Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/03/2023, 11:08

General

  • Target

    ac486e87fa6b97f71febf6478d46dfc81d461957043eb55ffd30d821e475bc00.exe

  • Size

    660KB

  • MD5

    7254ea83e5566490107d52a2bdccce2f

  • SHA1

    1d49f030f174ec6705abfe646c9b21919ea952a4

  • SHA256

    ac486e87fa6b97f71febf6478d46dfc81d461957043eb55ffd30d821e475bc00

  • SHA512

    d511b37d8ce9f55887284732a63f5f20519f81cf0094da03414373465becc7298a7209596bf1f590dd2b765eeb865395f180307cbd66dc5a1e9147f8e264ac53

  • SSDEEP

    12288:9Mr6y90zKM4+yvL7I6UFjvObmBr8RdVVC78jfyFq39pkBfxqjHf8xn6xJQIbilT:fyo4P75UF6ereKwwK9FHURgQRlT

Malware Config

Extracted

Family

redline

Botnet

rosto

C2

hueref.eu:4162

Attributes
  • auth_value

    07d81eba8cad42bbd0ae60042d48eac6

Extracted

Family

redline

Botnet

foksa

C2

hueref.eu:4162

Attributes
  • auth_value

    6a9b2601a21672b285de3ed41b5402e4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac486e87fa6b97f71febf6478d46dfc81d461957043eb55ffd30d821e475bc00.exe
    "C:\Users\Admin\AppData\Local\Temp\ac486e87fa6b97f71febf6478d46dfc81d461957043eb55ffd30d821e475bc00.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2744
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycNS23Jq18.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycNS23Jq18.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4752
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\uriU63eg56.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\uriU63eg56.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4056
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 1088
          4⤵
          • Program crash
          PID:4464
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrzv99na75.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrzv99na75.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1968
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 1268
          4⤵
          • Program crash
          PID:4176
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xucF51Pl37.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xucF51Pl37.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3960
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4056 -ip 4056
    1⤵
      PID:5100
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 1968 -ip 1968
      1⤵
        PID:3460

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xucF51Pl37.exe

        Filesize

        175KB

        MD5

        75ced8ad0d8cd237ebc9cb7b00852651

        SHA1

        adab63df3e0a40fd9f170ab57da66f01f226141c

        SHA256

        a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819

        SHA512

        f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xucF51Pl37.exe

        Filesize

        175KB

        MD5

        75ced8ad0d8cd237ebc9cb7b00852651

        SHA1

        adab63df3e0a40fd9f170ab57da66f01f226141c

        SHA256

        a35a264162c124ffd066dd867ed96359131d37b243cb0445c1c9eba6a58de819

        SHA512

        f565a49b14671683a1e48cece82a437a79bf8bdb456a3c6f35fac020e5fef3cd666399208633b7d2da9407f7b334a311a416b0a969c8b62ff28e15e7d4a0c431

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycNS23Jq18.exe

        Filesize

        515KB

        MD5

        1cafc55983b89ba374c72dbdeba9cc6d

        SHA1

        eae31da172506abfa03c3fae3fd0c0393b25ad2d

        SHA256

        f958ef09e7ce7f2f0e68a7852346835feaa74be987134d40a2bc3803a5386847

        SHA512

        ef478a1c1f34cedea8ee14c081df4ed24ab6504eb8b6a66bc78004098ac16d0a36e04b35f837dd534c2a9e5af60cdbeb393c1cd17f7497e644e8ad9cfd1cbce1

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycNS23Jq18.exe

        Filesize

        515KB

        MD5

        1cafc55983b89ba374c72dbdeba9cc6d

        SHA1

        eae31da172506abfa03c3fae3fd0c0393b25ad2d

        SHA256

        f958ef09e7ce7f2f0e68a7852346835feaa74be987134d40a2bc3803a5386847

        SHA512

        ef478a1c1f34cedea8ee14c081df4ed24ab6504eb8b6a66bc78004098ac16d0a36e04b35f837dd534c2a9e5af60cdbeb393c1cd17f7497e644e8ad9cfd1cbce1

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\uriU63eg56.exe

        Filesize

        232KB

        MD5

        99a158cf8893ed9ba9f95c8a8d305f7e

        SHA1

        d93e3ec8b044006faf4648bc20550bb9f84206b3

        SHA256

        9fcfc396efbaacf64160dd22e4942aa2113e023c43e0aa5a31fad0183c0602b0

        SHA512

        b78c00ef8def2849d36dc37af1cf624e71d2bdf1da71dcb19005dedbe6d4e5b6ae0663a232583c019a976ac903f1d953c7085beab57c64b5266242c7aabf4122

