Analysis

  • max time kernel
    145s
  • max time network
    103s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14-04-2023 04:13

General

  • Target

    9cdbd3232461b9d7bee4aede10b6482e2cd1bb655c25323671b3c3d2d1124e08.exe

  • Size

    1.0MB

  • MD5

    9569cd44dca7997fb5d8b825ffd6a15e

  • SHA1

    f342331d878a2d59dda31fdbe0ed91558941d482

  • SHA256

    9cdbd3232461b9d7bee4aede10b6482e2cd1bb655c25323671b3c3d2d1124e08

  • SHA512

    80d0b74ce9cbbd1dae6417d10c52b12794bfed02e0b2c43eabd9eb164df4e0744d743a39d5d1a27df5d35aaf275859a44b5e9076fafb883a60bf1f73f9348d97

  • SSDEEP

    24576:TyH2iAmO5pOFcVDIl2Sou1PHVjmZmNTfJhw+QyQ3TL:mu37phAP1jum1Jhe

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

disa

C2

185.161.248.90:4125

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9cdbd3232461b9d7bee4aede10b6482e2cd1bb655c25323671b3c3d2d1124e08.exe
    "C:\Users\Admin\AppData\Local\Temp\9cdbd3232461b9d7bee4aede10b6482e2cd1bb655c25323671b3c3d2d1124e08.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4024
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGF0839.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGF0839.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3512
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziRM3157.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziRM3157.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1728
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it437365.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it437365.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3972
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr211250.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr211250.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1660
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1648
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp019944.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp019944.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:304
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr290298.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr290298.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      PID:4132
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4132 -s 632
        3⤵
        • Program crash
        PID:4956
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4132 -s 708
        3⤵
        • Program crash
        PID:3428
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4132 -s 848
        3⤵
        • Program crash
        PID:4484
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4132 -s 896
        3⤵
        • Program crash
        PID:4412
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4132 -s 652
        3⤵
        • Program crash
        PID:3916
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4132 -s 896
        3⤵
        • Program crash
        PID:2580
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4132 -s 1128
        3⤵
        • Program crash
        PID:4636
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4132 -s 1160
        3⤵
        • Program crash
        PID:4656
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4132 -s 1116
        3⤵
        • Program crash
        PID:2056

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr290298.exe

    Filesize

    397KB

    MD5

    73322119dde2931ef4675da872b6e388

    SHA1

    666909e836d4896520d7b01669820f0e8eb103a1

    SHA256

    a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3

    SHA512

    360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr290298.exe

    Filesize

    397KB

    MD5

    73322119dde2931ef4675da872b6e388

    SHA1

    666909e836d4896520d7b01669820f0e8eb103a1

    SHA256

    a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3

    SHA512

    360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGF0839.exe

    Filesize

    723KB

    MD5

    c03ff6f2d3aba73a7783b1cc437fc279

    SHA1

    df0a1ebb46a118a5e896bb95fd32e43a4a616a56

    SHA256

    5a50664adef19dcfd50c14275507767338391c3d32198c558e49f10d18d54668

    SHA512

    3a0685df4a68d1b015052f9b22ad34d4e62ec2d3baaf90fe2c81ce43c341f934b3f4727d24d223ccbd7f5f3d030271cdc7c1a019fe39704979c5e085985c2c63

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGF0839.exe

    Filesize

    723KB

    MD5

    c03ff6f2d3aba73a7783b1cc437fc279

    SHA1

    df0a1ebb46a118a5e896bb95fd32e43a4a616a56

    SHA256

    5a50664adef19dcfd50c14275507767338391c3d32198c558e49f10d18d54668

    SHA512

    3a0685df4a68d1b015052f9b22ad34d4e62ec2d3baaf90fe2c81ce43c341f934b3f4727d24d223ccbd7f5f3d030271cdc7c1a019fe39704979c5e085985c2c63

