Analysis

  • max time kernel
    146s
  • max time network
    103s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14-04-2023 04:45

General

  • Target

    5bb9f97c6296ff0a05eb6a08179b38cf2026263eb8aaeb46e38c30d7dfe65156.exe

  • Size

    1.2MB

  • MD5

    1a064d872e44db0a3e602f64c2c3b14b

  • SHA1

    262a64c487ff48a77c2e31370af4dd21e769ab5a

  • SHA256

    5bb9f97c6296ff0a05eb6a08179b38cf2026263eb8aaeb46e38c30d7dfe65156

  • SHA512

    3cf7bf2b3f963ef333907f750a671d5edcbe57308d6de291f3755deedcb9f75334db3527ae26f079adaabd689fdb84db0d55b01b454c1ba50ba687ccec4d3926

  • SSDEEP

    24576:xy8U7xZZzx3bImK3O9Q4398nrYAmRbjSZJYRveTwZobHjpo8gOwqFp:kTx0mn9QW9W0bjSfoveKozjpo8hw

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

disa

C2

185.161.248.90:4125

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5bb9f97c6296ff0a05eb6a08179b38cf2026263eb8aaeb46e38c30d7dfe65156.exe
    "C:\Users\Admin\AppData\Local\Temp\5bb9f97c6296ff0a05eb6a08179b38cf2026263eb8aaeb46e38c30d7dfe65156.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1444
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un712266.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un712266.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1592
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un905090.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un905090.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1968
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr280846.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr280846.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:964
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu082711.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu082711.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4712
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2296
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk417639.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk417639.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3940
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si298930.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si298930.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      PID:1608
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 628
        3⤵
        • Program crash
        PID:2156
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 704
        3⤵
        • Program crash
        PID:2356
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 844
        3⤵
        • Program crash
        PID:4256
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 824
        3⤵
        • Program crash
        PID:2064
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 880
        3⤵
        • Program crash
        PID:4392
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 852
        3⤵
        • Program crash
        PID:4376
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 1124
        3⤵
        • Program crash
        PID:4640
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 1156
        3⤵
        • Program crash
        PID:1236
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 1124
        3⤵
        • Program crash
        PID:1936

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si298930.exe

    Filesize

    397KB

    MD5

    73322119dde2931ef4675da872b6e388

    SHA1

    666909e836d4896520d7b01669820f0e8eb103a1

    SHA256

    a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3

    SHA512

    360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si298930.exe

    Filesize

    397KB

    MD5

    73322119dde2931ef4675da872b6e388

    SHA1

    666909e836d4896520d7b01669820f0e8eb103a1

    SHA256

    a79c5393e57aa37ec1e86e848e11468788a7b9e9f580b8ce551913a3add57cd3

    SHA512

    360a30c047d52828252bb6aa484a900e00f6671bd5efdc27845476701b1c9ffcdbcfc7e5b3dceac05d89b83a66273b9e5b9dbd8e982810ba94fd226af216faef

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un712266.exe

    Filesize

    862KB

    MD5

    e6d81a507a6f5b99ae26209b66283219

    SHA1

    e9013d24108339fed91840e07e0690b8a7e01ac3

    SHA256

    72bec559113470044cee3b0f18a1ac7dec597e54a2c42be2f9d3fc1d5c7f2acc

    SHA512

    47e91ccf71146e113ee1fc958b9489d24d3e707ef9a915bf9773d22a82aef02715972ad45e48361eea949aa8f4ddd8d2104f2587172ec47be017490fd2891ef7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un712266.exe

    Filesize

    862KB

    MD5

    e6d81a507a6f5b99ae26209b66283219

    SHA1

    e9013d24108339fed91840e07e0690b8a7e01ac3

    SHA256

    72bec559113470044cee3b0f18a1ac7dec597e54a2c42be2f9d3fc1d5c7f2acc

    SHA512

    47e91ccf71146e113ee1fc958b9489d24d3e707ef9a915bf9773d22a82aef02715972ad45e48361eea949aa8f4ddd8d2104f2587172ec47be017490fd2891ef7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk417639.exe

    Filesize

    169KB

    MD5

    706af334e799ebf47df21ec79922b21b

    SHA1

    cc4b11e5678e1078f898e2cf6cd09f30b0e00531

    SHA256

    5d26349324bb29bb99a225e8a3f062334518adc027e2d15430e15352aebca61b

    SHA512

    88a712d2a80e564bcd0802b6cf49ed3a1dfae9d0cc739c2a5bfff859a53db6780c363df2732da9e1db972450f7e49bda5c5dc420a708ecdcff6a8e3ad3f4c5ca

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk417639.exe

    Filesize

    169KB

    MD5

    706af334e799ebf47df21ec79922b21b

    SHA1

    cc4b11e5678e1078f898e2cf6cd09f30b0e00531

    SHA256

    5d26349324bb29bb99a225e8a3f062334518adc027e2d15430e15352aebca61b

    SHA512

    88a712d2a80e564bcd0802b6cf49ed3a1dfae9d0cc739c2a5bfff859a53db6780c363df2732da9e1db972450f7e49bda5c5dc420a708ecdcff6a8e3ad3f4c5ca