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\uriU63eg56.exe

        Filesize

        232KB

        MD5

        99a158cf8893ed9ba9f95c8a8d305f7e

        SHA1

        d93e3ec8b044006faf4648bc20550bb9f84206b3

        SHA256

        9fcfc396efbaacf64160dd22e4942aa2113e023c43e0aa5a31fad0183c0602b0

        SHA512

        b78c00ef8def2849d36dc37af1cf624e71d2bdf1da71dcb19005dedbe6d4e5b6ae0663a232583c019a976ac903f1d953c7085beab57c64b5266242c7aabf4122

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrzv99na75.exe

        Filesize

        290KB

        MD5

        5219e8f0103dcdc1edfc06a291fa3dc5

        SHA1

        176526bf4ebef1bfcf7cf535ae8707739e8b94ef

        SHA256

        79e9c0528a3deef77dc8e379e8d4d889ecabd5cf04e1d6756f92ca55c13f4a7d

        SHA512

        445da5e0a94d36dd96da459d028d706ed5067f4b95f30708d44daeeea933f01f42999f51cd1a889a73173e43924b1957e8259834dd5327c3b0d7baf4b1edbbf6

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrzv99na75.exe

        Filesize

        290KB

        MD5

        5219e8f0103dcdc1edfc06a291fa3dc5

        SHA1

        176526bf4ebef1bfcf7cf535ae8707739e8b94ef

        SHA256

        79e9c0528a3deef77dc8e379e8d4d889ecabd5cf04e1d6756f92ca55c13f4a7d

        SHA512

        445da5e0a94d36dd96da459d028d706ed5067f4b95f30708d44daeeea933f01f42999f51cd1a889a73173e43924b1957e8259834dd5327c3b0d7baf4b1edbbf6

