Analysis

  • max time kernel
    146s
  • max time network
    103s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15/04/2023, 06:15

General

  • Target

    1842111e754d7a343cd21fd8bbaf66cd62274351dc8a1e9826b1c783caf4609b.exe

  • Size

    1.2MB

  • MD5

    5e75b754fa596b39d8621903d54d6695

  • SHA1

    f2cc60b90d2be6955000fbd9bb686a560451d9e9

  • SHA256

    1842111e754d7a343cd21fd8bbaf66cd62274351dc8a1e9826b1c783caf4609b

  • SHA512

    52c5e8538f5542c0cdd2146bab19d84147e32a0bc74199c624ad4c50871842191e23491a6b1b1553a7b3355112104da5cd7dc76ef48f04679e4886af4cfe38d7

  • SSDEEP

    24576:SypzarApbeJxXeNpS+UJ5XnKrLfq4UQfzasWP3186qTly:5pWrAQxXWpS5XXuq4UZPl

Malware Config

Extracted

Family

redline

Botnet

soft

C2

77.91.124.146:4121

Attributes
  • auth_value

    e65663e455bca3c5699650b66e76ceaa

Extracted

Family

redline

Botnet

dirx

C2

77.91.124.146:4121

Attributes
  • auth_value

    522d988f763be056e53e089f74d464cc

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1842111e754d7a343cd21fd8bbaf66cd62274351dc8a1e9826b1c783caf4609b.exe
    "C:\Users\Admin\AppData\Local\Temp\1842111e754d7a343cd21fd8bbaf66cd62274351dc8a1e9826b1c783caf4609b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un011939.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un011939.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2444
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un852353.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un852353.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2524
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr763185.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr763185.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2124
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu944711.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu944711.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:5004
          • C:\Windows\Temp\1.exe
            "C:\Windows\Temp\1.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2144
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk866005.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk866005.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1260
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si914360.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si914360.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      PID:4592
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 632
        3⤵
        • Program crash
        PID:4872
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 708
        3⤵
        • Program crash
        PID:4848
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 848
        3⤵
        • Program crash
        PID:4896
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 860
        3⤵
        • Program crash
        PID:4168
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 884
        3⤵
        • Program crash
        PID:4792
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 904
        3⤵
        • Program crash
        PID:5068
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 1128
        3⤵
        • Program crash
        PID:3688
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 1188
        3⤵
        • Program crash
        PID:3624
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4592 -s 1208
        3⤵
        • Program crash
        PID:5084

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si914360.exe

    Filesize

    395KB

    MD5

    d0f6446729649ac0ed8a001b2935db90

    SHA1

    acb4e10b42c73a85f16fc337305e40d3b1622b28

    SHA256

    74a7e002e7bc3aa7cf8bdf70189ee41215d85faa43070c837129dcb0e0d55ca9

    SHA512

    8e3de4ad2164f8eb3cc00007f7ff54f9fd8ff8ef2a42ba67b40eb0347747d11ddadb51e7530d637bc107c9513b1df65e895ef7eaf6622d09554b27d6c05d5c0e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si914360.exe

    Filesize

    395KB

    MD5

    d0f6446729649ac0ed8a001b2935db90

    SHA1

    acb4e10b42c73a85f16fc337305e40d3b1622b28

    SHA256

    74a7e002e7bc3aa7cf8bdf70189ee41215d85faa43070c837129dcb0e0d55ca9

    SHA512

    8e3de4ad2164f8eb3cc00007f7ff54f9fd8ff8ef2a42ba67b40eb0347747d11ddadb51e7530d637bc107c9513b1df65e895ef7eaf6622d09554b27d6c05d5c0e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un011939.exe

    Filesize

    863KB

    MD5

    b1647732ed0b3bc4f930f59d536145a7

    SHA1

    6f2562bacd32c558f426378635c719224611488b

    SHA256

    841d72fcde556cd2ee04100a1d9cfed654f289c03201f6404918993813ff76d3

    SHA512

    62d0a769c104bcf5752db7f1e2cfebf6a79576b3a0e8e68a2557c8af78a0cbb04f18bb86bbb40d9037f48213846bdb2112f1b6db848105cddfb2d0933d012a60

