Analysis

  • max time kernel
    147s
  • max time network
    104s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14-04-2023 06:10

General

  • Target

    0b59d97605d1b0f5980fe4f7fa42b3bc9f0cb2429fef78af34ca905373dd26ee.exe

  • Size

    1.0MB

  • MD5

    97cdd02e950aeb0303a5e6538fa85283

  • SHA1

    7c47684aa6a4d6b26793338360754674ed89ccc5

  • SHA256

    0b59d97605d1b0f5980fe4f7fa42b3bc9f0cb2429fef78af34ca905373dd26ee

  • SHA512

    70ed7a535538ca57f2926fce2d3325db377e87e9390a0aeb16f12848f758c712dcf4b4901f1b8dcde04e478b26681b7fb96e68dd9e2b2a0b5e07fbb284511bba

  • SSDEEP

    24576:dyHdpTNkr832TrVVeHLzwWs108cFmizLquQ5LoZ:4zQrEzde08kL3QJo

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

disa

C2

185.161.248.90:4125

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b59d97605d1b0f5980fe4f7fa42b3bc9f0cb2429fef78af34ca905373dd26ee.exe
    "C:\Users\Admin\AppData\Local\Temp\0b59d97605d1b0f5980fe4f7fa42b3bc9f0cb2429fef78af34ca905373dd26ee.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziii5752.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziii5752.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2328
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zihR8058.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zihR8058.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2572
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it262807.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it262807.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2636
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr100967.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr100967.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3136
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:412
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp959929.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp959929.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:960
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr428307.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr428307.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      PID:2704
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 632
        3⤵
        • Program crash
        PID:4000
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 708
        3⤵
        • Program crash
        PID:2352
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 848
        3⤵
        • Program crash
        PID:2600
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 836
        3⤵
        • Program crash
        PID:3064
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 884
        3⤵
        • Program crash
        PID:2052
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 896
        3⤵
        • Program crash
        PID:5076
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 1132
        3⤵
        • Program crash
        PID:4328
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 1184
        3⤵
        • Program crash
        PID:4128
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 1088
        3⤵
        • Program crash
        PID:1308

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr428307.exe

    Filesize

    396KB

    MD5

    2d5adc88b61f67dd4a3d0af63556a9b2

    SHA1

    be2a227a96abc93b9ae975d80e298b30f7397ff9

    SHA256

    1e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318

    SHA512

    e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr428307.exe

    Filesize

    396KB

    MD5

    2d5adc88b61f67dd4a3d0af63556a9b2

    SHA1

    be2a227a96abc93b9ae975d80e298b30f7397ff9

    SHA256

    1e48b404d2d2964a05cf261b6a76f91b598c699a5ab7964e182a287b812aa318

    SHA512

    e5d941a3ccc88562eb9e27795ad337a2aa8f52547a5f4d81f0e6a6be7d121ef1e1179246135ac869554f07605682c76024ca1bdf84910e1b593a445dd8f3986a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziii5752.exe

    Filesize

    723KB

    MD5

    10e9546cc207740213ba3939fe7718d5

    SHA1

    b72f8fb0126744177ddabad9ba26f24a60a126ee

    SHA256

    02fec00b9088360c90641d5a7e1d51517c3ea772f45aa67814cd6a88763252e3

    SHA512

    deec34a7f85942962b525f05eea8d0a415fbf32c34ef7d0e3d9df6d7cefb84c840a8a81788dc9b14d2874ddcdfcbaf082df27af1774c9b2e05b45723bca94744

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziii5752.exe

    Filesize

    723KB

    MD5

    10e9546cc207740213ba3939fe7718d5

    SHA1

    b72f8fb0126744177ddabad9ba26f24a60a126ee

    SHA256

    02fec00b9088360c90641d5a7e1d51517c3ea772f45aa67814cd6a88763252e3

    SHA512

    deec34a7f85942962b525f05eea8d0a415fbf32c34ef7d0e3d9df6d7cefb84c840a8a81788dc9b14d2874ddcdfcbaf082df27af1774c9b2e05b45723bca94744

