Analysis

  • max time kernel
    142s
  • max time network
    98s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14-04-2023 06:20

General

  • Target

    077f7f803e53687e8271b24f8e4569fbfe3194c8c8e883c9327cf8ea04e79b39.exe

  • Size

    1.0MB

  • MD5

    b9693e42f0198200df0087c194b200cc

  • SHA1

    366ef95d109c73c903f719dd3b9030c7f65804bd

  • SHA256

    077f7f803e53687e8271b24f8e4569fbfe3194c8c8e883c9327cf8ea04e79b39

  • SHA512

    15b747da3a43fcbdfd239ffde7ea3c163a96cc50a0011c357a0b7659fa55f338887a2b7520469869fa2fc7eb0b56080261f8b1515342ac262af2843dc21cf759

  • SSDEEP

    24576:tyb9GtxKNK4kVZMHLrocPRWgchfXOYEgVGa2ls:IEtgwqrDPRWgQPOYf

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

disa

C2

185.161.248.90:4125

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\077f7f803e53687e8271b24f8e4569fbfe3194c8c8e883c9327cf8ea04e79b39.exe
    "C:\Users\Admin\AppData\Local\Temp\077f7f803e53687e8271b24f8e4569fbfe3194c8c8e883c9327cf8ea04e79b39.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4300
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimQ4736.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimQ4736.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3192
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zihg9678.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zihg9678.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4100
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it785292.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it785292.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4320
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr223864.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr223864.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1692
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:5024
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp297102.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp297102.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5088
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr195774.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr195774.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      PID:2876
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 636
        3⤵
        • Program crash
        PID:1756
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 712
        3⤵
        • Program crash
        PID:2060
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 852
        3⤵
        • Program crash
        PID:4548
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 860
        3⤵
        • Program crash
        PID:4916
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 920
        3⤵
        • Program crash
        PID:1632
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 896
        3⤵
        • Program crash
        PID:352
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 1128
        3⤵
        • Program crash
        PID:332
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 1204
        3⤵
        • Program crash
        PID:3828
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 1232
        3⤵
        • Program crash
        PID:4600

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr195774.exe

    Filesize

    396KB

    MD5

    2d5adc88b61f67dd4a3d0af63556a9b2

    SHA1

    be2a227a96abc93b9ae975d80e298b30f7397ff9

    SHA256

    1e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318

    SHA512

    e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr195774.exe

    Filesize

    396KB

    MD5

    2d5adc88b61f67dd4a3d0af63556a9b2

    SHA1

    be2a227a96abc93b9ae975d80e298b30f7397ff9

    SHA256

    1e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318

    SHA512

    e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimQ4736.exe

    Filesize

    723KB

    MD5

    58450ce4bdc365eab63dbf69aaea0d62

    SHA1

    e6086b598ca2840bf0162bf6e42d1c6e3851b552

    SHA256

    ba088a3123c1ec8af40d27e3612f6a36f90efe2bea13516653552057ebdf0a4b

    SHA512

    e2290ce3565c1454d6d0a1974fd0ab4e2b51404a50d467d3d2024444abc72e6581c9e4e85f8c0597602ddff68ae4dbe8006af4d2f5eb50c9930170f9ed83cb87

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimQ4736.exe

    Filesize

    723KB

    MD5

    58450ce4bdc365eab63dbf69aaea0d62

    SHA1

    e6086b598ca2840bf0162bf6e42d1c6e3851b552

    SHA256

    ba088a3123c1ec8af40d27e3612f6a36f90efe2bea13516653552057ebdf0a4b

    SHA512

    e2290ce3565c1454d6d0a1974fd0ab4e2b51404a50d467d3d2024444abc72e6581c9e4e85f8c0597602ddff68ae4dbe8006af4d2f5eb50c9930170f9ed83cb87

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp297102.exe

    Filesize

    169KB

    MD5

    9015c05d29369f62f4193fea875d6715

    SHA1

    061af2ce548a815efa686e49062395524ae586af

    SHA256

    834686d6e44171ad3b96dee07f25a2ca7867e261be9972bb387744644d7e54f2

    SHA512

    4f484d064e428caa95cc9854009c5ff5a4838d240ca80e6906401896e41faccb2a710f380d964e622838b171727b3db857968565d599ca1f3ec9ad41cb85cad9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp297102.exe

    Filesize

    169KB

    MD5

    9015c05d29369f62f4193fea875d6715

    SHA1

    061af2ce548a815efa686e49062395524ae586af

    SHA256

    834686d6e44171ad3b96dee07f25a2ca7867e261be9972bb387744644d7e54f2

    SHA512

    4f484d064e428caa95cc9854009c5ff5a4838d240ca80e6906401896e41faccb2a710f380d964e622838b171727b3db857968565d599ca1f3ec9ad41cb85cad9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zihg9678.exe

