Analysis

  • max time kernel
    146s
  • max time network
    104s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14-04-2023 07:38

General

  • Target

    f6eb00bb4a87946ea8c1030233ba119aa1589af761a7e0b3e4c503f325ad8d76.exe

  • Size

    1.0MB

  • MD5

    aeb573a875ebe645e4523034501c9522

  • SHA1

    b1fcf9df6e086d622c9df9cacc88ea29dd88fdbc

  • SHA256

    f6eb00bb4a87946ea8c1030233ba119aa1589af761a7e0b3e4c503f325ad8d76

  • SHA512

    46a019b7fd3fe2df6b923518e6f910d1d7468a390395f632ea0c0066761f8803ca9f22ff8325eb8cee8e04174527e71b268c2343503f11f6b09a8836ea62f0f7

  • SSDEEP

    24576:WyZzInAhCHA6wKEyLWXc1P9WWUOrfJ9XbQ0gw2Jo:lZzIAhCHAyHaXc1l5UOrXc052

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

disa

C2

185.161.248.90:4125

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6eb00bb4a87946ea8c1030233ba119aa1589af761a7e0b3e4c503f325ad8d76.exe
    "C:\Users\Admin\AppData\Local\Temp\f6eb00bb4a87946ea8c1030233ba119aa1589af761a7e0b3e4c503f325ad8d76.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1792
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLE4804.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLE4804.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2504
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zivL6659.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zivL6659.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2560
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it029980.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it029980.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3012
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr247588.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr247588.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:5016
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:336
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp678555.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp678555.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:164
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr371878.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr371878.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      PID:2168
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 632
        3⤵
        • Program crash
        PID:3452
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 708
        3⤵
        • Program crash
        PID:2484
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 848
        3⤵
        • Program crash
        PID:2588
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 860
        3⤵
        • Program crash
        PID:2648
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 884
        3⤵
        • Program crash
        PID:4992
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 820
        3⤵
        • Program crash
        PID:2088
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 1132
        3⤵
        • Program crash
        PID:1448
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 1152
        3⤵
        • Program crash
        PID:4700
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 1236
        3⤵
        • Program crash
        PID:2808

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr371878.exe

    Filesize

    397KB

    MD5

    dadc0d126524e7b28aab58226127e8a6

    SHA1

    a383b6f22bbb8056ad743543ad54ef1707b1493a

    SHA256

    af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8

    SHA512

    dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr371878.exe

    Filesize

    397KB

    MD5

    dadc0d126524e7b28aab58226127e8a6

    SHA1

    a383b6f22bbb8056ad743543ad54ef1707b1493a

    SHA256

    af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8

    SHA512

    dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLE4804.exe

    Filesize

    723KB

    MD5

    132fc4ced23f2dcdbc39dfd47c90f05f

    SHA1

    abc9c234d62691eb9ccd70bb9de82b00665daa14

    SHA256

    2ff49dc986f08be9be4e8b7ec352a53361e92814aa4273da8b53d108b3402fab

    SHA512

    c07aa99f6d11aa9d2be4abf3ee9607056fcd35ee224644afa9b547198422086d60fc8baa9c4e4dfb22ced2ff7f31d5ec5ae24f51a4d0c773548f306682d45136

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLE4804.exe

    Filesize

    723KB

    MD5

    132fc4ced23f2dcdbc39dfd47c90f05f

    SHA1

    abc9c234d62691eb9ccd70bb9de82b00665daa14

    SHA256

    2ff49dc986f08be9be4e8b7ec352a53361e92814aa4273da8b53d108b3402fab

    SHA512

    c07aa99f6d11aa9d2be4abf3ee9607056fcd35ee224644afa9b547198422086d60fc8baa9c4e4dfb22ced2ff7f31d5ec5ae24f51a4d0c773548f306682d45136

