Analysis

  • max time kernel
    146s
  • max time network
    103s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14-04-2023 05:55

General

  • Target

    6d89ef1195911cb4d3f2b2b1af9661e001d535c6d38d27a02c83176da6439be1.exe

  • Size

    1.2MB

  • MD5

    f7dfff255daf871b4d08254f326b279c

  • SHA1

    0ffd698c1ab580aa8ff33742b792e4449b76c8f8

  • SHA256

    6d89ef1195911cb4d3f2b2b1af9661e001d535c6d38d27a02c83176da6439be1

  • SHA512

    cad90d90626f2e94512fe7328a7ac0047e1b94764f647a8c98c3f47a6c577cf3c48a4acd4cdade72ec309d817fc7f80c8c4c2ab43d28599412d4135213419f26

  • SSDEEP

    24576:Gyh/bmcd9di4QuKV2zMDRAEGBr5V8MjLaGldyVW+KWuoOrnbqno67i:Vh/bmcd9HQdV2IRAEq5xasg8rnb/s

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

disa

C2

185.161.248.90:4125

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d89ef1195911cb4d3f2b2b1af9661e001d535c6d38d27a02c83176da6439be1.exe
    "C:\Users\Admin\AppData\Local\Temp\6d89ef1195911cb4d3f2b2b1af9661e001d535c6d38d27a02c83176da6439be1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un365261.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un365261.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2504
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un824547.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un824547.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2560
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr094573.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr094573.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3012
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu885184.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu885184.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:960
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3400
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk522111.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk522111.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1772
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si945975.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si945975.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      PID:5092
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 632
        3⤵
        • Program crash
        PID:2200
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 708
        3⤵
        • Program crash
        PID:1596
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 848
        3⤵
        • Program crash
        PID:3648
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 856
        3⤵
        • Program crash
        PID:2800
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 884
        3⤵
        • Program crash
        PID:2732
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 712
        3⤵
        • Program crash
        PID:3848
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 1128
        3⤵
        • Program crash
        PID:4712
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 1172
        3⤵
        • Program crash
        PID:1320
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5092 -s 1144
        3⤵
        • Program crash
        PID:4592

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si945975.exe

    Filesize

    396KB

    MD5

    2d5adc88b61f67dd4a3d0af63556a9b2

    SHA1

    be2a227a96abc93b9ae975d80e298b30f7397ff9

    SHA256

    1e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318

    SHA512

    e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si945975.exe

    Filesize

    396KB

    MD5

    2d5adc88b61f67dd4a3d0af63556a9b2

    SHA1

    be2a227a96abc93b9ae975d80e298b30f7397ff9

    SHA256

    1e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318

    SHA512

    e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un365261.exe

    Filesize

    860KB

    MD5

    cdeac49f6f3d7f22243af6b366aafb28

    SHA1

    1c32e017b01f012ce9189feb60867537082de548

    SHA256

    4559249bbf44f4fc2a44f8d554d97beceffaf5f57b7f87eb5037503086c4656e

    SHA512

    30c0e1e0384c983b1c9a09004baf4c70d6d6e0494721a5de784f35ac57d88e5895e9e76dc2dc4abaa8eb42ffbabd38445990b1d704d1641b15cbd2b300f66d59

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un365261.exe

    Filesize

    860KB

    MD5

    cdeac49f6f3d7f22243af6b366aafb28

    SHA1

    1c32e017b01f012ce9189feb60867537082de548

    SHA256

    4559249bbf44f4fc2a44f8d554d97beceffaf5f57b7f87eb5037503086c4656e

    SHA512

    30c0e1e0384c983b1c9a09004baf4c70d6d6e0494721a5de784f35ac57d88e5895e9e76dc2dc4abaa8eb42ffbabd38445990b1d704d1641b15cbd2b300f66d59

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk522111.exe

    Filesize

    169KB

    MD5

    2bbb3a03392e47f38f8be227fd0414b3

    SHA1

    241f3e398fbea848c2ce650b9788ee29c962dc84

    SHA256

    cdd1cca38b8cfc92bcf5c95d76cb9213f62c19c4d0d535a721a8760d8ff9a924

    SHA512

    7842a6685846a5b2b15b968f9057747801701c361c528939f4f40fe61757001c512a1489a2843de91a249c92dc7ae98454f742b5f2dce7cab9437abc5d704747

