Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    131s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/03/2023, 19:48

General

  • Target

    17141babfd193ed3beb0317c7d792846d9cf9a1333a01192bbdf9ede21ab6b6d.exe

  • Size

    536KB

  • MD5

    18bdbcf38fece4a57906d1795bbae04a

  • SHA1

    f5ddce66f3a80265391ed2457708615600d067fb

  • SHA256

    17141babfd193ed3beb0317c7d792846d9cf9a1333a01192bbdf9ede21ab6b6d

  • SHA512

    871888fdd94fba3a0c7c5fc38302d1d8fb5c97ae96dff43a27b4d123868691b00f9ee712b01b044af841f2d02f02c2b34e208260a1e2a510e82517eaeb7db7d3

  • SSDEEP

    12288:MMrEy90P0EyDyR9ZEpPzumd5+1CGgrDPhZBkYMgVZ2HARO:AyYLyg9WpPKF0Ggho/2oHL

Malware Config

Extracted

Family

redline

Botnet

rouch

C2

193.56.146.11:4162

Attributes
  • auth_value

    1b1735bcfc122c708eae27ca352568de

Extracted

Family

redline

Botnet

fuba

C2

193.56.146.11:4162

Attributes
  • auth_value

    43015841fc23c63b15ca6ffe1d278d5e

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 2 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\17141babfd193ed3beb0317c7d792846d9cf9a1333a01192bbdf9ede21ab6b6d.exe
    "C:\Users\Admin\AppData\Local\Temp\17141babfd193ed3beb0317c7d792846d9cf9a1333a01192bbdf9ede21ab6b6d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4016
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vAs2743SP.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vAs2743SP.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4384
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw10Hv93ep40.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw10Hv93ep40.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4552
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tzj48qZ90.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tzj48qZ90.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:220
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 220 -s 1564
          4⤵
          • Program crash
          PID:3992
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uKT77Qp63.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uKT77Qp63.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4948
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k netsvcs -p
    1⤵
    • Drops file in System32 directory
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:3900
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 220 -ip 220
    1⤵
      PID:3920

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uKT77Qp63.exe

      Filesize

      175KB

      MD5

      b92a503e97092213bbe657a1664fec0d

      SHA1

      22a91428d88811969a5a2d43f5a91b795227e1ce

      SHA256

      82fef8f38d7f481bd2cdb3c7906ce237b103a14a001357da7fa3cfe2265d544c

      SHA512

      8c045dbb3c6b7e79ee97e21a40b004bd3bd896b6d7ee11f405df048ae62268afd76757a7e450c9f5114f4736705156531502a0caf9fbe19b191550be7f7399b3

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uKT77Qp63.exe

      Filesize

      175KB

      MD5

      b92a503e97092213bbe657a1664fec0d

      SHA1

      22a91428d88811969a5a2d43f5a91b795227e1ce

      SHA256

      82fef8f38d7f481bd2cdb3c7906ce237b103a14a001357da7fa3cfe2265d544c

      SHA512

      8c045dbb3c6b7e79ee97e21a40b004bd3bd896b6d7ee11f405df048ae62268afd76757a7e450c9f5114f4736705156531502a0caf9fbe19b191550be7f7399b3

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vAs2743SP.exe

      Filesize

      391KB

      MD5

      a0fa9bab62b925c470a23260aefaec2b

      SHA1

      44533ed0a378f3975d18bbe0bf1cd9f84b5f91ff

      SHA256

      58b08c9cac4089e388f9b36752377a37498aeb815f54c649e341c55188968e49

      SHA512

      229fcc190c7581c0ce92dfd102534710fccaf2a3e94519d3c206102101e161066971fd57d41f10f2909bb824377e77de60f00c5bba8271fb5540fe8f3ab8d183

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vAs2743SP.exe

      Filesize

      391KB

      MD5

      a0fa9bab62b925c470a23260aefaec2b

      SHA1

      44533ed0a378f3975d18bbe0bf1cd9f84b5f91ff

      SHA256

      58b08c9cac4089e388f9b36752377a37498aeb815f54c649e341c55188968e49

      SHA512

      229fcc190c7581c0ce92dfd102534710fccaf2a3e94519d3c206102101e161066971fd57d41f10f2909bb824377e77de60f00c5bba8271fb5540fe8f3ab8d183

