Analysis

  • max time kernel
    148s
  • max time network
    105s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14-04-2023 08:10

General

  • Target

    08dc546e878330b082f87955dd9099047df01c97867c0883db4cd66a3a6bbcae.exe

  • Size

    1.2MB

  • MD5

    a589de6485aa1f78a1eb20df98e6c59e

  • SHA1

    29e824f4015273fe87e26da711a5d3c289a6bf69

  • SHA256

    08dc546e878330b082f87955dd9099047df01c97867c0883db4cd66a3a6bbcae

  • SHA512

    500bde4c74705ed908b47c828ebe4624e2c3b9ac1bc61db34dc8c3f8831ea34b89bc079cad75af1685e284a68bbbbe00db61c36860dc585304923f8e276d2805

  • SSDEEP

    24576:FykcpAhtyJ5zKV7Hbi1O9NH6sdMCOdeOs5HDC2ft:gVpatyzzKV7Hbi1i54dSHD

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

disa

C2

185.161.248.90:4125

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\08dc546e878330b082f87955dd9099047df01c97867c0883db4cd66a3a6bbcae.exe
    "C:\Users\Admin\AppData\Local\Temp\08dc546e878330b082f87955dd9099047df01c97867c0883db4cd66a3a6bbcae.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4024
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un224200.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un224200.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3488
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un984500.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un984500.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2692
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr158215.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr158215.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3976
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu627849.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu627849.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4876
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2560
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk387473.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk387473.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1152
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si038272.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si038272.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      PID:3968
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 632
        3⤵
        • Program crash
        PID:4400
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 708
        3⤵
        • Program crash
        PID:4632
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 848
        3⤵
        • Program crash
        PID:4092
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 856
        3⤵
        • Program crash
        PID:4764
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 884
        3⤵
        • Program crash
        PID:4852
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 932
        3⤵
        • Program crash
        PID:3568
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 1128
        3⤵
        • Program crash
        PID:1192
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 1188
        3⤵
        • Program crash
        PID:2216
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 1148
        3⤵
        • Program crash
        PID:3564

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si038272.exe

    Filesize

    397KB

    MD5

    dadc0d126524e7b28aab58226127e8a6

    SHA1

    a383b6f22bbb8056ad743543ad54ef1707b1493a

    SHA256

    af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8

    SHA512

    dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si038272.exe

    Filesize

    397KB

    MD5

    dadc0d126524e7b28aab58226127e8a6

    SHA1

    a383b6f22bbb8056ad743543ad54ef1707b1493a

    SHA256

    af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8

    SHA512

    dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un224200.exe

    Filesize

    862KB

    MD5

    12f017f543a3ef843029e7705003e3f8

    SHA1

    2e4a717b55d6bfee469aa213dc1c2c11151c11ca

    SHA256

    03c2fb3b9c0ef6a0b91678b13c3e58f4cd886b0f055b6910d9e38d209f632ff8

    SHA512

    5af48dc2005370875dfd5b9c9fd572defda8b32edf2f88489233cb2dc5123ece78321610da13c658bad59cecc37e976d2495f0e44bd241aacb4ca50f2e590f83

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un224200.exe

    Filesize

    862KB

    MD5

    12f017f543a3ef843029e7705003e3f8

    SHA1

    2e4a717b55d6bfee469aa213dc1c2c11151c11ca

    SHA256

    03c2fb3b9c0ef6a0b91678b13c3e58f4cd886b0f055b6910d9e38d209f632ff8

    SHA512

    5af48dc2005370875dfd5b9c9fd572defda8b32edf2f88489233cb2dc5123ece78321610da13c658bad59cecc37e976d2495f0e44bd241aacb4ca50f2e590f83

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk387473.exe

    Filesize

    169KB

    MD5

    860d6e78d281e42498bed86f05294faf

    SHA1

    231fd1dd31281a0cb620e37337872012c1e309cd

    SHA256

    6b5bdd86687e696d2783c26944f2450ee7755eb42a450841abf55b7ba354a6a7

    SHA512

    59db2be9da97fb6b0789b6d6e1e4cce5f731a0c9775a2c35a9e35043768dc5e8d8fdfcd3c7b37b1b15ece4fb0a2404b7624417ba42eae2247de0454456827671