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un905090.exe

    Filesize

    708KB

    MD5

    2b2a712a2164d6d89e4b7414412b0bdf

    SHA1

    dc0156dbc79aa4be3f319e234b3317d468b47acb

    SHA256

    5b98e1558a856d1c757d07b7a5ef95a40e3f3627da987ada8c0d08b66593546f

    SHA512

    a2a6d3da8d7712a86236625b36be3dc620d0f88bff8755ea785f16736858f35a77ce43cd3dda47c2168c1040debf8fc41f55de5e591f15bde431f752cd0a08b9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un905090.exe

    Filesize

    708KB

    MD5

    2b2a712a2164d6d89e4b7414412b0bdf

    SHA1

    dc0156dbc79aa4be3f319e234b3317d468b47acb

    SHA256

    5b98e1558a856d1c757d07b7a5ef95a40e3f3627da987ada8c0d08b66593546f

    SHA512

    a2a6d3da8d7712a86236625b36be3dc620d0f88bff8755ea785f16736858f35a77ce43cd3dda47c2168c1040debf8fc41f55de5e591f15bde431f752cd0a08b9

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr280846.exe

    Filesize

    405KB

    MD5

    2a0d70b8cb343e10b332de3987122b4b

    SHA1

    521a6eae1bd07e5c1670bfd32f79c473666cb862

    SHA256

    5760f9ef25f82bf5ffa468c58d9394a790a819d6a6801aca55c03bf5eeec2283

    SHA512

    2412a83af12e31fef27cc0c0534a8678e1546d673dfd009768478926cf0891dbb531ea4dbdab8865c8848c54666f08feb00f4c7fcf3e12f1073d809bb84f6f79

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr280846.exe

    Filesize

    405KB

    MD5

    2a0d70b8cb343e10b332de3987122b4b

    SHA1

    521a6eae1bd07e5c1670bfd32f79c473666cb862

    SHA256

    5760f9ef25f82bf5ffa468c58d9394a790a819d6a6801aca55c03bf5eeec2283

    SHA512

    2412a83af12e31fef27cc0c0534a8678e1546d673dfd009768478926cf0891dbb531ea4dbdab8865c8848c54666f08feb00f4c7fcf3e12f1073d809bb84f6f79

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu082711.exe

    Filesize

    588KB

    MD5

    06ba53511a75c9105fb0281706854ff1

    SHA1

    735f56aef169d0769e742d35ec976b1320ef5bde

    SHA256

    e43816816765d7c240006dda4967b93e149bf43b384c866a823aea29f6a16611

    SHA512

    25d23d3a9dd3ecbe3c74a7fc8bb5d70dd9b3b3b40514a6d7e57dec84c7fbeb32c7a40c0e6285698d17be1085d36af92abea38cd5f87a57d7be25a760a9f8fa68

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu082711.exe

    Filesize

    588KB

    MD5

    06ba53511a75c9105fb0281706854ff1

    SHA1

    735f56aef169d0769e742d35ec976b1320ef5bde

    SHA256

    e43816816765d7c240006dda4967b93e149bf43b384c866a823aea29f6a16611

    SHA512

    25d23d3a9dd3ecbe3c74a7fc8bb5d70dd9b3b3b40514a6d7e57dec84c7fbeb32c7a40c0e6285698d17be1085d36af92abea38cd5f87a57d7be25a760a9f8fa68

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • memory/964-165-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/964-177-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/964-155-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/964-157-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/964-159-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/964-161-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/964-163-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/964-151-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/964-167-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/964-171-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/964-169-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/964-173-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/964-175-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/964-149-0x0000000002720000-0x0000000002738000-memory.dmp

    Filesize

    96KB

  • memory/964-178-0x0000000000400000-0x000000000080A000-memory.dmp

    Filesize

    4.0MB

  • memory/964-179-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

    Filesize

    64KB

  • memory/964-180-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

    Filesize

    64KB

  • memory/964-181-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

    Filesize

    64KB

  • memory/964-183-0x0000000000400000-0x000000000080A000-memory.dmp

    Filesize

    4.0MB

  • memory/964-150-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/964-147-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

    Filesize

    64KB

  • memory/964-148-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

    Filesize

    64KB

  • memory/964-143-0x0000000002580000-0x000000000259A000-memory.dmp

    Filesize

    104KB

  • memory/964-144-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/964-153-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/964-145-0x0000000004FC0000-0x00000000054BE000-memory.dmp