    Filesize

    569KB

    MD5

    7f0b7eb8a28c6808db93d1b485f6217d

    SHA1

    f5fba2d7a3e5341d7b33e4a25477ecbb801aa099

    SHA256

    dd5481a6f72a7792f42aaa830c2aed98336e10692402399ac7c2bd85bb6790cd

    SHA512

    a24505c36904ceb97affc0a2c98ef7502d43532c4f31d7d0ea84c2801c3a9ab8f5f66026a04c77ce099c43774c3662b0573d83dabe9b4300048b52fd2a23e2e2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zihg9678.exe

    Filesize

    569KB

    MD5

    7f0b7eb8a28c6808db93d1b485f6217d

    SHA1

    f5fba2d7a3e5341d7b33e4a25477ecbb801aa099

    SHA256

    dd5481a6f72a7792f42aaa830c2aed98336e10692402399ac7c2bd85bb6790cd

    SHA512

    a24505c36904ceb97affc0a2c98ef7502d43532c4f31d7d0ea84c2801c3a9ab8f5f66026a04c77ce099c43774c3662b0573d83dabe9b4300048b52fd2a23e2e2

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it785292.exe

    Filesize

    11KB

    MD5

    6f3d82ba66b148340aaed46b2583e1d9

    SHA1

    531bca927a9375e1a0addcdb2fde53b52de5c24d

    SHA256

    816e9cec678fe3557dbb774e91184c35ba80eb5f7a9530350b5bd22013939b92

    SHA512

    801b34bbba36019b8da07cd4136e1ea0a9b034b43cd2e3d6cf86d1a10c522b3fe84062883ec21bdbe56ffe4650b6f45f02ea7dadfdf6589d19031b315d14b93e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it785292.exe

    Filesize

    11KB

    MD5

    6f3d82ba66b148340aaed46b2583e1d9

    SHA1

    531bca927a9375e1a0addcdb2fde53b52de5c24d

    SHA256

    816e9cec678fe3557dbb774e91184c35ba80eb5f7a9530350b5bd22013939b92

    SHA512

    801b34bbba36019b8da07cd4136e1ea0a9b034b43cd2e3d6cf86d1a10c522b3fe84062883ec21bdbe56ffe4650b6f45f02ea7dadfdf6589d19031b315d14b93e

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr223864.exe

    Filesize

    587KB

    MD5

    12920f0f4d54b5e304b536d1f2993fb7

    SHA1

    d243e91cf0de723ed426b76e47b67ba0aef671b0

    SHA256

    8d65b76d5a3e6c9dfe88fc6c2f26d4f91af206f6236de23db5c80b96c54f8a9d

    SHA512

    7c2f78a0c73e2157ea77077768d0e856bb375c2f2be32aa82ff2286bf09281650d6ee9c70d679671a5c0544dd556c361b525b707045ae043c358421af6172d8a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr223864.exe

    Filesize

    587KB

    MD5

    12920f0f4d54b5e304b536d1f2993fb7

    SHA1

    d243e91cf0de723ed426b76e47b67ba0aef671b0

    SHA256

    8d65b76d5a3e6c9dfe88fc6c2f26d4f91af206f6236de23db5c80b96c54f8a9d

    SHA512

    7c2f78a0c73e2157ea77077768d0e856bb375c2f2be32aa82ff2286bf09281650d6ee9c70d679671a5c0544dd556c361b525b707045ae043c358421af6172d8a

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • memory/1692-159-0x00000000055C0000-0x0000000005620000-memory.dmp

