Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    55s
  • max time network
    152s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03/03/2023, 05:45

General

  • Target

    e24aa91844f161bd3a3826f56e165d70ecbe35529d0b74aa73051339997f8669.exe

  • Size

    666KB

  • MD5

    711606d4a9d81857c2e615c46601133b

  • SHA1

    c9a43563db935b7e164268dae14d0cba11964562

  • SHA256

    e24aa91844f161bd3a3826f56e165d70ecbe35529d0b74aa73051339997f8669

  • SHA512

    a3941d5e5655adcdfdcb7763e9d5b60b20f27e65c65c8bd43bb22edd2b0a827e38c7a574407b84f2ca145c68e9fe321abc852d6f43c71ca3fc1d12a6cb3049c4

  • SSDEEP

    12288:aMriy90GjSpas3RTp8lfLXdGr5k47w6CmR3X6NNP1B3qZPISYdG+q93:Qy5jSpas3yf7dGr5k6Z3wXB3qZJZ93

Malware Config

Extracted

Family

redline

Botnet

ruzhpe

C2

pepunn.com:4162

Attributes
  • auth_value

    f735ced96ae8d01d0bd1d514240e54e0

Extracted

Family

redline

Botnet

fchan

C2

pepunn.com:4162

Attributes
  • auth_value

    127bd53d55e8c4f0dd2f6e1ea60deef4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e24aa91844f161bd3a3826f56e165d70ecbe35529d0b74aa73051339997f8669.exe
    "C:\Users\Admin\AppData\Local\Temp\e24aa91844f161bd3a3826f56e165d70ecbe35529d0b74aa73051339997f8669.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3232
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycTO32pf76.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycTO32pf76.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4044
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urfZ64Cp07.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urfZ64Cp07.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4072
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrkN62em57.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrkN62em57.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4384
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xurj86KG11.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xurj86KG11.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1784

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xurj86KG11.exe

    Filesize

    175KB

    MD5

    0bccc38c4f456a28b85da467cfb94596

    SHA1

    6f23e6436ad79141e63f3210ace789db2b02b480

    SHA256

    8d407e70fae68a01883703bdf21d5c2da4d921febef736da1de9aef8b2850302

    SHA512

    479d891eb6034d4a2d14ec64c15b6f4f53177eeb17f87ef544dade2717bed35a529f2420f1365b8d4e578eafd784e7a99f3407defbc70ad0b6a2e20e400eaf88

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xurj86KG11.exe

    Filesize

    175KB

    MD5

    0bccc38c4f456a28b85da467cfb94596

    SHA1

    6f23e6436ad79141e63f3210ace789db2b02b480

    SHA256

    8d407e70fae68a01883703bdf21d5c2da4d921febef736da1de9aef8b2850302

    SHA512

    479d891eb6034d4a2d14ec64c15b6f4f53177eeb17f87ef544dade2717bed35a529f2420f1365b8d4e578eafd784e7a99f3407defbc70ad0b6a2e20e400eaf88

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycTO32pf76.exe

    Filesize

    522KB

    MD5

    ad56f847e579377ea24daa27e14a7b62

    SHA1

    23e25897d66c65ca0e99dffa40605d8b961c13fe

    SHA256

    b28cb22fbd605a3241cfe04b3d8a87bb551421909a7bbfc1fa2905720726d817

    SHA512

    e3bdfb5b0ec98513f38931128c8571a9a0af43e49f9193ee253eb5a9a3e81ca3cc20d0c3a9e490b4c1e5b2a953486c0e0a040d09d6408aec0d9162244d4478f4

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycTO32pf76.exe

    Filesize

    522KB

    MD5

    ad56f847e579377ea24daa27e14a7b62

    SHA1

    23e25897d66c65ca0e99dffa40605d8b961c13fe

    SHA256

    b28cb22fbd605a3241cfe04b3d8a87bb551421909a7bbfc1fa2905720726d817

    SHA512

    e3bdfb5b0ec98513f38931128c8571a9a0af43e49f9193ee253eb5a9a3e81ca3cc20d0c3a9e490b4c1e5b2a953486c0e0a040d09d6408aec0d9162244d4478f4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urfZ64Cp07.exe

    Filesize

    250KB

    MD5

    452980bfe4732aaef2162c53c88f7ea4

    SHA1

    31b4e28e7ffdf36023ea859f0c343036dfb0470e

    SHA256

    855df086e7969ec6904fde9c5920ab3c6c364ebbc240aa266f78a3103b59d06d

    SHA512

    7ad12f0badc78bb1d42743e8776bece49a55e25244a9b7681c17c345f212bd2d28077e7fe495903de160d43aa7b3d57a419f0895ae3420a3b945d830d1d58707

