Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    53s
  • max time network
    56s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01/03/2023, 22:46

General

  • Target

    6ed06c00d438af99291af71ac8b83cc6c738183a392994c30bf52374fd04d864.exe

  • Size

    535KB

  • MD5

    5c487bd685db4d64b7f522d4414ef887

  • SHA1

    8dcac6e13d9df12ccf8bd57bd3468452b23a1e14

  • SHA256

    6ed06c00d438af99291af71ac8b83cc6c738183a392994c30bf52374fd04d864

  • SHA512

    197a557c3a23439fc87278bf55749715b3b700b4b83aed18db1aeae967c0578efb00e1798a9883e3cc0a8984808abfe830e2e496f02d1df737cc2f1f453d28f9

  • SSDEEP

    12288:5MrFy90/b9ww49kVMwVTV76hC2Z/JDE16s9JE8zU+6K7Oxz:8yWbipWVMwVh6bZEdE8aKW

Malware Config

Extracted

Family

redline

Botnet

rouch

C2

193.56.146.11:4162

Attributes
  • auth_value

    1b1735bcfc122c708eae27ca352568de

Extracted

Family

redline

Botnet

fuba

C2

193.56.146.11:4162

Attributes
  • auth_value

    43015841fc23c63b15ca6ffe1d278d5e

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 36 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ed06c00d438af99291af71ac8b83cc6c738183a392994c30bf52374fd04d864.exe
    "C:\Users\Admin\AppData\Local\Temp\6ed06c00d438af99291af71ac8b83cc6c738183a392994c30bf52374fd04d864.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3520
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmu3035dV.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmu3035dV.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4076
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw23OG64OS34.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw23OG64OS34.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4680
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tas80GS15.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tas80GS15.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:348
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uOR69FF49.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uOR69FF49.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4700

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uOR69FF49.exe

    Filesize

    175KB

    MD5

    2a3b535749ab913d70301a13b32b7974

    SHA1

    c374d59cc4d946379f525eecaa226e8419e1da03

    SHA256

    73015e88599e40eb2c545a8334751ad90ffc6a5c1da35dd63bf98b05fcd7ca57

    SHA512

    7def2540589a2d9221a360ae6d525b964a65b4d0fc56bbe172659251db8543e966d7d89f72bdb1ab4fd114a243e67294d0000c6da764deeb19dd5fbfa90346bc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uOR69FF49.exe

    Filesize

    175KB

    MD5

    2a3b535749ab913d70301a13b32b7974

    SHA1

    c374d59cc4d946379f525eecaa226e8419e1da03

    SHA256

    73015e88599e40eb2c545a8334751ad90ffc6a5c1da35dd63bf98b05fcd7ca57

    SHA512

    7def2540589a2d9221a360ae6d525b964a65b4d0fc56bbe172659251db8543e966d7d89f72bdb1ab4fd114a243e67294d0000c6da764deeb19dd5fbfa90346bc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmu3035dV.exe

    Filesize

    391KB

    MD5

    0271de9fd30001145ae76aa8150bbbfa

    SHA1

    cc6395259d79fef1262e18648724d401b6e125c8

    SHA256

    7532a1178a8579be7b0aa729001ed312fc40a81d5d9f404514b47ee1b6c06f87

    SHA512

    c59a9aca72a5adf1de32102aaa8cf0618feb018ad71f87949d664803d162fd22714548804ad23a6c4ab49821ea76aaa7a0c9bfba19aafeae06f4778ba83b6451

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vmu3035dV.exe

    Filesize

    391KB

    MD5

    0271de9fd30001145ae76aa8150bbbfa

    SHA1

    cc6395259d79fef1262e18648724d401b6e125c8

    SHA256

    7532a1178a8579be7b0aa729001ed312fc40a81d5d9f404514b47ee1b6c06f87

    SHA512

    c59a9aca72a5adf1de32102aaa8cf0618feb018ad71f87949d664803d162fd22714548804ad23a6c4ab49821ea76aaa7a0c9bfba19aafeae06f4778ba83b6451

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw23OG64OS34.exe

    Filesize

    11KB

    MD5

    f98c592dc383dea1e57fb014e254ab32

    SHA1

    0ee773115c77af3099adc2e2cb1378feaa4768bc

    SHA256

    af3086e869cbfa48f88e61aac4f302bd9e25ec28ec647daa8264e09b5ee509a5

    SHA512

    86a06292592f1778887e152d6430e918f1215d1d77613a2c6642fb2e3e5cb98c81d923f836e25653596150a89936d8cef6bb6dd8e69aaad61d83a33079446548

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw23OG64OS34.exe

    Filesize

    11KB

    MD5

    f98c592dc383dea1e57fb014e254ab32

    SHA1

    0ee773115c77af3099adc2e2cb1378feaa4768bc

    SHA256

    af3086e869cbfa48f88e61aac4f302bd9e25ec28ec647daa8264e09b5ee509a5

    SHA512

    86a06292592f1778887e152d6430e918f1215d1d77613a2c6642fb2e3e5cb98c81d923f836e25653596150a89936d8cef6bb6dd8e69aaad61d83a33079446548