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp678555.exe

    Filesize

    169KB

    MD5

    f2b713d2af2f742b18d2a1edda8652c5

    SHA1

    4d109d570927d290eb5739312af5269474fe9d3a

    SHA256

    ef305f02a848d4cf14a4e6dd4158176be5c570e1e17b9c58b144183fa18040c2

    SHA512

    c15d2a94b6576b1596f76e997841094b28599446e03cd351238ebb30e9305e99c5f8630d715886df5790aafb6d49c6948482ed16c406155ab26b7be413c70786

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp678555.exe

    Filesize

    169KB

    MD5

    f2b713d2af2f742b18d2a1edda8652c5

    SHA1

    4d109d570927d290eb5739312af5269474fe9d3a

    SHA256

    ef305f02a848d4cf14a4e6dd4158176be5c570e1e17b9c58b144183fa18040c2

    SHA512

    c15d2a94b6576b1596f76e997841094b28599446e03cd351238ebb30e9305e99c5f8630d715886df5790aafb6d49c6948482ed16c406155ab26b7be413c70786

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zivL6659.exe

    Filesize

    569KB

    MD5

    e05a7e7dc5d1c1c843ae3a197210fe4b

    SHA1

    186f36a18810abafa3a580c5f321fe2b037d6d26

    SHA256

    62a7357d310e9707ae7bd7541a838f5290c008c998f05a51556d43cd741c9838

    SHA512

    9c79f528a7e526717b27cad89cd045d049d05bace1863fd59e92e348f569a83dd9b0bacb8fd4721083cd845a2291b88d5a35d47394ea4428e003824f6c709501

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zivL6659.exe

    Filesize

    569KB

    MD5

    e05a7e7dc5d1c1c843ae3a197210fe4b

    SHA1

    186f36a18810abafa3a580c5f321fe2b037d6d26

    SHA256

    62a7357d310e9707ae7bd7541a838f5290c008c998f05a51556d43cd741c9838

    SHA512

    9c79f528a7e526717b27cad89cd045d049d05bace1863fd59e92e348f569a83dd9b0bacb8fd4721083cd845a2291b88d5a35d47394ea4428e003824f6c709501

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it029980.exe

    Filesize

    11KB

    MD5

    37ddbd2d6563f5be14e577a45cc8f89a

    SHA1

    a5c2fd0229966f1a559401f6fdb4e7b04add9635

    SHA256

    217849bd7730433ae39c1e260d738e9f9fabce5e779d22aa7ee072943badbb94

    SHA512

    0fdd2d4d119fd3bce36181a5601afcf1d2cd71de81bc4c2b7c2488d5859212cc276ff51f71cef30dc9ce6bf194210b34dbc8754667f0c8ac79f980a8ca8e89e7

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it029980.exe

    Filesize

    11KB

    MD5

    37ddbd2d6563f5be14e577a45cc8f89a

    SHA1

    a5c2fd0229966f1a559401f6fdb4e7b04add9635

    SHA256

    217849bd7730433ae39c1e260d738e9f9fabce5e779d22aa7ee072943badbb94

    SHA512

    0fdd2d4d119fd3bce36181a5601afcf1d2cd71de81bc4c2b7c2488d5859212cc276ff51f71cef30dc9ce6bf194210b34dbc8754667f0c8ac79f980a8ca8e89e7

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr247588.exe

    Filesize

    588KB

    MD5

    9a535eb2b7a7dc8f67c1d73f7e272cae

    SHA1

    be86c88db86e67ee8e12d090daf610ef5f7f69e5

    SHA256

    bd2dfd77f2e008e22d94c4ef6710a73041e08a0797890fae3db52b239866d5bf

    SHA512

    e8a5a1ad75939634103452befc2c391f5209f2cd779b9254758e38959393b1866481b1fe5554c50149ba52fdce062edbbb89dcfe334567aa1d08db03e78aa60d

