Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    53s
  • max time network
    141s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16/02/2023, 22:45

General

  • Target

    9b23afb0366b7438c5179dbbe679c95959ccad51d2e469699ef47379bc5221b0.exe

  • Size

    499KB

  • MD5

    474bb59c2e0fd4304a48dbaf46fbccc6

  • SHA1

    31760d6126e93995c513281f6a4c9e6fcebda08b

  • SHA256

    9b23afb0366b7438c5179dbbe679c95959ccad51d2e469699ef47379bc5221b0

  • SHA512

    1bd1b45b3371e399ad214ea233b16a5a939f402a91906db08070d8e8aa60470332e97b99d6c3ee8729b71a84f0065c278416b03c0a33f4103f0bd6acc0f58d16

  • SSDEEP

    6144:KPy+bnr+3p0yN90QEO20+ZGcGtuZnSSoTkeuYFBITaHOXHH6zhv2VSvYxvgrIJxh:tMr3y906+ZecSXwaUahrvS3JxjgoEu/

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 10 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b23afb0366b7438c5179dbbe679c95959ccad51d2e469699ef47379bc5221b0.exe
    "C:\Users\Admin\AppData\Local\Temp\9b23afb0366b7438c5179dbbe679c95959ccad51d2e469699ef47379bc5221b0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1744
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nEm75qt94.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nEm75qt94.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4592
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dGA36JC.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dGA36JC.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2696
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ePq90dg.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ePq90dg.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2712
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fwY73RT.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fwY73RT.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3860

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fwY73RT.exe

    Filesize

    175KB

    MD5

    a5f5c5d6291c7ae9e1d1b7ed1e551490

    SHA1

    3d06413341893b838549939e15f8f1eec423d71a

    SHA256

    1a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e

    SHA512

    d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fwY73RT.exe

    Filesize

    175KB

    MD5

    a5f5c5d6291c7ae9e1d1b7ed1e551490

    SHA1

    3d06413341893b838549939e15f8f1eec423d71a

    SHA256

    1a09ce1cb64219a5d88e57845dc9ba6631efa06fccc8867ccf94eb132947563e

    SHA512

    d9b3ba67bdd615ee2ce91a29cd9cf6723464be27bf45186fd0e9559ff2b0e7c51b423cfc3e32b5e90955046fb75a34c4a8528df7294b6c831ca254a65d2b8ba2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nEm75qt94.exe

    Filesize

    355KB

    MD5

    c195c243ab01b17a8c7f4e9d1819e82d

    SHA1

    829069c3e883cc7597542ce03f5e4eee3c2dfe32

    SHA256

    f81b76c44395a78329c6a5068c2703bda2f6462eee6bb4a97f31cdaf622937dd

    SHA512

    5191f9cbcd333aa411b0e0348865fdcf0b88de713e8ae95b445b9825f5b1ecfa5b00129a4f644efb6fbe5c05be0aa555b2622dae2c0fde7670a3ed1404ddb294

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nEm75qt94.exe

    Filesize

    355KB

    MD5

    c195c243ab01b17a8c7f4e9d1819e82d

    SHA1

    829069c3e883cc7597542ce03f5e4eee3c2dfe32

    SHA256

    f81b76c44395a78329c6a5068c2703bda2f6462eee6bb4a97f31cdaf622937dd

    SHA512

    5191f9cbcd333aa411b0e0348865fdcf0b88de713e8ae95b445b9825f5b1ecfa5b00129a4f644efb6fbe5c05be0aa555b2622dae2c0fde7670a3ed1404ddb294

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dGA36JC.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dGA36JC.exe

    Filesize

    11KB

    MD5

    7e93bacbbc33e6652e147e7fe07572a0

    SHA1

    421a7167da01c8da4dc4d5234ca3dd84e319e762

    SHA256

    850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

    SHA512

    250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ePq90dg.exe

    Filesize

    295KB

    MD5

    b56f1bee1d520634cb38ac5b0c935a46

    SHA1

    ce066e6f10053af6d61cf4f0c1b25359537f286c

    SHA256

    07afc589fecdfc24ae8baa51a0374074cda4c4b14a8d33b7a8313ad0f5e47b93

    SHA512

    81cfd8b880aac14959eb7b282cfe4f44a473482eeb0c955c8dbd962fc25978ad07a1355848560f3f5def0f4116d2aae7c7c7f8902850a2a3bc3b6cc135d51c34