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk387473.exe

    Filesize

    169KB

    MD5

    860d6e78d281e42498bed86f05294faf

    SHA1

    231fd1dd31281a0cb620e37337872012c1e309cd

    SHA256

    6b5bdd86687e696d2783c26944f2450ee7755eb42a450841abf55b7ba354a6a7

    SHA512

    59db2be9da97fb6b0789b6d6e1e4cce5f731a0c9775a2c35a9e35043768dc5e8d8fdfcd3c7b37b1b15ece4fb0a2404b7624417ba42eae2247de0454456827671

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un984500.exe

    Filesize

    709KB

    MD5

    fed96e078c5fd33831cc71321988c3e4

    SHA1

    5f5d1e9b26c595b0bf20a3139167775614909cee

    SHA256

    e3fc84da0946269c1a60d9f414da3674760d8a4e913a003a8178ba5cc9ad15f5

    SHA512

    1097189887d4e1bf5a6fbc2a5e6b5ec55fa094800f57549cb6c111c51487a3937bffeec962f69d72dddd8625668bee86daacc9e18b28a473efd951dd38f9abc7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un984500.exe

    Filesize

    709KB

    MD5

    fed96e078c5fd33831cc71321988c3e4

    SHA1

    5f5d1e9b26c595b0bf20a3139167775614909cee

    SHA256

    e3fc84da0946269c1a60d9f414da3674760d8a4e913a003a8178ba5cc9ad15f5

    SHA512

    1097189887d4e1bf5a6fbc2a5e6b5ec55fa094800f57549cb6c111c51487a3937bffeec962f69d72dddd8625668bee86daacc9e18b28a473efd951dd38f9abc7

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr158215.exe

    Filesize

    404KB

    MD5

    99973162e1ab13dc56e5b425b9daa1c2

    SHA1

    d3b2f5e611186a8eddbaa506405de6a01c0138e2

    SHA256

    009e4c46bebdc0fbccb78ea09e04188abc693742204274cce8c03dcf0a4d42ca

    SHA512

    224b2d8af2f287ce31652ad859770f0b2658b2b4d52b03e491e2641888c185d394f032d77e55ab9f8ff500705e439852c450821ca2a44cee86a55e4a7318e3d4

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr158215.exe

    Filesize

    404KB

    MD5

    99973162e1ab13dc56e5b425b9daa1c2

    SHA1

    d3b2f5e611186a8eddbaa506405de6a01c0138e2

    SHA256

    009e4c46bebdc0fbccb78ea09e04188abc693742204274cce8c03dcf0a4d42ca

    SHA512

    224b2d8af2f287ce31652ad859770f0b2658b2b4d52b03e491e2641888c185d394f032d77e55ab9f8ff500705e439852c450821ca2a44cee86a55e4a7318e3d4

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu627849.exe

    Filesize

    588KB

    MD5

    798bebfff2666b6576dab39e5936a22c

    SHA1

    43a214d9d6400868c4318f8b9c0f045a1065fead

    SHA256

    194f7667d3cdad1698d5730faa56897cb4afa7fdcf212ae22dffcef2bba15d3b

    SHA512

    444b2433ae7ceda2edf08a75efb8e9fdddd7802cd4dd511301cd6de10b5f466aee50681f40b2abf9d4d4a9ac2a5d1c3faed1aebce5c27f93a5270830ce298fea

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu627849.exe

    Filesize

    588KB

    MD5

    798bebfff2666b6576dab39e5936a22c

    SHA1

    43a214d9d6400868c4318f8b9c0f045a1065fead

    SHA256

    194f7667d3cdad1698d5730faa56897cb4afa7fdcf212ae22dffcef2bba15d3b

    SHA512

    444b2433ae7ceda2edf08a75efb8e9fdddd7802cd4dd511301cd6de10b5f466aee50681f40b2abf9d4d4a9ac2a5d1c3faed1aebce5c27f93a5270830ce298fea

