Analysis

  • max time kernel
    144s
  • max time network
    139s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14-04-2023 07:52

General

  • Target

    62bc10ee439a7705fdfea29c5ac64956ae46b2ee62f8a79ca944b3cff963fbf9.exe

  • Size

    1.2MB

  • MD5

    9a1cc2664cba66b638d1b8a123920f5c

  • SHA1

    9a3fb48aae8ca5b33184b35bc5250f874f3009fc

  • SHA256

    62bc10ee439a7705fdfea29c5ac64956ae46b2ee62f8a79ca944b3cff963fbf9

  • SHA512

    ae8782d0a27f5f311989ff1da20b51cd34d79340ad07e013ea0b6b7f98f1a6dee732c19690b2941e9f3b03eb08f4ae86ec057fb6d6585bb688551907db909c03

  • SSDEEP

    24576:RyTODyKH3+q8M9WQu2v32XT1S9NbSOqa31s06I:EyDyZqHWS+XT1+N0y6

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

disa

C2

185.161.248.90:4125

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\62bc10ee439a7705fdfea29c5ac64956ae46b2ee62f8a79ca944b3cff963fbf9.exe
    "C:\Users\Admin\AppData\Local\Temp\62bc10ee439a7705fdfea29c5ac64956ae46b2ee62f8a79ca944b3cff963fbf9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4124
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un700899.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un700899.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3548
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un889176.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un889176.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2348
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr383196.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr383196.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5108
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu750361.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu750361.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4552
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:208
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk077440.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk077440.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2104
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si760077.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si760077.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      PID:3644
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 632
        3⤵
        • Program crash
        PID:4232
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 708
        3⤵
        • Program crash
        PID:4292
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 848
        3⤵
        • Program crash
        PID:4272
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 836
        3⤵
        • Program crash
        PID:2616
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 896
        3⤵
        • Program crash
        PID:2148
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 884
        3⤵
        • Program crash
        PID:5092
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 1124
        3⤵
        • Program crash
        PID:4920
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 1152
        3⤵
        • Program crash
        PID:4616
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 1196
        3⤵
        • Program crash
        PID:1960

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si760077.exe

    Filesize

    397KB

    MD5

    dadc0d126524e7b28aab58226127e8a6

    SHA1

    a383b6f22bbb8056ad743543ad54ef1707b1493a

    SHA256

    af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8

    SHA512

    dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si760077.exe

    Filesize

    397KB

    MD5

    dadc0d126524e7b28aab58226127e8a6

    SHA1

    a383b6f22bbb8056ad743543ad54ef1707b1493a

    SHA256

    af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8

    SHA512

    dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un700899.exe

    Filesize

    862KB

    MD5

    2e11247c6572135d9213760151a138c9

    SHA1

    0951a5a900ca6e0a8e2cbacf045c351539032ca8

    SHA256

    13c3a6dea6a57bfc86ccfea249f81a32933d7cb975734fd49358a844fa6444ca

    SHA512

    b378d87affb833354c88857376f937a5c4c0aa757f2e8aa4c573dc109a5b00209f170ca773ee53d0ec0b99f6df7f6adaf299cb471d6b0775f1f1ad9137aa9dde

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un700899.exe

    Filesize

    862KB

    MD5

    2e11247c6572135d9213760151a138c9

    SHA1

    0951a5a900ca6e0a8e2cbacf045c351539032ca8

    SHA256

    13c3a6dea6a57bfc86ccfea249f81a32933d7cb975734fd49358a844fa6444ca

    SHA512

    b378d87affb833354c88857376f937a5c4c0aa757f2e8aa4c573dc109a5b00209f170ca773ee53d0ec0b99f6df7f6adaf299cb471d6b0775f1f1ad9137aa9dde

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk077440.exe

    Filesize

    169KB

    MD5

    7823e29f3c79cfe265c5a37eb6bda87e

    SHA1

    fe51c09cf73348cf5d2940deaad680cb2f8ae093

    SHA256

    349438701b6bec74cf3dd7ae3660f603b0098c7b97c917f3493b75485e0c3637

    SHA512

    3011391d6bce7d852dc3362c59b6a07a5d7ab84d9fdb21d2b58548f702f916e89238764f9de3b09974cce94676202e788596313cfd3892c190502a24c51b1184

