Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    78s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/03/2023, 18:03

General

  • Target

    742588f84fe7e4981cd99e9b28961d5f9a8deb5d4749897156f2cf7539cdbe99.exe

  • Size

    545KB

  • MD5

    66c4c3de0335db13a71abf50282e312c

  • SHA1

    6deb8dba7aac741f8a69b2891263fb222c151419

  • SHA256

    742588f84fe7e4981cd99e9b28961d5f9a8deb5d4749897156f2cf7539cdbe99

  • SHA512

    b7e7cfbc4b6a13c56f18df4699cbf6f5613e31fc271829d2685b0fdbd34151e0e8dc864541f3d79880ad591662174c2d25dda684a6ab1f3758e2d41bd33988d2

  • SSDEEP

    12288:dMrWy905qNVUyBhfBjc6gfiMfmYFXbWtPetiWKG:nyFV7fp3ehCtPdWKG

Malware Config

Extracted

Family

redline

Botnet

stek

C2

melevv.eu:4162

Attributes
  • auth_value

    4205381daf6946b2df5fe3bc7eacc918

Extracted

Family

redline

Botnet

fomich

C2

melevv.eu:4162

Attributes
  • auth_value

    b018e52ac946001794d8b8c23e901859

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\742588f84fe7e4981cd99e9b28961d5f9a8deb5d4749897156f2cf7539cdbe99.exe
    "C:\Users\Admin\AppData\Local\Temp\742588f84fe7e4981cd99e9b28961d5f9a8deb5d4749897156f2cf7539cdbe99.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4220
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vFk1540EM.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vFk1540EM.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2140
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw41mI48xQ91.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw41mI48xQ91.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:220
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tUQ46Ge73.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tUQ46Ge73.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1196
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 1408
          4⤵
          • Program crash
          PID:3620
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhS56fX01.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhS56fX01.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2252
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1196 -ip 1196
    1⤵
      PID:4656

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhS56fX01.exe

      Filesize

      175KB

      MD5

      29a3efda2245382374f390499069f609

      SHA1

      85e8f1ae4d62db3635daa4539fd20203bb59c6ca

      SHA256

      a3001074008d838482acb2755d714e6acd4524368ea49f0f2897cbe0df992fd3

      SHA512

      9c3fd348cddfe2264919b16427d225fc61c44c6a1cc959acae752f63aa5a8f14d217ef426bbad96f143095786abc5bd71a9af3d3f852f910a6a4a79b8e1cb231

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\uhS56fX01.exe

      Filesize

      175KB

      MD5

      29a3efda2245382374f390499069f609

      SHA1

      85e8f1ae4d62db3635daa4539fd20203bb59c6ca

      SHA256

      a3001074008d838482acb2755d714e6acd4524368ea49f0f2897cbe0df992fd3

      SHA512

      9c3fd348cddfe2264919b16427d225fc61c44c6a1cc959acae752f63aa5a8f14d217ef426bbad96f143095786abc5bd71a9af3d3f852f910a6a4a79b8e1cb231

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vFk1540EM.exe

      Filesize

      401KB

      MD5

      b96678193c516dc6eefe0186e8d11a6b

      SHA1

      9ff4f43823b9db34ff7faec4546d53312dfc97f3

      SHA256

      f46d86f616b830ee78ac386eae99c26cb6cb607bd92df22321645e684263e4d3

      SHA512

      166b02dd2cc57e86c66a4c11425a8e1b9e6bb74c5f6cbd1e91e179451a74d611b5e21e929dc864021ce5aa1f01096d4b468a5933a4458202e2255a4027aaa23b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vFk1540EM.exe

      Filesize

      401KB

      MD5

      b96678193c516dc6eefe0186e8d11a6b

      SHA1

      9ff4f43823b9db34ff7faec4546d53312dfc97f3

      SHA256

      f46d86f616b830ee78ac386eae99c26cb6cb607bd92df22321645e684263e4d3

      SHA512

      166b02dd2cc57e86c66a4c11425a8e1b9e6bb74c5f6cbd1e91e179451a74d611b5e21e929dc864021ce5aa1f01096d4b468a5933a4458202e2255a4027aaa23b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw41mI48xQ91.exe