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk522111.exe

    Filesize

    169KB

    MD5

    2bbb3a03392e47f38f8be227fd0414b3

    SHA1

    241f3e398fbea848c2ce650b9788ee29c962dc84

    SHA256

    cdd1cca38b8cfc92bcf5c95d76cb9213f62c19c4d0d535a721a8760d8ff9a924

    SHA512

    7842a6685846a5b2b15b968f9057747801701c361c528939f4f40fe61757001c512a1489a2843de91a249c92dc7ae98454f742b5f2dce7cab9437abc5d704747

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un824547.exe

    Filesize

    706KB

    MD5

    9aedd34fc65ad1f1df8fad49f8b892a1

    SHA1

    7d406f7cb4796d909850386998a3261847bff140

    SHA256

    0030180d4dcb9b2878d5dd83930ff00ba4715b99b4c8775799d6970ada9ce303

    SHA512

    afb32d8ee4f41c867293ec0e5c43cc545b9f6528814706a168c2c12a1631a544630cebb845af69247956484fac119415c458239b95fe0863045a9e162551aaf1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un824547.exe

    Filesize

    706KB

    MD5

    9aedd34fc65ad1f1df8fad49f8b892a1

    SHA1

    7d406f7cb4796d909850386998a3261847bff140

    SHA256

    0030180d4dcb9b2878d5dd83930ff00ba4715b99b4c8775799d6970ada9ce303

    SHA512

    afb32d8ee4f41c867293ec0e5c43cc545b9f6528814706a168c2c12a1631a544630cebb845af69247956484fac119415c458239b95fe0863045a9e162551aaf1

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr094573.exe

    Filesize

    404KB

    MD5

    a12331115e46fcbba7d5872d1405dcb8

    SHA1

    87d4399bd7febae8fb046265e8634feb63e4d679

    SHA256

    caf5f99460a2c4e210e183b6e984beae7e0627f8e78252f7932d67d2f970ae74

    SHA512

    a136004d7f52c78768921e9ab4f19cc7d1fac8f958952b79b3199b5dcd57d72e8c68fbfe87a46c7e9ca4d9f97b057bcd991078bc12349454ba9dad788318c461

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr094573.exe

    Filesize

    404KB

    MD5

    a12331115e46fcbba7d5872d1405dcb8

    SHA1

    87d4399bd7febae8fb046265e8634feb63e4d679

    SHA256

    caf5f99460a2c4e210e183b6e984beae7e0627f8e78252f7932d67d2f970ae74

    SHA512

    a136004d7f52c78768921e9ab4f19cc7d1fac8f958952b79b3199b5dcd57d72e8c68fbfe87a46c7e9ca4d9f97b057bcd991078bc12349454ba9dad788318c461

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu885184.exe

    Filesize

    587KB

    MD5

    533c242a3a69557dddfb8e371c6c9682

    SHA1

    f5554ccd11d37e5c9b9f866466906598f0a2dfb6

    SHA256

    aaf1fce9d05d326ea3865c255de4ccd935848b900df4e55656faa6e80d400b2c

    SHA512

    61eb871be469473696593ab98b87344e8cf07d308f8e6b2932bba394349f61853f69b742d27a13d4ef8acbd24cb411f874c9f5a9d1664532037022649d21a6b0

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu885184.exe

    Filesize

    587KB

    MD5

    533c242a3a69557dddfb8e371c6c9682

    SHA1

    f5554ccd11d37e5c9b9f866466906598f0a2dfb6

    SHA256

    aaf1fce9d05d326ea3865c255de4ccd935848b900df4e55656faa6e80d400b2c

    SHA512

    61eb871be469473696593ab98b87344e8cf07d308f8e6b2932bba394349f61853f69b742d27a13d4ef8acbd24cb411f874c9f5a9d1664532037022649d21a6b0

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • memory/960-217-0x0000000002B10000-0x0000000002B20000-memory.dmp

