5b73d27804fa2cd9430748e893f0d5d3e67d47c13fac557d29dee01a9079289fbbe5dc96f5fac5f0b3bef

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr037002.exe

    Filesize

    405KB

    MD5

    923715c404c43f2b8e0aa342a4472a17

    SHA1

    0bde0bcf6b5808b6a788674ad489d93374c84789

    SHA256

    e7798d08fd3448f85b867b0d1f9e6756c394aba6b8a366cbdf49fcf354eadc8b

    SHA512

    57094bd0fefbfd22a5b3c3a1978ed2ebaa20f7029a84af30d44d09492abe16ca3b878a125f8d05f12a45d9e2b9466206ff061aacf1c0ffd9467ea2c95cecf62d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr037002.exe

    Filesize

    405KB

    MD5

    923715c404c43f2b8e0aa342a4472a17

    SHA1

    0bde0bcf6b5808b6a788674ad489d93374c84789

    SHA256

    e7798d08fd3448f85b867b0d1f9e6756c394aba6b8a366cbdf49fcf354eadc8b

    SHA512

    57094bd0fefbfd22a5b3c3a1978ed2ebaa20f7029a84af30d44d09492abe16ca3b878a125f8d05f12a45d9e2b9466206ff061aacf1c0ffd9467ea2c95cecf62d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu776085.exe

    Filesize

    588KB

    MD5

    ea78c85ff964197a6acc5fbb19e06d8f

    SHA1

    4a10364181a8ba3341474c6648f62c98d8885962

    SHA256

    34de080a9cd8b86d408bc26be8ba1fe3e5d030f804033670a4e5ed7ab8396b73

    SHA512

    cc03c15faf96f46ad8c62e6180884a1e9311a8d8b93b664c43a75ecacdb581e0c7cb2e531cec44e5dae5332f203a4294e97987c85ee6ccded9836dad2ee0ac0b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu776085.exe

    Filesize

    588KB

    MD5

    ea78c85ff964197a6acc5fbb19e06d8f

    SHA1

    4a10364181a8ba3341474c6648f62c98d8885962

    SHA256

    34de080a9cd8b86d408bc26be8ba1fe3e5d030f804033670a4e5ed7ab8396b73

    SHA512

    cc03c15faf96f46ad8c62e6180884a1e9311a8d8b93b664c43a75ecacdb581e0c7cb2e531cec44e5dae5332f203a4294e97987c85ee6ccded9836dad2ee0ac0b

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • memory/3640-2351-0x0000000004A50000-0x0000000004A9B000-memory.dmp