      Filesize

      17KB

      MD5

      a8e66e08b54dd9ac0972c2ebb673558a

      SHA1

      76be1fd80e5ab2dd8e38e7066a78fc78c5ee604e

      SHA256

      54d796615cd7ea16381202f7b7c366bb632a36373fde49c6c235b8b0171aa17f

      SHA512

      18754c09c27b0dd2af281ed0e20cf2838af6ffcf829333e7dc2aa6ad0821bcfe3620ec69bda23357e3287ee0d88ae2b0d20e473943d9c8ab27df5146aff9f3da

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw41mI48xQ91.exe

      Filesize

      17KB

      MD5

      a8e66e08b54dd9ac0972c2ebb673558a

      SHA1

      76be1fd80e5ab2dd8e38e7066a78fc78c5ee604e

      SHA256

      54d796615cd7ea16381202f7b7c366bb632a36373fde49c6c235b8b0171aa17f

      SHA512

      18754c09c27b0dd2af281ed0e20cf2838af6ffcf829333e7dc2aa6ad0821bcfe3620ec69bda23357e3287ee0d88ae2b0d20e473943d9c8ab27df5146aff9f3da

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tUQ46Ge73.exe

      Filesize

      377KB

      MD5

      a9bb941524fc5973d45dad1da3e23d17

      SHA1

      357a2a768bbec255880067c4a774ca2d4bee0588

      SHA256

      e2e687091711d776f73e3877ee7020f8ed6472855af0db8ee6f5ea796fc34659

      SHA512

      4beab17e28078481420dfdf5425a6829695cdfdf50c1231c509654bdcaf21d6de21f12ee44b4cbe9c3b555bed3a91542b2dc37b25b2d093e03af9941723d9256

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tUQ46Ge73.exe

      Filesize

      377KB

      MD5

      a9bb941524fc5973d45dad1da3e23d17

      SHA1

      357a2a768bbec255880067c4a774ca2d4bee0588

      SHA256

      e2e687091711d776f73e3877ee7020f8ed6472855af0db8ee6f5ea796fc34659

      SHA512

      4beab17e28078481420dfdf5425a6829695cdfdf50c1231c509654bdcaf21d6de21f12ee44b4cbe9c3b555bed3a91542b2dc37b25b2d093e03af9941723d9256

