Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    107s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01/10/2022, 17:24

General

  • Target

    d57321805b57d9a004d652b7d8b00d9045d6940800653374e2a47c7dad2e9196.exe

  • Size

    269KB

  • MD5

    286f83b1b21e6c05f1a687e5f1ca1c31

  • SHA1

    46b106a13e2396c0ba8df3f1e53467fbedd6aefc

  • SHA256

    d57321805b57d9a004d652b7d8b00d9045d6940800653374e2a47c7dad2e9196

  • SHA512

    d00ac23609be4b553b24ffdb7f93bcd8048ac855dee16a27b7f670e020d7d32367dd6eb5ed01d43e712d4943c0e9569d90c02ff5d1268e918f67914b352ad3db

  • SSDEEP

    1536:erae78zjORCDGwfdCSog01313Cs5gZl43Ni:mahKyd2n3175C43M

Malware Config

Extracted

Family

redline

Botnet

Buk2

C2

tyastazirowi.xyz:80

yaterirennin.xyz:80

Attributes
  • auth_value

    813662de00b041e18fa868da733fca07

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d57321805b57d9a004d652b7d8b00d9045d6940800653374e2a47c7dad2e9196.exe
    "C:\Users\Admin\AppData\Local\Temp\d57321805b57d9a004d652b7d8b00d9045d6940800653374e2a47c7dad2e9196.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2716
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\attribstuneov.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\attribstuneov.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2464
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA0AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4168
      • C:\Users\Admin\AppData\Local\Temp\Hshzunnightpc_s.exe
        "C:\Users\Admin\AppData\Local\Temp\Hshzunnightpc_s.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4352
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwA0AA==
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:668
        • C:\Users\Admin\AppData\Local\Temp\Hshzunnightpc_s.exe
          C:\Users\Admin\AppData\Local\Temp\Hshzunnightpc_s.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          PID:3324
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\attribstuneov.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\attribstuneov.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4552

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Hshzunnightpc_s.exe.log

    Filesize

    1KB

    MD5

    94783fcf58c98f5ea0b416f441ad15eb

    SHA1

    979a7c39c6a5dbed314bc41a22c4ccdca6db206b

    SHA256

    117df0a0e80abf166ef148863dd82ba9e75c05b38ed3979d048f5fcc848ef905

    SHA512

    9301306461cb978e91761b24b1d04339c2bff71771431987cd8dc373387c12feb81dbdbf272da1f7c045eade4ffff1976885ca705ca7cf9a40a6c4a7553aa06c

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\attribstuneov.exe.log

    Filesize

    1KB

    MD5

    94783fcf58c98f5ea0b416f441ad15eb

    SHA1

    979a7c39c6a5dbed314bc41a22c4ccdca6db206b

    SHA256

    117df0a0e80abf166ef148863dd82ba9e75c05b38ed3979d048f5fcc848ef905

    SHA512

    9301306461cb978e91761b24b1d04339c2bff71771431987cd8dc373387c12feb81dbdbf272da1f7c045eade4ffff1976885ca705ca7cf9a40a6c4a7553aa06c

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    1KB

    MD5

    66382a4ca6c4dcf75ce41417d44be93e

    SHA1

    8132cbef1c12f8a89a68a6153ade4286bf130812

    SHA256

    a70acce0f4c6ab59b88ce79d84c38d4abffe19b72b033250499b17d788a2db56

    SHA512

    2bf66f2850f4a65220085c55a5b3c8866453104d78fe516e5bd6e3e47df783062ce4ea10de580f2eb0274ac8c3ce71965201c49ef55a78f307731ccc8600aadc

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache

    Filesize

    45KB

    MD5

    5f640bd48e2547b4c1a7421f080f815f

    SHA1

    a8f4a743f5b7da5cba7b8e6fb1d7ad4d67fefc6a

    SHA256

    916c83c7c8d059aea295523b8b3f24e1e2436df894f7fae26c47c9bad04baa9c

    SHA512

    a6ac100a351946b1bbb40c98aeda6e16e12f90f81063aff08c16d4d9afec8ed65c2cbcf25b42946627d67653f75740b1137dab625c99e9492ba35aba68b79a8e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    16KB

