Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    56s
  • max time network
    59s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13/02/2023, 12:46

General

  • Target

    39754ddae7ddf49e6a32069050d72119fa74c7b345e65f56bbd5b16e45cfd9b2.exe

  • Size

    769KB

  • MD5

    b8598244bfa6336889721c85c177d78a

  • SHA1

    49dcf5da133569186a2099fabcf38f8e73ec6ffe

  • SHA256

    39754ddae7ddf49e6a32069050d72119fa74c7b345e65f56bbd5b16e45cfd9b2

  • SHA512

    daadf92f9a4634047cb5efb77088fe269a88b06d8a11d89e74b9390c08a8d74dfa22df901d2313cd72bcabc23f6708b64c730ab575aec968b42daa984a605673

  • SSDEEP

    12288:hMrSy90/KiLbALJJgvltVdJ7rIVcIBQGLShrsoq8OqEeJRPfO/lv7HWiwb7s:fyCKiLWJCtrL7JISJqz7e7fADHWzb7s

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Extracted

Family

redline

Botnet

dunm

C2

193.233.20.12:4132

Attributes
  • auth_value

    352959e3707029296ec94306d74e2334

Extracted

Family

redline

Botnet

cr2

C2

176.113.115.17:4132

Attributes
  • auth_value

    4bf573d6f5ab16f3b5e36da6855dc128

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39754ddae7ddf49e6a32069050d72119fa74c7b345e65f56bbd5b16e45cfd9b2.exe
    "C:\Users\Admin\AppData\Local\Temp\39754ddae7ddf49e6a32069050d72119fa74c7b345e65f56bbd5b16e45cfd9b2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2780
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vdo57.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vdo57.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4008
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vpZ74.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vpZ74.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3856
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dqz89.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dqz89.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4636
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lfG51.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lfG51.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:5020
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:844
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nVu48.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nVu48.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4340
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ssJ81.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ssJ81.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1816

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ssJ81.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ssJ81.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vdo57.exe

    Filesize

    665KB

    MD5

    a454c8420b1d44a4c9de5c2d148fe426

    SHA1

    e12b9588b3b34c330cde39926204cf47db5481cc

    SHA256

    cc59502c653085a85cc551f105efb1761298d5725d33c86f8125f2f2797e7995

    SHA512

    30c8fd6b21e645390215e1e078942f7c31bfb7f6d98657f76d10ff77e9972541641a3ef50234e952951285abb57c6c78b4ba6a228791a726ba1abc295eaffb92

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vdo57.exe

    Filesize

    665KB

    MD5

    a454c8420b1d44a4c9de5c2d148fe426

    SHA1

    e12b9588b3b34c330cde39926204cf47db5481cc

    SHA256

    cc59502c653085a85cc551f105efb1761298d5725d33c86f8125f2f2797e7995

    SHA512

    30c8fd6b21e645390215e1e078942f7c31bfb7f6d98657f76d10ff77e9972541641a3ef50234e952951285abb57c6c78b4ba6a228791a726ba1abc295eaffb92

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nVu48.exe

    Filesize

    175KB

    MD5

    69f79e05d0c83aee310d9adfe5aa7f2b

    SHA1

    485c490180380051a14316564fbda07723be11b1

    SHA256

    c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2

    SHA512

    f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nVu48.exe

    Filesize

    175KB

    MD5

    69f79e05d0c83aee310d9adfe5aa7f2b

    SHA1

    485c490180380051a14316564fbda07723be11b1

    SHA256

    c41dc7f6cc752595337cd7f209f923b43b061b201c6ab4dc02151afb90cd66e2

    SHA512

    f1789a74aeb83867c37ddeadcd06cddfc1454a94fcc122b35d67b0309b46742b9a6611e4c3e583baa90a3fd456e45c75ae5f1a206f6e4500c1f3f8ddf5e47b42

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vpZ74.exe

    Filesize

    520KB

    MD5

    062ee9c76cfab34b653b32a30822e13d

    SHA1

    c6f7f2e14b52baa2e0bc744c18e3dadf7e09fcb8

    SHA256

    a6acf7df84170025f68e9125104ed5f3d0cd8f59dd69a990fc9119b5787bdc12

    SHA512

    ae9e8eeab5aca930a34bc1c8390ab0907b4f6211880a7a87007abfe87d368132a75bbbd8f05ff6a8a9e23404f7a5887c2a19bebfbc37a28112bb25fd20d84244

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\vpZ74.exe

    Filesize

    520KB

    MD5

    062ee9c76cfab34b653b32a30822e13d

    SHA1

    c6f7f2e14b52baa2e0bc744c18e3dadf7e09fcb8

    SHA256

    a6acf7df84170025f68e9125104ed5f3d0cd8f59dd69a990fc9119b5787bdc12

    SHA512

    ae9e8eeab5aca930a34bc1c8390ab0907b4f6211880a7a87007abfe87d368132a75bbbd8f05ff6a8a9e23404f7a5887c2a19bebfbc37a28112bb25fd20d84244

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dqz89.exe

    Filesize

    306KB

    MD5

    44aee1861e5f2d4f001fcc570dfb4468

    SHA1

    a8341f8adabde95dc3465b23601052a7e1bd60e8

    SHA256

    c0acee57b9df5bd9f0cdc471c05d5797c8df24f11b6ac21959781f3fe234a287

    SHA512

    97a08b33f3ed6ceea8e12cd011bcda6c3316da2e0192e2d7db6464ae1843725e795f1559e05b48cbde32d008b4943c10f5c0957e5cd4dd10a4310ec10bb3fa1c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dqz89.exe

