Analysis

  • max time kernel
    143s
  • max time network
    139s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14-04-2023 05:50

General

  • Target

    d977913aa79c1adfd51b757199140eadc8f053f53fe5220a4410c1b00d3c35a6.exe

  • Size

    1.0MB

  • MD5

    6337986c1cf50ac1dc0ef72e98af3a09

  • SHA1

    bc55e6911d2c57349eb36915557bc182b33b3431

  • SHA256

    d977913aa79c1adfd51b757199140eadc8f053f53fe5220a4410c1b00d3c35a6

  • SHA512

    1b2e8674a69d924db3e4a633905ac6160719550a8b1f81e5012128b7c12d7be1a4dc7820b1c3c04f8c83c95c5e135105fc67452d671935e2f9c514514766760c

  • SSDEEP

    24576:tyWX2pX94gVBDUF3pVWftLxlOHfSSm2o0owhqwkxwG0:Io2pX99/DiIxwHxo0xg

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

disa

C2

185.161.248.90:4125

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d977913aa79c1adfd51b757199140eadc8f053f53fe5220a4410c1b00d3c35a6.exe
    "C:\Users\Admin\AppData\Local\Temp\d977913aa79c1adfd51b757199140eadc8f053f53fe5220a4410c1b00d3c35a6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4124
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixH0509.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixH0509.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3548
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziix1065.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziix1065.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2348
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it925918.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it925918.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4500
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr764586.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr764586.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4916
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2308
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp485265.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp485265.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2560
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr974258.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr974258.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      PID:2144
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2144 -s 632
        3⤵
        • Program crash
        PID:3736
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2144 -s 708
        3⤵
        • Program crash
        PID:3952
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2144 -s 844
        3⤵
        • Program crash
        PID:3644
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2144 -s 856
        3⤵
        • Program crash
        PID:992
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2144 -s 884
        3⤵
        • Program crash
        PID:5112
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2144 -s 888
        3⤵
        • Program crash
        PID:4920
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2144 -s 1124
        3⤵
        • Program crash
        PID:4260
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2144 -s 1200
        3⤵
        • Program crash
        PID:4272
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2144 -s 1064
        3⤵
        • Program crash
        PID:4296

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr974258.exe

    Filesize

    396KB

    MD5

    2d5adc88b61f67dd4a3d0af63556a9b2

    SHA1

    be2a227a96abc93b9ae975d80e298b30f7397ff9

    SHA256

    1e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318

    SHA512

    e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr974258.exe

    Filesize

    396KB

    MD5

    2d5adc88b61f67dd4a3d0af63556a9b2

    SHA1

    be2a227a96abc93b9ae975d80e298b30f7397ff9

    SHA256

    1e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318

    SHA512

    e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixH0509.exe

    Filesize

    723KB

    MD5

    b08de7ebab9bde70ac8ce563b775ba08

    SHA1

    c5aae68afcd0a45d7f790185b7aef5b84ac6a681

    SHA256

    8db29c24cf722db3c2c72ae24724d084e2d5641df2d6c049686466c08a1c0512

    SHA512

    726acfeb6b9e0015910807c2ce950b9edcce78b9cfc8afddeb904a4b8707acf04892363d0cab780137c1839f9f070644940e72569a8040aa50e37b8bef3ac741

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixH0509.exe

    Filesize

    723KB

    MD5

    b08de7ebab9bde70ac8ce563b775ba08

    SHA1

    c5aae68afcd0a45d7f790185b7aef5b84ac6a681

    SHA256

    8db29c24cf722db3c2c72ae24724d084e2d5641df2d6c049686466c08a1c0512

    SHA512

    726acfeb6b9e0015910807c2ce950b9edcce78b9cfc8afddeb904a4b8707acf04892363d0cab780137c1839f9f070644940e72569a8040aa50e37b8bef3ac741