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un011939.exe

    Filesize

    863KB

    MD5

    b1647732ed0b3bc4f930f59d536145a7

    SHA1

    6f2562bacd32c558f426378635c719224611488b

    SHA256

    841d72fcde556cd2ee04100a1d9cfed654f289c03201f6404918993813ff76d3

    SHA512

    62d0a769c104bcf5752db7f1e2cfebf6a79576b3a0e8e68a2557c8af78a0cbb04f18bb86bbb40d9037f48213846bdb2112f1b6db848105cddfb2d0933d012a60

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk866005.exe

    Filesize

    169KB

    MD5

    35aafe13d80a56a0672612b02aabd27c

    SHA1

    0f6f84fd12d61e4adbcfee4fb69708d745ae6440

    SHA256

    3f9e04799cc5882bba3235ca4a838f7891241619fb4957a94323d67bd8f7781d

    SHA512

    70de1bdf0b9ce1559805df2115215b47c47fc956de7d78bb6bfcc53394bfccee1ec083f56ac780d379e98ec545ee5c756b1442a3440a62c74134a5eb057346d4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk866005.exe

    Filesize

    169KB

    MD5

    35aafe13d80a56a0672612b02aabd27c

    SHA1

    0f6f84fd12d61e4adbcfee4fb69708d745ae6440

    SHA256

    3f9e04799cc5882bba3235ca4a838f7891241619fb4957a94323d67bd8f7781d

    SHA512

    70de1bdf0b9ce1559805df2115215b47c47fc956de7d78bb6bfcc53394bfccee1ec083f56ac780d379e98ec545ee5c756b1442a3440a62c74134a5eb057346d4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un852353.exe

    Filesize

    709KB

    MD5

    4874e2145d6cfd6b8b576b7d89d6d2e8

    SHA1

    2cd28878d178aa04cfafff0082151768b9dddf46

    SHA256

    5452bca0748a36daf3ceef97314b98efe0fdb821cc0dab6f95001ecd1c9f7445

    SHA512

    357e482dc7299602488473a8d4cfdbfe29968b03beb0ec2a92aff6a87a43f5aac1f0c3721e0769c43e05d7dd686d87a58edddc0485e9b27ac56a2e45954a1cb6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un852353.exe

    Filesize

    709KB

    MD5

    4874e2145d6cfd6b8b576b7d89d6d2e8

    SHA1

    2cd28878d178aa04cfafff0082151768b9dddf46

    SHA256

    5452bca0748a36daf3ceef97314b98efe0fdb821cc0dab6f95001ecd1c9f7445

    SHA512

    357e482dc7299602488473a8d4cfdbfe29968b03beb0ec2a92aff6a87a43f5aac1f0c3721e0769c43e05d7dd686d87a58edddc0485e9b27ac56a2e45954a1cb6

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr763185.exe

    Filesize

    403KB

    MD5

    ef490571377fe1afafe8417528037ab5

    SHA1

    83d441a3521e2591d4a78b3395ecff46f34a96ba

    SHA256

    15d3e1ae66c9cad7ab1360fbf39cc9358f50c8ffcb26aba548dccb3006b76d35

    SHA512

    86fd1cb24b21c63d11c6d892bdf816acb185a51d8f95e5809c064a010a32a9e29da6c8c603f5a7c9d1d3ad2d1811e56a9ca1b24565fc83872833a5090faf83bd

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr763185.exe

    Filesize

    403KB

    MD5

    ef490571377fe1afafe8417528037ab5

    SHA1

    83d441a3521e2591d4a78b3395ecff46f34a96ba

    SHA256

    15d3e1ae66c9cad7ab1360fbf39cc9358f50c8ffcb26aba548dccb3006b76d35

    SHA512

    86fd1cb24b21c63d11c6d892bdf816acb185a51d8f95e5809c064a010a32a9e29da6c8c603f5a7c9d1d3ad2d1811e56a9ca1b24565fc83872833a5090faf83bd

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu944711.exe

    Filesize

    588KB

    MD5

    bef9ab4288dd8424150c6bb5cff0575e

    SHA1

    95a03838b99f14c5297cb722938caf489a3f955d

    SHA256

    4aa5f322422781a2150f372357057b791d1e7c8ca2df77f1b290934162186e65

    SHA512

    52f89b280f056f866d81d2a9aacde9c68b104151459d15b0d6b003ae582ce1672c8f30041b3704cd723c2741f6cfa11d3dab3d7fdc2a772ea2733b4ff68da379