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp019944.exe

    Filesize

    169KB

    MD5

    b859a66069e69aa2cfec26a31735b248

    SHA1

    ebff9c5dce7c90d97fe4d1b11175b83013396555

    SHA256

    8e470de70290277688a9d47f49dc1d59f6eae0b6a4da7743f353cf64664b48b1

    SHA512

    e9ce40a253d33c5b078b9f0f401ee47dcd4a1d534fd96be129d7bd6df88f82c30d8294e8ff2f99b440977f79800908baeb33fde66726280a7c7636ab3e72d6d7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp019944.exe

    Filesize

    169KB

    MD5

    b859a66069e69aa2cfec26a31735b248

    SHA1

    ebff9c5dce7c90d97fe4d1b11175b83013396555

    SHA256

    8e470de70290277688a9d47f49dc1d59f6eae0b6a4da7743f353cf64664b48b1

    SHA512

    e9ce40a253d33c5b078b9f0f401ee47dcd4a1d534fd96be129d7bd6df88f82c30d8294e8ff2f99b440977f79800908baeb33fde66726280a7c7636ab3e72d6d7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziRM3157.exe

    Filesize

    570KB

    MD5

    7dc1eaca3deec9003e8e71a909252cab

    SHA1

    4fa08c6e072a218241ed7d2282b57a5b0ca5dac3

    SHA256

    23793353f1b7a93f18d165f32786421e020ceb6b4ccaa761c60cf5d888c9247e

    SHA512

    f48e61db13646d852635ebb66c506382a8b70834a8fa993e48b94292ad0f1b6da99bf5ea26c3a59eda668ee713cd4808fc7a516a366359f1bee3ce55e0e58fe6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziRM3157.exe

    Filesize

    570KB

    MD5

    7dc1eaca3deec9003e8e71a909252cab

    SHA1

    4fa08c6e072a218241ed7d2282b57a5b0ca5dac3

    SHA256

    23793353f1b7a93f18d165f32786421e020ceb6b4ccaa761c60cf5d888c9247e

    SHA512

    f48e61db13646d852635ebb66c506382a8b70834a8fa993e48b94292ad0f1b6da99bf5ea26c3a59eda668ee713cd4808fc7a516a366359f1bee3ce55e0e58fe6

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it437365.exe

    Filesize

    11KB

    MD5

    828300f560feecb4cdbb1c53e220b99f

    SHA1

    70ceed854594307ab357352ee2ef6fbbd78203c7

    SHA256

    7a323fd196a22a4dc019537701e2621889456e707ea805606449b285a6ccd993

    SHA512

    1655f113637c0458af6984dbcba500e78890c4ab3ece61a7c2554498233b230ce312acb4d902bb6e68593c04c21ee6ac2b38950db572823cb42b9d363d2b4c49

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it437365.exe

    Filesize

    11KB

    MD5

    828300f560feecb4cdbb1c53e220b99f

    SHA1

    70ceed854594307ab357352ee2ef6fbbd78203c7

    SHA256

    7a323fd196a22a4dc019537701e2621889456e707ea805606449b285a6ccd993

    SHA512

    1655f113637c0458af6984dbcba500e78890c4ab3ece61a7c2554498233b230ce312acb4d902bb6e68593c04c21ee6ac2b38950db572823cb42b9d363d2b4c49

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr211250.exe

    Filesize

    588KB

    MD5

    a3960d9b157ed3999a2a9bcc0a347d63

    SHA1

    d0c4dd383d266c8a91e5d888318f5120ca3c052e

    SHA256

    21a84b8ebf10789bf1eb1c8c31b96057deba1b92e4b994e71580a938f1eb4851

    SHA512

    f701e3dedf7d493a0ec064e3505acb4ed77f8c5a64700e924d77474e00bace8ccacd39ad7751635c710ae9909371ff3d80ddca004d178414570b45fd73abbd97

