Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14-04-2023 05:17

General

  • Target

    b13927f51f79cb487ab642ff99deb78c7836f8f963c75c6eb109b4ad4da55ba8.exe

  • Size

    1.2MB

  • MD5

    a61f3e24a13c89e74c5eb674f50f60ad

  • SHA1

    d822ef4064fc07d1207361938418f75509828c6b

  • SHA256

    b13927f51f79cb487ab642ff99deb78c7836f8f963c75c6eb109b4ad4da55ba8

  • SHA512

    59122304918bdbcbb0a073f032654c72b13494fa7199810ce2a3c129c3ff9c6c7880c4e8490d99fdac1263b8a3b9d8c59e9e8d51096e73746d79bc52514b060a

  • SSDEEP

    24576:/yfgU42dVCB8jVbUvRt/FyijwIgYFaMNOYZJARTlcKoDWt5zfj7d9imE:KfgU42dUGjVbUvRt/FyiXVNOYfwTSKoT

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

disa

C2

185.161.248.90:4125

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b13927f51f79cb487ab642ff99deb78c7836f8f963c75c6eb109b4ad4da55ba8.exe
    "C:\Users\Admin\AppData\Local\Temp\b13927f51f79cb487ab642ff99deb78c7836f8f963c75c6eb109b4ad4da55ba8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un681597.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un681597.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2580
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un855946.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un855946.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2940
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr762226.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr762226.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3996
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu135591.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu135591.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1884
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1844
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk258617.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk258617.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2184
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si857477.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si857477.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      PID:2476
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 628
        3⤵
        • Program crash
        PID:4792
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 704
        3⤵
        • Program crash
        PID:1256
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 844
        3⤵
        • Program crash
        PID:4648
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 688
        3⤵
        • Program crash
        PID:3500
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 908
        3⤵
        • Program crash
        PID:3552
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 940
        3⤵
        • Program crash
        PID:4048
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 1124
        3⤵
        • Program crash
        PID:4724
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 1208
        3⤵
        • Program crash
        PID:4720
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 1212
        3⤵
        • Program crash
        PID:780

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si857477.exe

    Filesize

    396KB

    MD5

    3b4f2a4d8dca852944a267ed2830e399

    SHA1

    fdb24f66cd6baf27e5f2631fd981afd71732a352

    SHA256

    ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e

    SHA512

    81fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si857477.exe

    Filesize

    396KB

    MD5

    3b4f2a4d8dca852944a267ed2830e399

    SHA1

    fdb24f66cd6baf27e5f2631fd981afd71732a352

    SHA256

    ff3e602e3250c9fcbdb5c32d714676400356f27edf28b27315cf8f240f366f6e

    SHA512

    81fbda54e0d5e96ab119714d2aebd3089a6953c7e9f05dfe55191517ecbadc9c4e36c93b19ba73bbb7019a8408a879c01f78e97cea45ce5fee1780fc39626fa7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un681597.exe

    Filesize

    861KB

    MD5

    cb310ce09bd5a51803883e254860e909

    SHA1

    117edb139f2bd8806c7b855f0049d5a7afeaf0fc

    SHA256

    8e7eee1cde413d8c3a2e9cc1fa8334d4a74bd686c273e93003c2b33c5b609753

    SHA512

    9969e8eddca0499359f00683ca28811d22059cde2906f83b911524a1ddb89a60bb9a7cd4f66b8d113981b8e465a06e08e8d8324e8bf59a8c55cba0ecfd826214

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un681597.exe

    Filesize

    861KB

    MD5

    cb310ce09bd5a51803883e254860e909

    SHA1

    117edb139f2bd8806c7b855f0049d5a7afeaf0fc

    SHA256

    8e7eee1cde413d8c3a2e9cc1fa8334d4a74bd686c273e93003c2b33c5b609753

    SHA512

    9969e8eddca0499359f00683ca28811d22059cde2906f83b911524a1ddb89a60bb9a7cd4f66b8d113981b8e465a06e08e8d8324e8bf59a8c55cba0ecfd826214

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk258617.exe

    Filesize

    169KB

    MD5

    91fcfa050592c516d959cd64d65fad6f

    SHA1

    2b6441e323beaf53c72115a1b5a85a4acf270f4d

    SHA256

    c5f187cd03826a8e8e1b21c62602a1d9eb727fe36acbd6bc837638305577d251

    SHA512

    7b6fbb5e560b693032017f764a7cd933af35ca2df7e08973f9a01edb7da10b76014fb08430aae023a0aaefc519f89efd71f79d6079c3459972db1b9e370846f7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk258617.exe

    Filesize

    169KB

    MD5

    91fcfa050592c516d959cd64d65fad6f

    SHA1

    2b6441e323beaf53c72115a1b5a85a4acf270f4d

    SHA256

    c5f187cd03826a8e8e1b21c62602a1d9eb727fe36acbd6bc837638305577d251

    SHA512

    7b6fbb5e560b693032017f764a7cd933af35ca2df7e08973f9a01edb7da10b76014fb08430aae023a0aaefc519f89efd71f79d6079c3459972db1b9e370846f7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un855946.exe

