Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    85s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/03/2023, 00:11

General

  • Target

    7525726fef574a7d265c4b63ce8e43e10006e91414774d37ead32537ad650da4.exe

  • Size

    693KB

  • MD5

    39035a87737d8415fd065125906c3d12

  • SHA1

    7af99a65ab7fcd41ad6c07a4e571f29fad798d4c

  • SHA256

    7525726fef574a7d265c4b63ce8e43e10006e91414774d37ead32537ad650da4

  • SHA512

    1560fa4f819380268a2bcee5861244140708fcdfc6dbe882186ae78a5c8bdd40e9f3d2eb52e5f9a884cb1361d2484c687909b71ac7715eb883c4c3c7dbb17d73

  • SSDEEP

    12288:2Mrry90j8UmeACtPGB8VyYumHBDB5FKwqNVOnuaFb9SHEZamOAZ+x8piCe7/uq:Fyx23t4xmHBbFKtVOntl9SHoun0Pe7/L

Malware Config

Extracted

Family

redline

Botnet

ruzhpe

C2

pepunn.com:4162

Attributes
  • auth_value

    f735ced96ae8d01d0bd1d514240e54e0

Extracted

Family

redline

Botnet

fchan

C2

pepunn.com:4162

Attributes
  • auth_value

    127bd53d55e8c4f0dd2f6e1ea60deef4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7525726fef574a7d265c4b63ce8e43e10006e91414774d37ead32537ad650da4.exe
    "C:\Users\Admin\AppData\Local\Temp\7525726fef574a7d265c4b63ce8e43e10006e91414774d37ead32537ad650da4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4476
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycke65qq88.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycke65qq88.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urQT33ij66.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urQT33ij66.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4800
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 1084
          4⤵
          • Program crash
          PID:528
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wraA50wM92.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wraA50wM92.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1060
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 1408
          4⤵
          • Program crash
          PID:1868
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuoZ74EZ04.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuoZ74EZ04.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2376
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4800 -ip 4800
    1⤵
      PID:4708
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1060 -ip 1060
      1⤵
        PID:4360

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuoZ74EZ04.exe

        Filesize

        175KB

        MD5

        aff2dc307092b58ea4f5930713705ae6

        SHA1

        045719b66b014bb259c7f18394674270e2f1f47f

        SHA256

        face10c16b25f11ec061d2db898009a0c6302b107525f69b33b39e556297a3c5

        SHA512

        6743a6a0df5954f73ff4d54caee8dcb1d95a5effd740da0889204b67cfc1eedf9fb6d4e84f6bf5bd37f4f17fca94d9cba3bacf4bb21857592ded7903f8f6438a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuoZ74EZ04.exe

        Filesize

        175KB

        MD5

        aff2dc307092b58ea4f5930713705ae6

        SHA1

        045719b66b014bb259c7f18394674270e2f1f47f

        SHA256

        face10c16b25f11ec061d2db898009a0c6302b107525f69b33b39e556297a3c5

        SHA512

        6743a6a0df5954f73ff4d54caee8dcb1d95a5effd740da0889204b67cfc1eedf9fb6d4e84f6bf5bd37f4f17fca94d9cba3bacf4bb21857592ded7903f8f6438a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycke65qq88.exe

        Filesize

        548KB

        MD5

        5ba3294247d435017f364004cf99cb9d

        SHA1

        20c9345dfd3858c206e75c4cc869bf8a7af7b355

        SHA256

        c6364c818f2c407cad10f3a61422c17332ffa7c69a68c9850f85d079b7abf316

        SHA512

        f42b7d1d1995fc49cceae61a4cfb396df26d8f4efb36dac94635660d143423a21466d2fab5b1e3972615e5f8b0aaf387fe0cd172114c77f91b0e8040b0597370

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycke65qq88.exe

        Filesize

        548KB

        MD5

        5ba3294247d435017f364004cf99cb9d

        SHA1

        20c9345dfd3858c206e75c4cc869bf8a7af7b355

        SHA256

        c6364c818f2c407cad10f3a61422c17332ffa7c69a68c9850f85d079b7abf316

        SHA512

        f42b7d1d1995fc49cceae61a4cfb396df26d8f4efb36dac94635660d143423a21466d2fab5b1e3972615e5f8b0aaf387fe0cd172114c77f91b0e8040b0597370

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urQT33ij66.exe

        Filesize

        352KB

        MD5

        6345b3da7da3d9a3012ba87a252a29f6

        SHA1

        a36f23e5d0802652705df132bce0a8589ff5e7bf

        SHA256

        caf994d14f8b0767df1e38508af9bb7816673aa0b6fc7fbf591a135e3173b7df

        SHA512

        3d82f717809ab81fa0fdb60d262af1547d12a69331b755d02ec94a250f4e25c5aa1adc910381e91bf4d9b32aa8f281f1252e5912068d0378461890a5893fae82