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tas80GS15.exe

    Filesize

    304KB

    MD5

    a562213cf445eaaf665759f35b4e91c2

    SHA1

    c37cb42d6b01cb56f0528499c8cb2d801176bf45

    SHA256

    457e081eb0be34e398946eda58be940aef13cd4390cb727cc848846833d307c3

    SHA512

    6944f4c08e8617f4ff143a96aeb4b4dc8c31562db7f6747bed36abb4116b540c181a5c42384505f1d059c3e3bbdf4f4ca3f74d0480b0e20efa28e1505f3b4fbd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tas80GS15.exe

    Filesize

    304KB

    MD5

    a562213cf445eaaf665759f35b4e91c2

    SHA1

    c37cb42d6b01cb56f0528499c8cb2d801176bf45

    SHA256

    457e081eb0be34e398946eda58be940aef13cd4390cb727cc848846833d307c3

    SHA512

    6944f4c08e8617f4ff143a96aeb4b4dc8c31562db7f6747bed36abb4116b540c181a5c42384505f1d059c3e3bbdf4f4ca3f74d0480b0e20efa28e1505f3b4fbd

  • memory/348-139-0x0000000000660000-0x00000000006AB000-memory.dmp

    Filesize

    300KB

  • memory/348-140-0x0000000002540000-0x0000000002586000-memory.dmp

    Filesize

    280KB

  • memory/348-141-0x0000000004C70000-0x000000000516E000-memory.dmp

    Filesize

    5.0MB

  • memory/348-142-0x0000000004AF0000-0x0000000004B34000-memory.dmp

    Filesize

    272KB

  • memory/348-143-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/348-144-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/348-146-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/348-150-0x0000000004C60000-0x0000000004C70000-memory.dmp

    Filesize

    64KB

  • memory/348-149-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/348-148-0x0000000004C60000-0x0000000004C70000-memory.dmp

    Filesize

    64KB

  • memory/348-153-0x0000000004C60000-0x0000000004C70000-memory.dmp

    Filesize

    64KB

  • memory/348-155-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/348-152-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/348-157-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/348-159-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/348-161-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/348-163-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/348-165-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/348-167-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/348-169-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/348-171-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/348-173-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/348-175-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/348-177-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/348-179-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/348-181-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/348-183-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/348-185-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/348-187-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/348-189-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/348-191-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/348-193-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/348-195-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/348-197-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/348-199-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/348-201-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/348-203-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/348-205-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/348-207-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/348-209-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/348-1052-0x0000000005780000-0x0000000005D86000-memory.dmp

    Filesize

    6.0MB

  • memory/348-1053-0x0000000005170000-0x000000000527A000-memory.dmp

    Filesize

    1.0MB

  • memory/348-1054-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/348-1055-0x0000000004C60000-0x0000000004C70000-memory.dmp

    Filesize

    64KB

  • memory/348-1056-0x0000000005280000-0x00000000052BE000-memory.dmp

    Filesize

    248KB

  • memory/348-1057-0x00000000053D0000-0x000000000541B000-memory.dmp

    Filesize

    300KB

  • memory/348-1059-0x0000000005560000-0x00000000055C6000-memory.dmp

    Filesize

    408KB

  • memory/348-1060-0x0000000006260000-0x00000000062F2000-memory.dmp

    Filesize

    584KB

  • memory/348-1061-0x0000000004C60000-0x0000000004C70000-memory.dmp

    Filesize

    64KB

  • memory/348-1062-0x0000000004C60000-0x0000000004C70000-memory.dmp

    Filesize

    64KB

  • memory/348-1063-0x0000000004C60000-0x0000000004C70000-memory.dmp

    Filesize

    64KB

  • memory/348-1064-0x0000000006560000-0x00000000065D6000-memory.dmp

    Filesize

    472KB

  • memory/348-1065-0x00000000065E0000-0x0000000006630000-memory.dmp

    Filesize

    320KB

  • memory/348-1066-0x0000000006650000-0x0000000006812000-memory.dmp

    Filesize

    1.8MB

  • memory/348-1067-0x0000000006820000-0x0000000006D4C000-memory.dmp

    Filesize

    5.2MB

  • memory/348-1068-0x0000000004C60000-0x0000000004C70000-memory.dmp

    Filesize

    64KB

  • memory/4680-133-0x0000000000C70000-0x0000000000C7A000-memory.dmp

    Filesize

    40KB

  • memory/4700-1074-0x0000000000EA0000-0x0000000000ED2000-memory.dmp

    Filesize

    200KB

  • memory/4700-1075-0x00000000058E0000-0x000000000592B000-memory.dmp

    Filesize

    300KB

  • memory/4700-1076-0x0000000005A80000-0x0000000005A90000-memory.dmp

    Filesize

    64KB