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp959929.exe

    Filesize

    169KB

    MD5

    d9b49a8174479c7be116ca1e08b3d402

    SHA1

    e712a7e92c0df6d01d7905eb0e34911fa56d356f

    SHA256

    19f171def907d2bc2642200188140f3d40c3c5e8ac7cf13c790ebace4502de31

    SHA512

    748ef338baf7a1532e530e6b2a75acc920e2834634f9593934a6bfec2b88c5c16dad1ea7c354f25b5fd72a51099564032853d8059c93637b5fb8e332790b9d18

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp959929.exe

    Filesize

    169KB

    MD5

    d9b49a8174479c7be116ca1e08b3d402

    SHA1

    e712a7e92c0df6d01d7905eb0e34911fa56d356f

    SHA256

    19f171def907d2bc2642200188140f3d40c3c5e8ac7cf13c790ebace4502de31

    SHA512

    748ef338baf7a1532e530e6b2a75acc920e2834634f9593934a6bfec2b88c5c16dad1ea7c354f25b5fd72a51099564032853d8059c93637b5fb8e332790b9d18

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zihR8058.exe

    Filesize

    569KB

    MD5

    093305e3ada0b175a0b85f2fce250fb0

    SHA1

    2105712ea2694992c7c26d7e10ed96eb75c336d0

    SHA256

    08fea1521e2503794f6592e929aa53cbfb33d387be43b76d73d0b48c8ff73342

    SHA512

    309eb040b70862181d4b52baeb510078ba10181801f60c2806b2f024746b3461e94c99dd0f4b113ee415c33082b13c30bdeca2ee761bc1a59354271d2de6bd48

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zihR8058.exe

    Filesize

    569KB

    MD5

    093305e3ada0b175a0b85f2fce250fb0

    SHA1

    2105712ea2694992c7c26d7e10ed96eb75c336d0

    SHA256

    08fea1521e2503794f6592e929aa53cbfb33d387be43b76d73d0b48c8ff73342

    SHA512

    309eb040b70862181d4b52baeb510078ba10181801f60c2806b2f024746b3461e94c99dd0f4b113ee415c33082b13c30bdeca2ee761bc1a59354271d2de6bd48

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it262807.exe

    Filesize

    11KB

    MD5

    f061ffc02a0f4bbcb07725b34547d624

    SHA1

    48f160581b0279f1b30c09591c344556e5fa4116

    SHA256

    9c8936c0b0965a7269ebb525dcdfb1b3d30c3d5ff3a6aea102f57f59ddcf9e43

    SHA512

    4cdc7122165211cbab2fb7b021e2a002248d38c36777d54fa2b9fac81d5635f4330145dabb8ea9643ecd4a9b2286d817cb4f8a272b2bb3a0f8fa2a8a2be65fd2

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it262807.exe

    Filesize

    11KB

    MD5

    f061ffc02a0f4bbcb07725b34547d624

    SHA1

    48f160581b0279f1b30c09591c344556e5fa4116

    SHA256

    9c8936c0b0965a7269ebb525dcdfb1b3d30c3d5ff3a6aea102f57f59ddcf9e43

    SHA512

    4cdc7122165211cbab2fb7b021e2a002248d38c36777d54fa2b9fac81d5635f4330145dabb8ea9643ecd4a9b2286d817cb4f8a272b2bb3a0f8fa2a8a2be65fd2

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr100967.exe

    Filesize

    587KB

    MD5

    432735a0b2cd5b4ec85f9dbfe3257ce2

    SHA1

    5736f9bbf65447cd4973419b83d911eed4a702f9

    SHA256

    1c1d42122bfbe770734a1385e2d9a33dcc72e675c3accf437e1f000ec65b961d

    SHA512

    4775e7fb1abfabb36cd89f7bd3067fdd38c307c777beb625a0c77e1f3e1875b97db440a60f3cc86bf721a2bb55be9ab3ecc5e4832bef6a4e42aa8cf4e63262ae