    Filesize

    64KB

  • memory/960-204-0x0000000002AB0000-0x0000000002B10000-memory.dmp

    Filesize

    384KB

  • memory/960-222-0x0000000002AB0000-0x0000000002B10000-memory.dmp

    Filesize

    384KB

  • memory/960-212-0x00000000009D0000-0x0000000000A2B000-memory.dmp

    Filesize

    364KB

  • memory/960-194-0x0000000002AB0000-0x0000000002B10000-memory.dmp

    Filesize

    384KB

  • memory/960-220-0x0000000002AB0000-0x0000000002B10000-memory.dmp

    Filesize

    384KB

  • memory/960-218-0x0000000002B10000-0x0000000002B20000-memory.dmp

    Filesize

    64KB

  • memory/960-216-0x0000000002AB0000-0x0000000002B10000-memory.dmp

    Filesize

    384KB

  • memory/960-215-0x0000000002B10000-0x0000000002B20000-memory.dmp

    Filesize

    64KB

  • memory/960-213-0x0000000002AB0000-0x0000000002B10000-memory.dmp

    Filesize

    384KB

  • memory/960-210-0x0000000002AB0000-0x0000000002B10000-memory.dmp

    Filesize

    384KB

  • memory/960-208-0x0000000002AB0000-0x0000000002B10000-memory.dmp

    Filesize

    384KB

  • memory/960-206-0x0000000002AB0000-0x0000000002B10000-memory.dmp

    Filesize

    384KB

  • memory/960-224-0x0000000002AB0000-0x0000000002B10000-memory.dmp

    Filesize

    384KB

  • memory/960-202-0x0000000002AB0000-0x0000000002B10000-memory.dmp

    Filesize

    384KB

  • memory/960-200-0x0000000002AB0000-0x0000000002B10000-memory.dmp

    Filesize

    384KB

  • memory/960-198-0x0000000002AB0000-0x0000000002B10000-memory.dmp

    Filesize

    384KB

  • memory/960-196-0x0000000002AB0000-0x0000000002B10000-memory.dmp

    Filesize

    384KB

  • memory/960-226-0x0000000002AB0000-0x0000000002B10000-memory.dmp

    Filesize

    384KB

  • memory/960-2335-0x0000000005660000-0x0000000005692000-memory.dmp

    Filesize

    200KB

  • memory/960-187-0x0000000002B20000-0x0000000002B88000-memory.dmp

    Filesize

    416KB

  • memory/960-188-0x0000000002AB0000-0x0000000002B16000-memory.dmp

    Filesize

    408KB

  • memory/960-189-0x0000000002AB0000-0x0000000002B10000-memory.dmp

    Filesize

    384KB

  • memory/960-190-0x0000000002AB0000-0x0000000002B10000-memory.dmp

    Filesize

    384KB

  • memory/960-192-0x0000000002AB0000-0x0000000002B10000-memory.dmp

    Filesize

    384KB

  • memory/1772-2348-0x00000000003B0000-0x00000000003E0000-memory.dmp

    Filesize

    192KB

  • memory/1772-2349-0x0000000002810000-0x0000000002816000-memory.dmp

    Filesize

    24KB

  • memory/1772-2363-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

    Filesize

    64KB

  • memory/1772-2359-0x000000000AE00000-0x000000000AE66000-memory.dmp

    Filesize

    408KB

  • memory/1772-2356-0x000000000A2C0000-0x000000000A30B000-memory.dmp

    Filesize

    300KB

  • memory/1772-2354-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

    Filesize

    64KB

  • memory/1772-2352-0x000000000A0E0000-0x000000000A0F2000-memory.dmp

    Filesize

    72KB

  • memory/1772-2351-0x000000000A1B0000-0x000000000A2BA000-memory.dmp

    Filesize

    1.0MB

  • memory/3012-163-0x0000000002820000-0x0000000002832000-memory.dmp

    Filesize

    72KB

  • memory/3012-171-0x0000000002820000-0x0000000002832000-memory.dmp

    Filesize

    72KB

  • memory/3012-167-0x0000000002820000-0x0000000002832000-memory.dmp

