Analysis

  • max time kernel
    143s
  • max time network
    110s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14/04/2023, 07:58

General

  • Target

    8639290f882a6c30552c7d9b49c19dee6fb1c43b06957c7ea363ce01b99aac6e.exe

  • Size

    1.0MB

  • MD5

    0e524cffed5aa40e4d1b0f42c849090a

  • SHA1

    46b22818621ea3e4966f2927289536221c31f9fa

  • SHA256

    8639290f882a6c30552c7d9b49c19dee6fb1c43b06957c7ea363ce01b99aac6e

  • SHA512

    bc1742e07cea981f3e6dd0ffcb372a8a41cf400b1255cf19500cb3cebc239db62f8295254f37bdbffb368536b001e0f6ca7df22077d5632b59ea587d977fda41

  • SSDEEP

    24576:gyhXn8r6izByU1Lo1g9SNnEnyaoJjHzhWio+j/:nhMr6idl1Lo1UgnERopHAG

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

disa

C2

185.161.248.90:4125

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8639290f882a6c30552c7d9b49c19dee6fb1c43b06957c7ea363ce01b99aac6e.exe
    "C:\Users\Admin\AppData\Local\Temp\8639290f882a6c30552c7d9b49c19dee6fb1c43b06957c7ea363ce01b99aac6e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziXB9147.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziXB9147.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3364
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziDS8926.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziDS8926.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4236
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it853256.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it853256.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4112
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr734419.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr734419.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1448
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4320
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp967896.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp967896.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:692
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr797164.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr797164.exe
      2⤵
      • Executes dropped EXE
      PID:4240
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 636
        3⤵
        • Program crash
        PID:3908
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 708
        3⤵
        • Program crash
        PID:4808
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 808
        3⤵
        • Program crash
        PID:1888
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 856
        3⤵
        • Program crash
        PID:2608
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 888
        3⤵
        • Program crash
        PID:2980
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 864
        3⤵
        • Program crash
        PID:4324
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 1128
        3⤵
        • Program crash
        PID:3724
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 1180
        3⤵
        • Program crash
        PID:4708
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4240 -s 1176
        3⤵
        • Program crash
        PID:3524

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr797164.exe

    Filesize

    397KB

    MD5

    dadc0d126524e7b28aab58226127e8a6

    SHA1

    a383b6f22bbb8056ad743543ad54ef1707b1493a

    SHA256

    af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8

    SHA512

    dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr797164.exe

    Filesize

    397KB

    MD5

    dadc0d126524e7b28aab58226127e8a6

    SHA1

    a383b6f22bbb8056ad743543ad54ef1707b1493a

    SHA256

    af557e2b8545e0ae5ffb362c04a48e338b99c5e0d6227a35054581fe2075f5d8

    SHA512

    dbafe7ad76989eb410064ac380ee2fb8494421cbd0e780663cab9eaed3f758325ce224dfd9bf16561081705c41bf903fd3d84db56148d6a5451c5a850ca59117

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziXB9147.exe

    Filesize

    723KB

    MD5

    71224c607857ff393d745db3634f9ec1

    SHA1

    d558dba0201cc967c62f943f95d2bd452b65f0f2

    SHA256

    700cd1719f70c25a0d705a5ef893949a9969dc0d0972690c750bbac8f3f6783d

    SHA512

    e1c3e8344f946c7b373605152ca7b2fcaa51054c08a8c47cd3876d49d6d15108d92abd48e1a9dde7e2bd31f8e4cc8f68dc0091d6afea4428f3a8192043f169d7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziXB9147.exe

    Filesize

    723KB

    MD5

    71224c607857ff393d745db3634f9ec1

    SHA1

    d558dba0201cc967c62f943f95d2bd452b65f0f2

    SHA256

    700cd1719f70c25a0d705a5ef893949a9969dc0d0972690c750bbac8f3f6783d

    SHA512

    e1c3e8344f946c7b373605152ca7b2fcaa51054c08a8c47cd3876d49d6d15108d92abd48e1a9dde7e2bd31f8e4cc8f68dc0091d6afea4428f3a8192043f169d7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp967896.exe

