Analysis

  • max time kernel
    145s
  • max time network
    103s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14-04-2023 03:59

General

  • Target

    2b362b73687c029adce20f592320eaac7a9a1da91744a76b28508f4fdaa3a529.exe

  • Size

    1.2MB

  • MD5

    3ee245445f60af27ad771a79a76d4155

  • SHA1

    d66e6192dde9606e81d318cede93843490023831

  • SHA256

    2b362b73687c029adce20f592320eaac7a9a1da91744a76b28508f4fdaa3a529

  • SHA512

    59cb4d4886bbccdb13c61f7549e3995dcf5f4407a09cb60e3deb845a00df5d82f61242f4ac100dd74d25050c644e1f2ab3ed93fb6b44231c02ef129007e15f63

  • SSDEEP

    24576:+y/yvsFZdERmtFOs8rEPwkWFN67xPvSZJxReXhXYIra6tG9w:N/yvyfFD8r2wQtPvSfbeXNrPtW

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

disa

C2

185.161.248.90:4125

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b362b73687c029adce20f592320eaac7a9a1da91744a76b28508f4fdaa3a529.exe
    "C:\Users\Admin\AppData\Local\Temp\2b362b73687c029adce20f592320eaac7a9a1da91744a76b28508f4fdaa3a529.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3640
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un357486.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un357486.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3604
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un603166.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un603166.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4156
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr517475.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr517475.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4488
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu148753.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu148753.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3876
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:208
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk910729.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk910729.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2168
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si088713.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si088713.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      PID:8
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 8 -s 636
        3⤵
        • Program crash
        PID:3596
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 8 -s 712
        3⤵
        • Program crash
        PID:2556
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 8 -s 848
        3⤵
        • Program crash
        PID:1928
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 8 -s 836
        3⤵
        • Program crash
        PID:1016
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 8 -s 900
        3⤵
        • Program crash
        PID:4316
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 8 -s 940
        3⤵
        • Program crash
        PID:4536
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 8 -s 1136
        3⤵
        • Program crash
        PID:4416
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 8 -s 1160
        3⤵
        • Program crash
        PID:2152
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 8 -s 1076
        3⤵
        • Program crash
        PID:960

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si088713.exe

    Filesize

    397KB

    MD5

    73322119dde2931ef4675da872b6e388

    SHA1

    666909e836d4896520d7b01669820f0e8eb103a1

    SHA256

    a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3

    SHA512

    360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si088713.exe

    Filesize

    397KB

    MD5

    73322119dde2931ef4675da872b6e388

    SHA1

    666909e836d4896520d7b01669820f0e8eb103a1

    SHA256

    a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3

    SHA512

    360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un357486.exe

    Filesize

    861KB

    MD5

    ea0cd7db463c567b68670c7443ff3277

    SHA1

    d957167f942837d7c2f172de942f8585b7cb260e

    SHA256

    80346e6b5e87fc68bc1d815eb9dbbc7d1cd8913b6f1642d63b21b83b674c355a

    SHA512

    678b62e3e8ffa5208f08296d4f51643af942ae2b70a226f7f052285c871bfbbe1adc55b40105d06f8e9e2d88a958aafdf15512597781dad842cb6407222f4312

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un357486.exe

    Filesize

    861KB

    MD5

    ea0cd7db463c567b68670c7443ff3277

    SHA1

    d957167f942837d7c2f172de942f8585b7cb260e

    SHA256

    80346e6b5e87fc68bc1d815eb9dbbc7d1cd8913b6f1642d63b21b83b674c355a

    SHA512

    678b62e3e8ffa5208f08296d4f51643af942ae2b70a226f7f052285c871bfbbe1adc55b40105d06f8e9e2d88a958aafdf15512597781dad842cb6407222f4312

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk910729.exe

    Filesize

    169KB

    MD5

    e46cf6461f6ba1b9f70d0bea0611d566

    SHA1

    0705e475a9e012003530802b3f5fd985f9d3a3a2

    SHA256

    816c3e5460cab08ef6434574ccacc692035c376aedf55ca676b16b1cafdb89bb

    SHA512

    8d63b8414556805586bf59718569f7f36f3c4ff61439c1915dd9b6bf1b91d1a50c01e3fb78d1eb561b09c2675615bc04acc76099270613aac08cb0ec6c5b4e92