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • memory/1152-2351-0x0000000005070000-0x0000000005676000-memory.dmp

    Filesize

    6.0MB

  • memory/1152-2350-0x0000000000A80000-0x0000000000A86000-memory.dmp

    Filesize

    24KB

  • memory/1152-2364-0x0000000006590000-0x0000000006752000-memory.dmp

    Filesize

    1.8MB

  • memory/1152-2363-0x0000000005A00000-0x0000000005A50000-memory.dmp

    Filesize

    320KB

  • memory/1152-2362-0x0000000004A50000-0x0000000004A60000-memory.dmp

    Filesize

    64KB

  • memory/1152-2359-0x0000000004F10000-0x0000000004FA2000-memory.dmp

    Filesize

    584KB

  • memory/1152-2355-0x0000000004A50000-0x0000000004A60000-memory.dmp

    Filesize

    64KB

  • memory/1152-2360-0x0000000004FB0000-0x0000000005016000-memory.dmp

    Filesize

    408KB

  • memory/1152-2349-0x0000000000160000-0x0000000000190000-memory.dmp

    Filesize

    192KB

  • memory/2560-2354-0x0000000004B00000-0x0000000004B10000-memory.dmp

    Filesize

    64KB

  • memory/2560-2361-0x0000000004B00000-0x0000000004B10000-memory.dmp

    Filesize

    64KB

  • memory/2560-2352-0x0000000004C20000-0x0000000004D2A000-memory.dmp

    Filesize

    1.0MB

  • memory/2560-2353-0x0000000004AA0000-0x0000000004AB2000-memory.dmp

    Filesize

    72KB

  • memory/2560-2356-0x0000000004B10000-0x0000000004B4E000-memory.dmp

    Filesize

    248KB

  • memory/2560-2347-0x0000000000A20000-0x0000000000A26000-memory.dmp

    Filesize

    24KB

  • memory/2560-2357-0x0000000004B60000-0x0000000004BAB000-memory.dmp

    Filesize

    300KB

  • memory/2560-2344-0x00000000001A0000-0x00000000001CE000-memory.dmp

    Filesize

    184KB

  • memory/2560-2358-0x0000000004E30000-0x0000000004EA6000-memory.dmp

    Filesize

    472KB

  • memory/2560-2365-0x00000000093C0000-0x00000000098EC000-memory.dmp

    Filesize

    5.2MB

  • memory/3968-2372-0x0000000000970000-0x00000000009AB000-memory.dmp

    Filesize

    236KB

  • memory/3976-165-0x00000000028D0000-0x00000000028E2000-memory.dmp

    Filesize

    72KB

  • memory/3976-182-0x0000000000400000-0x000000000080A000-memory.dmp

    Filesize

    4.0MB

  • memory/3976-143-0x00000000024B0000-0x00000000024CA000-memory.dmp

    Filesize

    104KB

  • memory/3976-144-0x0000000000920000-0x000000000094D000-memory.dmp

    Filesize

    180KB

  • memory/3976-145-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/3976-146-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/3976-147-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/3976-148-0x0000000004E80000-0x000000000537E000-memory.dmp

