Analysis

  • max time kernel
    145s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14-04-2023 06:09

General

  • Target

    e81571911b86a7fcb1cb192ea5a776a0242232be3e7095aa41d41cb11a12fc3c.exe

  • Size

    1.0MB

  • MD5

    dc13b2843d749a31fee6bffbd0a45c42

  • SHA1

    95e5b9e901c86baf2c134dffdf9f3c10a7f3b845

  • SHA256

    e81571911b86a7fcb1cb192ea5a776a0242232be3e7095aa41d41cb11a12fc3c

  • SHA512

    5cb62bf94b1d688f412135ae25d4fe65682b815d11bcb74a5dda460f145eee88881f276564026a75b056b220e7fadf8bb3015d57a0dfa93aec8998135b868eb7

  • SSDEEP

    24576:oy/0TIk1mGOMJ3pqBVIJFLwN5MGBUJoH9tKqGN923:vzOmGXkWwjM+UJG9kqGNI

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

disa

C2

185.161.248.90:4125

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e81571911b86a7fcb1cb192ea5a776a0242232be3e7095aa41d41cb11a12fc3c.exe
    "C:\Users\Admin\AppData\Local\Temp\e81571911b86a7fcb1cb192ea5a776a0242232be3e7095aa41d41cb11a12fc3c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zite1097.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zite1097.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3668
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zieb5353.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zieb5353.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2544
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it920111.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it920111.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4188
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr073127.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr073127.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3528
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1724
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp052406.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp052406.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:200
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr506239.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr506239.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      PID:2152
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2152 -s 636
        3⤵
        • Program crash
        PID:2344
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2152 -s 708
        3⤵
        • Program crash
        PID:4000
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2152 -s 848
        3⤵
        • Program crash
        PID:4684
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2152 -s 860
        3⤵
        • Program crash
        PID:4064
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2152 -s 884
        3⤵
        • Program crash
        PID:4180
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2152 -s 692
        3⤵
        • Program crash
        PID:4160
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2152 -s 1132
        3⤵
        • Program crash
        PID:3624
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2152 -s 1152
        3⤵
        • Program crash
        PID:4828
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2152 -s 1096
        3⤵
        • Program crash
        PID:4832

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr506239.exe

    Filesize

    396KB

    MD5

    2d5adc88b61f67dd4a3d0af63556a9b2

    SHA1

    be2a227a96abc93b9ae975d80e298b30f7397ff9

    SHA256

    1e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318

    SHA512

    e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr506239.exe

    Filesize

    396KB

    MD5

    2d5adc88b61f67dd4a3d0af63556a9b2

    SHA1

    be2a227a96abc93b9ae975d80e298b30f7397ff9

    SHA256

    1e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318

    SHA512

    e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zite1097.exe

    Filesize

    722KB

    MD5

    1be48ba648b759b1ee04b5a507a549de

    SHA1

    382809c997d5c512c7618ddaa270345c03b18977

    SHA256

    52674010968987533f5191bd33d3357d51b19c02cbc1b73b8b82d54c261642ed

    SHA512

    c29a49cf9795a973fc810a709ef558ffbc55d27a377f896c5336250aa3cc79cda06734334031ed4130928f36eb7fd250109fd8b896dca0bd51e70450ad99cb85

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zite1097.exe

    Filesize

    722KB

    MD5

    1be48ba648b759b1ee04b5a507a549de

    SHA1

    382809c997d5c512c7618ddaa270345c03b18977

    SHA256

    52674010968987533f5191bd33d3357d51b19c02cbc1b73b8b82d54c261642ed

    SHA512

    c29a49cf9795a973fc810a709ef558ffbc55d27a377f896c5336250aa3cc79cda06734334031ed4130928f36eb7fd250109fd8b896dca0bd51e70450ad99cb85

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp052406.exe

    Filesize

    169KB

    MD5

    b2d6784100501db097bd3113ee149ea4

    SHA1

    c09c0660c75a18250ca27dba1d0ebabee76fedcd

    SHA256

    98eaf07b181de23d498a549ccce4f0ab44391368ac8e32551b17529883869b1c

    SHA512

    16a6bc216c87c10765eb7e115777e6b5289cec49b791a8f2b8992dcf4c922699631a168373326bfbe88a8fb7d929206de0e2f898fa7ee8154f2028c74a96ef05