    Filesize

    5.0MB

  • memory/964-146-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

    Filesize

    64KB

  • memory/1608-2373-0x0000000000850000-0x000000000088B000-memory.dmp

    Filesize

    236KB

  • memory/2296-2353-0x00000000052F0000-0x00000000053FA000-memory.dmp

    Filesize

    1.0MB

  • memory/2296-2358-0x00000000051D0000-0x00000000051E0000-memory.dmp

    Filesize

    64KB

  • memory/2296-2348-0x0000000002960000-0x0000000002966000-memory.dmp

    Filesize

    24KB

  • memory/2296-2365-0x0000000007560000-0x0000000007A8C000-memory.dmp

    Filesize

    5.2MB

  • memory/2296-2364-0x00000000051D0000-0x00000000051E0000-memory.dmp

    Filesize

    64KB

  • memory/2296-2345-0x0000000000870000-0x000000000089E000-memory.dmp

    Filesize

    184KB

  • memory/2296-2352-0x00000000057F0000-0x0000000005DF6000-memory.dmp

    Filesize

    6.0MB

  • memory/2296-2361-0x0000000005E00000-0x0000000005E66000-memory.dmp

    Filesize

    408KB

  • memory/2296-2360-0x0000000005620000-0x00000000056B2000-memory.dmp

    Filesize

    584KB

  • memory/2296-2355-0x00000000051E0000-0x000000000521E000-memory.dmp

    Filesize

    248KB

  • memory/3940-2363-0x0000000004960000-0x0000000004970000-memory.dmp

    Filesize

    64KB

  • memory/3940-2357-0x0000000004960000-0x0000000004970000-memory.dmp

    Filesize

    64KB

  • memory/3940-2356-0x00000000049F0000-0x0000000004A3B000-memory.dmp

    Filesize

    300KB

  • memory/3940-2359-0x0000000004CC0000-0x0000000004D36000-memory.dmp

    Filesize

    472KB

  • memory/3940-2354-0x0000000004930000-0x0000000004942000-memory.dmp

    Filesize

    72KB

  • memory/3940-2362-0x0000000005DC0000-0x0000000005F82000-memory.dmp

    Filesize

    1.8MB

  • memory/3940-2351-0x0000000002130000-0x0000000002136000-memory.dmp

    Filesize

    24KB

  • memory/3940-2350-0x0000000000030000-0x0000000000060000-memory.dmp

    Filesize

    192KB

  • memory/3940-2366-0x00000000064A0000-0x00000000064F0000-memory.dmp

    Filesize

    320KB

  • memory/4712-219-0x0000000004E40000-0x0000000004EA0000-memory.dmp

    Filesize

    384KB

  • memory/4712-217-0x0000000004E40000-0x0000000004EA0000-memory.dmp

    Filesize

    384KB

  • memory/4712-200-0x0000000004E40000-0x0000000004EA0000-memory.dmp

    Filesize

    384KB

  • memory/4712-195-0x0000000004E40000-0x0000000004EA0000-memory.dmp

    Filesize

    384KB

  • memory/4712-193-0x0000000004E40000-0x0000000004EA0000-memory.dmp

    Filesize

    384KB

  • memory/4712-2336-0x0000000005640000-0x0000000005672000-memory.dmp

    Filesize

    200KB

  • memory/4712-2337-0x0000000004F30000-0x0000000004F40000-memory.dmp

    Filesize

    64KB

  • memory/4712-227-0x0000000004E40000-0x0000000004EA0000-memory.dmp

    Filesize

    384KB

  • memory/4712-225-0x0000000004E40000-0x0000000004EA0000-memory.dmp

    Filesize

    384KB

  • memory/4712-191-0x0000000004E40000-0x0000000004EA0000-memory.dmp

    Filesize

    384KB

  • memory/4712-223-0x0000000004E40000-0x0000000004EA0000-memory.dmp

    Filesize

    384KB

  • memory/4712-221-0x0000000004E40000-0x0000000004EA0000-memory.dmp

    Filesize

    384KB

  • memory/4712-202-0x0000000004F30000-0x0000000004F40000-memory.dmp

    Filesize

    64KB

  • memory/4712-197-0x0000000004E40000-0x0000000004EA0000-memory.dmp

    Filesize

    384KB

  • memory/4712-215-0x0000000004E40000-0x0000000004EA0000-memory.dmp

    Filesize

    384KB

  • memory/4712-213-0x0000000004E40000-0x0000000004EA0000-memory.dmp

    Filesize

    384KB

  • memory/4712-211-0x0000000004E40000-0x0000000004EA0000-memory.dmp

    Filesize

    384KB

  • memory/4712-209-0x0000000004E40000-0x0000000004EA0000-memory.dmp

    Filesize

    384KB

  • memory/4712-207-0x0000000004E40000-0x0000000004EA0000-memory.dmp

    Filesize

    384KB

  • memory/4712-206-0x0000000004F30000-0x0000000004F40000-memory.dmp

    Filesize

    64KB

  • memory/4712-199-0x00000000009C0000-0x0000000000A1B000-memory.dmp

    Filesize

    364KB

  • memory/4712-204-0x0000000004F30000-0x0000000004F40000-memory.dmp

    Filesize

    64KB

  • memory/4712-203-0x0000000004E40000-0x0000000004EA0000-memory.dmp

    Filesize

    384KB

  • memory/4712-190-0x0000000004E40000-0x0000000004EA0000-memory.dmp

    Filesize

    384KB

  • memory/4712-189-0x0000000004E40000-0x0000000004EA6000-memory.dmp

    Filesize

    408KB

  • memory/4712-188-0x00000000028C0000-0x0000000002928000-memory.dmp

    Filesize

    416KB