Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/02/2023, 18:05

General

  • Target

    02c2b3554b00011f85350ee794b5291018e577b0864500edab614773f2cde4b6.exe

  • Size

    998KB

  • MD5

    761f4dedc9befed167365b92a33eec42

  • SHA1

    00ba73d2d6be4b92eacaae4bf5c7811f7a0c9ebe

  • SHA256

    02c2b3554b00011f85350ee794b5291018e577b0864500edab614773f2cde4b6

  • SHA512

    69999613d16791702359dfd040e30750c3d3f64a15598fffa729b6b8dd2e0e616c2836afaa0142be36597c6b29ab6985f84297bdfc1e62007dee37c662580e90

  • SSDEEP

    24576:3yuuWaZbLNmyJnT4jVqCKe9hfLA4F0L3leyB34Tzk04FliBp8Wj4eGu:CYaZbLNbTOpT04F0x3KHk0WliBpE

Malware Config

Extracted

Family

redline

Botnet

dubka

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5a9421183a033f283b2f23139b471f0

Extracted

Family

redline

Botnet

nock

C2

176.113.115.17:4132

Attributes
  • auth_value

    f32d3c6ff0a9a7632c60a2b045a9cde6

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 3 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 8 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02c2b3554b00011f85350ee794b5291018e577b0864500edab614773f2cde4b6.exe
    "C:\Users\Admin\AppData\Local\Temp\02c2b3554b00011f85350ee794b5291018e577b0864500edab614773f2cde4b6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dDa7090.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dDa7090.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4580
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dqv5613.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dqv5613.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3796
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dlk3409.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dlk3409.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of WriteProcessMemory
          PID:1840
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\kxS31pc.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\kxS31pc.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4960
          • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mfb92or.exe
            C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mfb92or.exe
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Executes dropped EXE
            • Windows security modification
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4800
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 1092
              6⤵
              • Program crash
              PID:1612
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nRJ30GW.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nRJ30GW.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2296
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oUX27Pf.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oUX27Pf.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3044
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 1980
          4⤵
          • Program crash
          PID:3864
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pjY33vh.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pjY33vh.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:852
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4800 -ip 4800
    1⤵
      PID:2156
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3044 -ip 3044
      1⤵
        PID:4608

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dDa7090.exe

        Filesize

        855KB

        MD5

        a3e8f2975b470c865e57f6e77ea42592

        SHA1

        97f87966ca38ee6a6c160e5aa882590c1ccd6ad9

        SHA256

        48ab0a894bca18b8926228fdecd79f9c85cfe563fa26b2f5878c5fda3cfc5f45

        SHA512

        0bfdc22673163e662869861d1e34eb146daf16f668d4847579ed63f9e22e201c10cc04e6ed568810e4d3af8cb38e786185132638fe821c15e06c221516cae53a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dDa7090.exe

        Filesize

        855KB

        MD5

        a3e8f2975b470c865e57f6e77ea42592

        SHA1

        97f87966ca38ee6a6c160e5aa882590c1ccd6ad9

        SHA256

        48ab0a894bca18b8926228fdecd79f9c85cfe563fa26b2f5878c5fda3cfc5f45

        SHA512

        0bfdc22673163e662869861d1e34eb146daf16f668d4847579ed63f9e22e201c10cc04e6ed568810e4d3af8cb38e786185132638fe821c15e06c221516cae53a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pjY33vh.exe

        Filesize

        175KB

        MD5

        8f2223375414f5a6708a342a1efb714e

        SHA1

        b9342d91cef91c550ec054e4ef8ad8a8785f06a0

        SHA256

        38a3186a175d2d3a7f9216f6b8df67264f1a38d320547b7016d4d2f9ad2b845e

        SHA512

        1af0d38a90d91ec07fd91a89cff7997c6159ad2c5bbed1ac8cd90a364f99766c3a01787713699414801b6f00bbfa5bb30ae66dee98b71628f019b78dee7a368e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pjY33vh.exe

        Filesize

        175KB

        MD5

        8f2223375414f5a6708a342a1efb714e

        SHA1

        b9342d91cef91c550ec054e4ef8ad8a8785f06a0

        SHA256

        38a3186a175d2d3a7f9216f6b8df67264f1a38d320547b7016d4d2f9ad2b845e

        SHA512

        1af0d38a90d91ec07fd91a89cff7997c6159ad2c5bbed1ac8cd90a364f99766c3a01787713699414801b6f00bbfa5bb30ae66dee98b71628f019b78dee7a368e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dqv5613.exe