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp485265.exe

    Filesize

    169KB

    MD5

    a6877ddec506dfb9b14df0565c695e05

    SHA1

    320192c02e70e2c99ce1eae6eab50ebbd5b8b039

    SHA256

    2328d717baa2dcbe55d3d3681f4a21386d05ce72ae0365eb18cd73a8e4549d86

    SHA512

    d08e52fe729b37b29bee47971f9f03a51b55903dfaf3574ae9bbccc5d77d5044facc11ca0d26bb70d90d9de5dbd976c615e38714e0c51af1f8aaa7066cb27b29

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp485265.exe

    Filesize

    169KB

    MD5

    a6877ddec506dfb9b14df0565c695e05

    SHA1

    320192c02e70e2c99ce1eae6eab50ebbd5b8b039

    SHA256

    2328d717baa2dcbe55d3d3681f4a21386d05ce72ae0365eb18cd73a8e4549d86

    SHA512

    d08e52fe729b37b29bee47971f9f03a51b55903dfaf3574ae9bbccc5d77d5044facc11ca0d26bb70d90d9de5dbd976c615e38714e0c51af1f8aaa7066cb27b29

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziix1065.exe

    Filesize

    570KB

    MD5

    2d7a4d9af0e4b4710122a4e852d6dd3d

    SHA1

    5ae1e096ddb3bb0ad8d490da829e87dccbccbff6

    SHA256

    152fe64a2c0405d928676af4341f1fadd2dd0ae91475ca847ea135042c8ac73a

    SHA512

    66f9be4b234e111094aeca31e26b684207b503317477b798fa96e9b5241a92fd74bf844fa0cf3d644ef1134ffeeac4d5462660b2ab6f9e8cdb4625d38735cc32

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziix1065.exe

    Filesize

    570KB

    MD5

    2d7a4d9af0e4b4710122a4e852d6dd3d

    SHA1

    5ae1e096ddb3bb0ad8d490da829e87dccbccbff6

    SHA256

    152fe64a2c0405d928676af4341f1fadd2dd0ae91475ca847ea135042c8ac73a

    SHA512

    66f9be4b234e111094aeca31e26b684207b503317477b798fa96e9b5241a92fd74bf844fa0cf3d644ef1134ffeeac4d5462660b2ab6f9e8cdb4625d38735cc32

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it925918.exe

    Filesize

    11KB

    MD5

    e8ce8f79cd6b77821269a3be231d2fc3

    SHA1

    93bd2f9caadf6032a08507cb762eacb1b2418a65

    SHA256

    bea8405f25864b6365de517cf54f217179c9c4e385cc26432f536936f11d6639

    SHA512

    58bddf4b04f9f40474c26f6b4796922296648103bb2245fa3357dc4e1284a1afa72480bd8863aaa6c0a5b9b4bca9094fcac7fd297a6007f72a449e8233c661ab

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it925918.exe

    Filesize

    11KB

    MD5

    e8ce8f79cd6b77821269a3be231d2fc3

    SHA1

    93bd2f9caadf6032a08507cb762eacb1b2418a65

    SHA256

    bea8405f25864b6365de517cf54f217179c9c4e385cc26432f536936f11d6639

    SHA512

    58bddf4b04f9f40474c26f6b4796922296648103bb2245fa3357dc4e1284a1afa72480bd8863aaa6c0a5b9b4bca9094fcac7fd297a6007f72a449e8233c661ab

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr764586.exe

    Filesize

    587KB

    MD5

    f0576313bad4540d216c17c7df667d0f

    SHA1

    8c15ccb9934cfbbd68e3f127daee39861b32e853

    SHA256

    3264cca957258026f950844ba1f36ca7124c742536d52dd74e57fe5638cb1f3b

    SHA512

    e9165e006e8dd374932cb75b026b8714ae006514d8991f0d814d7b94526e8a3f5b21e2220178e0a421fe8156d4370f7b06aeea8820e12d6d4fb83a4450b006ac