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urQT33ij66.exe

        Filesize

        352KB

        MD5

        6345b3da7da3d9a3012ba87a252a29f6

        SHA1

        a36f23e5d0802652705df132bce0a8589ff5e7bf

        SHA256

        caf994d14f8b0767df1e38508af9bb7816673aa0b6fc7fbf591a135e3173b7df

        SHA512

        3d82f717809ab81fa0fdb60d262af1547d12a69331b755d02ec94a250f4e25c5aa1adc910381e91bf4d9b32aa8f281f1252e5912068d0378461890a5893fae82

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wraA50wM92.exe

        Filesize

        410KB

        MD5

        cc1e39c942634bbd04ef3eb880af3cb4

        SHA1

        390ee64e70074c204d8c7fc736e69b91940375bc

        SHA256

        98f330627fe244da794aa21cd74d45861fab6d06f9fedc1bcc02eaf434adacec

        SHA512

        f66cac5ccd3318e7c9baca955b64b22f9cb96693557dcf13a7e334878a0e3c2bc18f1757432b78b6c06c28c91881fb2436fc0641f6eb75a57167a4254cb470d2

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wraA50wM92.exe

        Filesize

        410KB

        MD5

        cc1e39c942634bbd04ef3eb880af3cb4

        SHA1

        390ee64e70074c204d8c7fc736e69b91940375bc

        SHA256

        98f330627fe244da794aa21cd74d45861fab6d06f9fedc1bcc02eaf434adacec

        SHA512

        f66cac5ccd3318e7c9baca955b64b22f9cb96693557dcf13a7e334878a0e3c2bc18f1757432b78b6c06c28c91881fb2436fc0641f6eb75a57167a4254cb470d2