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr247588.exe

    Filesize

    588KB

    MD5

    9a535eb2b7a7dc8f67c1d73f7e272cae

    SHA1

    be86c88db86e67ee8e12d090daf610ef5f7f69e5

    SHA256

    bd2dfd77f2e008e22d94c4ef6710a73041e08a0797890fae3db52b239866d5bf

    SHA512

    e8a5a1ad75939634103452befc2c391f5209f2cd779b9254758e38959393b1866481b1fe5554c50149ba52fdce062edbbb89dcfe334567aa1d08db03e78aa60d

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • memory/164-2325-0x0000000005210000-0x0000000005220000-memory.dmp

    Filesize

    64KB

  • memory/164-2311-0x0000000005170000-0x0000000005176000-memory.dmp

    Filesize

    24KB

  • memory/164-2310-0x00000000008C0000-0x00000000008F0000-memory.dmp

    Filesize

    192KB

  • memory/164-2321-0x000000000A9F0000-0x000000000AA56000-memory.dmp

    Filesize

    408KB

  • memory/164-2316-0x0000000005210000-0x0000000005220000-memory.dmp

    Filesize

    64KB

  • memory/164-2313-0x000000000A6C0000-0x000000000A7CA000-memory.dmp

    Filesize

    1.0MB

  • memory/164-2319-0x000000000A970000-0x000000000A9E6000-memory.dmp

    Filesize

    472KB

  • memory/164-2318-0x000000000A7D0000-0x000000000A81B000-memory.dmp

    Filesize

    300KB

  • memory/164-2314-0x000000000A5F0000-0x000000000A602000-memory.dmp

    Filesize

    72KB

  • memory/336-2322-0x0000000005C00000-0x0000000005C50000-memory.dmp

    Filesize

    320KB

  • memory/336-2315-0x0000000004AC0000-0x0000000004AFE000-memory.dmp

    Filesize

    248KB

  • memory/336-2317-0x00000000024A0000-0x00000000024B0000-memory.dmp

    Filesize

    64KB

  • memory/336-2320-0x0000000004FE0000-0x0000000005072000-memory.dmp

    Filesize

    584KB

  • memory/336-2312-0x0000000005090000-0x0000000005696000-memory.dmp

    Filesize

    6.0MB

  • memory/336-2323-0x0000000005E20000-0x0000000005FE2000-memory.dmp

    Filesize

    1.8MB

  • memory/336-2324-0x0000000007E00000-0x000000000832C000-memory.dmp

    Filesize

    5.2MB

  • memory/336-2326-0x00000000024A0000-0x00000000024B0000-memory.dmp

    Filesize

    64KB

  • memory/336-2309-0x0000000002360000-0x0000000002366000-memory.dmp

    Filesize

    24KB

  • memory/336-2305-0x0000000000130000-0x000000000015E000-memory.dmp

    Filesize

    184KB

  • memory/2168-2333-0x0000000002360000-0x000000000239B000-memory.dmp

    Filesize

    236KB

  • memory/3012-142-0x0000000000ED0000-0x0000000000EDA000-memory.dmp

    Filesize

    40KB

  • memory/5016-159-0x0000000005480000-0x00000000054E0000-memory.dmp

    Filesize

    384KB

  • memory/5016-183-0x0000000005480000-0x00000000054E0000-memory.dmp

    Filesize

    384KB

  • memory/5016-197-0x0000000005480000-0x00000000054E0000-memory.dmp

    Filesize

    384KB

  • memory/5016-199-0x0000000005480000-0x00000000054E0000-memory.dmp

    Filesize

    384KB

  • memory/5016-201-0x0000000005480000-0x00000000054E0000-memory.dmp

    Filesize

    384KB

  • memory/5016-203-0x0000000005480000-0x00000000054E0000-memory.dmp

    Filesize

    384KB

  • memory/5016-205-0x0000000005480000-0x00000000054E0000-memory.dmp

    Filesize

    384KB