    Filesize

    708KB

    MD5

    ef5b992441e269a1f63f0dc40e4052ba

    SHA1

    51c4cd41b60b16530f77b53f9d53725e2e748329

    SHA256

    bc203a8c0eae5099af8c5e98a286c3828ba74db8edd023a9c9754dc4723050e0

    SHA512

    3e84c9a0207698b682dee35f168f980ff98e3cbecf54c1e43e7c592b2896a778da688c67c473c435051b0081be25330626abdd2c53fc8d88f802614dd05487bd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un855946.exe

    Filesize

    708KB

    MD5

    ef5b992441e269a1f63f0dc40e4052ba

    SHA1

    51c4cd41b60b16530f77b53f9d53725e2e748329

    SHA256

    bc203a8c0eae5099af8c5e98a286c3828ba74db8edd023a9c9754dc4723050e0

    SHA512

    3e84c9a0207698b682dee35f168f980ff98e3cbecf54c1e43e7c592b2896a778da688c67c473c435051b0081be25330626abdd2c53fc8d88f802614dd05487bd

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr762226.exe

    Filesize

    405KB

    MD5

    f423ca0bfacadce67a9a2af32eee4c09

    SHA1

    eb57a7622f1c57e0bb3479f37c07789425c00a42

    SHA256

    5534be65183715411ade249709c6d10ffd0838ce462610f53038f5fed005849c

    SHA512

    23466df1b8b1cdacf821ae10b964df75ca82afb2fc0a3dfebdb177162efc402a27cf523faf57c4197f3966e25c1b04be75352db0b3c9b401839478025ca20a47

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr762226.exe

    Filesize

    405KB

    MD5

    f423ca0bfacadce67a9a2af32eee4c09

    SHA1

    eb57a7622f1c57e0bb3479f37c07789425c00a42

    SHA256

    5534be65183715411ade249709c6d10ffd0838ce462610f53038f5fed005849c

    SHA512

    23466df1b8b1cdacf821ae10b964df75ca82afb2fc0a3dfebdb177162efc402a27cf523faf57c4197f3966e25c1b04be75352db0b3c9b401839478025ca20a47

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu135591.exe

    Filesize

    588KB

    MD5

    87c4b06c2977d3f3c6417d5a0628974b

    SHA1

    e551adb4852e5fbfffe16c8c90ed7f0f761f7177

    SHA256

    4c180ca3f3e00ef1b0d4a9099e30208ed1d675435bfce50ad152e755632fad82

    SHA512

    c3a139d7e7d4eac4c21ea37f87479829de5177e1a0d6e8e5d4127bc65d3806e181c278439f236f17da11a67c2063509bdb518218e7ebe775460da0c601e4d4e6

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu135591.exe

    Filesize

    588KB

    MD5

    87c4b06c2977d3f3c6417d5a0628974b

    SHA1

    e551adb4852e5fbfffe16c8c90ed7f0f761f7177

    SHA256

    4c180ca3f3e00ef1b0d4a9099e30208ed1d675435bfce50ad152e755632fad82

    SHA512

    c3a139d7e7d4eac4c21ea37f87479829de5177e1a0d6e8e5d4127bc65d3806e181c278439f236f17da11a67c2063509bdb518218e7ebe775460da0c601e4d4e6

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • memory/1844-2352-0x00000000058D0000-0x000000000590E000-memory.dmp

    Filesize

    248KB

  • memory/1844-2353-0x0000000005910000-0x000000000595B000-memory.dmp

    Filesize

    300KB

  • memory/1844-2350-0x00000000059A0000-0x0000000005AAA000-memory.dmp

    Filesize

    1.0MB

  • memory/1844-2346-0x0000000005800000-0x0000000005806000-memory.dmp

    Filesize

    24KB

  • memory/1844-2355-0x0000000005880000-0x0000000005890000-memory.dmp

    Filesize

    64KB

  • memory/1844-2357-0x0000000005E00000-0x0000000005E92000-memory.dmp

    Filesize

    584KB

  • memory/1844-2342-0x0000000000F50000-0x0000000000F7E000-memory.dmp

    Filesize

    184KB

  • memory/1844-2359-0x0000000006B90000-0x0000000006D52000-memory.dmp

    Filesize

    1.8MB

  • memory/1844-2360-0x0000000007C10000-0x000000000813C000-memory.dmp

    Filesize

    5.2MB

  • memory/1844-2361-0x0000000006E60000-0x0000000006EB0000-memory.dmp

    Filesize

    320KB

  • memory/1844-2363-0x0000000005880000-0x0000000005890000-memory.dmp

    Filesize

    64KB

  • memory/1884-202-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/1884-227-0x0000000004EF0000-0x0000000004F00000-memory.dmp