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu944711.exe

    Filesize

    588KB

    MD5

    bef9ab4288dd8424150c6bb5cff0575e

    SHA1

    95a03838b99f14c5297cb722938caf489a3f955d

    SHA256

    4aa5f322422781a2150f372357057b791d1e7c8ca2df77f1b290934162186e65

    SHA512

    52f89b280f056f866d81d2a9aacde9c68b104151459d15b0d6b003ae582ce1672c8f30041b3704cd723c2741f6cfa11d3dab3d7fdc2a772ea2733b4ff68da379

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    1eed54a048b387471d40ab1094221ef1

    SHA1

    5004d555d2e74a72b07a7fe1e512cb8f8ee5ba98

    SHA256

    c97ba12c976ee628111a13331099e868c64bff78b392fe156662235ce9c4dc19

    SHA512

    e781886c99944ef136036514f5773eb3566cb0b4f331bd013492ee2cd36fbb6decc1a88d25f21a86ad9205dbac5c53cacd145c9b10b638e3ac04742795c43c13

  • C:\Windows\Temp\1.exe

    Filesize

    168KB

    MD5

    1eed54a048b387471d40ab1094221ef1

    SHA1

    5004d555d2e74a72b07a7fe1e512cb8f8ee5ba98

    SHA256

    c97ba12c976ee628111a13331099e868c64bff78b392fe156662235ce9c4dc19

    SHA512

    e781886c99944ef136036514f5773eb3566cb0b4f331bd013492ee2cd36fbb6decc1a88d25f21a86ad9205dbac5c53cacd145c9b10b638e3ac04742795c43c13

  • memory/1260-2343-0x000000000BF10000-0x000000000C0D2000-memory.dmp

    Filesize

    1.8MB

  • memory/1260-2333-0x000000000ABC0000-0x000000000B1C6000-memory.dmp

    Filesize

    6.0MB

  • memory/1260-2332-0x00000000029B0000-0x00000000029B6000-memory.dmp

    Filesize

    24KB

  • memory/1260-2331-0x0000000000840000-0x0000000000870000-memory.dmp

    Filesize

    192KB

  • memory/1260-2334-0x000000000A6C0000-0x000000000A7CA000-memory.dmp

    Filesize

    1.0MB

  • memory/1260-2336-0x000000000A5F0000-0x000000000A62E000-memory.dmp

    Filesize

    248KB

  • memory/1260-2339-0x0000000005220000-0x0000000005230000-memory.dmp

    Filesize

    64KB

  • memory/1260-2341-0x000000000AA10000-0x000000000AAA2000-memory.dmp

    Filesize

    584KB

  • memory/1260-2344-0x000000000C610000-0x000000000CB3C000-memory.dmp

    Filesize

    5.2MB

  • memory/1260-2346-0x0000000005220000-0x0000000005230000-memory.dmp

    Filesize

    64KB

  • memory/2124-163-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/2124-151-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/2124-177-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/2124-175-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/2124-178-0x0000000000400000-0x0000000000809000-memory.dmp

    Filesize

    4.0MB

  • memory/2124-179-0x0000000004E90000-0x0000000004EA0000-memory.dmp

    Filesize

    64KB

  • memory/2124-181-0x0000000000400000-0x0000000000809000-memory.dmp

    Filesize

    4.0MB

  • memory/2124-171-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/2124-169-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/2124-167-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/2124-143-0x0000000000AC0000-0x0000000000ADA000-memory.dmp

    Filesize

    104KB

  • memory/2124-144-0x0000000000920000-0x000000000094D000-memory.dmp

    Filesize

    180KB

  • memory/2124-165-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/2124-145-0x0000000004E90000-0x0000000004EA0000-memory.dmp

    Filesize

    64KB

  • memory/2124-161-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/2124-173-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/2124-146-0x0000000004E90000-0x0000000004EA0000-memory.dmp

    Filesize

    64KB

  • memory/2124-147-0x0000000004E90000-0x0000000004EA0000-memory.dmp

    Filesize

    64KB

  • memory/2124-159-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/2124-148-0x0000000004EA0000-0x000000000539E000-memory.dmp