    Filesize

    169KB

    MD5

    cdfa8198f96d9af4bd07139ec5be8886

    SHA1

    57be36d1d6b5bc97529e679a81e22c29c2897502

    SHA256

    2774311c0fc993f8db0cd1c8c441800108366d0174dc0e2fd44714bd6eaa278d

    SHA512

    d2f8d227385c7c4f15b793e3f988f0bf1101ca03255f159b885f6ee83f3088891a77938eb2ff9f5809321c90a239b7990e8c94214a6467a7ee1c57daf1a5e17d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp967896.exe

    Filesize

    169KB

    MD5

    cdfa8198f96d9af4bd07139ec5be8886

    SHA1

    57be36d1d6b5bc97529e679a81e22c29c2897502

    SHA256

    2774311c0fc993f8db0cd1c8c441800108366d0174dc0e2fd44714bd6eaa278d

    SHA512

    d2f8d227385c7c4f15b793e3f988f0bf1101ca03255f159b885f6ee83f3088891a77938eb2ff9f5809321c90a239b7990e8c94214a6467a7ee1c57daf1a5e17d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziDS8926.exe

    Filesize

    569KB

    MD5

    148c2e016992d315f4f1e872e1a8a981

    SHA1

    d3f70cee03f0def44ba5525e8738f41ee2d7600f

    SHA256

    f28ecbdc9731a5e251f5c9d147c187375f766c7d7839a8cdb1a7e8da5dd86af7

    SHA512

    b4d0051640f700ed32b55ed30bc6f109d7e3ec49780e87a26493e46434c197ec1e6a0df0c7fe67baf17c5e07de234fbbf8b3471d7d9d370b6477a0bce6c1430f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziDS8926.exe

    Filesize

    569KB

    MD5

    148c2e016992d315f4f1e872e1a8a981

    SHA1

    d3f70cee03f0def44ba5525e8738f41ee2d7600f

    SHA256

    f28ecbdc9731a5e251f5c9d147c187375f766c7d7839a8cdb1a7e8da5dd86af7

    SHA512

    b4d0051640f700ed32b55ed30bc6f109d7e3ec49780e87a26493e46434c197ec1e6a0df0c7fe67baf17c5e07de234fbbf8b3471d7d9d370b6477a0bce6c1430f

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it853256.exe

    Filesize

    11KB

    MD5

    d856e2a54c40acf61645d4fc57858e06

    SHA1

    4adda083305872bca81e5bcbe8b919870021ebf7

    SHA256

    b037083ba5bd964e0da761a64efa0793fa1141cc3213a0dddeb2d0ba0fc9f13b

    SHA512

    78d7c7912a9c551f6177a93704f29671bb84f5dee90705313881236dbff948a297f780c9d4fde102e91f28fc3dbe4d1b9f2f6a634d00e2319da17eea1d4c6caf

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it853256.exe

    Filesize

    11KB

    MD5

    d856e2a54c40acf61645d4fc57858e06

    SHA1

    4adda083305872bca81e5bcbe8b919870021ebf7

    SHA256

    b037083ba5bd964e0da761a64efa0793fa1141cc3213a0dddeb2d0ba0fc9f13b

    SHA512

    78d7c7912a9c551f6177a93704f29671bb84f5dee90705313881236dbff948a297f780c9d4fde102e91f28fc3dbe4d1b9f2f6a634d00e2319da17eea1d4c6caf

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr734419.exe

    Filesize

    588KB

    MD5

    faa256b161e2ed2283ddcacfdd976964

    SHA1

    0a61e9651c54db13004bb4385a586944e9dce06e

    SHA256

    1c76e1bc080dc1b1e63d9006ff7ca254fce0c45f63581b6fab46d44d4274e844

    SHA512

    da1e20bc14cc603687123d39f7a2465eb38595390c7d8cbf82991cce9b9d9c233982a8b2b259967a51f06aa80f11bdc488ab7288d127620b9ca3a5f0e0917c5b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr734419.exe