    Filesize

    5.0MB

  • memory/3976-149-0x00000000028D0000-0x00000000028E8000-memory.dmp

    Filesize

    96KB

  • memory/3976-150-0x00000000028D0000-0x00000000028E2000-memory.dmp

    Filesize

    72KB

  • memory/3976-153-0x00000000028D0000-0x00000000028E2000-memory.dmp

    Filesize

    72KB

  • memory/3976-151-0x00000000028D0000-0x00000000028E2000-memory.dmp

    Filesize

    72KB

  • memory/3976-155-0x00000000028D0000-0x00000000028E2000-memory.dmp

    Filesize

    72KB

  • memory/3976-157-0x00000000028D0000-0x00000000028E2000-memory.dmp

    Filesize

    72KB

  • memory/3976-159-0x00000000028D0000-0x00000000028E2000-memory.dmp

    Filesize

    72KB

  • memory/3976-161-0x00000000028D0000-0x00000000028E2000-memory.dmp

    Filesize

    72KB

  • memory/3976-163-0x00000000028D0000-0x00000000028E2000-memory.dmp

    Filesize

    72KB

  • memory/3976-167-0x00000000028D0000-0x00000000028E2000-memory.dmp

    Filesize

    72KB

  • memory/3976-169-0x00000000028D0000-0x00000000028E2000-memory.dmp

    Filesize

    72KB

  • memory/3976-171-0x00000000028D0000-0x00000000028E2000-memory.dmp

    Filesize

    72KB

  • memory/3976-173-0x00000000028D0000-0x00000000028E2000-memory.dmp

    Filesize

    72KB

  • memory/3976-175-0x00000000028D0000-0x00000000028E2000-memory.dmp

    Filesize

    72KB

  • memory/3976-177-0x00000000028D0000-0x00000000028E2000-memory.dmp

    Filesize

    72KB

  • memory/3976-178-0x0000000000400000-0x000000000080A000-memory.dmp

    Filesize

    4.0MB

  • memory/3976-179-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/3976-180-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/4876-210-0x0000000002AC0000-0x0000000002B20000-memory.dmp

    Filesize

    384KB

  • memory/4876-212-0x0000000002AC0000-0x0000000002B20000-memory.dmp

    Filesize

    384KB

  • memory/4876-2337-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

    Filesize

    64KB

  • memory/4876-2335-0x0000000005650000-0x0000000005682000-memory.dmp

    Filesize

    200KB

  • memory/4876-231-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

    Filesize

    64KB

  • memory/4876-227-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

    Filesize

    64KB

  • memory/4876-229-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

    Filesize

    64KB

  • memory/4876-226-0x00000000024E0000-0x000000000253B000-memory.dmp

    Filesize

    364KB

  • memory/4876-222-0x0000000002AC0000-0x0000000002B20000-memory.dmp

    Filesize

    384KB

  • memory/4876-220-0x0000000002AC0000-0x0000000002B20000-memory.dmp

    Filesize

    384KB

  • memory/4876-218-0x0000000002AC0000-0x0000000002B20000-memory.dmp

    Filesize

    384KB

  • memory/4876-216-0x0000000002AC0000-0x0000000002B20000-memory.dmp

    Filesize

    384KB

  • memory/4876-214-0x0000000002AC0000-0x0000000002B20000-memory.dmp

    Filesize

    384KB

  • memory/4876-187-0x0000000002700000-0x0000000002768000-memory.dmp

    Filesize

    416KB

  • memory/4876-188-0x0000000002AC0000-0x0000000002B26000-memory.dmp

    Filesize

    408KB

  • memory/4876-208-0x0000000002AC0000-0x0000000002B20000-memory.dmp

    Filesize

    384KB

  • memory/4876-206-0x0000000002AC0000-0x0000000002B20000-memory.dmp

    Filesize

    384KB

  • memory/4876-204-0x0000000002AC0000-0x0000000002B20000-memory.dmp

    Filesize

    384KB

  • memory/4876-202-0x0000000002AC0000-0x0000000002B20000-memory.dmp

    Filesize

    384KB

  • memory/4876-200-0x0000000002AC0000-0x0000000002B20000-memory.dmp

    Filesize

    384KB

  • memory/4876-198-0x0000000002AC0000-0x0000000002B20000-memory.dmp

    Filesize

    384KB

  • memory/4876-196-0x0000000002AC0000-0x0000000002B20000-memory.dmp

    Filesize

    384KB

  • memory/4876-194-0x0000000002AC0000-0x0000000002B20000-memory.dmp

    Filesize

    384KB

  • memory/4876-192-0x0000000002AC0000-0x0000000002B20000-memory.dmp

    Filesize

    384KB

  • memory/4876-190-0x0000000002AC0000-0x0000000002B20000-memory.dmp

    Filesize

    384KB

  • memory/4876-189-0x0000000002AC0000-0x0000000002B20000-memory.dmp

    Filesize

    384KB