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw10Hv93ep40.exe

      Filesize

      11KB

      MD5

      30edfc9cc65763308cca008074b2b8e9

      SHA1

      820a638f4acdb4c9c0400349b2f9434afb852ff9

      SHA256

      226e5d807dd6a8f4d2dff71e4e607a803ee2b3bb1ae03ea517c588128a9d6002

      SHA512

      566b5971902b9e1c9766a79f5e87797493d7d9081d8866815bc1c7323387250d1ce1053ca50d720a2e5149641f802896ab61efdb035c9290c42913d948cfd284

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw10Hv93ep40.exe

      Filesize

      11KB

      MD5

      30edfc9cc65763308cca008074b2b8e9

      SHA1

      820a638f4acdb4c9c0400349b2f9434afb852ff9

      SHA256

      226e5d807dd6a8f4d2dff71e4e607a803ee2b3bb1ae03ea517c588128a9d6002

      SHA512

      566b5971902b9e1c9766a79f5e87797493d7d9081d8866815bc1c7323387250d1ce1053ca50d720a2e5149641f802896ab61efdb035c9290c42913d948cfd284

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tzj48qZ90.exe

      Filesize

      303KB

      MD5

      003ebed48d2fda6c315c683d32b6a6dc

      SHA1

      677088017218065e750a178b68fe2388ac74920a

      SHA256

      0fddb3cac884f8ec784d8b989c3be838bab6db5d0c031deffe70950044a1d88c

      SHA512

      26666394d314e9d1ee3e9cbc667fd4905523c8613eded7b399a7a53ee1dc738220414456e7396ed0ad3b4be4206feeca053b83d24005c8090b9c7744125ba72d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tzj48qZ90.exe

      Filesize

      303KB

      MD5

      003ebed48d2fda6c315c683d32b6a6dc

      SHA1

      677088017218065e750a178b68fe2388ac74920a

      SHA256

      0fddb3cac884f8ec784d8b989c3be838bab6db5d0c031deffe70950044a1d88c

      SHA512

      26666394d314e9d1ee3e9cbc667fd4905523c8613eded7b399a7a53ee1dc738220414456e7396ed0ad3b4be4206feeca053b83d24005c8090b9c7744125ba72d