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr764586.exe

    Filesize

    587KB

    MD5

    f0576313bad4540d216c17c7df667d0f

    SHA1

    8c15ccb9934cfbbd68e3f127daee39861b32e853

    SHA256

    3264cca957258026f950844ba1f36ca7124c742536d52dd74e57fe5638cb1f3b

    SHA512

    e9165e006e8dd374932cb75b026b8714ae006514d8991f0d814d7b94526e8a3f5b21e2220178e0a421fe8156d4370f7b06aeea8820e12d6d4fb83a4450b006ac

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • memory/2144-2329-0x0000000000970000-0x00000000009AB000-memory.dmp

    Filesize

    236KB

  • memory/2308-2318-0x0000000005B60000-0x0000000005BB0000-memory.dmp

    Filesize

    320KB

  • memory/2308-2309-0x0000000004D00000-0x0000000004E0A000-memory.dmp

    Filesize

    1.0MB

  • memory/2308-2301-0x00000000002C0000-0x00000000002EE000-memory.dmp

    Filesize

    184KB

  • memory/2308-2316-0x0000000005070000-0x0000000005102000-memory.dmp

    Filesize

    584KB

  • memory/2308-2305-0x0000000000C60000-0x0000000000C66000-memory.dmp

    Filesize

    24KB

  • memory/2308-2321-0x0000000006820000-0x00000000069E2000-memory.dmp

    Filesize

    1.8MB

  • memory/2308-2314-0x0000000004C80000-0x0000000004CCB000-memory.dmp

    Filesize

    300KB

  • memory/2308-2308-0x0000000005200000-0x0000000005806000-memory.dmp

    Filesize

    6.0MB

  • memory/2308-2311-0x0000000004AE0000-0x0000000004AF0000-memory.dmp

    Filesize

    64KB

  • memory/2308-2319-0x0000000004AE0000-0x0000000004AF0000-memory.dmp

    Filesize

    64KB

  • memory/2308-2310-0x0000000004AC0000-0x0000000004AD2000-memory.dmp

    Filesize

    72KB

  • memory/2560-2312-0x0000000005180000-0x0000000005190000-memory.dmp

    Filesize

    64KB

  • memory/2560-2313-0x000000000A610000-0x000000000A64E000-memory.dmp

    Filesize

    248KB

  • memory/2560-2307-0x0000000002AD0000-0x0000000002AD6000-memory.dmp

    Filesize

    24KB

  • memory/2560-2315-0x000000000A920000-0x000000000A996000-memory.dmp

    Filesize

    472KB

  • memory/2560-2306-0x0000000000870000-0x00000000008A0000-memory.dmp

    Filesize

    192KB

  • memory/2560-2320-0x0000000005180000-0x0000000005190000-memory.dmp

    Filesize

    64KB

  • memory/2560-2322-0x000000000C630000-0x000000000CB5C000-memory.dmp

    Filesize

    5.2MB

  • memory/2560-2317-0x000000000A9A0000-0x000000000AA06000-memory.dmp

    Filesize

    408KB

  • memory/4500-137-0x0000000000F50000-0x0000000000F5A000-memory.dmp

    Filesize

    40KB

  • memory/4916-155-0x0000000005060000-0x00000000050C0000-memory.dmp

    Filesize

    384KB

  • memory/4916-177-0x0000000005060000-0x00000000050C0000-memory.dmp

    Filesize

    384KB

  • memory/4916-191-0x0000000005060000-0x00000000050C0000-memory.dmp

    Filesize

    384KB

  • memory/4916-193-0x0000000005060000-0x00000000050C0000-memory.dmp

    Filesize

    384KB

  • memory/4916-195-0x0000000005060000-0x00000000050C0000-memory.dmp

    Filesize

    384KB

  • memory/4916-197-0x0000000005060000-0x00000000050C0000-memory.dmp

    Filesize

    384KB

  • memory/4916-199-0x0000000005060000-0x00000000050C0000-memory.dmp

    Filesize

    384KB

  • memory/4916-201-0x0000000005060000-0x00000000050C0000-memory.dmp

    Filesize