    MD5

    c65e44b1889df076e3af463b47bcad9b

    SHA1

    3d7f74c29bbff0e6a8e2b19b8c2b4c4cede8966c

    SHA256

    8223e4c8fbe583e89f59ac99c80e5730b87f55c07ee67e559241f4442abb50a0

    SHA512

    a138ed048c1c3f8472e576d62357faec0155955bf545b7d4445574483fd99a63168384d43fefb790baa5919a41dc3f8b3b81763a844287a394d9332cdd0382a2

  • C:\Users\Admin\AppData\Local\Temp\Hshzunnightpc_s.exe

    Filesize

    87KB

    MD5

    fa5a9446a33e713c6cc88b97186b2392

    SHA1

    31fa2b86a3d3d5c8062cc19ddf58d13324150c39

    SHA256

    1e3494640f978ee502113a45bbb041c26cb64b3a23c8a6819f645f1e4a6bdd31

    SHA512

    f3fb226fb700d4724a2fdfc04c4b60d0ca015ed69b5514d6575a8a55263a257984d3e0eafb55ce76b365c20f7808399380c0bbcea888c6cf170ceeb9c9e6960b

  • C:\Users\Admin\AppData\Local\Temp\Hshzunnightpc_s.exe

    Filesize

    87KB

    MD5

    fa5a9446a33e713c6cc88b97186b2392

    SHA1

    31fa2b86a3d3d5c8062cc19ddf58d13324150c39

    SHA256

    1e3494640f978ee502113a45bbb041c26cb64b3a23c8a6819f645f1e4a6bdd31

    SHA512

    f3fb226fb700d4724a2fdfc04c4b60d0ca015ed69b5514d6575a8a55263a257984d3e0eafb55ce76b365c20f7808399380c0bbcea888c6cf170ceeb9c9e6960b

  • C:\Users\Admin\AppData\Local\Temp\Hshzunnightpc_s.exe

    Filesize

    87KB

    MD5

    fa5a9446a33e713c6cc88b97186b2392

    SHA1

    31fa2b86a3d3d5c8062cc19ddf58d13324150c39

    SHA256

    1e3494640f978ee502113a45bbb041c26cb64b3a23c8a6819f645f1e4a6bdd31

    SHA512

    f3fb226fb700d4724a2fdfc04c4b60d0ca015ed69b5514d6575a8a55263a257984d3e0eafb55ce76b365c20f7808399380c0bbcea888c6cf170ceeb9c9e6960b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\attribstuneov.exe

    Filesize

    152.6MB

    MD5

    d721d6cec91d8fd3c0aca004a9df42c9

    SHA1

    c30cab905dcb1a023abadbcc877337a6b1fa88c4

    SHA256

    a6697233ee8a2a64c247d9a5c42d3399f47046c603271d92ee5253f6429d6777

    SHA512

    d00df63beef16565a164cbf6744d42ffd7c1d672b2d439d1d1614c9893d62598b8c5e8b87e0546bf2f483a2bcef04a0d0230931aa9898ecc26973aba4a0bb90e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\attribstuneov.exe

    Filesize

    152.6MB

    MD5

    d721d6cec91d8fd3c0aca004a9df42c9

    SHA1

    c30cab905dcb1a023abadbcc877337a6b1fa88c4

    SHA256

    a6697233ee8a2a64c247d9a5c42d3399f47046c603271d92ee5253f6429d6777

    SHA512

    d00df63beef16565a164cbf6744d42ffd7c1d672b2d439d1d1614c9893d62598b8c5e8b87e0546bf2f483a2bcef04a0d0230931aa9898ecc26973aba4a0bb90e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\attribstuneov.exe

    Filesize

    152.6MB

    MD5

    d721d6cec91d8fd3c0aca004a9df42c9

    SHA1

    c30cab905dcb1a023abadbcc877337a6b1fa88c4

    SHA256

    a6697233ee8a2a64c247d9a5c42d3399f47046c603271d92ee5253f6429d6777

    SHA512

    d00df63beef16565a164cbf6744d42ffd7c1d672b2d439d1d1614c9893d62598b8c5e8b87e0546bf2f483a2bcef04a0d0230931aa9898ecc26973aba4a0bb90e

  • memory/2464-146-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-122-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-131-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-132-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-133-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-134-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-135-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-138-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-137-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-136-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-139-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-140-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-142-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-141-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-143-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-144-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-145-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-148-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-147-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-149-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-150-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-151-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-152-0x00000000006D0000-0x00000000006DA000-memory.dmp

