Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    54s
  • max time network
    71s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    14/02/2023, 10:34

General

  • Target

    2e2693e2b3805e55b01dc22afed31a18b22d9d97beb9e581e1a7c05cd864f102.exe

  • Size

    528KB

  • MD5

    38d0a603b47656510ee5a6f43f357ea7

  • SHA1

    01df5ef71c6f1991eb6ff9f1fbd0f507436bc1b7

  • SHA256

    2e2693e2b3805e55b01dc22afed31a18b22d9d97beb9e581e1a7c05cd864f102

  • SHA512

    768d1e471b924fdead96f3b0f101eb990a39d1837810d43fb3901f2fef639875fd1ba2d1661856ade2617160e6cbfe1fda3369712f97519726016a15d1cc32d5

  • SSDEEP

    12288:EMrky90pI6HDDhdizNnZKrETGXMvgD1se79lrLVOSm1eyJ6:4yoWZsEicvgnZ951

Malware Config

Extracted

Family

redline

Botnet

ruma

C2

193.233.20.13:4136

Attributes
  • auth_value

    647d00dfaba082a4a30f383bca5d1a2a

Extracted

Family

redline

Botnet

dubka

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5a9421183a033f283b2f23139b471f0

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e2693e2b3805e55b01dc22afed31a18b22d9d97beb9e581e1a7c05cd864f102.exe
    "C:\Users\Admin\AppData\Local\Temp\2e2693e2b3805e55b01dc22afed31a18b22d9d97beb9e581e1a7c05cd864f102.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2728
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vRP24.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vRP24.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2124
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dsD55.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dsD55.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2504
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ncq43Fr.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ncq43Fr.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3660
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sFa71.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sFa71.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:968

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sFa71.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sFa71.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vRP24.exe

    Filesize

    424KB

    MD5

    5e12ca7819c6446fc6475448a5d55630

    SHA1

    98b7f790664b354ed1d619060965787a9b28dad0

    SHA256

    6ff725e04d4a1701090310296e0a2a0b6a4a90f54b4c6abd8caa886f919e8468

    SHA512

    20c9e6d4314ced963fb687ebb9ff6cde7811a5228fced14664958fc0137a1ee3c48effa1d8c393c030806ebc5e0b99eb638b357f4efcd385c3bc3cb3d0b0c729

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vRP24.exe

    Filesize

    424KB

    MD5

    5e12ca7819c6446fc6475448a5d55630

    SHA1

    98b7f790664b354ed1d619060965787a9b28dad0

    SHA256

    6ff725e04d4a1701090310296e0a2a0b6a4a90f54b4c6abd8caa886f919e8468

    SHA512

    20c9e6d4314ced963fb687ebb9ff6cde7811a5228fced14664958fc0137a1ee3c48effa1d8c393c030806ebc5e0b99eb638b357f4efcd385c3bc3cb3d0b0c729

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dsD55.exe

    Filesize

    278KB

    MD5

    5e7ad96227ac97ea047c202bab0a79dd

    SHA1

    700c285600d0d8324660dac5326eaae1b1891645

    SHA256

    1e55c8ff6e68cb300f581fd5003dd36f35835d00f9c8938a3a0eb9b7cded4875

    SHA512

    27af17d76db10679b00a15ef754ebc41e830bc4fbcd93073d1cfba416824e800da10e636bd44ce8f177281c4a706c41c9af58ea82e9db54c81d038d7b18af08f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dsD55.exe

    Filesize

    278KB

    MD5

    5e7ad96227ac97ea047c202bab0a79dd

    SHA1

    700c285600d0d8324660dac5326eaae1b1891645

    SHA256

    1e55c8ff6e68cb300f581fd5003dd36f35835d00f9c8938a3a0eb9b7cded4875

    SHA512

    27af17d76db10679b00a15ef754ebc41e830bc4fbcd93073d1cfba416824e800da10e636bd44ce8f177281c4a706c41c9af58ea82e9db54c81d038d7b18af08f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ncq43Fr.exe