      • memory/1060-1099-0x0000000007980000-0x0000000007F98000-memory.dmp

        Filesize

        6.1MB

      • memory/1060-1102-0x0000000008120000-0x000000000815C000-memory.dmp

        Filesize

        240KB

      • memory/1060-1114-0x0000000009110000-0x000000000963C000-memory.dmp

        Filesize

        5.2MB

      • memory/1060-1113-0x0000000008F00000-0x00000000090C2000-memory.dmp

        Filesize

        1.8MB

      • memory/1060-1112-0x00000000072C0000-0x00000000072D0000-memory.dmp

        Filesize

        64KB

      • memory/1060-1111-0x0000000008C40000-0x0000000008C90000-memory.dmp

        Filesize

        320KB

      • memory/1060-1110-0x0000000008BB0000-0x0000000008C26000-memory.dmp

        Filesize

        472KB

      • memory/1060-1109-0x00000000084C0000-0x0000000008526000-memory.dmp

        Filesize

        408KB

      • memory/1060-1108-0x0000000008420000-0x00000000084B2000-memory.dmp

        Filesize

        584KB

      • memory/1060-1107-0x00000000072C0000-0x00000000072D0000-memory.dmp

        Filesize

        64KB

      • memory/1060-1106-0x00000000072C0000-0x00000000072D0000-memory.dmp

        Filesize

        64KB

      • memory/1060-1105-0x00000000072C0000-0x00000000072D0000-memory.dmp

        Filesize

        64KB

      • memory/1060-1103-0x00000000072C0000-0x00000000072D0000-memory.dmp

        Filesize

        64KB

      • memory/1060-1101-0x0000000008100000-0x0000000008112000-memory.dmp

        Filesize

        72KB

      • memory/1060-1100-0x0000000007FC0000-0x00000000080CA000-memory.dmp

        Filesize

        1.0MB

      • memory/1060-226-0x0000000007190000-0x00000000071CE000-memory.dmp

        Filesize

        248KB

      • memory/1060-224-0x0000000007190000-0x00000000071CE000-memory.dmp

        Filesize

        248KB

      • memory/1060-222-0x0000000007190000-0x00000000071CE000-memory.dmp

        Filesize

        248KB

      • memory/1060-220-0x0000000007190000-0x00000000071CE000-memory.dmp

        Filesize

        248KB

      • memory/1060-218-0x0000000007190000-0x00000000071CE000-memory.dmp

        Filesize

        248KB

      • memory/1060-216-0x0000000007190000-0x00000000071CE000-memory.dmp

        Filesize

        248KB

      • memory/1060-214-0x0000000007190000-0x00000000071CE000-memory.dmp

        Filesize

        248KB

      • memory/1060-190-0x0000000002DF0000-0x0000000002E3B000-memory.dmp

        Filesize

        300KB

      • memory/1060-191-0x00000000072C0000-0x00000000072D0000-memory.dmp

        Filesize

        64KB

      • memory/1060-192-0x00000000072C0000-0x00000000072D0000-memory.dmp

        Filesize

        64KB

      • memory/1060-193-0x0000000007190000-0x00000000071CE000-memory.dmp

        Filesize

        248KB

      • memory/1060-198-0x0000000007190000-0x00000000071CE000-memory.dmp

        Filesize

        248KB

      • memory/1060-196-0x0000000007190000-0x00000000071CE000-memory.dmp

        Filesize

        248KB

      • memory/1060-194-0x0000000007190000-0x00000000071CE000-memory.dmp

        Filesize

        248KB

      • memory/1060-200-0x0000000007190000-0x00000000071CE000-memory.dmp

        Filesize

        248KB

      • memory/1060-202-0x0000000007190000-0x00000000071CE000-memory.dmp

        Filesize

        248KB

      • memory/1060-204-0x0000000007190000-0x00000000071CE000-memory.dmp

        Filesize

        248KB

      • memory/1060-206-0x0000000007190000-0x00000000071CE000-memory.dmp

        Filesize

        248KB

      • memory/1060-208-0x0000000007190000-0x00000000071CE000-memory.dmp

        Filesize

        248KB

      • memory/1060-210-0x0000000007190000-0x00000000071CE000-memory.dmp

        Filesize

        248KB

      • memory/1060-212-0x0000000007190000-0x00000000071CE000-memory.dmp

        Filesize

        248KB

      • memory/2376-1121-0x0000000000AB0000-0x0000000000AE2000-memory.dmp

        Filesize

        200KB

      • memory/2376-1123-0x00000000056F0000-0x0000000005700000-memory.dmp

        Filesize

        64KB

      • memory/2376-1122-0x00000000056F0000-0x0000000005700000-memory.dmp

        Filesize

        64KB

      • memory/4800-173-0x0000000007130000-0x0000000007142000-memory.dmp

        Filesize

        72KB

      • memory/4800-169-0x0000000007130000-0x0000000007142000-memory.dmp

        Filesize

        72KB

      • memory/4800-183-0x0000000007220000-0x0000000007230000-memory.dmp

        Filesize

        64KB

      • memory/4800-180-0x0000000000400000-0x0000000002BC5000-memory.dmp

        Filesize

        39.8MB

      • memory/4800-150-0x0000000007220000-0x0000000007230000-memory.dmp

        Filesize

        64KB

      • memory/4800-179-0x0000000007130000-0x0000000007142000-memory.dmp

        Filesize

        72KB

      • memory/4800-177-0x0000000007130000-0x0000000007142000-memory.dmp

        Filesize

        72KB

      • memory/4800-153-0x0000000007130000-0x0000000007142000-memory.dmp

        Filesize

        72KB

      • memory/4800-175-0x0000000007130000-0x0000000007142000-memory.dmp

        Filesize

        72KB

      • memory/4800-151-0x0000000007220000-0x0000000007230000-memory.dmp

        Filesize

        64KB

      • memory/4800-171-0x0000000007130000-0x0000000007142000-memory.dmp

        Filesize

        72KB

      • memory/4800-182-0x0000000007220000-0x0000000007230000-memory.dmp

        Filesize

        64KB

      • memory/4800-167-0x0000000007130000-0x0000000007142000-memory.dmp

        Filesize

        72KB

      • memory/4800-165-0x0000000007130000-0x0000000007142000-memory.dmp

        Filesize

        72KB

      • memory/4800-163-0x0000000007130000-0x0000000007142000-memory.dmp

        Filesize

        72KB

      • memory/4800-161-0x0000000007130000-0x0000000007142000-memory.dmp

        Filesize

        72KB

      • memory/4800-159-0x0000000007130000-0x0000000007142000-memory.dmp

        Filesize

        72KB

      • memory/4800-157-0x0000000007130000-0x0000000007142000-memory.dmp

        Filesize

        72KB

      • memory/4800-155-0x0000000007130000-0x0000000007142000-memory.dmp

        Filesize

        72KB

      • memory/4800-149-0x0000000002CB0000-0x0000000002CDD000-memory.dmp

        Filesize

        180KB

      • memory/4800-148-0x0000000007230000-0x00000000077D4000-memory.dmp

        Filesize

        5.6MB

      • memory/4800-184-0x0000000007220000-0x0000000007230000-memory.dmp

        Filesize

        64KB

      • memory/4800-185-0x0000000000400000-0x0000000002BC5000-memory.dmp

        Filesize

        39.8MB

      • memory/4800-152-0x0000000007130000-0x0000000007142000-memory.dmp

        Filesize

        72KB