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp052406.exe

    Filesize

    169KB

    MD5

    b2d6784100501db097bd3113ee149ea4

    SHA1

    c09c0660c75a18250ca27dba1d0ebabee76fedcd

    SHA256

    98eaf07b181de23d498a549ccce4f0ab44391368ac8e32551b17529883869b1c

    SHA512

    16a6bc216c87c10765eb7e115777e6b5289cec49b791a8f2b8992dcf4c922699631a168373326bfbe88a8fb7d929206de0e2f898fa7ee8154f2028c74a96ef05

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zieb5353.exe

    Filesize

    569KB

    MD5

    48cb983878aef835f73999a3a1b89445

    SHA1

    ae9cd2e6007a8437b0b4d7e5429abb555196ac7a

    SHA256

    48335d3055e3a1631ff9d3be19993226a16c2b70ac749431037afb7d646b4b00

    SHA512

    9dcb7e7523af6b90536e3cb4b0d23771748768760143bf09fc9e91f06e5c7f57340038d2f001cbf946bd58aae3edacdb68ab3dbe935ac1e90ae25b3a2d39cb63

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zieb5353.exe

    Filesize

    569KB

    MD5

    48cb983878aef835f73999a3a1b89445

    SHA1

    ae9cd2e6007a8437b0b4d7e5429abb555196ac7a

    SHA256

    48335d3055e3a1631ff9d3be19993226a16c2b70ac749431037afb7d646b4b00

    SHA512

    9dcb7e7523af6b90536e3cb4b0d23771748768760143bf09fc9e91f06e5c7f57340038d2f001cbf946bd58aae3edacdb68ab3dbe935ac1e90ae25b3a2d39cb63

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it920111.exe

    Filesize

    11KB

    MD5

    c223b21f10a9faeda79c1124b3746efd

    SHA1

    c80cb91330141bfe37ab8f869db188cda6e6e34d

    SHA256

    31b0d9c21e14e7a9e05aaaa58e7869179c49b6dacc169ccaf70bc264d0874349

    SHA512

    a1f9c003526d448aaa7371a79674353338187a65639530e5d2afd28a713f2e88b894bcedabd3d34ba13a895f224bdea2fcea04bdc0000a8cedab8baf8b751d10

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it920111.exe

    Filesize

    11KB

    MD5

    c223b21f10a9faeda79c1124b3746efd

    SHA1

    c80cb91330141bfe37ab8f869db188cda6e6e34d

    SHA256

    31b0d9c21e14e7a9e05aaaa58e7869179c49b6dacc169ccaf70bc264d0874349

    SHA512

    a1f9c003526d448aaa7371a79674353338187a65639530e5d2afd28a713f2e88b894bcedabd3d34ba13a895f224bdea2fcea04bdc0000a8cedab8baf8b751d10

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr073127.exe

    Filesize

    587KB

    MD5

    e2f443710a785a4287e57dc120a5ab91

    SHA1

    77d2b434c88c77ce820bd0aeadc9ba2118dbe741

    SHA256

    12e6311500c5c93bc11df87a2f1abccf8cabf023a302a16c08824784d21a07f6

    SHA512

    671410fbca5ef161ef4be73f7afb49a9b24747ccf0d49ff8f1e0c23df20ffada5cb088be806f8f1c7d127149b9593344bf701c2309eb1c1eb4a59a2b791af212

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr073127.exe

    Filesize

    587KB

    MD5

    e2f443710a785a4287e57dc120a5ab91

    SHA1

    77d2b434c88c77ce820bd0aeadc9ba2118dbe741

    SHA256

    12e6311500c5c93bc11df87a2f1abccf8cabf023a302a16c08824784d21a07f6

    SHA512

    671410fbca5ef161ef4be73f7afb49a9b24747ccf0d49ff8f1e0c23df20ffada5cb088be806f8f1c7d127149b9593344bf701c2309eb1c1eb4a59a2b791af212

