Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    54s
  • max time network
    64s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02/03/2023, 22:45

General

  • Target

    2f5713241df1f52206b553a759fd3e4ed04f104ca1cdb85a021c241e87469990.exe

  • Size

    693KB

  • MD5

    e9d40ad63e4137feee241f74a524a716

  • SHA1

    dd45e8d842e0227dc35e7dc8163f9fa409164286

  • SHA256

    2f5713241df1f52206b553a759fd3e4ed04f104ca1cdb85a021c241e87469990

  • SHA512

    ec1a9c292dc2c2875aedff12c4204b4b6851a6998b844dab1d5588afc87e789cd4d604ea8918071e3d23d0c6479fd5256b9c6b7da381b9dbb63be4d229f7f6e3

  • SSDEEP

    12288:4MrXy90ZlA4EHzWanKNGuGGKYumsyDBazzPNHA9amOAK+x8ofpc:fyIWHKWa5Kxmsyw3PNHyugrfpc

Malware Config

Extracted

Family

redline

Botnet

ruzhpe

C2

pepunn.com:4162

Attributes
  • auth_value

    f735ced96ae8d01d0bd1d514240e54e0

Extracted

Family

redline

Botnet

fchan

C2

pepunn.com:4162

Attributes
  • auth_value

    127bd53d55e8c4f0dd2f6e1ea60deef4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2f5713241df1f52206b553a759fd3e4ed04f104ca1cdb85a021c241e87469990.exe
    "C:\Users\Admin\AppData\Local\Temp\2f5713241df1f52206b553a759fd3e4ed04f104ca1cdb85a021c241e87469990.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4300
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycwf96Pa35.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycwf96Pa35.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4044
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urKM22MS23.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urKM22MS23.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4128
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrGj16cb55.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrGj16cb55.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4444
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuNn27bE50.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuNn27bE50.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4588

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuNn27bE50.exe

    Filesize

    175KB

    MD5

    347000255a377eff6fb9b7b65105ae9f

    SHA1

    405d3f6db5bc71e59b7be2d9126af024ce124580

    SHA256

    88549c26ed9d798aa77e1d22dc19238daa4bf63ca438f662e2a3515386713486

    SHA512

    1355aa36ce508e00b08b0845c4e303ea7b4d34f62856d29b6e5c78dcf74248fdaa2dc829dfae21215d14bc8f73c0e94cd0fb2e19d3b0e9033de8973869030cf8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuNn27bE50.exe

    Filesize

    175KB

    MD5

    347000255a377eff6fb9b7b65105ae9f

    SHA1

    405d3f6db5bc71e59b7be2d9126af024ce124580

    SHA256

    88549c26ed9d798aa77e1d22dc19238daa4bf63ca438f662e2a3515386713486

    SHA512

    1355aa36ce508e00b08b0845c4e303ea7b4d34f62856d29b6e5c78dcf74248fdaa2dc829dfae21215d14bc8f73c0e94cd0fb2e19d3b0e9033de8973869030cf8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycwf96Pa35.exe

    Filesize

    548KB

    MD5

    13982f23afe0c6d0ede1cf006755bb57

    SHA1

    b41a3edd5a20b53825877878e158f0100bf51843

    SHA256

    051b4ac35c5ddc85de3b652aafeb0d1016dd2a39a4045fed27c9699991d21dee

    SHA512

    2648c2378c9d63d9e0c0411650ee0a30168b5eeb06eb6840ea13a9ee00cf56e31157925df51c46bc63f2de7b737d491f1ec88cfb121aa2f54367f94edbde1bf9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycwf96Pa35.exe

    Filesize

    548KB

    MD5

    13982f23afe0c6d0ede1cf006755bb57

    SHA1

    b41a3edd5a20b53825877878e158f0100bf51843

    SHA256

    051b4ac35c5ddc85de3b652aafeb0d1016dd2a39a4045fed27c9699991d21dee

    SHA512

    2648c2378c9d63d9e0c0411650ee0a30168b5eeb06eb6840ea13a9ee00cf56e31157925df51c46bc63f2de7b737d491f1ec88cfb121aa2f54367f94edbde1bf9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urKM22MS23.exe