        Filesize

        500KB

        MD5

        6fa34fa9058cd1ebf8c0669c71a61d47

        SHA1

        853b0fdbd97211ae1dad759d4b41a4f19f4cf814

        SHA256

        dcb7bd814ecbfb07efefd3dcc4804689debcfc7fc5d3e1141929142d59c38a22

        SHA512

        f5f1835e337c3613583c40237187a966edeb5c06874378520f333d27f2cd9d0bed3e89a1fc0108b0b47a6939dd16638f850d6f5431403db5186810a6af0b2665

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dqv5613.exe

        Filesize

        500KB

        MD5

        6fa34fa9058cd1ebf8c0669c71a61d47

        SHA1

        853b0fdbd97211ae1dad759d4b41a4f19f4cf814

        SHA256

        dcb7bd814ecbfb07efefd3dcc4804689debcfc7fc5d3e1141929142d59c38a22

        SHA512

        f5f1835e337c3613583c40237187a966edeb5c06874378520f333d27f2cd9d0bed3e89a1fc0108b0b47a6939dd16638f850d6f5431403db5186810a6af0b2665

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oUX27Pf.exe

        Filesize

        352KB

        MD5

        fc3006f1b5df63326089259d4f7d0fff

        SHA1

        c68532029806e0fc7ed44e454103479fe1be1c99

        SHA256

        7b6411a926d73dd34d26b7dc832594685e84cfa11d56558c52668d10539b9d32

        SHA512

        115d8ae61b659e105bd386615f3f8ef6a78cca9268b2319aa632b06f6342b62f096a9343ed4642e6d4b2c14f5796be1aedb84183bc77faffa7b64e4ec1912463

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\oUX27Pf.exe

        Filesize

        352KB

        MD5

        fc3006f1b5df63326089259d4f7d0fff

        SHA1

        c68532029806e0fc7ed44e454103479fe1be1c99

        SHA256

        7b6411a926d73dd34d26b7dc832594685e84cfa11d56558c52668d10539b9d32

        SHA512

        115d8ae61b659e105bd386615f3f8ef6a78cca9268b2319aa632b06f6342b62f096a9343ed4642e6d4b2c14f5796be1aedb84183bc77faffa7b64e4ec1912463

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dlk3409.exe

        Filesize

        355KB

        MD5

        3e192e82a7bd18174739293e76179929

        SHA1

        81ff251cb2a48f0accf0720c5a06854046fc38ec

        SHA256

        b1d7e0d57c02f5b6b2058e7e6a799024ad709af024e67da23fa377e6422c1422

        SHA512

        3b7b9ef31d806877cb71f284e79822a3d3773f9f384ddf3179a3dc11a5e6c853d0c713eacabf4f676b02c869d35032e835fd9413315dbee64b697832f2a87dec

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dlk3409.exe

        Filesize

        355KB

        MD5

        3e192e82a7bd18174739293e76179929

        SHA1

        81ff251cb2a48f0accf0720c5a06854046fc38ec

        SHA256

        b1d7e0d57c02f5b6b2058e7e6a799024ad709af024e67da23fa377e6422c1422

        SHA512

        3b7b9ef31d806877cb71f284e79822a3d3773f9f384ddf3179a3dc11a5e6c853d0c713eacabf4f676b02c869d35032e835fd9413315dbee64b697832f2a87dec

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nRJ30GW.exe

        Filesize

        175KB

        MD5

        dd0c9e110c68ce1fa5308979ef718f7b

        SHA1

        473deb8069f0841d47b74b7f414dacc6f96eca78

        SHA256

        dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3

        SHA512

        29bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nRJ30GW.exe

        Filesize

        175KB

        MD5

        dd0c9e110c68ce1fa5308979ef718f7b

        SHA1

        473deb8069f0841d47b74b7f414dacc6f96eca78

        SHA256

        dc28c9d9ab3f30222ed59f3991c5981bec40604e725ece488d8599eef917a7b3

        SHA512

        29bd76da816b13b31c938a3f8699d2f5942a24c9ef61fddcac490e0a30f82c1a4a76ca9a6866a8d2c8e57566f66b3aea31e7f70646d3ebef63c63a06f8fe2236

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\kxS31pc.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\kxS31pc.exe

