Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    96s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    04/03/2023, 04:45

General

  • Target

    097ccac43122fefd11d6d9c66ae01b6469740b608e063de38cdf6c3ed0fdc6d5.exe

  • Size

    658KB

  • MD5

    ce0e30e95d5acb1b16d525d5535ac01f

  • SHA1

    428dcc89f1259adbd8d6bc4c9963ca2d50a87cb5

  • SHA256

    097ccac43122fefd11d6d9c66ae01b6469740b608e063de38cdf6c3ed0fdc6d5

  • SHA512

    0863b80efbf1101506f3d25a57807180ba91b9f48905817d30a9cbadd95956c17a6c69763d8de2afe0f3145fb56669bb8aa1e24434393a01ab70cb581346c109

  • SSDEEP

    12288:2MrRy90Q81yrPel5UajC4hgHaOonkoGklnwfoioOVEwAiyrfI7kgr71N:HyekC7Bk/InMHnuIQgvT

Malware Config

Extracted

Family

redline

Botnet

rosto

C2

hueref.eu:4162

Attributes
  • auth_value

    07d81eba8cad42bbd0ae60042d48eac6

Extracted

Family

redline

Botnet

foksa

C2

hueref.eu:4162

Attributes
  • auth_value

    6a9b2601a21672b285de3ed41b5402e4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\097ccac43122fefd11d6d9c66ae01b6469740b608e063de38cdf6c3ed0fdc6d5.exe
    "C:\Users\Admin\AppData\Local\Temp\097ccac43122fefd11d6d9c66ae01b6469740b608e063de38cdf6c3ed0fdc6d5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:700
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycza95Nz29.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycza95Nz29.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1172
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urFT03Co07.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urFT03Co07.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1336
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrPK32pR73.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrPK32pR73.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2744
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuRd35mQ73.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuRd35mQ73.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3976

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuRd35mQ73.exe

    Filesize

    175KB

    MD5

    75ced8ad0d8cd237ebc9cb7b00852651

    SHA1

    adab63df3e0a40fd9f170ab57da66f01f226141c

    SHA256

    a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819

    SHA512

    f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xuRd35mQ73.exe

    Filesize

    175KB

    MD5

    75ced8ad0d8cd237ebc9cb7b00852651

    SHA1

    adab63df3e0a40fd9f170ab57da66f01f226141c

    SHA256

    a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819

    SHA512

    f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycza95Nz29.exe

    Filesize

    513KB

    MD5

    be8e67ccad51567444f971a5a75e0ab9

    SHA1

    d00c684f9ac8fd066c332fa288a91b36a89c6ef0

    SHA256

    2bba2e78d08428887b5143e8d849f05ef5a0bac8631f7df2f1e31e6f7e6ddd6f

    SHA512

    84c88925d9c666410feb7d89abace646b6c408bb81c3598dc8a3b2f3b0ce6f3a4bd00c2344fe507e47ed21ed982358b4345af15a4c61c7e2bbf48f3fd1bbf303

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycza95Nz29.exe

    Filesize

    513KB

    MD5

    be8e67ccad51567444f971a5a75e0ab9

    SHA1

    d00c684f9ac8fd066c332fa288a91b36a89c6ef0

    SHA256

    2bba2e78d08428887b5143e8d849f05ef5a0bac8631f7df2f1e31e6f7e6ddd6f

    SHA512

    84c88925d9c666410feb7d89abace646b6c408bb81c3598dc8a3b2f3b0ce6f3a4bd00c2344fe507e47ed21ed982358b4345af15a4c61c7e2bbf48f3fd1bbf303

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urFT03Co07.exe

    Filesize

    231KB

    MD5

    5fe359d97529c2e4ad1b8de89d19860e

    SHA1

    d93e28ad930cdfaac6452143e04d68c707a9319a

    SHA256

    6d9bb6b2fcbb222d16c5c19a9e62a84b0505e48009e257d076e5adde6f7107cc

    SHA512

    6727cf4ff8d4fef4915f15bcb9787fcd968cfdd08ca749c7eb9a989ab63f8d55c1f6599e6e784679eb29d466094cd7c39f05badc53f80b952864d1c56eef5190

