Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    57s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04/03/2023, 03:35

General

  • Target

    331d29d790c435fc229fdd9cfd5e1eaa449851df24b670d3ad528eddce4ce109.exe

  • Size

    659KB

  • MD5

    0da70b7b891b432062dd018bccede909

  • SHA1

    ff177f625ddc986a1a7d6900d724b9139617da6d

  • SHA256

    331d29d790c435fc229fdd9cfd5e1eaa449851df24b670d3ad528eddce4ce109

  • SHA512

    6125e81a1f837517c2132114e08410a03f7623765fcd00267555da06bfb0feacdf6113662547b7317cdc9de9722a9dea173c8c0fb1adbd29b931fa1e227ccb27

  • SSDEEP

    12288:jMrvy90BoC6rwtbT1U1GlKZakXR87qS4ZjQZax51SFMzOhge:gyUoC6UtT1U2KZaUeTaf4Gyie

Malware Config

Extracted

Family

redline

Botnet

rosto

C2

hueref.eu:4162

Attributes
  • auth_value

    07d81eba8cad42bbd0ae60042d48eac6

Extracted

Family

redline

Botnet

foksa

C2

hueref.eu:4162

Attributes
  • auth_value

    6a9b2601a21672b285de3ed41b5402e4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\331d29d790c435fc229fdd9cfd5e1eaa449851df24b670d3ad528eddce4ce109.exe
    "C:\Users\Admin\AppData\Local\Temp\331d29d790c435fc229fdd9cfd5e1eaa449851df24b670d3ad528eddce4ce109.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3608
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yciD60nN72.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yciD60nN72.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4144
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urNa25dY54.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urNa25dY54.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4600
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrMZ24FT13.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrMZ24FT13.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4744
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuhg66na75.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuhg66na75.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4752

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuhg66na75.exe

    Filesize

    175KB

    MD5

    75ced8ad0d8cd237ebc9cb7b00852651

    SHA1

    adab63df3e0a40fd9f170ab57da66f01f226141c

    SHA256

    a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819

    SHA512

    f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuhg66na75.exe

    Filesize

    175KB

    MD5

    75ced8ad0d8cd237ebc9cb7b00852651

    SHA1

    adab63df3e0a40fd9f170ab57da66f01f226141c

    SHA256

    a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819

    SHA512

    f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yciD60nN72.exe

    Filesize

    514KB

    MD5

    6181787740eb82e71ed9af488949f4c2

    SHA1

    77e2da722b908a0360631c29ff1f816c1f31ed3f

    SHA256

    7c8eaef8e2bb8c1a217e9e6d2ca7716c012771b34a50de7a9c79411eb1ce64dd

    SHA512

    54d9d014b8f12b734f67de15f7b04395334206ea7b6b15ba509fc7f9cc6ce0b8101173dfcb0fc0b9d22966d1d2b05a4074f823ae433856791e87c4cc849f8ce8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yciD60nN72.exe

    Filesize

    514KB

    MD5

    6181787740eb82e71ed9af488949f4c2

    SHA1

    77e2da722b908a0360631c29ff1f816c1f31ed3f

    SHA256

    7c8eaef8e2bb8c1a217e9e6d2ca7716c012771b34a50de7a9c79411eb1ce64dd

    SHA512

    54d9d014b8f12b734f67de15f7b04395334206ea7b6b15ba509fc7f9cc6ce0b8101173dfcb0fc0b9d22966d1d2b05a4074f823ae433856791e87c4cc849f8ce8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urNa25dY54.exe

    Filesize

    232KB

    MD5

    654d38a192aa90f8f2d4c64647ed64d1

    SHA1

    366c844b2fc2b4c0b0191754d4a1470e1763ccb4

    SHA256

    93f2d867562d5187beac7b8d7a55a8f435b7bbab77152b0c7bb3f8c22c2d23a2

    SHA512

    9ce88068e0e4cfac55467fbccc2621bbe431353bf4faf6a0957a6ae38f083023fbd130abb423e35f344e4d3952aed8470eba47c3ab71ff7ec61ff5a79aa80303

