Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    10/02/2023, 14:40

General

  • Target

    ac87d48aa3921d2e6ba610a5389f35289ed211ab54cc01421ff024af82eeb593.exe

  • Size

    539KB

  • MD5

    63a1c1f534dae84f4a295272e957bed5

  • SHA1

    9115b4a96bd4a0fb8b5e1a23a079c03ba3919710

  • SHA256

    ac87d48aa3921d2e6ba610a5389f35289ed211ab54cc01421ff024af82eeb593

  • SHA512

    e1059ff1bc2e31248f4fac635d01a8e3981cae6cd5d77fc149502cc9352fa873a5a0250fcc637fcffd920eec61bd733c8c9b37ba3256c729f22a23ecb06abb4e

  • SSDEEP

    12288:1Mrry90YswLycz2YFEiUxsSxCALt4zyj+d8H0rGJip:Gy7plzTFysAuzyCyH0qip

Malware Config

Extracted

Family

redline

Botnet

fusa

C2

193.233.20.12:4132

Attributes
  • auth_value

    a08b2f01bd2af756e38c5dd60e87e697

Extracted

Family

redline

Botnet

nocrypt

C2

176.113.115.17:4132

Attributes
  • auth_value

    4fc7cda1ab5883a6197f20f517ce2a8c

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac87d48aa3921d2e6ba610a5389f35289ed211ab54cc01421ff024af82eeb593.exe
    "C:\Users\Admin\AppData\Local\Temp\ac87d48aa3921d2e6ba610a5389f35289ed211ab54cc01421ff024af82eeb593.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2724
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dbJ88.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dbJ88.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4692
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\air42.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\air42.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2524
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bWG34OU.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bWG34OU.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3968
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cqO40.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cqO40.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:788

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cqO40.exe

    Filesize

    400KB

    MD5

    9f37be7c6bad1787fe998d5dfc5c609f

    SHA1

    7bbd257e510399868d8231f1df67952dd5377bc7

    SHA256

    b60fc84a17bbf6df9b29a2084b110e13fd9f9358abadd8503e71992be0b7ac05

    SHA512

    d9616bb9dae95b5d47d4ed40140cf0c0c3c472680f68c35dde876c0406f1158b53711ee06dd8d72d22b84302cf56c15ccd040902f5effb9e5d5722da3ce69548

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\cqO40.exe

    Filesize

    400KB

    MD5

    9f37be7c6bad1787fe998d5dfc5c609f

    SHA1

    7bbd257e510399868d8231f1df67952dd5377bc7

    SHA256

    b60fc84a17bbf6df9b29a2084b110e13fd9f9358abadd8503e71992be0b7ac05

    SHA512

    d9616bb9dae95b5d47d4ed40140cf0c0c3c472680f68c35dde876c0406f1158b53711ee06dd8d72d22b84302cf56c15ccd040902f5effb9e5d5722da3ce69548

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dbJ88.exe

    Filesize

    202KB

    MD5

    a433ee11d44b36b468611530ae919950

    SHA1

    910aa9ec210e4edd292f37335d22a579d7b752e8

    SHA256

    7f294c321057ca1b03102dfc9f166e786d67f24699fcc8a7a419edc0e1723994

    SHA512

    3adf5ebeb45a6f3cd59f82cfdd2ce0095e836b4ae0b7e41f077f09a8bdf63640dc019cdbe4bd9a9e264146810e33c863393b5362e96cab20bf26d02a0dc63783

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dbJ88.exe

    Filesize

    202KB

    MD5

    a433ee11d44b36b468611530ae919950

    SHA1

    910aa9ec210e4edd292f37335d22a579d7b752e8

    SHA256

    7f294c321057ca1b03102dfc9f166e786d67f24699fcc8a7a419edc0e1723994

    SHA512

    3adf5ebeb45a6f3cd59f82cfdd2ce0095e836b4ae0b7e41f077f09a8bdf63640dc019cdbe4bd9a9e264146810e33c863393b5362e96cab20bf26d02a0dc63783

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\air42.exe

    Filesize

    175KB

    MD5

    da6f3bef8abc85bd09f50783059964e3

    SHA1

    a0f25f60ec1896c4c920ea397f40e6ce29724322

    SHA256

    e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b

    SHA512

    4d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\air42.exe

    Filesize

    175KB

    MD5

    da6f3bef8abc85bd09f50783059964e3

    SHA1

    a0f25f60ec1896c4c920ea397f40e6ce29724322

    SHA256

    e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b

    SHA512

    4d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bWG34OU.exe

    Filesize

    175KB

    MD5

    30132c45c2305b287d96a3ad8158e9e3

    SHA1

    c89477868792dbfc6abeb3016e4fcc542b01bea1

    SHA256

    0cca99711baf600eb030bbfcf279faf74c564084e733df3d9e98bea3e4e2f45f

    SHA512

    1f6ccbaf0787c9bc61f568c4398374426961fc73ed7ea38c75e27d7025a9df6f93ea111297a6a02acdeea52845067e222e681f278dc7278d834fbbb6be98b74e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bWG34OU.exe

    Filesize

    175KB

    MD5

    30132c45c2305b287d96a3ad8158e9e3

    SHA1

    c89477868792dbfc6abeb3016e4fcc542b01bea1

    SHA256

    0cca99711baf600eb030bbfcf279faf74c564084e733df3d9e98bea3e4e2f45f

    SHA512

    1f6ccbaf0787c9bc61f568c4398374426961fc73ed7ea38c75e27d7025a9df6f93ea111297a6a02acdeea52845067e222e681f278dc7278d834fbbb6be98b74e

  • memory/788-447-0x0000000000490000-0x000000000053E000-memory.dmp

    Filesize

    696KB

  • memory/788-449-0x0000000000830000-0x000000000085D000-memory.dmp

    Filesize

    180KB

  • memory/788-450-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/788-457-0x0000000002020000-0x000000000203A000-memory.dmp

    Filesize

    104KB

  • memory/788-462-0x00000000024F0000-0x0000000002508000-memory.dmp

    Filesize

    96KB

  • memory/788-465-0x0000000000490000-0x000000000053E000-memory.dmp

    Filesize

    696KB

  • memory/788-467-0x0000000000400000-0x0000000000490000-memory.dmp

    Filesize

    576KB

  • memory/2524-302-0x0000000006530000-0x00000000066F2000-memory.dmp

    Filesize

    1.8MB

  • memory/2524-298-0x0000000005A00000-0x0000000005A92000-memory.dmp

    Filesize

    584KB

  • memory/2524-290-0x00000000050D0000-0x0000000005136000-memory.dmp

    Filesize

    408KB

  • memory/2524-288-0x0000000005C60000-0x000000000615E000-memory.dmp

    Filesize

    5.0MB

  • memory/2524-284-0x0000000004C00000-0x0000000004C4B000-memory.dmp

    Filesize

    300KB

  • memory/2524-282-0x0000000004BC0000-0x0000000004BFE000-memory.dmp

    Filesize

    248KB

  • memory/2524-280-0x0000000004B60000-0x0000000004B72000-memory.dmp

    Filesize

    72KB

  • memory/2524-278-0x0000000004C50000-0x0000000004D5A000-memory.dmp

    Filesize

    1.0MB

  • memory/2524-277-0x0000000005150000-0x0000000005756000-memory.dmp

    Filesize

    6.0MB

  • memory/2524-264-0x0000000000300000-0x0000000000332000-memory.dmp

    Filesize

    200KB

  • memory/2524-300-0x0000000005AA0000-0x0000000005B16000-memory.dmp

    Filesize

    472KB

  • memory/2524-301-0x00000000059B0000-0x0000000005A00000-memory.dmp

    Filesize

    320KB

  • memory/2524-303-0x0000000006C30000-0x000000000715C000-memory.dmp

    Filesize

    5.2MB

  • memory/2724-143-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-125-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-151-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-152-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-153-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-154-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-155-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-156-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-157-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-158-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-159-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-160-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-161-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-162-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-163-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-164-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-150-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-149-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-120-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-121-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-122-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-123-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-124-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-136-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-126-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-148-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-127-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-129-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-128-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-137-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-130-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-131-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-139-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-132-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-133-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-134-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-135-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-147-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-146-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-145-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-144-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-119-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-142-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-141-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-140-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/2724-138-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/3968-361-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/4692-185-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/4692-184-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/4692-183-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/4692-182-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/4692-181-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/4692-180-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/4692-179-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/4692-178-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/4692-177-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/4692-176-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/4692-175-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/4692-174-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/4692-172-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/4692-171-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/4692-170-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/4692-169-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/4692-168-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB

  • memory/4692-167-0x0000000077BF0000-0x0000000077D7E000-memory.dmp

    Filesize

    1.6MB