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr211250.exe

    Filesize

    588KB

    MD5

    a3960d9b157ed3999a2a9bcc0a347d63

    SHA1

    d0c4dd383d266c8a91e5d888318f5120ca3c052e

    SHA256

    21a84b8ebf10789bf1eb1c8c31b96057deba1b92e4b994e71580a938f1eb4851

    SHA512

    f701e3dedf7d493a0ec064e3505acb4ed77f8c5a64700e924d77474e00bace8ccacd39ad7751635c710ae9909371ff3d80ddca004d178414570b45fd73abbd97

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • memory/304-2313-0x0000000004FD0000-0x00000000050DA000-memory.dmp

    Filesize

    1.0MB

  • memory/304-2314-0x0000000004CF0000-0x0000000004D02000-memory.dmp

    Filesize

    72KB

  • memory/304-2325-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

    Filesize

    64KB

  • memory/304-2310-0x00000000004E0000-0x0000000000510000-memory.dmp

    Filesize

    192KB

  • memory/304-2311-0x0000000000BD0000-0x0000000000BD6000-memory.dmp

    Filesize

    24KB

  • memory/304-2322-0x0000000005E60000-0x0000000005EB0000-memory.dmp

    Filesize

    320KB

  • memory/304-2315-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

    Filesize

    64KB

  • memory/304-2317-0x0000000004D50000-0x0000000004D8E000-memory.dmp

    Filesize

    248KB

  • memory/1648-2316-0x0000000005330000-0x0000000005340000-memory.dmp

    Filesize

    64KB

  • memory/1648-2321-0x0000000005760000-0x00000000057C6000-memory.dmp

    Filesize

    408KB

  • memory/1648-2323-0x0000000006740000-0x0000000006902000-memory.dmp

    Filesize

    1.8MB

  • memory/1648-2312-0x0000000005A50000-0x0000000006056000-memory.dmp

    Filesize

    6.0MB

  • memory/1648-2318-0x0000000005440000-0x000000000548B000-memory.dmp

    Filesize

    300KB

  • memory/1648-2324-0x00000000097C0000-0x0000000009CEC000-memory.dmp

    Filesize

    5.2MB

  • memory/1648-2309-0x00000000010B0000-0x00000000010B6000-memory.dmp

    Filesize

    24KB

  • memory/1648-2319-0x00000000056E0000-0x0000000005756000-memory.dmp

    Filesize

    472KB

  • memory/1648-2320-0x0000000005800000-0x0000000005892000-memory.dmp

    Filesize

    584KB

  • memory/1648-2305-0x0000000000A50000-0x0000000000A7E000-memory.dmp

    Filesize

    184KB

  • memory/1648-2326-0x0000000005330000-0x0000000005340000-memory.dmp

    Filesize

    64KB

  • memory/1660-160-0x0000000005410000-0x0000000005470000-memory.dmp

    Filesize

    384KB

  • memory/1660-180-0x0000000005410000-0x0000000005470000-memory.dmp

    Filesize

    384KB

  • memory/1660-192-0x0000000005410000-0x0000000005470000-memory.dmp

    Filesize

    384KB

  • memory/1660-194-0x0000000005410000-0x0000000005470000-memory.dmp

    Filesize

    384KB

  • memory/1660-196-0x0000000005410000-0x0000000005470000-memory.dmp

    Filesize

    384KB

  • memory/1660-198-0x0000000005410000-0x0000000005470000-memory.dmp

    Filesize

    384KB

  • memory/1660-200-0x0000000005410000-0x0000000005470000-memory.dmp

    Filesize

    384KB

  • memory/1660-202-0x0000000005410000-0x0000000005470000-memory.dmp

    Filesize

    384KB

  • memory/1660-204-0x0000000005410000-0x0000000005470000-memory.dmp

    Filesize

    384KB

  • memory/1660-206-0x0000000005410000-0x0000000005470000-memory.dmp

