Analysis

  • max time kernel
    147s
  • max time network
    104s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14-04-2023 12:13

General

  • Target

    186ef53c4fc082d533e9c1884355ad69cddb8d7ce31b8455ad9bd1590d9ed308.exe

  • Size

    1.2MB

  • MD5

    388eb615faa9f8996debabea08569f47

  • SHA1

    5fda02737f3162524d8b3033c9c783f4ecc3940d

  • SHA256

    186ef53c4fc082d533e9c1884355ad69cddb8d7ce31b8455ad9bd1590d9ed308

  • SHA512

    976d783ba27d5a7f642bcad841aa37cecc2c4c20b553e3c48bdd3e36e94c2e586e05899e820f6a7d2f0cbd63ae3264c177df34e34e33b054002da6750e633463

  • SSDEEP

    24576:PyPaQxPq9+lvDdMCRz6dXVuFH58r5Re5s4J9y3Nm6hmx/xDlKoY1:aPaWS9+lvKxd0FC5RX4Jwg6e59

Malware Config

Extracted

Family

redline

Botnet

soft

C2

77.91.124.146:4121

Attributes
  • auth_value

    e65663e455bca3c5699650b66e76ceaa

Extracted

Family

redline

Botnet

dirx

C2

77.91.124.146:4121

Attributes
  • auth_value

    522d988f763be056e53e089f74d464cc

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\186ef53c4fc082d533e9c1884355ad69cddb8d7ce31b8455ad9bd1590d9ed308.exe
    "C:\Users\Admin\AppData\Local\Temp\186ef53c4fc082d533e9c1884355ad69cddb8d7ce31b8455ad9bd1590d9ed308.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un277013.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un277013.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2388
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un387369.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un387369.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2516
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr040117.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr040117.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3060
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu619615.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu619615.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3800
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3388
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk506817.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk506817.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1640
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si655840.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si655840.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      PID:3040
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 632
        3⤵
        • Program crash
        PID:5072
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 708
        3⤵
        • Program crash
        PID:3964
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 844
        3⤵
        • Program crash
        PID:2864
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 824
        3⤵
        • Program crash
        PID:3788
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 920
        3⤵
        • Program crash
        PID:3576
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 920
        3⤵
        • Program crash
        PID:3796
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 1124
        3⤵
        • Program crash
        PID:3652
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 1156
        3⤵
        • Program crash
        PID:1568
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 1108
        3⤵
        • Program crash
        PID:1380

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si655840.exe

    Filesize

    395KB

    MD5

    cc057c9e33359007ae6c7eb8e6510745

    SHA1

    31d57cf599d00235ec4a14453e68f1993253758d

    SHA256

    ac58a29d76075cb470a03a1ca58afa7c0aaf9ddc1b221996fa286fd5b87b5d1f

    SHA512

    5c7e6c915d0738bb27d695ebd7a284ac73ff2d0a4e5cdec34a370eabd98c3b0130ab04af5b9c82a7900712a6b538fdce3b721798635fd9792c8550039dbe1f8a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si655840.exe

    Filesize

    395KB

    MD5

    cc057c9e33359007ae6c7eb8e6510745

    SHA1

    31d57cf599d00235ec4a14453e68f1993253758d

    SHA256

    ac58a29d76075cb470a03a1ca58afa7c0aaf9ddc1b221996fa286fd5b87b5d1f

    SHA512

    5c7e6c915d0738bb27d695ebd7a284ac73ff2d0a4e5cdec34a370eabd98c3b0130ab04af5b9c82a7900712a6b538fdce3b721798635fd9792c8550039dbe1f8a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un277013.exe

    Filesize

    863KB

    MD5

    d4dac5d9ecb78979b6b2613b1be13573

    SHA1

    ecfc5388c388afdff1b2ee38d4ed3272b5f9e3ec

    SHA256

    20f2dcde31023490d2f30bc33e66d6509867e3acf9d85891a57ef836dd6db246

    SHA512

    7a23b0750b3d771bf0200d75535466312af033bd62143b6c14154753ab8aa528b4f0be8a07fb58c3426fea8b7a7ca3967b2da80ad143cce033d7b4dc3aa3cba7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un277013.exe