    • memory/220-147-0x00000000000C0000-0x00000000000CA000-memory.dmp

      Filesize

      40KB

    • memory/1196-153-0x0000000007410000-0x00000000079B4000-memory.dmp

      Filesize

      5.6MB

    • memory/1196-154-0x0000000004570000-0x00000000045BB000-memory.dmp

      Filesize

      300KB

    • memory/1196-155-0x0000000007400000-0x0000000007410000-memory.dmp

      Filesize

      64KB

    • memory/1196-156-0x0000000007400000-0x0000000007410000-memory.dmp

      Filesize

      64KB

    • memory/1196-157-0x0000000007400000-0x0000000007410000-memory.dmp

      Filesize

      64KB

    • memory/1196-158-0x00000000072B0000-0x00000000072EE000-memory.dmp

      Filesize

      248KB

    • memory/1196-159-0x00000000072B0000-0x00000000072EE000-memory.dmp

      Filesize

      248KB

    • memory/1196-161-0x00000000072B0000-0x00000000072EE000-memory.dmp

      Filesize

      248KB

    • memory/1196-163-0x00000000072B0000-0x00000000072EE000-memory.dmp

      Filesize

      248KB

    • memory/1196-165-0x00000000072B0000-0x00000000072EE000-memory.dmp

      Filesize

      248KB

    • memory/1196-167-0x00000000072B0000-0x00000000072EE000-memory.dmp

      Filesize

      248KB

    • memory/1196-169-0x00000000072B0000-0x00000000072EE000-memory.dmp

      Filesize

      248KB

    • memory/1196-171-0x00000000072B0000-0x00000000072EE000-memory.dmp

      Filesize

      248KB

    • memory/1196-173-0x00000000072B0000-0x00000000072EE000-memory.dmp

      Filesize

      248KB

    • memory/1196-175-0x00000000072B0000-0x00000000072EE000-memory.dmp

      Filesize

      248KB

    • memory/1196-177-0x00000000072B0000-0x00000000072EE000-memory.dmp

      Filesize

      248KB

    • memory/1196-179-0x00000000072B0000-0x00000000072EE000-memory.dmp

      Filesize

      248KB

    • memory/1196-181-0x00000000072B0000-0x00000000072EE000-memory.dmp

      Filesize

      248KB

    • memory/1196-183-0x00000000072B0000-0x00000000072EE000-memory.dmp

      Filesize

      248KB

    • memory/1196-185-0x00000000072B0000-0x00000000072EE000-memory.dmp

      Filesize

      248KB

    • memory/1196-187-0x00000000072B0000-0x00000000072EE000-memory.dmp

      Filesize

      248KB

    • memory/1196-189-0x00000000072B0000-0x00000000072EE000-memory.dmp

      Filesize

      248KB

    • memory/1196-197-0x00000000072B0000-0x00000000072EE000-memory.dmp

      Filesize

      248KB

    • memory/1196-195-0x00000000072B0000-0x00000000072EE000-memory.dmp

      Filesize

      248KB

    • memory/1196-199-0x00000000072B0000-0x00000000072EE000-memory.dmp

      Filesize

      248KB

    • memory/1196-193-0x00000000072B0000-0x00000000072EE000-memory.dmp

      Filesize

      248KB

    • memory/1196-209-0x00000000072B0000-0x00000000072EE000-memory.dmp

      Filesize

      248KB

    • memory/1196-213-0x00000000072B0000-0x00000000072EE000-memory.dmp

      Filesize

      248KB

    • memory/1196-215-0x00000000072B0000-0x00000000072EE000-memory.dmp

      Filesize

      248KB

    • memory/1196-211-0x00000000072B0000-0x00000000072EE000-memory.dmp

      Filesize

      248KB

    • memory/1196-207-0x00000000072B0000-0x00000000072EE000-memory.dmp

      Filesize

      248KB

    • memory/1196-221-0x00000000072B0000-0x00000000072EE000-memory.dmp

      Filesize

      248KB

    • memory/1196-219-0x00000000072B0000-0x00000000072EE000-memory.dmp

      Filesize

      248KB

    • memory/1196-217-0x00000000072B0000-0x00000000072EE000-memory.dmp

      Filesize

      248KB

    • memory/1196-205-0x00000000072B0000-0x00000000072EE000-memory.dmp

      Filesize

      248KB

    • memory/1196-203-0x00000000072B0000-0x00000000072EE000-memory.dmp

      Filesize

      248KB

    • memory/1196-201-0x00000000072B0000-0x00000000072EE000-memory.dmp

      Filesize

      248KB

    • memory/1196-191-0x00000000072B0000-0x00000000072EE000-memory.dmp

      Filesize

      248KB

    • memory/1196-1064-0x00000000079C0000-0x0000000007FD8000-memory.dmp

      Filesize

      6.1MB

    • memory/1196-1065-0x0000000007FE0000-0x00000000080EA000-memory.dmp

      Filesize

      1.0MB

    • memory/1196-1066-0x00000000080F0000-0x0000000008102000-memory.dmp

      Filesize

      72KB

    • memory/1196-1067-0x0000000008110000-0x000000000814C000-memory.dmp

      Filesize

      240KB

    • memory/1196-1068-0x0000000007400000-0x0000000007410000-memory.dmp

      Filesize

      64KB

    • memory/1196-1070-0x0000000008410000-0x00000000084A2000-memory.dmp

      Filesize

      584KB

    • memory/1196-1071-0x00000000084B0000-0x0000000008516000-memory.dmp

      Filesize

      408KB

    • memory/1196-1072-0x0000000007400000-0x0000000007410000-memory.dmp

      Filesize

      64KB

    • memory/1196-1074-0x0000000007400000-0x0000000007410000-memory.dmp

      Filesize

      64KB

    • memory/1196-1073-0x0000000007400000-0x0000000007410000-memory.dmp

      Filesize

      64KB

    • memory/1196-1075-0x0000000009000000-0x0000000009076000-memory.dmp

      Filesize

      472KB

    • memory/1196-1076-0x00000000090A0000-0x00000000090F0000-memory.dmp

      Filesize

      320KB

    • memory/1196-1077-0x0000000009120000-0x00000000092E2000-memory.dmp

      Filesize

      1.8MB

    • memory/1196-1078-0x00000000092F0000-0x000000000981C000-memory.dmp

      Filesize

      5.2MB

    • memory/1196-1079-0x0000000007400000-0x0000000007410000-memory.dmp

      Filesize

      64KB

    • memory/2252-1085-0x0000000000D10000-0x0000000000D42000-memory.dmp

      Filesize

      200KB

    • memory/2252-1086-0x00000000055C0000-0x00000000055D0000-memory.dmp

      Filesize

      64KB