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urfZ64Cp07.exe

    Filesize

    250KB

    MD5

    452980bfe4732aaef2162c53c88f7ea4

    SHA1

    31b4e28e7ffdf36023ea859f0c343036dfb0470e

    SHA256

    855df086e7969ec6904fde9c5920ab3c6c364ebbc240aa266f78a3103b59d06d

    SHA512

    7ad12f0badc78bb1d42743e8776bece49a55e25244a9b7681c17c345f212bd2d28077e7fe495903de160d43aa7b3d57a419f0895ae3420a3b945d830d1d58707

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrkN62em57.exe

    Filesize

    309KB

    MD5

    284f5cacca006d191a474f8c3eada4c1

    SHA1

    05ccc7b3be213f8543b80cd95e4cbd1aac6190dd

    SHA256

    52e7f367705bf1ad2aed8f9ac8dde3a1c3cd7fc0bd64ae3a3d5a44be416c1341

    SHA512

    26887be6f3f12322ca653e2ba5ee592d5dba31c09312c27d5d29b1d9832f84e42f19a4588787894792d26068dc029ab6abca08a02cc2651e3c8dfe75c41fe4ee

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrkN62em57.exe

    Filesize

    309KB

    MD5

    284f5cacca006d191a474f8c3eada4c1

    SHA1

    05ccc7b3be213f8543b80cd95e4cbd1aac6190dd

    SHA256

    52e7f367705bf1ad2aed8f9ac8dde3a1c3cd7fc0bd64ae3a3d5a44be416c1341

    SHA512

    26887be6f3f12322ca653e2ba5ee592d5dba31c09312c27d5d29b1d9832f84e42f19a4588787894792d26068dc029ab6abca08a02cc2651e3c8dfe75c41fe4ee