    Filesize

    5.0MB

  • memory/2124-157-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/2124-149-0x00000000028E0000-0x00000000028F8000-memory.dmp

    Filesize

    96KB

  • memory/2124-155-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/2124-153-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/2124-150-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/2144-2327-0x00000000030F0000-0x00000000030F6000-memory.dmp

    Filesize

    24KB

  • memory/2144-2335-0x0000000005890000-0x00000000058A2000-memory.dmp

    Filesize

    72KB

  • memory/2144-2337-0x0000000005A90000-0x0000000005ADB000-memory.dmp

    Filesize

    300KB

  • memory/2144-2338-0x0000000005860000-0x0000000005870000-memory.dmp

    Filesize

    64KB

  • memory/2144-2340-0x0000000005D10000-0x0000000005D86000-memory.dmp

    Filesize

    472KB

  • memory/2144-2342-0x0000000005D90000-0x0000000005DF6000-memory.dmp

    Filesize

    408KB

  • memory/2144-2345-0x0000000005860000-0x0000000005870000-memory.dmp

    Filesize

    64KB

  • memory/2144-2347-0x00000000073A0000-0x00000000073F0000-memory.dmp

    Filesize

    320KB

  • memory/2144-2326-0x0000000000F80000-0x0000000000FAE000-memory.dmp

    Filesize

    184KB

  • memory/4592-2354-0x0000000000C30000-0x0000000000C6B000-memory.dmp

    Filesize

    236KB

  • memory/5004-196-0x0000000004E60000-0x0000000004EC0000-memory.dmp

    Filesize

    384KB

  • memory/5004-2318-0x0000000005640000-0x0000000005672000-memory.dmp

    Filesize

    200KB

  • memory/5004-223-0x0000000004E60000-0x0000000004EC0000-memory.dmp

    Filesize

    384KB

  • memory/5004-219-0x0000000004E60000-0x0000000004EC0000-memory.dmp

    Filesize

    384KB

  • memory/5004-221-0x0000000004E60000-0x0000000004EC0000-memory.dmp

    Filesize

    384KB

  • memory/5004-217-0x0000000004E60000-0x0000000004EC0000-memory.dmp

    Filesize

    384KB

  • memory/5004-215-0x0000000004E60000-0x0000000004EC0000-memory.dmp

    Filesize

    384KB

  • memory/5004-213-0x0000000004E60000-0x0000000004EC0000-memory.dmp

    Filesize

    384KB

  • memory/5004-211-0x0000000004E60000-0x0000000004EC0000-memory.dmp

    Filesize

    384KB

  • memory/5004-209-0x0000000004E60000-0x0000000004EC0000-memory.dmp

    Filesize

    384KB

  • memory/5004-207-0x0000000004E60000-0x0000000004EC0000-memory.dmp

    Filesize

    384KB

  • memory/5004-205-0x0000000004E60000-0x0000000004EC0000-memory.dmp

    Filesize

    384KB

  • memory/5004-203-0x0000000004E60000-0x0000000004EC0000-memory.dmp

    Filesize

    384KB

  • memory/5004-201-0x0000000004E60000-0x0000000004EC0000-memory.dmp

    Filesize

    384KB

  • memory/5004-199-0x0000000004E60000-0x0000000004EC0000-memory.dmp

    Filesize

    384KB

  • memory/5004-195-0x00000000024A0000-0x00000000024FB000-memory.dmp

    Filesize

    364KB

  • memory/5004-197-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/5004-193-0x0000000004E60000-0x0000000004EC0000-memory.dmp

    Filesize

    384KB

  • memory/5004-191-0x0000000004E60000-0x0000000004EC0000-memory.dmp

    Filesize

    384KB

  • memory/5004-189-0x0000000004E60000-0x0000000004EC0000-memory.dmp

    Filesize

    384KB

  • memory/5004-188-0x0000000004E60000-0x0000000004EC0000-memory.dmp

    Filesize

    384KB

  • memory/5004-187-0x0000000004E60000-0x0000000004EC6000-memory.dmp

    Filesize

    408KB

  • memory/5004-186-0x0000000004DF0000-0x0000000004E58000-memory.dmp

    Filesize

    416KB