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk910729.exe

    Filesize

    169KB

    MD5

    e46cf6461f6ba1b9f70d0bea0611d566

    SHA1

    0705e475a9e012003530802b3f5fd985f9d3a3a2

    SHA256

    816c3e5460cab08ef6434574ccacc692035c376aedf55ca676b16b1cafdb89bb

    SHA512

    8d63b8414556805586bf59718569f7f36f3c4ff61439c1915dd9b6bf1b91d1a50c01e3fb78d1eb561b09c2675615bc04acc76099270613aac08cb0ec6c5b4e92

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un603166.exe

    Filesize

    708KB

    MD5

    7d5cb3c9e28fe4361740d2c912023faa

    SHA1

    e690c2d4c2d0fed44ff98a2ec91fbb8722f39c67

    SHA256

    5d5c6f1439a657cb1f3295dd6e0eb9243465e18511ed058f981e759a3b8c62bc

    SHA512

    19d79ce3ba3d51c7e1fcdc74f98bef75dfc9d42b76fc2777f97dd7a9e2f99901c9d51273414d39caecfbbc9a989d4c45b6d8d2b7f91e55299d203ca1fda139d5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un603166.exe

    Filesize

    708KB

    MD5

    7d5cb3c9e28fe4361740d2c912023faa

    SHA1

    e690c2d4c2d0fed44ff98a2ec91fbb8722f39c67

    SHA256

    5d5c6f1439a657cb1f3295dd6e0eb9243465e18511ed058f981e759a3b8c62bc

    SHA512

    19d79ce3ba3d51c7e1fcdc74f98bef75dfc9d42b76fc2777f97dd7a9e2f99901c9d51273414d39caecfbbc9a989d4c45b6d8d2b7f91e55299d203ca1fda139d5

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr517475.exe

    Filesize

    405KB

    MD5

    9e44610084132b9badb3c7796766e3ee

    SHA1

    2539551f695525f46ecd6cb75fb97882c68a7737

    SHA256

    709a314949520a8df9d2af79591a3a41e6ec2dba1c6e8107024cadb64b3b7474

    SHA512

    a140eb308b67df7d1fa6d249f90a0b1d5f7d4100810c69cc0e7fd3520e6c82c90b452c78e9a01692fab58a69e29682caae02e28f9f5df91d86eb365ccf6edffa

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr517475.exe

    Filesize

    405KB

    MD5

    9e44610084132b9badb3c7796766e3ee

    SHA1

    2539551f695525f46ecd6cb75fb97882c68a7737

    SHA256

    709a314949520a8df9d2af79591a3a41e6ec2dba1c6e8107024cadb64b3b7474

    SHA512

    a140eb308b67df7d1fa6d249f90a0b1d5f7d4100810c69cc0e7fd3520e6c82c90b452c78e9a01692fab58a69e29682caae02e28f9f5df91d86eb365ccf6edffa

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu148753.exe

    Filesize

    588KB

    MD5

    92712ca061d60ed1ad356adce0bc0e14

    SHA1

    bdd330d4dd970e9b6f0e531b76f8ee420e6805ba

    SHA256

    3c256454243741346e5c70fa08ebb2550d877d3857bb928b80530a107e2d3196

    SHA512

    9c8103d0d8ef40a0f1fb065223b43e428efa44a5c0f5a8c16bac085c2f5005a5817b5bc5c51ced8be793d610c473cda23e00384fdb93a310b8b756d81a1b9a15

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu148753.exe

    Filesize

    588KB

    MD5

    92712ca061d60ed1ad356adce0bc0e14

    SHA1

    bdd330d4dd970e9b6f0e531b76f8ee420e6805ba

    SHA256

    3c256454243741346e5c70fa08ebb2550d877d3857bb928b80530a107e2d3196

    SHA512

    9c8103d0d8ef40a0f1fb065223b43e428efa44a5c0f5a8c16bac085c2f5005a5817b5bc5c51ced8be793d610c473cda23e00384fdb93a310b8b756d81a1b9a15

