Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    48s
  • max time network
    51s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14/02/2023, 00:09

General

  • Target

    44d25c17fa7a0e7d454572f2a22c001b3f6945d9ca60a2aa1e8e97ff89d1dc33.exe

  • Size

    482KB

  • MD5

    7234e64e819275fa8fffa05ecc8e1cab

  • SHA1

    da52fa5010e2f2839ea176b7de473935eb11bfef

  • SHA256

    44d25c17fa7a0e7d454572f2a22c001b3f6945d9ca60a2aa1e8e97ff89d1dc33

  • SHA512

    a24756700ffb6f7a03cff8d9da6ee74d6cd081e3762b01c902d387eccca21705892e6ee37b6b294e917b7a74db861bd229d8107eb2d91274cde0677f2b38fab8

  • SSDEEP

    12288:OMryy90rGz0mVccNuZv8SH1HXY5Djjz6egF3+Ue:wycaVXEGMHXY5DXPc3+9

Malware Config

Extracted

Family

redline

Botnet

fusa

C2

193.233.20.12:4132

Attributes
  • auth_value

    a08b2f01bd2af756e38c5dd60e87e697

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\44d25c17fa7a0e7d454572f2a22c001b3f6945d9ca60a2aa1e8e97ff89d1dc33.exe
    "C:\Users\Admin\AppData\Local\Temp\44d25c17fa7a0e7d454572f2a22c001b3f6945d9ca60a2aa1e8e97ff89d1dc33.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nvA61yL.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nvA61yL.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4636
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bRr66kR.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bRr66kR.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1360
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dcg26eR.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dcg26eR.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4192
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lPC67Wt.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lPC67Wt.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4288

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lPC67Wt.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lPC67Wt.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nvA61yL.exe

    Filesize

    378KB

    MD5

    019cd0dd76d8903ab741ed7d025f8d30

    SHA1

    60ce8eb037de0a255a4f6a8fc043ac6681b3bd49

    SHA256

    3606851eb5c8717882e6775598d686abee7efdc35528326a81578ea1cbf0f193

    SHA512

    1bf0218f7e8d11a92b48ec7712f2cee45342312b6eba84a84f7db0455dc8d724b91e5fa36aa8bba238b117e07157c33326bb5446e86246553c520146821639a1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nvA61yL.exe

    Filesize

    378KB

    MD5

    019cd0dd76d8903ab741ed7d025f8d30

    SHA1

    60ce8eb037de0a255a4f6a8fc043ac6681b3bd49

    SHA256

    3606851eb5c8717882e6775598d686abee7efdc35528326a81578ea1cbf0f193

    SHA512

    1bf0218f7e8d11a92b48ec7712f2cee45342312b6eba84a84f7db0455dc8d724b91e5fa36aa8bba238b117e07157c33326bb5446e86246553c520146821639a1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bRr66kR.exe

    Filesize

    247KB

    MD5

    6cf228753a605faa339ed5509a3a1b84

    SHA1

    340fa64fb659c183a7d040514be806e51ed33abb

    SHA256

    5456903fe3382ca3a494aa5c2d626ddbc57ce8c977893d546ff5345df484bab9

    SHA512

    69c25fec8903c2189e189a80288a6bd9ed44c8e56bb79903f371ccdd0e7fd0a8075ff3f7816d906e9d839e64145921fe34ae8c1df77e5b85597b7508080ce61b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bRr66kR.exe

    Filesize

    247KB

    MD5

    6cf228753a605faa339ed5509a3a1b84

    SHA1

    340fa64fb659c183a7d040514be806e51ed33abb

    SHA256

    5456903fe3382ca3a494aa5c2d626ddbc57ce8c977893d546ff5345df484bab9

    SHA512

    69c25fec8903c2189e189a80288a6bd9ed44c8e56bb79903f371ccdd0e7fd0a8075ff3f7816d906e9d839e64145921fe34ae8c1df77e5b85597b7508080ce61b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dcg26eR.exe