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr100967.exe

    Filesize

    587KB

    MD5

    432735a0b2cd5b4ec85f9dbfe3257ce2

    SHA1

    5736f9bbf65447cd4973419b83d911eed4a702f9

    SHA256

    1c1d42122bfbe770734a1385e2d9a33dcc72e675c3accf437e1f000ec65b961d

    SHA512

    4775e7fb1abfabb36cd89f7bd3067fdd38c307c777beb625a0c77e1f3e1875b97db440a60f3cc86bf721a2bb55be9ab3ecc5e4832bef6a4e42aa8cf4e63262ae

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • memory/412-2324-0x0000000006280000-0x0000000006442000-memory.dmp

    Filesize

    1.8MB

  • memory/412-2317-0x0000000004E20000-0x0000000004E5E000-memory.dmp

    Filesize

    248KB

  • memory/412-2326-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/412-2307-0x00000000005C0000-0x00000000005EE000-memory.dmp

    Filesize

    184KB

  • memory/412-2311-0x0000000002820000-0x0000000002826000-memory.dmp

    Filesize

    24KB

  • memory/412-2314-0x0000000005590000-0x0000000005B96000-memory.dmp

    Filesize

    6.0MB

  • memory/412-2315-0x0000000005090000-0x000000000519A000-memory.dmp

    Filesize

    1.0MB

  • memory/412-2316-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

    Filesize

    72KB

  • memory/412-2319-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/960-2321-0x0000000005680000-0x00000000056F6000-memory.dmp

