Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    50s
  • max time network
    71s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01/03/2023, 20:55

General

  • Target

    c7151e5f16475a88c5532339250f116c68c52125a535923054ab09b73adddf59.exe

  • Size

    536KB

  • MD5

    4826cd54b93b76f7f367fe5060ad2244

  • SHA1

    97ebcd743fc3de014682e27f6c40d104f7d96afb

  • SHA256

    c7151e5f16475a88c5532339250f116c68c52125a535923054ab09b73adddf59

  • SHA512

    93613a97c7cabd320aea773b61304ba50a37809f1cc6810f5206cd6f983b72051f1b59a0d061154a325f3bd06882a0629de1042ce9fb6500ac09774c554ea40f

  • SSDEEP

    12288:PMrGy9090mNEQ/4JrVmKWXei7a402BYmPyDpb:tyBmF6EKWXei7a4nZa9

Malware Config

Extracted

Family

redline

Botnet

rouch

C2

193.56.146.11:4162

Attributes
  • auth_value

    1b1735bcfc122c708eae27ca352568de

Extracted

Family

redline

Botnet

fuba

C2

193.56.146.11:4162

Attributes
  • auth_value

    43015841fc23c63b15ca6ffe1d278d5e

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7151e5f16475a88c5532339250f116c68c52125a535923054ab09b73adddf59.exe
    "C:\Users\Admin\AppData\Local\Temp\c7151e5f16475a88c5532339250f116c68c52125a535923054ab09b73adddf59.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4140
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vaG2915Qd.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vaG2915Qd.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3924
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw14dp68vo04.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw14dp68vo04.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4944
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tqh52fq14.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tqh52fq14.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1928
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uiW82vV51.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uiW82vV51.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2684

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uiW82vV51.exe

    Filesize

    175KB

    MD5

    c6593634d571666e5e14259300c9d670

    SHA1

    d2eaae11004187755e4bf7f772356dd1a66b9177

    SHA256

    d6650121e25bac68fb1217d039afd63f911d0a601fbda5f217ca59b97f668592

    SHA512

    1dcf9e2ee5a9cc4d7495e30a27d45531d068ba08177457cc4d002e0ce0ae75c9082f9d4587ddba691664b51d8e1de468b5b642ca58576985eebb4455e3f15b45

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uiW82vV51.exe

    Filesize

    175KB

    MD5

    c6593634d571666e5e14259300c9d670

    SHA1

    d2eaae11004187755e4bf7f772356dd1a66b9177

    SHA256

    d6650121e25bac68fb1217d039afd63f911d0a601fbda5f217ca59b97f668592

    SHA512

    1dcf9e2ee5a9cc4d7495e30a27d45531d068ba08177457cc4d002e0ce0ae75c9082f9d4587ddba691664b51d8e1de468b5b642ca58576985eebb4455e3f15b45

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vaG2915Qd.exe

    Filesize

    391KB

    MD5

    5dac3e39f9f782c8080e0ceb530b7b23

    SHA1

    39b476374f39e0e676b0d808e8bc656151ba89d0

    SHA256

    3075457ccc52072552a825eb728ddebd9247d332e10ace5c5f1832041213af0c

    SHA512

    4de987429dbca0d95f9d62640758016f069e030fdde0f0e949e1f0f426db9183352e6be1c63e11f73b326f2084ec497b431da1a066a93bbbfa6177126f51b797

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vaG2915Qd.exe

    Filesize

    391KB

    MD5

    5dac3e39f9f782c8080e0ceb530b7b23

    SHA1

    39b476374f39e0e676b0d808e8bc656151ba89d0

    SHA256

    3075457ccc52072552a825eb728ddebd9247d332e10ace5c5f1832041213af0c

    SHA512

    4de987429dbca0d95f9d62640758016f069e030fdde0f0e949e1f0f426db9183352e6be1c63e11f73b326f2084ec497b431da1a066a93bbbfa6177126f51b797

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw14dp68vo04.exe

    Filesize

    11KB

    MD5

    56437247eac756c77d8358b886d51dd3

    SHA1

    697718c23e3e4725f7327d69128bd3fff4d6c2f6

    SHA256

    30f08dc44e1d8dfc1d1c568415abaa51805e07d8abe233fac97fe89724a4426e

    SHA512

    c7be7a9450262fa574941c2e212a6f69d7a9ed1b4faf04ef912313ca75e82e8bfc9932c569ce357f3c3c8dd2b95a57eb12aaaf49a0c378bf888986d262b5f594