      • memory/1968-227-0x00000000026E0000-0x000000000271E000-memory.dmp

        Filesize

        248KB

      • memory/1968-1102-0x0000000005970000-0x0000000005982000-memory.dmp

        Filesize

        72KB

      • memory/1968-1116-0x0000000006CA0000-0x00000000071CC000-memory.dmp

        Filesize

        5.2MB

      • memory/1968-1115-0x00000000068D0000-0x0000000006A92000-memory.dmp

        Filesize

        1.8MB

      • memory/1968-1114-0x0000000006840000-0x0000000006890000-memory.dmp

        Filesize

        320KB

      • memory/1968-1113-0x00000000067B0000-0x0000000006826000-memory.dmp

        Filesize

        472KB

      • memory/1968-1112-0x0000000005E80000-0x0000000005EE6000-memory.dmp

        Filesize

        408KB

      • memory/1968-1111-0x0000000005DE0000-0x0000000005E72000-memory.dmp

        Filesize

        584KB

      • memory/1968-1109-0x0000000002730000-0x0000000002740000-memory.dmp

        Filesize

        64KB

      • memory/1968-1108-0x0000000002730000-0x0000000002740000-memory.dmp

        Filesize

        64KB

      • memory/1968-1107-0x0000000002730000-0x0000000002740000-memory.dmp

        Filesize

        64KB

      • memory/1968-1106-0x0000000002730000-0x0000000002740000-memory.dmp

        Filesize

        64KB

      • memory/1968-1104-0x0000000002730000-0x0000000002740000-memory.dmp

        Filesize

        64KB

      • memory/1968-1103-0x0000000005990000-0x00000000059CC000-memory.dmp

        Filesize

        240KB

      • memory/1968-1101-0x0000000005830000-0x000000000593A000-memory.dmp

        Filesize

        1.0MB

      • memory/1968-1100-0x0000000005190000-0x00000000057A8000-memory.dmp

        Filesize

        6.1MB

      • memory/1968-225-0x00000000026E0000-0x000000000271E000-memory.dmp

        Filesize

        248KB

      • memory/1968-223-0x00000000026E0000-0x000000000271E000-memory.dmp

        Filesize

        248KB

      • memory/1968-221-0x00000000026E0000-0x000000000271E000-memory.dmp

        Filesize

        248KB

      • memory/1968-219-0x00000000026E0000-0x000000000271E000-memory.dmp

        Filesize

        248KB

      • memory/1968-217-0x00000000026E0000-0x000000000271E000-memory.dmp

        Filesize

        248KB

      • memory/1968-215-0x00000000026E0000-0x000000000271E000-memory.dmp

        Filesize

        248KB

      • memory/1968-190-0x00000000026E0000-0x000000000271E000-memory.dmp

        Filesize

        248KB

      • memory/1968-191-0x00000000026E0000-0x000000000271E000-memory.dmp

        Filesize

        248KB

      • memory/1968-193-0x00000000026E0000-0x000000000271E000-memory.dmp

        Filesize

        248KB

      • memory/1968-195-0x00000000026E0000-0x000000000271E000-memory.dmp

        Filesize

        248KB

      • memory/1968-197-0x00000000026E0000-0x000000000271E000-memory.dmp

        Filesize

        248KB

      • memory/1968-199-0x00000000026E0000-0x000000000271E000-memory.dmp

        Filesize

        248KB

      • memory/1968-202-0x00000000026E0000-0x000000000271E000-memory.dmp

        Filesize

        248KB

      • memory/1968-204-0x0000000002730000-0x0000000002740000-memory.dmp

        Filesize

        64KB

      • memory/1968-201-0x0000000000660000-0x00000000006AB000-memory.dmp

        Filesize

        300KB

      • memory/1968-205-0x00000000026E0000-0x000000000271E000-memory.dmp

        Filesize

        248KB

      • memory/1968-207-0x0000000002730000-0x0000000002740000-memory.dmp

        Filesize

        64KB

      • memory/1968-209-0x0000000002730000-0x0000000002740000-memory.dmp

        Filesize

        64KB

      • memory/1968-211-0x00000000026E0000-0x000000000271E000-memory.dmp

        Filesize

        248KB

      • memory/1968-208-0x00000000026E0000-0x000000000271E000-memory.dmp

        Filesize

        248KB

      • memory/1968-213-0x00000000026E0000-0x000000000271E000-memory.dmp

        Filesize

        248KB

      • memory/3960-1123-0x0000000000D40000-0x0000000000D72000-memory.dmp

        Filesize

        200KB

      • memory/3960-1124-0x0000000005680000-0x0000000005690000-memory.dmp

        Filesize

        64KB

      • memory/4056-173-0x0000000002690000-0x00000000026A2000-memory.dmp

        Filesize

        72KB

      • memory/4056-179-0x0000000002690000-0x00000000026A2000-memory.dmp

        Filesize

        72KB

      • memory/4056-182-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

        Filesize

        64KB

      • memory/4056-181-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

        Filesize

        64KB

      • memory/4056-150-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

        Filesize

        64KB

      • memory/4056-180-0x0000000000400000-0x000000000057E000-memory.dmp

        Filesize

        1.5MB

      • memory/4056-171-0x0000000002690000-0x00000000026A2000-memory.dmp

        Filesize

        72KB

      • memory/4056-153-0x0000000002690000-0x00000000026A2000-memory.dmp

        Filesize

        72KB

      • memory/4056-177-0x0000000002690000-0x00000000026A2000-memory.dmp

        Filesize

        72KB

      • memory/4056-175-0x0000000002690000-0x00000000026A2000-memory.dmp

        Filesize

        72KB

      • memory/4056-183-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

        Filesize

        64KB

      • memory/4056-151-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

        Filesize

        64KB

      • memory/4056-161-0x0000000002690000-0x00000000026A2000-memory.dmp

        Filesize

        72KB

      • memory/4056-167-0x0000000002690000-0x00000000026A2000-memory.dmp

        Filesize

        72KB

      • memory/4056-165-0x0000000002690000-0x00000000026A2000-memory.dmp

        Filesize

        72KB

      • memory/4056-163-0x0000000002690000-0x00000000026A2000-memory.dmp

        Filesize

        72KB

      • memory/4056-169-0x0000000002690000-0x00000000026A2000-memory.dmp

        Filesize

        72KB

      • memory/4056-159-0x0000000002690000-0x00000000026A2000-memory.dmp

        Filesize

        72KB

      • memory/4056-157-0x0000000002690000-0x00000000026A2000-memory.dmp

        Filesize

        72KB

      • memory/4056-155-0x0000000002690000-0x00000000026A2000-memory.dmp

        Filesize

        72KB

      • memory/4056-149-0x0000000004CB0000-0x0000000005254000-memory.dmp

        Filesize

        5.6MB

      • memory/4056-148-0x0000000000650000-0x000000000067D000-memory.dmp

        Filesize

        180KB

      • memory/4056-185-0x0000000000400000-0x000000000057E000-memory.dmp

        Filesize

        1.5MB

      • memory/4056-152-0x0000000002690000-0x00000000026A2000-memory.dmp

        Filesize

        72KB