    Filesize

    384KB

  • memory/1660-208-0x0000000005410000-0x0000000005470000-memory.dmp

    Filesize

    384KB

  • memory/1660-210-0x0000000005410000-0x0000000005470000-memory.dmp

    Filesize

    384KB

  • memory/1660-212-0x0000000005410000-0x0000000005470000-memory.dmp

    Filesize

    384KB

  • memory/1660-214-0x0000000005410000-0x0000000005470000-memory.dmp

    Filesize

    384KB

  • memory/1660-216-0x0000000005410000-0x0000000005470000-memory.dmp

    Filesize

    384KB

  • memory/1660-218-0x0000000005410000-0x0000000005470000-memory.dmp

    Filesize

    384KB

  • memory/1660-2297-0x0000000005630000-0x0000000005662000-memory.dmp

    Filesize

    200KB

  • memory/1660-188-0x0000000005410000-0x0000000005470000-memory.dmp

    Filesize

    384KB

  • memory/1660-186-0x0000000005410000-0x0000000005470000-memory.dmp

    Filesize

    384KB

  • memory/1660-184-0x0000000005410000-0x0000000005470000-memory.dmp

    Filesize

    384KB

  • memory/1660-182-0x0000000005410000-0x0000000005470000-memory.dmp

    Filesize

    384KB

  • memory/1660-190-0x0000000005410000-0x0000000005470000-memory.dmp

    Filesize

    384KB

  • memory/1660-178-0x0000000005410000-0x0000000005470000-memory.dmp

    Filesize

    384KB

  • memory/1660-176-0x0000000005410000-0x0000000005470000-memory.dmp

    Filesize

    384KB

  • memory/1660-174-0x0000000005410000-0x0000000005470000-memory.dmp

    Filesize

    384KB

  • memory/1660-172-0x0000000005410000-0x0000000005470000-memory.dmp

    Filesize

    384KB

  • memory/1660-170-0x0000000005410000-0x0000000005470000-memory.dmp

    Filesize

    384KB

  • memory/1660-168-0x0000000005410000-0x0000000005470000-memory.dmp

    Filesize

    384KB

  • memory/1660-166-0x0000000005410000-0x0000000005470000-memory.dmp

    Filesize

    384KB

  • memory/1660-164-0x0000000005410000-0x0000000005470000-memory.dmp

    Filesize

    384KB

  • memory/1660-162-0x0000000005410000-0x0000000005470000-memory.dmp

    Filesize

    384KB

  • memory/1660-158-0x0000000005410000-0x0000000005470000-memory.dmp

    Filesize

    384KB

  • memory/1660-155-0x0000000005410000-0x0000000005470000-memory.dmp

    Filesize

    384KB

  • memory/1660-156-0x0000000005410000-0x0000000005470000-memory.dmp

    Filesize

    384KB

  • memory/1660-154-0x0000000005410000-0x0000000005476000-memory.dmp

    Filesize

    408KB

  • memory/1660-153-0x0000000004F10000-0x000000000540E000-memory.dmp

    Filesize

    5.0MB

  • memory/1660-152-0x0000000004D90000-0x0000000004DA0000-memory.dmp

    Filesize

    64KB

  • memory/1660-151-0x0000000004D90000-0x0000000004DA0000-memory.dmp

    Filesize

    64KB

  • memory/1660-149-0x0000000000960000-0x00000000009BB000-memory.dmp

    Filesize

    364KB

  • memory/1660-150-0x0000000004D90000-0x0000000004DA0000-memory.dmp

    Filesize

    64KB

  • memory/1660-148-0x0000000004EA0000-0x0000000004F08000-memory.dmp

    Filesize

    416KB

  • memory/3972-142-0x0000000000EC0000-0x0000000000ECA000-memory.dmp

    Filesize

    40KB

  • memory/4132-2333-0x0000000002320000-0x000000000235B000-memory.dmp

    Filesize

    236KB