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • memory/8-2368-0x00000000009B0000-0x00000000009EB000-memory.dmp

    Filesize

    236KB

  • memory/208-2354-0x0000000004CD0000-0x0000000004D46000-memory.dmp

    Filesize

    472KB

  • memory/208-2344-0x0000000002120000-0x0000000002126000-memory.dmp

    Filesize

    24KB

  • memory/208-2358-0x0000000004910000-0x0000000004920000-memory.dmp

    Filesize

    64KB

  • memory/208-2352-0x0000000004910000-0x0000000004920000-memory.dmp

    Filesize

    64KB

  • memory/208-2340-0x0000000000040000-0x000000000006E000-memory.dmp

    Filesize

    184KB

  • memory/208-2355-0x0000000004DF0000-0x0000000004E82000-memory.dmp

    Filesize

    584KB

  • memory/208-2349-0x0000000004950000-0x0000000004962000-memory.dmp

    Filesize

    72KB

  • memory/208-2348-0x0000000004A30000-0x0000000004B3A000-memory.dmp

    Filesize

    1.0MB

  • memory/208-2357-0x00000000056B0000-0x0000000005700000-memory.dmp

    Filesize

    320KB

  • memory/2168-2350-0x000000000A900000-0x000000000A93E000-memory.dmp

    Filesize

    248KB

  • memory/2168-2356-0x000000000ACA0000-0x000000000AD06000-memory.dmp

    Filesize

    408KB

  • memory/2168-2346-0x0000000005320000-0x0000000005326000-memory.dmp

    Filesize

    24KB

  • memory/2168-2345-0x0000000000B70000-0x0000000000BA0000-memory.dmp

    Filesize

    192KB

  • memory/2168-2347-0x000000000ADF0000-0x000000000B3F6000-memory.dmp

    Filesize

    6.0MB

  • memory/2168-2351-0x000000000AA80000-0x000000000AACB000-memory.dmp

    Filesize

    300KB

  • memory/2168-2353-0x0000000005350000-0x0000000005360000-memory.dmp

    Filesize

    64KB

  • memory/2168-2359-0x0000000005350000-0x0000000005360000-memory.dmp

    Filesize

    64KB

  • memory/2168-2360-0x000000000C240000-0x000000000C402000-memory.dmp

    Filesize

    1.8MB

  • memory/2168-2361-0x000000000C940000-0x000000000CE6C000-memory.dmp

    Filesize

    5.2MB

  • memory/3876-197-0x0000000002770000-0x00000000027D0000-memory.dmp

    Filesize

    384KB

  • memory/3876-187-0x0000000002770000-0x00000000027D0000-memory.dmp

    Filesize

    384KB

  • memory/3876-191-0x0000000002770000-0x00000000027D0000-memory.dmp

    Filesize

    384KB

  • memory/3876-189-0x0000000002770000-0x00000000027D0000-memory.dmp

    Filesize

    384KB

  • memory/3876-193-0x0000000002770000-0x00000000027D0000-memory.dmp

    Filesize

    384KB

  • memory/3876-195-0x0000000002770000-0x00000000027D0000-memory.dmp

    Filesize

    384KB

  • memory/3876-186-0x0000000002770000-0x00000000027D0000-memory.dmp

    Filesize

    384KB

  • memory/3876-199-0x0000000002770000-0x00000000027D0000-memory.dmp

    Filesize

    384KB

  • memory/3876-201-0x0000000002770000-0x00000000027D0000-memory.dmp

    Filesize

    384KB

  • memory/3876-203-0x0000000002770000-0x00000000027D0000-memory.dmp

    Filesize

    384KB

  • memory/3876-205-0x0000000002770000-0x00000000027D0000-memory.dmp

    Filesize

    384KB

  • memory/3876-207-0x0000000002770000-0x00000000027D0000-memory.dmp

    Filesize

    384KB

  • memory/3876-209-0x0000000002770000-0x00000000027D0000-memory.dmp

    Filesize

    384KB

  • memory/3876-211-0x0000000002770000-0x00000000027D0000-memory.dmp

    Filesize

    384KB