    Filesize

    175KB

    MD5

    dd0c9e110c68ce1fa5308979ef718f7b

    SHA1

    473deb8069f0841d47b74b7f414dacc6f96eca78

    SHA256

    dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3

    SHA512

    29bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ncq43Fr.exe

    Filesize

    175KB

    MD5

    dd0c9e110c68ce1fa5308979ef718f7b

    SHA1

    473deb8069f0841d47b74b7f414dacc6f96eca78

    SHA256

    dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3

    SHA512

    29bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236

  • memory/968-409-0x0000000000B50000-0x0000000000B5A000-memory.dmp

    Filesize

    40KB

  • memory/2124-176-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2124-180-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2124-178-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2124-177-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2124-175-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2124-174-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2124-173-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2124-172-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2124-179-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2124-171-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2124-170-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2124-168-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2124-167-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2124-166-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2124-165-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2124-164-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2124-163-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2124-181-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2504-271-0x0000000000A12000-0x0000000000A41000-memory.dmp

    Filesize

    188KB

  • memory/2504-319-0x0000000000400000-0x0000000000763000-memory.dmp

    Filesize

    3.4MB

  • memory/2504-318-0x0000000000A12000-0x0000000000A41000-memory.dmp

    Filesize

    188KB

  • memory/2504-313-0x0000000000A12000-0x0000000000A41000-memory.dmp

    Filesize

    188KB

  • memory/2504-310-0x0000000006A40000-0x0000000006F6C000-memory.dmp

    Filesize

    5.2MB

  • memory/2504-309-0x0000000006850000-0x0000000006A12000-memory.dmp

    Filesize

    1.8MB

  • memory/2504-308-0x0000000006690000-0x00000000066E0000-memory.dmp

    Filesize

    320KB

  • memory/2504-307-0x0000000006600000-0x0000000006676000-memory.dmp

    Filesize

    472KB

  • memory/2504-299-0x0000000005920000-0x0000000005986000-memory.dmp

    Filesize

    408KB

  • memory/2504-297-0x0000000005880000-0x0000000005912000-memory.dmp

    Filesize

    584KB

  • memory/2504-293-0x00000000056F0000-0x000000000573B000-memory.dmp

    Filesize

    300KB

  • memory/2504-291-0x0000000004F80000-0x0000000004FBE000-memory.dmp

    Filesize

    248KB

  • memory/2504-289-0x0000000004F60000-0x0000000004F72000-memory.dmp

    Filesize

    72KB

  • memory/2504-287-0x00000000054D0000-0x00000000055DA000-memory.dmp

    Filesize

    1.0MB

  • memory/2504-286-0x0000000005AE0000-0x00000000060E6000-memory.dmp

    Filesize

    6.0MB

  • memory/2504-274-0x0000000004E80000-0x0000000004EC4000-memory.dmp

    Filesize

    272KB

  • memory/2504-275-0x0000000000400000-0x0000000000763000-memory.dmp

    Filesize

    3.4MB

  • memory/2504-273-0x00000000022B0000-0x00000000022FB000-memory.dmp

    Filesize

    300KB

  • memory/2504-270-0x0000000004FD0000-0x00000000054CE000-memory.dmp

    Filesize

    5.0MB

  • memory/2504-266-0x0000000004E00000-0x0000000004E46000-memory.dmp

    Filesize

    280KB

  • memory/2728-143-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-160-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-138-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-137-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-136-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-135-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-134-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-133-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-132-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-131-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-130-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-129-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-128-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-127-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-126-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-125-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-124-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-140-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-123-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-122-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-141-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-142-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-115-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-145-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-144-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-139-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-159-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-158-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-157-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-156-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-153-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-155-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-154-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-152-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-151-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-150-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-149-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-148-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-147-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-146-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-116-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-121-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-120-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-117-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-118-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/2728-119-0x0000000077100000-0x000000007728E000-memory.dmp

    Filesize

    1.6MB

  • memory/3660-386-0x0000000004A90000-0x0000000004ADB000-memory.dmp

    Filesize

    300KB

  • memory/3660-370-0x0000000000040000-0x0000000000072000-memory.dmp

    Filesize

    200KB