    Filesize

    472KB

  • memory/960-2318-0x00000000053C0000-0x000000000540B000-memory.dmp

    Filesize

    300KB

  • memory/960-2320-0x0000000005270000-0x0000000005280000-memory.dmp

    Filesize

    64KB

  • memory/960-2325-0x0000000008C30000-0x000000000915C000-memory.dmp

    Filesize

    5.2MB

  • memory/960-2327-0x0000000005270000-0x0000000005280000-memory.dmp

    Filesize

    64KB

  • memory/960-2313-0x00000000051A0000-0x00000000051A6000-memory.dmp

    Filesize

    24KB

  • memory/960-2322-0x00000000057A0000-0x0000000005832000-memory.dmp

    Filesize

    584KB

  • memory/960-2312-0x00000000009F0000-0x0000000000A20000-memory.dmp

    Filesize

    192KB

  • memory/960-2328-0x0000000006630000-0x0000000006680000-memory.dmp

    Filesize

    320KB

  • memory/960-2323-0x0000000005840000-0x00000000058A6000-memory.dmp

    Filesize

    408KB

  • memory/2636-142-0x0000000000120000-0x000000000012A000-memory.dmp

    Filesize

    40KB

  • memory/2704-2335-0x00000000008C0000-0x00000000008FB000-memory.dmp

    Filesize

    236KB

  • memory/3136-162-0x0000000002980000-0x00000000029E0000-memory.dmp

    Filesize

    384KB

  • memory/3136-181-0x0000000002980000-0x00000000029E0000-memory.dmp

    Filesize

    384KB

  • memory/3136-196-0x0000000002980000-0x00000000029E0000-memory.dmp

    Filesize

    384KB

  • memory/3136-198-0x0000000002980000-0x00000000029E0000-memory.dmp

    Filesize

    384KB

  • memory/3136-200-0x0000000002980000-0x00000000029E0000-memory.dmp

    Filesize

    384KB

  • memory/3136-202-0x0000000002980000-0x00000000029E0000-memory.dmp

    Filesize

    384KB

  • memory/3136-204-0x0000000002980000-0x00000000029E0000-memory.dmp

    Filesize

    384KB

  • memory/3136-206-0x0000000002980000-0x00000000029E0000-memory.dmp

    Filesize

    384KB

  • memory/3136-208-0x0000000002980000-0x00000000029E0000-memory.dmp

    Filesize

    384KB

  • memory/3136-210-0x0000000002980000-0x00000000029E0000-memory.dmp

    Filesize

    384KB

  • memory/3136-212-0x0000000002980000-0x00000000029E0000-memory.dmp

    Filesize

    384KB

  • memory/3136-214-0x0000000002980000-0x00000000029E0000-memory.dmp

    Filesize

    384KB

  • memory/3136-216-0x0000000002980000-0x00000000029E0000-memory.dmp

    Filesize

    384KB

  • memory/3136-218-0x0000000002980000-0x00000000029E0000-memory.dmp

    Filesize

    384KB

  • memory/3136-2298-0x0000000004F50000-0x0000000004F60000-memory.dmp

    Filesize

    64KB

  • memory/3136-2299-0x0000000004F20000-0x0000000004F52000-memory.dmp

    Filesize

    200KB

  • memory/3136-192-0x0000000002980000-0x00000000029E0000-memory.dmp

    Filesize

    384KB

  • memory/3136-190-0x0000000002980000-0x00000000029E0000-memory.dmp

    Filesize

    384KB

  • memory/3136-188-0x0000000002980000-0x00000000029E0000-memory.dmp

    Filesize

    384KB

  • memory/3136-186-0x0000000002980000-0x00000000029E0000-memory.dmp

    Filesize

    384KB

  • memory/3136-184-0x0000000002980000-0x00000000029E0000-memory.dmp

    Filesize

    384KB

  • memory/3136-194-0x0000000002980000-0x00000000029E0000-memory.dmp

    Filesize

    384KB

  • memory/3136-182-0x0000000004F50000-0x0000000004F60000-memory.dmp

    Filesize

    64KB

  • memory/3136-180-0x0000000004F50000-0x0000000004F60000-memory.dmp

    Filesize

    64KB

  • memory/3136-178-0x0000000002980000-0x00000000029E0000-memory.dmp

    Filesize

    384KB

  • memory/3136-176-0x0000000002980000-0x00000000029E0000-memory.dmp

    Filesize

    384KB

  • memory/3136-174-0x0000000002980000-0x00000000029E0000-memory.dmp

    Filesize

    384KB

  • memory/3136-172-0x0000000002980000-0x00000000029E0000-memory.dmp

    Filesize

    384KB

  • memory/3136-170-0x0000000002980000-0x00000000029E0000-memory.dmp

    Filesize

    384KB

  • memory/3136-168-0x0000000002980000-0x00000000029E0000-memory.dmp

    Filesize

    384KB

  • memory/3136-166-0x0000000002980000-0x00000000029E0000-memory.dmp

    Filesize

    384KB

  • memory/3136-164-0x0000000002980000-0x00000000029E0000-memory.dmp

    Filesize

    384KB

  • memory/3136-160-0x0000000002980000-0x00000000029E0000-memory.dmp

    Filesize

    384KB

  • memory/3136-158-0x0000000002980000-0x00000000029E0000-memory.dmp

    Filesize

    384KB

  • memory/3136-156-0x0000000002980000-0x00000000029E0000-memory.dmp

    Filesize

    384KB

  • memory/3136-154-0x0000000002980000-0x00000000029E0000-memory.dmp

    Filesize

    384KB

  • memory/3136-153-0x0000000002980000-0x00000000029E0000-memory.dmp

    Filesize

    384KB

  • memory/3136-152-0x0000000002980000-0x00000000029E6000-memory.dmp

    Filesize

    408KB

  • memory/3136-151-0x0000000005060000-0x000000000555E000-memory.dmp

    Filesize

    5.0MB

  • memory/3136-150-0x0000000004F50000-0x0000000004F60000-memory.dmp

    Filesize

    64KB

  • memory/3136-149-0x00000000009B0000-0x0000000000A0B000-memory.dmp

    Filesize

    364KB

  • memory/3136-148-0x00000000025F0000-0x0000000002658000-memory.dmp

    Filesize

    416KB