        Filesize

        11KB

        MD5

        7e93bacbbc33e6652e147e7fe07572a0

        SHA1

        421a7167da01c8da4dc4d5234ca3dd84e319e762

        SHA256

        850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38

        SHA512

        250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mfb92or.exe

        Filesize

        295KB

        MD5

        304766f61a677814af31d2737d118b6f

        SHA1

        213a7e70d4f7d13e17ddff12152bcfe2c1cc2de4

        SHA256

        07c33396ed7ec1b40808aae921c50c552dc21b08beabbd5541b9fc9f062e08ac

        SHA512

        08c9202e988e4f6518a14f37b19eefc8b5901a2c07472140303c48535b67830e956759db3738b3bf63559220cb1e59f8045a2fad5d84530e9cb2e670740441ea

      • C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\mfb92or.exe

        Filesize

        295KB

        MD5

        304766f61a677814af31d2737d118b6f

        SHA1

        213a7e70d4f7d13e17ddff12152bcfe2c1cc2de4

        SHA256

        07c33396ed7ec1b40808aae921c50c552dc21b08beabbd5541b9fc9f062e08ac

        SHA512

        08c9202e988e4f6518a14f37b19eefc8b5901a2c07472140303c48535b67830e956759db3738b3bf63559220cb1e59f8045a2fad5d84530e9cb2e670740441ea

      • memory/852-182-0x00000000007A0000-0x00000000007D2000-memory.dmp

        Filesize

        200KB

      • memory/2296-164-0x0000000004CA0000-0x0000000004CDC000-memory.dmp

        Filesize

        240KB

      • memory/2296-163-0x0000000004C40000-0x0000000004C52000-memory.dmp

        Filesize

        72KB

      • memory/2296-170-0x0000000006BE0000-0x000000000710C000-memory.dmp

        Filesize

        5.2MB

      • memory/2296-169-0x00000000064E0000-0x00000000066A2000-memory.dmp

        Filesize

        1.8MB

      • memory/2296-168-0x0000000005D00000-0x0000000005D50000-memory.dmp

        Filesize

        320KB

      • memory/2296-167-0x0000000005C80000-0x0000000005CF6000-memory.dmp

        Filesize

        472KB

      • memory/2296-166-0x0000000005110000-0x0000000005176000-memory.dmp

        Filesize

        408KB

      • memory/2296-165-0x00000000057B0000-0x0000000005842000-memory.dmp

        Filesize

        584KB

      • memory/2296-160-0x0000000000270000-0x00000000002A2000-memory.dmp

        Filesize

        200KB

      • memory/2296-161-0x0000000005190000-0x00000000057A8000-memory.dmp

        Filesize

        6.1MB

      • memory/2296-162-0x0000000004D10000-0x0000000004E1A000-memory.dmp

        Filesize

        1.0MB

      • memory/3044-178-0x0000000000400000-0x00000000005D4000-memory.dmp

        Filesize

        1.8MB

      • memory/3044-177-0x0000000000734000-0x0000000000762000-memory.dmp

        Filesize

        184KB

      • memory/3044-175-0x0000000002230000-0x000000000227B000-memory.dmp

        Filesize

        300KB

      • memory/3044-176-0x0000000000400000-0x00000000005D4000-memory.dmp

        Filesize

        1.8MB

      • memory/3044-174-0x0000000000734000-0x0000000000762000-memory.dmp

        Filesize

        184KB

      • memory/4800-155-0x0000000000814000-0x0000000000834000-memory.dmp

        Filesize

        128KB

      • memory/4800-156-0x0000000000400000-0x00000000005C6000-memory.dmp

        Filesize

        1.8MB

      • memory/4800-154-0x0000000000814000-0x0000000000834000-memory.dmp

        Filesize

        128KB

      • memory/4800-153-0x0000000004C60000-0x0000000005204000-memory.dmp

        Filesize

        5.6MB

      • memory/4800-152-0x0000000000400000-0x00000000005C6000-memory.dmp

        Filesize

        1.8MB

      • memory/4800-151-0x0000000000650000-0x000000000067D000-memory.dmp

        Filesize

        180KB

      • memory/4800-150-0x0000000000814000-0x0000000000834000-memory.dmp

        Filesize

        128KB

      • memory/4960-146-0x00007FFF253E0000-0x00007FFF25EA1000-memory.dmp

        Filesize

        10.8MB

      • memory/4960-145-0x00007FFF253E0000-0x00007FFF25EA1000-memory.dmp

        Filesize

        10.8MB

      • memory/4960-144-0x0000000000980000-0x000000000098A000-memory.dmp

        Filesize

        40KB