    Filesize

    863KB

    MD5

    d4dac5d9ecb78979b6b2613b1be13573

    SHA1

    ecfc5388c388afdff1b2ee38d4ed3272b5f9e3ec

    SHA256

    20f2dcde31023490d2f30bc33e66d6509867e3acf9d85891a57ef836dd6db246

    SHA512

    7a23b0750b3d771bf0200d75535466312af033bd62143b6c14154753ab8aa528b4f0be8a07fb58c3426fea8b7a7ca3967b2da80ad143cce033d7b4dc3aa3cba7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk506817.exe

    Filesize

    168KB

    MD5

    6cb9a99fd40ca1b3c7f72a6030589197

    SHA1

    abcb1e268cb03befd3c439fa6753790ecfca6384

    SHA256

    6a7d7e57103188b4138fc3b9396d19613f347699c97e4ac0e469f7f9ba7733c2

    SHA512

    30beef5eefa0d9eda56d6b07643161e1e5460d69e0f82860bf0ea6d7eb99538732e2bb4132235e12e665cd5b04f0ac4753848ebc9e127e4c5f060ec69daca4e4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk506817.exe

    Filesize

    168KB

    MD5

    6cb9a99fd40ca1b3c7f72a6030589197

    SHA1

    abcb1e268cb03befd3c439fa6753790ecfca6384

    SHA256

    6a7d7e57103188b4138fc3b9396d19613f347699c97e4ac0e469f7f9ba7733c2

    SHA512

    30beef5eefa0d9eda56d6b07643161e1e5460d69e0f82860bf0ea6d7eb99538732e2bb4132235e12e665cd5b04f0ac4753848ebc9e127e4c5f060ec69daca4e4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un387369.exe

    Filesize

    709KB

    MD5

    04f54c2d858987dc42de7a0f121c9380

    SHA1

    c5c215ba71cfde5a1f61d20212414bc9aca7c8dc

    SHA256

    83fc28ab0da7d9544e3898383a62ebc2c32db3482975b6a407465a777fae1274

    SHA512

    6eb22ee76299ffb7f4b8d08d503b76821967824778e196d472751c9d3025b592db0279a680146646b1e5df8d99c4cc805918010823e0c8b7d4c4a9f4fe9ec224

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un387369.exe

    Filesize

    709KB

    MD5

    04f54c2d858987dc42de7a0f121c9380

    SHA1

    c5c215ba71cfde5a1f61d20212414bc9aca7c8dc

    SHA256

    83fc28ab0da7d9544e3898383a62ebc2c32db3482975b6a407465a777fae1274

    SHA512

    6eb22ee76299ffb7f4b8d08d503b76821967824778e196d472751c9d3025b592db0279a680146646b1e5df8d99c4cc805918010823e0c8b7d4c4a9f4fe9ec224

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr040117.exe

    Filesize

    403KB

    MD5

    31b58d027a8dae892eff3c87246dbf67

    SHA1

    779cc5f9cfbf1e48bd0908a225af38510c858288

    SHA256

    a8daa5f5c0d05f535a337765598d178699324422440dc4010b2a73a931d6e4d7

    SHA512

    258ad0317fa8a22f52fc9e03a957a30b81490ab948bb11098134a6ad9e7a3df9e4e8d5b87d86505dbdb69e06ae4ec7ff637c8e7f2426cdfd144accc6ee88a700

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr040117.exe

    Filesize

    403KB

    MD5

    31b58d027a8dae892eff3c87246dbf67

    SHA1

    779cc5f9cfbf1e48bd0908a225af38510c858288

    SHA256

    a8daa5f5c0d05f535a337765598d178699324422440dc4010b2a73a931d6e4d7

    SHA512

    258ad0317fa8a22f52fc9e03a957a30b81490ab948bb11098134a6ad9e7a3df9e4e8d5b87d86505dbdb69e06ae4ec7ff637c8e7f2426cdfd144accc6ee88a700

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu619615.exe

    Filesize

    587KB

    MD5

    38ba7dd3cb28d71b39402007661b87cf

    SHA1

    63154496f2ae39c53ce6e8edecbe5c49abd94f89

    SHA256

    78accca1ee69eca665fb5469cfb5c1cca098bc4a7c7b8dde5908306608299baa

    SHA512

    cf4dfb501d279c99c0f86fdf8ee56fc26f61cd0b2120de50d793c41d0d65f5e56a308f5a13f218afc89c1eb9a92c7112daa13cb54ee5a7a12172136d315147a9