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • memory/200-2321-0x00000000058A0000-0x0000000005906000-memory.dmp

    Filesize

    408KB

  • memory/200-2311-0x0000000001190000-0x0000000001196000-memory.dmp

    Filesize

    24KB

  • memory/200-2323-0x0000000005250000-0x0000000005260000-memory.dmp

    Filesize

    64KB

  • memory/200-2320-0x0000000005800000-0x0000000005892000-memory.dmp

    Filesize

    584KB

  • memory/200-2310-0x0000000000A50000-0x0000000000A80000-memory.dmp

    Filesize

    192KB

  • memory/200-2313-0x0000000005470000-0x000000000557A000-memory.dmp

    Filesize

    1.0MB

  • memory/200-2314-0x0000000005380000-0x0000000005392000-memory.dmp

    Filesize

    72KB

  • memory/200-2315-0x0000000005250000-0x0000000005260000-memory.dmp

    Filesize

    64KB

  • memory/1724-2316-0x00000000050A0000-0x00000000050B0000-memory.dmp

    Filesize

    64KB

  • memory/1724-2317-0x0000000005270000-0x00000000052AE000-memory.dmp

    Filesize

    248KB

  • memory/1724-2318-0x0000000005410000-0x000000000545B000-memory.dmp

    Filesize

    300KB

  • memory/1724-2324-0x00000000050A0000-0x00000000050B0000-memory.dmp

    Filesize

    64KB

  • memory/1724-2312-0x0000000005800000-0x0000000005E06000-memory.dmp

    Filesize

    6.0MB

  • memory/1724-2322-0x0000000006520000-0x0000000006570000-memory.dmp

    Filesize

    320KB

  • memory/1724-2309-0x0000000005070000-0x0000000005076000-memory.dmp

    Filesize

    24KB

  • memory/1724-2319-0x0000000005690000-0x0000000005706000-memory.dmp

    Filesize

    472KB

  • memory/1724-2325-0x0000000006D20000-0x0000000006EE2000-memory.dmp

    Filesize

    1.8MB

  • memory/1724-2326-0x0000000007AA0000-0x0000000007FCC000-memory.dmp

    Filesize

    5.2MB

  • memory/1724-2305-0x0000000000900000-0x000000000092E000-memory.dmp

    Filesize

    184KB

  • memory/2152-2333-0x0000000002450000-0x000000000248B000-memory.dmp

    Filesize

    236KB

  • memory/3528-162-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/3528-188-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/3528-196-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/3528-194-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

    Filesize

    64KB

  • memory/3528-198-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/3528-208-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/3528-218-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/3528-216-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/3528-214-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/3528-212-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/3528-210-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/3528-206-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/3528-204-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/3528-202-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/3528-200-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/3528-2297-0x0000000005630000-0x0000000005662000-memory.dmp

    Filesize

    200KB

  • memory/3528-193-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

    Filesize

    64KB

  • memory/3528-190-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/3528-170-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/3528-180-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/3528-182-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/3528-192-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/3528-186-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/3528-184-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/3528-178-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/3528-176-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/3528-174-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/3528-172-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/3528-168-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/3528-164-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/3528-166-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/3528-160-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/3528-158-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/3528-156-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/3528-154-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/3528-153-0x0000000004DE0000-0x0000000004E40000-memory.dmp

    Filesize

    384KB

  • memory/3528-152-0x0000000004DE0000-0x0000000004E46000-memory.dmp

    Filesize

    408KB

  • memory/3528-151-0x0000000004FB0000-0x00000000054AE000-memory.dmp

    Filesize

    5.0MB

  • memory/3528-150-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

    Filesize

    64KB

  • memory/3528-149-0x0000000000880000-0x00000000008DB000-memory.dmp

    Filesize

    364KB

  • memory/3528-148-0x0000000002650000-0x00000000026B8000-memory.dmp

    Filesize

    416KB

  • memory/4188-142-0x00000000003A0000-0x00000000003AA000-memory.dmp

    Filesize

    40KB