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ePq90dg.exe

    Filesize

    295KB

    MD5

    b56f1bee1d520634cb38ac5b0c935a46

    SHA1

    ce066e6f10053af6d61cf4f0c1b25359537f286c

    SHA256

    07afc589fecdfc24ae8baa51a0374074cda4c4b14a8d33b7a8313ad0f5e47b93

    SHA512

    81cfd8b880aac14959eb7b282cfe4f44a473482eeb0c955c8dbd962fc25978ad07a1355848560f3f5def0f4116d2aae7c7c7f8902850a2a3bc3b6cc135d51c34

  • memory/1744-145-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-155-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-126-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-127-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-128-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-129-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-130-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-131-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-132-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-133-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-134-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-123-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-138-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-139-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-141-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-143-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-116-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-146-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-148-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-151-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-153-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-152-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-150-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-149-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-147-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-144-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-142-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-140-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-137-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-136-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-117-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-157-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-158-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-159-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-160-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-118-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-119-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-120-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-121-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-122-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-135-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-124-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-161-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-156-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-125-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/1744-154-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-214-0x00000000003F0000-0x00000000003FA000-memory.dmp

    Filesize

    40KB

  • memory/2712-284-0x00000000008A2000-0x00000000008C2000-memory.dmp

    Filesize

    128KB

  • memory/2712-285-0x0000000000730000-0x000000000087A000-memory.dmp

    Filesize

    1.3MB

  • memory/2712-286-0x00000000008A2000-0x00000000008C2000-memory.dmp

    Filesize

    128KB

  • memory/2712-272-0x0000000002370000-0x000000000238A000-memory.dmp

    Filesize

    104KB

  • memory/2712-280-0x00000000008A2000-0x00000000008C2000-memory.dmp

    Filesize

    128KB

  • memory/2712-287-0x0000000000400000-0x00000000005E3000-memory.dmp

    Filesize

    1.9MB

  • memory/2712-281-0x0000000000730000-0x000000000087A000-memory.dmp

    Filesize

    1.3MB

  • memory/2712-282-0x0000000000400000-0x00000000005E3000-memory.dmp

    Filesize

    1.9MB

  • memory/2712-276-0x0000000004D40000-0x000000000523E000-memory.dmp

    Filesize

    5.0MB

  • memory/2712-278-0x00000000025B0000-0x00000000025C8000-memory.dmp

    Filesize

    96KB

  • memory/3860-362-0x0000000005200000-0x0000000005292000-memory.dmp

    Filesize

    584KB

  • memory/3860-351-0x00000000053D0000-0x00000000059D6000-memory.dmp

    Filesize

    6.0MB

  • memory/3860-338-0x00000000004B0000-0x00000000004E2000-memory.dmp

    Filesize

    200KB

  • memory/3860-352-0x0000000004F20000-0x000000000502A000-memory.dmp

    Filesize

    1.0MB

  • memory/3860-354-0x0000000004E50000-0x0000000004E62000-memory.dmp

    Filesize

    72KB

  • memory/3860-358-0x0000000005030000-0x000000000507B000-memory.dmp

    Filesize

    300KB

  • memory/3860-365-0x00000000052A0000-0x0000000005306000-memory.dmp

    Filesize

    408KB

  • memory/3860-373-0x00000000067B0000-0x0000000006972000-memory.dmp

    Filesize

    1.8MB

  • memory/3860-374-0x0000000006EB0000-0x00000000073DC000-memory.dmp

    Filesize

    5.2MB

  • memory/3860-356-0x0000000004EB0000-0x0000000004EEE000-memory.dmp

    Filesize

    248KB

  • memory/3860-378-0x00000000066F0000-0x0000000006766000-memory.dmp

    Filesize

    472KB

  • memory/3860-379-0x0000000006980000-0x00000000069D0000-memory.dmp

    Filesize

    320KB

  • memory/4592-180-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/4592-168-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/4592-165-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/4592-164-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/4592-166-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/4592-169-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/4592-167-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/4592-182-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/4592-181-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/4592-179-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/4592-178-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/4592-177-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/4592-176-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/4592-175-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/4592-174-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/4592-173-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/4592-172-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB

  • memory/4592-171-0x00000000770F0000-0x000000007727E000-memory.dmp

    Filesize

    1.6MB