  • memory/1784-1110-0x0000000000950000-0x0000000000982000-memory.dmp

    Filesize

    200KB

  • memory/1784-1111-0x0000000005390000-0x00000000053DB000-memory.dmp

    Filesize

    300KB

  • memory/1784-1112-0x0000000005190000-0x00000000051A0000-memory.dmp

    Filesize

    64KB

  • memory/1784-1113-0x0000000005190000-0x00000000051A0000-memory.dmp

    Filesize

    64KB

  • memory/4072-146-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

    Filesize

    64KB

  • memory/4072-156-0x0000000002660000-0x0000000002672000-memory.dmp

    Filesize

    72KB

  • memory/4072-136-0x0000000002660000-0x0000000002672000-memory.dmp

    Filesize

    72KB

  • memory/4072-140-0x0000000002660000-0x0000000002672000-memory.dmp

    Filesize

    72KB

  • memory/4072-142-0x0000000002660000-0x0000000002672000-memory.dmp

    Filesize

    72KB

  • memory/4072-143-0x0000000000660000-0x000000000068D000-memory.dmp

    Filesize

    180KB

  • memory/4072-135-0x0000000002660000-0x0000000002672000-memory.dmp

    Filesize

    72KB

  • memory/4072-148-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

    Filesize

    64KB

  • memory/4072-147-0x0000000002660000-0x0000000002672000-memory.dmp

    Filesize

    72KB

  • memory/4072-144-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

    Filesize

    64KB

  • memory/4072-150-0x0000000002660000-0x0000000002672000-memory.dmp

    Filesize

    72KB

  • memory/4072-152-0x0000000002660000-0x0000000002672000-memory.dmp

    Filesize

    72KB

  • memory/4072-154-0x0000000002660000-0x0000000002672000-memory.dmp

    Filesize

    72KB

  • memory/4072-138-0x0000000002660000-0x0000000002672000-memory.dmp

    Filesize

    72KB

  • memory/4072-158-0x0000000002660000-0x0000000002672000-memory.dmp

    Filesize

    72KB

  • memory/4072-160-0x0000000002660000-0x0000000002672000-memory.dmp

    Filesize

    72KB

  • memory/4072-162-0x0000000002660000-0x0000000002672000-memory.dmp

    Filesize

    72KB

  • memory/4072-164-0x0000000002660000-0x0000000002672000-memory.dmp

    Filesize

    72KB

  • memory/4072-166-0x0000000002660000-0x0000000002672000-memory.dmp

    Filesize

    72KB

  • memory/4072-167-0x0000000000400000-0x0000000000582000-memory.dmp

    Filesize

    1.5MB

  • memory/4072-168-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

    Filesize

    64KB

  • memory/4072-169-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

    Filesize

    64KB

  • memory/4072-171-0x0000000000400000-0x0000000000582000-memory.dmp

    Filesize

    1.5MB

  • memory/4072-134-0x0000000002660000-0x0000000002678000-memory.dmp

    Filesize

    96KB

  • memory/4072-133-0x0000000004CF0000-0x00000000051EE000-memory.dmp

    Filesize

    5.0MB

  • memory/4072-132-0x0000000000900000-0x000000000091A000-memory.dmp

    Filesize

    104KB

  • memory/4384-179-0x00000000025C0000-0x00000000025FE000-memory.dmp

    Filesize

    248KB

  • memory/4384-215-0x00000000025C0000-0x00000000025FE000-memory.dmp

    Filesize

    248KB

  • memory/4384-183-0x00000000025C0000-0x00000000025FE000-memory.dmp

    Filesize

    248KB

  • memory/4384-185-0x00000000025C0000-0x00000000025FE000-memory.dmp

    Filesize

    248KB

  • memory/4384-187-0x00000000025C0000-0x00000000025FE000-memory.dmp

    Filesize

    248KB

  • memory/4384-189-0x00000000025C0000-0x00000000025FE000-memory.dmp

    Filesize

    248KB

  • memory/4384-191-0x00000000025C0000-0x00000000025FE000-memory.dmp

    Filesize

    248KB

  • memory/4384-193-0x00000000025C0000-0x00000000025FE000-memory.dmp

    Filesize

    248KB

  • memory/4384-195-0x00000000025C0000-0x00000000025FE000-memory.dmp

    Filesize

    248KB

  • memory/4384-198-0x00000000007A0000-0x00000000007EB000-memory.dmp

    Filesize

    300KB

  • memory/4384-197-0x00000000025C0000-0x00000000025FE000-memory.dmp

    Filesize

    248KB

  • memory/4384-200-0x0000000004D10000-0x0000000004D20000-memory.dmp

    Filesize

    64KB

  • memory/4384-202-0x0000000004D10000-0x0000000004D20000-memory.dmp

    Filesize

    64KB

  • memory/4384-201-0x00000000025C0000-0x00000000025FE000-memory.dmp

    Filesize

    248KB

  • memory/4384-207-0x00000000025C0000-0x00000000025FE000-memory.dmp

    Filesize

    248KB

  • memory/4384-205-0x0000000004D10000-0x0000000004D20000-memory.dmp

    Filesize

    64KB

  • memory/4384-204-0x00000000025C0000-0x00000000025FE000-memory.dmp

    Filesize

    248KB

  • memory/4384-209-0x00000000025C0000-0x00000000025FE000-memory.dmp

    Filesize

    248KB

  • memory/4384-211-0x00000000025C0000-0x00000000025FE000-memory.dmp

    Filesize

    248KB

  • memory/4384-181-0x00000000025C0000-0x00000000025FE000-memory.dmp

    Filesize

    248KB

  • memory/4384-213-0x00000000025C0000-0x00000000025FE000-memory.dmp

    Filesize

    248KB

  • memory/4384-1088-0x0000000005830000-0x0000000005E36000-memory.dmp

    Filesize

    6.0MB

  • memory/4384-1089-0x0000000005220000-0x000000000532A000-memory.dmp

    Filesize

    1.0MB

  • memory/4384-1090-0x0000000004C50000-0x0000000004C62000-memory.dmp

    Filesize

    72KB

  • memory/4384-1091-0x0000000004C70000-0x0000000004CAE000-memory.dmp

    Filesize

    248KB

  • memory/4384-1092-0x0000000004CC0000-0x0000000004D0B000-memory.dmp

    Filesize

    300KB

  • memory/4384-1093-0x0000000004D10000-0x0000000004D20000-memory.dmp

    Filesize

    64KB

  • memory/4384-1094-0x0000000005580000-0x00000000055E6000-memory.dmp

    Filesize

    408KB

  • memory/4384-1096-0x0000000006260000-0x00000000062F2000-memory.dmp

    Filesize

    584KB

  • memory/4384-1097-0x0000000004D10000-0x0000000004D20000-memory.dmp

    Filesize

    64KB

  • memory/4384-1098-0x0000000004D10000-0x0000000004D20000-memory.dmp

    Filesize

    64KB

  • memory/4384-1099-0x0000000004D10000-0x0000000004D20000-memory.dmp

    Filesize

    64KB

  • memory/4384-1100-0x0000000006580000-0x0000000006742000-memory.dmp

    Filesize

    1.8MB

  • memory/4384-1101-0x0000000006750000-0x0000000006C7C000-memory.dmp

    Filesize

    5.2MB

  • memory/4384-178-0x00000000025C0000-0x00000000025FE000-memory.dmp

    Filesize

    248KB

  • memory/4384-177-0x00000000025C0000-0x0000000002604000-memory.dmp

    Filesize

    272KB

  • memory/4384-176-0x0000000002540000-0x0000000002586000-memory.dmp

    Filesize

    280KB

  • memory/4384-1102-0x0000000004D10000-0x0000000004D20000-memory.dmp

    Filesize

    64KB

  • memory/4384-1103-0x0000000006DB0000-0x0000000006E26000-memory.dmp

    Filesize

    472KB

  • memory/4384-1104-0x0000000006E30000-0x0000000006E80000-memory.dmp

    Filesize

    320KB