    Filesize

    300KB

  • memory/3640-2359-0x00000000048F0000-0x0000000004900000-memory.dmp

    Filesize

    64KB

  • memory/3640-2345-0x0000000004840000-0x0000000004846000-memory.dmp

    Filesize

    24KB

  • memory/3640-2361-0x00000000072B0000-0x00000000077DC000-memory.dmp

    Filesize

    5.2MB

  • memory/3640-2340-0x0000000000090000-0x00000000000BE000-memory.dmp

    Filesize

    184KB

  • memory/3640-2347-0x0000000005010000-0x0000000005616000-memory.dmp

    Filesize

    6.0MB

  • memory/3640-2357-0x0000000005CC0000-0x0000000005D10000-memory.dmp

    Filesize

    320KB

  • memory/3640-2353-0x00000000048F0000-0x0000000004900000-memory.dmp

    Filesize

    64KB

  • memory/3640-2355-0x0000000004E40000-0x0000000004ED2000-memory.dmp

    Filesize

    584KB

  • memory/3820-194-0x0000000002880000-0x00000000028E0000-memory.dmp

    Filesize

    384KB

  • memory/3820-218-0x0000000002880000-0x00000000028E0000-memory.dmp

    Filesize

    384KB

  • memory/3820-2332-0x0000000002A60000-0x0000000002A92000-memory.dmp

    Filesize

    200KB

  • memory/3820-330-0x0000000005040000-0x0000000005050000-memory.dmp

    Filesize

    64KB

  • memory/3820-222-0x0000000002880000-0x00000000028E0000-memory.dmp

    Filesize

    384KB

  • memory/3820-220-0x0000000002880000-0x00000000028E0000-memory.dmp

    Filesize

    384KB

  • memory/3820-216-0x0000000002880000-0x00000000028E0000-memory.dmp

    Filesize

    384KB

  • memory/3820-214-0x0000000002880000-0x00000000028E0000-memory.dmp

    Filesize

    384KB

  • memory/3820-212-0x0000000002880000-0x00000000028E0000-memory.dmp

    Filesize

    384KB

  • memory/3820-184-0x0000000002810000-0x0000000002878000-memory.dmp

    Filesize

    416KB

  • memory/3820-186-0x0000000005040000-0x0000000005050000-memory.dmp

    Filesize

    64KB

  • memory/3820-185-0x00000000024E0000-0x000000000253B000-memory.dmp

    Filesize

    364KB

  • memory/3820-188-0x0000000002880000-0x00000000028E6000-memory.dmp

    Filesize

    408KB

  • memory/3820-187-0x0000000005040000-0x0000000005050000-memory.dmp

    Filesize

    64KB

  • memory/3820-190-0x0000000002880000-0x00000000028E0000-memory.dmp

    Filesize

    384KB

  • memory/3820-189-0x0000000002880000-0x00000000028E0000-memory.dmp

    Filesize

    384KB

  • memory/3820-192-0x0000000002880000-0x00000000028E0000-memory.dmp

    Filesize

    384KB

  • memory/3820-210-0x0000000002880000-0x00000000028E0000-memory.dmp

    Filesize

    384KB

  • memory/3820-196-0x0000000002880000-0x00000000028E0000-memory.dmp

    Filesize

    384KB

  • memory/3820-198-0x0000000002880000-0x00000000028E0000-memory.dmp

    Filesize

    384KB

  • memory/3820-200-0x0000000002880000-0x00000000028E0000-memory.dmp

    Filesize

    384KB

  • memory/3820-202-0x0000000002880000-0x00000000028E0000-memory.dmp

    Filesize

    384KB

  • memory/3820-204-0x0000000002880000-0x00000000028E0000-memory.dmp

    Filesize

    384KB

  • memory/3820-206-0x0000000002880000-0x00000000028E0000-memory.dmp

    Filesize

    384KB

  • memory/3820-208-0x0000000002880000-0x00000000028E0000-memory.dmp

    Filesize

    384KB

  • memory/3892-2368-0x0000000000BB0000-0x0000000000BEB000-memory.dmp

    Filesize

    236KB

  • memory/4620-2354-0x000000000AC70000-0x000000000ACE6000-memory.dmp

    Filesize

    472KB

  • memory/4620-2356-0x000000000ACF0000-0x000000000AD56000-memory.dmp

    Filesize

    408KB

  • memory/4620-2360-0x000000000C2F0000-0x000000000C4B2000-memory.dmp

    Filesize

    1.8MB

  • memory/4620-2358-0x0000000005540000-0x0000000005550000-memory.dmp

    Filesize

    64KB

  • memory/4620-2352-0x0000000005540000-0x0000000005550000-memory.dmp

    Filesize

    64KB

  • memory/4620-2350-0x000000000A950000-0x000000000A98E000-memory.dmp

    Filesize

    248KB

  • memory/4620-2346-0x0000000002BF0000-0x0000000002BF6000-memory.dmp

    Filesize

    24KB

  • memory/4620-2348-0x000000000A9E0000-0x000000000AAEA000-memory.dmp

    Filesize

    1.0MB

  • memory/4620-2344-0x0000000000BC0000-0x0000000000BF0000-memory.dmp

    Filesize

    192KB

  • memory/4620-2349-0x000000000A8F0000-0x000000000A902000-memory.dmp

    Filesize

    72KB

  • memory/4780-157-0x0000000004E70000-0x0000000004E82000-memory.dmp

    Filesize

    72KB

  • memory/4780-143-0x00000000023B0000-0x00000000023CA000-memory.dmp

    Filesize

    104KB

  • memory/4780-165-0x0000000004E70000-0x0000000004E82000-memory.dmp

    Filesize

    72KB

  • memory/4780-153-0x0000000004E70000-0x0000000004E82000-memory.dmp

    Filesize

    72KB

  • memory/4780-155-0x0000000004E70000-0x0000000004E82000-memory.dmp

    Filesize

    72KB

  • memory/4780-175-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

    Filesize

    64KB

  • memory/4780-167-0x0000000004E70000-0x0000000004E82000-memory.dmp

    Filesize

    72KB

  • memory/4780-174-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

    Filesize

    64KB

  • memory/4780-163-0x0000000004E70000-0x0000000004E82000-memory.dmp

    Filesize

    72KB

  • memory/4780-176-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

    Filesize

    64KB

  • memory/4780-169-0x0000000004E70000-0x0000000004E82000-memory.dmp

    Filesize

    72KB

  • memory/4780-151-0x0000000004E70000-0x0000000004E82000-memory.dmp

    Filesize

    72KB

  • memory/4780-147-0x0000000004E70000-0x0000000004E82000-memory.dmp

    Filesize

    72KB

  • memory/4780-177-0x0000000000400000-0x000000000080A000-memory.dmp

    Filesize

    4.0MB

  • memory/4780-161-0x0000000004E70000-0x0000000004E82000-memory.dmp

    Filesize

    72KB

  • memory/4780-171-0x0000000004E70000-0x0000000004E82000-memory.dmp

    Filesize

    72KB

  • memory/4780-146-0x0000000004E70000-0x0000000004E82000-memory.dmp

    Filesize

    72KB

  • memory/4780-173-0x0000000004E70000-0x0000000004E82000-memory.dmp

    Filesize

    72KB

  • memory/4780-145-0x0000000004E70000-0x0000000004E88000-memory.dmp

    Filesize

    96KB

  • memory/4780-179-0x0000000000400000-0x000000000080A000-memory.dmp

    Filesize

    4.0MB

  • memory/4780-144-0x0000000004FF0000-0x00000000054EE000-memory.dmp

    Filesize

    5.0MB

  • memory/4780-159-0x0000000004E70000-0x0000000004E82000-memory.dmp

    Filesize

    72KB

  • memory/4780-142-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4780-149-0x0000000004E70000-0x0000000004E82000-memory.dmp

    Filesize

    72KB