  • memory/3876-213-0x0000000002770000-0x00000000027D0000-memory.dmp

    Filesize

    384KB

  • memory/3876-215-0x0000000002770000-0x00000000027D0000-memory.dmp

    Filesize

    384KB

  • memory/3876-217-0x0000000002770000-0x00000000027D0000-memory.dmp

    Filesize

    384KB

  • memory/3876-219-0x0000000002770000-0x00000000027D0000-memory.dmp

    Filesize

    384KB

  • memory/3876-273-0x00000000009A0000-0x00000000009FB000-memory.dmp

    Filesize

    364KB

  • memory/3876-275-0x0000000005180000-0x0000000005190000-memory.dmp

    Filesize

    64KB

  • memory/3876-277-0x0000000005180000-0x0000000005190000-memory.dmp

    Filesize

    64KB

  • memory/3876-279-0x0000000005180000-0x0000000005190000-memory.dmp

    Filesize

    64KB

  • memory/3876-2332-0x0000000002A70000-0x0000000002AA2000-memory.dmp

    Filesize

    200KB

  • memory/3876-185-0x0000000002770000-0x00000000027D6000-memory.dmp

    Filesize

    408KB

  • memory/3876-184-0x00000000026B0000-0x0000000002718000-memory.dmp

    Filesize

    416KB

  • memory/4488-179-0x00000000024F0000-0x0000000002500000-memory.dmp

    Filesize

    64KB

  • memory/4488-178-0x0000000000400000-0x000000000080A000-memory.dmp

    Filesize

    4.0MB

  • memory/4488-176-0x0000000000400000-0x000000000080A000-memory.dmp

    Filesize

    4.0MB

  • memory/4488-175-0x00000000024F0000-0x0000000002500000-memory.dmp

    Filesize

    64KB

  • memory/4488-174-0x00000000024F0000-0x0000000002500000-memory.dmp

    Filesize

    64KB

  • memory/4488-173-0x0000000002690000-0x00000000026A2000-memory.dmp

    Filesize

    72KB

  • memory/4488-171-0x0000000002690000-0x00000000026A2000-memory.dmp

    Filesize

    72KB

  • memory/4488-169-0x0000000002690000-0x00000000026A2000-memory.dmp

    Filesize

    72KB

  • memory/4488-167-0x0000000002690000-0x00000000026A2000-memory.dmp

    Filesize

    72KB

  • memory/4488-165-0x0000000002690000-0x00000000026A2000-memory.dmp

    Filesize

    72KB

  • memory/4488-163-0x0000000002690000-0x00000000026A2000-memory.dmp

    Filesize

    72KB

  • memory/4488-161-0x0000000002690000-0x00000000026A2000-memory.dmp

    Filesize

    72KB

  • memory/4488-159-0x0000000002690000-0x00000000026A2000-memory.dmp

    Filesize

    72KB

  • memory/4488-157-0x0000000002690000-0x00000000026A2000-memory.dmp

    Filesize

    72KB

  • memory/4488-155-0x0000000002690000-0x00000000026A2000-memory.dmp

    Filesize

    72KB

  • memory/4488-153-0x0000000002690000-0x00000000026A2000-memory.dmp

    Filesize

    72KB

  • memory/4488-151-0x0000000002690000-0x00000000026A2000-memory.dmp

    Filesize

    72KB

  • memory/4488-149-0x0000000002690000-0x00000000026A2000-memory.dmp

    Filesize

    72KB

  • memory/4488-147-0x0000000002690000-0x00000000026A2000-memory.dmp

    Filesize

    72KB

  • memory/4488-146-0x0000000002690000-0x00000000026A2000-memory.dmp

    Filesize

    72KB

  • memory/4488-145-0x0000000002690000-0x00000000026A8000-memory.dmp

    Filesize

    96KB

  • memory/4488-144-0x0000000004FD0000-0x00000000054CE000-memory.dmp

    Filesize

    5.0MB

  • memory/4488-143-0x0000000000D60000-0x0000000000D7A000-memory.dmp

    Filesize

    104KB

  • memory/4488-142-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB