Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    91s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/02/2023, 22:03

General

  • Target

    f6ef39ad4c596ccac29d13a03de27e3f264603c901c5ca34834fe2043d5259af.exe

  • Size

    478KB

  • MD5

    ad73f56789ba7bb139feba1217f9d3b7

  • SHA1

    06672cfd3f4d13fc5e9639e7e4f7e2d3cdef8e10

  • SHA256

    f6ef39ad4c596ccac29d13a03de27e3f264603c901c5ca34834fe2043d5259af

  • SHA512

    80f1ab2b92c887adedaf060037d54d57d5b5053446c5a1589e573043295a2c1a1bad1c86ad72f8e30421fe47bab84245cf35c713c31def1ac3a4a605b524e3b9

  • SSDEEP

    12288:eMrvy90F/0cOMa/B0YY9fHW/e8yU2w80Mbz:NymeMo4KSwAbz

Malware Config

Extracted

Family

redline

Botnet

fusa

C2

193.233.20.12:4132

Attributes
  • auth_value

    a08b2f01bd2af756e38c5dd60e87e697

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6ef39ad4c596ccac29d13a03de27e3f264603c901c5ca34834fe2043d5259af.exe
    "C:\Users\Admin\AppData\Local\Temp\f6ef39ad4c596ccac29d13a03de27e3f264603c901c5ca34834fe2043d5259af.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4280
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nKl63jt.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nKl63jt.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4816
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\biB59lo.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\biB59lo.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4852
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4852 -s 1072
          4⤵
          • Program crash
          PID:4456
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dTY09ee.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dTY09ee.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4588
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\laz96Cd.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\laz96Cd.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1780
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4852 -ip 4852
    1⤵
      PID:1956

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\laz96Cd.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\laz96Cd.exe

      Filesize

      11KB

      MD5

      7e93bacbbc33e6652e147e7fe07572a0

      SHA1

      421a7167da01c8da4dc4d5234ca3dd84e319e762

      SHA256

      850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

      SHA512

      250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nKl63jt.exe

      Filesize

      375KB

      MD5

      aa9dd08139f3b4c32a236109630491c9

      SHA1

      88268d297f357087a67b3560e73fac5ecc96fae6

      SHA256

      6aaeb29f413e39fabc19f2997f8f3de3535a4784671bb95a6907332c698f4047

      SHA512

      45ebe06ef420c1444358f737196168a6a551c7fb98dd178cf2e8bed6fced9eca2c5771d31ac10dd2294da43ef4421ea146117cd02d9897141b68b89f764f5842

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nKl63jt.exe

      Filesize

      375KB

      MD5

      aa9dd08139f3b4c32a236109630491c9

      SHA1

      88268d297f357087a67b3560e73fac5ecc96fae6

      SHA256

      6aaeb29f413e39fabc19f2997f8f3de3535a4784671bb95a6907332c698f4047

      SHA512

      45ebe06ef420c1444358f737196168a6a551c7fb98dd178cf2e8bed6fced9eca2c5771d31ac10dd2294da43ef4421ea146117cd02d9897141b68b89f764f5842

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\biB59lo.exe

      Filesize

      235KB

      MD5

      ea2af715b2c17a763c05bffc5669ded5

      SHA1

      876295abbc668533e3629c38e5b4db50776f969a

      SHA256

      b639725c9da4eecd879a811d1f643a2d7cef7b15079547c075f3f380f2e83e29

      SHA512

      1f42bf7bed7a87b2da22af31b6c0f3afe844eac6949e2f9379290ff6548259431f6f55c3d5a3de2f408889e0f3cb67898e1e26050b87408a10937902df0b0c9d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\biB59lo.exe

      Filesize

      235KB

      MD5

      ea2af715b2c17a763c05bffc5669ded5

      SHA1

      876295abbc668533e3629c38e5b4db50776f969a

      SHA256

      b639725c9da4eecd879a811d1f643a2d7cef7b15079547c075f3f380f2e83e29

      SHA512

      1f42bf7bed7a87b2da22af31b6c0f3afe844eac6949e2f9379290ff6548259431f6f55c3d5a3de2f408889e0f3cb67898e1e26050b87408a10937902df0b0c9d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dTY09ee.exe

      Filesize

      175KB

      MD5

      da6f3bef8abc85bd09f50783059964e3

      SHA1

      a0f25f60ec1896c4c920ea397f40e6ce29724322

      SHA256

      e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b

      SHA512

      4d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dTY09ee.exe

      Filesize

      175KB

      MD5

      da6f3bef8abc85bd09f50783059964e3

      SHA1

      a0f25f60ec1896c4c920ea397f40e6ce29724322

      SHA256

      e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b

      SHA512

      4d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec

    • memory/1780-164-0x00007FFB80BA0000-0x00007FFB81661000-memory.dmp

      Filesize

      10.8MB

    • memory/1780-163-0x00007FFB80BA0000-0x00007FFB81661000-memory.dmp

      Filesize

      10.8MB

    • memory/1780-162-0x00000000008F0000-0x00000000008FA000-memory.dmp

      Filesize

      40KB

    • memory/4588-156-0x0000000007620000-0x0000000007B4C000-memory.dmp

      Filesize

      5.2MB

    • memory/4588-155-0x0000000006F20000-0x00000000070E2000-memory.dmp

      Filesize

      1.8MB

    • memory/4588-158-0x0000000006EA0000-0x0000000006EF0000-memory.dmp

      Filesize

      320KB

    • memory/4588-157-0x00000000071F0000-0x0000000007266000-memory.dmp

      Filesize

      472KB

    • memory/4588-148-0x0000000000BF0000-0x0000000000C22000-memory.dmp

      Filesize

      200KB

    • memory/4588-149-0x0000000005BD0000-0x00000000061E8000-memory.dmp

      Filesize

      6.1MB

    • memory/4588-150-0x00000000056C0000-0x00000000057CA000-memory.dmp

      Filesize

      1.0MB

    • memory/4588-151-0x00000000055D0000-0x00000000055E2000-memory.dmp

      Filesize

      72KB

    • memory/4588-152-0x0000000005630000-0x000000000566C000-memory.dmp

      Filesize

      240KB

    • memory/4588-153-0x0000000005AE0000-0x0000000005B72000-memory.dmp

      Filesize

      584KB

    • memory/4588-154-0x00000000061F0000-0x0000000006256000-memory.dmp

      Filesize

      408KB

    • memory/4852-143-0x0000000000851000-0x0000000000871000-memory.dmp

      Filesize

      128KB

    • memory/4852-144-0x0000000000400000-0x000000000056C000-memory.dmp

      Filesize

      1.4MB

    • memory/4852-142-0x0000000000851000-0x0000000000871000-memory.dmp

      Filesize

      128KB

    • memory/4852-141-0x0000000004B50000-0x00000000050F4000-memory.dmp

      Filesize

      5.6MB

    • memory/4852-140-0x0000000000400000-0x000000000056C000-memory.dmp

      Filesize

      1.4MB

    • memory/4852-139-0x0000000000640000-0x000000000066D000-memory.dmp

      Filesize

      180KB

    • memory/4852-138-0x0000000000851000-0x0000000000871000-memory.dmp

      Filesize

      128KB