    384KB

  • memory/4916-203-0x0000000005060000-0x00000000050C0000-memory.dmp

    Filesize

    384KB

  • memory/4916-205-0x0000000005060000-0x00000000050C0000-memory.dmp

    Filesize

    384KB

  • memory/4916-207-0x0000000005060000-0x00000000050C0000-memory.dmp

    Filesize

    384KB

  • memory/4916-209-0x0000000005060000-0x00000000050C0000-memory.dmp

    Filesize

    384KB

  • memory/4916-211-0x0000000005060000-0x00000000050C0000-memory.dmp

    Filesize

    384KB

  • memory/4916-213-0x0000000005060000-0x00000000050C0000-memory.dmp

    Filesize

    384KB

  • memory/4916-2292-0x0000000005780000-0x00000000057B2000-memory.dmp

    Filesize

    200KB

  • memory/4916-2294-0x0000000005100000-0x0000000005110000-memory.dmp

    Filesize

    64KB

  • memory/4916-187-0x0000000005060000-0x00000000050C0000-memory.dmp

    Filesize

    384KB

  • memory/4916-185-0x0000000005060000-0x00000000050C0000-memory.dmp

    Filesize

    384KB

  • memory/4916-183-0x0000000005060000-0x00000000050C0000-memory.dmp

    Filesize

    384KB

  • memory/4916-181-0x0000000005060000-0x00000000050C0000-memory.dmp

    Filesize

    384KB

  • memory/4916-179-0x0000000005060000-0x00000000050C0000-memory.dmp

    Filesize

    384KB

  • memory/4916-189-0x0000000005060000-0x00000000050C0000-memory.dmp

    Filesize

    384KB

  • memory/4916-175-0x0000000005060000-0x00000000050C0000-memory.dmp

    Filesize

    384KB

  • memory/4916-173-0x0000000005060000-0x00000000050C0000-memory.dmp

    Filesize

    384KB

  • memory/4916-171-0x0000000005060000-0x00000000050C0000-memory.dmp

    Filesize

    384KB

  • memory/4916-169-0x0000000005060000-0x00000000050C0000-memory.dmp

    Filesize

    384KB

  • memory/4916-167-0x0000000005060000-0x00000000050C0000-memory.dmp

    Filesize

    384KB

  • memory/4916-165-0x0000000005060000-0x00000000050C0000-memory.dmp

    Filesize

    384KB

  • memory/4916-163-0x0000000005060000-0x00000000050C0000-memory.dmp

    Filesize

    384KB

  • memory/4916-161-0x0000000005060000-0x00000000050C0000-memory.dmp

    Filesize

    384KB

  • memory/4916-159-0x0000000005060000-0x00000000050C0000-memory.dmp

    Filesize

    384KB

  • memory/4916-157-0x0000000005060000-0x00000000050C0000-memory.dmp

    Filesize

    384KB

  • memory/4916-153-0x0000000005060000-0x00000000050C0000-memory.dmp

    Filesize

    384KB

  • memory/4916-151-0x0000000005060000-0x00000000050C0000-memory.dmp

    Filesize

    384KB

  • memory/4916-150-0x0000000005060000-0x00000000050C0000-memory.dmp

    Filesize

    384KB

  • memory/4916-149-0x0000000005100000-0x0000000005110000-memory.dmp

    Filesize

    64KB

  • memory/4916-148-0x0000000005100000-0x0000000005110000-memory.dmp

    Filesize

    64KB

  • memory/4916-147-0x0000000005100000-0x0000000005110000-memory.dmp

    Filesize

    64KB

  • memory/4916-146-0x00000000023B0000-0x000000000240B000-memory.dmp

    Filesize

    364KB

  • memory/4916-145-0x0000000005060000-0x00000000050C6000-memory.dmp

    Filesize

    408KB

  • memory/4916-144-0x0000000005110000-0x000000000560E000-memory.dmp

    Filesize

    5.0MB

  • memory/4916-143-0x00000000029E0000-0x0000000002A48000-memory.dmp

    Filesize

    416KB