    Filesize

    352KB

    MD5

    6345b3da7da3d9a3012ba87a252a29f6

    SHA1

    a36f23e5d0802652705df132bce0a8589ff5e7bf

    SHA256

    caf994d14f8b0767df1e38508af9bb7816673aa0b6fc7fbf591a135e3173b7df

    SHA512

    3d82f717809ab81fa0fdb60d262af1547d12a69331b755d02ec94a250f4e25c5aa1adc910381e91bf4d9b32aa8f281f1252e5912068d0378461890a5893fae82

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urKM22MS23.exe

    Filesize

    352KB

    MD5

    6345b3da7da3d9a3012ba87a252a29f6

    SHA1

    a36f23e5d0802652705df132bce0a8589ff5e7bf

    SHA256

    caf994d14f8b0767df1e38508af9bb7816673aa0b6fc7fbf591a135e3173b7df

    SHA512

    3d82f717809ab81fa0fdb60d262af1547d12a69331b755d02ec94a250f4e25c5aa1adc910381e91bf4d9b32aa8f281f1252e5912068d0378461890a5893fae82

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrGj16cb55.exe

    Filesize

    410KB

    MD5

    cc1e39c942634bbd04ef3eb880af3cb4

    SHA1

    390ee64e70074c204d8c7fc736e69b91940375bc

    SHA256

    98f330627fe244da794aa21cd74d45861fab6d06f9fedc1bcc02eaf434adacec

    SHA512

    f66cac5ccd3318e7c9baca955b64b22f9cb96693557dcf13a7e334878a0e3c2bc18f1757432b78b6c06c28c91881fb2436fc0641f6eb75a57167a4254cb470d2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrGj16cb55.exe

    Filesize

    410KB

    MD5

    cc1e39c942634bbd04ef3eb880af3cb4

    SHA1

    390ee64e70074c204d8c7fc736e69b91940375bc

    SHA256

    98f330627fe244da794aa21cd74d45861fab6d06f9fedc1bcc02eaf434adacec

    SHA512

    f66cac5ccd3318e7c9baca955b64b22f9cb96693557dcf13a7e334878a0e3c2bc18f1757432b78b6c06c28c91881fb2436fc0641f6eb75a57167a4254cb470d2

  • memory/4128-135-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4128-136-0x0000000004B70000-0x0000000004B8A000-memory.dmp