    Filesize

    588KB

    MD5

    faa256b161e2ed2283ddcacfdd976964

    SHA1

    0a61e9651c54db13004bb4385a586944e9dce06e

    SHA256

    1c76e1bc080dc1b1e63d9006ff7ca254fce0c45f63581b6fab46d44d4274e844

    SHA512

    da1e20bc14cc603687123d39f7a2465eb38595390c7d8cbf82991cce9b9d9c233982a8b2b259967a51f06aa80f11bdc488ab7288d127620b9ca3a5f0e0917c5b

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    03728fed675bcde5256342183b1d6f27

    SHA1

    d13eace7d3d92f93756504b274777cc269b222a2

    SHA256

    f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0

    SHA512

    6e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1

  • memory/692-2329-0x000000000B4A0000-0x000000000B4F0000-memory.dmp

    Filesize

    320KB

  • memory/692-2318-0x0000000004990000-0x00000000049A0000-memory.dmp

    Filesize

    64KB

  • memory/692-2315-0x000000000A430000-0x000000000AA36000-memory.dmp

    Filesize

    6.0MB

  • memory/692-2314-0x00000000007D0000-0x00000000007D6000-memory.dmp

    Filesize

    24KB

  • memory/692-2313-0x00000000000E0000-0x0000000000110000-memory.dmp

    Filesize

    192KB

  • memory/692-2317-0x0000000009E20000-0x0000000009E32000-memory.dmp

    Filesize

    72KB

  • memory/692-2322-0x000000000A190000-0x000000000A206000-memory.dmp

    Filesize

    472KB

  • memory/692-2326-0x000000000BE50000-0x000000000C37C000-memory.dmp

    Filesize

    5.2MB

  • memory/692-2327-0x0000000004990000-0x00000000049A0000-memory.dmp

    Filesize

    64KB

  • memory/1448-160-0x00000000028D0000-0x0000000002930000-memory.dmp

    Filesize

    384KB

  • memory/1448-2300-0x0000000002770000-0x0000000002780000-memory.dmp

    Filesize

    64KB

  • memory/1448-172-0x00000000028D0000-0x0000000002930000-memory.dmp

    Filesize

    384KB

  • memory/1448-174-0x00000000028D0000-0x0000000002930000-memory.dmp

    Filesize

    384KB

  • memory/1448-176-0x00000000028D0000-0x0000000002930000-memory.dmp

    Filesize

    384KB

  • memory/1448-178-0x00000000028D0000-0x0000000002930000-memory.dmp

    Filesize

    384KB

  • memory/1448-180-0x00000000028D0000-0x0000000002930000-memory.dmp

    Filesize

    384KB

  • memory/1448-182-0x00000000028D0000-0x0000000002930000-memory.dmp

    Filesize

    384KB

  • memory/1448-184-0x00000000028D0000-0x0000000002930000-memory.dmp

    Filesize

    384KB

  • memory/1448-186-0x00000000028D0000-0x0000000002930000-memory.dmp

    Filesize

    384KB

  • memory/1448-188-0x00000000028D0000-0x0000000002930000-memory.dmp

    Filesize

    384KB

  • memory/1448-190-0x00000000028D0000-0x0000000002930000-memory.dmp

    Filesize

    384KB

  • memory/1448-192-0x00000000028D0000-0x0000000002930000-memory.dmp

    Filesize

    384KB

  • memory/1448-194-0x00000000028D0000-0x0000000002930000-memory.dmp

    Filesize

    384KB

  • memory/1448-196-0x00000000028D0000-0x0000000002930000-memory.dmp

    Filesize

    384KB

  • memory/1448-198-0x00000000028D0000-0x0000000002930000-memory.dmp

    Filesize

    384KB

  • memory/1448-200-0x00000000028D0000-0x0000000002930000-memory.dmp

    Filesize

    384KB

  • memory/1448-202-0x00000000028D0000-0x0000000002930000-memory.dmp

    Filesize

    384KB

  • memory/1448-204-0x00000000028D0000-0x0000000002930000-memory.dmp

    Filesize

    384KB

  • memory/1448-206-0x00000000028D0000-0x0000000002930000-memory.dmp