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urFT03Co07.exe

    Filesize

    231KB

    MD5

    5fe359d97529c2e4ad1b8de89d19860e

    SHA1

    d93e28ad930cdfaac6452143e04d68c707a9319a

    SHA256

    6d9bb6b2fcbb222d16c5c19a9e62a84b0505e48009e257d076e5adde6f7107cc

    SHA512

    6727cf4ff8d4fef4915f15bcb9787fcd968cfdd08ca749c7eb9a989ab63f8d55c1f6599e6e784679eb29d466094cd7c39f05badc53f80b952864d1c56eef5190

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrPK32pR73.exe

    Filesize

    290KB

    MD5

    8fee42f989bab807a7e66858ba5fe89d

    SHA1

    2f0c74aba0b54d351ac033248a718fa08edbfd91

    SHA256

    0b8c7c56907917d4b837cb95e0f7f47223d4457ddddd5986922cd7e3d61d70e5

    SHA512

    d4e1289b7bd0255a74eb8b85b552326ef288d45a9c69188a70215ecba62c984ecdb2ebb8ded103a699d109bf6d82ade212ed7c3dda8e04e780a79593cc3f6926

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrPK32pR73.exe

    Filesize

    290KB

    MD5

    8fee42f989bab807a7e66858ba5fe89d

    SHA1

    2f0c74aba0b54d351ac033248a718fa08edbfd91

    SHA256

    0b8c7c56907917d4b837cb95e0f7f47223d4457ddddd5986922cd7e3d61d70e5

    SHA512

    d4e1289b7bd0255a74eb8b85b552326ef288d45a9c69188a70215ecba62c984ecdb2ebb8ded103a699d109bf6d82ade212ed7c3dda8e04e780a79593cc3f6926