    Filesize

    72KB

  • memory/3012-165-0x0000000002820000-0x0000000002832000-memory.dmp

    Filesize

    72KB

  • memory/3012-182-0x0000000000400000-0x000000000080A000-memory.dmp

    Filesize

    4.0MB

  • memory/3012-161-0x0000000002820000-0x0000000002832000-memory.dmp

    Filesize

    72KB

  • memory/3012-159-0x0000000002820000-0x0000000002832000-memory.dmp

    Filesize

    72KB

  • memory/3012-157-0x0000000002820000-0x0000000002832000-memory.dmp

    Filesize

    72KB

  • memory/3012-155-0x0000000002820000-0x0000000002832000-memory.dmp

    Filesize

    72KB

  • memory/3012-153-0x0000000002820000-0x0000000002832000-memory.dmp

    Filesize

    72KB

  • memory/3012-151-0x0000000002820000-0x0000000002832000-memory.dmp

    Filesize

    72KB

  • memory/3012-150-0x0000000002820000-0x0000000002832000-memory.dmp

    Filesize

    72KB

  • memory/3012-149-0x00000000050B0000-0x00000000050C0000-memory.dmp

    Filesize

    64KB

  • memory/3012-147-0x00000000050B0000-0x00000000050C0000-memory.dmp

    Filesize

    64KB

  • memory/3012-148-0x00000000050B0000-0x00000000050C0000-memory.dmp

    Filesize

    64KB

  • memory/3012-143-0x0000000000BE0000-0x0000000000BFA000-memory.dmp

    Filesize

    104KB

  • memory/3012-146-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/3012-145-0x0000000002820000-0x0000000002838000-memory.dmp

    Filesize

    96KB

  • memory/3012-144-0x00000000050C0000-0x00000000055BE000-memory.dmp

    Filesize

    5.0MB

  • memory/3012-169-0x0000000002820000-0x0000000002832000-memory.dmp

    Filesize

    72KB

  • memory/3012-180-0x00000000050B0000-0x00000000050C0000-memory.dmp

    Filesize

    64KB

  • memory/3012-173-0x0000000002820000-0x0000000002832000-memory.dmp

    Filesize

    72KB

  • memory/3012-175-0x0000000002820000-0x0000000002832000-memory.dmp

    Filesize

    72KB

  • memory/3012-177-0x0000000002820000-0x0000000002832000-memory.dmp

    Filesize

    72KB

  • memory/3012-179-0x00000000050B0000-0x00000000050C0000-memory.dmp

    Filesize

    64KB

  • memory/3012-178-0x0000000000400000-0x000000000080A000-memory.dmp

    Filesize

    4.0MB

  • memory/3400-2353-0x0000000004FA0000-0x0000000004FDE000-memory.dmp

    Filesize

    248KB

  • memory/3400-2357-0x00000000053C0000-0x0000000005436000-memory.dmp

    Filesize

    472KB

  • memory/3400-2358-0x0000000005B20000-0x0000000005BB2000-memory.dmp

    Filesize

    584KB

  • memory/3400-2355-0x0000000004DF0000-0x0000000004E00000-memory.dmp

    Filesize

    64KB

  • memory/3400-2360-0x0000000006130000-0x0000000006180000-memory.dmp

    Filesize

    320KB

  • memory/3400-2361-0x0000000006B00000-0x0000000006CC2000-memory.dmp

    Filesize

    1.8MB

  • memory/3400-2362-0x00000000086B0000-0x0000000008BDC000-memory.dmp

    Filesize

    5.2MB

  • memory/3400-2364-0x0000000004DF0000-0x0000000004E00000-memory.dmp

    Filesize

    64KB

  • memory/3400-2350-0x0000000005510000-0x0000000005B16000-memory.dmp

    Filesize

    6.0MB

  • memory/3400-2347-0x0000000004DA0000-0x0000000004DA6000-memory.dmp

    Filesize

    24KB

  • memory/3400-2345-0x00000000004F0000-0x000000000051E000-memory.dmp

    Filesize

    184KB

  • memory/5092-2371-0x0000000000990000-0x00000000009CB000-memory.dmp

    Filesize

    236KB