    Filesize

    384KB

  • memory/1692-211-0x00000000055C0000-0x0000000005620000-memory.dmp

    Filesize

    384KB

  • memory/1692-155-0x00000000055C0000-0x0000000005620000-memory.dmp

    Filesize

    384KB

  • memory/1692-157-0x00000000055C0000-0x0000000005620000-memory.dmp

    Filesize

    384KB

  • memory/1692-152-0x00000000055C0000-0x0000000005620000-memory.dmp

    Filesize

    384KB

  • memory/1692-161-0x00000000055C0000-0x0000000005620000-memory.dmp

    Filesize

    384KB

  • memory/1692-163-0x00000000055C0000-0x0000000005620000-memory.dmp

    Filesize

    384KB

  • memory/1692-165-0x00000000055C0000-0x0000000005620000-memory.dmp

    Filesize

    384KB

  • memory/1692-167-0x00000000055C0000-0x0000000005620000-memory.dmp

    Filesize

    384KB

  • memory/1692-169-0x00000000055C0000-0x0000000005620000-memory.dmp

    Filesize

    384KB

  • memory/1692-171-0x00000000055C0000-0x0000000005620000-memory.dmp

    Filesize

    384KB

  • memory/1692-173-0x00000000055C0000-0x0000000005620000-memory.dmp

    Filesize

    384KB

  • memory/1692-175-0x00000000055C0000-0x0000000005620000-memory.dmp

    Filesize

    384KB

  • memory/1692-177-0x00000000055C0000-0x0000000005620000-memory.dmp

    Filesize

    384KB

  • memory/1692-179-0x00000000055C0000-0x0000000005620000-memory.dmp

    Filesize

    384KB

  • memory/1692-182-0x00000000055C0000-0x0000000005620000-memory.dmp

    Filesize

    384KB

  • memory/1692-181-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

    Filesize

    64KB

  • memory/1692-183-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

    Filesize

    64KB

  • memory/1692-185-0x00000000055C0000-0x0000000005620000-memory.dmp

    Filesize

    384KB

  • memory/1692-187-0x00000000055C0000-0x0000000005620000-memory.dmp

    Filesize

    384KB

  • memory/1692-189-0x00000000055C0000-0x0000000005620000-memory.dmp

    Filesize

    384KB

  • memory/1692-191-0x00000000055C0000-0x0000000005620000-memory.dmp

    Filesize

    384KB

  • memory/1692-193-0x00000000055C0000-0x0000000005620000-memory.dmp

    Filesize

    384KB

  • memory/1692-195-0x00000000055C0000-0x0000000005620000-memory.dmp

    Filesize

    384KB

  • memory/1692-197-0x00000000055C0000-0x0000000005620000-memory.dmp

    Filesize

    384KB

  • memory/1692-199-0x00000000055C0000-0x0000000005620000-memory.dmp

    Filesize

    384KB

  • memory/1692-201-0x00000000055C0000-0x0000000005620000-memory.dmp

    Filesize

    384KB

  • memory/1692-203-0x00000000055C0000-0x0000000005620000-memory.dmp

    Filesize

    384KB

  • memory/1692-205-0x00000000055C0000-0x0000000005620000-memory.dmp

    Filesize

    384KB

  • memory/1692-207-0x00000000055C0000-0x0000000005620000-memory.dmp

    Filesize

    384KB

  • memory/1692-209-0x00000000055C0000-0x0000000005620000-memory.dmp

    Filesize

    384KB

  • memory/1692-153-0x00000000055C0000-0x0000000005620000-memory.dmp

    Filesize

    384KB

  • memory/1692-213-0x00000000055C0000-0x0000000005620000-memory.dmp

    Filesize

    384KB

  • memory/1692-215-0x00000000055C0000-0x0000000005620000-memory.dmp

    Filesize

    384KB

  • memory/1692-217-0x00000000055C0000-0x0000000005620000-memory.dmp

    Filesize

    384KB

  • memory/1692-2296-0x0000000005790000-0x00000000057C2000-memory.dmp

    Filesize

    200KB

  • memory/1692-151-0x00000000055C0000-0x0000000005626000-memory.dmp

    Filesize

    408KB

  • memory/1692-150-0x00000000050C0000-0x00000000055BE000-memory.dmp

    Filesize

    5.0MB

  • memory/1692-147-0x0000000004EC0000-0x0000000004F28000-memory.dmp

    Filesize

    416KB

  • memory/1692-149-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

    Filesize

    64KB

  • memory/1692-148-0x0000000000BB0000-0x0000000000C0B000-memory.dmp

    Filesize

    364KB

  • memory/2876-2331-0x0000000002390000-0x00000000023CB000-memory.dmp

    Filesize

    236KB

  • memory/4320-141-0x0000000000510000-0x000000000051A000-memory.dmp

    Filesize

    40KB

  • memory/5024-2317-0x0000000004980000-0x0000000004990000-memory.dmp

    Filesize

    64KB

  • memory/5024-2308-0x0000000002210000-0x0000000002216000-memory.dmp

    Filesize

    24KB

  • memory/5024-2328-0x0000000004980000-0x0000000004990000-memory.dmp

    Filesize

    64KB

  • memory/5024-2304-0x0000000000090000-0x00000000000BE000-memory.dmp

    Filesize

    184KB

  • memory/5024-2322-0x00000000065C0000-0x0000000006782000-memory.dmp

    Filesize

    1.8MB

  • memory/5024-2321-0x0000000005900000-0x0000000005950000-memory.dmp

    Filesize

    320KB

  • memory/5088-2318-0x000000000A7B0000-0x000000000A826000-memory.dmp

    Filesize

    472KB

  • memory/5088-2316-0x0000000004F70000-0x0000000004F80000-memory.dmp

    Filesize

    64KB

  • memory/5088-2309-0x0000000000700000-0x0000000000730000-memory.dmp

    Filesize

    192KB

  • memory/5088-2319-0x000000000A8D0000-0x000000000A962000-memory.dmp

    Filesize

    584KB

  • memory/5088-2320-0x000000000A970000-0x000000000A9D6000-memory.dmp

    Filesize

    408KB

  • memory/5088-2315-0x000000000A620000-0x000000000A66B000-memory.dmp

    Filesize

    300KB

  • memory/5088-2314-0x000000000A490000-0x000000000A4CE000-memory.dmp

    Filesize

    248KB

  • memory/5088-2323-0x000000000C3F0000-0x000000000C91C000-memory.dmp

    Filesize

    5.2MB

  • memory/5088-2313-0x000000000A430000-0x000000000A442000-memory.dmp

    Filesize

    72KB

  • memory/5088-2312-0x000000000A510000-0x000000000A61A000-memory.dmp

    Filesize

    1.0MB

  • memory/5088-2311-0x000000000AA10000-0x000000000B016000-memory.dmp

    Filesize

    6.0MB

  • memory/5088-2310-0x0000000002840000-0x0000000002846000-memory.dmp

    Filesize

    24KB