    Filesize

    104KB

  • memory/4128-137-0x0000000007140000-0x000000000763E000-memory.dmp

    Filesize

    5.0MB

  • memory/4128-138-0x0000000004CB0000-0x0000000004CC8000-memory.dmp

    Filesize

    96KB

  • memory/4128-139-0x0000000004790000-0x00000000047A0000-memory.dmp

    Filesize

    64KB

  • memory/4128-140-0x0000000004790000-0x00000000047A0000-memory.dmp

    Filesize

    64KB

  • memory/4128-141-0x0000000004790000-0x00000000047A0000-memory.dmp

    Filesize

    64KB

  • memory/4128-142-0x0000000004CB0000-0x0000000004CC2000-memory.dmp

    Filesize

    72KB

  • memory/4128-143-0x0000000004CB0000-0x0000000004CC2000-memory.dmp

    Filesize

    72KB

  • memory/4128-145-0x0000000004CB0000-0x0000000004CC2000-memory.dmp

    Filesize

    72KB

  • memory/4128-147-0x0000000004CB0000-0x0000000004CC2000-memory.dmp

    Filesize

    72KB

  • memory/4128-149-0x0000000004CB0000-0x0000000004CC2000-memory.dmp

    Filesize

    72KB

  • memory/4128-151-0x0000000004CB0000-0x0000000004CC2000-memory.dmp

    Filesize

    72KB

  • memory/4128-153-0x0000000004CB0000-0x0000000004CC2000-memory.dmp

    Filesize

    72KB

  • memory/4128-155-0x0000000004CB0000-0x0000000004CC2000-memory.dmp

    Filesize

    72KB

  • memory/4128-157-0x0000000004CB0000-0x0000000004CC2000-memory.dmp

    Filesize

    72KB

  • memory/4128-159-0x0000000004CB0000-0x0000000004CC2000-memory.dmp

    Filesize

    72KB

  • memory/4128-161-0x0000000004CB0000-0x0000000004CC2000-memory.dmp

    Filesize

    72KB

  • memory/4128-163-0x0000000004CB0000-0x0000000004CC2000-memory.dmp

    Filesize

    72KB

  • memory/4128-165-0x0000000004CB0000-0x0000000004CC2000-memory.dmp

    Filesize

    72KB

  • memory/4128-167-0x0000000004CB0000-0x0000000004CC2000-memory.dmp

    Filesize

    72KB

  • memory/4128-169-0x0000000004CB0000-0x0000000004CC2000-memory.dmp

    Filesize

    72KB

  • memory/4128-170-0x0000000000400000-0x0000000002BC5000-memory.dmp

    Filesize

    39.8MB

  • memory/4128-173-0x0000000004790000-0x00000000047A0000-memory.dmp

    Filesize

    64KB

  • memory/4128-172-0x0000000000400000-0x0000000002BC5000-memory.dmp

    Filesize

    39.8MB

  • memory/4444-178-0x0000000002CB0000-0x0000000002CFB000-memory.dmp

    Filesize

    300KB

  • memory/4444-179-0x0000000003070000-0x00000000030B6000-memory.dmp

    Filesize

    280KB

  • memory/4444-181-0x00000000072A0000-0x00000000072B0000-memory.dmp

    Filesize

    64KB

  • memory/4444-182-0x0000000004AF0000-0x0000000004B34000-memory.dmp

    Filesize

    272KB

  • memory/4444-180-0x00000000072A0000-0x00000000072B0000-memory.dmp

    Filesize

    64KB

  • memory/4444-184-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/4444-186-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/4444-183-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/4444-188-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/4444-190-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/4444-192-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/4444-194-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/4444-196-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/4444-198-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/4444-200-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/4444-202-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/4444-204-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/4444-206-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/4444-208-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/4444-210-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/4444-212-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/4444-214-0x00000000072A0000-0x00000000072B0000-memory.dmp

    Filesize

    64KB

  • memory/4444-215-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/4444-217-0x0000000004AF0000-0x0000000004B2E000-memory.dmp

    Filesize

    248KB

  • memory/4444-1090-0x0000000007DC0000-0x00000000083C6000-memory.dmp

    Filesize

    6.0MB

  • memory/4444-1091-0x00000000077B0000-0x00000000078BA000-memory.dmp

    Filesize

    1.0MB

  • memory/4444-1092-0x00000000078C0000-0x00000000078D2000-memory.dmp

    Filesize

    72KB

  • memory/4444-1093-0x00000000078E0000-0x000000000791E000-memory.dmp

    Filesize

    248KB

  • memory/4444-1094-0x0000000007A20000-0x0000000007A6B000-memory.dmp

    Filesize

    300KB

  • memory/4444-1095-0x00000000072A0000-0x00000000072B0000-memory.dmp

    Filesize

    64KB

  • memory/4444-1097-0x00000000072A0000-0x00000000072B0000-memory.dmp

    Filesize

    64KB

  • memory/4444-1098-0x0000000007BC0000-0x0000000007C52000-memory.dmp

    Filesize

    584KB

  • memory/4444-1099-0x0000000007C60000-0x0000000007CC6000-memory.dmp

    Filesize

    408KB

  • memory/4444-1100-0x00000000072A0000-0x00000000072B0000-memory.dmp

    Filesize

    64KB

  • memory/4444-1101-0x00000000072A0000-0x00000000072B0000-memory.dmp

    Filesize

    64KB

  • memory/4444-1102-0x0000000008BB0000-0x0000000008D72000-memory.dmp

    Filesize

    1.8MB

  • memory/4444-1103-0x0000000008D90000-0x00000000092BC000-memory.dmp

    Filesize

    5.2MB

  • memory/4444-1104-0x00000000093E0000-0x0000000009456000-memory.dmp

    Filesize

    472KB

  • memory/4444-1105-0x0000000009470000-0x00000000094C0000-memory.dmp

    Filesize

    320KB

  • memory/4444-1108-0x00000000072A0000-0x00000000072B0000-memory.dmp

    Filesize

    64KB

  • memory/4588-1112-0x0000000000840000-0x0000000000872000-memory.dmp

    Filesize

    200KB

  • memory/4588-1113-0x0000000005280000-0x00000000052CB000-memory.dmp

    Filesize

    300KB

  • memory/4588-1114-0x0000000005460000-0x0000000005470000-memory.dmp

    Filesize

    64KB