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu619615.exe

    Filesize

    587KB

    MD5

    38ba7dd3cb28d71b39402007661b87cf

    SHA1

    63154496f2ae39c53ce6e8edecbe5c49abd94f89

    SHA256

    78accca1ee69eca665fb5469cfb5c1cca098bc4a7c7b8dde5908306608299baa

    SHA512

    cf4dfb501d279c99c0f86fdf8ee56fc26f61cd0b2120de50d793c41d0d65f5e56a308f5a13f218afc89c1eb9a92c7112daa13cb54ee5a7a12172136d315147a9

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    1eed54a048b387471d40ab1094221ef1

    SHA1

    5004d555d2e74a72b07a7fe1e512cb8f8ee5ba98

    SHA256

    c97ba12c976ee628111a13331099e868c64bff78b392fe156662235ce9c4dc19

    SHA512

    e781886c99944ef136036514f5773eb3566cb0b4f331bd013492ee2cd36fbb6decc1a88d25f21a86ad9205dbac5c53cacd145c9b10b638e3ac04742795c43c13

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    1eed54a048b387471d40ab1094221ef1

    SHA1

    5004d555d2e74a72b07a7fe1e512cb8f8ee5ba98

    SHA256

    c97ba12c976ee628111a13331099e868c64bff78b392fe156662235ce9c4dc19

    SHA512

    e781886c99944ef136036514f5773eb3566cb0b4f331bd013492ee2cd36fbb6decc1a88d25f21a86ad9205dbac5c53cacd145c9b10b638e3ac04742795c43c13

  • memory/1640-2335-0x000000000B000000-0x000000000B606000-memory.dmp

    Filesize

    6.0MB

  • memory/1640-2340-0x000000000AA30000-0x000000000AA6E000-memory.dmp

    Filesize

    248KB

  • memory/1640-2338-0x0000000005560000-0x0000000005570000-memory.dmp

    Filesize

    64KB

  • memory/1640-2337-0x0000000005530000-0x0000000005542000-memory.dmp

    Filesize

    72KB

  • memory/1640-2341-0x000000000AA70000-0x000000000AABB000-memory.dmp

    Filesize

    300KB

  • memory/1640-2334-0x0000000001320000-0x0000000001326000-memory.dmp

    Filesize

    24KB

  • memory/1640-2333-0x0000000000C90000-0x0000000000CC0000-memory.dmp

    Filesize

    192KB

  • memory/1640-2342-0x000000000AD40000-0x000000000ADB6000-memory.dmp

    Filesize

    472KB

  • memory/1640-2344-0x000000000AF00000-0x000000000AF66000-memory.dmp

    Filesize

    408KB

  • memory/1640-2345-0x000000000C1E0000-0x000000000C3A2000-memory.dmp

    Filesize

    1.8MB

  • memory/1640-2346-0x000000000C8E0000-0x000000000CE0C000-memory.dmp

    Filesize

    5.2MB

  • memory/1640-2347-0x0000000005560000-0x0000000005570000-memory.dmp

    Filesize

    64KB

  • memory/3040-2356-0x0000000002410000-0x000000000244B000-memory.dmp

    Filesize

    236KB

  • memory/3060-173-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/3060-147-0x0000000002850000-0x0000000002868000-memory.dmp

    Filesize

    96KB

  • memory/3060-180-0x0000000000400000-0x0000000000809000-memory.dmp

    Filesize

    4.0MB

  • memory/3060-177-0x0000000005030000-0x0000000005040000-memory.dmp

    Filesize

    64KB

  • memory/3060-176-0x0000000005030000-0x0000000005040000-memory.dmp

    Filesize

    64KB

  • memory/3060-143-0x0000000002520000-0x000000000253A000-memory.dmp

    Filesize

    104KB

  • memory/3060-144-0x0000000000860000-0x000000000088D000-memory.dmp

    Filesize

    180KB

  • memory/3060-145-0x0000000005030000-0x0000000005040000-memory.dmp

    Filesize

    64KB

  • memory/3060-153-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/3060-155-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/3060-146-0x0000000005040000-0x000000000553E000-memory.dmp

    Filesize

    5.0MB

  • memory/3060-157-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/3060-149-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/3060-151-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/3060-175-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/3060-178-0x0000000000400000-0x0000000000809000-memory.dmp