    • memory/220-155-0x00000000020D0000-0x000000000211B000-memory.dmp

      Filesize

      300KB

    • memory/220-156-0x0000000002470000-0x0000000002480000-memory.dmp

      Filesize

      64KB

    • memory/220-157-0x0000000002470000-0x0000000002480000-memory.dmp

      Filesize

      64KB

    • memory/220-158-0x0000000004C40000-0x00000000051E4000-memory.dmp

      Filesize

      5.6MB

    • memory/220-159-0x0000000002750000-0x000000000278E000-memory.dmp

      Filesize

      248KB

    • memory/220-160-0x0000000002750000-0x000000000278E000-memory.dmp

      Filesize

      248KB

    • memory/220-164-0x0000000002750000-0x000000000278E000-memory.dmp

      Filesize

      248KB

    • memory/220-162-0x0000000002750000-0x000000000278E000-memory.dmp

      Filesize

      248KB

    • memory/220-166-0x0000000002750000-0x000000000278E000-memory.dmp

      Filesize

      248KB

    • memory/220-168-0x0000000002750000-0x000000000278E000-memory.dmp

      Filesize

      248KB

    • memory/220-170-0x0000000002750000-0x000000000278E000-memory.dmp

      Filesize

      248KB

    • memory/220-172-0x0000000002750000-0x000000000278E000-memory.dmp

      Filesize

      248KB

    • memory/220-174-0x0000000002750000-0x000000000278E000-memory.dmp

      Filesize

      248KB

    • memory/220-176-0x0000000002750000-0x000000000278E000-memory.dmp

      Filesize

      248KB

    • memory/220-178-0x0000000002750000-0x000000000278E000-memory.dmp

      Filesize

      248KB

    • memory/220-180-0x0000000002750000-0x000000000278E000-memory.dmp

      Filesize

      248KB

    • memory/220-182-0x0000000002750000-0x000000000278E000-memory.dmp

      Filesize

      248KB

    • memory/220-184-0x0000000002750000-0x000000000278E000-memory.dmp

      Filesize

      248KB

    • memory/220-186-0x0000000002750000-0x000000000278E000-memory.dmp

      Filesize

      248KB

    • memory/220-188-0x0000000002750000-0x000000000278E000-memory.dmp

      Filesize

      248KB

    • memory/220-190-0x0000000002750000-0x000000000278E000-memory.dmp

      Filesize

      248KB

    • memory/220-192-0x0000000002750000-0x000000000278E000-memory.dmp

      Filesize

      248KB

    • memory/220-194-0x0000000002750000-0x000000000278E000-memory.dmp

      Filesize

      248KB

    • memory/220-196-0x0000000002750000-0x000000000278E000-memory.dmp

      Filesize

      248KB

    • memory/220-198-0x0000000002750000-0x000000000278E000-memory.dmp

      Filesize

      248KB

    • memory/220-200-0x0000000002750000-0x000000000278E000-memory.dmp

      Filesize

      248KB

    • memory/220-202-0x0000000002750000-0x000000000278E000-memory.dmp

      Filesize

      248KB

    • memory/220-206-0x0000000002750000-0x000000000278E000-memory.dmp

      Filesize

      248KB

    • memory/220-208-0x0000000002750000-0x000000000278E000-memory.dmp

      Filesize

      248KB

    • memory/220-204-0x0000000002750000-0x000000000278E000-memory.dmp

      Filesize

      248KB

    • memory/220-210-0x0000000002750000-0x000000000278E000-memory.dmp

      Filesize

      248KB

    • memory/220-212-0x0000000002750000-0x000000000278E000-memory.dmp

      Filesize

      248KB

    • memory/220-214-0x0000000002750000-0x000000000278E000-memory.dmp

      Filesize

      248KB

    • memory/220-216-0x0000000002750000-0x000000000278E000-memory.dmp

      Filesize

      248KB

    • memory/220-218-0x0000000002750000-0x000000000278E000-memory.dmp

      Filesize

      248KB

    • memory/220-220-0x0000000002750000-0x000000000278E000-memory.dmp

      Filesize

      248KB

    • memory/220-222-0x0000000002750000-0x000000000278E000-memory.dmp

      Filesize

      248KB

    • memory/220-1065-0x00000000052F0000-0x0000000005908000-memory.dmp

      Filesize

      6.1MB

    • memory/220-1066-0x0000000005970000-0x0000000005A7A000-memory.dmp

      Filesize

      1.0MB

    • memory/220-1067-0x0000000005AB0000-0x0000000005AC2000-memory.dmp

      Filesize

      72KB

    • memory/220-1068-0x0000000005AD0000-0x0000000005B0C000-memory.dmp

      Filesize

      240KB

    • memory/220-1069-0x0000000002470000-0x0000000002480000-memory.dmp

      Filesize

      64KB

    • memory/220-1071-0x0000000002470000-0x0000000002480000-memory.dmp

      Filesize

      64KB

    • memory/220-1072-0x0000000005DC0000-0x0000000005E26000-memory.dmp

      Filesize

      408KB

    • memory/220-1073-0x0000000006480000-0x0000000006512000-memory.dmp

      Filesize

      584KB

    • memory/220-1074-0x0000000006580000-0x0000000006742000-memory.dmp

      Filesize

      1.8MB

    • memory/220-1075-0x0000000006750000-0x0000000006C7C000-memory.dmp

      Filesize

      5.2MB

    • memory/220-1076-0x0000000006EC0000-0x0000000006F36000-memory.dmp

      Filesize

      472KB

    • memory/220-1077-0x0000000006F40000-0x0000000006F90000-memory.dmp

      Filesize

      320KB

    • memory/220-1078-0x0000000002470000-0x0000000002480000-memory.dmp

      Filesize

      64KB

    • memory/4552-147-0x0000000000BB0000-0x0000000000BBA000-memory.dmp

      Filesize

      40KB

    • memory/4948-1085-0x0000000000010000-0x0000000000042000-memory.dmp

      Filesize

      200KB

    • memory/4948-1086-0x00000000048E0000-0x00000000048F0000-memory.dmp

      Filesize

      64KB