    Filesize

    384KB

  • memory/1448-208-0x00000000028D0000-0x0000000002930000-memory.dmp

    Filesize

    384KB

  • memory/1448-210-0x00000000028D0000-0x0000000002930000-memory.dmp

    Filesize

    384KB

  • memory/1448-212-0x00000000028D0000-0x0000000002930000-memory.dmp

    Filesize

    384KB

  • memory/1448-214-0x00000000028D0000-0x0000000002930000-memory.dmp

    Filesize

    384KB

  • memory/1448-216-0x00000000028D0000-0x0000000002930000-memory.dmp

    Filesize

    384KB

  • memory/1448-218-0x00000000028D0000-0x0000000002930000-memory.dmp

    Filesize

    384KB

  • memory/1448-2298-0x0000000005630000-0x0000000005662000-memory.dmp

    Filesize

    200KB

  • memory/1448-170-0x00000000028D0000-0x0000000002930000-memory.dmp

    Filesize

    384KB

  • memory/1448-2301-0x0000000002770000-0x0000000002780000-memory.dmp

    Filesize

    64KB

  • memory/1448-168-0x00000000028D0000-0x0000000002930000-memory.dmp

    Filesize

    384KB

  • memory/1448-166-0x00000000028D0000-0x0000000002930000-memory.dmp

    Filesize

    384KB

  • memory/1448-148-0x0000000002370000-0x00000000023CB000-memory.dmp

    Filesize

    364KB

  • memory/1448-164-0x00000000028D0000-0x0000000002930000-memory.dmp

    Filesize

    384KB

  • memory/1448-162-0x00000000028D0000-0x0000000002930000-memory.dmp

    Filesize

    384KB

  • memory/1448-158-0x00000000028D0000-0x0000000002930000-memory.dmp

    Filesize

    384KB

  • memory/1448-149-0x0000000004F20000-0x0000000004F88000-memory.dmp

    Filesize

    416KB

  • memory/1448-156-0x00000000028D0000-0x0000000002930000-memory.dmp

    Filesize

    384KB

  • memory/1448-155-0x00000000028D0000-0x0000000002930000-memory.dmp

    Filesize

    384KB

  • memory/1448-150-0x0000000002770000-0x0000000002780000-memory.dmp

    Filesize

    64KB

  • memory/1448-154-0x0000000002770000-0x0000000002780000-memory.dmp

    Filesize

    64KB

  • memory/1448-151-0x0000000004F90000-0x000000000548E000-memory.dmp

    Filesize

    5.0MB

  • memory/1448-153-0x0000000002770000-0x0000000002780000-memory.dmp

    Filesize

    64KB

  • memory/1448-152-0x00000000028D0000-0x0000000002936000-memory.dmp

    Filesize

    408KB

  • memory/4112-142-0x0000000000110000-0x000000000011A000-memory.dmp

    Filesize

    40KB

  • memory/4240-2336-0x0000000002470000-0x00000000024AB000-memory.dmp

    Filesize

    236KB

  • memory/4320-2321-0x0000000005660000-0x00000000056AB000-memory.dmp

    Filesize

    300KB

  • memory/4320-2320-0x0000000005620000-0x000000000565E000-memory.dmp

    Filesize

    248KB

  • memory/4320-2323-0x0000000005A50000-0x0000000005AE2000-memory.dmp

    Filesize

    584KB

  • memory/4320-2324-0x0000000005AF0000-0x0000000005B56000-memory.dmp

    Filesize

    408KB

  • memory/4320-2325-0x00000000069A0000-0x0000000006B62000-memory.dmp

    Filesize

    1.8MB

  • memory/4320-2319-0x0000000005590000-0x00000000055A0000-memory.dmp

    Filesize

    64KB

  • memory/4320-2316-0x00000000056B0000-0x00000000057BA000-memory.dmp

    Filesize

    1.0MB

  • memory/4320-2328-0x0000000005590000-0x00000000055A0000-memory.dmp

    Filesize

    64KB

  • memory/4320-2312-0x0000000005550000-0x0000000005556000-memory.dmp

    Filesize

    24KB

  • memory/4320-2308-0x0000000000CA0000-0x0000000000CCE000-memory.dmp

    Filesize

    184KB