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw14dp68vo04.exe

    Filesize

    11KB

    MD5

    56437247eac756c77d8358b886d51dd3

    SHA1

    697718c23e3e4725f7327d69128bd3fff4d6c2f6

    SHA256

    30f08dc44e1d8dfc1d1c568415abaa51805e07d8abe233fac97fe89724a4426e

    SHA512

    c7be7a9450262fa574941c2e212a6f69d7a9ed1b4faf04ef912313ca75e82e8bfc9932c569ce357f3c3c8dd2b95a57eb12aaaf49a0c378bf888986d262b5f594

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tqh52fq14.exe

    Filesize

    304KB

    MD5

    425a4e66387f5515e08c6258b5dc0c4d

    SHA1

    e8a3a200c7aa39c58d6f1245abe4af5dc8d81671

    SHA256

    f9d0ab38b7112071584629f74818f8ac3113d2db0a7bb3ef518aca5c1c08893d

    SHA512

    c1086d7971da5530878b40e7c09665235ffaba4303a8c8fc3d7e85f392ee1195079657727857880bb603d8f9739cc124199e2688a211d75e475ea1daaa1a464e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tqh52fq14.exe

    Filesize

    304KB

    MD5

    425a4e66387f5515e08c6258b5dc0c4d

    SHA1

    e8a3a200c7aa39c58d6f1245abe4af5dc8d81671

    SHA256

    f9d0ab38b7112071584629f74818f8ac3113d2db0a7bb3ef518aca5c1c08893d

    SHA512

    c1086d7971da5530878b40e7c09665235ffaba4303a8c8fc3d7e85f392ee1195079657727857880bb603d8f9739cc124199e2688a211d75e475ea1daaa1a464e

  • memory/1928-136-0x00000000022B0000-0x00000000022F6000-memory.dmp

    Filesize

    280KB

  • memory/1928-137-0x0000000004D00000-0x00000000051FE000-memory.dmp

    Filesize

    5.0MB

  • memory/1928-138-0x0000000004B70000-0x0000000004BB4000-memory.dmp

    Filesize

    272KB

  • memory/1928-139-0x00000000006B0000-0x00000000006FB000-memory.dmp

    Filesize

    300KB

  • memory/1928-140-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/1928-141-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/1928-142-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/1928-143-0x0000000004B70000-0x0000000004BAE000-memory.dmp