  • memory/1336-136-0x0000000002260000-0x000000000227A000-memory.dmp

    Filesize

    104KB

  • memory/1336-137-0x0000000004CC0000-0x00000000051BE000-memory.dmp

    Filesize

    5.0MB

  • memory/1336-138-0x0000000002660000-0x0000000002678000-memory.dmp

    Filesize

    96KB

  • memory/1336-139-0x0000000002660000-0x0000000002672000-memory.dmp

    Filesize

    72KB

  • memory/1336-140-0x0000000002660000-0x0000000002672000-memory.dmp

    Filesize

    72KB

  • memory/1336-142-0x0000000002660000-0x0000000002672000-memory.dmp

    Filesize

    72KB

  • memory/1336-146-0x0000000002660000-0x0000000002672000-memory.dmp

    Filesize

    72KB

  • memory/1336-144-0x0000000002660000-0x0000000002672000-memory.dmp

    Filesize

    72KB

  • memory/1336-148-0x0000000002660000-0x0000000002672000-memory.dmp

    Filesize

    72KB

  • memory/1336-150-0x0000000002660000-0x0000000002672000-memory.dmp

    Filesize

    72KB

  • memory/1336-152-0x0000000002660000-0x0000000002672000-memory.dmp

    Filesize

    72KB

  • memory/1336-156-0x0000000002660000-0x0000000002672000-memory.dmp

    Filesize

    72KB

  • memory/1336-154-0x0000000002660000-0x0000000002672000-memory.dmp

    Filesize

    72KB

  • memory/1336-158-0x0000000002660000-0x0000000002672000-memory.dmp

    Filesize

    72KB

  • memory/1336-161-0x0000000000650000-0x000000000067D000-memory.dmp

    Filesize

    180KB

  • memory/1336-160-0x0000000002660000-0x0000000002672000-memory.dmp

    Filesize

    72KB

  • memory/1336-163-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

    Filesize

    64KB

  • memory/1336-165-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

    Filesize

    64KB

  • memory/1336-164-0x0000000002660000-0x0000000002672000-memory.dmp

    Filesize

    72KB

  • memory/1336-167-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

    Filesize

    64KB

  • memory/1336-170-0x0000000002660000-0x0000000002672000-memory.dmp

    Filesize

    72KB

  • memory/1336-168-0x0000000002660000-0x0000000002672000-memory.dmp

    Filesize

    72KB

  • memory/1336-171-0x0000000000400000-0x000000000057E000-memory.dmp

    Filesize

    1.5MB

  • memory/1336-174-0x0000000000400000-0x000000000057E000-memory.dmp

    Filesize

    1.5MB

  • memory/1336-173-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

    Filesize

    64KB

  • memory/1336-175-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

    Filesize

    64KB

  • memory/2744-180-0x0000000002210000-0x0000000002256000-memory.dmp

    Filesize

    280KB

  • memory/2744-181-0x0000000002480000-0x00000000024C4000-memory.dmp

    Filesize

    272KB

  • memory/2744-182-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/2744-183-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/2744-185-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/2744-187-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/2744-189-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/2744-191-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/2744-193-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/2744-195-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/2744-197-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/2744-199-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/2744-201-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/2744-203-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/2744-205-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/2744-207-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/2744-209-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/2744-211-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/2744-213-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/2744-215-0x0000000002480000-0x00000000024BE000-memory.dmp

    Filesize

    248KB

  • memory/2744-248-0x0000000001F50000-0x0000000001F9B000-memory.dmp

    Filesize

    300KB

  • memory/2744-251-0x0000000004D80000-0x0000000004D90000-memory.dmp

    Filesize

    64KB

  • memory/2744-252-0x0000000004D80000-0x0000000004D90000-memory.dmp

    Filesize

    64KB

  • memory/2744-249-0x0000000004D80000-0x0000000004D90000-memory.dmp

    Filesize

    64KB

  • memory/2744-1092-0x0000000005290000-0x0000000005896000-memory.dmp

    Filesize

    6.0MB

  • memory/2744-1093-0x0000000004C40000-0x0000000004D4A000-memory.dmp

    Filesize

    1.0MB

  • memory/2744-1094-0x0000000004D50000-0x0000000004D62000-memory.dmp

    Filesize

    72KB

  • memory/2744-1095-0x00000000058A0000-0x00000000058DE000-memory.dmp

    Filesize

    248KB

  • memory/2744-1096-0x00000000059E0000-0x0000000005A2B000-memory.dmp

    Filesize

    300KB

  • memory/2744-1097-0x0000000004D80000-0x0000000004D90000-memory.dmp

    Filesize

    64KB

  • memory/2744-1099-0x0000000005B80000-0x0000000005BE6000-memory.dmp

    Filesize

    408KB

  • memory/2744-1100-0x0000000006250000-0x00000000062E2000-memory.dmp

    Filesize

    584KB

  • memory/2744-1101-0x0000000006430000-0x00000000065F2000-memory.dmp

    Filesize

    1.8MB

  • memory/2744-1102-0x0000000006600000-0x0000000006B2C000-memory.dmp

    Filesize

    5.2MB

  • memory/2744-1103-0x0000000004D80000-0x0000000004D90000-memory.dmp

    Filesize

    64KB

  • memory/2744-1104-0x0000000004D80000-0x0000000004D90000-memory.dmp

    Filesize

    64KB

  • memory/2744-1105-0x0000000004D80000-0x0000000004D90000-memory.dmp

    Filesize

    64KB

  • memory/2744-1106-0x0000000007DC0000-0x0000000007E36000-memory.dmp

    Filesize

    472KB

  • memory/2744-1107-0x0000000007E50000-0x0000000007EA0000-memory.dmp

    Filesize

    320KB

  • memory/2744-1108-0x0000000004D80000-0x0000000004D90000-memory.dmp

    Filesize

    64KB

  • memory/3976-1114-0x0000000000480000-0x00000000004B2000-memory.dmp

    Filesize

    200KB

  • memory/3976-1115-0x0000000004EC0000-0x0000000004F0B000-memory.dmp

    Filesize

    300KB

  • memory/3976-1116-0x0000000004D00000-0x0000000004D10000-memory.dmp

    Filesize

    64KB

  • memory/3976-1117-0x0000000004D00000-0x0000000004D10000-memory.dmp

    Filesize

    64KB