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urNa25dY54.exe

    Filesize

    232KB

    MD5

    654d38a192aa90f8f2d4c64647ed64d1

    SHA1

    366c844b2fc2b4c0b0191754d4a1470e1763ccb4

    SHA256

    93f2d867562d5187beac7b8d7a55a8f435b7bbab77152b0c7bb3f8c22c2d23a2

    SHA512

    9ce88068e0e4cfac55467fbccc2621bbe431353bf4faf6a0957a6ae38f083023fbd130abb423e35f344e4d3952aed8470eba47c3ab71ff7ec61ff5a79aa80303

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrMZ24FT13.exe

    Filesize

    289KB

    MD5

    1c795044102f7759152f7661b15c22bf

    SHA1

    66e3fee6ce5c4fd8974bb493b8ea7f63f0de4224

    SHA256

    8f76de3f10a19e704eaaa544d8b0aea616b3b55e5e9d4f91afed3db0c60714a4

    SHA512

    8c6313c1b71200f905a41b131ebb5a54f4057dd14fe062565674b4d86ebdb8ca2faf8655c970bb3ba279d34ea761c0d71d81c94f3fc9cec7dd2c49737b7653a1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrMZ24FT13.exe

    Filesize

    289KB

    MD5

    1c795044102f7759152f7661b15c22bf

    SHA1

    66e3fee6ce5c4fd8974bb493b8ea7f63f0de4224

    SHA256

    8f76de3f10a19e704eaaa544d8b0aea616b3b55e5e9d4f91afed3db0c60714a4

    SHA512

    8c6313c1b71200f905a41b131ebb5a54f4057dd14fe062565674b4d86ebdb8ca2faf8655c970bb3ba279d34ea761c0d71d81c94f3fc9cec7dd2c49737b7653a1

  • memory/4600-134-0x0000000002190000-0x00000000021AA000-memory.dmp

    Filesize

    104KB

  • memory/4600-135-0x0000000004B30000-0x000000000502E000-memory.dmp

    Filesize

    5.0MB

  • memory/4600-136-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4600-137-0x00000000024C0000-0x00000000024D8000-memory.dmp

    Filesize

    96KB

  • memory/4600-139-0x0000000002440000-0x0000000002450000-memory.dmp

    Filesize

    64KB

  • memory/4600-138-0x0000000002440000-0x0000000002450000-memory.dmp

    Filesize

    64KB

  • memory/4600-140-0x0000000002440000-0x0000000002450000-memory.dmp

    Filesize

    64KB

  • memory/4600-141-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/4600-142-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/4600-144-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/4600-146-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/4600-148-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/4600-150-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/4600-152-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/4600-154-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/4600-158-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/4600-156-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/4600-160-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/4600-162-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/4600-164-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/4600-166-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/4600-168-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/4600-169-0x0000000000400000-0x000000000057E000-memory.dmp