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk077440.exe

    Filesize

    169KB

    MD5

    7823e29f3c79cfe265c5a37eb6bda87e

    SHA1

    fe51c09cf73348cf5d2940deaad680cb2f8ae093

    SHA256

    349438701b6bec74cf3dd7ae3660f603b0098c7b97c917f3493b75485e0c3637

    SHA512

    3011391d6bce7d852dc3362c59b6a07a5d7ab84d9fdb21d2b58548f702f916e89238764f9de3b09974cce94676202e788596313cfd3892c190502a24c51b1184

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un889176.exe

    Filesize

    708KB

    MD5

    e6f5f2d4a213888de0ab3362f421750c

    SHA1

    459fe3a4a0331aea061a1bd3654aabb73a30df6e

    SHA256

    c92d619ae05e3d8b8eb476fa255338a363197ced4ccebd680a57c9b2d2d53f95

    SHA512

    36fb177125c4e2f2a9d443f57c2fa2c05197f9958f856fb9715fe9f4e07d244c923d7eff0bc43f0df2cc620f8acf9d2c2dcfd689256316979059e664955db537

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un889176.exe

    Filesize

    708KB

    MD5

    e6f5f2d4a213888de0ab3362f421750c

    SHA1

    459fe3a4a0331aea061a1bd3654aabb73a30df6e

    SHA256

    c92d619ae05e3d8b8eb476fa255338a363197ced4ccebd680a57c9b2d2d53f95

    SHA512

    36fb177125c4e2f2a9d443f57c2fa2c05197f9958f856fb9715fe9f4e07d244c923d7eff0bc43f0df2cc620f8acf9d2c2dcfd689256316979059e664955db537

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr383196.exe

    Filesize

    404KB

    MD5

    b0cd31b63a09c3295f4c63aa91fecf52

    SHA1

    296f12f7001ae7e42b453c60a197c6e865500b14

    SHA256

    f24e448d13c8ed903912c45dd192751d96332de05a1f8311b016478d3014e40a

    SHA512

    000b69db941ad7e4fe910fba7f5f61e85aa40e57721cb9f4160ade26ed636755389cabd64ea92174f0d0c94850eafe032ab36b19b43e17a3dec005de36406ea6

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr383196.exe

    Filesize

    404KB

    MD5

    b0cd31b63a09c3295f4c63aa91fecf52

    SHA1

    296f12f7001ae7e42b453c60a197c6e865500b14

    SHA256

    f24e448d13c8ed903912c45dd192751d96332de05a1f8311b016478d3014e40a

    SHA512

    000b69db941ad7e4fe910fba7f5f61e85aa40e57721cb9f4160ade26ed636755389cabd64ea92174f0d0c94850eafe032ab36b19b43e17a3dec005de36406ea6

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu750361.exe

    Filesize

    588KB

    MD5

    6ec4a84c64ee983aa9da26d115d40896

    SHA1

    41fd88338edbabd103b32ecdce52f5f48d0990ba

    SHA256

    7b3b83ffac9a20aef08b551a16111903b684d271c0530e83f68bbceaf5baef94

    SHA512

    afc450f38e096152f1ce83352a46c2435b83134ef3f76141d2e98ae846cb558626f186e3931a4f768ad63a5a6d0db0041776f7f555a0decff19253888bcf2d12

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu750361.exe

    Filesize

    588KB

    MD5

    6ec4a84c64ee983aa9da26d115d40896

    SHA1

    41fd88338edbabd103b32ecdce52f5f48d0990ba

    SHA256

    7b3b83ffac9a20aef08b551a16111903b684d271c0530e83f68bbceaf5baef94

    SHA512

    afc450f38e096152f1ce83352a46c2435b83134ef3f76141d2e98ae846cb558626f186e3931a4f768ad63a5a6d0db0041776f7f555a0decff19253888bcf2d12

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • memory/208-2354-0x0000000004D90000-0x0000000004E06000-memory.dmp