  • memory/5016-207-0x0000000005480000-0x00000000054E0000-memory.dmp

    Filesize

    384KB

  • memory/5016-209-0x0000000005480000-0x00000000054E0000-memory.dmp

    Filesize

    384KB

  • memory/5016-211-0x0000000005480000-0x00000000054E0000-memory.dmp

    Filesize

    384KB

  • memory/5016-213-0x0000000005480000-0x00000000054E0000-memory.dmp

    Filesize

    384KB

  • memory/5016-215-0x0000000005480000-0x00000000054E0000-memory.dmp

    Filesize

    384KB

  • memory/5016-217-0x0000000005480000-0x00000000054E0000-memory.dmp

    Filesize

    384KB

  • memory/5016-2297-0x0000000005650000-0x0000000005682000-memory.dmp

    Filesize

    200KB

  • memory/5016-193-0x0000000005480000-0x00000000054E0000-memory.dmp

    Filesize

    384KB

  • memory/5016-191-0x0000000005480000-0x00000000054E0000-memory.dmp

    Filesize

    384KB

  • memory/5016-189-0x0000000005480000-0x00000000054E0000-memory.dmp

    Filesize

    384KB

  • memory/5016-187-0x0000000005480000-0x00000000054E0000-memory.dmp

    Filesize

    384KB

  • memory/5016-185-0x0000000005480000-0x00000000054E0000-memory.dmp

    Filesize

    384KB

  • memory/5016-195-0x0000000005480000-0x00000000054E0000-memory.dmp

    Filesize

    384KB

  • memory/5016-181-0x0000000005480000-0x00000000054E0000-memory.dmp

    Filesize

    384KB

  • memory/5016-179-0x0000000005480000-0x00000000054E0000-memory.dmp

    Filesize

    384KB

  • memory/5016-177-0x0000000005480000-0x00000000054E0000-memory.dmp

    Filesize

    384KB

  • memory/5016-175-0x0000000005480000-0x00000000054E0000-memory.dmp

    Filesize

    384KB

  • memory/5016-173-0x0000000005480000-0x00000000054E0000-memory.dmp

    Filesize

    384KB

  • memory/5016-171-0x0000000005480000-0x00000000054E0000-memory.dmp

    Filesize

    384KB

  • memory/5016-169-0x0000000005480000-0x00000000054E0000-memory.dmp

    Filesize

    384KB

  • memory/5016-167-0x0000000005480000-0x00000000054E0000-memory.dmp

    Filesize

    384KB

  • memory/5016-165-0x0000000005480000-0x00000000054E0000-memory.dmp

    Filesize

    384KB

  • memory/5016-163-0x0000000005480000-0x00000000054E0000-memory.dmp

    Filesize

    384KB

  • memory/5016-161-0x0000000005480000-0x00000000054E0000-memory.dmp

    Filesize

    384KB

  • memory/5016-154-0x0000000005480000-0x00000000054E0000-memory.dmp

    Filesize

    384KB

  • memory/5016-157-0x0000000005480000-0x00000000054E0000-memory.dmp

    Filesize

    384KB

  • memory/5016-155-0x0000000004F70000-0x0000000004F80000-memory.dmp

    Filesize

    64KB

  • memory/5016-153-0x0000000005480000-0x00000000054E0000-memory.dmp

    Filesize

    384KB

  • memory/5016-152-0x0000000004F70000-0x0000000004F80000-memory.dmp

    Filesize

    64KB

  • memory/5016-151-0x0000000005480000-0x00000000054E6000-memory.dmp

    Filesize

    408KB

  • memory/5016-150-0x0000000004F80000-0x000000000547E000-memory.dmp

    Filesize

    5.0MB

  • memory/5016-149-0x0000000004E80000-0x0000000004EE8000-memory.dmp

    Filesize

    416KB

  • memory/5016-148-0x0000000002320000-0x000000000237B000-memory.dmp

    Filesize

    364KB