    Filesize

    40KB

  • memory/2464-153-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-154-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-155-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-156-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-157-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-158-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-159-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-160-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-161-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-162-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-163-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-164-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-165-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-166-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-167-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-168-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-170-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-169-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-171-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-172-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-173-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-175-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-179-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-181-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-182-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-180-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-130-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-177-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-121-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-174-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-183-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-197-0x0000000005810000-0x00000000058CE000-memory.dmp

    Filesize

    760KB

  • memory/2464-198-0x0000000005990000-0x0000000005A22000-memory.dmp

    Filesize

    584KB

  • memory/2464-199-0x0000000005A80000-0x0000000005AA2000-memory.dmp

    Filesize

    136KB

  • memory/2464-201-0x0000000005AB0000-0x0000000005E00000-memory.dmp

    Filesize

    3.3MB

  • memory/2464-118-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-119-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-120-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-176-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-178-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-123-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-124-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-125-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-127-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-128-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/2464-129-0x0000000077840000-0x00000000779CE000-memory.dmp

    Filesize

    1.6MB

  • memory/3324-655-0x0000000005B80000-0x0000000005BD4000-memory.dmp

    Filesize

    336KB

  • memory/3324-645-0x00000000053D0000-0x000000000541C000-memory.dmp

    Filesize

    304KB

  • memory/3324-644-0x00000000052B0000-0x0000000005304000-memory.dmp

    Filesize

    336KB

  • memory/3324-633-0x00000000051C0000-0x0000000005216000-memory.dmp

    Filesize

    344KB

  • memory/3324-631-0x00000000050C0000-0x000000000516E000-memory.dmp

    Filesize

    696KB

  • memory/3324-623-0x0000000000400000-0x0000000000482000-memory.dmp

    Filesize

    520KB

  • memory/4168-249-0x0000000005320000-0x0000000005356000-memory.dmp

    Filesize

    216KB

  • memory/4168-273-0x00000000080E0000-0x0000000008146000-memory.dmp

    Filesize

    408KB

  • memory/4168-294-0x00000000098A0000-0x00000000098BA000-memory.dmp

    Filesize

    104KB

  • memory/4168-293-0x000000000A190000-0x000000000A808000-memory.dmp

    Filesize

    6.5MB

  • memory/4168-282-0x0000000008B50000-0x0000000008BC6000-memory.dmp

    Filesize

    472KB

  • memory/4168-277-0x0000000008190000-0x00000000081AC000-memory.dmp

    Filesize

    112KB

  • memory/4168-278-0x0000000008AA0000-0x0000000008AEB000-memory.dmp

    Filesize

    300KB

  • memory/4168-254-0x0000000007AB0000-0x00000000080D8000-memory.dmp

    Filesize

    6.2MB

  • memory/4168-274-0x0000000008330000-0x0000000008396000-memory.dmp

    Filesize

    408KB

  • memory/4352-443-0x00000000058F0000-0x0000000005A14000-memory.dmp

    Filesize

    1.1MB

  • memory/4352-336-0x0000000000630000-0x000000000064A000-memory.dmp

    Filesize

    104KB

  • memory/4352-449-0x0000000005BC0000-0x0000000005F10000-memory.dmp

    Filesize

    3.3MB

  • memory/4552-436-0x00000000052F0000-0x00000000058F6000-memory.dmp

    Filesize

    6.0MB

  • memory/4552-574-0x0000000007660000-0x0000000007B8C000-memory.dmp

    Filesize

    5.2MB

  • memory/4552-573-0x0000000006F60000-0x0000000007122000-memory.dmp

    Filesize

    1.8MB

  • memory/4552-572-0x0000000006C90000-0x0000000006CE0000-memory.dmp

    Filesize

    320KB

  • memory/4552-439-0x0000000004D90000-0x0000000004DA2000-memory.dmp

    Filesize

    72KB

  • memory/4552-437-0x0000000004E60000-0x0000000004F6A000-memory.dmp

    Filesize

    1.0MB

  • memory/4552-405-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/4552-446-0x0000000004F70000-0x0000000004FBB000-memory.dmp

    Filesize

    300KB

  • memory/4552-444-0x0000000004E00000-0x0000000004E3E000-memory.dmp

    Filesize

    248KB

  • memory/4552-563-0x0000000006790000-0x0000000006C8E000-memory.dmp

    Filesize

    5.0MB

  • memory/4552-562-0x00000000061F0000-0x0000000006282000-memory.dmp

    Filesize

    584KB