    Filesize

    4.0MB

  • memory/3060-148-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/3060-159-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/3060-163-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/3060-169-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/3060-167-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/3060-165-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/3060-171-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/3060-161-0x0000000002850000-0x0000000002862000-memory.dmp

    Filesize

    72KB

  • memory/3388-2349-0x0000000007350000-0x00000000073A0000-memory.dmp

    Filesize

    320KB

  • memory/3388-2331-0x0000000000E60000-0x0000000000E66000-memory.dmp

    Filesize

    24KB

  • memory/3388-2336-0x000000000A430000-0x000000000A53A000-memory.dmp

    Filesize

    1.0MB

  • memory/3388-2339-0x0000000004E10000-0x0000000004E20000-memory.dmp

    Filesize

    64KB

  • memory/3388-2343-0x000000000A7F0000-0x000000000A882000-memory.dmp

    Filesize

    584KB

  • memory/3388-2327-0x0000000000620000-0x000000000064E000-memory.dmp

    Filesize

    184KB

  • memory/3388-2348-0x0000000004E10000-0x0000000004E20000-memory.dmp

    Filesize

    64KB

  • memory/3800-204-0x0000000002C10000-0x0000000002C70000-memory.dmp

    Filesize

    384KB

  • memory/3800-2322-0x0000000002C00000-0x0000000002C10000-memory.dmp

    Filesize

    64KB

  • memory/3800-2319-0x0000000005640000-0x0000000005672000-memory.dmp

    Filesize

    200KB

  • memory/3800-224-0x0000000002C10000-0x0000000002C70000-memory.dmp

    Filesize

    384KB

  • memory/3800-222-0x0000000002C10000-0x0000000002C70000-memory.dmp

    Filesize

    384KB

  • memory/3800-220-0x0000000002C10000-0x0000000002C70000-memory.dmp

    Filesize

    384KB

  • memory/3800-218-0x0000000002C10000-0x0000000002C70000-memory.dmp

    Filesize

    384KB

  • memory/3800-216-0x0000000002C10000-0x0000000002C70000-memory.dmp

    Filesize

    384KB

  • memory/3800-214-0x0000000002C10000-0x0000000002C70000-memory.dmp

    Filesize

    384KB

  • memory/3800-212-0x0000000002C10000-0x0000000002C70000-memory.dmp

    Filesize

    384KB

  • memory/3800-200-0x0000000002C10000-0x0000000002C70000-memory.dmp

    Filesize

    384KB

  • memory/3800-201-0x0000000002C00000-0x0000000002C10000-memory.dmp

    Filesize

    64KB

  • memory/3800-210-0x0000000002C10000-0x0000000002C70000-memory.dmp

    Filesize

    384KB

  • memory/3800-208-0x0000000002C10000-0x0000000002C70000-memory.dmp

    Filesize

    384KB

  • memory/3800-203-0x0000000002C00000-0x0000000002C10000-memory.dmp

    Filesize

    64KB

  • memory/3800-206-0x0000000002C10000-0x0000000002C70000-memory.dmp

    Filesize

    384KB

  • memory/3800-197-0x0000000002C10000-0x0000000002C70000-memory.dmp

    Filesize

    384KB

  • memory/3800-198-0x0000000002C00000-0x0000000002C10000-memory.dmp

    Filesize

    64KB

  • memory/3800-196-0x0000000000C10000-0x0000000000C6B000-memory.dmp

    Filesize

    364KB

  • memory/3800-194-0x0000000002C10000-0x0000000002C70000-memory.dmp

    Filesize

    384KB

  • memory/3800-192-0x0000000002C10000-0x0000000002C70000-memory.dmp

    Filesize

    384KB

  • memory/3800-190-0x0000000002C10000-0x0000000002C70000-memory.dmp

    Filesize

    384KB

  • memory/3800-188-0x0000000002C10000-0x0000000002C70000-memory.dmp

    Filesize

    384KB

  • memory/3800-187-0x0000000002C10000-0x0000000002C70000-memory.dmp

    Filesize

    384KB

  • memory/3800-186-0x0000000002C10000-0x0000000002C76000-memory.dmp

    Filesize

    408KB

  • memory/3800-185-0x0000000002B90000-0x0000000002BF8000-memory.dmp

    Filesize

    416KB