    Filesize

    64KB

  • memory/1884-2335-0x0000000004EF0000-0x0000000004F00000-memory.dmp

    Filesize

    64KB

  • memory/1884-2333-0x0000000005630000-0x0000000005662000-memory.dmp

    Filesize

    200KB

  • memory/1884-229-0x0000000004EF0000-0x0000000004F00000-memory.dmp

    Filesize

    64KB

  • memory/1884-224-0x0000000004EF0000-0x0000000004F00000-memory.dmp

    Filesize

    64KB

  • memory/1884-222-0x0000000002480000-0x00000000024DB000-memory.dmp

    Filesize

    364KB

  • memory/1884-185-0x0000000002790000-0x00000000027F8000-memory.dmp

    Filesize

    416KB

  • memory/1884-186-0x0000000005400000-0x0000000005466000-memory.dmp

    Filesize

    408KB

  • memory/1884-187-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/1884-188-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/1884-190-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/1884-192-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/1884-194-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/1884-196-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/1884-198-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/1884-200-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/1884-220-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/1884-204-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/1884-206-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/1884-208-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/1884-210-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/1884-212-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/1884-214-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/1884-216-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/1884-218-0x0000000005400000-0x0000000005460000-memory.dmp

    Filesize

    384KB

  • memory/2184-2347-0x00000000004F0000-0x0000000000520000-memory.dmp

    Filesize

    192KB

  • memory/2184-2362-0x0000000004DF0000-0x0000000004E00000-memory.dmp

    Filesize

    64KB

  • memory/2184-2358-0x000000000ADA0000-0x000000000AE06000-memory.dmp

    Filesize

    408KB

  • memory/2184-2356-0x000000000A5A0000-0x000000000A616000-memory.dmp

    Filesize

    472KB

  • memory/2184-2354-0x0000000004DF0000-0x0000000004E00000-memory.dmp

    Filesize

    64KB

  • memory/2184-2351-0x000000000A220000-0x000000000A232000-memory.dmp

    Filesize

    72KB

  • memory/2184-2349-0x000000000A790000-0x000000000AD96000-memory.dmp

    Filesize

    6.0MB

  • memory/2184-2348-0x0000000004DA0000-0x0000000004DA6000-memory.dmp

    Filesize

    24KB

  • memory/2476-2370-0x00000000009A0000-0x00000000009DB000-memory.dmp

    Filesize

    236KB

  • memory/3996-167-0x0000000004D40000-0x0000000004D52000-memory.dmp

    Filesize

    72KB

  • memory/3996-151-0x0000000004D40000-0x0000000004D52000-memory.dmp

    Filesize

    72KB

  • memory/3996-161-0x0000000004D40000-0x0000000004D52000-memory.dmp

    Filesize

    72KB

  • memory/3996-159-0x0000000004D40000-0x0000000004D52000-memory.dmp

    Filesize

    72KB

  • memory/3996-165-0x0000000004D40000-0x0000000004D52000-memory.dmp

    Filesize

    72KB

  • memory/3996-171-0x0000000004D40000-0x0000000004D52000-memory.dmp

    Filesize

    72KB

  • memory/3996-169-0x0000000004D40000-0x0000000004D52000-memory.dmp

    Filesize

    72KB

  • memory/3996-157-0x0000000004D40000-0x0000000004D52000-memory.dmp

    Filesize

    72KB

  • memory/3996-177-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

    Filesize

    64KB

  • memory/3996-155-0x0000000004D40000-0x0000000004D52000-memory.dmp

    Filesize

    72KB

  • memory/3996-153-0x0000000004D40000-0x0000000004D52000-memory.dmp

    Filesize

    72KB

  • memory/3996-163-0x0000000004D40000-0x0000000004D52000-memory.dmp

    Filesize

    72KB

  • memory/3996-178-0x0000000000400000-0x000000000080A000-memory.dmp

    Filesize

    4.0MB

  • memory/3996-180-0x0000000000400000-0x000000000080A000-memory.dmp

    Filesize

    4.0MB

  • memory/3996-149-0x0000000004D40000-0x0000000004D52000-memory.dmp

    Filesize

    72KB

  • memory/3996-176-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

    Filesize

    64KB

  • memory/3996-148-0x0000000004D40000-0x0000000004D52000-memory.dmp

    Filesize

    72KB

  • memory/3996-147-0x0000000004D40000-0x0000000004D58000-memory.dmp

    Filesize

    96KB

  • memory/3996-146-0x0000000004DC0000-0x00000000052BE000-memory.dmp

    Filesize

    5.0MB

  • memory/3996-175-0x0000000004D40000-0x0000000004D52000-memory.dmp

    Filesize

    72KB

  • memory/3996-145-0x0000000002590000-0x00000000025AA000-memory.dmp

    Filesize

    104KB

  • memory/3996-144-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

    Filesize

    64KB

  • memory/3996-143-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/3996-173-0x0000000004D40000-0x0000000004D52000-memory.dmp

    Filesize

    72KB