    Filesize

    472KB

  • memory/208-2347-0x0000000005080000-0x0000000005686000-memory.dmp

    Filesize

    6.0MB

  • memory/208-2361-0x0000000004960000-0x0000000004970000-memory.dmp

    Filesize

    64KB

  • memory/208-2353-0x0000000004960000-0x0000000004970000-memory.dmp

    Filesize

    64KB

  • memory/208-2359-0x00000000059E0000-0x0000000005A30000-memory.dmp

    Filesize

    320KB

  • memory/208-2351-0x0000000004AC0000-0x0000000004B0B000-memory.dmp

    Filesize

    300KB

  • memory/208-2340-0x0000000000100000-0x000000000012E000-memory.dmp

    Filesize

    184KB

  • memory/208-2344-0x0000000002180000-0x0000000002186000-memory.dmp

    Filesize

    24KB

  • memory/208-2348-0x0000000004B80000-0x0000000004C8A000-memory.dmp

    Filesize

    1.0MB

  • memory/208-2355-0x0000000004EB0000-0x0000000004F42000-memory.dmp

    Filesize

    584KB

  • memory/2104-2346-0x00000000022C0000-0x00000000022C6000-memory.dmp

    Filesize

    24KB

  • memory/2104-2349-0x0000000004940000-0x0000000004952000-memory.dmp

    Filesize

    72KB

  • memory/2104-2345-0x0000000000140000-0x0000000000170000-memory.dmp

    Filesize

    192KB

  • memory/2104-2357-0x00000000065F0000-0x00000000067B2000-memory.dmp

    Filesize

    1.8MB

  • memory/2104-2358-0x0000000008370000-0x000000000889C000-memory.dmp

    Filesize

    5.2MB

  • memory/2104-2350-0x0000000004AC0000-0x0000000004AFE000-memory.dmp

    Filesize

    248KB

  • memory/2104-2352-0x00000000049B0000-0x00000000049C0000-memory.dmp

    Filesize

    64KB

  • memory/2104-2360-0x00000000049B0000-0x00000000049C0000-memory.dmp

    Filesize

    64KB

  • memory/2104-2356-0x0000000004E50000-0x0000000004EB6000-memory.dmp

    Filesize

    408KB

  • memory/3644-2368-0x0000000000980000-0x00000000009BB000-memory.dmp

    Filesize

    236KB

  • memory/4552-194-0x0000000005420000-0x0000000005480000-memory.dmp

    Filesize

    384KB

  • memory/4552-2333-0x0000000004E60000-0x0000000004E70000-memory.dmp

    Filesize

    64KB

  • memory/4552-184-0x0000000005420000-0x0000000005486000-memory.dmp

    Filesize

    408KB

  • memory/4552-185-0x0000000005420000-0x0000000005480000-memory.dmp

    Filesize

    384KB

  • memory/4552-186-0x0000000005420000-0x0000000005480000-memory.dmp

    Filesize

    384KB

  • memory/4552-188-0x0000000005420000-0x0000000005480000-memory.dmp

    Filesize

    384KB

  • memory/4552-190-0x0000000005420000-0x0000000005480000-memory.dmp

    Filesize

    384KB

  • memory/4552-192-0x0000000005420000-0x0000000005480000-memory.dmp

    Filesize

    384KB

  • memory/4552-183-0x0000000004E70000-0x0000000004ED8000-memory.dmp

    Filesize

    416KB

  • memory/4552-196-0x0000000005420000-0x0000000005480000-memory.dmp

    Filesize

    384KB

  • memory/4552-198-0x0000000005420000-0x0000000005480000-memory.dmp

    Filesize

    384KB

  • memory/4552-200-0x0000000005420000-0x0000000005480000-memory.dmp

    Filesize

    384KB

  • memory/4552-202-0x0000000005420000-0x0000000005480000-memory.dmp

    Filesize

    384KB

  • memory/4552-206-0x0000000005420000-0x0000000005480000-memory.dmp

    Filesize

    384KB

  • memory/4552-204-0x0000000005420000-0x0000000005480000-memory.dmp

    Filesize

    384KB

  • memory/4552-208-0x0000000005420000-0x0000000005480000-memory.dmp

    Filesize

    384KB

  • memory/4552-210-0x0000000005420000-0x0000000005480000-memory.dmp