    Filesize

    1.5MB

  • memory/4600-170-0x0000000002440000-0x0000000002450000-memory.dmp

    Filesize

    64KB

  • memory/4600-172-0x0000000000400000-0x000000000057E000-memory.dmp

    Filesize

    1.5MB

  • memory/4744-177-0x00000000022F0000-0x0000000002336000-memory.dmp

    Filesize

    280KB

  • memory/4744-178-0x00000000024C0000-0x0000000002504000-memory.dmp

    Filesize

    272KB

  • memory/4744-180-0x00000000024C0000-0x00000000024FE000-memory.dmp

    Filesize

    248KB

  • memory/4744-179-0x00000000024C0000-0x00000000024FE000-memory.dmp

    Filesize

    248KB

  • memory/4744-182-0x00000000024C0000-0x00000000024FE000-memory.dmp

    Filesize

    248KB

  • memory/4744-184-0x00000000024C0000-0x00000000024FE000-memory.dmp

    Filesize

    248KB

  • memory/4744-186-0x00000000024C0000-0x00000000024FE000-memory.dmp

    Filesize

    248KB

  • memory/4744-188-0x00000000024C0000-0x00000000024FE000-memory.dmp

    Filesize

    248KB

  • memory/4744-190-0x00000000024C0000-0x00000000024FE000-memory.dmp

    Filesize

    248KB

  • memory/4744-192-0x00000000024C0000-0x00000000024FE000-memory.dmp

    Filesize

    248KB

  • memory/4744-194-0x00000000024C0000-0x00000000024FE000-memory.dmp

    Filesize

    248KB

  • memory/4744-196-0x00000000024C0000-0x00000000024FE000-memory.dmp

    Filesize

    248KB

  • memory/4744-198-0x00000000024C0000-0x00000000024FE000-memory.dmp

    Filesize

    248KB

  • memory/4744-200-0x00000000024C0000-0x00000000024FE000-memory.dmp

    Filesize

    248KB

  • memory/4744-202-0x00000000024C0000-0x00000000024FE000-memory.dmp

    Filesize

    248KB

  • memory/4744-204-0x00000000024C0000-0x00000000024FE000-memory.dmp

    Filesize

    248KB

  • memory/4744-206-0x00000000024C0000-0x00000000024FE000-memory.dmp

    Filesize

    248KB

  • memory/4744-208-0x00000000024C0000-0x00000000024FE000-memory.dmp

    Filesize

    248KB

  • memory/4744-210-0x00000000024C0000-0x00000000024FE000-memory.dmp

    Filesize

    248KB

  • memory/4744-212-0x00000000024C0000-0x00000000024FE000-memory.dmp

    Filesize

    248KB

  • memory/4744-360-0x00000000007A0000-0x00000000007EB000-memory.dmp

    Filesize

    300KB

  • memory/4744-361-0x0000000002350000-0x0000000002360000-memory.dmp

    Filesize

    64KB

  • memory/4744-364-0x0000000002350000-0x0000000002360000-memory.dmp

    Filesize

    64KB

  • memory/4744-365-0x0000000002350000-0x0000000002360000-memory.dmp

    Filesize

    64KB

  • memory/4744-1089-0x00000000052D0000-0x00000000058D6000-memory.dmp

    Filesize

    6.0MB

  • memory/4744-1090-0x00000000058E0000-0x00000000059EA000-memory.dmp

    Filesize

    1.0MB

  • memory/4744-1091-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/4744-1092-0x0000000002350000-0x0000000002360000-memory.dmp

    Filesize

    64KB

  • memory/4744-1093-0x00000000059F0000-0x0000000005A2E000-memory.dmp

    Filesize

    248KB

  • memory/4744-1094-0x0000000005B30000-0x0000000005B7B000-memory.dmp

    Filesize

    300KB

  • memory/4744-1096-0x0000000002350000-0x0000000002360000-memory.dmp

    Filesize

    64KB

  • memory/4744-1097-0x0000000002350000-0x0000000002360000-memory.dmp

    Filesize

    64KB

  • memory/4744-1098-0x0000000002350000-0x0000000002360000-memory.dmp

    Filesize

    64KB

  • memory/4744-1099-0x0000000002350000-0x0000000002360000-memory.dmp

    Filesize

    64KB

  • memory/4744-1100-0x0000000005DB0000-0x0000000005E42000-memory.dmp

    Filesize

    584KB

  • memory/4744-1101-0x0000000005E50000-0x0000000005EB6000-memory.dmp

    Filesize

    408KB

  • memory/4744-1102-0x0000000006540000-0x0000000006702000-memory.dmp

    Filesize

    1.8MB

  • memory/4744-1103-0x0000000006730000-0x0000000006C5C000-memory.dmp

    Filesize

    5.2MB

  • memory/4744-1104-0x0000000006E80000-0x0000000006EF6000-memory.dmp

    Filesize

    472KB

  • memory/4744-1105-0x0000000006F10000-0x0000000006F60000-memory.dmp

    Filesize

    320KB

  • memory/4752-1112-0x0000000000080000-0x00000000000B2000-memory.dmp

    Filesize

    200KB

  • memory/4752-1113-0x0000000004910000-0x000000000495B000-memory.dmp

    Filesize

    300KB

  • memory/4752-1114-0x0000000004960000-0x0000000004970000-memory.dmp

    Filesize

    64KB