    Filesize

    175KB

    MD5

    da6f3bef8abc85bd09f50783059964e3

    SHA1

    a0f25f60ec1896c4c920ea397f40e6ce29724322

    SHA256

    e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b

    SHA512

    4d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dcg26eR.exe

    Filesize

    175KB

    MD5

    da6f3bef8abc85bd09f50783059964e3

    SHA1

    a0f25f60ec1896c4c920ea397f40e6ce29724322

    SHA256

    e6d9ee8ab0ea2ade6e5a9481d8f0f921427ec6919b1b48c6067570fde270736b

    SHA512

    4d2e1472b114c98c74900b8305aabbc49ba28edffdc2376206cf02e26593df4e444933b3aa19f0c6cd0ae3ac3133d656433574aaf25a57748758e5dd25edfbec

  • memory/1360-279-0x0000000004BA0000-0x000000000509E000-memory.dmp

    Filesize

    5.0MB

  • memory/1360-275-0x00000000020F0000-0x000000000210A000-memory.dmp

    Filesize

    104KB

  • memory/1360-268-0x0000000000400000-0x000000000056F000-memory.dmp

    Filesize

    1.4MB

  • memory/1360-267-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/1360-266-0x0000000000570000-0x000000000061E000-memory.dmp

    Filesize

    696KB

  • memory/1360-281-0x0000000002330000-0x0000000002348000-memory.dmp

    Filesize

    96KB

  • memory/1360-284-0x0000000000570000-0x000000000061E000-memory.dmp

    Filesize

    696KB

  • memory/1360-286-0x0000000000400000-0x000000000056F000-memory.dmp

    Filesize

    1.4MB

  • memory/2844-144-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-127-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-137-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-140-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-142-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-141-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-143-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-120-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-145-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-146-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-147-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-148-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-149-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-150-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-151-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-152-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-153-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-154-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-155-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-156-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-157-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-159-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-158-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-160-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-161-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-163-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-164-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-165-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-138-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-121-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-122-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-162-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-123-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-124-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-125-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-126-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-139-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-128-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-129-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-130-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-131-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-136-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-132-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-133-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-134-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/2844-135-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/4192-372-0x0000000006C20000-0x0000000006DE2000-memory.dmp

    Filesize

    1.8MB

  • memory/4192-355-0x00000000054B0000-0x00000000054EE000-memory.dmp

    Filesize

    248KB

  • memory/4192-337-0x0000000000BF0000-0x0000000000C22000-memory.dmp

    Filesize

    200KB

  • memory/4192-378-0x0000000006F30000-0x0000000006F80000-memory.dmp

    Filesize

    320KB

  • memory/4192-377-0x0000000006EB0000-0x0000000006F26000-memory.dmp

    Filesize

    472KB

  • memory/4192-373-0x0000000007320000-0x000000000784C000-memory.dmp

    Filesize

    5.2MB

  • memory/4192-350-0x0000000005A40000-0x0000000006046000-memory.dmp

    Filesize

    6.0MB

  • memory/4192-361-0x0000000005810000-0x00000000058A2000-memory.dmp

    Filesize

    584KB

  • memory/4192-357-0x0000000005650000-0x000000000569B000-memory.dmp

    Filesize

    300KB

  • memory/4192-364-0x0000000005920000-0x0000000005986000-memory.dmp

    Filesize

    408KB

  • memory/4192-353-0x0000000005450000-0x0000000005462000-memory.dmp

    Filesize

    72KB

  • memory/4192-351-0x0000000005540000-0x000000000564A000-memory.dmp

    Filesize

    1.0MB

  • memory/4288-386-0x0000000000350000-0x000000000035A000-memory.dmp

    Filesize

    40KB

  • memory/4636-177-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/4636-185-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/4636-171-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/4636-169-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/4636-172-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/4636-173-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/4636-175-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/4636-176-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/4636-178-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/4636-170-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/4636-179-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/4636-181-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/4636-182-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/4636-184-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/4636-180-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/4636-183-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/4636-168-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB

  • memory/4636-186-0x0000000077320000-0x00000000774AE000-memory.dmp

    Filesize

    1.6MB