    Filesize

    306KB

    MD5

    44aee1861e5f2d4f001fcc570dfb4468

    SHA1

    a8341f8adabde95dc3465b23601052a7e1bd60e8

    SHA256

    c0acee57b9df5bd9f0cdc471c05d5797c8df24f11b6ac21959781f3fe234a287

    SHA512

    97a08b33f3ed6ceea8e12cd011bcda6c3316da2e0192e2d7db6464ae1843725e795f1559e05b48cbde32d008b4943c10f5c0957e5cd4dd10a4310ec10bb3fa1c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lfG51.exe

    Filesize

    281KB

    MD5

    4f7302c3f372c146e2dd87a7ea481f31

    SHA1

    c1f39c30a4138440399ae1c566cd414b2a4dd459

    SHA256

    6c9f8de22f30f2d8ddf1fa04c975d2832f6455e546a5ac1e923e76016ffa66e3

    SHA512

    a9a355bef77e741cb4b5040480960e0509d5c2ebcc866ad81a448bd24096fafa4962d02f76f365f8714bb8f41bbff28320566ce049746e3857c4353029140312

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\lfG51.exe

    Filesize

    281KB

    MD5

    4f7302c3f372c146e2dd87a7ea481f31

    SHA1

    c1f39c30a4138440399ae1c566cd414b2a4dd459

    SHA256

    6c9f8de22f30f2d8ddf1fa04c975d2832f6455e546a5ac1e923e76016ffa66e3

    SHA512

    a9a355bef77e741cb4b5040480960e0509d5c2ebcc866ad81a448bd24096fafa4962d02f76f365f8714bb8f41bbff28320566ce049746e3857c4353029140312

  • memory/844-518-0x0000000000400000-0x0000000000432000-memory.dmp

    Filesize

    200KB

  • memory/844-551-0x00000000092C0000-0x000000000930B000-memory.dmp

    Filesize

    300KB

  • memory/1816-936-0x0000000000860000-0x000000000086A000-memory.dmp

    Filesize

    40KB

  • memory/2780-147-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-156-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-135-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-136-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-137-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-138-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-139-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-140-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-141-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-142-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-143-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-144-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-145-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-146-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-148-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-133-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-149-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-150-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-151-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-152-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-153-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-154-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-155-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-134-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-157-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-159-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-158-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-160-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-161-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-162-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-163-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-164-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-165-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-120-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-132-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-131-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-129-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-130-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-128-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-127-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-126-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-125-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-124-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-123-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-122-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/2780-121-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-168-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-182-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-183-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-184-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-185-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-186-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-181-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-180-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-169-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-170-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-179-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-171-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-172-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-178-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-173-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-175-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-176-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/4008-177-0x0000000077710000-0x000000007789E000-memory.dmp

    Filesize

    1.6MB

  • memory/4340-527-0x0000000000BB0000-0x0000000000BE2000-memory.dmp

    Filesize

    200KB

  • memory/4636-316-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/4636-347-0x0000000005B40000-0x0000000005B8B000-memory.dmp

    Filesize

    300KB

  • memory/4636-362-0x00000000076A0000-0x0000000007716000-memory.dmp

    Filesize

    472KB

  • memory/4636-363-0x00000000025A0000-0x00000000025F0000-memory.dmp

    Filesize

    320KB

  • memory/4636-364-0x0000000007840000-0x0000000007A02000-memory.dmp

    Filesize

    1.8MB

  • memory/4636-365-0x0000000007A10000-0x0000000007F3C000-memory.dmp

    Filesize

    5.2MB

  • memory/4636-372-0x0000000000821000-0x000000000084F000-memory.dmp

    Filesize

    184KB

  • memory/4636-373-0x0000000000400000-0x000000000057D000-memory.dmp

    Filesize

    1.5MB

  • memory/4636-352-0x0000000000821000-0x000000000084F000-memory.dmp

    Filesize

    184KB

  • memory/4636-351-0x0000000005CA0000-0x0000000005D32000-memory.dmp

    Filesize

    584KB

  • memory/4636-354-0x0000000005D40000-0x0000000005DA6000-memory.dmp

    Filesize

    408KB

  • memory/4636-345-0x0000000005A00000-0x0000000005A3E000-memory.dmp

    Filesize

    248KB

  • memory/4636-343-0x00000000059A0000-0x00000000059B2000-memory.dmp

    Filesize

    72KB

  • memory/4636-341-0x0000000005860000-0x000000000596A000-memory.dmp

    Filesize

    1.0MB

  • memory/4636-340-0x0000000005240000-0x0000000005846000-memory.dmp

    Filesize

    6.0MB

  • memory/4636-329-0x0000000002400000-0x0000000002444000-memory.dmp

    Filesize

    272KB

  • memory/4636-327-0x0000000004D40000-0x000000000523E000-memory.dmp

    Filesize

    5.0MB

  • memory/4636-323-0x0000000002220000-0x0000000002266000-memory.dmp

    Filesize

    280KB

  • memory/4636-315-0x0000000000580000-0x00000000005CB000-memory.dmp

    Filesize

    300KB

  • memory/4636-314-0x0000000000821000-0x000000000084F000-memory.dmp

    Filesize

    184KB