    Filesize

    248KB

  • memory/1928-144-0x0000000004B70000-0x0000000004BAE000-memory.dmp

    Filesize

    248KB

  • memory/1928-146-0x0000000004B70000-0x0000000004BAE000-memory.dmp

    Filesize

    248KB

  • memory/1928-148-0x0000000004B70000-0x0000000004BAE000-memory.dmp

    Filesize

    248KB

  • memory/1928-150-0x0000000004B70000-0x0000000004BAE000-memory.dmp

    Filesize

    248KB

  • memory/1928-152-0x0000000004B70000-0x0000000004BAE000-memory.dmp

    Filesize

    248KB

  • memory/1928-154-0x0000000004B70000-0x0000000004BAE000-memory.dmp

    Filesize

    248KB

  • memory/1928-156-0x0000000004B70000-0x0000000004BAE000-memory.dmp

    Filesize

    248KB

  • memory/1928-158-0x0000000004B70000-0x0000000004BAE000-memory.dmp

    Filesize

    248KB

  • memory/1928-160-0x0000000004B70000-0x0000000004BAE000-memory.dmp

    Filesize

    248KB

  • memory/1928-162-0x0000000004B70000-0x0000000004BAE000-memory.dmp

    Filesize

    248KB

  • memory/1928-164-0x0000000004B70000-0x0000000004BAE000-memory.dmp

    Filesize

    248KB

  • memory/1928-166-0x0000000004B70000-0x0000000004BAE000-memory.dmp

    Filesize

    248KB

  • memory/1928-168-0x0000000004B70000-0x0000000004BAE000-memory.dmp

    Filesize

    248KB

  • memory/1928-170-0x0000000004B70000-0x0000000004BAE000-memory.dmp

    Filesize

    248KB

  • memory/1928-172-0x0000000004B70000-0x0000000004BAE000-memory.dmp

    Filesize

    248KB

  • memory/1928-174-0x0000000004B70000-0x0000000004BAE000-memory.dmp

    Filesize

    248KB

  • memory/1928-176-0x0000000004B70000-0x0000000004BAE000-memory.dmp

    Filesize

    248KB

  • memory/1928-178-0x0000000004B70000-0x0000000004BAE000-memory.dmp

    Filesize

    248KB

  • memory/1928-180-0x0000000004B70000-0x0000000004BAE000-memory.dmp

    Filesize

    248KB

  • memory/1928-182-0x0000000004B70000-0x0000000004BAE000-memory.dmp

    Filesize

    248KB

  • memory/1928-184-0x0000000004B70000-0x0000000004BAE000-memory.dmp

    Filesize

    248KB

  • memory/1928-186-0x0000000004B70000-0x0000000004BAE000-memory.dmp

    Filesize

    248KB

  • memory/1928-188-0x0000000004B70000-0x0000000004BAE000-memory.dmp

    Filesize

    248KB

  • memory/1928-190-0x0000000004B70000-0x0000000004BAE000-memory.dmp

    Filesize

    248KB

  • memory/1928-192-0x0000000004B70000-0x0000000004BAE000-memory.dmp

    Filesize

    248KB

  • memory/1928-194-0x0000000004B70000-0x0000000004BAE000-memory.dmp

    Filesize

    248KB

  • memory/1928-196-0x0000000004B70000-0x0000000004BAE000-memory.dmp

    Filesize

    248KB

  • memory/1928-198-0x0000000004B70000-0x0000000004BAE000-memory.dmp

    Filesize

    248KB

  • memory/1928-200-0x0000000004B70000-0x0000000004BAE000-memory.dmp

    Filesize

    248KB

  • memory/1928-202-0x0000000004B70000-0x0000000004BAE000-memory.dmp

    Filesize

    248KB

  • memory/1928-204-0x0000000004B70000-0x0000000004BAE000-memory.dmp

    Filesize

    248KB

  • memory/1928-206-0x0000000004B70000-0x0000000004BAE000-memory.dmp

    Filesize

    248KB

  • memory/1928-1049-0x0000000005200000-0x0000000005806000-memory.dmp

    Filesize

    6.0MB

  • memory/1928-1050-0x0000000005870000-0x000000000597A000-memory.dmp

    Filesize

    1.0MB

  • memory/1928-1051-0x00000000059B0000-0x00000000059C2000-memory.dmp

    Filesize

    72KB

  • memory/1928-1052-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/1928-1053-0x00000000059D0000-0x0000000005A0E000-memory.dmp

    Filesize

    248KB

  • memory/1928-1054-0x0000000005B20000-0x0000000005B6B000-memory.dmp

    Filesize

    300KB

  • memory/1928-1056-0x0000000005CB0000-0x0000000005D42000-memory.dmp

    Filesize

    584KB

  • memory/1928-1057-0x0000000005D50000-0x0000000005DB6000-memory.dmp

    Filesize

    408KB

  • memory/1928-1058-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/1928-1059-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/1928-1060-0x0000000006560000-0x0000000006722000-memory.dmp

    Filesize

    1.8MB

  • memory/1928-1061-0x0000000006730000-0x0000000006C5C000-memory.dmp

    Filesize

    5.2MB

  • memory/1928-1062-0x0000000006DA0000-0x0000000006E16000-memory.dmp

    Filesize

    472KB

  • memory/1928-1063-0x0000000006E20000-0x0000000006E70000-memory.dmp

    Filesize

    320KB

  • memory/1928-1064-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/2684-1070-0x0000000000410000-0x0000000000442000-memory.dmp

    Filesize

    200KB

  • memory/2684-1071-0x0000000004E50000-0x0000000004E9B000-memory.dmp

    Filesize

    300KB

  • memory/2684-1072-0x0000000004D10000-0x0000000004D20000-memory.dmp

    Filesize

    64KB

  • memory/4944-130-0x0000000000EC0000-0x0000000000ECA000-memory.dmp

    Filesize

    40KB