    Filesize

    384KB

  • memory/4552-212-0x0000000005420000-0x0000000005480000-memory.dmp

    Filesize

    384KB

  • memory/4552-214-0x0000000005420000-0x0000000005480000-memory.dmp

    Filesize

    384KB

  • memory/4552-216-0x0000000005420000-0x0000000005480000-memory.dmp

    Filesize

    384KB

  • memory/4552-218-0x0000000005420000-0x0000000005480000-memory.dmp

    Filesize

    384KB

  • memory/4552-250-0x00000000024F0000-0x000000000254B000-memory.dmp

    Filesize

    364KB

  • memory/4552-251-0x0000000004E60000-0x0000000004E70000-memory.dmp

    Filesize

    64KB

  • memory/4552-253-0x0000000004E60000-0x0000000004E70000-memory.dmp

    Filesize

    64KB

  • memory/4552-255-0x0000000004E60000-0x0000000004E70000-memory.dmp

    Filesize

    64KB

  • memory/4552-2331-0x0000000005630000-0x0000000005662000-memory.dmp

    Filesize

    200KB

  • memory/5108-176-0x00000000024E0000-0x00000000024F0000-memory.dmp

    Filesize

    64KB

  • memory/5108-156-0x0000000005380000-0x0000000005392000-memory.dmp

    Filesize

    72KB

  • memory/5108-175-0x00000000024E0000-0x00000000024F0000-memory.dmp

    Filesize

    64KB

  • memory/5108-174-0x00000000024E0000-0x00000000024F0000-memory.dmp

    Filesize

    64KB

  • memory/5108-173-0x0000000000400000-0x000000000080A000-memory.dmp

    Filesize

    4.0MB

  • memory/5108-172-0x0000000005380000-0x0000000005392000-memory.dmp

    Filesize

    72KB

  • memory/5108-170-0x0000000005380000-0x0000000005392000-memory.dmp

    Filesize

    72KB

  • memory/5108-168-0x0000000005380000-0x0000000005392000-memory.dmp

    Filesize

    72KB

  • memory/5108-166-0x0000000005380000-0x0000000005392000-memory.dmp

    Filesize

    72KB

  • memory/5108-164-0x0000000005380000-0x0000000005392000-memory.dmp

    Filesize

    72KB

  • memory/5108-162-0x0000000005380000-0x0000000005392000-memory.dmp

    Filesize

    72KB

  • memory/5108-160-0x0000000005380000-0x0000000005392000-memory.dmp

    Filesize

    72KB

  • memory/5108-158-0x0000000005380000-0x0000000005392000-memory.dmp

    Filesize

    72KB

  • memory/5108-178-0x0000000000400000-0x000000000080A000-memory.dmp

    Filesize

    4.0MB

  • memory/5108-154-0x0000000005380000-0x0000000005392000-memory.dmp

    Filesize

    72KB

  • memory/5108-152-0x0000000005380000-0x0000000005392000-memory.dmp

    Filesize

    72KB

  • memory/5108-150-0x0000000005380000-0x0000000005392000-memory.dmp

    Filesize

    72KB

  • memory/5108-148-0x0000000005380000-0x0000000005392000-memory.dmp

    Filesize

    72KB

  • memory/5108-146-0x0000000005380000-0x0000000005392000-memory.dmp

    Filesize

    72KB

  • memory/5108-145-0x0000000005380000-0x0000000005392000-memory.dmp

    Filesize

    72KB

  • memory/5108-142-0x00000000024E0000-0x00000000024F0000-memory.dmp

    Filesize

    64KB

  • memory/5108-143-0x00000000024E0000-0x00000000024F0000-memory.dmp

    Filesize

    64KB

  • memory/5108-144-0x00000000024E0000-0x00000000024F0000-memory.dmp

    Filesize

    64KB

  • memory/5108-141-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/5108-140-0x0000000005380000-0x0000000005398000-memory.dmp

    Filesize

    96KB

  • memory/5108-139-0x0000000004E70000-0x000000000536E000-memory.dmp

    Filesize

    5.0MB

  • memory/5108-138-0x00000000024B0000-0x00000000024CA000-memory.dmp

    Filesize

    104KB